Distributed system and method for conducting a comprehensive search for malicious code in software
    1.
    发明授权
    Distributed system and method for conducting a comprehensive search for malicious code in software 有权
    分布式系统和方法,用于全面搜索软件中的恶意代码

    公开(公告)号:US06963978B1

    公开(公告)日:2005-11-08

    申请号:US09916981

    申请日:2001-07-26

    IPC分类号: G06F11/07 G06F21/00

    CPC分类号: G06F21/564

    摘要: A system, method and computer program product are provided for detecting viruses in software. Initially, data is compared with a plurality of virus definitions in a first database. If the data is successfully compared with at least one of the virus definitions, a security event is executed. The data is then compared with fingerprints of innocent data in a second database. If the data is successfully compared to the fingerprints of innocent data, access to the data is permitted. If, however, the data is unsuccessfully compared to the virus definitions and the fingerprints of innocent data, information is transmitted over a network for analysis purposes.

    摘要翻译: 提供了一种用于以软件检测病毒的系统,方法和计算机程序产品。 最初,将数据与第一数据库中的多个病毒定义进行比较。 如果数据与至少一个病毒定义成功比较,则执行安全事件。 然后将数据与第二数据库中的无辜数据的指纹进行比较。 如果数据与无辜数据的指纹成功比较,则允许访问数据。 然而,如果数据与病毒定义和无害数据的指纹不成比例,则通过网络传输信息用于分析目的。

    System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check
    2.
    发明授权
    System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check 有权
    用于跟踪对象迁移的系统,方法和计算机程序产品,以确定是否执行基于网络的检查

    公开(公告)号:US08566942B2

    公开(公告)日:2013-10-22

    申请号:US12565541

    申请日:2009-09-23

    IPC分类号: H04L29/06

    CPC分类号: H04L63/20 H04L67/18 H04W4/021

    摘要: A system, method, and computer program product are provided for tracking the migration of objects to determine whether to perform a network based check. In operation, an object is identified. Furthermore, a first security niche associated with the object is determined. Additionally, it is determined if the object is migrating from the first security niche to a second security niche. Still yet, a network based security check is conditionally performed if it is determined the object is migrating from the first security niche to the second security niche.

    摘要翻译: 提供了一种系统,方法和计算机程序产品,用于跟踪对象的迁移以确定是否执行基于网络的检查。 在操作中,识别对象。 此外,确定与对象相关联的第一安全利基。 此外,确定对象是否从第一安全小区迁移到第二安全小区。 然而,如果确定对象正在从第一安全小区迁移到第二安全小区,则有条件地执行基于网络的安全检查。

    System and method for detecting malware by transforming objects and analyzing different views of objects
    5.
    发明授权
    System and method for detecting malware by transforming objects and analyzing different views of objects 有权
    通过转换对象和分析对象的不同视图来检测恶意软件的系统和方法

    公开(公告)号:US08769692B1

    公开(公告)日:2014-07-01

    申请号:US13182641

    申请日:2011-07-14

    IPC分类号: G06F12/14 G06F11/00 G06F12/16

    摘要: A method in one example implementation includes generating a plurality of transformed views of an object in a network environment and generating a plurality of filtered information sets. The method further includes detecting a suspect correlation based on an analysis of at least some of the plurality of transformed views and of at least some of the plurality of filtered information sets. In a more specific embodiment, the analysis includes an original view of the object. Other more specific embodiments include applying filters to selected views of the object, where each of the filters is associated with a different obfuscation type. Applying the filters includes transforming obfuscation elements in the plurality of transformed views, where the object contains the one or more obfuscation elements.

    摘要翻译: 一个示例实现中的方法包括在网络环境中生成对象的多个变换视图并生成多个经滤波的信息集。 该方法还包括基于对多个经变换的视图中的至少一些和多个经过滤的信息集中的至少一些的分析来检测可疑的相关性。 在更具体的实施例中,分析包括对象的原始视图。 其他更具体的实施例包括将滤波器应用于对象的所选视图,其中每个滤波器与不同的混淆类型相关联。 应用过滤器包括在多个变换视图中转换混淆元素,其中对象包含一个或多个混淆元素。

    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING THE MIGRATION OF OBJECTS TO DETERMINE WHETHER TO PERFORM A NETWORK BASED CHECK
    7.
    发明申请
    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING THE MIGRATION OF OBJECTS TO DETERMINE WHETHER TO PERFORM A NETWORK BASED CHECK 有权
    用于跟踪物体移动的系统,方法和计算机程序产品,用于确定是否执行基于网络的检查

    公开(公告)号:US20130246466A1

    公开(公告)日:2013-09-19

    申请号:US12565541

    申请日:2009-09-23

    IPC分类号: G06F17/30 H04L29/06

    CPC分类号: H04L63/20 H04L67/18 H04W4/021

    摘要: A system, method, and computer program product are provided for tracking the migration of objects to determine whether to perform a network based check. In operation, an object is identified. Furthermore, a first security niche associated with the object is determined. Additionally, it is determined if the object is migrating from the first security niche to a second security niche. Still yet, a network based security check is conditionally performed if it is determined the object is migrating from the first security niche to the second security niche.

    摘要翻译: 提供了一种系统,方法和计算机程序产品,用于跟踪对象的迁移,以确定是否执行基于网络的检查。 在操作中,识别对象。 此外,确定与对象相关联的第一安全利基。 此外,确定对象是否从第一安全小区迁移到第二安全小区。 然而,如果确定对象正在从第一安全小区迁移到第二安全小区,则有条件地执行基于网络的安全检查。

    System and method for facilitating IPv6 protocol usage by an application program
    8.
    发明授权
    System and method for facilitating IPv6 protocol usage by an application program 失效
    用于促进应用程序使用IPv6协议的系统和方法

    公开(公告)号:US07440471B1

    公开(公告)日:2008-10-21

    申请号:US10124955

    申请日:2002-04-17

    IPC分类号: H04J3/16

    摘要: A system, method and computer program product are provided for translating between Internet Protocols (IP's). Initially, data is received over the Internet utilizing a first IP. Such data is adapted for being processed by an application program. Next, it is determined whether the application program can process data received over the Internet utilizing the first IP. If it is determined that the application program can not process data received over the Internet utilizing the first IP, the data is converted from the first IP to a second IP that the application program is capable of processing.

    摘要翻译: 提供了一种用于在互联网协议(IP)之间进行翻译的系统,方法和计算机程序产品。 最初,通过互联网使用第一IP接收数据。 这样的数据适于由应用程序处理。 接下来,确定应用程序是否可以处理利用第一IP在因特网上接收的数据。 如果确定应用程序不能使用第一IP来处理通过因特网接收的数据,则将数据从第一IP转换为应用程序能够处理的第二IP。