System and method for aggregating and extending parental controls auditing in a computer network
    4.
    发明授权
    System and method for aggregating and extending parental controls auditing in a computer network 有权
    用于在计算机网络中聚合和扩展家长控制审计的系统和方法

    公开(公告)号:US07600019B2

    公开(公告)日:2009-10-06

    申请号:US12108321

    申请日:2008-04-23

    摘要: A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates.

    摘要翻译: 提供了一种用于在非管理计算网络中聚合和扩展家长控制审计的系统和方法。 家长控制系统(包括家长控制数据库,记录接口和审核过程)驻留在非托管计算网络中的每个主机计算设备上,其能够将驻留在主机计算设备之一上的数据与驻留在其他设备上的数据进行同步 在网络中。 父母控制系统有助于父母控制审计信息的记录和报告,允许父母汇总审核信息,以获得他们孩子在家中使用所有计算机的全面审核报告,并且可由应用程序进行扩展和定制 父母控制审计信息来自哪里。

    Feedback-driven malware detector
    5.
    发明申请
    Feedback-driven malware detector 有权
    反馈驱动的恶意软件检测器

    公开(公告)号:US20070038677A1

    公开(公告)日:2007-02-15

    申请号:US11190749

    申请日:2005-07-27

    IPC分类号: G06F17/30

    CPC分类号: G06F21/565

    摘要: Embodiments of a feedback-driven malware detector are directed to protecting a computer from programs that perform actions that are malicious or not expected by a user. In one embodiment, the feedback-driven malware detector performs a method that initially determines whether the state of an application program scheduled to be added to an extensibility point on a computer is already known. If the state of the object is not already known, the user is informed that an application program is being installed on the computer and that the application program is being added to an extensibility point. Then, input is obtained from the user that assists in determining whether the application program is malware.

    摘要翻译: 反馈驱动的恶意软件检测器的实施例旨在保护计算机不执行由用户恶意或不期望的动作的程序。 在一个实施例中,反馈驱动的恶意软件检测器执行一种方法,该方法最初确定计划添加到计算机上的可扩展点的应用程序的状态是否已知。 如果对象的状态尚未知道,则通知用户计算机上正在安装应用程序,并将应用程序添加到可扩展点。 然后,从用户获得有助于确定应用程序是否是恶意软件的输入。

    Detection and dynamic alteration of execution of potential software threats
    7.
    发明申请
    Detection and dynamic alteration of execution of potential software threats 有权
    检测和动态改变潜在软件威胁的执行

    公开(公告)号:US20090100520A1

    公开(公告)日:2009-04-16

    申请号:US11974457

    申请日:2007-10-12

    IPC分类号: G06F21/00

    摘要: An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier.

    摘要翻译: 提供了一种用于在计算机系统上执行之前动态识别和拦截潜在软件威胁的布置,其中文件系统过滤器驱动程序(称为“微型过滤器”)与反恶意软件服务接口以选择性地生成警报事件并允许 除了产生警报事件和暂停威胁之外,运行的威胁。 暂停威胁或允许其运行的决定是通过应用级联逻辑层次结构来实现的,层级逻辑层次结构包括相应的策略定义的动作,用户定义的动作和签名定义的动作。 微型过滤器在打开或修改和关闭文件时,向反恶意软件服务生成警报事件。 该服务使用引擎来扫描文件,以识别通过应用逻辑层次结构处理的潜在威胁,逻辑层次结构提供在层次结构的较低层中定义的配置将被包含在较高层中的层覆盖。

    Interoperable credential gathering and access modularity
    10.
    发明申请
    Interoperable credential gathering and access modularity 有权
    可互操作的凭证采集和访问模块化

    公开(公告)号:US20050091213A1

    公开(公告)日:2005-04-28

    申请号:US10693585

    申请日:2003-10-24

    摘要: A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.

    摘要翻译: 用不同凭证提供者模块之一翻译凭证,每个凭证提供者模块将相应的不同类型的凭证翻译成公共协议。 翻译的凭证通过API传送到登录UI模块到本地机器的操作系统(OS)。 登录UI模块调用操作系统登录模块,以根据凭据数据库验证转换的凭据。 当认证成功时,由登录的凭证登录的用户访问本地计算机。 证书还可以与从登录UI模块通过每个与API进行通信的不同预登录访问提供程序(PLAP)模块中的相应一个模块接收到的选择一起使用。 当凭证凭证凭证数据库进行身份验证时,API与所选择的PLAP模块指定的访问服务建立网络会话。