The present technology pertains to computer security, and more specifically to computer network security.
A hardware firewall is a network security system that controls incoming and outgoing network traffic. A hardware firewall generally creates a barrier between an internal network (assumed to be trusted and secure) and another network (e.g., the Internet) that is assumed not to be trusted and secure.
Attackers breach internal networks to steal critical data. For example, attackers target low-profile assets to enter the internal network. Inside the internal network and behind the hardware firewall, attackers move laterally across the internal network, exploiting East-West traffic flows, to critical enterprise assets. Once there, attackers siphon off valuable company and customer data.
Some embodiments of the present technology include computer-implemented methods for imitating an application in a deception point, which may include: getting an image for the application; creating an instance of the application in a container using the image; receiving a network communication, the network communication including an instruction for the application; processing the instruction using the instance; responding to the network communication using the processing; monitoring behavior from the processing, the monitoring including intercepting library calls, function calls, messages, and events from the container; and generating alerts when the behavior is malicious.
The accompanying drawings, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed disclosure, and explain various principles and advantages of those embodiments. The methods and systems disclosed herein have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
While this technology is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail several specific embodiments with the understanding that the present disclosure is to be considered as an exemplification of the principles of the technology and is not intended to limit the technology to the embodiments illustrated. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the technology. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes,” and/or “including,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that like or analogous elements and/or components, referred to herein, may be identified throughout the drawings with like reference characters. It will be further understood that several of the figures are merely schematic representations of the present technology. As such, some of the components may have been distorted from their actual scale for pictorial clarity.
Information technology (IT) organizations face cyber threats and advanced attacks. Firewalls are an important part of network security. Firewalls control incoming and outgoing network traffic using a rule set. A rule, for example, allows a connection to a specific (Internet Protocol (IP)) address (and/or port), allows a connection to a specific (IP) address (and/or port) if the connection is secured (e.g., using Internet Protocol security (IPsec)), blocks a connection to a specific (IP) address (and/or port), redirects a connection from one IP address (and/or port) to another IP address (and/or port), logs communications to and/or from a specific IP address (and/or port), and the like. A firewall rule at a low level of abstraction may indicate a specific (IP) address and protocol to which connections are allowed and/or not allowed.
Managing a set of firewall rules is a difficult challenge. Some IT security organizations have a large staff (e.g., dozens of staff members) dedicated to maintaining firewall policy (e.g., a firewall rule set). A firewall rule set can have tens of thousands or even hundreds of thousands of rules. Some embodiments of the present technology may autonomically generate a reliable declarative security policy at a high level of abstraction. Abstraction is a technique for managing complexity by establishing a level of complexity which suppresses the more complex details below the current level. The high-level declarative policy may be compiled to produce a firewall rule set at a low level of abstraction.
Network 110 (also referred to as a computer network or data network) is a telecommunications network that allows computers to exchange data. For example, in network 110, networked computing devices pass data to each other along data connections (e.g., network links). Data can be transferred in the form of packets. The connections between nodes may be established using either cable media or wireless media. For example, network 110 includes at least one of a local area network (LAN), wireless local area network (WLAN), wide area network (WAN), metropolitan area network (MAN), and the like. In some embodiments, network 110 includes the Internet.
Data center 120 is a facility used to house computer systems and associated components. Data center 120, for example, comprises computing resources for cloud computing services or operated for the benefit of a particular organization. Data center equipment, for example, is generally mounted in rack cabinets, which are usually placed in single rows forming corridors (e.g., aisles) between them. Firewall 130 creates a barrier between data center 120 and network 110 by controlling incoming and outgoing network traffic based on a rule set.
Optional core switch/router 140 is a high-capacity switch/router that serves as a gateway to network 110 and provides communications between ToR switches 1501 and 150x, and between ToR switches 1501 and 150x and network 110. ToR switches 1501 and 150x connect physical hosts 1601,1-1601,y and 160x,1-160x,y (respectively) together and to network 110 (optionally through core switch/router 140). For example, ToR switches 1501-150x use a form of packet switching to forward data to a destination physical host (of physical hosts 1601,1-160x,y) and (only) transmit a received message to the physical host for which the message was intended.
In some embodiments, physical hosts 1601,1-160x,y are computing devices that act as computing servers such as blade servers. Computing devices are described further in relation to
Host operating system 220 can include a container engine 230. Container engine 230 can create and manage containers 2401-240z, for example, using an (high-level) application programming interface (API). By way of non-limiting example, container engine 230 is at least one of Docker®, Rocket (rkt), Solaris Containers, and the like. For example, container engine 230 may create a container (e.g., one of containers 2401-240z) using an image. An image can be a (read-only) template comprising multiple layers and can be built from a base image (e.g., for host operating system 220) using instructions (e.g., run a command, add a file or directory, create an environment variable, indicate what process (e.g., application or service) to run, etc.). Each image may be identified or referred to by an image type. In some embodiments, images (e.g., different image types) are stored and delivered by a system (e.g., server side application) referred to as a registry or hub (not shown in
Container engine 230 can allocate a filesystem of host operating system 220 to the container and add a read-write layer to the image. Container engine 230 can create a network interface that allows the container to communicate with hardware 210 (e.g., talk to a local host). Container engine 230 can set up an Internet Protocol (IP) address for the container (e.g., find and attach an available IP address from a pool). Container engine 230 can launch a process (e.g., application or service) specified by the image (e.g., run an application, such as one of APP 2501-250z, described further below). Container engine 230 can capture and provide application output for the container (e.g., connect and log standard input, outputs and errors). The above examples are only for illustrative purposes and are not intended to be limiting.
Containers 2401-240z can be created by container engine 230. In some embodiments, containers 2401-240z are each an environment as close as possible to an installation of host operating system 220, but without the need for a separate kernel. For example, containers 2401-240z share the same operating system kernel with each other and with host operating system 220. Each container of containers 2401-240Z can run as an isolated process in user space on host operating system 220. Shared parts of host operating system 220 can be read only, while each container of containers 2401-240z can have its own mount for writing. Each of containers 2401-240z can be referred to as workloads and/or endpoints. Workloads can generally be various combinations and permutations of virtual machines, containers (e.g., containers 2401-240z shown in
Containers 2401-240z can include one or more applications or services (APP) 2501-250z (and all of their respective dependencies). APP 2501-250z can be any application or service. By way of non-limiting example, APP 2501-250z can be a database (e.g., Microsoft® SQL Server®, MongoDB, HTFS, MySQL®, Oracle® database, etc.), email server (e.g., Sendmail®, Postfix, qmail, Microsoft® Exchange Server, etc.), message queue (e.g., Apache® Qpid™, RabbitMQ®, etc.), web server (e.g., Apache® HTTP Server™, Microsoft® Internet Information Services (IIS), Nginx, etc.), Session Initiation Protocol (SIP) server (e.g., Kamailio® SIP Server, Avaya® Aura® Application Server 5300, etc.), other media server (e.g., video and/or audio streaming, live broadcast, etc.), file server (e.g., Linux server, Microsoft® Windows Server®, Network File System (NFS), HTTP File Server (HFS), Apache® Hadoop®, etc.), service-oriented architecture (SOA) and/or microservices process, object-based storage (e.g., Lustre®, EMC® Centera®, Scality® RING®, etc.), directory service (e.g., Microsoft® Active Directory®, Domain Name System (DNS) hosting service, etc.), monitoring service (e.g., Zabbix®, Qualys®, HP® Business Technology Optimization (BTO; formerly OpenView), etc.), logging service (e.g., syslog-ng, Splunk®, etc.), and the like.
In contrast to hypervisor-based virtualization (e.g., virtual machines (VMs); not shown in
Orchestration layer 310 can manage and deploy containers 2401,1-240W,Z across one or more environments 2001-200W in one or more data centers of data center 120 (
In some embodiments, deception point 410 comprises host operating system 430 and one or more emulations 4201-420R. Host operating system 1030 can be an operating system described above in relation to
One or more emulations 4201-420R can be programs (e.g., running as daemons on host operating system 430) that emulate/imitate one or more actual workloads/servers in data center 120 (
The emulation/imitation can be rudimentary to sophisticated. By way of non-limiting example, (one of) emulations 4201-420R can provide a simple login window (e.g., username and password prompt) to learn what credential attacker 450 uses. By way of further non-limiting example, (one of) emulations 4201-420R include a fake hostname and emulate the shell of a Linux server to observe methodologies employed by attacker 450. (One of) Emulations 4201-420R can allow attacker 450 to load (and install) a file on deception point 410, and the file can subsequently be analyzed for malware. Malware can include a computer virus, worm, Trojan horse, ransomware, spyware, adware, scareware, and other malicious programs.
Each of emulations 4201-420R can be specifically developed to emulate a particular application and/or service. Moreover, particular implementations and versions of an application and/or service can be emulated. For example, an emulated http server can imitate one (and a version thereof) of: Apache® HTTP Server™, Microsoft® IIS), Nginx, Google Web Server (GWS), and the like. By way of further non-limiting example, an emulated directory service can be a particular one of (and a version thereof): Microsoft® Active Directory®, Domain Name System (DNS) hosting service, and the like. Other applications and services (and versions thereof) can be emulated. Since each of one or more emulations 4201-420R is custom developed to emulate a particular application and/or service (and a version thereof), the imitation can be rudimentary to sophisticated, depending on the complexity of a particular one of emulations 4201-420R. However, writing/coding an emulation (e.g., one of emulations 4201-420R) to support each of the numerous different applications and/or services (and versions thereof) can require an impractically large amount of time, money, and other resources.
In some embodiments, emulations 4201-420R provide multiple emulations/imitations using one identification (e.g., hostname, IP address, etc.). In various embodiments, emulations 4201-420R provide certain emulations/imitations using a particular identification (e.g., hostname, IP address, etc.) associated with the one or more emulations/imitations. By way of non-limiting example, a command-line login for SSH and a basic Apache® HTTP Server™ for HTTP can be provided using one identification or separate identifications (e.g., hostname, IP address, etc.).
Manager 460 can manage/configure (one or more of) deception point 410 (e.g., using a management port). For example, adding and/or removing an emulation of emulations 4201-420R running in deception point 410. Manager 460 can receive a log of incoming and/or outgoing packets (e.g., source address, source port, destination address, destination port, protocol, etc.) and the like from deception point 780A.
Attacker 450 can be a computing system employed by one or more persons (unauthorized user or “hacker”) who seek and exploit weaknesses in data center 120 (
Deception point 560 has at least some of the characteristics of deception point 460 described above in relation to
In some embodiments, deception point 560 comprises a host operating system 550, container engine 530, monitoring logic 540, one or more containers 5201-520S, and one or more applications and/or services 5251-525S. Host operating system 550, container engine 530, one or more containers 5201-520S, and one or more applications and/or services (APPs) 5251-525S can have at least some of the characteristics of host operating system 220 (and operating systems as described below in relation to
For example, one or more applications and/or services (APP) 5251-525S can be any of applications and/or services (APP) 2501-250z (
In addition to or instead of emulations 4201-420R (
For example, when it is desirable/advantageous to emulate an Apache® HTTP Server™ version 2.4.23 in deception point 510, manager 560 retrieves an image for Apache® HTTP Server™ version 2.4.23 from repository 570. Using the Apache® HTTP Server™ version 2.4.23 image, container engine 530 can create and manage a container (of containers 5201-520S) (e.g., as described above in relation to
Deception point 510 can be said to emulate/imitate an application and/or service, insofar as deception point 510 does not use real data. By way of non-limiting example, if the application and/or service is a customer database, then real customer information is not used by deception point 520. By way of further non-limiting example, if the application and/or service is an authentication server, then provided usernames and/or passwords are checked against fake ones (or not really checked) and a fake cryptographic ticket is (automatically) provided. However, deception point 510 can use the same containerized application and/or service image as a real production workload does.
Moreover, an image for each version of a particular (containerized) application and/or service can be available. When new version of an (containerized) application and/or service is released (e.g., for actual use), the corresponding image can be used for emulation/imitation by deception point 510 (using one or more containers 5201-520S running one or more applications and/or services 5251-525S).
Hence, custom software does not necessarily have to be written for each emulation (such as in emulations 4201-420R (
Monitoring logic 540 can be an application(s) which monitors operation of (decoy) applications and/or services (APPs) 5251-525S in response to interactions with attacker 450. In some embodiments, monitoring logic 540 is logically interposed between host operating system 550 and (decoy) applications and/or services (APPs) 5251-525S. In some embodiments, monitoring logic 540 can include one or more system monitors. For example, monitoring logic 540 hooks (e.g., intercepts) library calls, function calls, messages, events, and the like passed between software components (e.g., in one or more containers 5201-520S).
By way of further non-limiting example, monitoring logic 540 includes (features and/or functions of) one or more of the following: an application programming interface (API), Linux/etc/ld.so.preload, ptrace (e.g., an abbreviation of “process trace,” can be a system call used to allow one process to control another, enabling the controlling process to inspect and manipulate the internal state of the target process), a daemon which tracks changes to a file, strace (e.g., a program that traces/monitors interactions between processes in one or more containers 5201-520S and operating system 550, which include system calls, signal deliveries, and changes of process state), struss (e.g., a program that traces system calls), tcpdump (e.g., a packets sniffer or package analyzer tool which is used to capture or filter TCP/IP packets that received transferred over a network on a specific interface(s)), and the like.
By way of further non-limiting example, monitoring logic 540 launches a malware scanner (e.g., internal and/or external to monitoring logic 540) to analyze suspect files which are (e.g., by attacker 450) uploaded (to deception point 510), modified, and the like. For example, monitoring logic can send the suspect file to a malware scanner (e.g., inside and/or outside of data center 100 (
In some embodiments, monitoring logic 540 maintains a whitelist of legitimate/authorized actions and/or objects (e.g., DNS query, files of a particular type, URL, hash of an executable file, and the like) such that actions and/or objects not on the whitelist are at least one of: identified as potentially malicious, and further monitored and/or analyzed. An alert can be issued for behaviors not on the whitelist. For example, a (initial) whitelist can be produced using trainer 580. Trainer 580 can connect with deception point 510 to emulate normal/expected user/client interaction with an actual workload (imitated by deception point 510). Deception point 510 can log the behaviors (e.g., changes to files, processes, and network connections) and provide the log to manager 560. Manager 560 can provide the log of behaviors to staff of an information technology (IT) organization (e.g., associated with deception point 510) to identify benign behaviors. Behaviors classified as benign can be stored in the whitelist.
Monitoring logic 540 can additionally or alternatively flag when a container crashes or check for a container crash (e.g., when a container of one or more containers 5201-520S stops functioning properly) and/or restarts, such as to (subsequently) identify the root cause. By way of additional non-limiting example, monitoring logic 540 detects efforts (e.g., by attacker 450) to crash and/or detect/identify a container of one or more containers 5201-520S. Monitoring logic 540 can additionally or alternatively detect efforts (e.g., by attacker 450) to crash and/or detect/identify a container of one or more containers 5201-520S. Monitoring logic 540 can additionally or alternatively scan for patterns (e.g., represented using regular expressions) of an uploaded files (e.g., by attacker 450). By way of further non-limiting example, monitoring logic 540 analyzes (or sends to manger 650 for analysis) service logs produced by a container of one or more containers 5201-520S.
Repository 570 can be a public registry and/or a private registry. Registries and images were described above in relation to
In some embodiments, manager 560 can perform at least some of the operations of an orchestration layer (e.g., orchestration layer 410 (
In some embodiments, various combinations and permutations of network communications devices (not depicted in
At step 620, a container with the application and/or service is instantiated. In some embodiments, container engine 530 (
At step 630, a network communication is received and directed to the appropriate application and/or service. For example, the network communication is addressed to a particular application and/or service for which there is a decoy (e.g., container running the particular application and/or service) and the communication is provided to the container running the particular application and/or service. In various embodiments, attacker 450 accesses or uses the application and/or service imitated by the application and/or service in the container (functioning as a decoy). For example, the network communication can includes one or more commands, including instructions and data.
At step 640, the network communication is processed using the application instance (operating as a decoy). In some embodiments, an instruction and data in the network communication is processed by one of application and/or service APP 5251-525S. For example, one of application and/or service APP 5251-525S is a directory service and the network communication includes a query against the name service with a domain name and/or host name. By way of further non-limiting example, one of application and/or service APP 5251-525S is an authentication server which provides a network service for authenticating credentials and the network communication includes an account name and password. By way of additional non-limiting example, one of application and/or service APP 5251-525S is a web application which is a client-server software application in which the client (or user interface) runs in a web browser (e.g., running on a Red Hat® JBoss® application server) and the network communication includes input to the web application.
At step 650, a response to the network communication is provided. In some embodiments, some output from the processing is sent to the originator of the network communication, such as attacker 450 (
At step 660, behavior arising from the processing is logged and monitored. In some embodiments, monitoring logic monitors behaviors/changes (e.g., inbound and outbound network connections; process creation, changes, and removal; file and directory creation, change, and removal; memory usage change; disk usage change; network connection bonding of processes; and the like) caused/made by the application and/or service (e.g., one of APP 5251-525S) in response to the processing. In some embodiments, various combinations of steps 640-660 are performed concurrently and/or sequentially in any order.
Optionally at step 670, a log including the received (potentially) malicious communication, the response, and other logged activity can be provided. For example, the log can be provided to manager 560 (
Optionally, steps 630-660 can be performed (e.g., concurrently and/or sequentially in any order) for a predetermined amount of time (e.g., specified in application image metadata as described below in relation to
Test bench 710 can be combinations and permutations of a computing system as described below in relation to
Verification logic 740 can be an application which checks compatibility between application and/or service (APP) 725 and deception point 510 (
By way of further non-limiting example, verification logic 740 applies monitoring logic 540 to application and/or service (APP) 725 and checks that one or more hooks of monitoring logic 540 (described above in relation to
Production registry 770 can include images from a public registry and/or a private registry, where the images have been examined by staff of an information technology (IT) organization (e.g., associated with deception point 510) and approved for actual use (e.g., used in one or more of data centers 120 (
At step 820, a container with the application and/or service is instantiated. In some embodiments, container engine 730 (
At step 830, the container with the application and/or service is tested for compatibility with a deception point. In some embodiments, container 710 with application and/or service (APP) 725 is tested using verification logic 740 for compatibility with deception point 510 (
At step 840, the image is classified and/or scored. In some embodiments, the image is classified as at least one of incompatible, partially compatible, and compatible, using the results of the testing. Alternatively, the image can be scored using a range of numbers (e.g., 1-10, 1-100, and the like) and/or letters (e.g., A, B, C, D, and F), where incompatible, partially compatible, and fully compatible correspond to a predetermined range of numbers and/or letters. For example, a score of 10, 100, and A are fully compatible; a score of 5-9, 50-99, and C-B are partially compatible; and a score of 1-4, 1-49, and F-D are incompatible. In various embodiments, a partial compatibility classification and/or score denotes for each monitoring feature which are compatible and/or incompatible with the image. Other ranges of numbers, letters, and predetermined ranges for classification can be used. The classification and/or score can be provided to manager 760 (
At step 850, an indication to store the application image (and optionally the classification) are provided. In some embodiments, an indication to store the application image (e.g., the application image itself, a request, message, instruction, flag, tag, and the like) is provided to manager 760 (
The components shown in
Mass data storage 930, which can be implemented with a magnetic disk drive, solid state drive, or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit(s) 910. Mass data storage 930 stores the system software for implementing embodiments of the present disclosure for purposes of loading that software into main memory 920.
Portable storage device 940 operates in conjunction with a portable non-volatile storage medium, such as a flash drive, floppy disk, compact disk, digital video disc, or Universal Serial Bus (USB) storage device, to input and output data and code to and from the computer system 900 in
User input devices 960 can provide a portion of a user interface. User input devices 760 may include one or more microphones, an alphanumeric keypad, such as a keyboard, for inputting alphanumeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. User input devices 960 can also include a touchscreen. Additionally, the computer system 900 as shown in
Graphics display system 970 include a liquid crystal display (LCD) or other suitable display device. Graphics display system 970 is configurable to receive textual and graphical information and processes the information for output to the display device.
Peripheral device(s) 980 may include any type of computer support device to add additional functionality to the computer system.
The components provided in the computer system 900 in
Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the technology. Those skilled in the art are familiar with instructions, processor(s), and storage media.
In some embodiments, the computing system 900 may be implemented as a cloud-based computing environment, such as a virtual machine operating within a computing cloud. In other embodiments, the computing system 900 may itself include a cloud-based computing environment, where the functionalities of the computing system 900 are executed in a distributed fashion. Thus, the computing system 900, when configured as a computing cloud, may include pluralities of computing devices in various forms, as will be described in greater detail below.
In general, a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors (such as within web servers) and/or that combines the storage capacity of a large grouping of computer memories or storage devices. Systems that provide cloud-based resources may be utilized exclusively by their owners or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud is formed, for example, by a network of web servers that comprise a plurality of computing devices, such as the computing system 600, with each server (or at least a plurality thereof) providing processor and/or storage resources. These servers manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depends on the type of business associated with the user.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the technology. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical, magnetic, and solid-state disks, such as a fixed disk. Volatile media include dynamic memory, such as system random-access memory (RAM). Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a Flash memory, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
Computer program code for carrying out operations for aspects of the present technology may be written in any combination of one or more programming languages, including an object oriented programming language such as JAVA, SMALLTALK, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Aspects of the present technology are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present technology. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.