US20190180191A1 - Adaptive content inspection - Google Patents
Adaptive content inspection Download PDFInfo
- Publication number
- US20190180191A1 US20190180191A1 US16/280,872 US201916280872A US2019180191A1 US 20190180191 A1 US20190180191 A1 US 20190180191A1 US 201916280872 A US201916280872 A US 201916280872A US 2019180191 A1 US2019180191 A1 US 2019180191A1
- Authority
- US
- United States
- Prior art keywords
- input data
- data
- search criteria
- electronic apparatus
- received data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 111
- 230000003044 adaptive effect Effects 0.000 title abstract description 3
- 238000000034 method Methods 0.000 claims abstract description 27
- 239000012634 fragment Substances 0.000 claims description 23
- 238000004891 communication Methods 0.000 claims description 18
- 230000001413 cellular effect Effects 0.000 claims description 2
- 238000012545 processing Methods 0.000 description 13
- 230000006978 adaptation Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 4
- 238000013519 translation Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000003909 pattern recognition Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 2
- 241001672694 Citrus reticulata Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 235000019504 cigarettes Nutrition 0.000 description 1
- 230000008713 feedback mechanism Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
Definitions
- Embodiments of the invention relate generally to content inspection processors, and, more specifically, to programming and operation of such processors.
- content inspection tasks are increasingly challenging. For example, pattern-recognition, a subset of content inspection tasks, may become more challenging to implement because of larger volumes of data and the number of patterns that users wish to identify.
- spam or malware are often detected by searching for content, e.g., patterns in a data stream, such as particular phrases or pieces of code.
- the number of patterns increases with the variety of spam and malware, as new patterns may be implemented to search for new variants. Searching a data stream for each of these patterns can form a computing bottleneck. Often, as the data stream is received, it is searched for each pattern, one at a time. The delay before the system is ready to search the next portion of the data stream increases with the number of patterns. Thus, content inspection may slow the receipt of data.
- the content inspection process is performed using (e.g., according to, against, with respect to, etc.) a fixed and defined set of search criteria.
- the device performing the content inspection process does not adjust to changes in input data and/or results data.
- FIG. 1 is a block diagram of an embodiment of an apparatus having a content inspection processor in accordance with embodiments of the present invention
- FIG. 2 is a block diagram illustrating operation of a host controller and a content inspection processor in accordance with an embodiment of the present invention
- FIG. 3 is a flowchart of a dynamic adaptation process for a content inspection processor in accordance with an embodiment of the present invention
- FIG. 4 depicts a content inspection processor having adaptable programming according to an embodiment of the present invention
- FIG. 5 depicts a second level of adaptable programming of a content inspection processor according to an embodiment of the present invention
- FIG. 6 depicts a content inspection processor having integrated feedback in accordance with an embodiment of the present invention
- FIG. 7 depicts a content inspection processor having integrated feedback with results processing in accordance with another embodiment of the present invention.
- FIG. 8 depicts a dynamic adaptation process of a content inspection processor with integrated feedback in accordance with an embodiment of the present invention.
- FIG. 1 is a block diagram depicting an embodiment of an electronic apparatus, such as a device or system, generally designated by reference numeral 10 .
- the apparatus 10 may be any of a variety of types such as a computer, pager, cellular phone, personal organizer, portable audio player, network device (e.g., router, firewall, switch, or any combination thereof), control circuit, camera, etc.
- the apparatus 10 may include apparatus processor 12 , such as a microprocessor, to control the processing of functions and requests in the apparatus 10 . Further, the processor 12 may comprise a plurality of processors that share apparatus control.
- the processor 12 may be a general purpose processor or a specifically designed processor for the functions and requests of the apparatus 10 .
- the apparatus 10 may also include a content inspection processor 14 .
- the content inspection processor 14 may be one or more processors configured to inspect data using search criteria.
- the content inspection processor 14 may be capable of using search criteria to match a pattern in a data set or a data stream provided to the content inspection processor 14 .
- the content inspection processor 14 may be coupled to and controlled by processing logic, such as a host controller 16 that communicates with the content inspection processor 14 over one or more buses.
- the host controller 16 may program the content inspection processor 14 with search criteria or any other parameters used by the content inspection processor 14 during operation.
- the content inspection processor 14 may provide the primary or secondary functions of the apparatus 10 .
- the content inspection processor 14 may be a pattern-recognition processor as described in U.S. patent application Ser. No. 12/350,132.
- the apparatus 10 typically includes a power supply 18 .
- the power supply 18 may advantageously include permanent batteries, replaceable batteries, and/or rechargeable batteries.
- the power supply 18 may also include an AC adapter, so the apparatus 10 may be plugged into a wall outlet, for instance.
- the power supply 18 may also include a DC adapter such that the apparatus 10 may be plugged into a vehicle cigarette lighter, for instance.
- an input device 20 may be coupled to the processor 12 .
- the input device 20 may include buttons, switches, a keyboard, a light pen, a stylus, a mouse, and/or a voice recognition system, for instance.
- a display 22 may also be coupled to the processor 12 .
- the display 22 may include an LCD, a CRT, LEDs, and/or any other suitable display, for example.
- an RF sub-system/baseband processor 24 may also be coupled to the processor 12 .
- the RF sub-system/baseband processor 24 may include an antenna that is coupled to an RF receiver and to an RF transmitter (not shown).
- a communications port 26 may also be coupled to the processor 12 .
- the communications port 26 may be adapted to be coupled to one or more peripheral devices 28 such as a modem, a printer, a computer, or to a network, such as a local area network, remote area network, intranet, or the Internet, for instance.
- memory is coupled to the processor 12 to store and facilitate execution of various programs.
- the processor 12 may be coupled to system memory 30 through a memory controller 32 .
- the system memory 30 may include volatile memory, such as Dynamic Random Access Memory (DRAM) and/or Static Random Access Memory (SRAM).
- the system memory 30 may also include non-volatile memory, such as read-only memory (ROM), flash memory of various architectures (e.g., NAND memory, NOR memory, etc.), to be used in conjunction with the volatile memory.
- the apparatus 10 may include a hard drive 34 , such as a magnetic storage device.
- FIG. 2 depicts operation of the host controller 16 and the content inspection processor 14 in accordance with an embodiment of the present invention.
- the host controller 16 may communicate with the content inspection processor 14 over a program bus 36 and an input bus 38 .
- the input bus 38 transfers the input data to be inspected by the content inspection processor 14 .
- the input data may be transferred as a fixed set of data (referred to as “static data”) or streaming data (referred to as “dynamic data”).
- the input data may be received from any source, such as databases, sensors, networks, etc, coupled to the apparatus 10 .
- the input data may be received from another device or system in communication with the apparatus 10 over the communication port 26 .
- the program bus 36 transfers programming data from the host controller 16 to the content inspection processor 14 .
- This program data is used to program the content inspection processor 14 , with the operating parameters used during the inspection process.
- the programming data may include search criteria (e.g., patterns or other criteria of interest) used by the content inspection processor 14 , to match to the input data received over the input bus 38 .
- the search criteria may include one or more patterns of any length and complexity.
- the output of the content inspection processor 14 may be transferred over a results bus 40 .
- the results bus 40 may provide the results data (e.g., search results) from processing of the input data by the content inspection processor 14 to the host controller 16 .
- the results data provided over the results bus 40 may indicate a match, may indicate “no match,” and may include the particular search criteria that were matched and/or the location in the input data where the match occurred.
- the content inspection processor 14 may notify the host controller 16 of any specific results data by transferring an output over the results bus 40 .
- the input bus 38 , program bus 36 , and results bus 40 may be physically distinct buses, or any combination of the input bus 38 , program bus 36 , and results bus 40 may be physically implemented on a single bus interface.
- the single bus interface may be multiplexed or controlled via any suitable technique to transmit the different types of data provided to and received from the content inspection processor 14 .
- FIG. 3 depicts a dynamic adaptation process 44 for the content inspection processor 14 in accordance with an embodiment of the present invention.
- the content inspection processor 14 may receive input data (e.g., a data set or data stream), such as over the input bus 38 .
- the content inspection processor 14 may identify information with respect to the input data provided to the content inspection processor 14 (block 48 ). Such information may include an identifying characteristic of the data, format of the data, a protocol of the data, and/or any other type of identifying information.
- the information may be collected, analyzed, and used to adapt the search criteria and/or other operating parameters of the content inspection processor (block 50 ).
- the host controller 16 or other processing logic may collect, analyze, and/or adapt the search criteria based on an identifying characteristic of the input data.
- the content inspection processor 14 may then be programmed with the adapted search criteria (block 52 ).
- the content inspection processor 14 may inspect input data using the adapted search criteria (block 54 ). As described below, this process 44 may be iterative, so that additional identifying information may be found in the input data to allow for further adaptation of the search criteria (as shown by arrow 56 ).
- FIGS. 4-6 depict different techniques for dynamic adaptive programming of the content inspection processor, to provide the content inspection processor the ability to adapt to the input data during run-time.
- Embodiments of the content inspection processor may include any one of or combination of the techniques described below in FIGS. 4-6 .
- FIG. 4 depicts the content inspection processor 14 having adaptable programming (e.g., search criteria) according to an embodiment of the present invention.
- the content inspection processor 14 includes the ability to dynamically adapt search criteria based on identifying information with respect to the input data.
- FIG. 4 depicts an embodiment in which the content inspection processor 14 may receive many possible types of input data 60 (e.g., data sets or data streams). Each type of input data 60 may have different identifying information (depicted as identities 1, 2, 3, etc. in FIG. 4 ). For example, input data 60 A may have identity 1, input data 60 B may have identity 2, input data 60 C may have identity 3, and so on.
- the content inspection processor 14 may perform natural language translation. Incoming input data 60 may include any possible natural language for translation by the content inspection processor.
- the identities may be different natural languages, such that identity 1 is French, identity 2 is Spanish, identity 3 is English, identity 4 is Russian, identity 5 is Polish, identity 6 is Mandarin Chinese, identity 7 is Japanese, etc.
- the content inspection processor 14 may be programmed with search criteria to identify information with respect to the input data, such as by matching certain characteristics of the input data using the search criteria. Further, the content inspection processor 14 may be programmed with the search criteria based on the function of the content inspection processor 14 (e.g., natural language translation, network firewall, etc.) Thus, in an embodiment providing natural language translation, the content inspection processor 14 may be programmed to identify the natural language of the incoming input data 60 . In such an embodiment, the content inspection processor 14 may not have enough memory to store all of the search criteria for each type of input data 60 (e.g., each possible natural language). After the input data 60 has been identified, the identity may be provided to the host controller 16 over the results bus 40 .
- search criteria e.g., natural language translation, network firewall, etc.
- the host controller 16 may then adapt the search criteria based on the identity of the input data 60 and program the content inspection processor 14 with adapted search criteria for that specifically identified type of input data. For example, if the input data is identified as English, the search criteria may be adapted to match patterns of interest in English.
- FIG. 5 depicts an additional level of adaptability based on the identity of the input data.
- the content inspection processor 14 may be programmed with adapted search criteria to identify additional information (e.g., a sub-identity) with respect to of the input data 60 A.
- additional information e.g., a sub-identity
- the input data 60 A may have additional potentially identifying information 62 , such as “sub-identity 1,” “sub-identity 2,” “sub-identity 3,” etc.
- identifying a specific natural language e.g., identifying input data 60 A as “English”
- the content inspection processor 14 may then identify a regional dialect, accent, or other sub-identity of the identified language. Once the content inspection processor 14 has identified this sub-identity, this sub-identity may be provided to the host controller 14 over the results bus 40 .
- the host controller 16 can then further adapt the search criteria and program the content inspection processor 14 with the further adapted search criteria. This process may repeat for any desired level of sub-identifiers of input data.
- successive adaptation of the search criteria described above enables the content inspection processor to achieve higher levels of accuracy for the inspection process.
- the identification of the input data may be used to enhance network security.
- the content inspection processor 14 may identify code fragments in the input data that correspond to code fragments commonly found in close proximity to signatures of attack viruses, worms, or other malware. After such code fragments are identified, the host controller 16 may adapt the search criteria to match the attack signature known to be associated with such code fragments. These adapted search criteria may be provided to the content inspection processor 14 so that the content inspection processor 14 is better able to search for the respective attack signature associated with those code fragments, increasing accuracy of the inspection process.
- the identifying information searched for in the input data may be a network protocol, such as hypertext transfer protocol (HTTP), file transfer protocol (FTP), DNS request, etc.
- HTTP hypertext transfer protocol
- FTP file transfer protocol
- DNS DNS request
- the host controller 16 may adapt search criteria for a specific protocol and program the content inspection processor 14 accordingly.
- the identifying information (e.g., identity) searched for may be encoding/decoding information of the input data, where the identifying information of the input data is fed back to an encoder or decoder to adjust the encoding or decoding process.
- a video or other media encoder may use the content inspection processor 14 to inspect the output of the encoding process and provide feedback to the encoder to enable the encoder to dynamically adapt the encoding process.
- the identifying information may be any digitally encoded information.
- the content inspection processor 14 may include feedback mechanisms to provide dynamic adaptability to the content inspection processor 14 based on the input data.
- FIG. 6 depicts the content inspection processor 14 having integrated feedback in accordance with an embodiment of the present invention.
- the results data from the content inspection processor 14 may be transferred over the results bus 40 into the program bus 36 , creating a feedback loop 66 .
- This feedback loop 66 may enable the content inspection processor 14 to dynamically adapt to the input data based on the results of an inspection process (e.g., based on the input data that matched or did not match search criteria programmed into the content inspection processor 14 ).
- FIG. 7 depicts a content inspection processor 14 having integrated feedback with results processing in accordance with another embodiment of the present invention.
- the results bus 40 from the content inspection processor 14 may be coupled to results processing logic 68 .
- the results data output from the content inspection processor 14 may be processed by the results processing logic 68 before being provided to the program bus 36 .
- the results processing logic 68 may include any suitable hardware and/or software logic, such as an additional content inspection processor to perform inspection of the results, a lookup operation to fetch new search criteria from local storage, etc.
- FIG. 8 depicts a dynamic adaptation process 70 of a content inspection processor with integrated feedback in accordance with an embodiment of the present invention.
- the content inspection processor 14 receives input data (block 72 ), such as a data set or data stream received over the input bus 38 .
- the input data may be inspected using to the search criteria programmed into the content inspection processor 14 (block 74 ). In some embodiments, as discussed above, this search criteria may be used to identify information with respect to the input data.
- the results data of the inspection process may be provided to results processing logic 68 (block 76 ).
- the results data may be processed by the results processing logic 68 (block 78 ).
- the processed results data may be fed back into the content inspection processor 14 , such as through the program bus 36 (block 80 ).
- the process 70 may continue to provide continuous feedback to the content inspection processor 14 .
- the results data may be provided directly to the content inspection processor 14 without processing (as shown by arrow 84 ), such as by feeding the results data into the program bus 36 .
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 15/618,935 filed Jun. 9, 2017, which is a continuation of U.S. patent application Ser. No. 13/928,171 filed Jun. 26, 2013, which is a continuation of U.S. patent application Ser. No. 12/638,767 filed Dec. 15, 2009, each of which is incorporated herein by reference in its entirety for all purposes.
- Embodiments of the invention relate generally to content inspection processors, and, more specifically, to programming and operation of such processors.
- In the field of computing, content inspection tasks are increasingly challenging. For example, pattern-recognition, a subset of content inspection tasks, may become more challenging to implement because of larger volumes of data and the number of patterns that users wish to identify. For example, spam or malware are often detected by searching for content, e.g., patterns in a data stream, such as particular phrases or pieces of code. The number of patterns increases with the variety of spam and malware, as new patterns may be implemented to search for new variants. Searching a data stream for each of these patterns can form a computing bottleneck. Often, as the data stream is received, it is searched for each pattern, one at a time. The delay before the system is ready to search the next portion of the data stream increases with the number of patterns. Thus, content inspection may slow the receipt of data.
- Further, in many pattern recognitions, searches, or other content inspection tasks, the content inspection process is performed using (e.g., according to, against, with respect to, etc.) a fixed and defined set of search criteria. The device performing the content inspection process does not adjust to changes in input data and/or results data.
-
FIG. 1 is a block diagram of an embodiment of an apparatus having a content inspection processor in accordance with embodiments of the present invention; -
FIG. 2 is a block diagram illustrating operation of a host controller and a content inspection processor in accordance with an embodiment of the present invention; -
FIG. 3 is a flowchart of a dynamic adaptation process for a content inspection processor in accordance with an embodiment of the present invention; -
FIG. 4 depicts a content inspection processor having adaptable programming according to an embodiment of the present invention; -
FIG. 5 depicts a second level of adaptable programming of a content inspection processor according to an embodiment of the present invention; -
FIG. 6 depicts a content inspection processor having integrated feedback in accordance with an embodiment of the present invention; -
FIG. 7 depicts a content inspection processor having integrated feedback with results processing in accordance with another embodiment of the present invention; and -
FIG. 8 depicts a dynamic adaptation process of a content inspection processor with integrated feedback in accordance with an embodiment of the present invention. -
FIG. 1 is a block diagram depicting an embodiment of an electronic apparatus, such as a device or system, generally designated by reference numeral 10. The apparatus 10 may be any of a variety of types such as a computer, pager, cellular phone, personal organizer, portable audio player, network device (e.g., router, firewall, switch, or any combination thereof), control circuit, camera, etc. The apparatus 10 may includeapparatus processor 12, such as a microprocessor, to control the processing of functions and requests in the apparatus 10. Further, theprocessor 12 may comprise a plurality of processors that share apparatus control. Theprocessor 12 may be a general purpose processor or a specifically designed processor for the functions and requests of the apparatus 10. - The apparatus 10 may also include a
content inspection processor 14. Thecontent inspection processor 14 may be one or more processors configured to inspect data using search criteria. For example, thecontent inspection processor 14 may be capable of using search criteria to match a pattern in a data set or a data stream provided to thecontent inspection processor 14. Thecontent inspection processor 14 may be coupled to and controlled by processing logic, such as ahost controller 16 that communicates with thecontent inspection processor 14 over one or more buses. Thehost controller 16 may program thecontent inspection processor 14 with search criteria or any other parameters used by thecontent inspection processor 14 during operation. Thecontent inspection processor 14 may provide the primary or secondary functions of the apparatus 10. In one embodiment, thecontent inspection processor 14 may be a pattern-recognition processor as described in U.S. patent application Ser. No. 12/350,132. - The apparatus 10 typically includes a power supply 18. For instance, if the apparatus 10 is a portable system, the power supply 18 may advantageously include permanent batteries, replaceable batteries, and/or rechargeable batteries. The power supply 18 may also include an AC adapter, so the apparatus 10 may be plugged into a wall outlet, for instance. The power supply 18 may also include a DC adapter such that the apparatus 10 may be plugged into a vehicle cigarette lighter, for instance.
- Various other devices may be coupled to the
processor 12, depending on the functions that the apparatus 10 performs. For instance, aninput device 20 may be coupled to theprocessor 12. Theinput device 20 may include buttons, switches, a keyboard, a light pen, a stylus, a mouse, and/or a voice recognition system, for instance. Adisplay 22 may also be coupled to theprocessor 12. Thedisplay 22 may include an LCD, a CRT, LEDs, and/or any other suitable display, for example. - Furthermore, an RF sub-system/
baseband processor 24 may also be coupled to theprocessor 12. The RF sub-system/baseband processor 24 may include an antenna that is coupled to an RF receiver and to an RF transmitter (not shown). Acommunications port 26 may also be coupled to theprocessor 12. Thecommunications port 26 may be adapted to be coupled to one or moreperipheral devices 28 such as a modem, a printer, a computer, or to a network, such as a local area network, remote area network, intranet, or the Internet, for instance. - Generally, memory is coupled to the
processor 12 to store and facilitate execution of various programs. For instance, theprocessor 12 may be coupled tosystem memory 30 through amemory controller 32. Thesystem memory 30 may include volatile memory, such as Dynamic Random Access Memory (DRAM) and/or Static Random Access Memory (SRAM). Thesystem memory 30 may also include non-volatile memory, such as read-only memory (ROM), flash memory of various architectures (e.g., NAND memory, NOR memory, etc.), to be used in conjunction with the volatile memory. Additionally, the apparatus 10 may include ahard drive 34, such as a magnetic storage device. -
FIG. 2 depicts operation of thehost controller 16 and thecontent inspection processor 14 in accordance with an embodiment of the present invention. As shown inFIG. 2 , thehost controller 16 may communicate with thecontent inspection processor 14 over aprogram bus 36 and aninput bus 38. Theinput bus 38 transfers the input data to be inspected by thecontent inspection processor 14. In some embodiments, the input data may be transferred as a fixed set of data (referred to as “static data”) or streaming data (referred to as “dynamic data”). The input data may be received from any source, such as databases, sensors, networks, etc, coupled to the apparatus 10. For example, the input data may be received from another device or system in communication with the apparatus 10 over thecommunication port 26. - The
program bus 36 transfers programming data from thehost controller 16 to thecontent inspection processor 14. This program data is used to program thecontent inspection processor 14, with the operating parameters used during the inspection process. For example, in one embodiment the programming data may include search criteria (e.g., patterns or other criteria of interest) used by thecontent inspection processor 14, to match to the input data received over theinput bus 38. The search criteria may include one or more patterns of any length and complexity. - The output of the
content inspection processor 14 may be transferred over aresults bus 40. Theresults bus 40 may provide the results data (e.g., search results) from processing of the input data by thecontent inspection processor 14 to thehost controller 16. For example, in some embodiments the results data provided over theresults bus 40 may indicate a match, may indicate “no match,” and may include the particular search criteria that were matched and/or the location in the input data where the match occurred. In some embodiments, thecontent inspection processor 14 may notify thehost controller 16 of any specific results data by transferring an output over theresults bus 40. - In some embodiments, the
input bus 38,program bus 36, andresults bus 40 may be physically distinct buses, or any combination of theinput bus 38,program bus 36, andresults bus 40 may be physically implemented on a single bus interface. For example, in such an embodiment the single bus interface may be multiplexed or controlled via any suitable technique to transmit the different types of data provided to and received from thecontent inspection processor 14. -
FIG. 3 depicts a dynamic adaptation process 44 for thecontent inspection processor 14 in accordance with an embodiment of the present invention. Initially, as shown inblock 46, thecontent inspection processor 14 may receive input data (e.g., a data set or data stream), such as over theinput bus 38. Thecontent inspection processor 14 may identify information with respect to the input data provided to the content inspection processor 14 (block 48). Such information may include an identifying characteristic of the data, format of the data, a protocol of the data, and/or any other type of identifying information. After identifying information with respect to the input data, the information may be collected, analyzed, and used to adapt the search criteria and/or other operating parameters of the content inspection processor (block 50). For example, thehost controller 16 or other processing logic may collect, analyze, and/or adapt the search criteria based on an identifying characteristic of the input data. Thecontent inspection processor 14 may then be programmed with the adapted search criteria (block 52). Finally thecontent inspection processor 14 may inspect input data using the adapted search criteria (block 54). As described below, this process 44 may be iterative, so that additional identifying information may be found in the input data to allow for further adaptation of the search criteria (as shown by arrow 56). -
FIGS. 4-6 depict different techniques for dynamic adaptive programming of the content inspection processor, to provide the content inspection processor the ability to adapt to the input data during run-time. Embodiments of the content inspection processor may include any one of or combination of the techniques described below inFIGS. 4-6 . -
FIG. 4 depicts thecontent inspection processor 14 having adaptable programming (e.g., search criteria) according to an embodiment of the present invention. As shown inFIG. 4 , thecontent inspection processor 14 includes the ability to dynamically adapt search criteria based on identifying information with respect to the input data. - For example,
FIG. 4 depicts an embodiment in which thecontent inspection processor 14 may receive many possible types of input data 60 (e.g., data sets or data streams). Each type ofinput data 60 may have different identifying information (depicted asidentities FIG. 4 ). For example,input data 60A may haveidentity 1, input data 60B may haveidentity 2, input data 60C may haveidentity 3, and so on. In one embodiment, for example, thecontent inspection processor 14 may perform natural language translation.Incoming input data 60 may include any possible natural language for translation by the content inspection processor. In such an embodiment, the identities may be different natural languages, such thatidentity 1 is French,identity 2 is Spanish,identity 3 is English,identity 4 is Russian,identity 5 is Polish,identity 6 is Mandarin Chinese,identity 7 is Japanese, etc. - The
content inspection processor 14 may be programmed with search criteria to identify information with respect to the input data, such as by matching certain characteristics of the input data using the search criteria. Further, thecontent inspection processor 14 may be programmed with the search criteria based on the function of the content inspection processor 14 (e.g., natural language translation, network firewall, etc.) Thus, in an embodiment providing natural language translation, thecontent inspection processor 14 may be programmed to identify the natural language of theincoming input data 60. In such an embodiment, thecontent inspection processor 14 may not have enough memory to store all of the search criteria for each type of input data 60 (e.g., each possible natural language). After theinput data 60 has been identified, the identity may be provided to thehost controller 16 over theresults bus 40. Thehost controller 16 may then adapt the search criteria based on the identity of theinput data 60 and program thecontent inspection processor 14 with adapted search criteria for that specifically identified type of input data. For example, if the input data is identified as English, the search criteria may be adapted to match patterns of interest in English. - Further, any number of levels of adaptability may be provided by the
content inspection processor 14. For example,FIG. 5 depicts an additional level of adaptability based on the identity of the input data. After identifying information with respect to the input data (such as identifying theinput data 60A as “identity 1”), thecontent inspection processor 14 may be programmed with adapted search criteria to identify additional information (e.g., a sub-identity) with respect to of theinput data 60A. As shown inFIG. 5 , theinput data 60A may have additional potentially identifyinginformation 62, such as “sub-identity 1,” “sub-identity 2,” “sub-identity 3,” etc. For example, in an embodiment identifying a specific natural language (e.g., identifyinginput data 60A as “English”), after identifying a language thecontent inspection processor 14 may then identify a regional dialect, accent, or other sub-identity of the identified language. Once thecontent inspection processor 14 has identified this sub-identity, this sub-identity may be provided to thehost controller 14 over theresults bus 40. Thehost controller 16 can then further adapt the search criteria and program thecontent inspection processor 14 with the further adapted search criteria. This process may repeat for any desired level of sub-identifiers of input data. Advantageously, successive adaptation of the search criteria described above enables the content inspection processor to achieve higher levels of accuracy for the inspection process. - In other embodiments, the identification of the input data may be used to enhance network security. For example, the
content inspection processor 14 may identify code fragments in the input data that correspond to code fragments commonly found in close proximity to signatures of attack viruses, worms, or other malware. After such code fragments are identified, thehost controller 16 may adapt the search criteria to match the attack signature known to be associated with such code fragments. These adapted search criteria may be provided to thecontent inspection processor 14 so that thecontent inspection processor 14 is better able to search for the respective attack signature associated with those code fragments, increasing accuracy of the inspection process. - In other embodiments, the identifying information searched for in the input data may be a network protocol, such as hypertext transfer protocol (HTTP), file transfer protocol (FTP), DNS request, etc. By identifying the protocol and providing this identity to the
host controller 16, thehost controller 16 may adapt search criteria for a specific protocol and program thecontent inspection processor 14 accordingly. In other embodiments, the identifying information (e.g., identity) searched for may be encoding/decoding information of the input data, where the identifying information of the input data is fed back to an encoder or decoder to adjust the encoding or decoding process. For example, a video or other media encoder may use thecontent inspection processor 14 to inspect the output of the encoding process and provide feedback to the encoder to enable the encoder to dynamically adapt the encoding process. In yet other embodiments, the identifying information may be any digitally encoded information. - In other embodiments, the
content inspection processor 14 may include feedback mechanisms to provide dynamic adaptability to thecontent inspection processor 14 based on the input data.FIG. 6 depicts thecontent inspection processor 14 having integrated feedback in accordance with an embodiment of the present invention. As shown inFIG. 6 , the results data from thecontent inspection processor 14 may be transferred over theresults bus 40 into theprogram bus 36, creating afeedback loop 66. Thisfeedback loop 66 may enable thecontent inspection processor 14 to dynamically adapt to the input data based on the results of an inspection process (e.g., based on the input data that matched or did not match search criteria programmed into the content inspection processor 14). - In other embodiments, the feedback loop may include additional post-results processing.
FIG. 7 depicts acontent inspection processor 14 having integrated feedback with results processing in accordance with another embodiment of the present invention. As shown inFIG. 7 , theresults bus 40 from thecontent inspection processor 14 may be coupled to results processing logic 68. The results data output from thecontent inspection processor 14 may be processed by the results processing logic 68 before being provided to theprogram bus 36. The results processing logic 68 may include any suitable hardware and/or software logic, such as an additional content inspection processor to perform inspection of the results, a lookup operation to fetch new search criteria from local storage, etc. -
FIG. 8 depicts adynamic adaptation process 70 of a content inspection processor with integrated feedback in accordance with an embodiment of the present invention. Initially, thecontent inspection processor 14 receives input data (block 72), such as a data set or data stream received over theinput bus 38. The input data may be inspected using to the search criteria programmed into the content inspection processor 14 (block 74). In some embodiments, as discussed above, this search criteria may be used to identify information with respect to the input data. In some embodiments, the results data of the inspection process may be provided to results processing logic 68 (block 76). The results data may be processed by the results processing logic 68 (block 78). The processed results data may be fed back into thecontent inspection processor 14, such as through the program bus 36 (block 80). As shown byarrow 82, theprocess 70 may continue to provide continuous feedback to thecontent inspection processor 14. In other embodiments, as also discussed above, the results data may be provided directly to thecontent inspection processor 14 without processing (as shown by arrow 84), such as by feeding the results data into theprogram bus 36.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/280,872 US20190180191A1 (en) | 2009-12-15 | 2019-02-20 | Adaptive content inspection |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/638,767 US8489534B2 (en) | 2009-12-15 | 2009-12-15 | Adaptive content inspection |
US13/928,171 US9684867B2 (en) | 2009-12-15 | 2013-06-26 | Adaptive content inspection |
US15/618,935 US10235627B2 (en) | 2009-12-15 | 2017-06-09 | Adaptive content inspection |
US16/280,872 US20190180191A1 (en) | 2009-12-15 | 2019-02-20 | Adaptive content inspection |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/618,935 Continuation US10235627B2 (en) | 2009-12-15 | 2017-06-09 | Adaptive content inspection |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190180191A1 true US20190180191A1 (en) | 2019-06-13 |
Family
ID=43770635
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/638,767 Active 2031-10-03 US8489534B2 (en) | 2009-12-15 | 2009-12-15 | Adaptive content inspection |
US13/928,171 Active 2032-07-22 US9684867B2 (en) | 2009-12-15 | 2013-06-26 | Adaptive content inspection |
US15/618,935 Active US10235627B2 (en) | 2009-12-15 | 2017-06-09 | Adaptive content inspection |
US16/280,872 Pending US20190180191A1 (en) | 2009-12-15 | 2019-02-20 | Adaptive content inspection |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/638,767 Active 2031-10-03 US8489534B2 (en) | 2009-12-15 | 2009-12-15 | Adaptive content inspection |
US13/928,171 Active 2032-07-22 US9684867B2 (en) | 2009-12-15 | 2013-06-26 | Adaptive content inspection |
US15/618,935 Active US10235627B2 (en) | 2009-12-15 | 2017-06-09 | Adaptive content inspection |
Country Status (7)
Country | Link |
---|---|
US (4) | US8489534B2 (en) |
EP (1) | EP2514163B1 (en) |
JP (1) | JP5701316B2 (en) |
KR (1) | KR101724778B1 (en) |
CN (1) | CN102714660B (en) |
TW (1) | TWI433520B (en) |
WO (1) | WO2011081800A1 (en) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100138575A1 (en) | 2008-12-01 | 2010-06-03 | Micron Technology, Inc. | Devices, systems, and methods to synchronize simultaneous dma parallel processing of a single data stream by multiple devices |
US20100174887A1 (en) | 2009-01-07 | 2010-07-08 | Micron Technology Inc. | Buses for Pattern-Recognition Processors |
US8489534B2 (en) * | 2009-12-15 | 2013-07-16 | Paul D. Dlugosch | Adaptive content inspection |
US9323994B2 (en) | 2009-12-15 | 2016-04-26 | Micron Technology, Inc. | Multi-level hierarchical routing matrices for pattern-recognition processors |
US8766666B2 (en) | 2010-06-10 | 2014-07-01 | Micron Technology, Inc. | Programmable device, hierarchical parallel machines, and methods for providing state information |
US8601013B2 (en) | 2010-06-10 | 2013-12-03 | Micron Technology, Inc. | Analyzing data using a hierarchical structure |
EP2668577B1 (en) | 2011-01-25 | 2019-08-14 | Micron Technology, INC. | Unrolling quantifications to control in-degree and/or out degree of automaton |
US8843911B2 (en) | 2011-01-25 | 2014-09-23 | Micron Technology, Inc. | Utilizing special purpose elements to implement a FSM |
US8726253B2 (en) | 2011-01-25 | 2014-05-13 | Micron Technology, Inc. | Method and apparatus for compiling regular expressions |
JP5763784B2 (en) | 2011-01-25 | 2015-08-12 | マイクロン テクノロジー, インク. | Grouping states for element usage |
US9443156B2 (en) | 2011-12-15 | 2016-09-13 | Micron Technology, Inc. | Methods and systems for data analysis in a state machine |
US8593175B2 (en) | 2011-12-15 | 2013-11-26 | Micron Technology, Inc. | Boolean logic in a state machine lattice |
US8680888B2 (en) | 2011-12-15 | 2014-03-25 | Micron Technologies, Inc. | Methods and systems for routing in a state machine |
US8648621B2 (en) * | 2011-12-15 | 2014-02-11 | Micron Technology, Inc. | Counter operation in a state machine lattice |
US8782624B2 (en) | 2011-12-15 | 2014-07-15 | Micron Technology, Inc. | Methods and systems for detection in a state machine |
US20130275709A1 (en) | 2012-04-12 | 2013-10-17 | Micron Technology, Inc. | Methods for reading data from a storage buffer including delaying activation of a column select |
US20130283143A1 (en) * | 2012-04-24 | 2013-10-24 | Eric David Petajan | System for Annotating Media Content for Automatic Content Understanding |
US9367745B2 (en) | 2012-04-24 | 2016-06-14 | Liveclips Llc | System for annotating media content for automatic content understanding |
US9235798B2 (en) | 2012-07-18 | 2016-01-12 | Micron Technology, Inc. | Methods and systems for handling data received by a state machine engine |
US9389841B2 (en) | 2012-07-18 | 2016-07-12 | Micron Technology, Inc. | Methods and systems for using state vector data in a state machine engine |
US9304968B2 (en) | 2012-07-18 | 2016-04-05 | Micron Technology, Inc. | Methods and devices for programming a state machine engine |
US9524248B2 (en) | 2012-07-18 | 2016-12-20 | Micron Technology, Inc. | Memory management for a hierarchical memory system |
US9075428B2 (en) | 2012-08-31 | 2015-07-07 | Micron Technology, Inc. | Results generation for state machine engines |
US9501131B2 (en) | 2012-08-31 | 2016-11-22 | Micron Technology, Inc. | Methods and systems for power management in a pattern recognition processing system |
US9448965B2 (en) | 2013-03-15 | 2016-09-20 | Micron Technology, Inc. | Receiving data streams in parallel and providing a first portion of data to a first state machine engine and a second portion to a second state machine |
US9703574B2 (en) | 2013-03-15 | 2017-07-11 | Micron Technology, Inc. | Overflow detection and correction in state machine engines |
WO2016109570A1 (en) | 2014-12-30 | 2016-07-07 | Micron Technology, Inc | Systems and devices for accessing a state machine |
US11366675B2 (en) | 2014-12-30 | 2022-06-21 | Micron Technology, Inc. | Systems and devices for accessing a state machine |
WO2016109571A1 (en) | 2014-12-30 | 2016-07-07 | Micron Technology, Inc | Devices for time division multiplexing of state machine engine signals |
US10846103B2 (en) | 2015-10-06 | 2020-11-24 | Micron Technology, Inc. | Methods and systems for representing processing resources |
US10691964B2 (en) | 2015-10-06 | 2020-06-23 | Micron Technology, Inc. | Methods and systems for event reporting |
US10977309B2 (en) | 2015-10-06 | 2021-04-13 | Micron Technology, Inc. | Methods and systems for creating networks |
US10028145B2 (en) | 2016-04-15 | 2018-07-17 | Microsoft Technology Licensing, Llc | Blocking undesirable communications in voice over internet protocol systems |
US10146555B2 (en) | 2016-07-21 | 2018-12-04 | Micron Technology, Inc. | Adaptive routing to avoid non-repairable memory and logic defects on automata processor |
US10268602B2 (en) | 2016-09-29 | 2019-04-23 | Micron Technology, Inc. | System and method for individual addressing |
US10019311B2 (en) | 2016-09-29 | 2018-07-10 | Micron Technology, Inc. | Validation of a symbol response memory |
US10929764B2 (en) | 2016-10-20 | 2021-02-23 | Micron Technology, Inc. | Boolean satisfiability |
US10592450B2 (en) | 2016-10-20 | 2020-03-17 | Micron Technology, Inc. | Custom compute cores in integrated circuit devices |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110314052A1 (en) * | 2008-11-14 | 2011-12-22 | Want2Bthere Ltd. | Enhanced search system and method |
Family Cites Families (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04167069A (en) * | 1990-10-31 | 1992-06-15 | Oki Electric Ind Co Ltd | Dictionary division type speech translating machine |
US5331227A (en) * | 1992-05-15 | 1994-07-19 | Micron Semiconductor, Inc. | Programmable logic device macrocell with an exclusive feedback line and an exclusive external input line |
US5300830A (en) * | 1992-05-15 | 1994-04-05 | Micron Semiconductor, Inc. | Programmable logic device macrocell with an exclusive feedback and exclusive external input lines for registered and combinatorial modes using a dedicated product term for control |
JP4010589B2 (en) * | 1997-02-18 | 2007-11-21 | 株式会社東芝 | Document retrieval system and retrieval document presentation method applied to the system |
CA2287689C (en) | 1998-12-03 | 2003-09-30 | P. Krishnan | Adaptive re-ordering of data packet filter rules |
US6880087B1 (en) * | 1999-10-08 | 2005-04-12 | Cisco Technology, Inc. | Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system |
US6240003B1 (en) * | 2000-05-01 | 2001-05-29 | Micron Technology, Inc. | DRAM content addressable memory using part of the content as an address |
WO2002086717A1 (en) * | 2001-04-16 | 2002-10-31 | Xaxon R & D Corporation | Computer virus check device and method |
TWI263920B (en) | 2002-06-12 | 2006-10-11 | Chunghwa Telecom Co Ltd | Right protection method for remote registration and local authentication |
JP4145582B2 (en) * | 2002-06-28 | 2008-09-03 | Kddi株式会社 | Computer virus inspection device and mail gateway system |
JP4309102B2 (en) * | 2002-07-16 | 2009-08-05 | Necネクサソリューションズ株式会社 | Illegal command / data detection method, illegal command / data detection method, and illegal command / data detection program |
US20040044907A1 (en) * | 2002-08-30 | 2004-03-04 | Hung-Ming Sun | Method of self-adjusting sensitivity for filtering documents |
US7146643B2 (en) * | 2002-10-29 | 2006-12-05 | Lockheed Martin Corporation | Intrusion detection accelerator |
US7089352B2 (en) * | 2002-12-23 | 2006-08-08 | Micron Technology, Inc. | CAM modified to be used for statistic calculation in network switches and routers |
US6944710B2 (en) * | 2002-12-30 | 2005-09-13 | Micron Technology, Inc. | Multiple category CAM |
US10110632B2 (en) * | 2003-03-31 | 2018-10-23 | Intel Corporation | Methods and systems for managing security policies |
US7685254B2 (en) * | 2003-06-10 | 2010-03-23 | Pandya Ashish A | Runtime adaptable search processor |
US6906938B2 (en) * | 2003-08-15 | 2005-06-14 | Micron Technology, Inc. | CAM memory architecture and a method of forming and operating a device according to a CAM memory architecture |
JP4201263B2 (en) * | 2003-10-27 | 2008-12-24 | 日本電信電話株式会社 | Intrusion detection system and recording medium |
US7392229B2 (en) * | 2005-02-12 | 2008-06-24 | Curtis L. Harris | General purpose set theoretic processor |
MX2007013025A (en) * | 2005-04-18 | 2008-01-11 | Univ Columbia | Systems and methods for detecting and inhibiting attacks using honeypots. |
JP2006350749A (en) * | 2005-06-17 | 2006-12-28 | Ricoh Co Ltd | Document filtering device, document filtering method, program, and recording medium |
FR2891075B1 (en) * | 2005-09-21 | 2008-04-04 | St Microelectronics Sa | MEMORY CIRCUIT FOR AHO-CORASICK TYPE RECOGNITION AUTOMATA AND METHOD FOR MEMORIZING DATA IN SUCH A CIRCUIT |
JP4774307B2 (en) * | 2006-02-06 | 2011-09-14 | アラクサラネットワークス株式会社 | Unauthorized access monitoring device and packet relay device |
US7512634B2 (en) * | 2006-06-05 | 2009-03-31 | Tarari, Inc. | Systems and methods for processing regular expressions |
EP2018013A1 (en) | 2007-07-17 | 2009-01-21 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Method and telecommunications apparatus for protecting VoIP services against attacks |
US20090064337A1 (en) * | 2007-09-05 | 2009-03-05 | Shih-Wei Chien | Method and apparatus for preventing web page attacks |
US8125908B2 (en) * | 2007-12-04 | 2012-02-28 | Extrahop Networks, Inc. | Adaptive network traffic classification using historical context |
JP4488074B2 (en) * | 2008-02-13 | 2010-06-23 | 日本電気株式会社 | Pattern detection device, pattern detection system, pattern detection program, and pattern detection method |
EP2112803B1 (en) * | 2008-04-22 | 2013-12-18 | Alcatel Lucent | Attack protection for a packet-based network |
US20100057695A1 (en) * | 2008-08-28 | 2010-03-04 | Microsoft Corporation | Post-processing search results on a client computer |
US8209521B2 (en) | 2008-10-18 | 2012-06-26 | Micron Technology, Inc. | Methods of indirect register access including automatic modification of a directly accessible address register |
US8938590B2 (en) | 2008-10-18 | 2015-01-20 | Micron Technology, Inc. | Indirect register access method and system |
US8850571B2 (en) * | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
US7970964B2 (en) | 2008-11-05 | 2011-06-28 | Micron Technology, Inc. | Methods and systems to accomplish variable width data input |
US9639493B2 (en) | 2008-11-05 | 2017-05-02 | Micron Technology, Inc. | Pattern-recognition processor with results buffer |
US7917684B2 (en) * | 2008-11-05 | 2011-03-29 | Micron Technology, Inc. | Bus translator |
US8402188B2 (en) * | 2008-11-10 | 2013-03-19 | Micron Technology, Inc. | Methods and systems for devices with a self-selecting bus decoder |
US10007486B2 (en) | 2008-12-01 | 2018-06-26 | Micron Technology, Inc. | Systems and methods to enable identification of different data sets |
US9164945B2 (en) | 2008-12-01 | 2015-10-20 | Micron Technology, Inc. | Devices, systems, and methods to synchronize parallel processing of a single data stream |
US9348784B2 (en) | 2008-12-01 | 2016-05-24 | Micron Technology, Inc. | Systems and methods for managing endian mode of a device |
US20100138575A1 (en) | 2008-12-01 | 2010-06-03 | Micron Technology, Inc. | Devices, systems, and methods to synchronize simultaneous dma parallel processing of a single data stream by multiple devices |
US8140780B2 (en) | 2008-12-31 | 2012-03-20 | Micron Technology, Inc. | Systems, methods, and devices for configuring a device |
US8214672B2 (en) | 2009-01-07 | 2012-07-03 | Micron Technology, Inc. | Method and systems for power consumption management of a pattern-recognition processor |
US20100174887A1 (en) | 2009-01-07 | 2010-07-08 | Micron Technology Inc. | Buses for Pattern-Recognition Processors |
US8281395B2 (en) | 2009-01-07 | 2012-10-02 | Micron Technology, Inc. | Pattern-recognition processor with matching-data reporting module |
US8843523B2 (en) | 2009-01-12 | 2014-09-23 | Micron Technology, Inc. | Devices, systems, and methods for communicating pattern matching results of a parallel pattern search engine |
US9836555B2 (en) | 2009-06-26 | 2017-12-05 | Micron Technology, Inc. | Methods and devices for saving and/or restoring a state of a pattern-recognition processor |
US8489534B2 (en) * | 2009-12-15 | 2013-07-16 | Paul D. Dlugosch | Adaptive content inspection |
US8648621B2 (en) * | 2011-12-15 | 2014-02-11 | Micron Technology, Inc. | Counter operation in a state machine lattice |
US8782624B2 (en) * | 2011-12-15 | 2014-07-15 | Micron Technology, Inc. | Methods and systems for detection in a state machine |
US9443156B2 (en) * | 2011-12-15 | 2016-09-13 | Micron Technology, Inc. | Methods and systems for data analysis in a state machine |
US8593175B2 (en) * | 2011-12-15 | 2013-11-26 | Micron Technology, Inc. | Boolean logic in a state machine lattice |
US9448965B2 (en) * | 2013-03-15 | 2016-09-20 | Micron Technology, Inc. | Receiving data streams in parallel and providing a first portion of data to a first state machine engine and a second portion to a second state machine |
US10019311B2 (en) * | 2016-09-29 | 2018-07-10 | Micron Technology, Inc. | Validation of a symbol response memory |
-
2009
- 2009-12-15 US US12/638,767 patent/US8489534B2/en active Active
-
2010
- 2010-12-07 WO PCT/US2010/059311 patent/WO2011081800A1/en active Application Filing
- 2010-12-07 CN CN201080062081.8A patent/CN102714660B/en active Active
- 2010-12-07 JP JP2012544613A patent/JP5701316B2/en active Active
- 2010-12-07 KR KR1020127018395A patent/KR101724778B1/en active IP Right Grant
- 2010-12-07 EP EP10798411.4A patent/EP2514163B1/en active Active
- 2010-12-15 TW TW099144051A patent/TWI433520B/en active
-
2013
- 2013-06-26 US US13/928,171 patent/US9684867B2/en active Active
-
2017
- 2017-06-09 US US15/618,935 patent/US10235627B2/en active Active
-
2019
- 2019-02-20 US US16/280,872 patent/US20190180191A1/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110314052A1 (en) * | 2008-11-14 | 2011-12-22 | Want2Bthere Ltd. | Enhanced search system and method |
Also Published As
Publication number | Publication date |
---|---|
US8489534B2 (en) | 2013-07-16 |
TWI433520B (en) | 2014-04-01 |
US20170278002A1 (en) | 2017-09-28 |
WO2011081800A1 (en) | 2011-07-07 |
US20110145182A1 (en) | 2011-06-16 |
US10235627B2 (en) | 2019-03-19 |
US20130290235A1 (en) | 2013-10-31 |
CN102714660B (en) | 2015-06-03 |
EP2514163B1 (en) | 2020-09-02 |
US9684867B2 (en) | 2017-06-20 |
KR20120093441A (en) | 2012-08-22 |
EP2514163A1 (en) | 2012-10-24 |
KR101724778B1 (en) | 2017-04-07 |
TW201145940A (en) | 2011-12-16 |
CN102714660A (en) | 2012-10-03 |
JP2013513895A (en) | 2013-04-22 |
JP5701316B2 (en) | 2015-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10235627B2 (en) | Adaptive content inspection | |
CN108984529B (en) | Real-time court trial voice recognition automatic error correction method, storage medium and computing device | |
US10038706B2 (en) | Systems, devices, and methods for separating malware and background events | |
US8014604B2 (en) | OCR of books by word recognition | |
CN103336766B (en) | Short text garbage identification and modeling method and device | |
WO2009093226A3 (en) | A method and apparatus for fingerprinting systems and operating systems in a network | |
CN1471029A (en) | System and method for auto-detecting collcation mistakes of file | |
JP2007234024A (en) | Method and apparatus for bilingual word alignment, method and apparatus for training bilingual word alignment model | |
WO2003038667A1 (en) | A content filter based on the comparison between similarity of content character and correlation of subject matter | |
WO2014049504A1 (en) | Detecting malicious advertisements using source code analysis | |
CN113961768A (en) | Sensitive word detection method and device, computer equipment and storage medium | |
CN114448664A (en) | Phishing webpage identification method and device, computer equipment and storage medium | |
CN117709439A (en) | Risk processing method and device for model, electronic equipment and storage medium | |
CN109960752B (en) | Query method and device in application program, computer equipment and storage medium | |
WO2016101737A1 (en) | Search query method and apparatus | |
CN108173716B (en) | Method for identifying network equipment manufacturer and computing equipment | |
CN113744176A (en) | Image data enhancement method and device and electronic equipment | |
CN104933061B (en) | character string detection method and device and electronic equipment | |
CN116992448B (en) | Sample determination method, device, equipment and medium based on importance degree of data source | |
BR0306694A (en) | Electronic Ink Processing | |
CN113657120B (en) | Man-machine interaction intention analysis method and device, computer equipment and storage medium | |
CN114500457B (en) | Domain name classifier detection method, device, equipment and storage medium | |
CN111881679B (en) | Text standardization processing method and device, electronic equipment and computer medium | |
Arild Dahl et al. | Stack-based Buffer Overflow Detection using Recurrent Neural Networks | |
JP2022103681A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL Free format text: SUPPLEMENT NO. 3 TO PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:048951/0902 Effective date: 20190416 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL Free format text: SUPPLEMENT NO. 12 TO PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:048948/0677 Effective date: 20190416 Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS Free format text: SUPPLEMENT NO. 3 TO PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:048951/0902 Effective date: 20190416 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: SUPPLEMENT NO. 12 TO PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:048948/0677 Effective date: 20190416 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:050724/0392 Effective date: 20190731 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051041/0317 Effective date: 20190731 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |