Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

967 results about "Blacklist" patented technology

In computing, a blacklist or blocklist is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, which means only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.

System and method for network administration and local administration of privacy protection criteria

Cookie files received from cookie file sources (e.g., Internet websites) are screened based upon the recommendations of a service provider which downloads privacy protection criteria in the form of a “watch list” to a subscriber's client machine. A user-friendly interface allows the subscriber to optionally modify the watch list prior to it being used at the subscriber's client machine by assigning known cookie file sources to either a “trustlist” or a “blacklist.” A “composite list” is then generated and used by the client machine to screen cookie files. The subscriber receives updates from the service provider on either a periodic or “as-needed” basis using a “quick update algorithm.” A “privacy scanning algorithm” runs on the client machine and has two different modes of operation. The first is a continuous mode where unwanted cookie files are blocked from being stored at the client machine. The second is a periodic mode where the client machine is “scrubbed” of unwanted cookie files according to the privacy protection criteria.
Owner:ASCENTIVE

Method and apparatus for detecting phishing attempts solicited by electronic mail

A phishing filter employs a plurality of heuristics or rules (in one embodiment, 12 rules) to detect and filter phishing attempts solicited by electronic mail. Generally, the rules fall within the following categories: (1) identification and analysis of the login URL (i.e., the “actual” URL) in the email, (2) analysis of the email headers, (3) analysis across URLs and images in the email other than the login URL, and (4) determining if the URL is accessible. The phishing filter does not need to be trained, does not rely on black or white lists and does not perform keyword analysis. The filter may be implemented as an alternative or supplemental to prior art spam detection filters.
Owner:ALCATEL-LUCENT USA INC

Method for web application layer attack detection and defense based on behavior characteristic matching and analysis

A method for web application layer attack detection and defense based on behavior characteristic matching and analysis includes presetting a defense rule base, the defense rule base including a plurality of defense rules; acquiring a record that access request data matches the defense rule base in a web application protection system and taking the record as sample data; learning the sample data to establish an analysis model; establishing a user reputation database and setting a blacklist module in the user reputation database; learning the user's access behavior through the analysis model and updating and correcting the defense rules in the defense rule base; establishing an exception defense rule base; and setting a defense method and intercepting the user's access behavior according to the defense method. By intelligently learning the user's behavior, threat behavior can be identified and intercepted quickly to ensure the security of the web server.
Owner:MOLBASE SHANGHAI BIOTECH CO LTD

Method for blocking crank calls by using cloud computing and a system thereof

The present disclosure provides a method for blocking crank calls by using cloud computing and a system thereof. In the method, a client(s) uploads a blacklist to a server; the server makes statistic according to blacklist data uploaded by the client(s) and determines a particular phone number be a crank phone number, generates an anti-crank policy and updates the generated anti-crank policy to the client(s); when receiving a call or a message from the crank phone number, the client executes the anti-crank policy.
Owner:NETQIN MOBILE BEIJING

Label propagation anti-fraud detection method and system based on enterprise relation map

The invention discloses a label propagation anti-fraud detection method and system based on an enterprise relation map, belongs to the field of financial credit, and aims to solve the technical problem of how to effectively analyze complex network data to discover valuable information and further mine fraud risks embodied by complex network relations, and the method comprises the following steps of: s1, establishing an enterprise blacklist library; s2, constructing a relational graph: screening related tables and fields listed in the relational graph in a relational database, and extracting arelational database object entity and an entity relationship; and S3, performing anti-fraud detection on the enterprise based on the self-built blacklist library and the enterprise relationship graph:based on blacklist library identification relationship graph blacklist nodes, extracting blacklist node connection subgraphs, identifying fraud enterprise nodes in the connection subgraphs by applying a label propagation algorithm, and estimating the enterprise anti-fraud probability. The system comprises an enterprise blacklist library establishment unit, a relation graph construction unit and an anti-fraud detection unit.
Owner:浪潮卓数大数据产业发展有限公司

Rootkit monitoring agent built into an operating system kernel

A rootkit monitoring agent (RMA) built into an operating system (OS) kernel for detecting a kernel-based rootkit and preventing subsequent effects of the rootkit. The RMA is activated as a kernel process subsequent to the OS initialization and stores a good state of OS kernel data structures including the System Service Descriptor Table (SSDT) and Interrupt Descriptor Table (IDT). The RMA monitors the SSDT and IDT and detects that a hook previously stored in the good state is changed by an installation of suspect software. The RMA determines the suspect software is a kernel-based rootkit by determining a whitelist does not indicate the changed hook. The RMA restores the changed hook to its good state. The RMA updates a blacklist to reference the changed hook.
Owner:IBM CORP

A method for defending against denial of service attacks based on cloud computing platform

ActiveCN102291390ATroubleshoot Denial of Service AttacksDenial of service attack defenseTransmissionAttackInternet privacy
The invention relates to a method for defending against a denial of service attack based on a cloud computation platform, which solves the problem of the HTTP (HyperText Transfer Protocol) denial of service attack on a concrete application. A CPU (Central Processing Unit), a network throughput rate and the like are analyzed to determine whether the denial of service attack exists, and after the existence of an attack behavior is determined, access data is first intercepted; access users are subjected to redirected accesses, and identifying code technology with 4-digit random numbers/letters plus mathematical problems with fixed answers is adopted at Cookie; meanwhile, the number of the redirected accesses is defined to discriminate a legal user from an attacker, and therefore, the IP of the attacker is added to a blacklist, and is banned from accessing so as to filter the attacker; as for the attacks which are disguised as the legal user and continue to attack a server, the inherent elastic performance of the cloud computation platform is utilized to dynamically increase a network bandwidth and the number of virtual servers; and after a system is stabilized, an original system state is recovered, the bandwidth is recovered, and the virtual servers are removed so as to effectively defending against the denial of service attack.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method and system of preventing files from being damaged by malicious operation behaviors

InactiveCN107506642AReduce risk frequencyEffective identification of malicious operationsDigital data protectionPlatform integrity maintainanceBlack listEncryption
The invention discloses a method and a system of preventing files from being damaged by malicious operation behaviors. if a process of deleting the file exists, the process is released if the process is a white-list process, is directly blocked if the process is a black-list file reading or writing operation process, and is suspended if the process is a gray-list process, and released after backing up the file to a readable protected area is completed; if a process of modifying the file exists, the process is released if the process is a white-list process, is directly blocked if the process is a black-list process, and is suspended if the process is a gray-list process, and released after backing up the file to the readable protected area is completed; and if an encryption / compression encryption operation exists, whether operation frequency of a process for the file in a preset time exceeds a set threshold value is judged, and if yes, it is determined that the operation is a suspected malicious file operation behavior. According to the technical solution of the invention, the malicious file operation behaviors can be effectively identified, and risk frequency of maliciously deleting and modifying important files can be reduced at the same time.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Content protection system

A content protection system for securely delivering audio / video data from a content server to a content client through an unsecured channel is disclosed. For each session, the content protection system comprises two phases. The first phase is client-server mutual authentication and session key establishment. In this phase, the content server and the content client verify each other's legitimacy, and at the same time exchange information so that both server and client can calculate or derive the same session key. In the second phase, audio / video data is encrypted with the session key in the content server, and then decrypted with the session key in the content client. If a version of server or client is found to be compromised, its ID will be put into a blacklist.
Owner:COREL CORP

Web page tamper prevention device based on web server cache matching and method thereof

ActiveCN103929440AOvercoming Tamper Detection InefficienciesImprove securityTransmissionWeb siteEngineering
The invention relates to the technical field of electric power industry information web page tamper prevention, in particular to a web page tamper prevention device based on web server cache matching and a method of the device. According to the web page tamper prevention device based on web server cache matching, a feature value of a suspected Trojan program in an IP response message is extracted, whether the feature value is matched with a black list database or not is judged through fuzzy matching, then the feature values of all information of an accessed web page are extracted to be precisely matched with web server cache data, and whether a web page accessed by a client side is tampered or not is judged. Fuzzy matching processing is carried out through a first detection module, the Trojan program and other malicious programs in the web page are detected, precise matching processing is carried out through a second detection module, the feature values of all the information of the accessed web page are compared with the web server cache data, the problem that existing web page tamper detection efficiency is low is solved, the web page can be effectively prevented from being tampered by a blacker, and website safety is greatly improved.
Owner:STATE GRID CORP OF CHINA +1

Multi-stage phishing website detection method and detection system based on supervised learning

The invention relates to a multi-stage phishing website detection method and detection system based on supervised learning. A first detection layer performs phishing website judgment based on a blacklist database or a white list database, the to-be-detected website is directly output if the website is matched with the blacklist database or the white list database; or a second detection layer extracts features of the to-be-detected website URL and constructs a classifier model to perform detection according to the URL features of the known phishing website; if the website is detected as a suspicious website, a third detection layer downloads the page of the to-be-detected website to acquire the page content features, and the classifier model is constructed according to the known phishing website content features so as to perform the detection; an output end outputs the result that to-be-detected website is the phishing website or the normal website, and adds the data to the blacklist database and the white list database. The primary black-white list judges the known website and reduces the detection cost; the secondary URL detects and distinguish the clear phishing website or the normal website; and the third-stage page content detection identifies the suspicious website of the secondary detection, the judgment result is precise; an identification result is accurate, and the detection time is short.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD +1

E-government internal network electronic certificate authentication method and system

The invention provides an e-government internal network electronic certificate authentication method. 1, Electronic certificate data is generated in dependence on an electronic certificate, and is stored to an electronic certificate database; 2, the identity of one side requesting to be verified is authenticated, after the authentication is passed, the electronic certificate file is submitted to an authentication server side; 3, the obtained electronic certificate file is loaded, after invalid files are filtered, the filtered electronic certificate file is resolved, a digital signature, a digital certificate, an electronic seal, certificate meta-data information and a blacklist are obtained after the resolving process, and are synchronized with the electronic certificate database; 4, the digital signature, the digital certificate, the electronic seal, the certificate meta-data information and the blacklist are verified; 5, the verification result is obtained and is returned to the side requesting to be verified. The invention provides an e-government internal network electronic certificate authentication system. The e-government internal network electronic certificate authentication method and system provide an authentication mechanism for cooperative application of electronic certificates among government departments.
Owner:LINEWELL SOFTWARE

Regional control method and system of mobile device communication

InactiveCN103607730AEffective confidentiality controlOrderly managementPower managementAssess restrictionControl systemBlack list
The invention discloses a regional control method of mobile device communication. The method comprises the following steps: a pseudo base station is established, and communication between a mobile device in a control region and the pseudo base station is realized; and a black list, a white list and a grey list are preset according to the position of the mobile device relative to the control region, and the black list, the white list and the grey list are updated in real time. The invention also discloses a regional control system of the mobile device communication. The system comprises a shielding management module and an object management module. According to the technical scheme of regional control of mobile device communication, effective confidential control of full-standard and full-frequency range various mobile phones in the control region is realized via arrangement of 2G, 3G and 4G pseudo base stations.
Owner:CHENGDU SEEKCON MICROWAVE COMM

System for blacklist processing, method and device therefor

The invention is applicable to communication technical field and provides a system for blacklist processing, a method and a device therefor. The method comprises the following steps: a. the report information is received and the reported number is obtained from the report information; b. the reported times of the reported number are counted in unit time, and the reported number is confirmed whether to be the blacklist number according to the statistical result, if yes, go to step c; and c. the reported number is sent to the mobile phone to be served as the blacklist number. The technical scheme provided in the invention effectively controls the bad communication behaviors and leads the services of the mobile phone side to be safer, more intelligent and more humanized.
Owner:SHENZHEN TCL NEW-TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products