EARLY DETECTION OF POTENTIAL MALWARE
    3.
    发明申请
    EARLY DETECTION OF POTENTIAL MALWARE 有权
    早期检测潜在恶意软件

    公开(公告)号:US20110252476A1

    公开(公告)日:2011-10-13

    申请号:US12757018

    申请日:2010-04-08

    IPC分类号: G06F21/00 G06F17/30 G06F11/30

    CPC分类号: G06F21/552

    摘要: Evidence of attempted malware attacks may be used to identify the location and nature of future attacks. A failed attack may cause a program to crash. Crash data may be sent to an analyzer for analysis. The analysis may reveal information such as the identity of the program that is being exploited, the specific way in which the program is being exploited, and the identity or location of the source of the attack. This information may be used to identify potential sources of attack and to identify the same type of attack from other sources. When the source and/or nature of an attempted attack is known, remedial action may be taken. Filters may warn users who are attempting to visit sites from which attacks have been attempted, and the makers of programs that are being exploited can be notified so that those program makers can release updates.

    摘要翻译: 可能使用恶意软件攻击的证据来识别未来攻击的位置和性质。 失败的攻击可能导致程序崩溃。 碰撞数据可能会发送到分析仪进行分析。 分析可能会显示诸如被利用的程序的身份,程序被利用的具体方式以及攻击源的身份或位置等信息。 该信息可用于识别潜在的攻击源,并识别来自其​​他来源的相同类型的攻击。 当企图袭击的来源和/或性质已知时,可采取补救措施。 过滤器可能会提示尝试访问已尝试攻击的站点的用户,并且可以通知正在被利用的程序的制造商,以便这些程序制造商可以发布更新。

    Early detection of potential malware
    4.
    发明授权
    Early detection of potential malware 有权
    早期发现潜在的恶意软件

    公开(公告)号:US08627475B2

    公开(公告)日:2014-01-07

    申请号:US12757018

    申请日:2010-04-08

    IPC分类号: G06F11/00

    CPC分类号: G06F21/552

    摘要: Evidence of attempted malware attacks may be used to identify the location and nature of future attacks. A failed attack may cause a program to crash. Crash data may be sent to an analyzer for analysis. The analysis may reveal information such as the identity of the program that is being exploited, the specific way in which the program is being exploited, and the identity or location of the source of the attack. This information may be used to identify potential sources of attack and to identify the same type of attack from other sources. When the source and/or nature of an attempted attack is known, remedial action may be taken. Filters may warn users who are attempting to visit sites from which attacks have been attempted, and the makers of programs that are being exploited can be notified so that those program makers can release updates.

    摘要翻译: 可能使用恶意软件攻击的证据来识别未来攻击的位置和性质。 失败的攻击可能导致程序崩溃。 碰撞数据可能会发送到分析仪进行分析。 分析可能会显示诸如被利用的程序的身份,程序被利用的具体方式以及攻击源的身份或位置等信息。 该信息可用于识别潜在的攻击源,并识别来自其​​他来源的相同类型的攻击。 当企图袭击的来源和/或性质已知时,可采取补救措施。 过滤器可能会提示尝试访问已尝试攻击的站点的用户,并且可以通知正在被利用的程序的制造商,以便这些程序制造商可以发布更新。

    Reputation-Based Safe Access User Experience
    5.
    发明申请
    Reputation-Based Safe Access User Experience 有权
    基于声望的安全访问用户体验

    公开(公告)号:US20120047461A1

    公开(公告)日:2012-02-23

    申请号:US12859679

    申请日:2010-08-19

    IPC分类号: G06F3/048 G06F15/173

    摘要: Reputation-based resource lookup may include determining the reputation of resources that are to be accessed. Based on the reputation of the resource, a user experience is provided. Protection can be provided from known and suspicious resources, by providing warnings, such as unique graphical visual warnings and textual messages. Furthermore, additional information may be provided as to the desired resource. A user may be further required to go through several pages or asked various questions before accessing a resource.

    摘要翻译: 基于信誉的资源查找可以包括确定要访问的资源的信誉。 基于资源的声誉,提供用户体验。 可以通过提供警告,例如独特的图形视觉警告和文本消息,从已知和可疑资源提供保护。 此外,可以提供关于所需资源的附加信息。 在访问资源之前,用户可能还需要经过几页或者询问各种问题。