NETWORK CONTROL SECURITY
    1.
    发明申请
    NETWORK CONTROL SECURITY 有权
    网络控制安全

    公开(公告)号:US20160087994A1

    公开(公告)日:2016-03-24

    申请号:US14492938

    申请日:2014-09-22

    CPC classification number: H04L63/105 H04L45/308 H04L63/18 H04L63/20

    Abstract: Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.

    Abstract translation: 通常描述了有效地允许网络元件检索控制命令的系统,设备和方法的技术。 在一些示例中,网络控制器设备可以将标识符与控制命令相关联。 网络控制器设备可以通过具有第一级安全性的第一网络向计算设备发送标识符和相关联的控制命令。 网络控制器设备可以通过不同于第一安全级别的第二安全级别在第二网络上向网络元件发送激活信号。 网络控制器设备可以通过第二网络将标识符发送到网络元件。 标识符可以有效地允许网络元件检索控制命令。

    CORRELATION OF ADVERTISING CONTENT TO MALICIOUS SOFTWARE
    2.
    发明申请
    CORRELATION OF ADVERTISING CONTENT TO MALICIOUS SOFTWARE 有权
    广告内容对恶意软件的相关性

    公开(公告)号:US20160072828A1

    公开(公告)日:2016-03-10

    申请号:US14480041

    申请日:2014-09-08

    CPC classification number: H04L63/1416 H04L63/1441 H04L63/1458 H04L67/02

    Abstract: Technologies are generally described for a systems, methods and devices effective to analyze a file. In some examples, a processor may receive the file. The file may include content and instructions. The content may include data executable by a browser. The processor may analyze the instructions. The processor may identify an internet protocol (IP) address in the instructions based on the analysis. The processor may compare the identified IP address with a list of IP addresses associated with an attack. The processor may generate an alert based on the comparison.

    Abstract translation: 技术通常描述为有效分析文件的系统,方法和设备。 在一些示例中,处理器可以接收该文件。 文件可能包含内容和说明。 内容可以包括可由浏览器执行的数据。 处理器可以分析指令。 处理器可以基于分析来识别指令中的因特网协议(IP)地址。 处理器可以将所识别的IP地址与与攻击相关联的IP地址列表进行比较。 处理器可以基于比较来生成警报。

    LINE OF SIGHT INITIATED HANDSHAKE
    3.
    发明申请
    LINE OF SIGHT INITIATED HANDSHAKE 有权
    发射手表线

    公开(公告)号:US20160316506A1

    公开(公告)日:2016-10-27

    申请号:US15200648

    申请日:2016-07-01

    Abstract: Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake. The first and second communication devices can thereafter share data.

    Abstract translation: 技术通常描述为有效实现视线启动的握手的系统,设备和方法。 在一些示例中,第一通信设备中的处理器可以检测从第一通信设备指向第二通信设备的视线。 第一通信设备可以向第二通信设备发送握手请求。 第一通信设备可以从第二通信设备接收握手确认。 握手请求和握手确认可能有效地创建握手。 第一和第二通信设备之后可以共享数据。

    SENSOR DATA ANOMALY DETECTOR
    4.
    发明申请
    SENSOR DATA ANOMALY DETECTOR 有权
    传感器数据异常检测器

    公开(公告)号:US20170008487A1

    公开(公告)日:2017-01-12

    申请号:US15117375

    申请日:2014-04-09

    Abstract: Technologies are generally described for methods and systems effective to generate an alarm for a vehicle. The methods may include receiving, by a device, a first sensor value from a first sensor for the vehicle. The methods may further include receiving, by the device, a second sensor value from a second sensor for the vehicle. The methods may further include retrieving, by the device, an instruction from a memory disposed in the vehicle while the memory is in a write-protected mode. The methods may further include evaluating, by the device, the first sensor value and the second sensor value based on the instruction. The methods may further include determining, by the device, that the first sensor value is outside a range associated with the first sensor based on the evaluation. The methods may further include transforming, by the device, the determination into an alarm.

    Abstract translation: 一般来说,为有效地为车辆产生报警的方法和系统描述技术。 所述方法可以包括由设备从车辆的第一传感器接收第一传感器值。 所述方法还可以包括由所述装置从所述车辆的第二传感器接收第二传感器值。 所述方法还可以包括当存储器处于写保护模式时,由设备检索来自布置在车辆中的存储器的指令。 所述方法还可以包括基于所述指令来由所述装置评估所述第一传感器值和所述第二传感器值。 所述方法还可以包括基于所述评估,所述设备确定所述第一传感器值在与所述第一传感器相关联的范围之外。 所述方法还可以包括通过所述装置将所述确定转换成报警器。

Patent Agency Ranking