System and method for aggregating and extending parental controls auditing in a computer network
    6.
    发明授权
    System and method for aggregating and extending parental controls auditing in a computer network 有权
    用于在计算机网络中聚合和扩展家长控制审计的系统和方法

    公开(公告)号:US07600019B2

    公开(公告)日:2009-10-06

    申请号:US12108321

    申请日:2008-04-23

    摘要: A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates.

    摘要翻译: 提供了一种用于在非管理计算网络中聚合和扩展家长控制审计的系统和方法。 家长控制系统(包括家长控制数据库,记录接口和审核过程)驻留在非托管计算网络中的每个主机计算设备上,其能够将驻留在主机计算设备之一上的数据与驻留在其他设备上的数据进行同步 在网络中。 父母控制系统有助于父母控制审计信息的记录和报告,允许父母汇总审核信息,以获得他们孩子在家中使用所有计算机的全面审核报告,并且可由应用程序进行扩展和定制 父母控制审计信息来自哪里。

    Feedback-driven malware detector
    7.
    发明申请
    Feedback-driven malware detector 有权
    反馈驱动的恶意软件检测器

    公开(公告)号:US20070038677A1

    公开(公告)日:2007-02-15

    申请号:US11190749

    申请日:2005-07-27

    IPC分类号: G06F17/30

    CPC分类号: G06F21/565

    摘要: Embodiments of a feedback-driven malware detector are directed to protecting a computer from programs that perform actions that are malicious or not expected by a user. In one embodiment, the feedback-driven malware detector performs a method that initially determines whether the state of an application program scheduled to be added to an extensibility point on a computer is already known. If the state of the object is not already known, the user is informed that an application program is being installed on the computer and that the application program is being added to an extensibility point. Then, input is obtained from the user that assists in determining whether the application program is malware.

    摘要翻译: 反馈驱动的恶意软件检测器的实施例旨在保护计算机不执行由用户恶意或不期望的动作的程序。 在一个实施例中,反馈驱动的恶意软件检测器执行一种方法,该方法最初确定计划添加到计算机上的可扩展点的应用程序的状态是否已知。 如果对象的状态尚未知道,则通知用户计算机上正在安装应用程序,并将应用程序添加到可扩展点。 然后,从用户获得有助于确定应用程序是否是恶意软件的输入。

    Detection and dynamic alteration of execution of potential software threats
    9.
    发明申请
    Detection and dynamic alteration of execution of potential software threats 有权
    检测和动态改变潜在软件威胁的执行

    公开(公告)号:US20090100520A1

    公开(公告)日:2009-04-16

    申请号:US11974457

    申请日:2007-10-12

    IPC分类号: G06F21/00

    摘要: An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier.

    摘要翻译: 提供了一种用于在计算机系统上执行之前动态识别和拦截潜在软件威胁的布置,其中文件系统过滤器驱动程序(称为“微型过滤器”)与反恶意软件服务接口以选择性地生成警报事件并允许 除了产生警报事件和暂停威胁之外,运行的威胁。 暂停威胁或允许其运行的决定是通过应用级联逻辑层次结构来实现的,层级逻辑层次结构包括相应的策略定义的动作,用户定义的动作和签名定义的动作。 微型过滤器在打开或修改和关闭文件时,向反恶意软件服务生成警报事件。 该服务使用引擎来扫描文件,以识别通过应用逻辑层次结构处理的潜在威胁,逻辑层次结构提供在层次结构的较低层中定义的配置将被包含在较高层中的层覆盖。