Monitor method and monitor apparatus for monitoring data of hardware
    1.
    发明授权
    Monitor method and monitor apparatus for monitoring data of hardware 有权
    用于监控硬件数据的监视方法和监视器

    公开(公告)号:US08286258B2

    公开(公告)日:2012-10-09

    申请号:US12631546

    申请日:2009-12-04

    IPC分类号: H04L29/06

    CPC分类号: G06F21/554 G06F21/6263

    摘要: A monitor method and a monitor apparatus for monitoring a data of hardware are provided. The data has private information, identification information and at least one first network transmission address. The monitor apparatus comprises a storage unit and a processing unit. The data is stored in the storage unit according to the identification information. The processing unit is configured to record the identification information and the at least one first network transmission address of the data in a mark information table. In response to a sending system call, when a transmission is arranged to transmit the private information of the data to a second network transmission address which is different from the at least one first network transmission address, the processing unit will output a signal to cease the transmission.

    摘要翻译: 提供了一种用于监视硬件数据的监视方法和监视装置。 数据具有私人信息,识别信息和至少一个第一网络传输地址。 监视器装置包括存储单元和处理单元。 数据根据识别信息存储在存储单元中。 处理单元被配置为将标识信息和数据的至少一个第一网络传输地址记录在标记信息表中。 响应于发送系统呼叫,当发送被设置为将数据的私有信息发送到与至少一个第一网络发送地址不同的第二网络发送地址时,处理单元将输出信号以停止 传输。

    METHOD AND SYSTEM FOR CLEANING MALICIOUS SOFTWARE AND COMPUTER PROGRAM PRODUCT AND STORAGE MEDIUM
    2.
    发明申请
    METHOD AND SYSTEM FOR CLEANING MALICIOUS SOFTWARE AND COMPUTER PROGRAM PRODUCT AND STORAGE MEDIUM 有权
    清除恶意软件和计算机程序产品和存储介质的方法和系统

    公开(公告)号:US20110023120A1

    公开(公告)日:2011-01-27

    申请号:US12571447

    申请日:2009-10-01

    IPC分类号: G06F12/14

    CPC分类号: G06F21/56 G06F21/568

    摘要: A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed.

    摘要翻译: 提供了一种用于清洁恶意软件(恶意软件),计算机程序产品和存储介质的方法和系统。 建立关系图以将操作系统中的过程和相关元素相关联。 当满足预定条件时,在关系图上执行节点标记动作。 对应于恶意进程的节点及其相关节点标有第一个标签。 其他正常进程的节点及其相关节点标有第二个标签。 然后,屏蔽标记有第一标签和第二标签的节点,使得每个节点仅标记第一标签或第二标签。 最后,删除与标记有第一个标签的节点对应的进程和元素。

    Method and system for cleaning malicious software and computer program product and storage medium
    3.
    发明授权
    Method and system for cleaning malicious software and computer program product and storage medium 有权
    恶意软件和计算机程序产品和存储介质的清除方法和系统

    公开(公告)号:US08490192B2

    公开(公告)日:2013-07-16

    申请号:US12571447

    申请日:2009-10-01

    IPC分类号: G06F12/14

    CPC分类号: G06F21/56 G06F21/568

    摘要: A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed.

    摘要翻译: 提供了一种用于清洁恶意软件(恶意软件),计算机程序产品和存储介质的方法和系统。 建立关系图以将操作系统中的过程和相关元素相关联。 当满足预定条件时,在关系图上执行节点标记动作。 对应于恶意进程的节点及其相关节点标有第一个标签。 其他正常进程的节点及其相关节点标有第二个标签。 然后,屏蔽标记有第一标签和第二标签的节点,使得每个节点仅标记第一标签或第二标签。 最后,删除与标记有第一个标签的节点对应的进程和元素。

    Method, network apparatus and computer readable medium thereof for detecting the defect of the network
    4.
    发明申请
    Method, network apparatus and computer readable medium thereof for detecting the defect of the network 审中-公开
    用于检测网络缺陷的方法,网络装置及其计算机可读介质

    公开(公告)号:US20090147689A1

    公开(公告)日:2009-06-11

    申请号:US12010841

    申请日:2008-01-30

    IPC分类号: H04L12/26

    CPC分类号: H04L63/1408 H04L43/10

    摘要: Method, network apparatus and computer readable medium thereof for detecting the defect of the network are provided. The network apparatus comprises a controlling module and a relaying module. The controlling module comprises a generating module for generating a plurality of sub-detecting packets; and a first combining module for combining the plurality of sub-detecting module into a detecting packet; the relaying module is for receiving the detecting packet from the controlling module, the relaying module comprises a decomposing module for decomposing the detecting packet into the plurality of sub-detecting packets and transfer the sub-detecting packets to a target host; and a second combining module for receiving a plurality sub-result packets from the target host which are corresponding to the sub-detecting packets, combining the sub-result packets into a result packet and transferring the result packet to the controlling module to complete the detection.

    摘要翻译: 提供了用于检测网络缺陷的方法,网络设备及其计算机可读介质。 网络装置包括控制模块和中继模块。 所述控制模块包括用于产生多个子检测分组的生成模块; 以及第一组合模块,用于将所述多个子检测模块组合成检测包; 所述中继模块用于从所述控制模块接收所述检测分组,所述中继模块包括分解模块,用于将所述检测分组分解成所述多个子检测分组,并将所述子检测分组传送到目标主机; 以及第二组合模块,用于从所述目标主机接收对应于所述子检测分组的多个子结果分组,将所述子结果分组组合成结果分组,并将所述结果分组传送到所述控制模块以完成所述检测 。

    Virtual machine monitoring method, system and computer readable storage medium
    5.
    发明授权
    Virtual machine monitoring method, system and computer readable storage medium 有权
    虚拟机监控方式,系统和计算机可读存储介质

    公开(公告)号:US08650567B2

    公开(公告)日:2014-02-11

    申请号:US13287650

    申请日:2011-11-02

    IPC分类号: G06F9/455

    摘要: A virtual machine monitoring method used in a virtual machine monitoring system is provided. The virtual machine monitoring method includes retrieving a hypercall transmitted from one of a plurality of virtual machines to a hypervisor of a virtual machine monitoring system, wherein the hypercall is used for establishing a channel between a source virtual machine and a target virtual machine. A central control virtual machine ID information in the hypervisor is retrieved. A type of the channel established by the hypercall is determined according to the central control virtual machine ID information and channel-establishing information corresponding to the hypercall. When the channel is a private channel that is not related to a central control virtual machine of the virtual machines, a security module is used to monitor the private channel.

    摘要翻译: 提供了虚拟机监控系统中使用的虚拟机监控方法。 所述虚拟机监视方法包括检索从多个虚拟机中的一个发送到虚拟机监视系统的管理程序的超级呼叫,其中,所述超级呼叫用于在源虚拟机和目标虚拟机之间建立通道。 检索管理程序中的中央控制虚拟机ID信息。 根据中心控制虚拟机ID信息和对应于该超级呼叫的信道建立信息来确定由超级呼叫建立的信道类型。 当信道是与虚拟机的中央控制虚拟机无关的专用信道时,使用安全模块来监视专用信道。

    Information security protection host
    6.
    发明授权
    Information security protection host 有权
    信息安全保护主机

    公开(公告)号:US08458785B2

    公开(公告)日:2013-06-04

    申请号:US12960056

    申请日:2010-12-03

    IPC分类号: G06F15/16

    摘要: An information security protection host is provided. The information security protection host comprises a network interface and a virtual machine monitor (VMM) device. The network interface is connected to a computer network and is configured to receive a first packet. The VMM device is configured to run a first operating system, wherein the first operating system provides a first network service. The VMM device is further configured to provide a first operating system information of the first operating system and a first network service information of the first network service instantaneously so as to determine the security of the first packet.

    摘要翻译: 提供信息安全保护主机。 信息安全保护主机包括网络接口和虚拟机监视器(VMM)设备。 网络接口连接到计算机网络,并被配置为接收第一分组。 VMM设备被配置为运行第一操作系统,其中第一操作系统提供第一网络服务。 VMM设备还被配置为立即提供第一操作系统的第一操作系统信息和第一网络服务的第一网络服务信息,以便确定第一分组的安全性。

    Virtual Machine Monitoring Method, System and Computer Readable Storage Medium
    7.
    发明申请
    Virtual Machine Monitoring Method, System and Computer Readable Storage Medium 有权
    虚拟机监控方法,系统和计算机可读存储介质

    公开(公告)号:US20130067470A1

    公开(公告)日:2013-03-14

    申请号:US13287650

    申请日:2011-11-02

    IPC分类号: G06F9/455

    摘要: A virtual machine monitoring method used in a virtual machine monitoring system is provided. The virtual machine monitoring method includes retrieving a hypercall transmitted from one of a plurality of virtual machines to a hypervisor of a virtual machine monitoring system, wherein the hypercall is used for establishing a channel between a source virtual machine and a target virtual machine. A central control virtual machine ID information in the hypervisor is retrieved. A type of the channel established by the hypercall is determined according to the central control virtual machine ID information and channel-establishing information corresponding to the hypercall. When the channel is a private channel that is not related to a central control virtual machine of the virtual machines, a security module is used to monitor the private channel.

    摘要翻译: 提供了虚拟机监控系统中使用的虚拟机监控方法。 所述虚拟机监视方法包括检索从多个虚拟机中的一个发送到虚拟机监视系统的管理程序的超级呼叫,其中,所述超级呼叫用于在源虚拟机和目标虚拟机之间建立通道。 检索管理程序中的中央控制虚拟机ID信息。 根据中心控制虚拟机ID信息和对应于该超级呼叫的信道建立信息来确定由超级呼叫建立的信道类型。 当信道是与虚拟机的中央控制虚拟机无关的专用信道时,使用安全模块来监视专用信道。

    Foldable Cushion Bag
    9.
    发明申请

    公开(公告)号:US20190023480A1

    公开(公告)日:2019-01-24

    申请号:US15654822

    申请日:2017-07-20

    申请人: Chih-Hung Lin

    发明人: Chih-Hung Lin

    摘要: A foldable cushion bag includes a main body and a handling unit. The main body includes a bottom wall and a sleeve wall jointed to the bottom wall. The bottom wall and the sleeve wall form a first heat sealed joint therebetween and cooperatively define a space for receiving a bottle. Each of the bottom and sleeve walls includes a multilayered structure having an outermost protecting layer, a first adhesive layer, a heat sealing layer, a second adhesive layer and an innermost cushion layer in that order. The handling unit is connected to the sleeve wall and opposite to the bottom wall. The handling unit is formed with a gripping hole.