In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to the service may send a service request for information about a URL to a server computer providing the service. The service request may be included in a first data set posted by the router to the server computer. The first data set may be described by an HTML form and include an encrypted device authenticator used by the server computer to validate the router. The first data set may further include a server authentication code. In responding to the service request, the server computer returns the server authentication code to the router along with information about the URL. The response may be in a second data set, such as an XML document sent by the server computer to the router over an HTTP connection.
Updating Of Malicious Code Patterns Using Public Dns Servers
Jianda Li - San Jose CA, US Bharath Kumar Chandrasekhar - Santa Clara CA, US Kong Yew Chan - San Mateo CA, US
Assignee:
Trend Micro Incorporated - Tokyo
International Classification:
G06F 9/44
US Classification:
717171
Abstract:
Malicious code patterns of an antivirus may be updated using public DNS (domain name system) servers. An update to the malicious code patterns may be generated and divided into several portions for inclusion in DNS records. The DNS records may be published for caching in public DNS servers. An update client in a client computer may send out DNS queries to receive contents of the DNS records, which include the portions of the update. The update client may combine the portions to update the malicious code patterns in the client computer.
Authentication Protocol For Network Security Services
In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to the service may send a service request for information about a URL to a server computer providing the service. The service request may be included in a first data set posted by the router to the server computer. The first data set may be described by an HTML form and include an encrypted device authenticator used by the server computer to validate the router. The first data set may further include a server authentication code. In responding to the service request, the server computer returns the server authentication code to the router along with information about the URL. The response may be in a second data set, such as an XML document sent by the server computer to the router over an HTTP connection.
Kong Yew Chan - San Mateo CA, US Shuosen Robert Liu - San Jose CA, US Jianda Li - San Jose CA, US Bharath Kumar Chandra Sekhar - Santa Clara CA, US Pei-wei Wu - Sunnyvale CA, US
Assignee:
Trend Micro Inc - Tokyo
International Classification:
G06F 15/173 G06F 12/00 G06F 7/00 H04W 4/00
US Classification:
709224, 370338, 711108, 707 3
Abstract:
Methods and apparatus for rating Uniform Resource Locators (URLs) are disclosed. The method includes determining a request size pertaining to a length of the URL to be rated and for generating a rating request message containing the URL. The rating request message is a DNS (domain name system) message if the request size is less than or equal to a predefined size limitation, and the rating request message is a HTTP (hypertext transfer protocol) message if the request size is greater than the predefined size limitation.
- Santa Clara CA, US Mehran BEHDJAT - San Jose CA, US Niraj MERCHANT - San Francisco CA, US Douglas R. MCALLISTER - Pleasanton CA, US Dongming IU - Union City CA, US Kong Lung CHAN - Newark CA, US Lara HAWRYLCHAK - Gilroy CA, US
International Classification:
H01L 21/67
Abstract:
A semiconductor processing apparatus is described that has a body with a wall defining two processing chambers within the body; a passage through the wall forming a fluid coupling between the two processing chambers; a lid removably coupled to the body, the lid having a portal in fluid communication with the passage; a gas activator coupled to the lid outside the processing chambers, the gas activator having an outlet in fluid communication with the portal of the lid; a substrate support disposed in each processing chamber, each substrate support having at least two heating zones, each with an embedded heating element; a gas distributor coupled to the lid facing each substrate support; and a thermal control member coupled to the lid at an edge of each gas distributor.
Name / Title
Company / Classification
Phones & Addresses
Kong Chan Professional Engineer
Trend Micro Inc Inc Computer Programming Services
10101 N De Anza Blvd Fl 4, Cupertino, CA 95014
Kong W. Chan Owner
Acon Builders Construction Inc Single-Family House Construction
2144 Wyandotte St, Mountain View, CA 94043 PO Box 1672, Mountain View, CA 94042
2004 to 2000 Senior Staff EngineerKong Consulting Singapore 2003 to 2004 Principal ConsultantFrontline Technology Pte Ltd Singapore 2002 to 2003 Senior ConsultantEnscaler Sunnyvale, CA 2000 to 2002 Senior Software EngineerVideo4i San Jose, CA 1999 to 2000 Senior Software EngineerAimslab Singapore 1998 to 1999 R & D Engineer
Education:
Nanyang Technological University Singapore 1998 Bachelor of Applied Science in Computer Engineering
British Virgin IslandsGlobal Investment Organisations (GIO) provides Investment Opportunities to high net worth individuals and/or corporations whereby given an investment, the... Global Investment Organisations (GIO) provides Investment Opportunities to high net worth individuals and/or corporations whereby given an investment, the objective function of GIO is to optimize the Returns on Investments subject to the constraints of minimization of risks.