Graduated Enforcement of Restrictions According to an Application's Reputation
    1.
    发明申请
    Graduated Enforcement of Restrictions According to an Application's Reputation 有权
    根据应用程序的声誉进行限制执行

    公开(公告)号:US20100077445A1

    公开(公告)日:2010-03-25

    申请号:US12238300

    申请日:2008-09-25

    IPC分类号: G06F17/00

    摘要: Security software on a client observes a request for a resource from an application on the client and then determines the application's reputation. The application's reputation may be measured by a reputation score obtained from a remote reputation server. The security software determines an access policy from a graduated set of possible access policies for the application based on the application's reputation. The security software applies the access policy to the application's request for the resource. In this way, the reputation-based system uses a graduated trust scale and a policy enforcement mechanism that restricts or grants application functionality for resource interactivity along a graduated scale.

    摘要翻译: 客户端的安全软件从客户端上的应用程序观察资源的请求,然后确定应用程序的声誉。 应用程序的声誉可以通过从远程信誉服务器获得的信誉评分来衡量。 安全软件根据应用程序的声誉从应用程序的可能访问策略的分级集确定访问策略。 安全软件将访问策略应用于应用程序对资源的请求。 以这种方式,基于信誉的系统使用分级信任量表和策略执行机制,其限制或授予沿着分级的资源交互性的应用功能。

    Distributed platform for testing filtering rules
    2.
    发明授权
    Distributed platform for testing filtering rules 失效
    用于测试过滤规则的分布式平台

    公开(公告)号:US07685271B1

    公开(公告)日:2010-03-23

    申请号:US11278104

    申请日:2006-03-30

    摘要: A distributed testing platform tests network traffic filtering rules. A control point receives a network traffic filtering rule and test parameters describing how to test the rule. The control point distributes the rule and parameters to a plurality of testing nodes. The testing nodes are located on a network at locations where they receive a variety of different network traffic. The testing nodes test the rule against traffic received by the nodes according to the test parameters. The traffic can include real-time traffic and corpora of traffic designed to test different types of rules. The testing nodes return test results describing the testing to the control point. The control point analyzes the test results to determine the accuracy and performance of the rule.

    摘要翻译: 分布式测试平台测试网络流量过滤规则。 控制点接收网络流量过滤规则和描述如何测试规则的测试参数。 控制点将规则和参数分配给多个测试节点。 测试节点位于网络上,在它们接收各种不同网络流量的位置。 测试节点根据测试参数对节点接收到的流量进行测试。 流量可以包括实时流量和流量语料库,用于测试不同类型的规则。 测试节点将描述测试的测试结果返回到控制点。 控制点分析测试结果,以确定规则的准确性和性能。

    Graduated enforcement of restrictions according to an application's reputation
    3.
    发明授权
    Graduated enforcement of restrictions according to an application's reputation 有权
    根据应用程序的声誉逐步实施限制

    公开(公告)号:US09495538B2

    公开(公告)日:2016-11-15

    申请号:US12238300

    申请日:2008-09-25

    IPC分类号: G06F17/00 G06F21/52

    摘要: Security software on a client observes a request for a resource from an application on the client and then determines the application's reputation. The application's reputation may be measured by a reputation score obtained from a remote reputation server. The security software determines an access policy from a graduated set of possible access policies for the application based on the application's reputation. The security software applies the access policy to the application's request for the resource. In this way, the reputation-based system uses a graduated trust scale and a policy enforcement mechanism that restricts or grants application functionality for resource interactivity along a graduated scale.

    摘要翻译: 客户端的安全软件从客户端上的应用程序观察资源的请求,然后确定应用程序的声誉。 应用程序的声誉可以通过从远程信誉服务器获得的信誉评分来衡量。 安全软件根据应用程序的声誉从应用程序的可能访问策略的分级集确定访问策略。 安全软件将访问策略应用于应用程序对资源的请求。 以这种方式,基于信誉的系统使用分级信任量表和策略执行机制,其限制或授予沿着分级的资源交互性的应用功能。

    Mobile application sampling for performance and network behavior profiling

    公开(公告)号:US09734037B1

    公开(公告)日:2017-08-15

    申请号:US12560328

    申请日:2009-09-15

    IPC分类号: G06F9/44 G06F11/34

    摘要: Applications on a mobile device are sampled for detecting applications causing performance problems on the device. The method includes periodically logging performance information for a mobile device suspected to be having performance problems. The method further includes periodically logging identifying information about multiple applications on the mobile device. The method also includes periodically providing to a security server the logged performance information for the mobile device and the logged identifying information about the applications. In addition, the method includes, in response to a request from the security server for more information about one of the applications, providing a copy of the application to the security server for analysis of the impact by the application on performance of the mobile device. The method can further include receiving from the security server an indication that the application for which the copy was provided is causing a performance problem on the mobile device.

    Virtual machine file system restriction system and method
    5.
    发明授权
    Virtual machine file system restriction system and method 有权
    虚拟机文件系统限制系统及方法

    公开(公告)号:US09450960B1

    公开(公告)日:2016-09-20

    申请号:US12265157

    申请日:2008-11-05

    IPC分类号: H04L29/06

    摘要: A method includes creating a virtual machine including a remote file system, a file system service, and a security application. Access to the remote file system is restricted with the security application upon an unknown malicious code outbreak. The more that is known about the threat, the more precise are the restrictions placed upon the file system thus reducing the impact on users of the file system to an absolute minimum.

    摘要翻译: 一种方法包括创建包括远程文件系统,文件系统服务和安全应用程序的虚拟机。 在未知的恶意代码爆发时,访问远程文件系统受到安全应用程序的限制。 对威胁的了解越多,对文件系统的限制越准确,从而将对文件系统的用户的影响降到绝对最小。

    Method and apparatus for aggregating notices and alerts into an aggregate machine readable feed
    6.
    发明授权
    Method and apparatus for aggregating notices and alerts into an aggregate machine readable feed 有权
    用于将通知和警报聚合到聚合机器可读进给中的方法和装置

    公开(公告)号:US08849922B1

    公开(公告)日:2014-09-30

    申请号:US11864873

    申请日:2007-09-28

    IPC分类号: G06F15/16

    CPC分类号: H04L12/1895 H04L51/16

    摘要: A method and apparatus for aggregating notices and alerts (alerts) into an aggregate machine readable feed wherein the alerts are retrieved from various information sources. One embodiment of the invention is a method and apparatus providing an alert via an aggregate machine readable feed, comprising receiving an alert from various information sources, converting the retrieved alert into an aggregate machine readable format, and placing the aggregate machine readable formatted alert into an aggregate machine readable feed.

    摘要翻译: 一种用于将通知和警报(警报)聚合到聚合机器可读进给中的方法和装置,其中从各种信息源检索警报。 本发明的一个实施例是一种通过聚合机器可读进给提供警报的方法和装置,包括从各种信息源接收警报,将所检索到的警报转换为聚合机器可读格式,以及将集合机器可读格式化警报放入 聚合机器可读进给。

    Using expectation measures to identify relevant application analysis results
    7.
    发明授权
    Using expectation measures to identify relevant application analysis results 有权
    使用期望措施确定相关应用分析结果

    公开(公告)号:US08806644B1

    公开(公告)日:2014-08-12

    申请号:US13481715

    申请日:2012-05-25

    IPC分类号: G06F21/00 H04L29/06

    CPC分类号: H04L63/1416

    摘要: An application is analyzed, thereby detecting behaviors of the application. Data indicative of the functionality of the application is mined from a plurality of sources. The application is categorized based on the mined data. The categorization of the application indicates expected application behaviors. Multiple categories can be assigned to the application, wherein each assigned category correlates with at least one expected application behavior. Measures of consistency between the detected behaviors of the application and the expected behaviors of the application are determined. Determining the measures of consistency comprises quantifying differences between detected behaviors of the application and expected behaviors of the application. Responsive to the determined measures of consistency, it is adjudicated whether the application is suspect of being malicious.

    摘要翻译: 分析应用程序,从而检测应用程序的行为。 表示应用程序的功能的数据是从多个来源开采的。 应用程序根据开采的数据进行分类。 应用程序的分类表明预期的应用行为。 可以将多个类别分配给应用,其中每个分配的类别与至少一个预期的应用行为相关。 确定应用程序检测到的行为与应用程序的预期行为之间的一致性度量。 确定一致性的措施包括量化应用程序的检测行为与应用程序的预期行为之间的差异。 针对确定的一致性措施,判定应用程序是否被怀疑是恶意的。

    Parental policy based online wish lists
    8.
    发明授权
    Parental policy based online wish lists 有权
    基于父母政策的在线愿望清单

    公开(公告)号:US08762229B1

    公开(公告)日:2014-06-24

    申请号:US11959439

    申请日:2007-12-18

    IPC分类号: G06Q30/00

    CPC分类号: G06Q30/0633

    摘要: A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children.

    摘要翻译: 强制执行家长政策进行网上购物。 父母输入父母政策,指示禁止孩子使用的项目。 当孩子尝试将项目添加到愿望清单中时,根据策略确定项目是否被允许。 如果是这样,则允许将项目添加到愿望清单中。 如果该政策禁止该项目,该项目添加到愿望清单将被阻止。 此外,父母可以通过(通过电子邮件,电话等)通知尝试将项目添加到愿望清单。 相同的逻辑可以应用于为儿童购买物品的尝试,或尝试购买儿童的物品。

    Systems and methods for determining a file set
    9.
    发明授权
    Systems and methods for determining a file set 有权
    用于确定文件集的系统和方法

    公开(公告)号:US08706745B1

    公开(公告)日:2014-04-22

    申请号:US12130839

    申请日:2008-05-30

    IPC分类号: G06F7/00 G06F17/30

    CPC分类号: G06F21/564

    摘要: A computer-implemented method for determining a file set may include identifying a file set and identifying a key file for the file set. The method may also include transmitting a key-file identifier to a second computing system. A first computing system may receive first and second file identifiers from a second computing system. The first computing system may determine whether the file set comprises a file identified by the first file identifier, and whether the file set comprises a file identified by the second file identifier. The method also includes transmitting a result of the determination to the second computing system. A method for determining a file set on a second computing device is also disclosed. Corresponding systems and computer-readable media are also disclosed.

    摘要翻译: 用于确定文件集的计算机实现的方法可以包括识别文件集并且识别文件集的密钥文件。 该方法还可以包括将密钥文件标识符发送到第二计算系统。 第一计算系统可以从第二计算系统接收第一和第二文件标识符。 第一计算系统可以确定文件集是否包括由第一文件标识符标识的文件,以及文件集是否包括由第二文件标识符标识的文件。 该方法还包括将确定的结果发送给第二计算系统。 还公开了一种用于确定在第二计算设备上的文件集的方法。 还公开了相应的系统和计算机可读介质。

    Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests
    10.
    发明授权
    Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests 有权
    启用主机和多个客户端之间的配置元素的选择性策略驱动的传播

    公开(公告)号:US08578006B2

    公开(公告)日:2013-11-05

    申请号:US13074850

    申请日:2011-03-29

    IPC分类号: G06F15/173

    CPC分类号: G06F9/44505

    摘要: Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.

    摘要翻译: 基于策略,配置元素在主机和多个客户端之间选择性地传播。 监控主机和客户端的配置元素。 检测到对受监视的配置元素进行的更改。 根据策略确定是否在操作系统环境之间传播已更改的配置元素。 响应于诸如源的身份和/或分类或类型,属性,内容和/或身份的因素,可以确定将更改的配置元素从源传播到一个或多个目的地 的更改的配置元素。 检测到新客人的创建。 作为响应,来自至少一个源的至少一个配置元素被自动传播到新创建的访客。