Systems and methods for detecting email spam and variants thereof
    1.
    发明授权
    Systems and methods for detecting email spam and variants thereof 有权
    用于检测电子邮件垃圾邮件的系统和方法及其变体

    公开(公告)号:US08495737B2

    公开(公告)日:2013-07-23

    申请号:US13038144

    申请日:2011-03-01

    摘要: The present disclosure provides systems and methods for detecting email spam and variants thereof. The systems and methods are configured to detect spam messages and variations thereof for different senders and with slight differences within the message body. In an exemplary embodiment, an incoming message body (m) is converted to a sequence of successive word lengths (Sm): m->Sm, a comparison is performed between the sequence, Sm, and a plurality of stored sequences (Sk) of known spam messages, and the incoming message is flagged as spam based on the comparison. Further, the plurality of stored sequences, Sk, may be continually updated based on user feedback and other spam detection techniques. The systems and methods of the present invention may be implemented through a computer, such as a mail server, through a cloud-based security system, through a user's computer via a software agent, and the like.

    摘要翻译: 本公开提供了用于检测电子邮件垃圾邮件及其变体的系统和方法。 系统和方法被配置为检测针对不同发送者的垃圾邮件及其变体,并且在消息体内具有微小的差异。 在一个示例性实施例中,输入消息体(m)被转换为连续字长(Sm)的序列:m→Sm,在序列Sm与多个存储的序列(Sk)之间进行比较 已知垃圾邮件,并且根据比较将传入的邮件标记为垃圾邮件。 此外,可以基于用户反馈和其他垃圾邮件检测技术来连续地更新多个存储的序列Sk。 本发明的系统和方法可以通过诸如邮件服务器的计算机,通过基于云的安全系统,经由用户的计算机经由软件代理等来实现。

    SYSTEMS AND METHODS FOR DETECTING EMAIL SPAM AND VARIANTS THEREOF
    2.
    发明申请
    SYSTEMS AND METHODS FOR DETECTING EMAIL SPAM AND VARIANTS THEREOF 有权
    用于检测电子邮件和其变体的系统和方法

    公开(公告)号:US20120227104A1

    公开(公告)日:2012-09-06

    申请号:US13038144

    申请日:2011-03-01

    IPC分类号: G06F21/00 G06F15/16

    摘要: The present disclosure provides systems and methods for detecting email spam and variants thereof. The systems and methods are configured to detect spam messages and variations thereof for different senders and with slight differences within the message body. In an exemplary embodiment, an incoming message body (m) is converted to a sequence of successive word lengths (Sm): m->Sm, a comparison is performed between the sequence, Sm, and a plurality of stored sequences (Sk) of known spam messages, and the incoming message is flagged as spam based on the comparison. Further, the plurality of stored sequences, Sk, may be continually updated based on user feedback and other spam detection techniques. The systems and methods of the present invention may be implemented through a computer, such as a mail server, through a cloud-based security system, through a user's computer via a software agent, and the like.

    摘要翻译: 本公开提供了用于检测电子邮件垃圾邮件及其变体的系统和方法。 系统和方法被配置为检测针对不同发送者的垃圾邮件及其变体,并且在消息体内具有微小的差异。 在一个示例性实施例中,输入消息体(m)被转换为连续字长(Sm)的序列:m→Sm,在序列Sm与多个存储的序列(Sk)之间进行比较 已知垃圾邮件,并且根据比较将传入的邮件标记为垃圾邮件。 此外,可以基于用户反馈和其他垃圾邮件检测技术来连续地更新多个存储的序列Sk。 本发明的系统和方法可以通过诸如邮件服务器的计算机,通过基于云的安全系统,经由用户的计算机经由软件代理等来实现。

    Cloud based inspection of secure content avoiding man-in-the-middle attacks
    3.
    发明授权
    Cloud based inspection of secure content avoiding man-in-the-middle attacks 有权
    基于云的检查安全内容,避免中间人攻击

    公开(公告)号:US08869259B1

    公开(公告)日:2014-10-21

    申请号:US13111753

    申请日:2011-05-19

    IPC分类号: H04L29/06

    摘要: A cloud based system that facilitates inspection of secure content and inexpensively detects the presence of a Man-in-the-Middle attack in a client-server communication is disclosed. Through inspection of the server certificate, no Man-in-the-Middle attack between server and the system is ensured; through inspection and designation of the client certificate, absence of a Man-in-the-Middle attack between the cloud based system and the client is ensured. In this way, the cloud based system can perform its usual policy enforcement functions with respect to secure content while avoiding Man-in-the-Middle attacks.

    摘要翻译: 公开了一种基于云的系统,其便于检查安全内容并且廉价地检测客户端 - 服务器通信中的中间人攻击的存在。 通过检查服务器证书,确保服务器与系统之间无中间人的攻击; 通过检查和指定客户端证书,确保了基于云的系统和客户端之间的中间人中的攻击。 以这种方式,基于云的系统可以在安全内容方面执行其通常的策略执行功能,同时避免中间人攻击。

    Content inspection using partial content signatures
    4.
    发明授权
    Content inspection using partial content signatures 有权
    内容检查使用部分内容签名

    公开(公告)号:US08607066B1

    公开(公告)日:2013-12-10

    申请号:US12185539

    申请日:2008-08-04

    IPC分类号: G06F11/30 G06F12/14

    摘要: Systems, methods and apparatus for a content item inspection. A plurality of portions of a content item are received in a buffer, the buffer divided into a plurality of segments. A partial signature of the content item is computed using the received portions of the content item in a most recently received segment and a partial signature computed for a preceding segment. The computed partial signature is compared against a plurality of partial signatures associated with trustworthy content items. If a matching partial signature associated with a trustworthy content item is found for the computed partial signature, the most recently received segment is allowed to be transmitted to a device that requested the content item.

    摘要翻译: 用于内容项目检查的系统,方法和装置。 内容项目的多个部分被接收在缓冲器中,缓冲器被分成多个段。 使用最近接收到的段中的内容项的接收部分和针对前一段计算的部分签名来计算内容项的部分签名。 将所计算的部分签名与与可信赖内容项相关联的多个部分签名进行比较。 如果针对所计算的部分签名找到与可信任内容项目相关联的匹配部分签名,则允许最近接收到的片段被发送到请求内容项目的设备。

    Automated dynamic tunnel management
    5.
    发明授权
    Automated dynamic tunnel management 有权
    自动化动态隧道管理

    公开(公告)号:US08458786B1

    公开(公告)日:2013-06-04

    申请号:US12856425

    申请日:2010-08-13

    IPC分类号: G06F17/30 H04L29/06 H04L12/28

    CPC分类号: H04L63/0272

    摘要: Systems, methods and apparatus for tunneling in a cloud based security system. In an aspect, tunnel session data describing authentication and unauthenticated sessions, and location data describing tunnel identifiers for tunnels, locations, and security policies specific to the locations are accessed. Tunnel packets are received, and for each tunnel packet it is determined, from the tunnel identifier associated with the packet, whether a session entry in the session data exists for the tunnel identified by the tunnel identifier. In response to determining that a session entry does not exist in the session data, then a session entry is created for the tunnel identifier, an authentication process to determine a location to be associated with the session entry is performed, and an entry in the location data for the location is associated with the session entry.

    摘要翻译: 用于基于云的安全系统中隧道的系统,方法和装置。 在一方面,访问描述认证和未认证会话的隧道会话数据以及描述隧道,位置和特定于该位置的安全策略的隧道标识符的位置数据。 接收隧道分组,并且对于每个隧道分组,根据与分组相关联的隧道标识,确定是否存在由隧道标识符标识的隧道的会话数据中的会话条目。 响应于确定在会话数据中不存在会话条目,则为隧道标识符创建会话条目,执行用于确定与会话条目相关联的位置的认证过程,以及位置中的条目 该位置的数据与会话条目相关联。

    Instance counting and ranking
    6.
    发明授权
    Instance counting and ranking 有权
    实例计数和排名

    公开(公告)号:US08010526B1

    公开(公告)日:2011-08-30

    申请号:US12182428

    申请日:2008-07-30

    IPC分类号: G06F7/00

    CPC分类号: G06F7/22

    摘要: In one general aspect, entity instances are monitored during a first interval, each entity instance being one of several types of entity instances. A first ranked list of entity instances is determined from the entity instances monitored during the first interval. The types of entity instances are ranked in the first list according to the number of times each type of entity instance occurred during the first interval and the first ranked list has a first cardinality of types of entity instances. Entity instances are monitored during a second interval. A second ranked list of entity instances is determined. The second ranked list has the first cardinality of types of entity instances. The first ranked list and the second ranked list are merged into a third ranked list of entities instances. The third ranked list has a second cardinality that is less than or equal to the first cardinality.

    摘要翻译: 在一个一般方面,在第一间隔期间监视实体实例,每个实体实例是几种类型的实体实例之一。 实体实例的排名列表是从第一个间隔期间监控的实体实例确定的。 实体实例的类型根据在第一间隔期间发生的每种类型的实体实例的次数排列在第一列表中,并且第一排名列表具有实体实例的类型的第一基数。 在第二个时间间隔内监视实体实例。 确定实体实例的第二排名列表。 第二个排名的列表具有实体实例类型的第一个基数。 排名第一的排名和排名第二的排名列表被合并到实体实例的排名第三的列表中。 排名第三的名单的第二个基数小于或等于第一个基数。

    HTTP authentication and authorization management
    8.
    发明授权
    HTTP authentication and authorization management 有权
    HTTP认证和授权管理

    公开(公告)号:US08656462B2

    公开(公告)日:2014-02-18

    申请号:US12179403

    申请日:2008-07-24

    IPC分类号: G06F7/04

    摘要: Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a state manager that is used to identify and maintain the source associated with a client browser that submits requests to the state manager. The state manager can allow requests that are authorized and request authorization for requests that are not. The state manager can maintain the states associated with each domain to reduce the number of transaction needed to authenticate and/or authorize subsequent requests to the same domain or to different domains.

    摘要翻译: 用于提供认证和授权管理的分布式安全性的系统,方法和设备。 该系统可以包括状态管理器,其用于识别和维护与向国家管理器提交请求的客户端浏览器相关联的源。 状态管理器可以允许被授权的请求,并请求不是请求的请求。 状态管理器可以维护与每个域相关联的状态,以减少对同一域或不同域进行认证和/或授权后续请求所需的事务数量。

    Distributed network security system deploying guard tables
    9.
    发明授权
    Distributed network security system deploying guard tables 有权
    分布式网络安全系统部署保护表

    公开(公告)号:US08549581B1

    公开(公告)日:2013-10-01

    申请号:US12128506

    申请日:2008-05-28

    IPC分类号: G06F7/04

    摘要: Guard tables including absence information are used in a security system to limit the processing of negative queries. A key corresponding to a request to access a network resource is hashed and the output of the hash is a bit position in a guard table. The bit value at the bit position in the guard table is checked to determine if the information to which the key corresponds is absent from a datastore. Further processing of the request can be based on the indicated presence or absence information.

    摘要翻译: 包括缺席信息在内的保护表在安全系统中用于限制负查询的处理。 对应于访问网络资源的请求的密钥被散列,并且散列的输出是保护表中的位置。 检查保护表中位位置处的位值,以确定密钥对应的信息是否不在数据存储区中。 请求的进一步处理可以基于指示的存在或不存在信息。

    Phrase matching
    10.
    发明授权
    Phrase matching 有权
    短语匹配

    公开(公告)号:US08341415B1

    公开(公告)日:2012-12-25

    申请号:US12185481

    申请日:2008-08-04

    IPC分类号: H04L9/32

    摘要: Methods, systems, and apparatus, including computer program products, for generating or using augmentation queries. In one aspect, a set of phrase terms of a phrase are received in first ordinal positions, and a set of first hashes for each of the phrase terms. Concatenated hashes from the set of first hashes are generated. Hashes of content terms for received content are compared to the concatenated hashes to determine if a phrase is detected in the content.

    摘要翻译: 用于生成或使用增强查询的方法,系统和装置,包括计算机程序产品。 在一个方面,短语的一组短语术语被接收在第一顺序位置,以及用于每个短语项的一组第一散列。 生成从第一个散列集合中连接的哈希值。 将收到的内容的内容词汇的哈希值与连接的哈希进行比较,以确定在内容中是否检测到短语。