Feature Based Data Management
    1.
    发明申请
    Feature Based Data Management 有权
    基于特征的数据管理

    公开(公告)号:US20100023519A1

    公开(公告)日:2010-01-28

    申请号:US12178783

    申请日:2008-07-24

    IPC分类号: G06F17/30

    CPC分类号: H04L63/10 G06F9/466 G06F9/52

    摘要: Methods, systems, and apparatus, including computer program products, for data structure locking. In one aspect, a proper subset of variables of a set of variables in a data structure are received. An access privilege to modify variables in the data structure to administrator accounts is assigned. A first administrator access request to modify a variable in the proper subset of variables is received, and the access privilege to modify the variable in the proper subset of variables for the first administrator account. A second administrator access request to modify the variable in the proper subset of variables is received, and an access timer that expires after a time period is initiated; the access privilege is disabled for the first administrator account in response to expiration of the access timer; and the access privilege for the second administrator account is enabled in response to expiration of the access timer.

    摘要翻译: 方法,系统和设备,包括用于数据结构锁定的计算机程序产品。 在一个方面,接收数据结构中的一组变量的适当的变量子集。 分配将数据结构中的变量修改为管理员帐户的访问权限。 接收到修改变量子集中的变量的第一个管理员访问请求,以及修改第一个管理员帐户变量子集中的变量的访问权限。 接收到修改变量的正确子集中的变量的第二管理员访问请求,并且启动了一段时间后到期的访问定时器; 第一个管理员帐户的访问权限被禁用以响应访问定时器的到期; 并且响应于访问定时器的到期,启用第二管理员帐户的访问权限。

    Feature based data management
    2.
    发明授权
    Feature based data management 有权
    基于特征的数据管理

    公开(公告)号:US07921089B2

    公开(公告)日:2011-04-05

    申请号:US12178783

    申请日:2008-07-24

    IPC分类号: G06F17/30

    CPC分类号: H04L63/10 G06F9/466 G06F9/52

    摘要: Methods, systems, and apparatus, including computer program products, for data structure locking. In one aspect, a proper subset of variables of a set of variables in a data structure are received. An access privilege to modify variables in the data structure to administrator accounts is assigned. A first administrator access request to modify a variable in the proper subset of variables is received, and the access privilege to modify the variable in the proper subset of variables for the first administrator account. A second administrator access request to modify the variable in the proper subset of variables is received, and an access timer that expires after a time period is initiated; the access privilege is disabled for the first administrator account in response to expiration of the access timer; and the access privilege for the second administrator account is enabled in response to expiration of the access timer.

    摘要翻译: 方法,系统和设备,包括用于数据结构锁定的计算机程序产品。 在一个方面,接收数据结构中的一组变量的适当的变量子集。 分配将数据结构中的变量修改为管理员帐户的访问权限。 接收到修改变量子集中的变量的第一个管理员访问请求,以及修改第一个管理员帐户变量子集中的变量的访问权限。 接收到修改变量的正确子集中的变量的第二管理员访问请求,并且启动了一段时间后到期的访问定时器; 第一个管理员帐户的访问权限被禁用以响应访问定时器的到期; 并且响应于访问定时器的到期,启用第二管理员帐户的访问权限。

    Systems and methods for generating, managing, and displaying alarms for wireless network monitoring
    4.
    发明申请
    Systems and methods for generating, managing, and displaying alarms for wireless network monitoring 有权
    用于生成,管理和显示无线网络监控报警的系统和方法

    公开(公告)号:US20080209517A1

    公开(公告)日:2008-08-28

    申请号:US11711371

    申请日:2007-02-27

    IPC分类号: H04L9/32

    摘要: The present disclosure is directed to systems and methods for generating, managing, and displaying alarms associated with monitoring a wireless network. Advantageously, the present disclosure provides one alarm per security event, and the ability to see an event in context over time and aggregate information. This results in a significant reduction in alarm volume for wireless monitoring which increases manageability and reduces storage requirements. Further, this provides better security by avoiding the “needle in the haystack” problem where you see few actionable alarms rather than being flooded by multiple copies of the same event over time. Finally, the present disclosure provides improved system scalability with large deployments by managing alarms through lesser alarm volume, and through visual representation.

    摘要翻译: 本公开涉及用于生成,管理和显示与监视无线网络相关联的警报的系统和方法。 有利地,本公开提供每个安全事件一个警报,以及在上下文中随时间查看事件和聚合信息的能力。 这导致无线监控的报警量显着降低,从而提高了可管理性并降低了存储要求。 此外,这通过避免“针对干草堆”的问题提供了更好的安全性,您可以看到几个可操作的警报,而不是随着时间的推移同时发生同一事件的多个副本。 最后,本公开通过在较小的报警量和通过视觉表示来管理报警,通过大型部署来提供改进的系统可扩展性。

    Systems and methods for generating, managing, and displaying alarms for wireless network monitoring
    5.
    发明授权
    Systems and methods for generating, managing, and displaying alarms for wireless network monitoring 有权
    用于生成,管理和显示无线网络监控报警的系统和方法

    公开(公告)号:US08205244B2

    公开(公告)日:2012-06-19

    申请号:US11711371

    申请日:2007-02-27

    IPC分类号: H04L9/32

    摘要: The present disclosure is directed to systems and methods for generating, managing, and displaying alarms associated with monitoring a wireless network. Advantageously, the present disclosure provides one alarm per security event, and the ability to see an event in context over time and aggregate information. This results in a significant reduction in alarm volume for wireless monitoring which increases manageability and reduces storage requirements. Further, this provides better security by avoiding the “needle in the haystack” problem where you see few actionable alarms rather than being flooded by multiple copies of the same event over time. Finally, the present disclosure provides improved system scalability with large deployments by managing alarms through lesser alarm volume, and through visual representation.

    摘要翻译: 本公开涉及用于生成,管理和显示与监视无线网络相关联的警报的系统和方法。 有利地,本公开提供每个安全事件一个警报,以及在上下文中随时间查看事件和聚合信息的能力。 这导致无线监控的报警量显着降低,从而提高了可管理性并降低了存储要求。 此外,这通过避免“针对干草堆”的问题提供了更好的安全性,您可以看到几个可操作的警报,而不是随着时间的推移同时发生同一事件的多个副本。 最后,本公开通过在较小的报警量和通过视觉表示来管理报警,提供了大型部署的改进的系统可扩展性。

    Cloud based inspection of secure content avoiding man-in-the-middle attacks
    9.
    发明授权
    Cloud based inspection of secure content avoiding man-in-the-middle attacks 有权
    基于云的检查安全内容,避免中间人攻击

    公开(公告)号:US08869259B1

    公开(公告)日:2014-10-21

    申请号:US13111753

    申请日:2011-05-19

    IPC分类号: H04L29/06

    摘要: A cloud based system that facilitates inspection of secure content and inexpensively detects the presence of a Man-in-the-Middle attack in a client-server communication is disclosed. Through inspection of the server certificate, no Man-in-the-Middle attack between server and the system is ensured; through inspection and designation of the client certificate, absence of a Man-in-the-Middle attack between the cloud based system and the client is ensured. In this way, the cloud based system can perform its usual policy enforcement functions with respect to secure content while avoiding Man-in-the-Middle attacks.

    摘要翻译: 公开了一种基于云的系统,其便于检查安全内容并且廉价地检测客户端 - 服务器通信中的中间人攻击的存在。 通过检查服务器证书,确保服务器与系统之间无中间人的攻击; 通过检查和指定客户端证书,确保了基于云的系统和客户端之间的中间人中的攻击。 以这种方式,基于云的系统可以在安全内容方面执行其通常的策略执行功能,同时避免中间人攻击。

    Content inspection using partial content signatures
    10.
    发明授权
    Content inspection using partial content signatures 有权
    内容检查使用部分内容签名

    公开(公告)号:US08607066B1

    公开(公告)日:2013-12-10

    申请号:US12185539

    申请日:2008-08-04

    IPC分类号: G06F11/30 G06F12/14

    摘要: Systems, methods and apparatus for a content item inspection. A plurality of portions of a content item are received in a buffer, the buffer divided into a plurality of segments. A partial signature of the content item is computed using the received portions of the content item in a most recently received segment and a partial signature computed for a preceding segment. The computed partial signature is compared against a plurality of partial signatures associated with trustworthy content items. If a matching partial signature associated with a trustworthy content item is found for the computed partial signature, the most recently received segment is allowed to be transmitted to a device that requested the content item.

    摘要翻译: 用于内容项目检查的系统,方法和装置。 内容项目的多个部分被接收在缓冲器中,缓冲器被分成多个段。 使用最近接收到的段中的内容项的接收部分和针对前一段计算的部分签名来计算内容项的部分签名。 将所计算的部分签名与与可信赖内容项相关联的多个部分签名进行比较。 如果针对所计算的部分签名找到与可信任内容项目相关联的匹配部分签名,则允许最近接收到的片段被发送到请求内容项目的设备。