Small-scale secured computer network group without centralized management
    3.
    发明授权
    Small-scale secured computer network group without centralized management 有权
    小型安全计算机网络组没有集中管理

    公开(公告)号:US07640324B2

    公开(公告)日:2009-12-29

    申请号:US10414354

    申请日:2003-04-15

    摘要: Computers on a local computer network, such as a home network or a small business network, are formed into a secured network group that provides common user access control and enables resource sharing among the computers in the group. A computer on the local network discovers whether there are secured network groups existing on the local network. If one secured network group is found, the computer indicates to a second computer in the group its desire to join the group, and establishes trust with that computer, such as by entering a proper user name and password, or a secret identification number. Once the trust is established, the first computer joins the group. Within the secured network group, user accounts and user profiles are replicated to each of the computers in the group. The establishment of trust and the replication of user accounts and profiles among the computers in the group enable the implementation of security policies and user access control in a group-wide manner.

    摘要翻译: 本地计算机网络(例如家庭网络或小型企业网络)上的计算机被形成为提供公共用户访问控制并使得群组中的计算机之间的资源共享的安全网络组。 本地网络上的计算机会发现本地网络上是否存在安全网络组。 如果找到一个安全网络组,则计算机向组中的第二台计算机指示其希望加入组,并且通过输入适当的用户名和密码或秘密识别号码与该计算机建立信任。 建立信任后,第一台计算机加入该组。 在安全网络组内,用户帐户和用户配置文件将复制到组中的每台计算机。 组中的计算机之间建立信任和用户帐户和配置文件的复制使得能够以组范围的方式实现安全策略和用户访问控制。

    System and method for aggregating and extending parental controls auditing in a computer network
    8.
    发明授权
    System and method for aggregating and extending parental controls auditing in a computer network 有权
    用于在计算机网络中聚合和扩展家长控制审计的系统和方法

    公开(公告)号:US07600019B2

    公开(公告)日:2009-10-06

    申请号:US12108321

    申请日:2008-04-23

    摘要: A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates.

    摘要翻译: 提供了一种用于在非管理计算网络中聚合和扩展家长控制审计的系统和方法。 家长控制系统(包括家长控制数据库,记录接口和审核过程)驻留在非托管计算网络中的每个主机计算设备上,其能够将驻留在主机计算设备之一上的数据与驻留在其他设备上的数据进行同步 在网络中。 父母控制系统有助于父母控制审计信息的记录和报告,允许父母汇总审核信息,以获得他们孩子在家中使用所有计算机的全面审核报告,并且可由应用程序进行扩展和定制 父母控制审计信息来自哪里。

    Feedback-driven malware detector
    9.
    发明申请
    Feedback-driven malware detector 有权
    反馈驱动的恶意软件检测器

    公开(公告)号:US20070038677A1

    公开(公告)日:2007-02-15

    申请号:US11190749

    申请日:2005-07-27

    IPC分类号: G06F17/30

    CPC分类号: G06F21/565

    摘要: Embodiments of a feedback-driven malware detector are directed to protecting a computer from programs that perform actions that are malicious or not expected by a user. In one embodiment, the feedback-driven malware detector performs a method that initially determines whether the state of an application program scheduled to be added to an extensibility point on a computer is already known. If the state of the object is not already known, the user is informed that an application program is being installed on the computer and that the application program is being added to an extensibility point. Then, input is obtained from the user that assists in determining whether the application program is malware.

    摘要翻译: 反馈驱动的恶意软件检测器的实施例旨在保护计算机不执行由用户恶意或不期望的动作的程序。 在一个实施例中,反馈驱动的恶意软件检测器执行一种方法,该方法最初确定计划添加到计算机上的可扩展点的应用程序的状态是否已知。 如果对象的状态尚未知道,则通知用户计算机上正在安装应用程序,并将应用程序添加到可扩展点。 然后,从用户获得有助于确定应用程序是否是恶意软件的输入。