Method, system and computer program product for comparing or measuring information content in at least one data stream
    1.
    发明申请
    Method, system and computer program product for comparing or measuring information content in at least one data stream 有权
    用于在至少一个数据流中比较或测量信息内容的方法,系统和计算机程序产品

    公开(公告)号:US20090287734A1

    公开(公告)日:2009-11-19

    申请号:US12454616

    申请日:2009-05-19

    申请人: Kevin R. Borders

    发明人: Kevin R. Borders

    IPC分类号: G06F17/30

    摘要: Method, system and computer program product for comparing or measuring information content in at least one data stream including one or more data segments is provided. In at least one embodiment of the invention, information leak capacity in network traffic is quantified. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—one goal of the method, system and computer program product is to measure and constrain its maximum volume. Most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, one can isolate and quantify true information flowing from a computer. Measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing are provided. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.

    摘要翻译: 提供了用于在包括一个或多个数据段的至少一个数据流中比较或测量信息内容的方法,系统和计算机程序产品。 在本发明的至少一个实施例中,量化网络业务中的信息泄漏容量。 检测敏感数据的存在,而不是一般情况下的一个不可能的任务 - 方法的一个目标,系统和计算机程序产品是测量和限制其最大容量。 大多数网络流量由外部信息重复或确定,如协议规范或服务器发送的消息。 通过过滤这些数据,可以隔离和量化从计算机流出的真实信息。 提供了用于网页浏览的主要协议的超文本传输​​协议(HTTP)的测量算法。 当应用于真实的网页浏览流量时,算法能够打折98.5%的测量字节,有效隔离信息泄漏。

    Method, system and computer program product for creating shape collages
    2.
    发明授权
    Method, system and computer program product for creating shape collages 有权
    用于创建形状拼贴的方法,系统和计算机程序产品

    公开(公告)号:US08976198B2

    公开(公告)日:2015-03-10

    申请号:US12909452

    申请日:2010-10-21

    CPC分类号: G06T11/60

    摘要: A method, system and computer program product for creating shape collages are provided. The method includes receiving a shape specification signal which specifies at least one desired shape having an area. The method further includes receiving image data which represents a plurality of images. The method still further includes processing the shape specification signal and the image data to obtain a shape collage of the images at least partially covering the area of the at least one desired shape. The step of processing may include the steps of at least partially covering the at least one desired shape with at least one shape primitive and placing at least one image over the at least one shape primitive to at least partially fill the at least one shape primitive. The method may further include receiving a command signal to either locate a user-specified image essentially or approximately at a desired location in the shape collage or resize the user-specified image from an initial size in the initial collage to a desired size. The method may still further include processing the command signal and the shape collage to create a finished shape collage having either the user-specified image essentially or approximately at the desired location or the user-specified image with the desired size to increase visual appeal of the finished shape collage to the user.

    摘要翻译: 提供了一种用于创建形状拼贴的方法,系统和计算机程序产品。 该方法包括接收指定至少一个具有区域的期望形状的形状指定信号。 该方法还包括接收表示多个图像的图像数据。 该方法还包括处理形状指定信号和图像数据以获得至少部分地覆盖至少一个期望形状的区域的图像的形状拼贴。 处理步骤可以包括以至少一个形状原语至少部分地覆盖至少一个期望形状的步骤,并且将至少一个图像放置在至少一个形状基元上,以至少部分地填充至少一个形状原语。 该方法可以进一步包括接收命令信号以将用户指定的图像基本上或近似地定位在拼贴画中的期望位置或将用户指定的图像从初始拼贴中的初始大小调整到期望的大小。 该方法还可以进一步包括处理命令信号和形状拼贴以创建具有用户指定的图像基本上或近似于所需位置的完成形状拼贴或者具有期望尺寸的用户指定图像以增加视觉吸引力 完成形状拼贴给用户。

    Method, system and computer program product for comparing or measuring information content in at least one data stream

    公开(公告)号:US08515918B2

    公开(公告)日:2013-08-20

    申请号:US12454616

    申请日:2009-05-19

    申请人: Kevin R. Borders

    发明人: Kevin R. Borders

    IPC分类号: G06F17/30

    摘要: Method, system and computer program product for comparing or measuring information content in at least one data stream including one or more data segments is provided. In at least one embodiment of the invention, information leak capacity in network traffic is quantified. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—one goal of the method, system and computer program product is to measure and constrain its maximum volume. Most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, one can isolate and quantify true information flowing from a computer. Measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing are provided. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.

    Method, system and computer program product for detecting at least one of security threats and undesirable computer files
    4.
    发明申请
    Method, system and computer program product for detecting at least one of security threats and undesirable computer files 有权
    用于检测安全威胁和不期望的计算机文件中的至少一个的方法,系统和计算机程序产品

    公开(公告)号:US20090158430A1

    公开(公告)日:2009-06-18

    申请号:US12317056

    申请日:2008-12-18

    申请人: Kevin R. Borders

    发明人: Kevin R. Borders

    IPC分类号: G06F21/00

    摘要: Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files.

    摘要翻译: 提供了用于检测安全威胁和不期望的计算机文件中的至少一个的方法,系统和计算机程序产品。 第一种方法包括从第一计算机进程接收表示出站的应用层消息的数据流至少一个第二计算机进程。 计算机进程在一个或多个计算机上实现。 该方法还包括监视数据流以基于具有包含元数据的条目的白名单来检测安全威胁。 白名单基于一组启发式描述合法的应用层消息。 该方法还包括如果检测到安全威胁则产生信号。 第二种方法包括将一组计算机文件与表示所有合法计算机文件的白名单进行比较。 白名单包含一个或多个条目。 每个条目描述多个合法的计算机文件。

    Method, system and computer program product for detecting at least one of security threats and undesirable computer files

    公开(公告)号:US09055093B2

    公开(公告)日:2015-06-09

    申请号:US12317056

    申请日:2008-12-18

    申请人: Kevin R. Borders

    发明人: Kevin R. Borders

    IPC分类号: H04L29/06 G06F21/55 G06F21/57

    摘要: Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files.

    Method, system and computer program product for detecting security threats in a computer network
    6.
    发明授权
    Method, system and computer program product for detecting security threats in a computer network 有权
    用于检测计算机网络中的安全威胁的方法,系统和计算机程序产品

    公开(公告)号:US08079080B2

    公开(公告)日:2011-12-13

    申请号:US11255835

    申请日:2005-10-21

    申请人: Kevin R. Borders

    发明人: Kevin R. Borders

    IPC分类号: G06F11/00

    摘要: A method, system and computer program product detect attempts to send significant amounts of information out via HTTP tunnels to rogue Web servers from within an otherwise firewalled network. A related goal is to help detect spyware programs. Filters, based on the analysis of HTTP traffic over a training period, help detect anomalies in outbound HTTP traffic using metrics such as request regularity, bandwidth usage, inter-request delay time, and transaction size.

    摘要翻译: 方法,系统和计算机程序产品检测尝试通过HTTP隧道发送大量信息,以从另一个防火墙网络中流氓Web服务器。 相关目标是帮助检测间谍程序。 过滤器基于在训练期间对HTTP流量的分析,可以使用诸如请求规则性,带宽使用,请求间延迟时间和事务大小等度量来检测出站HTTP流量中的异常。

    METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR CREATING SHAPE COLLAGES
    7.
    发明申请
    METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR CREATING SHAPE COLLAGES 有权
    用于创建形状的方法,系统和计算机程序产品

    公开(公告)号:US20110096075A1

    公开(公告)日:2011-04-28

    申请号:US12909452

    申请日:2010-10-21

    IPC分类号: G06T11/20

    CPC分类号: G06T11/60

    摘要: A method, system and computer program product for creating shape collages are provided. The method includes receiving a shape specification signal which specifies at least one desired shape having an area. The method further includes receiving image data which represents a plurality of images. The method still further includes processing the shape specification signal and the image data to obtain a shape collage of the images at least partially covering the area of the at least one desired shape. The step of processing may include the steps of at least partially covering the at least one desired shape with at least one shape primitive and placing at least one image over the at least one shape primitive to at least partially fill the at least one shape primitive. The method may further include receiving a command signal to either locate a user-specified image essentially or approximately at a desired location in the shape collage or resize the user-specified image from an initial size in the initial collage to a desired size. The method may still further include processing the command signal and the shape collage to create a finished shape collage having either the user-specified image essentially or approximately at the desired location or the user-specified image with the desired size to increase visual appeal of the finished shape collage to the user.

    摘要翻译: 提供了一种用于创建形状拼贴的方法,系统和计算机程序产品。 该方法包括接收指定至少一个具有区域的期望形状的形状指定信号。 该方法还包括接收表示多个图像的图像数据。 该方法还包括处理形状指定信号和图像数据以获得至少部分地覆盖至少一个期望形状的区域的图像的形状拼贴。 处理步骤可以包括以至少一个形状原语至少部分地覆盖至少一个期望形状的步骤,并且将至少一个图像放置在至少一个形状基元上,以至少部分地填充至少一个形状原语。 该方法可以进一步包括接收命令信号以将用户指定的图像基本上或近似地定位在拼贴画中的期望位置或将用户指定的图像从初始拼贴中的初始大小调整到期望的大小。 该方法还可以进一步包括处理命令信号和形状拼贴以创建具有用户指定的图像基本上或近似于所需位置的完成形状拼贴或者具有期望尺寸的用户指定图像以增加视觉吸引力 完成形状拼贴给用户。