Detecting, capturing and processing valid login credentials
    1.
    发明授权
    Detecting, capturing and processing valid login credentials 有权
    检测,捕获和处理有效的登录凭据

    公开(公告)号:US08479010B2

    公开(公告)日:2013-07-02

    申请号:US12044836

    申请日:2008-03-07

    IPC分类号: G06F21/00

    CPC分类号: G06F21/31 G06F21/45

    摘要: Successful logins are distinguished from unsuccessful logins, and only when a login is successful are the user's login credentials stored and associated with the appropriate login page. Attempts by a user to login to a login page with a set of login credentials are identified. It is determined whether an attempt to login to a given login page with a set of login credentials is successful. If the attempt by the user to login to the login page with the set of login credentials is successful, the set of login credentials can be stored and associated with the login page. If the attempt fails, the credentials are not saved.

    摘要翻译: 成功的登录与登录不成功区分开来,只有当登录成功时,用户的登录凭据才能存储并与适当的登录页相关联。 标识用户尝试登录具有一组登录凭据的登录页面。 确定是否成功登录到具有一组登录凭证的给定登录页面的尝试。 如果用户尝试登录具有登录凭据集的登录页面,则该登录凭证可以存储并与登录页面相关联。 如果尝试失败,则不会保存凭据。

    Parental policy based online wish lists
    2.
    发明授权
    Parental policy based online wish lists 有权
    基于父母政策的在线愿望清单

    公开(公告)号:US08762229B1

    公开(公告)日:2014-06-24

    申请号:US11959439

    申请日:2007-12-18

    IPC分类号: G06Q30/00

    CPC分类号: G06Q30/0633

    摘要: A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children.

    摘要翻译: 强制执行家长政策进行网上购物。 父母输入父母政策,指示禁止孩子使用的项目。 当孩子尝试将项目添加到愿望清单中时,根据策略确定项目是否被允许。 如果是这样,则允许将项目添加到愿望清单中。 如果该政策禁止该项目,该项目添加到愿望清单将被阻止。 此外,父母可以通过(通过电子邮件,电话等)通知尝试将项目添加到愿望清单。 相同的逻辑可以应用于为儿童购买物品的尝试,或尝试购买儿童的物品。

    Method and apparatus for aggregating notices and alerts into an aggregate machine readable feed
    3.
    发明授权
    Method and apparatus for aggregating notices and alerts into an aggregate machine readable feed 有权
    用于将通知和警报聚合到聚合机器可读进给中的方法和装置

    公开(公告)号:US08849922B1

    公开(公告)日:2014-09-30

    申请号:US11864873

    申请日:2007-09-28

    IPC分类号: G06F15/16

    CPC分类号: H04L12/1895 H04L51/16

    摘要: A method and apparatus for aggregating notices and alerts (alerts) into an aggregate machine readable feed wherein the alerts are retrieved from various information sources. One embodiment of the invention is a method and apparatus providing an alert via an aggregate machine readable feed, comprising receiving an alert from various information sources, converting the retrieved alert into an aggregate machine readable format, and placing the aggregate machine readable formatted alert into an aggregate machine readable feed.

    摘要翻译: 一种用于将通知和警报(警报)聚合到聚合机器可读进给中的方法和装置,其中从各种信息源检索警报。 本发明的一个实施例是一种通过聚合机器可读进给提供警报的方法和装置,包括从各种信息源接收警报,将所检索到的警报转换为聚合机器可读格式,以及将集合机器可读格式化警报放入 聚合机器可读进给。

    Systems and methods for determining a file set
    4.
    发明授权
    Systems and methods for determining a file set 有权
    用于确定文件集的系统和方法

    公开(公告)号:US08706745B1

    公开(公告)日:2014-04-22

    申请号:US12130839

    申请日:2008-05-30

    IPC分类号: G06F7/00 G06F17/30

    CPC分类号: G06F21/564

    摘要: A computer-implemented method for determining a file set may include identifying a file set and identifying a key file for the file set. The method may also include transmitting a key-file identifier to a second computing system. A first computing system may receive first and second file identifiers from a second computing system. The first computing system may determine whether the file set comprises a file identified by the first file identifier, and whether the file set comprises a file identified by the second file identifier. The method also includes transmitting a result of the determination to the second computing system. A method for determining a file set on a second computing device is also disclosed. Corresponding systems and computer-readable media are also disclosed.

    摘要翻译: 用于确定文件集的计算机实现的方法可以包括识别文件集并且识别文件集的密钥文件。 该方法还可以包括将密钥文件标识符发送到第二计算系统。 第一计算系统可以从第二计算系统接收第一和第二文件标识符。 第一计算系统可以确定文件集是否包括由第一文件标识符标识的文件,以及文件集是否包括由第二文件标识符标识的文件。 该方法还包括将确定的结果发送给第二计算系统。 还公开了一种用于确定在第二计算设备上的文件集的方法。 还公开了相应的系统和计算机可读介质。

    Referrer context aware target queue prioritization
    5.
    发明授权
    Referrer context aware target queue prioritization 有权
    引用者上下文感知目标队列优先级

    公开(公告)号:US08180761B1

    公开(公告)日:2012-05-15

    申请号:US11965526

    申请日:2007-12-27

    IPC分类号: G06F17/00

    CPC分类号: G06F17/30864

    摘要: A computer, computer program product, and method prioritize a web crawler target link queue using referrer context information associated with a remote object link. An access statistics collection module detects links to remote objects and retrieves referrer context information for the links. An access statistics back end module receives and stores the referrer context information from the access statistics collection module. The referrer context information is analyzed by a target list prioritization module that uses the results of the analysis to prioritize a target queue of a web crawler. The referrer context information is an important resource in identifying information about how a link spreads, e.g., for threat detection or identification of popular links for indexing to produce more relevant search results.

    摘要翻译: 计算机,计算机程序产品和方法使用与远程对象链接相关联的引用者上下文信息来优先考虑网络爬网程序目标链接队列。 访问统计信息收集模块检测到远程对象的链接并检索链接的引用者上下文信息。 访问统计后端模块从访问统计信息收集模块接收并存储引用者上下文信息。 引用者上下文信息由目标列表优先级模块分析,该模块使用分析结果来优化网络爬虫的目标队列。 引用者上下文信息是识别关于链路如何传播的信息的重要资源,例如用于威胁检测或识别用于索引的流行链接以产生更相关的搜索结果。

    Threat emergence date scan optimization to avoid unnecessary loading of scan engines
    6.
    发明授权
    Threat emergence date scan optimization to avoid unnecessary loading of scan engines 有权
    威胁出现日期扫描优化,以避免不必要的加载扫描引擎

    公开(公告)号:US08856921B1

    公开(公告)日:2014-10-07

    申请号:US11864768

    申请日:2007-09-28

    IPC分类号: G06F11/00

    CPC分类号: G06F21/564

    摘要: Threat emergence dates as well as file modification and scanning history are tracked to determine which files need to be scanned for possible infection by various attacking agents. Information concerning which scan engines are used to scan for the presence of different attacking agents is also tracked. Where given files only need to be scanned for a subset of all possible threats and the relevant scanning code resides in only a subset of all the scan engines, only the required scan engines are initialized, loaded or called in order to scan those files.

    摘要翻译: 跟踪威胁出现日期以及文件修改和扫描历史,以确定哪些文件需要被各种攻击代理人可能的感染扫描。 还跟踪了哪些扫描引擎用于扫描不同攻击剂的存在的信息。 在给定文件只需要扫描所有可能的威胁的一个子集的情况下,相关扫描代码仅驻留在所有扫描引擎的一个子集中,只有所需的扫描引擎被初始化,加载或调用才能扫描这些文件。

    Systems and methods for using guardian proximity to control computing activities of children
    7.
    发明授权
    Systems and methods for using guardian proximity to control computing activities of children 有权
    使用监护人接近来控制儿童的计算活动的系统和方法

    公开(公告)号:US08281366B1

    公开(公告)日:2012-10-02

    申请号:US12579093

    申请日:2009-10-14

    IPC分类号: H04L9/32

    摘要: A computer-implemented method for using guardian proximity to control computing activities of children. The method may include determining that a child is attempting to access a computing system and determining whether a guardian of the child is in proximity of the computing system. The method may also include limiting the child's access to one or more resources of the computing system if the guardian of the child is not in proximity of the computing system and permitting the child to access the one or more resources of the computing system if the guardian of the child is in proximity of the computing system.

    摘要翻译: 一种使用监护人接近度来控制儿童计算活动的计算机实现方法。 该方法可以包括确定孩子正在尝试访问计算系统并且确定儿童的监护人是否在计算系统附近。 如果儿童的监护人不在计算系统附近,并允许儿童访问计算系统的一个或多个资源,则该方法还可以包括限制儿童对计算系统的一个或多个资源的访问,如果监护人 的孩子在计算系统附近。

    Systems and methods for using USB device descriptors to identify computing environments
    8.
    发明授权
    Systems and methods for using USB device descriptors to identify computing environments 有权
    使用USB设备描述符识别计算环境的系统和方法

    公开(公告)号:US08281058B1

    公开(公告)日:2012-10-02

    申请号:US12581302

    申请日:2009-10-19

    IPC分类号: G06F13/00

    CPC分类号: G06F13/102 G06F2213/0042

    摘要: An exemplary method for using USB device descriptors to uniquely identify computing environments may include: 1) detecting a set of USB devices connected to a computing device within a computing environment, 2) obtaining a USB device descriptor for each USB device within the set of USB devices, and then 3) creating an environmental signature for the computing environment that identifies the computing environment based at least in part on the USB device descriptors. Exemplary methods for using such environmental signatures to uniquely identify computing environments are also disclosed.

    摘要翻译: 使用USB设备描述符来唯一地识别计算环境的示例性方法可以包括:1)检测连接到计算环境内的计算设备的一组USB设备,2)为该组USB内的每个USB设备获取USB设备描述符 设备,然后3)至少部分地基于USB设备描述符来创建用于识别计算环境的计算环境的环境签名。 还公开了使用这种环境签名来唯一地识别计算环境的示例性方法。

    Process profiling for behavioral anomaly detection
    10.
    发明授权
    Process profiling for behavioral anomaly detection 有权
    行为异常检测的过程分析

    公开(公告)号:US08171545B1

    公开(公告)日:2012-05-01

    申请号:US11674934

    申请日:2007-02-14

    IPC分类号: H04L29/06

    摘要: An anomalous process behavior manager uses statistical information concerning running processes to detect and manage process behavioral anomalies. The anomalous process behavior manager collects per process statistical data over time, such as resource allocation statistics and user interaction statistics. Current collected statistical data is analyzed against corresponding historical statistical data to determine whether processes are behaving in expected ways relative to past performance. Appropriate corrective steps are taken when it is determined that a process is behaving anomalously. For example, the process's blocking exclusions can be revoked, the process can be uninstalled, the process and/or the computer can be scanned for malicious code, the user can be alerted and/or relevant information can be shared with other parties.

    摘要翻译: 异常过程行为管理器使用关于运行过程的统计信息来检测和管理过程行为异常。 异常过程行为管理器随着时间的流逝收集每个过程的统计数据,如资源分配统计和用户交互统计。 根据相应的历史统计数据分析当前收集的统计数据,以确定进程是否以相对于过去绩效的预期方式行事。 当确定进程异常行为时,将采取适当的纠正措施。 例如,可以撤销进程的阻止排除,可以卸载该进程,可以扫描进程和/或计算机的恶意代码,用户可以将其提醒和/或相关信息与其他方共享。