摘要:
The present invention provides a system, method, and computer-readable medium for identifying malware that is loaded in the memory of a computing device. Software routines implemented by the present invention track the state of pages loaded in memory using page table access bits available from a central processing unit. A page in memory may be in a state that is “unsafe” or potentially infected with malware. In this instance, the present invention calls a scan engine to search a page for malware before information on the page is executed.
摘要:
In one embodiment, script patterns for identifying particular network viruses are written using a scripting language. The scripting language may allow for flow control, arithmetic, memory manipulation, and content matching operations, for example. Each script pattern may identify a particular network virus using a set of instructions supported by the scripting language. Among other advantages, the use of script patterns allows antivirus analysts to develop more flexible and effective patterns for dealing with current and future network threats.
摘要:
In one embodiment, the present invention includes a method to initiate updating of a second portion of a system if a value indicates that the system is in a trusted state. In such an embodiment, a first portion of the system may validate updated code before the second portion of the system is updated. In one such embodiment, the first portion may be an applications portion and the second portion may be a communications portion of a wireless device.
摘要:
The present invention is used to monitor a user specified set of files for successful attempts to change the content. Templates are used to monitor user specified directories (with exclusion rules) for successful attempts to change the content or the addition/deletion of files.
摘要:
A log management system is devised to easily discover improper handling log information by managers. Virtual operation systems (OS) are respectively installed for respective users in a file server constructed as an NAS device. These virtual OS function as virtual NAS. The virtual OS and manager OS exchange information relating to log information via an information exchange part constructed as a kernel. The log information produced in the virtual OS is transmitted to a first log management device via a first communications network, and is also transmitted to a second log management device via a second communications network separated from the first communications network. As a result of the same log information being managed by multiplex management using separate management devices, the system detects whether or not there has been any improper handling of the log information.
摘要:
A communication network is operated by detecting an anomaly in the communication traffic at a plurality of nodes in a communication network. A first blocking measure A is independently applied at respective ones of the plurality of nodes to the anomalous traffic that stops the anomalous traffic. A second blocking measure B is independently determined at the respective ones of the plurality of nodes such that application of a logical combination of the first blocking measure A and the second blocking measure B to the anomalous traffic stops the anomalous traffic.
摘要:
A technique is provided for applying secondary or backup power to a networked device in the event of a loss or malfunction of network power. In a control and monitoring network. Various devices may receive both power and data signals from a network cable. In the event of loss of network power, or the reduction in network power, the devices can automatically and without interruptions seek power from the secondary power source.
摘要:
A content use rights discrimination card corresponding to encrypted content is sold to a user. The user transmits data recorded on the content use rights discrimination card to a content use rights management center. The content use rights management center then verifies the content and the card, based on data in the received content use rights discrimination card, to encrypt a decoding key for decoding the content together with, for example, a session key, to transmit the encrypted content key to the user. The content use rights discrimination card, when sold to the user, can be set for enabling resale and transferred between different users so that the decoding key can be transmitted plural times from the content use rights management center. This procedure enables content to be utilized without executing any on-line settlement processing.
摘要:
An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures.
摘要:
A theft deterrent apparatus in a marine vessel having a propulsion device includes a key unit arranged to transmit a user authentication code, a first authentication unit disposed apart from the propulsion device, a second authentication unit, and an operation control unit disposed in the propulsion device. The first authentication unit is arranged to receive the user authentication code transmitted by the key unit, execute an authentication process on the user authentication code, and generate a unit authentication code. The second authentication unit is arranged to receive the unit authentication code generated by the first authentication unit and execute an authentication process on the unit authentication code. The operation control unit is arranged to allow operation of the propulsion device if authentication by the second authentication unit does succeed, and prohibit operation of the propulsion device if the authentication by the second authentication unit does not succeed.