MX2015010893A - Systems and methods of risk based rules for application control. - Google Patents
Systems and methods of risk based rules for application control.Info
- Publication number
- MX2015010893A MX2015010893A MX2015010893A MX2015010893A MX2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A
- Authority
- MX
- Mexico
- Prior art keywords
- module
- rule
- application
- risk information
- systems
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules database, and a rule module. The monitor module may be configured to monitor a device for an instruction to execute a legitimate application. The application identification module may be configured to identify one or more attributes of the legitimate application. The vulnerability module may be configured to retrieve risk information based on the one or more attributes of the legitimate application. The risk information may be determined from known vulnerabilities of the legitimate application. The rules database may be for storing a rule associated with the risk information. The rule module may be configured to retrieve the rule from the rule database based on the risk information and to control the legitimate application based on the rule.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361768809P | 2013-02-25 | 2013-02-25 | |
US14/156,375 US20140201843A1 (en) | 2013-01-15 | 2014-01-15 | Systems and methods for identifying and reporting application and file vulnerabilities |
PCT/US2014/016976 WO2014130472A1 (en) | 2013-02-25 | 2014-02-18 | Systems and methods of risk based rules for application control |
Publications (2)
Publication Number | Publication Date |
---|---|
MX2015010893A true MX2015010893A (en) | 2016-05-05 |
MX349569B MX349569B (en) | 2017-08-03 |
Family
ID=51391742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2015010893A MX349569B (en) | 2013-02-25 | 2014-02-18 | Systems and methods of risk based rules for application control. |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP2959418A4 (en) |
JP (1) | JP6134395B2 (en) |
AU (2) | AU2014219077A1 (en) |
CA (1) | CA2902110C (en) |
MX (1) | MX349569B (en) |
SG (1) | SG11201506642PA (en) |
WO (1) | WO2014130472A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10445505B2 (en) * | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
RU2595511C2 (en) * | 2014-12-05 | 2016-08-27 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of trusted applications operation in the presence of suspicious applications |
US9858410B2 (en) * | 2015-10-26 | 2018-01-02 | Symantec Corporation | Techniques for automated application analysis |
CN106537344A (en) * | 2016-03-30 | 2017-03-22 | 北京小米移动软件有限公司 | A method and apparatus for managing application calls |
JP7091354B2 (en) * | 2017-02-27 | 2022-06-27 | イヴァンティ,インコーポレイテッド | Systems and methods for context-based mitigation of computer security risks |
US11609984B2 (en) * | 2018-02-14 | 2023-03-21 | Digital Guardian Llc | Systems and methods for determining a likelihood of an existence of malware on an executable |
EP3591556A1 (en) * | 2018-07-07 | 2020-01-08 | 1830291 Ontario Inc. | Automated security assessment of information systems |
US11356449B2 (en) * | 2018-10-20 | 2022-06-07 | Walmart Apollo, Llc | Managing access to vulnerability data at scale |
JP7294441B2 (en) * | 2019-10-25 | 2023-06-20 | 日本電気株式会社 | Evaluation device, evaluation system, evaluation method and program |
CN110929267A (en) * | 2019-11-29 | 2020-03-27 | 深信服科技股份有限公司 | Code vulnerability detection method, device, equipment and storage medium |
JP7215525B2 (en) * | 2020-04-08 | 2023-01-31 | 日本電気株式会社 | Terminal, control method and program |
WO2022000024A1 (en) * | 2020-06-29 | 2022-01-06 | Blue Eagle Technologies Pty Limited | A method for securing a software application |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040225877A1 (en) * | 2003-05-09 | 2004-11-11 | Zezhen Huang | Method and system for protecting computer system from malicious software operation |
EP1583013A1 (en) * | 2004-03-31 | 2005-10-05 | Swiss Reinsurance Company | Computer-based system and method for detecting risks |
JP4688472B2 (en) * | 2004-11-01 | 2011-05-25 | 株式会社エヌ・ティ・ティ・ドコモ | Terminal control apparatus and terminal control method |
US8006088B2 (en) * | 2005-08-18 | 2011-08-23 | Beyondtrust Corporation | Methods and systems for network-based management of application security |
US20070169199A1 (en) * | 2005-09-09 | 2007-07-19 | Forum Systems, Inc. | Web service vulnerability metadata exchange system |
US20070094735A1 (en) * | 2005-10-26 | 2007-04-26 | Cohen Matthew L | Method to consolidate and prioritize web application vulnerabilities |
US20070180509A1 (en) * | 2005-12-07 | 2007-08-02 | Swartz Alon R | Practical platform for high risk applications |
US20070174824A1 (en) * | 2006-01-23 | 2007-07-26 | Microsoft Corporation | Techniques for generating and executing browser-hosted applications |
WO2008014800A1 (en) * | 2006-07-31 | 2008-02-07 | Telecom Italia S.P.A. | A system for implementing security on telecommunications terminals |
JP4751431B2 (en) * | 2008-09-12 | 2011-08-17 | 株式会社東芝 | Vulnerability determination device and program |
US8473508B2 (en) * | 2009-10-01 | 2013-06-25 | Oracle International Corporation | Dynamic rule creation and caching |
JP5585303B2 (en) * | 2010-08-25 | 2014-09-10 | 日本電気株式会社 | Library execution management system, library execution management method and program |
US8738906B1 (en) * | 2011-11-30 | 2014-05-27 | Juniper Networks, Inc. | Traffic classification and control on a network node |
-
2014
- 2014-02-18 SG SG11201506642PA patent/SG11201506642PA/en unknown
- 2014-02-18 AU AU2014219077A patent/AU2014219077A1/en not_active Abandoned
- 2014-02-18 WO PCT/US2014/016976 patent/WO2014130472A1/en active Application Filing
- 2014-02-18 EP EP14754482.9A patent/EP2959418A4/en not_active Withdrawn
- 2014-02-18 JP JP2015558911A patent/JP6134395B2/en active Active
- 2014-02-18 CA CA2902110A patent/CA2902110C/en active Active
- 2014-02-18 MX MX2015010893A patent/MX349569B/en active IP Right Grant
-
2019
- 2019-10-08 AU AU2019246773A patent/AU2019246773B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2019246773A1 (en) | 2019-10-31 |
JP6134395B2 (en) | 2017-05-24 |
SG11201506642PA (en) | 2015-09-29 |
EP2959418A4 (en) | 2016-10-05 |
JP2016513324A (en) | 2016-05-12 |
CA2902110C (en) | 2018-07-31 |
MX349569B (en) | 2017-08-03 |
WO2014130472A1 (en) | 2014-08-28 |
AU2019246773B2 (en) | 2020-10-08 |
EP2959418A1 (en) | 2015-12-30 |
AU2014219077A1 (en) | 2015-09-17 |
CA2902110A1 (en) | 2014-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX349569B (en) | Systems and methods of risk based rules for application control. | |
AU2018383439B2 (en) | Contextual risk monitoring | |
PH12019550067A1 (en) | Iot security service | |
MX370367B (en) | Systems and methods for security and risk assessment and testing of applications. | |
TW201614501A (en) | Systems and methods for segmenting data structures in a memory system | |
GB2525719A8 (en) | Method and system for providing a vulnerability management and verification service | |
MX2015012671A (en) | Systems and methods for defining attributes of attended delivery/pickup locations. | |
EP4277317A3 (en) | Sequencing the validity of access control keys | |
EP4242892A3 (en) | Code pointer authentication for hardware flow control | |
MX2017012016A (en) | User communications with a merchant through a social networking system. | |
WO2014186713A3 (en) | Semantic naming model | |
WO2015177647A3 (en) | Technologies for protecting systems and data to prevent cyber-attacks | |
EP3005202A4 (en) | System and method for biometric authentication with device attestation | |
WO2014016695A3 (en) | Presence-based credential updating | |
WO2014140926A3 (en) | Systems, methods, and computer-readable media for identifying when a subject is likely to be affected by a medical condition | |
WO2018075388A3 (en) | Improved logistical management system | |
BR112016007759A2 (en) | "Systems and methods for collecting, tracking and storing system performance and event data for computing devices." | |
MX346915B (en) | Systems and methods for secure processing with embedded cryptographic unit. | |
EP3398091A4 (en) | System, method, and device for unified access control on federated database | |
GB2555340A (en) | Protection of sensitive data | |
MX2016016009A (en) | Systems and methods for a credential including multiple access privileges. | |
EP3197090A4 (en) | Management system, portable terminal device, management method, information processing method and program | |
BR112014030582A2 (en) | information processing device, server, information processing method, and program. | |
WO2018117968A8 (en) | Systems and methods for automated bulk user registration spanning both a content management system and any software applications embedded therein | |
MX2014008970A (en) | Control method, system and device. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Grant or registration |