Method for tracking machines on a network using multivariable fingerprinting of passively available information
    1.
    发明授权
    Method for tracking machines on a network using multivariable fingerprinting of passively available information 有权
    使用被动信息的多变量指纹识别网络上的机器的方法

    公开(公告)号:US09332020B2

    公开(公告)日:2016-05-03

    申请号:US13442857

    申请日:2012-04-10

    IPC分类号: G06F15/173 H04L29/06

    摘要: A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.

    摘要翻译: 用于在计算机网络上跟踪机器的方法包括确定要由耦合到计算机网络的第一网站监视的一个或多个断言。 该方法监视通过计算机网络流向网站的流量,并从耦合到计算机网络的流量中识别一个或多个断言,以确定耦合到计算机网络的恶意主机。 该方法包括将第一IP地址和第一硬件指纹关联到恶意主机的断言,并将与恶意主机相关联的信息存储在数据库的一个或多个存储器中。 该方法还包括从第二网站识别未知主机,使用未知主机确定第二IP地址和第二硬件指纹,以及确定未知主机是否是恶意主机。

    Method and system for tracking machines on a network using fuzzy GUID technology
    2.
    发明授权
    Method and system for tracking machines on a network using fuzzy GUID technology 有权
    使用模糊GUID技术在网络上跟踪机器的方法和系统

    公开(公告)号:US08141148B2

    公开(公告)日:2012-03-20

    申请号:US11550395

    申请日:2006-10-17

    IPC分类号: H04L29/06

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method and system for tracking machines on a network using fuzzy guid technology
    3.
    发明授权
    Method and system for tracking machines on a network using fuzzy guid technology 有权
    使用模糊指导技术在网络上跟踪机器的方法和系统

    公开(公告)号:US08782783B2

    公开(公告)日:2014-07-15

    申请号:US13372480

    申请日:2012-02-13

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method for tracking machines on a network using multivariable fingerprinting of passively available information
    4.
    发明授权
    Method for tracking machines on a network using multivariable fingerprinting of passively available information 有权
    使用被动信息的多变量指纹识别网络上的机器的方法

    公开(公告)号:US08176178B2

    公开(公告)日:2012-05-08

    申请号:US12022022

    申请日:2008-01-29

    IPC分类号: G06F15/173

    摘要: A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.

    摘要翻译: 一种在计算机网络上跟踪机器的方法。 该方法包括确定要由耦合到计算机网络的第一网站监视的一个或多个断言。 该方法监视通过计算机网络流向网站的流量,并从耦合到计算机网络的流量中识别一个或多个断言,以确定耦合到计算机网络的恶意主机。 该方法包括将第一IP地址和第一硬件指纹关联到恶意主机的断言,并将与恶意主机相关联的信息存储在数据库的一个或多个存储器中。 该方法还包括从第二网站识别未知主机,使用未知主机确定第二IP地址和第二硬件指纹,以及确定未知主机是否是恶意主机。

    Method and system for processing a stream of information from a computer network using node based reputation characteristics
    5.
    发明授权
    Method and system for processing a stream of information from a computer network using node based reputation characteristics 有权
    用于使用基于节点的信誉特征来处理来自计算机网络的信息流的方法和系统

    公开(公告)号:US08763113B2

    公开(公告)日:2014-06-24

    申请号:US11550393

    申请日:2006-10-17

    摘要: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.

    摘要翻译: 用于处理来自各种提交者(例如法医来源)的信息的方法。 该方法包括从多个从1到N编号的提交者从提交者接收关于一个或多个节点的信息。在特定实施例中,一个或多个节点分别与全球计算机网络上的一个或多个IP地址相关联 。 该方法包括基于知识库识别提交者的提交者信誉,并至少基于提交者的信誉和提交者提交的信息来关联节点的节点信誉。 该方法还传输节点信誉。

    METHOD AND SYSTEM FOR TRACKING MACHINES ON A NETWORK USING FUZZY GUID TECHNOLOGY
    6.
    发明申请
    METHOD AND SYSTEM FOR TRACKING MACHINES ON A NETWORK USING FUZZY GUID TECHNOLOGY 有权
    使用FUZZY GUID技术在网络上跟踪机器的方法和系统

    公开(公告)号:US20130055388A1

    公开(公告)日:2013-02-28

    申请号:US13372480

    申请日:2012-02-13

    IPC分类号: G06F21/00

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method and System for Processing a Stream of Information From a Computer Network Using Node Based Reputation Characteristics
    7.
    发明申请
    Method and System for Processing a Stream of Information From a Computer Network Using Node Based Reputation Characteristics 有权
    使用基于节点的声誉特征从计算机网络处理信息流的方法和系统

    公开(公告)号:US20070214151A1

    公开(公告)日:2007-09-13

    申请号:US11550393

    申请日:2006-10-17

    IPC分类号: G06F17/30

    摘要: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.

    摘要翻译: 用于处理来自各种提交者(例如法医来源)的信息的方法。 该方法包括从多个从1到N编号的提交者从提交者接收关于一个或多个节点的信息。在特定实施例中,一个或多个节点分别与全球计算机网络上的一个或多个IP地址相关联 。 该方法包括基于知识库识别提交者的提交者信誉,并至少基于提交者的信誉和提交者提交的信息来关联节点的节点信誉。 该方法还传输节点信誉。

    Dental care device
    8.
    发明授权
    Dental care device 有权
    牙科护理装置

    公开(公告)号:US08714165B2

    公开(公告)日:2014-05-06

    申请号:US12803595

    申请日:2010-06-29

    申请人: Scott Thomas

    发明人: Scott Thomas

    IPC分类号: A61C15/00 A45D44/18

    摘要: A dental care device utilizing a shaft having a proximal end portion, a distal end portion, and an intermediate portion there between. A dental brush is located on the shaft at the distal end while a wishbone support is found on the proximal end of the shaft. The wishbone support includes a gripping post and a groove which allows dental floss to extend from the post, along its outer surface, and to span the end legs of the wishbone for use.

    摘要翻译: 一种使用具有近端部分,远端部分和其间的中间部分的轴的牙科护理装置。 牙刷位于远端的轴上,而在轴的近端处发现叉骨支撑。 叉骨支撑件包括夹持柱和凹槽,其允许牙线从柱体沿着其外表面延伸并且跨越叉骨的端部腿以使用。

    SYSTEM, METHODS, AND COMPOSITIONS FOR ATTACHING PANELING TO A BUILDING SURFACE
    10.
    发明申请
    SYSTEM, METHODS, AND COMPOSITIONS FOR ATTACHING PANELING TO A BUILDING SURFACE 有权
    用于将面板连接到建筑物表面的系统,方法和组合物

    公开(公告)号:US20100269438A1

    公开(公告)日:2010-10-28

    申请号:US12830139

    申请日:2010-07-02

    IPC分类号: E04C2/38 E04B1/70 E04B1/38

    CPC分类号: E04F13/185 E04F2201/028

    摘要: The present disclosure concerns a system, methods and compositions for attaching architectural panels to a building surface, such as a wall. In certain embodiments, the system comprises panels, each with upper, lower and side interlocking members. In a preferred embodiment, the upper and lower interlocking members form a modified tongue and groove joint, with a 45 degree angle interface, while the side interlocking members form a ship lap joint. The upper and lower interlocking members may be designed to press the panels against the building surface and to hide the locations of screws or other attachment devices when the interlocking members are engaged. The system provides a stronger and more secure attachment of panels to a building surface, while eliminating the problem of having to disguise the location of the attachment devices where such devices are inserted directly through the surface of the panel.

    摘要翻译: 本公开涉及将建筑面板附接到建筑物表面(例如墙壁)的系统,方法和组合物。 在某些实施例中,系统包括面板,每个面板具有上部,下部和侧面互锁构件。 在优选实施例中,上下互锁构件形成具有45度角界面的改进的舌槽沟接头,而侧互锁构件形成船搭接头。 上互锁构件和下互锁构件可以被设计成当联锁构件接合时将面板压靠在建筑物表面上并隐藏螺钉或其他附接装置的位置。 该系统提供了更坚固和更安全的附接到建筑物表面的面板,同时消除了必须伪装附接装置的位置的问题,其中这些装置直接插入通过面板的表面。