BR112014016063A8 - método implantado em computador, dispositivos, sistema e meio de armazenamento legível em computados - Google Patents
método implantado em computador, dispositivos, sistema e meio de armazenamento legível em computadosInfo
- Publication number
- BR112014016063A8 BR112014016063A8 BR112014016063A BR112014016063A BR112014016063A8 BR 112014016063 A8 BR112014016063 A8 BR 112014016063A8 BR 112014016063 A BR112014016063 A BR 112014016063A BR 112014016063 A BR112014016063 A BR 112014016063A BR 112014016063 A8 BR112014016063 A8 BR 112014016063A8
- Authority
- BR
- Brazil
- Prior art keywords
- computer
- storage medium
- implemented method
- readable devices
- readable
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL217279A IL217279A0 (en) | 2011-12-29 | 2011-12-29 | Method and system for ensuring authenticity of ip data served by a service provider |
PCT/IL2012/000388 WO2013098804A2 (en) | 2011-12-29 | 2012-12-11 | Method and system for ensuring authenticity of ip data served by a service provider |
Publications (2)
Publication Number | Publication Date |
---|---|
BR112014016063A2 BR112014016063A2 (pt) | 2017-06-13 |
BR112014016063A8 true BR112014016063A8 (pt) | 2017-07-04 |
Family
ID=45855244
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112014016063A BR112014016063A8 (pt) | 2011-12-29 | 2012-12-11 | método implantado em computador, dispositivos, sistema e meio de armazenamento legível em computados |
Country Status (8)
Country | Link |
---|---|
US (1) | US8732304B2 (pt) |
EP (1) | EP2798817A2 (pt) |
JP (1) | JP2015511338A (pt) |
KR (1) | KR20140113705A (pt) |
AU (1) | AU2012360047A1 (pt) |
BR (1) | BR112014016063A8 (pt) |
IL (1) | IL217279A0 (pt) |
WO (1) | WO2013098804A2 (pt) |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013110857A1 (en) * | 2012-01-24 | 2013-08-01 | Ssh Communications Security Oyj | Privileged access auditing |
US20140165037A1 (en) * | 2012-12-12 | 2014-06-12 | Microsoft Corporation | Reusable application user experience |
US20140283002A1 (en) * | 2013-03-15 | 2014-09-18 | Stephen Frechette | Method and system for anonymous circumvention of internet filter firewalls without detection or identification |
GB2513168B (en) * | 2013-04-18 | 2017-12-27 | F Secure Corp | Detecting unauthorised changes to website content |
WO2015052968A1 (ja) * | 2013-10-08 | 2015-04-16 | ソニー株式会社 | サーバ装置、クライアント装置、情報処理方法および記録媒体 |
CN105593831A (zh) * | 2013-10-08 | 2016-05-18 | 索尼公司 | 服务器装置、客户端装置、信息处理方法和记录介质 |
US9825812B2 (en) * | 2013-12-05 | 2017-11-21 | Pulse Secure, Llc | Transparently intercepting and optimizing resource requests |
US9762443B2 (en) | 2014-04-15 | 2017-09-12 | Splunk Inc. | Transformation of network data at remote capture agents |
US10127273B2 (en) | 2014-04-15 | 2018-11-13 | Splunk Inc. | Distributed processing of network data using remote capture agents |
US10700950B2 (en) | 2014-04-15 | 2020-06-30 | Splunk Inc. | Adjusting network data storage based on event stream statistics |
US10360196B2 (en) | 2014-04-15 | 2019-07-23 | Splunk Inc. | Grouping and managing event streams generated from captured network data |
US11086897B2 (en) | 2014-04-15 | 2021-08-10 | Splunk Inc. | Linking event streams across applications of a data intake and query system |
US9838512B2 (en) | 2014-10-30 | 2017-12-05 | Splunk Inc. | Protocol-based capture of network data using remote capture agents |
US10462004B2 (en) | 2014-04-15 | 2019-10-29 | Splunk Inc. | Visualizations of statistics associated with captured network data |
US11281643B2 (en) | 2014-04-15 | 2022-03-22 | Splunk Inc. | Generating event streams including aggregated values from monitored network data |
US10693742B2 (en) | 2014-04-15 | 2020-06-23 | Splunk Inc. | Inline visualizations of metrics related to captured network data |
US10366101B2 (en) | 2014-04-15 | 2019-07-30 | Splunk Inc. | Bidirectional linking of ephemeral event streams to creators of the ephemeral event streams |
US10523521B2 (en) | 2014-04-15 | 2019-12-31 | Splunk Inc. | Managing ephemeral event streams generated from captured network data |
US9923767B2 (en) | 2014-04-15 | 2018-03-20 | Splunk Inc. | Dynamic configuration of remote capture agents for network data capture |
US12028208B1 (en) | 2014-05-09 | 2024-07-02 | Splunk Inc. | Selective event stream data storage based on network traffic volume |
US9083739B1 (en) | 2014-05-29 | 2015-07-14 | Shape Security, Inc. | Client/server authentication using dynamic credentials |
US9210171B1 (en) | 2014-05-29 | 2015-12-08 | Shape Security, Inc. | Selectively protecting valid links to pages of a web site |
US9832204B2 (en) * | 2014-09-19 | 2017-11-28 | D2L Corporation | Method and system for managing security compatibility of electronic content |
US9800602B2 (en) | 2014-09-30 | 2017-10-24 | Shape Security, Inc. | Automated hardening of web page content |
US9596253B2 (en) | 2014-10-30 | 2017-03-14 | Splunk Inc. | Capture triggers for capturing network data |
US9529994B2 (en) | 2014-11-24 | 2016-12-27 | Shape Security, Inc. | Call stack integrity check on client/server systems |
US10334085B2 (en) | 2015-01-29 | 2019-06-25 | Splunk Inc. | Facilitating custom content extraction from network packets |
US20160261715A1 (en) * | 2015-03-05 | 2016-09-08 | Sentrix Web Technologies Ltd. | System and method for securing a web server |
US10021128B2 (en) | 2015-03-12 | 2018-07-10 | Forcepoint Llc | Systems and methods for malware nullification |
US9986014B2 (en) * | 2015-03-27 | 2018-05-29 | Intel Corporation | Systems and techniques for web communication |
US9608975B2 (en) | 2015-03-30 | 2017-03-28 | Shape Security, Inc. | Challenge-dynamic credential pairs for client/server request validation |
US9749295B2 (en) * | 2015-04-16 | 2017-08-29 | Raytheon Company | Systems and methods for internet traffic analysis |
US9986058B2 (en) | 2015-05-21 | 2018-05-29 | Shape Security, Inc. | Security systems for mitigating attacks from a headless browser executing on a client computer |
RU2610254C2 (ru) * | 2015-06-30 | 2017-02-08 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ определения измененных веб-страниц |
WO2017007705A1 (en) | 2015-07-06 | 2017-01-12 | Shape Security, Inc. | Asymmetrical challenges for web security |
US10216488B1 (en) | 2016-03-14 | 2019-02-26 | Shape Security, Inc. | Intercepting and injecting calls into operations and objects |
JP6762264B2 (ja) * | 2017-05-22 | 2020-09-30 | 株式会社沖データ | 画像形成装置 |
EP3832513A1 (en) | 2019-12-06 | 2021-06-09 | Vocalink Limited | An apparatus, computer program and method |
EP3832514A1 (en) * | 2019-12-06 | 2021-06-09 | Vocalink Limited | An apparatus, computer program and method |
JP2021008115A (ja) * | 2020-09-08 | 2021-01-28 | 株式会社沖データ | 画像形成装置 |
CN115242766B (zh) * | 2022-08-02 | 2024-07-19 | 亚数信息科技(上海)有限公司 | 一种基于二层网桥的https透明网关的方法 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7296274B2 (en) * | 1999-11-15 | 2007-11-13 | Sandia National Laboratories | Method and apparatus providing deception and/or altered execution of logic in an information system |
US20050050337A1 (en) | 2003-08-29 | 2005-03-03 | Trend Micro Incorporated, A Japanese Corporation | Anti-virus security policy enforcement |
US7979368B2 (en) | 2005-07-01 | 2011-07-12 | Crossbeam Systems, Inc. | Systems and methods for processing data flows |
US7877801B2 (en) * | 2006-05-26 | 2011-01-25 | Symantec Corporation | Method and system to detect malicious software |
US9237166B2 (en) | 2008-05-13 | 2016-01-12 | Rpx Corporation | Internet search engine preventing virus exchange |
CN101626368A (zh) | 2008-07-11 | 2010-01-13 | 中联绿盟信息技术(北京)有限公司 | 一种防止网页被篡改的设备、方法和系统 |
GB2463467B (en) | 2008-09-11 | 2013-03-06 | F Secure Oyj | Malware detection method and apparatus |
US20100199345A1 (en) | 2009-02-04 | 2010-08-05 | Breach Security, Inc. | Method and System for Providing Remote Protection of Web Servers |
US9154364B1 (en) * | 2009-04-25 | 2015-10-06 | Dasient, Inc. | Monitoring for problems and detecting malware |
US8353037B2 (en) * | 2009-12-03 | 2013-01-08 | International Business Machines Corporation | Mitigating malicious file propagation with progressive identifiers |
US8914879B2 (en) * | 2010-06-11 | 2014-12-16 | Trustwave Holdings, Inc. | System and method for improving coverage for web code |
-
2011
- 2011-12-29 IL IL217279A patent/IL217279A0/en unknown
-
2012
- 2012-01-06 US US13/345,408 patent/US8732304B2/en not_active Expired - Fee Related
- 2012-12-11 JP JP2014549629A patent/JP2015511338A/ja active Pending
- 2012-12-11 AU AU2012360047A patent/AU2012360047A1/en not_active Abandoned
- 2012-12-11 WO PCT/IL2012/000388 patent/WO2013098804A2/en active Application Filing
- 2012-12-11 BR BR112014016063A patent/BR112014016063A8/pt not_active Application Discontinuation
- 2012-12-11 KR KR1020147021372A patent/KR20140113705A/ko not_active Application Discontinuation
- 2012-12-11 EP EP12821059.8A patent/EP2798817A2/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
AU2012360047A1 (en) | 2014-07-17 |
WO2013098804A3 (en) | 2013-10-17 |
IL217279A0 (en) | 2012-02-29 |
WO2013098804A2 (en) | 2013-07-04 |
US20130173782A1 (en) | 2013-07-04 |
US8732304B2 (en) | 2014-05-20 |
BR112014016063A2 (pt) | 2017-06-13 |
KR20140113705A (ko) | 2014-09-24 |
EP2798817A2 (en) | 2014-11-05 |
JP2015511338A (ja) | 2015-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112014016063A8 (pt) | método implantado em computador, dispositivos, sistema e meio de armazenamento legível em computados | |
BR112016001933A2 (pt) | sistema e método de preparação de bebida, e, meio de armazenamento legível por computador | |
BR112014004809A2 (pt) | sistema, método, e, veículo | |
BR112015009932A2 (pt) | método e sistema. | |
BR112014019965A2 (pt) | método implantado por computador e sistema de recuperação de desempenho | |
BR112012028663A2 (pt) | método, e, sistema | |
BR112013015551A2 (pt) | método, e, sistema | |
BR112013015550A2 (pt) | método, e, sistema | |
BR112013015547A2 (pt) | método, e, sistema | |
BR112013018981A2 (pt) | sistema e método | |
BR112014002937A2 (pt) | sistema e método de segurança | |
BR112014009988A2 (pt) | método, sistema de computador, meio legível por computador | |
BR112013030520A2 (pt) | método, sistema, e, composição. | |
BR112014013743A2 (pt) | sistema e método | |
BR112013030471A2 (pt) | método implementado por computador e sistema. | |
BR112013021971A2 (pt) | sistema médico e método. | |
BR112015029662A2 (pt) | sistema, e método | |
BR112014026864A2 (pt) | sistema, e método | |
BR112015009390A2 (pt) | método implantado por computador, sistema, mecanismo e meio legível por computador não transitório | |
BR112014013600A2 (pt) | sistema e método | |
BR112013015496A2 (pt) | método, sistema, e, meio legível por máquina não transitório | |
BR112014004808A2 (pt) | sistema, método, e, veículo | |
BR112013004072A2 (pt) | aparelho, método e meio de armazenamento legível por computador | |
BR112013015548A2 (pt) | método, e, sistema | |
BR112014010201A8 (pt) | método, e sistema de levantamento |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B11A | Dismissal acc. art.33 of ipl - examination not requested within 36 months of filing | ||
B11Y | Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette] | ||
B350 | Update of information on the portal [chapter 15.35 patent gazette] |