摘要:
A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
摘要:
A method, non-transitory computer readable medium and apparatus for searching for an application are disclosed. For example, the method receives information regarding a context of a user, receives a search request for the application, finds the application that has context information that matches the context of the user, and provides a search result in response to the search request that includes the application that has the context information that matches the context of the user.
摘要:
A method, non-transitory computer readable medium and apparatus for fingerprinting applications are disclosed. For example, the method analyzes an application binary of the application, extracts an invariant feature from the application binary, generates a signature from the invariant feature, and compares the signature of the application to a second signature of a second application to determine if the application and the second application are similar.
摘要:
A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
摘要:
Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions.
摘要:
Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions.
摘要:
Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.
摘要:
Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.
摘要:
A waste disposer comprising a primary dehydrating chamber, a grinding device, a secondary dehydrating chamber, and a storage chamber. The primary dehydrating chamber is adapted to allow waste to be heated therein to partly dehydrate the waste. The primary dehydrating chamber has: a first waste inlet for receiving the waste, a first vapor outlet for exhausting vapor from the waste, a drainage outlet for draining free liquid from the waste, and a first waste outlet for outputting the partly dehydrated waste. The grinding device is adapted to receive the waste from the first waste outlet and grind the waste to reduce the size thereof. The secondary dehydrating chamber is adapted to allow the ground waste to be heated therein to further dehydrate the waste. The secondary dehydrating chamber has a second waste inlet for receiving the ground waste, a second vapor outlet for exhausting vapor from the waste, and a second waste outlet for outputting the further dehydrated waste. The storage chamber is adapted to receive the waste from the second waste outlet and store the waste in the storage chamber.
摘要:
The present invention relates to a method and apparatus for detecting a signal propagation type. The method comprises: calculating a similarity value of a currently received pulse response and a reference pulse response when a certain positioning base station of a UWB positioning system currently receives a pulse response from a certain positioning tag, the similarity value indicating the degree of similarity between the currently received pulse response and the reference pulse response, wherein the reference pulse response is a pulse response previously received by the positioning base station from the positioning tag; and determining the current type of signal propagation between the positioning base station and the positioning tag on the basis of the similarity value. The method and apparatus can detect the type of signal propagation between the positioning base station and positioning tag of the UWB positioning system.