-
公开(公告)号:WO2007070838A2
公开(公告)日:2007-06-21
申请号:PCT/US2006062053
申请日:2006-12-13
Applicant: CROSSBEAM SYSTEMS INC , KAPOOR HARSH , AKERMAN MOISEY , JUSTUS STEPHEN D , FERGUSON JC , KORSUNSKY YEVGENY , GALLO PAUL S , LEE CHARLES CHING , MARTIN TIMOTHY M , FU CHUNSHENG , XU WEIDONG
Inventor: KAPOOR HARSH , AKERMAN MOISEY , JUSTUS STEPHEN D , FERGUSON JC , KORSUNSKY YEVGENY , GALLO PAUL S , LEE CHARLES CHING , MARTIN TIMOTHY M , FU CHUNSHENG , XU WEIDONG
IPC: G06F7/04
CPC classification number: G06N3/0472 , G06F21/55 , H04L63/0227 , H04L63/1416 , H04L63/1441 , H04L63/1483 , H04L2463/141
Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self- organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Abstract translation: 使用一组用于模式识别的人造神经元(例如自组织图)以便向计算机或计算机系统提供安全性和保护的流程处理设备至少部分地基于与 与计算机系统(包括计算机网络)相关的各种类型的威胁。 用于交换,安全和其他网络应用的流处理,包括处理数据流以处理与各种条件相关的模式的设施,针对内部网络安全性,虚拟化和Web连接安全性。 用于检查网络流量包的有效载荷的流处理设备通过应用基于正则表达式匹配和自组织映射的内容匹配和行为异常检测技术来检测IP堆栈的可访问层的安全威胁和入侵。 在实时速率或接近实时速率的情况下,在数据包有效载荷中暴露威胁和入侵,从而确保安全策略严格应用于数据和系统资源,从而提高了外部和内部来源的网络安全性。 入侵检测和保护(IDP)由处理数据流的流处理设备提供,以处理与包括计算机网络在内的计算机系统相关的各种类型的网络和数据完整性威胁相关的模式。
-
公开(公告)号:WO0170024A3
公开(公告)日:2002-03-28
申请号:PCT/US0109140
申请日:2001-03-21
Applicant: FMC CORP , MARTIN TIMOTHY M , LAVIN MARYELLEN
Inventor: MARTIN TIMOTHY M , LAVIN MARYELLEN
CPC classification number: A01N43/80 , A01N25/04 , A01N43/653 , A01N53/00 , A01N57/20 , Y10S514/937 , Y10S514/938 , Y10S514/939 , Y10S514/94 , Y10S514/941 , Y10S514/942 , Y10S514/943 , Y10S514/97 , Y10S514/973 , A01N25/30 , A01N25/02 , A01N2300/00
Abstract: Provided is a method of formulating hydrophobic pesticides comprising emulsifying an aqueous phase and a water-immiscible phase to form a formulation; wherein the aqueous phase is comprised of water and optionally a freeze/thaw agent, one or more emulsifiers, or combinations thereof, and the water-immiscible phase comprises the hydrophobic pesticide and one or more emulsifiers.
Abstract translation: 提供了一种配制疏水性农药的方法,包括乳化水相和水不混溶相以形成制剂; 其中水相由水和任选的冷冻/解冻剂,一种或多种乳化剂或其组合组成,并且水不混溶相包含疏水性农药和一种或多种乳化剂。
-
公开(公告)号:WO2007070838A3
公开(公告)日:2007-06-21
申请号:PCT/US2006/062053
申请日:2006-12-13
Applicant: CROSSBEAM SYSTEMS, INC. , KAPOOR, Harsh , AKERMAN, Moisey , JUSTUS, Stephen, D. , FERGUSON, JC , KORSUNSKY, Yevgeny , GALLO, Paul, S. , LEE, Charles, Ching , MARTIN, Timothy, M. , FU, Chunsheng , XU, Weidong
Inventor: KAPOOR, Harsh , AKERMAN, Moisey , JUSTUS, Stephen, D. , FERGUSON, JC , KORSUNSKY, Yevgeny , GALLO, Paul, S. , LEE, Charles, Ching , MARTIN, Timothy, M. , FU, Chunsheng , XU, Weidong
IPC: G06F11/00
Abstract: A flow processing facility using a set of artificial neurons for pattern recognition, such as a self-organizing map, providing security and protection to a computer system which supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems and networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
-
-