-
公开(公告)号:AU2003285563A8
公开(公告)日:2004-06-23
申请号:AU2003285563
申请日:2003-11-28
Applicant: IBM
Inventor: HSU ALLAN , GARRISON JOHN MICHAEL , GILFIX MICHAEL , STADING TYRON JERROD , BAFFES PAUL THOMAS
Abstract: A method and system for managing an intrusion on a computer by graphically representing an intrusion pattern of a known past intrusion, and then comparing the intrusion pattern of the known intrusion with a current intrusion. The intrusion pattern may either be based on intrusion events, which are the effects of the intrusion or activities that provide a signature of the type of intrusion, or the intrusion pattern may be based on hardware topology that is affected by the intrusion. The intrusion pattern is graphically displayed with scripted responses, which in a preferred embodiment are presented in pop-up windows associated with each node in the intrusion pattern. Alternatively, the response to the intrusion may be automatic, based on a pre-determined percentage of common features in the intrusion pattern of the known past intrusion and the current intrusion.
-
公开(公告)号:DE602008004674D1
公开(公告)日:2011-03-03
申请号:DE602008004674
申请日:2008-10-15
Applicant: IBM
-
公开(公告)号:DE602006008915D1
公开(公告)日:2009-10-15
申请号:DE602006008915
申请日:2006-03-29
Applicant: IBM
Inventor: GILFIX MICHAEL
IPC: B42D15/00
Abstract: A method for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents. A liquid medium including a plurality of electrostatic monopoles is applied to the surface of a document, which embeds a permanent electrostatic pattern in the document. The pattern is then readable by an electrostatic scanner. The monopoles may be associated with differing colors, including black and white, may be transparent or have a neutral color. The patterns may embed data, certificates or shapes. The monopoles may provide a watermark or visible image. The apparatus may be a pen or printer, and may include multiple selectable vessels containing ink and/or electrostatic liquid medium of one or both charge states. Visible features of the document can be compared with the detected pattern, or the pattern may be compared to a database or decrypted with a key.
-
公开(公告)号:AT441537T
公开(公告)日:2009-09-15
申请号:AT06725383
申请日:2006-03-29
Applicant: IBM
Inventor: GILFIX MICHAEL
IPC: B42D15/00
Abstract: A method for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents. A liquid medium including a plurality of electrostatic monopoles is applied to the surface of a document, which embeds a permanent electrostatic pattern in the document. The pattern is then readable by an electrostatic scanner. The monopoles may be associated with differing colors, including black and white, may be transparent or have a neutral color. The patterns may embed data, certificates or shapes. The monopoles may provide a watermark or visible image. The apparatus may be a pen or printer, and may include multiple selectable vessels containing ink and/or electrostatic liquid medium of one or both charge states. Visible features of the document can be compared with the detected pattern, or the pattern may be compared to a database or decrypted with a key.
-
公开(公告)号:AU2003285563A1
公开(公告)日:2004-06-23
申请号:AU2003285563
申请日:2003-11-28
Applicant: IBM
Inventor: BAFFES PAUL THOMAS , GILFIX MICHAEL , GARRISON JOHN MICHAEL , HSU ALLAN , STADING TYRON JERROD
Abstract: A method and system for managing an intrusion on a computer by graphically representing an intrusion pattern of a known past intrusion, and then comparing the intrusion pattern of the known intrusion with a current intrusion. The intrusion pattern may either be based on intrusion events, which are the effects of the intrusion or activities that provide a signature of the type of intrusion, or the intrusion pattern may be based on hardware topology that is affected by the intrusion. The intrusion pattern is graphically displayed with scripted responses, which in a preferred embodiment are presented in pop-up windows associated with each node in the intrusion pattern. Alternatively, the response to the intrusion may be automatic, based on a pre-determined percentage of common features in the intrusion pattern of the known past intrusion and the current intrusion.
-
-
-
-