CN101288261B - 用于检测对等网络软件的系统和方法 - Google Patents
用于检测对等网络软件的系统和方法 Download PDFInfo
- Publication number
- CN101288261B CN101288261B CN2006800209383A CN200680020938A CN101288261B CN 101288261 B CN101288261 B CN 101288261B CN 2006800209383 A CN2006800209383 A CN 2006800209383A CN 200680020938 A CN200680020938 A CN 200680020938A CN 101288261 B CN101288261 B CN 101288261B
- Authority
- CN
- China
- Prior art keywords
- peer
- computer
- software
- network
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1068—Discovery involving direct consultation or announcement among potential requesting and potential source peers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (2)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/103,818 US9178940B2 (en) | 2005-04-12 | 2005-04-12 | System and method for detecting peer-to-peer network software |
US11/103,818 | 2005-04-12 | ||
PCT/US2006/013671 WO2006110826A2 (en) | 2005-04-12 | 2006-04-11 | System and method for detecting peer-to-peer network software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101288261A CN101288261A (zh) | 2008-10-15 |
CN101288261B true CN101288261B (zh) | 2013-07-31 |
Family
ID=37087674
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006800209383A Active CN101288261B (zh) | 2005-04-12 | 2006-04-11 | 用于检测对等网络软件的系统和方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US9178940B2 (zh) |
EP (1) | EP1872216B1 (zh) |
JP (1) | JP4657347B2 (zh) |
CN (1) | CN101288261B (zh) |
BR (1) | BRPI0607541B1 (zh) |
CA (1) | CA2604199C (zh) |
WO (1) | WO2006110826A2 (zh) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4905165B2 (ja) * | 2007-02-07 | 2012-03-28 | 富士通株式会社 | 監視支援プログラム、監視方法および監視システム |
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US7886049B2 (en) * | 2007-12-21 | 2011-02-08 | Architecture Technology Corporation | Extensible software tool for investigating peer-to-peer usage on a target device |
US9076342B2 (en) | 2008-02-19 | 2015-07-07 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US10057298B2 (en) | 2011-02-10 | 2018-08-21 | Architecture Technology Corporation | Configurable investigative tool |
US10067787B2 (en) | 2011-02-10 | 2018-09-04 | Architecture Technology Corporation | Configurable forensic investigative tool |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US10135759B2 (en) | 2013-06-12 | 2018-11-20 | Convida Wireless, Llc | Context and power control information management for proximity services |
JP6348583B2 (ja) | 2013-06-21 | 2018-06-27 | コンヴィーダ ワイヤレス, エルエルシー | コンテキスト管理 |
US10791171B2 (en) * | 2013-07-10 | 2020-09-29 | Convida Wireless, Llc | Context-aware proximity services |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US10803766B1 (en) | 2015-07-28 | 2020-10-13 | Architecture Technology Corporation | Modular training of network-based training exercises |
US10083624B2 (en) | 2015-07-28 | 2018-09-25 | Architecture Technology Corporation | Real-time monitoring of network-based training exercises |
US10749890B1 (en) | 2018-06-19 | 2020-08-18 | Architecture Technology Corporation | Systems and methods for improving the ranking and prioritization of attack-related events |
US10817604B1 (en) | 2018-06-19 | 2020-10-27 | Architecture Technology Corporation | Systems and methods for processing source codes to detect non-malicious faults |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11429713B1 (en) | 2019-01-24 | 2022-08-30 | Architecture Technology Corporation | Artificial intelligence modeling for cyber-attack simulation protocols |
US11128654B1 (en) | 2019-02-04 | 2021-09-21 | Architecture Technology Corporation | Systems and methods for unified hierarchical cybersecurity |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11887505B1 (en) | 2019-04-24 | 2024-01-30 | Architecture Technology Corporation | System for deploying and monitoring network-based training exercises |
US11403405B1 (en) | 2019-06-27 | 2022-08-02 | Architecture Technology Corporation | Portable vulnerability identification tool for embedded non-IP devices |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11444974B1 (en) | 2019-10-23 | 2022-09-13 | Architecture Technology Corporation | Systems and methods for cyber-physical threat modeling |
US11503075B1 (en) | 2020-01-14 | 2022-11-15 | Architecture Technology Corporation | Systems and methods for continuous compliance of nodes |
Family Cites Families (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6151643A (en) * | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6044471A (en) * | 1998-06-04 | 2000-03-28 | Z4 Technologies, Inc. | Method and apparatus for securing software to reduce unauthorized use |
US6298446B1 (en) * | 1998-06-14 | 2001-10-02 | Alchemedia Ltd. | Method and system for copyright protection of digital images transmitted over networks |
US6574729B1 (en) * | 1999-08-26 | 2003-06-03 | Lucent Technologies Inc. | System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server |
US7281268B2 (en) * | 1999-11-14 | 2007-10-09 | Mcafee, Inc. | System, method and computer program product for detection of unwanted processes |
EP1107512A1 (en) * | 1999-12-03 | 2001-06-13 | Sony International (Europe) GmbH | Communication device and software for operating multimedia applications |
US6920110B2 (en) * | 2001-02-14 | 2005-07-19 | Microsoft Corporation | System and method for transferring data over a network |
US7181743B2 (en) * | 2000-05-25 | 2007-02-20 | The United States Of America As Represented By The Secretary Of The Navy | Resource allocation decision function for resource management architecture and corresponding programs therefor |
US6931550B2 (en) * | 2000-06-09 | 2005-08-16 | Aramira Corporation | Mobile application security system and method |
US20020044549A1 (en) * | 2000-06-12 | 2002-04-18 | Per Johansson | Efficient scatternet forming |
US7089301B1 (en) * | 2000-08-11 | 2006-08-08 | Napster, Inc. | System and method for searching peer-to-peer computer networks by selecting a computer based on at least a number of files shared by the computer |
US20020069098A1 (en) * | 2000-08-31 | 2002-06-06 | Infoseer, Inc. | System and method for protecting proprietary material on computer networks |
US20040003266A1 (en) | 2000-09-22 | 2004-01-01 | Patchlink Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US20040039921A1 (en) * | 2000-10-17 | 2004-02-26 | Shyne-Song Chuang | Method and system for detecting rogue software |
US6918113B2 (en) * | 2000-11-06 | 2005-07-12 | Endeavors Technology, Inc. | Client installation and execution system for streamed applications |
US7903822B1 (en) | 2000-11-10 | 2011-03-08 | DMT Licensing, LLC. | Method and system for establishing a trusted and decentralized peer-to-peer network |
US20020073204A1 (en) * | 2000-12-07 | 2002-06-13 | Rabindranath Dutta | Method and system for exchange of node characteristics for DATA sharing in peer-to-peer DATA networks |
US7205029B2 (en) * | 2000-12-19 | 2007-04-17 | Basf Corporation | Method of providing cured coating films free of popping defects |
US7627897B2 (en) * | 2001-01-03 | 2009-12-01 | Portauthority Technologies Inc. | Method and apparatus for a reactive defense against illegal distribution of multimedia content in file sharing networks |
US7197565B2 (en) * | 2001-01-22 | 2007-03-27 | Sun Microsystems, Inc. | System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection |
WO2002057917A2 (en) * | 2001-01-22 | 2002-07-25 | Sun Microsystems, Inc. | Peer-to-peer network computing platform |
US6983326B1 (en) * | 2001-04-06 | 2006-01-03 | Networks Associates Technology, Inc. | System and method for distributed function discovery in a peer-to-peer network environment |
US7096503B1 (en) * | 2001-06-29 | 2006-08-22 | Mcafee, Inc. | Network-based risk-assessment tool for remotely detecting local computer vulnerabilities |
US7493363B2 (en) * | 2001-09-19 | 2009-02-17 | Microsoft Corporation | Peer-to-peer group management and method for maintaining peer-to-peer graphs |
US20030095660A1 (en) | 2001-10-15 | 2003-05-22 | Overpeer, Inc. | System and method for protecting digital works on a communication network |
US20030093466A1 (en) * | 2001-11-15 | 2003-05-15 | Jarman James D. | Drag and drop technology for remote control tool |
US7392392B2 (en) * | 2001-12-13 | 2008-06-24 | Digimarc Corporation | Forensic digital watermarking with variable orientation and protocols |
US7840663B1 (en) | 2001-12-21 | 2010-11-23 | Mcafee, Inc. | Desktop security in peer-to-peer networks |
JP2005516283A (ja) | 2002-01-22 | 2005-06-02 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | マルチメディアオブジェクトを配信する方法及びシステム |
US20030195852A1 (en) * | 2002-04-16 | 2003-10-16 | Geoff Campbell | System, method, apparatus and means for protecting digital content |
US8667103B2 (en) * | 2002-04-26 | 2014-03-04 | Hewlett-Packard Development Company, L.P. | System and method for message traffic analysis, categorization, and reporting, within a system for harvesting community knowledge |
US7571251B2 (en) * | 2002-05-06 | 2009-08-04 | Sandvine Incorporated Ulc | Path optimizer for peer to peer networks |
US7086089B2 (en) * | 2002-05-20 | 2006-08-01 | Airdefense, Inc. | Systems and methods for network security |
US7042852B2 (en) * | 2002-05-20 | 2006-05-09 | Airdefense, Inc. | System and method for wireless LAN dynamic channel change with honeypot trap |
US7277404B2 (en) * | 2002-05-20 | 2007-10-02 | Airdefense, Inc. | System and method for sensing wireless LAN activity |
US6792545B2 (en) * | 2002-06-20 | 2004-09-14 | Guidance Software, Inc. | Enterprise computer investigation system |
JP2004046419A (ja) | 2002-07-10 | 2004-02-12 | Nippon Telegr & Teleph Corp <Ntt> | コンテンツ照合サーバおよびコンテンツ照合システム |
JP4051670B2 (ja) * | 2002-08-01 | 2008-02-27 | ソニー株式会社 | コンテンツ配信システム及びコンテンツ配信方法並びに端末装置 |
KR20040013726A (ko) * | 2002-08-08 | 2004-02-14 | 케이티하이텔 주식회사 | 온라인 컨텐츠 분배방법 및 장치 |
US7089552B2 (en) * | 2002-08-29 | 2006-08-08 | Sun Microsystems, Inc. | System and method for verifying installed software |
US7213047B2 (en) * | 2002-10-31 | 2007-05-01 | Sun Microsystems, Inc. | Peer trust evaluation using mobile agents in peer-to-peer networks |
US8037202B2 (en) * | 2002-10-31 | 2011-10-11 | Oracle America, Inc. | Presence detection using mobile agents in peer-to-peer networks |
US7263070B1 (en) * | 2002-11-05 | 2007-08-28 | Sprint Spectrum L.P. | Method and system for automating node configuration to facilitate peer-to-peer communication |
CN1692616B (zh) * | 2002-11-15 | 2011-01-12 | 国际商业机器公司 | 对等环境中的网络流量控制 |
US7296288B1 (en) * | 2002-11-15 | 2007-11-13 | Packeteer, Inc. | Methods, apparatuses, and systems allowing for bandwidth management schemes responsive to utilization characteristics associated with individual users |
CN1417755A (zh) | 2002-11-18 | 2003-05-14 | 冯鲁民 | 功能完善且架构简易的智能交通系统体系 |
US7451217B2 (en) * | 2002-12-19 | 2008-11-11 | International Business Machines Corporation | Method and system for peer-to-peer authorization |
US7318092B2 (en) * | 2003-01-23 | 2008-01-08 | Computer Associates Think, Inc. | Method and apparatus for remote discovery of software applications in a networked environment |
US7769881B2 (en) * | 2003-01-24 | 2010-08-03 | Hitachi, Ltd. | Method and apparatus for peer-to peer access |
US7356709B2 (en) * | 2003-01-31 | 2008-04-08 | Microsoft Corporation | Systems and methods for deterring software piracy in a volume license environment |
US7774495B2 (en) * | 2003-02-13 | 2010-08-10 | Oracle America, Inc, | Infrastructure for accessing a peer-to-peer network environment |
JP3698707B2 (ja) | 2003-05-13 | 2005-09-21 | 日本電信電話株式会社 | トラフィック分離方法並びにトラフィック分離装置、アドレス情報収集ノード及びトラフィック分離システム装置 |
FR2857763A1 (fr) * | 2003-07-18 | 2005-01-21 | Canon Kk | Procede d'acces et de partage d'un document numerique dans un reseau de communication p2p |
US20050108557A1 (en) * | 2003-10-11 | 2005-05-19 | Kayo David G. | Systems and methods for detecting and preventing unauthorized access to networked devices |
US7660889B2 (en) * | 2003-11-18 | 2010-02-09 | Cisco Technology, Inc. | Initialization and acquisition of peers in a peers' list in a peer-to-peer network |
US7664048B1 (en) * | 2003-11-24 | 2010-02-16 | Packeteer, Inc. | Heuristic behavior pattern matching of data flows in enhanced network traffic classification |
US7325251B1 (en) * | 2003-12-16 | 2008-01-29 | Symantec Corporation | Method and system to prevent peer-to-peer (P2P) worms |
US7543052B1 (en) * | 2003-12-22 | 2009-06-02 | Packeteer, Inc. | Automatic network traffic discovery and classification mechanism including dynamic discovery thresholds |
US7552474B2 (en) * | 2004-03-01 | 2009-06-23 | International Business Machines Corporation | Detecting the presence of an installation on a data processing system based on the relative storage locations of one or more files |
US7877810B2 (en) * | 2004-03-02 | 2011-01-25 | Rovi Solutions Corporation | System, method and client user interface for a copy protection service |
US20060059560A1 (en) * | 2004-09-10 | 2006-03-16 | Montulli Louis J | Systems and methods for detecting music sharing |
US8600113B2 (en) * | 2004-11-12 | 2013-12-03 | The University Court Of The University Of St. Andrews | System, method and computer program product for video fingerprinting |
US7685636B2 (en) * | 2005-03-07 | 2010-03-23 | International Business Machines Corporation | System, service, and method for enabling authorized use of distributed content on a protected media |
EP1861799B8 (en) * | 2005-03-09 | 2014-12-10 | HERE Global B.V. | Method and system for content search with mobile computing devices |
US7162488B2 (en) * | 2005-04-22 | 2007-01-09 | Microsoft Corporation | Systems, methods, and user interfaces for storing, searching, navigating, and retrieving electronic information |
JP4535275B2 (ja) | 2005-04-27 | 2010-09-01 | 日本電気株式会社 | 帯域制御装置 |
JP2006330783A (ja) | 2005-05-23 | 2006-12-07 | Nec Corp | オーバレイネットワーク生成アプリケーション起動ノード特定装置およびその方法 |
-
2005
- 2005-04-12 US US11/103,818 patent/US9178940B2/en active Active
-
2006
- 2006-04-11 CN CN2006800209383A patent/CN101288261B/zh active Active
- 2006-04-11 EP EP06749896.4A patent/EP1872216B1/en active Active
- 2006-04-11 CA CA2604199A patent/CA2604199C/en active Active
- 2006-04-11 JP JP2008506642A patent/JP4657347B2/ja active Active
- 2006-04-11 BR BRPI0607541-0A patent/BRPI0607541B1/pt active IP Right Grant
- 2006-04-11 WO PCT/US2006/013671 patent/WO2006110826A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP1872216B1 (en) | 2018-05-23 |
CA2604199C (en) | 2015-11-24 |
US9178940B2 (en) | 2015-11-03 |
JP2008536244A (ja) | 2008-09-04 |
EP1872216A4 (en) | 2013-01-23 |
CN101288261A (zh) | 2008-10-15 |
BRPI0607541A2 (pt) | 2009-09-15 |
BRPI0607541B1 (pt) | 2019-04-24 |
CA2604199A1 (en) | 2006-10-19 |
WO2006110826A3 (en) | 2007-12-06 |
EP1872216A2 (en) | 2008-01-02 |
JP4657347B2 (ja) | 2011-03-23 |
WO2006110826A2 (en) | 2006-10-19 |
US20060248525A1 (en) | 2006-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101288261B (zh) | 用于检测对等网络软件的系统和方法 | |
CN102332072B (zh) | 用于检测恶意软件和管理恶意软件相关信息的系统和方法 | |
US7697520B2 (en) | System for identifying the presence of Peer-to-Peer network software applications | |
JP6239215B2 (ja) | 情報処理装置、情報処理方法及び情報処理プログラム | |
US9984171B2 (en) | Systems and methods for detecting false code | |
CN103493061B (zh) | 用于应对恶意软件的方法和装置 | |
JP4839278B2 (ja) | Urlの類似性分析による処理省略判定プログラム、装置 | |
RU2634173C1 (ru) | Система и способ обнаружения приложения удалённого администрирования | |
US20130185800A1 (en) | Anti-virus protection for mobile devices | |
GB2507360A (en) | Threat detection through the accumulated detection of threat characteristics | |
CN101370010A (zh) | 用于安全网络浏览的方法及装置 | |
EP2417551B1 (en) | Providing information to a security application | |
CN109948335B (zh) | 用于检测计算机系统中的恶意活动的系统和方法 | |
US20070118597A1 (en) | Processing proposed changes to data | |
US7086090B1 (en) | Method and system for protecting pervasive devices and servers from exchanging viruses | |
WO2007069337A1 (ja) | 不正通信プログラムの規制システム及びそのプログラム | |
JP2013109553A (ja) | プログラムのホワイトリスト配信装置及び方法 | |
JP2008140102A (ja) | 情報処理装置及び漏洩情報判定方法及びプログラム | |
JP5341695B2 (ja) | 情報処理システム、情報処理方法、およびプログラム | |
CN105700963A (zh) | 管理目标计算设备和远程计算设备之间的远程会话 | |
CN101361054B (zh) | 识别对等网络软件应用程序的存在的系统 | |
Tabona et al. | Intelligence sharing in big data forensics | |
CN115048533B (zh) | 知识图谱构建的方法、装置、电子设备及可读存储介质 | |
Wang et al. | VulAware: Towards Massive-Scale Vulnerability Detection in Cyberspace | |
USRE47628E1 (en) | System for identifying the presence of peer-to-peer network software applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180305 Address after: American New York Patentee after: Kroll Information Assurance Co.,Ltd. Address before: American Pennsylvania Patentee before: Tiffusa IP Co. Effective date of registration: 20180305 Address after: American Pennsylvania Patentee after: Tiffusa IP Co. Address before: American Pennsylvania Patentee before: Tifsa Holdings Effective date of registration: 20180305 Address after: American Pennsylvania Patentee after: Tifsa Holdings Address before: American Pennsylvania Patentee before: TIVERSA, Inc. |
|
TR01 | Transfer of patent right |