摘要:
A communication system facilitating the establishment of a channel of communication for multiple electronic communication devices includes a registration server. The system also includes a plurality of enabled electronic communication devices in communication with the registration server. Each of the plurality of enabled electronic communication devices including an application programming interface enabling communication with the registration server. The communication server further includes a local communication network and a global communication network. If the plurality of enabled electronic communication devices are in the local communication network, communication amongst the plurality of enabled electronic communication device is established using the local communication network and if the plurality of electronic communication devices are not in the local communication network, communication amongst the plurality of enabled electronic communication device is established using the global communication network.
摘要:
A method for scanning content, including identifying tokens within an incoming byte stream, the tokens being lexical constructs for a specific language, identifying patterns of tokens, generating a parse tree from the identified patterns of tokens, and identifying the presence of potential exploits within the parse tree, wherein said identifying tokens, identifying patterns of tokens, and identifying the presence of potential exploits are based upon a set of rules for the specific language. A system and a computer readable storage medium are also described and claimed.
摘要:
A communication system facilitating the establishment of a channel of communication for multiple electronic communication devices includes a registration server. The system also includes a plurality of enabled electronic communication devices in communication with the registration server. Each of the plurality of enabled electronic communication devices including an application programming interface enabling communication with the registration server. The communication server further includes a local communication network and a global communication network. If the plurality of enabled electronic communication devices are in the local communication network, communication amongst the plurality of enabled electronic communication device is established using the local communication network and if the plurality of electronic communication devices are not in the local communication network, communication amongst the plurality of enabled electronic communication device is established using the global communication network.
摘要:
A security system for scanning content within a computer, including a network interface, housed within a computer, for receiving content from the Internet on its destination to an Internet application running on the computer, a database of rules corresponding to computer exploits, stored within the computer, a rule-based content scanner that communicates with said database of rules, for scanning content to recognize the presence of potential exploits therewithin, a network traffic probe, operatively coupled to the network interface and to the rule-based content scanner, for selectively diverting content from its intended destination to the rule-based content scanner, and a rule update manager that communicates with said database of rules, for updating said database of rules periodically to incorporate new rules that are made available. A method and a computer readable storage medium are also described and claimed.
摘要:
A security system for scanning content within a computer, including a network interface, housed within a computer, for receiving content from the Internet on its destination to an Internet application running on the computer, a database of rules corresponding to computer exploits, stored within the computer, a rule-based content scanner that communicates with said database of rules, for scanning content to recognize the presence of potential exploits therewithin, a network traffic probe, operatively coupled to the network interface and to the rule-based content scanner, for selectively diverting content from its intended destination to the rule-based content scanner, and a rule update manager that communicates with said database of rules, for updating said database of rules periodically to incorporate new rules that are made available. A method and a computer readable storage medium are also described and claimed.
摘要:
A method for altering text displayed in a formatted page, including locating a buffer of memory locations containing contents of a formatted page, locating a first text string between two markers within the buffer, the first string being an encrypted text string including N characters, replacing the first text string with a second text string, the second string being a decrypted text string including M characters, where M is less than N, and inserting N−M special fill characters in the N−M unfilled memory locations between the markers, so as to avoid the need to move the markers closer together.
摘要:
A method for altering text displayed in a formatted page, including locating a buffer of memory locations containing contents of a formatted page, locating a first text string between two markers within the buffer, the first string being an encrypted text including N characters, replacing the first text string with a second text string within the buffer, the second string being a decrypted text including M characters, where M is less than N, and inserting N-M special fill characters in the N-M unfilled memory locations between the markers within the buffer, so as to avoid the need to move the markers closer together.
摘要:
A method for scanning content, including identifying tokens within an incoming byte stream, the tokens being lexical constructs for a specific language, identifying patterns of tokens, generating a parse tree from the identified patterns of tokens, and identifying the presence of potential exploits within the parse tree, wherein said identifying tokens, identifying patterns of tokens, and identifying the presence of potential exploits are based upon a set of rules for the specific language. A system and a computer readable storage medium are also described and claimed.
摘要:
A method for providing computerized word-based referencing including the steps of indicating a target word on a display, thereby causing a computer to identify the target word on the display by employing at least one of a text drawing function and a character recognition function in order to automatically identify at least one entry for the target word in at least one computerized data base based on the target word and additionally based on at least one word appearing in a vicinity thereof on the display to eliminate ambiguity in meaning in the target word; and displaying the at least one entry for the target word from the at least one computerized database on the display.
摘要:
A method for altering text displayed in a formatted page, including locating a buffer of memory locations containing contents of a formatted page, locating a first text string between two markers within the buffer, the first string being an encrypted text including N characters, replacing the first text string with a second text string within the buffer, the second string being a decrypted text including M characters, where M is less than N, and inserting N-M special fill characters in the N-M unfilled memory locations between the markers within the buffer, so as to avoid the need to move the markers closer together.