System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check
    2.
    发明授权
    System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check 有权
    用于跟踪对象迁移的系统,方法和计算机程序产品,以确定是否执行基于网络的检查

    公开(公告)号:US08566942B2

    公开(公告)日:2013-10-22

    申请号:US12565541

    申请日:2009-09-23

    IPC分类号: H04L29/06

    CPC分类号: H04L63/20 H04L67/18 H04W4/021

    摘要: A system, method, and computer program product are provided for tracking the migration of objects to determine whether to perform a network based check. In operation, an object is identified. Furthermore, a first security niche associated with the object is determined. Additionally, it is determined if the object is migrating from the first security niche to a second security niche. Still yet, a network based security check is conditionally performed if it is determined the object is migrating from the first security niche to the second security niche.

    摘要翻译: 提供了一种系统,方法和计算机程序产品,用于跟踪对象的迁移以确定是否执行基于网络的检查。 在操作中,识别对象。 此外,确定与对象相关联的第一安全利基。 此外,确定对象是否从第一安全小区迁移到第二安全小区。 然而,如果确定对象正在从第一安全小区迁移到第二安全小区,则有条件地执行基于网络的安全检查。

    System and method for detecting malware by transforming objects and analyzing different views of objects
    5.
    发明授权
    System and method for detecting malware by transforming objects and analyzing different views of objects 有权
    通过转换对象和分析对象的不同视图来检测恶意软件的系统和方法

    公开(公告)号:US08769692B1

    公开(公告)日:2014-07-01

    申请号:US13182641

    申请日:2011-07-14

    IPC分类号: G06F12/14 G06F11/00 G06F12/16

    摘要: A method in one example implementation includes generating a plurality of transformed views of an object in a network environment and generating a plurality of filtered information sets. The method further includes detecting a suspect correlation based on an analysis of at least some of the plurality of transformed views and of at least some of the plurality of filtered information sets. In a more specific embodiment, the analysis includes an original view of the object. Other more specific embodiments include applying filters to selected views of the object, where each of the filters is associated with a different obfuscation type. Applying the filters includes transforming obfuscation elements in the plurality of transformed views, where the object contains the one or more obfuscation elements.

    摘要翻译: 一个示例实现中的方法包括在网络环境中生成对象的多个变换视图并生成多个经滤波的信息集。 该方法还包括基于对多个经变换的视图中的至少一些和多个经过滤的信息集中的至少一些的分析来检测可疑的相关性。 在更具体的实施例中,分析包括对象的原始视图。 其他更具体的实施例包括将滤波器应用于对象的所选视图,其中每个滤波器与不同的混淆类型相关联。 应用过滤器包括在多个变换视图中转换混淆元素,其中对象包含一个或多个混淆元素。

    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING THE MIGRATION OF OBJECTS TO DETERMINE WHETHER TO PERFORM A NETWORK BASED CHECK
    7.
    发明申请
    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING THE MIGRATION OF OBJECTS TO DETERMINE WHETHER TO PERFORM A NETWORK BASED CHECK 有权
    用于跟踪物体移动的系统,方法和计算机程序产品,用于确定是否执行基于网络的检查

    公开(公告)号:US20130246466A1

    公开(公告)日:2013-09-19

    申请号:US12565541

    申请日:2009-09-23

    IPC分类号: G06F17/30 H04L29/06

    CPC分类号: H04L63/20 H04L67/18 H04W4/021

    摘要: A system, method, and computer program product are provided for tracking the migration of objects to determine whether to perform a network based check. In operation, an object is identified. Furthermore, a first security niche associated with the object is determined. Additionally, it is determined if the object is migrating from the first security niche to a second security niche. Still yet, a network based security check is conditionally performed if it is determined the object is migrating from the first security niche to the second security niche.

    摘要翻译: 提供了一种系统,方法和计算机程序产品,用于跟踪对象的迁移,以确定是否执行基于网络的检查。 在操作中,识别对象。 此外,确定与对象相关联的第一安全利基。 此外,确定对象是否从第一安全小区迁移到第二安全小区。 然而,如果确定对象正在从第一安全小区迁移到第二安全小区,则有条件地执行基于网络的安全检查。

    System and method for facilitating IPv6 protocol usage by an application program
    8.
    发明授权
    System and method for facilitating IPv6 protocol usage by an application program 失效
    用于促进应用程序使用IPv6协议的系统和方法

    公开(公告)号:US07440471B1

    公开(公告)日:2008-10-21

    申请号:US10124955

    申请日:2002-04-17

    IPC分类号: H04J3/16

    摘要: A system, method and computer program product are provided for translating between Internet Protocols (IP's). Initially, data is received over the Internet utilizing a first IP. Such data is adapted for being processed by an application program. Next, it is determined whether the application program can process data received over the Internet utilizing the first IP. If it is determined that the application program can not process data received over the Internet utilizing the first IP, the data is converted from the first IP to a second IP that the application program is capable of processing.

    摘要翻译: 提供了一种用于在互联网协议(IP)之间进行翻译的系统,方法和计算机程序产品。 最初,通过互联网使用第一IP接收数据。 这样的数据适于由应用程序处理。 接下来,确定应用程序是否可以处理利用第一IP在因特网上接收的数据。 如果确定应用程序不能使用第一IP来处理通过因特网接收的数据,则将数据从第一IP转换为应用程序能够处理的第二IP。

    Virtual opened share mode system with virus protection
    10.
    发明授权
    Virtual opened share mode system with virus protection 有权
    具有病毒防护功能的虚拟共享模式系统

    公开(公告)号:US07000250B1

    公开(公告)日:2006-02-14

    申请号:US09916606

    申请日:2001-07-26

    IPC分类号: G06F11/00 G06F11/32

    CPC分类号: G06F21/566

    摘要: A system, method and computer program product are provided for protecting a computer in an opened share mode. Initially, a computer is run on a network in an opened share mode. In operation, attempts to access the computer by applications are monitored. Further, it is determined whether the applications attempt to modify the computer. A security event is then executed in response to any attempt to modify the computer.

    摘要翻译: 提供了一种用于以打开的共享模式保护计算机的系统,方法和计算机程序产品。 最初,计算机以打开的共享模式在网络上运行。 在操作中,监视通过应用访问计算机的尝试。 此外,确定应用程序是否尝试修改计算机。 然后执行安全事件以响应任何修改计算机的尝试。