Method and system for identifying and blocking spam email messages at an inspecting point
    1.
    发明申请
    Method and system for identifying and blocking spam email messages at an inspecting point 审中-公开
    在检查点识别和阻止垃圾邮件信息的方法和系统

    公开(公告)号:US20060075048A1

    公开(公告)日:2006-04-06

    申请号:US11004942

    申请日:2004-12-07

    IPC分类号: G06F15/16

    CPC分类号: H04L51/12

    摘要: In one aspect, the present invention is directed to a method for identifying and blocking spam email messages at an inspecting point, the method comprises the steps of: measuring the flow rate of email messages sent from an originator through the inspecting point; and if the measured flow rate exceeds a given threshold, email messages transmitted from the originator are classified as spam and/or the originator is classified as a spammer. In another aspect, the present invention is directed to a system for identifying and blocking spam email messages at an inspecting point, the system comprising: a spam detector, for classifying an email message as spam-suspected; a flow rate calculator, for calculating a flow rate of spam-suspected email messages that have reached the inspecting point; a spam indicator, for classifying spam-suspected email messages as spam by their flow rate and a threshold thereof.

    摘要翻译: 一方面,本发明涉及一种用于在检查点识别和阻止垃圾电子邮件消息的方法,所述方法包括以下步骤:测量从发起者通过检查点发送的电子邮件的流量; 并且如果测量的流量超过给定的阈值,则从始发者发送的电子邮件被分类为垃圾邮件和/或发起者被分类为垃圾邮件发送者。 在另一方面,本发明涉及一种用于在检查点识别和阻止垃圾邮件消息的系统,该系统包括:垃圾邮件检测器,用于将电子邮件消息分类为垃圾邮件疑似; 流量计算器,用于计算到达检查点的垃圾信息可疑电子邮件的流量; 垃圾邮件指示器,用于将垃圾邮件疑似的电子邮件消息作为垃圾邮件分类为其流量和阈值。

    Method for speeding up the pass time of an executable through a checkpoint
    2.
    发明申请
    Method for speeding up the pass time of an executable through a checkpoint 审中-公开
    通过检查点加快可执行文件通过时间的方法

    公开(公告)号:US20050149720A1

    公开(公告)日:2005-07-07

    申请号:US10751986

    申请日:2004-01-07

    IPC分类号: H04L9/00 H04L29/06

    摘要: A method for speeding up the pass time of an executable (an HTML file, a script file, a web page, an EXE file, an email message, and so forth) through a checkpoint (e.g. a gateway) in which the integrity of said executable is being tested, said method comprising: receiving and accumulating the parts of said executable that reach to said checkpoint; testing the integrity of the accumulated parts; releasing and sending the accumulated parts that have been indicated as harmless to their destination in an accelerated manner; releasing and sending the accumulated parts that have not been indicated as harmless or malicious to their destination in a moderate manner; and upon indicating the maliciousness of said accumulated parts, performing an alert procedure. According to a preferred embodiment of the invention, receiving and/or sending data is carried out at the lower levels of the OSI model, especially at the Network level.

    摘要翻译: 一种用于通过检查点(例如网关)来加速可执行文件的通过时间(HTML文件,脚本文件,网页,EXE文件,电子邮件消息等)的方法,其中所述 正在测试可执行程序,所述方法包括:接收并累积到达所述检查点的所述可执行程序的部分; 测试累积零件的完整性; 以加速的方式发放已经被指定为无害的累积部分; 将没有被指示为无害或恶意的累积部分以适度的方式发送到目的地; 并且在指示所述累积部分的恶意时,执行警报过程。 根据本发明的优选实施例,在OSI模型的较低级别,特别是在网络级别,执行接收和/或发送数据。

    Method and system for detecting blocking and removing spyware
    3.
    发明授权
    Method and system for detecting blocking and removing spyware 有权
    检测阻塞和清除间谍软件的方法和系统

    公开(公告)号:US07636943B2

    公开(公告)日:2009-12-22

    申请号:US11150172

    申请日:2005-06-13

    IPC分类号: G06F11/00

    摘要: In one aspect, the present invention is directed to a method for detecting spyware activity, the method comprises the steps of: monitoring outgoing communication data sent from a user's computer; searching for predefined keywords within the communication data; indicating spyware activity in the user's computer by presence of at least one of the predefined keywords within the communication data, the keywords are selected from a group comprising: a signature of the spyware, personal information of the user, an addressee to where the communication data is sent. The method may further comprise: upon detecting a spyware activity in the user's computer, blocking communication from the computer. The method may further comprise removing the spyware. The blocking can be carried out at the user's computer, at the gateway to which the user's computer is connected, etc.

    摘要翻译: 一方面,本发明涉及一种用于检测间谍软件活动的方法,所述方法包括以下步骤:监视从用户计算机发送的传出通信数据; 在通信数据中搜索预定义的关键字; 通过存在通信数据中的至少一个预定义关键字来指示用户计算机中的间谍软件活动,所述关键词从包括以下的组中选择:间谍软件的签名,用户的个人信息,通信数据的位置的收件人 已发送。 该方法还可以包括:在检测到用户计算机中的间谍软件活动时,阻止来自计算机的通信。 该方法还可以包括移除间谍软件。 阻塞可以在用户的​​计算机,用户的计算机连接的网关等上进行。

    Load-Balancing Bridge Cluster For Network Nodes
    4.
    发明申请
    Load-Balancing Bridge Cluster For Network Nodes 审中-公开
    网络节点的负载平衡网桥集群

    公开(公告)号:US20080259797A1

    公开(公告)日:2008-10-23

    申请号:US11736604

    申请日:2007-04-18

    IPC分类号: H04J1/16

    摘要: A network load-balancing cluster configured to function as a transparent bridge, by connecting the load-balancing nodes in series rather than in parallel, as is done in prior-art configurations. A load-balancing algorithm and method are disclosed, by which each node in the configuration independently determines whether to process a data packet or pass the data packet along for processing by another node. To support this, load-balancing nodes are equipped with both software and hardware data pass-through capabilities that allow the nodes to pass along data packets that are processed by a different nodes.

    摘要翻译: 网络负载平衡集群配置为充当透明网桥,通过连接负载均衡节点而不是并行连接,如现有技术配置中所做的那样。 公开了一种负载平衡算法和方法,通过该负载平衡算法和方法,配置中的每个节点独立地确定是处理数据分组还是通过数据分组以供另一个节点处理。 为了支持这一点,负载平衡节点配备了软件和硬件数据传递能力,允许节点传递由不同节点处理的数据包。

    Method and system for detecting blocking and removing spyware

    公开(公告)号:US20060282890A1

    公开(公告)日:2006-12-14

    申请号:US11150172

    申请日:2005-06-13

    IPC分类号: G06F12/14

    摘要: In one aspect, the present invention is directed to a method for detecting spyware activity, the method comprises the steps of: monitoring outgoing communication data sent from a user's computer; searching for predefined keywords within the communication data; indicating spyware activity in the user's computer by presence of at least one of the predefined keywords within the communication data, the keywords are selected from a group comprising: a signature of the spyware, personal information of the user, an addressee to where the communication data is sent. The method may further comprise: upon detecting a spyware activity in the user's computer, blocking communication from the computer. The method may further comprise removing the spyware. The blocking can be carried out at the user's computer, at the gateway to which the user's computer is connected, etc.

    Method and system for controlling access to a service provided through a network
    6.
    发明申请
    Method and system for controlling access to a service provided through a network 审中-公开
    用于控制通过网络提供的服务的访问的方法和系统

    公开(公告)号:US20060190990A1

    公开(公告)日:2006-08-24

    申请号:US11062820

    申请日:2005-02-23

    IPC分类号: H04L9/32

    摘要: The present invention is directed to a method for controlling access of a user to a service provided through a network, and a system thereof. The method comprising the steps of: upon initiating a connection of the user to the network, authenticating the user; upon positively authenticating the user, creating or updating a cookie within the workstation of the user, the cookie comprising information related to access permission of the user to the service; upon requesting to access the service by the user, retrieving the information from the cookie by a gateway to the network, and enforcing the access permission on the user.

    摘要翻译: 本发明涉及一种用于控制用户对通过网络提供的服务的访问的方法及其系统。 该方法包括以下步骤:在发起用户到网络的连接时,认证用户; 在对用户进行肯定认证,在用户的工作站内创建或更新cookie时,该cookie包括与用户对该服务的访问许可有关的信息; 在请求由用户访问服务时,通过网关从网络检索该cookie的信息,以及强制对用户的访问权限。

    Method and system for indicating an executable as trojan horse
    7.
    发明授权
    Method and system for indicating an executable as trojan horse 失效
    用于将可执行文件指示为特洛伊木马的方法和系统

    公开(公告)号:US07603614B2

    公开(公告)日:2009-10-13

    申请号:US10436047

    申请日:2003-05-13

    IPC分类号: G11C29/00

    CPC分类号: G06F11/1004 G11C2029/0411

    摘要: A method and system for indicating an executable as Trojan Horse, based on the CRC values of the routines of an executable. The method comprising a preliminary stage in which the CRC values of the routines of known Trojan Horses are gathered in a database, and a stage in which indicating an executable as Trojan Horse is carried out by the correspondence of the CRC values of the routines of said executable to the CRC values of the known Trojan Horses, as gathered in said database. The system comprising means for calculating the CRC values of routines; means for identifying the borders of the routines of an executable; a database system, for storing the CRC values of routines of known Trojan Horses; and means for determining the correspondence between two groups of CRC values, thereby enabling detection of the correspondence of an executable to at least one known Trojan Horse.

    摘要翻译: 基于可执行程序的例程的CRC值来指示作为特洛伊木马的可执行程序的方法和系统。 所述方法包括初步阶段,其中已知特洛伊木马的例程的CRC值被收集在数据库中,并且其中指示作为特洛伊木马的可执行文件的阶段通过所述的所述程序的CRC值的对应来执行 可执行到已知的特洛伊木马的CRC值,如在所述数据库中收集的。 该系统包括用于计算例程的CRC值的装置; 用于识别可执行程序的例程的边界的装置; 数据库系统,用于存储已知特洛伊木马的例程的CRC值; 以及用于确定两组CRC值之间的对应关系的装置,由此能够检测可执行程序与至少一个已知特洛伊木马的对应关系。

    USB key apparatus for interacting with a USB host via a USB port
    8.
    发明授权
    USB key apparatus for interacting with a USB host via a USB port 有权
    USB钥匙装置,用于通过USB端口与USB主机进行交互

    公开(公告)号:US06763399B2

    公开(公告)日:2004-07-13

    申请号:US10126520

    申请日:2002-04-22

    IPC分类号: G06F100

    摘要: A smart card—host system that operates without the intermediation of a smart card reader. The smart card—host system comprises a host, which has a USB interface, and a portable device, which provides smart card function(s). The portable device has a smart card chip for performing the smart card function(s); a USB interface for connecting the portable device with the host via USB protocol; and a microprocessor for controlling the transfer of data between the USB interface and the smart card chip, for converting data from a USB format to the format of the smart card chip and for converting data from the format of the smart card chip to a USB format.

    摘要翻译: 智能卡主机系统,无需智能卡读卡器即可运行。 智能卡主机系统包括具有USB接口的主机和提供智能卡功能的便携式设备。 便携式设备具有用于执行智能卡功能的智能卡芯片; 用于通过USB协议将便携式设备与主机连接的USB接口; 以及用于控制USB接口和智能卡芯片之间的数据传输的微处理器,用于将数据从USB格式转换为智能卡芯片的格式,并将数据从智能卡芯片的格式转换为USB格式 。

    Cable apparatus
    9.
    发明授权
    Cable apparatus 有权
    电缆设备

    公开(公告)号:US06554621B1

    公开(公告)日:2003-04-29

    申请号:US09616669

    申请日:2000-07-14

    IPC分类号: H01R1360

    CPC分类号: H01R13/60 H01R13/72

    摘要: This invention discloses a cable apparatus for use in conjunction with a computer system having a first socket disposed in the rear thereof in order to accommodate at least one cable without occupying a workspace of a user of the computer system, and a frequently disconnected peripheral unit which includes a second socket via which a peripheral unit is frequently connected to the computer system and frequently disconnected therefrom, the cable apparatus including a cable, at a first end of the cable, a third socket mating with the first socket, and at a second end of the cable, the cable includes a fourth socket mating with the second socket and a cable end adherent operative to attach the second end of the cable to a user-selected surface within the workspace.

    摘要翻译: 本发明公开了一种与计算机系统一起使用的电缆设备,该计算机系统具有设置在其后部的第一插座,以便容纳至少一根电缆,而不占用计算机系统的用户的工作空间,以及频繁断开的外围单元, 包括第二插座,周边单元通过该第二插座频繁地连接到计算机系统并且经常与计算机系统断开连接,所述电缆设备包括电缆,在电缆的第一端处具有与第一插座配合的第三插座,并且在第二插座 电缆包括与第二插座配合的第四插座和电缆端附着件,其可操作以将电缆的第二端连接到工作空间内的用户选择的表面。

    User-computer interaction method for use by a population of flexible connectable computer systems
    10.
    发明授权
    User-computer interaction method for use by a population of flexible connectable computer systems 有权
    用户 - 计算机交互方法供大量灵活可连接计算机系统使用

    公开(公告)号:US07249266B2

    公开(公告)日:2007-07-24

    申请号:US10837664

    申请日:2004-05-04

    IPC分类号: G06F1/24

    摘要: A user-computer interaction method for use by a population of flexibly connectible computer systems and a population of mobile users, the method comprising storing information characterizing each mobile user on an FCCS plug to be borne by that mobile user; and accepting the FCCS plug from the mobile user for connection to one of the flexibly connectible computer systems and employing the information characterizing the mobile user to perform at least one computer operation.

    摘要翻译: 一种用户计算机交互方法,用于由灵活可连接的计算机系统群体和移动用户群体使用,该方法包括将表征每个移动用户的信息存储在由该移动用户承载的FCCS插件上; 以及从所述移动用户接受所述FCCS插头以连接到所述灵活可连接的计算机系统之一并且使用表征所述移动用户的所述信息来执行至少一个计算机操作。