Method and system for tracking machines on a network using fuzzy GUID technology
    1.
    发明授权
    Method and system for tracking machines on a network using fuzzy GUID technology 有权
    使用模糊GUID技术在网络上跟踪机器的方法和系统

    公开(公告)号:US08141148B2

    公开(公告)日:2012-03-20

    申请号:US11550395

    申请日:2006-10-17

    IPC分类号: H04L29/06

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method and system for tracking machines on a network using fuzzy guid technology
    2.
    发明授权
    Method and system for tracking machines on a network using fuzzy guid technology 有权
    使用模糊指导技术在网络上跟踪机器的方法和系统

    公开(公告)号:US08782783B2

    公开(公告)日:2014-07-15

    申请号:US13372480

    申请日:2012-02-13

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method for tracking machines on a network using multivariable fingerprinting of passively available information
    3.
    发明授权
    Method for tracking machines on a network using multivariable fingerprinting of passively available information 有权
    使用被动信息的多变量指纹识别网络上的机器的方法

    公开(公告)号:US08176178B2

    公开(公告)日:2012-05-08

    申请号:US12022022

    申请日:2008-01-29

    IPC分类号: G06F15/173

    摘要: A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.

    摘要翻译: 一种在计算机网络上跟踪机器的方法。 该方法包括确定要由耦合到计算机网络的第一网站监视的一个或多个断言。 该方法监视通过计算机网络流向网站的流量,并从耦合到计算机网络的流量中识别一个或多个断言,以确定耦合到计算机网络的恶意主机。 该方法包括将第一IP地址和第一硬件指纹关联到恶意主机的断言,并将与恶意主机相关联的信息存储在数据库的一个或多个存储器中。 该方法还包括从第二网站识别未知主机,使用未知主机确定第二IP地址和第二硬件指纹,以及确定未知主机是否是恶意主机。

    METHOD FOR TRACKING MACHINES ON A NETWORK USING MULTIVARIABLE FINGERPRINTING OF PASSIVELY AVAILABLE INFORMATION
    4.
    发明申请
    METHOD FOR TRACKING MACHINES ON A NETWORK USING MULTIVARIABLE FINGERPRINTING OF PASSIVELY AVAILABLE INFORMATION 有权
    使用多项可触摸信息获取信息的网络跟踪网络的方法

    公开(公告)号:US20080244744A1

    公开(公告)日:2008-10-02

    申请号:US12022022

    申请日:2008-01-29

    IPC分类号: G06F21/00

    摘要: A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.

    摘要翻译: 一种在计算机网络上跟踪机器的方法。 该方法包括确定要由耦合到计算机网络的第一网站监视的一个或多个断言。 该方法监视通过计算机网络流向网站的流量,并从耦合到计算机网络的流量中识别一个或多个断言,以确定耦合到计算机网络的恶意主机。 该方法包括将第一IP地址和第一硬件指纹关联到恶意主机的断言,并将与恶意主机相关联的信息存储在数据库的一个或多个存储器中。 该方法还包括从第二网站识别未知主机,使用未知主机确定第二IP地址和第二硬件指纹,以及确定未知主机是否是恶意主机。

    Method and system for processing a stream of information from a computer network using node based reputation characteristics
    5.
    发明授权
    Method and system for processing a stream of information from a computer network using node based reputation characteristics 有权
    用于使用基于节点的信誉特征来处理来自计算机网络的信息流的方法和系统

    公开(公告)号:US08763113B2

    公开(公告)日:2014-06-24

    申请号:US11550393

    申请日:2006-10-17

    摘要: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.

    摘要翻译: 用于处理来自各种提交者(例如法医来源)的信息的方法。 该方法包括从多个从1到N编号的提交者从提交者接收关于一个或多个节点的信息。在特定实施例中,一个或多个节点分别与全球计算机网络上的一个或多个IP地址相关联 。 该方法包括基于知识库识别提交者的提交者信誉,并至少基于提交者的信誉和提交者提交的信息来关联节点的节点信誉。 该方法还传输节点信誉。

    METHOD AND SYSTEM FOR TRACKING MACHINES ON A NETWORK USING FUZZY GUID TECHNOLOGY
    6.
    发明申请
    METHOD AND SYSTEM FOR TRACKING MACHINES ON A NETWORK USING FUZZY GUID TECHNOLOGY 有权
    使用FUZZY GUID技术在网络上跟踪机器的方法和系统

    公开(公告)号:US20130055388A1

    公开(公告)日:2013-02-28

    申请号:US13372480

    申请日:2012-02-13

    IPC分类号: G06F21/00

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method and System for Processing a Stream of Information From a Computer Network Using Node Based Reputation Characteristics
    7.
    发明申请
    Method and System for Processing a Stream of Information From a Computer Network Using Node Based Reputation Characteristics 有权
    使用基于节点的声誉特征从计算机网络处理信息流的方法和系统

    公开(公告)号:US20070214151A1

    公开(公告)日:2007-09-13

    申请号:US11550393

    申请日:2006-10-17

    IPC分类号: G06F17/30

    摘要: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.

    摘要翻译: 用于处理来自各种提交者(例如法医来源)的信息的方法。 该方法包括从多个从1到N编号的提交者从提交者接收关于一个或多个节点的信息。在特定实施例中,一个或多个节点分别与全球计算机网络上的一个或多个IP地址相关联 。 该方法包括基于知识库识别提交者的提交者信誉,并至少基于提交者的信誉和提交者提交的信息来关联节点的节点信誉。 该方法还传输节点信誉。

    Inflatable protective container for bottles and the like
    9.
    发明授权
    Inflatable protective container for bottles and the like 失效
    用于瓶子的充气保护容器等

    公开(公告)号:US5833069A

    公开(公告)日:1998-11-10

    申请号:US696653

    申请日:1996-08-14

    申请人: David G. Jones

    发明人: David G. Jones

    IPC分类号: B65D81/03 B65D81/05 B65D1/02

    摘要: An inflatable container for housing fragile articles, such as bottles and the like, for protecting the enclosed article from breakage during shipping or transit. The container comprises a generally cylindrical inflatable housing shaped to conform to a specific bottle shape and having an inflation device for enabling user inflation. The housing has an open bottom end for receiving a bottle type article therein. An inflatable base is sized for mating engagement with said bottom end thereby covering said opening. A fastening apparatus is provided for securing the base to the housing, and a seal is provided between said housing bottom and said base thereby forming a hermetic seal for preventing escape of any solid, liquid, or vapor contents enclosed within the housing in the event of breakage.

    摘要翻译: 用于容纳诸如瓶子等脆弱物品的可充气容器,用于在运输或运输过程中保护封闭物品免于破损。 该容器包括大致圆柱形的可充气壳体,其成形为符合特定的瓶子形状并且具有用于使用户充气的充气装置。 壳体具有敞开的底端,用于在其中接收瓶型制品。 可充气基座的尺寸适于与所述底端配合接合,从而覆盖所述开口。 提供一种紧固装置,用于将基座固定到壳体上,并且在所述壳体底部和所述基座之间设置密封件,从而形成气密密封件,用于防止在壳体内封闭的任何固体,液体或蒸气内容物逸出, 破损。