Patent application number | Description | Published |
20090147689 | Method, network apparatus and computer readable medium thereof for detecting the defect of the network - Method, network apparatus and computer readable medium thereof for detecting the defect of the network are provided. The network apparatus comprises a controlling module and a relaying module. The controlling module comprises a generating module for generating a plurality of sub-detecting packets; and a first combining module for combining the plurality of sub-detecting module into a detecting packet; the relaying module is for receiving the detecting packet from the controlling module, the relaying module comprises a decomposing module for decomposing the detecting packet into the plurality of sub-detecting packets and transfer the sub-detecting packets to a target host; and a second combining module for receiving a plurality sub-result packets from the target host which are corresponding to the sub-detecting packets, combining the sub-result packets into a result packet and transferring the result packet to the controlling module to complete the detection. | 06-11-2009 |
20110023120 | METHOD AND SYSTEM FOR CLEANING MALICIOUS SOFTWARE AND COMPUTER PROGRAM PRODUCT AND STORAGE MEDIUM - A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed. | 01-27-2011 |
20110138485 | MONITOR METHOD AND MONITOR APPARATUS FOR MONITORING DATA OF HARDWARE - A monitor method and a monitor apparatus for monitoring a data of hardware are provided. The data has private information, identification information and at least one first network transmission address. The monitor apparatus comprises a storage unit and a processing unit. The data is stored in the storage unit according to the identification information. The processing unit is configured to record the identification information and the at least one first network transmission address of the data in a mark information table. In response to a sending system call, when a transmission is arranged to transmit the private information of the data to a second network transmission address which is different from the at least one first network transmission address, the processing unit will output a signal to cease the transmission. | 06-09-2011 |
20120117647 | Computer Worm Curing System and Method and Computer Readable Storage Medium for Storing Computer Worm Curing Method - A computer worm curing system includes a string receiving module, a string generating module and a string replying module. The string receiving module receives an infected string, which is generated by a computer worm, from an infected host, which is infected by the computer worm, through a network. The infected string includes a shellcode, and the shellcode is executed utilizing a vulnerable process. The string generating module generates a curing code for curing the computer worm, and replaces the shellcode in the infected string with the curing code to generate a curing string, such that the curing string can be executed utilizing the vulnerable process. The string replying module replies the curing string to the infected host, such that the curing code of the curing string can be executed utilizing the vulnerable process of the infected host to cure the infected host of the computer worm. | 05-10-2012 |
20120131428 | WEB PAGE CRAWLING METHOD, WEB PAGE CRAWLING DEVICE AND COMPUTER STORAGE MEDIUM THEREOF - A web page crawling method, a web page crawling device and a computer storage medium thereof are provided. The web page crawling method analyzes a web page to create an object list which comprises a dynamic triggering object according to a DOM. And it creates a triggering mission list which comprises at least one triggering event corresponding to the dynamic triggering object according to the object list. Then it triggers the web page to generate a triggered web page according to the at least one triggering event. Finally, it creates a web page link list of the dynamic triggering object according to a new link object of the triggered web page. In addition, the web page crawling device is configured to carry out the web page crawling method, and the computer storage medium executes the web page crawling method after it is loaded into the web page crawling device. | 05-24-2012 |
20120131675 | SERVER, USER DEVICE AND MALWARE DETECTION METHOD THEREOF - A server, a user device, and a malware detection method thereof are provided. The server connects with the user device via a network, and records execution records of the user device. Based on the history of the execution records of the user device, the server can detect whether the user device has malwares or not accordingly. | 05-24-2012 |
20120159628 | MALWARE DETECTION APPARATUS, MALWARE DETECTION METHOD AND COMPUTER PROGRAM PRODUCT THEREOF - A malware detection apparatus, a malware detection method, and a computer program product thereof are provided. The malware detection apparatus is used to detect a program. The program executes a first process. The malware detection apparatus comprises a storage unit and a processing unit. The storage unit is configured to store a malicious behavior profile of a malware. The processing unit is configured to construct a first behavior profile according to the first process, compare the first behavior profile with the malicious behavior profile and generate a comparison result. The processing unit updates a behavior record table according to the comparison result, and determines that the program is the malware according to the behavior record table. | 06-21-2012 |
20130145462 | Phishing Processing Method and System and Computer Readable Storage Medium Applying the Method - A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address. | 06-06-2013 |
20140164405 | DYNAMIC DATA MASKING METHOD AND DATABASE SYSTEM - A dynamic data masking method, suitable for a database including plural data, is disclosed in this invention. Each of the data includes plural values and plural keys corresponding to the values. The dynamic data masking method includes steps of: determining whether values and keys of one data are sensitive contents when the data are requested to be written into the database; if one of the values/keys of the data is sensitive, setting a key corresponding to the sensitive value or the key itself as a sensitive key and dynamically establishing a filtering rule corresponding to the key; and then, saving the filtering rule and writing the data into the database. In addition, a database system is also disclosed herein. | 06-12-2014 |