BR112014030746A2 - agente de segurança ao nível do núcleo - Google Patents
agente de segurança ao nível do núcleoInfo
- Publication number
- BR112014030746A2 BR112014030746A2 BR112014030746A BR112014030746A BR112014030746A2 BR 112014030746 A2 BR112014030746 A2 BR 112014030746A2 BR 112014030746 A BR112014030746 A BR 112014030746A BR 112014030746 A BR112014030746 A BR 112014030746A BR 112014030746 A2 BR112014030746 A2 BR 112014030746A2
- Authority
- BR
- Brazil
- Prior art keywords
- level security
- core
- security agent
- malicious code
- events
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Debugging And Monitoring (AREA)
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/492,672 US9043903B2 (en) | 2012-06-08 | 2012-06-08 | Kernel-level security agent |
| PCT/US2013/040420 WO2013184281A1 (en) | 2012-06-08 | 2013-05-09 | Kernel-level security agent |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BR112014030746A2 true BR112014030746A2 (pt) | 2017-06-27 |
Family
ID=49712456
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR112014030746A BR112014030746A2 (pt) | 2012-06-08 | 2013-05-09 | agente de segurança ao nível do núcleo |
Country Status (10)
| Country | Link |
|---|---|
| US (6) | US9043903B2 (enExample) |
| EP (3) | EP2859493B1 (enExample) |
| JP (2) | JP6212548B2 (enExample) |
| AU (1) | AU2013272198A1 (enExample) |
| BR (1) | BR112014030746A2 (enExample) |
| CA (1) | CA2872786A1 (enExample) |
| IL (1) | IL235905B (enExample) |
| IN (1) | IN2014DN09583A (enExample) |
| SG (1) | SG11201407292QA (enExample) |
| WO (1) | WO2013184281A1 (enExample) |
Families Citing this family (110)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US8510596B1 (en) | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
| US10210162B1 (en) | 2010-03-29 | 2019-02-19 | Carbonite, Inc. | Log file management |
| CA2829104C (en) * | 2011-03-09 | 2019-01-15 | Irdeto B.V. | Method and system for dynamic platform security in a device operating system |
| US9043903B2 (en) * | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
| US9715325B1 (en) | 2012-06-21 | 2017-07-25 | Open Text Corporation | Activity stream based interaction |
| US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
| US10409980B2 (en) * | 2012-12-27 | 2019-09-10 | Crowdstrike, Inc. | Real-time representation of security-relevant system state |
| US10127379B2 (en) * | 2013-03-13 | 2018-11-13 | Mcafee, Llc | Profiling code execution |
| WO2014145805A1 (en) | 2013-03-15 | 2014-09-18 | Mandiant, Llc | System and method employing structured intelligence to verify and contain threats at endpoints |
| US9740886B2 (en) * | 2013-03-15 | 2017-08-22 | Sony Interactive Entertainment Inc. | Enhanced security for hardware decoder accelerator |
| US9158914B2 (en) * | 2013-04-19 | 2015-10-13 | Crowdstrike, Inc. | Executable component injection utilizing hotpatch mechanisms |
| US9852290B1 (en) * | 2013-07-12 | 2017-12-26 | The Boeing Company | Systems and methods of analyzing a software component |
| WO2015038944A1 (en) | 2013-09-12 | 2015-03-19 | Virsec Systems, Inc. | Automated runtime detection of malware |
| KR102125923B1 (ko) * | 2013-10-24 | 2020-06-24 | 삼성전자 주식회사 | 전자 장치의 운영체제 업그레이드 방법 및 장치 |
| US20150222646A1 (en) * | 2014-01-31 | 2015-08-06 | Crowdstrike, Inc. | Tagging Security-Relevant System Objects |
| US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
| US9866581B2 (en) | 2014-06-30 | 2018-01-09 | Intuit Inc. | Method and system for secure delivery of information to computing environments |
| US10757133B2 (en) | 2014-02-21 | 2020-08-25 | Intuit Inc. | Method and system for creating and deploying virtual assets |
| US9276945B2 (en) * | 2014-04-07 | 2016-03-01 | Intuit Inc. | Method and system for providing security aware applications |
| US10289405B2 (en) * | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
| US11294700B2 (en) | 2014-04-18 | 2022-04-05 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
| US9798882B2 (en) | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
| US10686759B2 (en) | 2014-06-22 | 2020-06-16 | Webroot, Inc. | Network threat prediction and blocking |
| EP3161715A1 (en) | 2014-06-24 | 2017-05-03 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
| US10356109B2 (en) * | 2014-07-21 | 2019-07-16 | Entit Software Llc | Security indicator linkage determination |
| US10102082B2 (en) | 2014-07-31 | 2018-10-16 | Intuit Inc. | Method and system for providing automated self-healing virtual assets |
| US9710648B2 (en) * | 2014-08-11 | 2017-07-18 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
| US10102374B1 (en) | 2014-08-11 | 2018-10-16 | Sentinel Labs Israel Ltd. | Method of remediating a program and system thereof by undoing operations |
| US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
| US9940336B2 (en) * | 2014-10-24 | 2018-04-10 | Splunk Inc. | File monitoring |
| US9565093B1 (en) * | 2014-12-15 | 2017-02-07 | Symantec Corporation | Systems and methods for anticipating file-security queries |
| US10395133B1 (en) | 2015-05-08 | 2019-08-27 | Open Text Corporation | Image box filtering for optical character recognition |
| US10599844B2 (en) | 2015-05-12 | 2020-03-24 | Webroot, Inc. | Automatic threat detection of executable files based on static data analysis |
| US10032041B2 (en) * | 2015-05-30 | 2018-07-24 | Apple Inc. | Storage volume protection using restricted resource classes |
| KR101666176B1 (ko) * | 2015-06-25 | 2016-10-14 | 한국전자통신연구원 | 안드로이드 플랫폼 기반의 어플리케이션 모니터링 장치 및 방법 |
| US10289686B1 (en) | 2015-06-30 | 2019-05-14 | Open Text Corporation | Method and system for using dynamic content types |
| US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
| US10216927B1 (en) | 2015-06-30 | 2019-02-26 | Fireeye, Inc. | System and method for protecting memory pages associated with a process using a virtualization layer |
| US10395029B1 (en) | 2015-06-30 | 2019-08-27 | Fireeye, Inc. | Virtual system and method with threat protection |
| US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
| US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
| US10339316B2 (en) * | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
| US10033759B1 (en) | 2015-09-28 | 2018-07-24 | Fireeye, Inc. | System and method of threat detection under hypervisor control |
| CN105389197B (zh) * | 2015-10-13 | 2019-02-26 | 北京百度网讯科技有限公司 | 用于基于容器的虚拟化系统的操作捕获方法和装置 |
| CN108293039B (zh) * | 2015-11-17 | 2021-08-10 | 慧与发展有限责任合伙企业 | 处理网络威胁的计算设备、方法和存储介质 |
| US10257223B2 (en) * | 2015-12-21 | 2019-04-09 | Nagravision S.A. | Secured home network |
| US20170195364A1 (en) * | 2016-01-06 | 2017-07-06 | Perception Point Ltd. | Cyber security system and method |
| AU2017223566B2 (en) | 2016-02-23 | 2021-10-21 | VMware LLC | Cybersecurity systems and techniques |
| US12248560B2 (en) | 2016-03-07 | 2025-03-11 | Crowdstrike, Inc. | Hypervisor-based redirection of system calls and interrupt-based task offloading |
| US12339979B2 (en) * | 2016-03-07 | 2025-06-24 | Crowdstrike, Inc. | Hypervisor-based interception of memory and register accesses |
| US11188651B2 (en) * | 2016-03-07 | 2021-11-30 | Crowdstrike, Inc. | Hypervisor-based interception of memory accesses |
| JP2019511055A (ja) | 2016-03-24 | 2019-04-18 | カーボン ブラック, インコーポレイテッド | サイバーセキュリティインシデントに対する応答を誘導するためのシステムおよび技術 |
| US10243972B2 (en) * | 2016-04-11 | 2019-03-26 | Crowdstrike, Inc. | Correlation-based detection of exploit activity |
| US10044744B1 (en) | 2016-04-26 | 2018-08-07 | EMC IP Holding Company LLC | Covert storage channel communication between computer security agent and security system |
| US10681059B2 (en) | 2016-05-25 | 2020-06-09 | CyberOwl Limited | Relating to the monitoring of network security |
| US11409870B2 (en) * | 2016-06-16 | 2022-08-09 | Virsec Systems, Inc. | Systems and methods for remediating memory corruption in a computer application |
| US10191789B2 (en) * | 2016-08-18 | 2019-01-29 | Crowdstrike, Inc. | Tracing system operations across remote procedure linkages to identify request originators |
| CN106452881B (zh) * | 2016-10-21 | 2019-12-20 | 用友网络科技股份有限公司 | 一种基于云加端模式的运维数据处理系统 |
| US10685111B2 (en) | 2016-10-31 | 2020-06-16 | Crowdstrike, Inc. | File-modifying malware detection |
| US10515226B2 (en) * | 2016-11-21 | 2019-12-24 | Dell Products, L.P. | Systems and methods for protected local backup |
| US11616812B2 (en) | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
| US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
| US10320818B2 (en) * | 2017-02-14 | 2019-06-11 | Symantec Corporation | Systems and methods for detecting malicious computing events |
| US11436317B2 (en) * | 2017-02-21 | 2022-09-06 | Raptor Engineering LLC | Systems and methods for assuring integrity of operating system and software components at runtime |
| US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
| US11238185B2 (en) * | 2017-03-07 | 2022-02-01 | Sennco Solutions, Inc. | Integrated, persistent security monitoring of electronic merchandise |
| US10503545B2 (en) * | 2017-04-12 | 2019-12-10 | At&T Intellectual Property I, L.P. | Universal security agent |
| US10635806B2 (en) * | 2017-05-04 | 2020-04-28 | Crowdstrike, Inc. | Least recently used (LRU)-based event suppression |
| CA3065306A1 (en) | 2017-05-30 | 2018-12-06 | Stewart P. Macleod | Real-time detection of and protection from malware and steganography in a kernel mode |
| JP2019008503A (ja) * | 2017-06-23 | 2019-01-17 | 杉中 順子 | 情報処理監視装置、情報処理監視方法、プログラム、記録媒体及び情報処理装置 |
| US10659432B2 (en) * | 2017-07-06 | 2020-05-19 | Crowdstrike, Inc. | Network containment of compromised machines |
| JP6656211B2 (ja) * | 2017-08-02 | 2020-03-04 | 三菱電機株式会社 | 情報処理装置、情報処理方法及び情報処理プログラム |
| JP2020530922A (ja) * | 2017-08-08 | 2020-10-29 | センチネル ラボ, インコーポレイテッドSentinel Labs, Inc. | エッジネットワーキングのエンドポイントを動的にモデリングおよびグループ化する方法、システム、およびデバイス |
| US10885212B2 (en) | 2017-09-12 | 2021-01-05 | Sophos Limited | Secure management of process properties |
| US11163880B2 (en) * | 2017-09-29 | 2021-11-02 | Crowdstrike, Inc. | Using indirection to facilitate software upgrades |
| US10990664B2 (en) | 2017-11-20 | 2021-04-27 | International Business Machines Corporation | Eliminating and reporting kernel instruction alteration |
| US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
| EP3514717B1 (en) | 2018-01-17 | 2021-03-31 | Crowdstrike, Inc. | Device driver non-volatile backing-store installation |
| US11423186B2 (en) | 2018-01-17 | 2022-08-23 | Crowdstrike, Inc. | Verified inter-module communications interface |
| US11113425B2 (en) | 2018-01-17 | 2021-09-07 | Crowd Strike, Inc. | Security component for devices on an enumerated bus |
| US11470115B2 (en) | 2018-02-09 | 2022-10-11 | Attivo Networks, Inc. | Implementing decoys in a network environment |
| US10728034B2 (en) | 2018-02-23 | 2020-07-28 | Webroot Inc. | Security privilege escalation exploit detection and mitigation |
| CN108429746B (zh) * | 2018-03-06 | 2020-01-03 | 华中科技大学 | 一种面向云租户的隐私数据保护方法及系统 |
| US10762202B2 (en) | 2018-04-11 | 2020-09-01 | Crowdstrike, Inc. | Securely and efficiently providing user notifications about security actions |
| US10333977B1 (en) * | 2018-08-23 | 2019-06-25 | Illusive Networks Ltd. | Deceiving an attacker who is harvesting credentials |
| US11916953B2 (en) * | 2018-09-24 | 2024-02-27 | Cybereason, Inc. | Method and mechanism for detection of pass-the-hash attacks |
| US10983849B2 (en) | 2019-02-28 | 2021-04-20 | Crowdstrike, Inc. | Container application for android-based devices |
| US11314863B2 (en) | 2019-03-27 | 2022-04-26 | Webroot, Inc. | Behavioral threat detection definition and compilation |
| JP7278423B2 (ja) | 2019-05-20 | 2023-05-19 | センチネル ラブス イスラエル リミテッド | 実行可能コード検出、自動特徴抽出及び位置独立コード検出のためのシステム及び方法 |
| EP4022405B1 (en) * | 2019-08-30 | 2024-05-15 | First Watch Limited | Systems and methods for enhancing data provenance by logging kernel-level events |
| US11636204B2 (en) * | 2019-10-01 | 2023-04-25 | Acronis International Gmbh | Systems and methods for countering removal of digital forensics information by malicious software |
| CA3173206A1 (en) * | 2020-03-26 | 2021-09-30 | David Croteau | System and method for automated sensitive information discovery, monitoring and remediation |
| US11645397B2 (en) | 2020-04-15 | 2023-05-09 | Crowd Strike, Inc. | Distributed digital security system |
| US11861019B2 (en) | 2020-04-15 | 2024-01-02 | Crowdstrike, Inc. | Distributed digital security system |
| US11563756B2 (en) | 2020-04-15 | 2023-01-24 | Crowdstrike, Inc. | Distributed digital security system |
| US11616790B2 (en) | 2020-04-15 | 2023-03-28 | Crowdstrike, Inc. | Distributed digital security system |
| US11711379B2 (en) * | 2020-04-15 | 2023-07-25 | Crowdstrike, Inc. | Distributed digital security system |
| KR20230127203A (ko) | 2020-09-22 | 2023-08-31 | 아발린 파마 아이엔씨. | 개선된 에어로졸 매개변수를 위한 분무기 장치 최적화 및 이의 용도 |
| US11636214B2 (en) * | 2020-12-11 | 2023-04-25 | Hewlett Packard Enterprise Development Lp | Memory scan-based process monitoring |
| US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
| US12192214B2 (en) | 2021-05-05 | 2025-01-07 | Sophos Limited | Mitigating threats associated with tampering attempts |
| US11836137B2 (en) | 2021-05-19 | 2023-12-05 | Crowdstrike, Inc. | Real-time streaming graph queries |
| US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
| US12287872B2 (en) * | 2021-08-31 | 2025-04-29 | EMC IP Holding Company LLC | System and method for correlating filesystem events into meaningful behaviors |
| CN113779583B (zh) * | 2021-11-10 | 2022-02-22 | 北京微步在线科技有限公司 | 一种行为检测方法、装置、存储介质及电子设备 |
| US12452273B2 (en) | 2022-03-30 | 2025-10-21 | SentinelOne, Inc | Systems, methods, and devices for preventing credential passing attacks |
| US20230409366A1 (en) * | 2022-06-15 | 2023-12-21 | Vmware, Inc. | Dynamic configuration of statistics endpoint in virtualized computing environment |
| WO2024152041A1 (en) | 2023-01-13 | 2024-07-18 | SentinelOne, Inc. | Classifying cybersecurity threats using machine learning on non-euclidean data |
| US20240354407A1 (en) * | 2023-04-24 | 2024-10-24 | Sophos Limited | Kernel-based thread termination detection |
Family Cites Families (131)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5355498A (en) | 1992-02-25 | 1994-10-11 | Sun Microsystems, Inc. | Method and apparatus for booting a computer system without loading a device driver into memory |
| US5410703A (en) * | 1992-07-01 | 1995-04-25 | Telefonaktiebolaget L M Ericsson | System for changing software during computer operation |
| US6052723A (en) | 1996-07-25 | 2000-04-18 | Stockmaster.Com, Inc. | Method for aggregate control on an electronic network |
| US6009274A (en) | 1996-12-13 | 1999-12-28 | 3Com Corporation | Method and apparatus for automatically updating software components on end systems over a network |
| US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
| DE19810814B4 (de) * | 1998-03-12 | 2004-10-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Rechnersystem und Zustandskopierverfahren zur skalierbaren Software-Aktualisierung |
| US7418504B2 (en) | 1998-10-30 | 2008-08-26 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
| US20010044904A1 (en) | 1999-09-29 | 2001-11-22 | Berg Ryan J. | Secure remote kernel communication |
| US7281268B2 (en) * | 1999-11-14 | 2007-10-09 | Mcafee, Inc. | System, method and computer program product for detection of unwanted processes |
| US7076647B2 (en) | 2000-06-09 | 2006-07-11 | Hewlett-Packard Development Company, L.P. | Dynamic kernel tunables |
| US7099948B2 (en) | 2001-02-16 | 2006-08-29 | Swsoft Holdings, Ltd. | Virtual computing environment |
| JP2003084983A (ja) | 2001-09-11 | 2003-03-20 | Toshiba Corp | ソフトウェア配布装置、ソフトウェア配布システム及びソフトウェア配布方法 |
| US20030112781A1 (en) | 2001-12-17 | 2003-06-19 | Kermode Roger George | Communications unit for secure communications |
| US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
| US7448049B1 (en) | 2002-10-18 | 2008-11-04 | Crossroads Systems, Inc. | System and method of supporting kernel functionality |
| US7784044B2 (en) | 2002-12-02 | 2010-08-24 | Microsoft Corporation | Patching of in-use functions on a running computer system |
| US7340638B2 (en) | 2003-01-30 | 2008-03-04 | Microsoft Corporation | Operating system update and boot failure recovery |
| US7093116B2 (en) | 2003-04-28 | 2006-08-15 | Intel Corporation | Methods and apparatus to operate in multiple phases of a basic input/output system (BIOS) |
| US8577616B2 (en) | 2003-12-16 | 2013-11-05 | Aerulean Plant Identification Systems, Inc. | System and method for plant identification |
| US8010459B2 (en) | 2004-01-21 | 2011-08-30 | Google Inc. | Methods and systems for rating associated members in a social network |
| US20070153993A1 (en) | 2004-02-02 | 2007-07-05 | Mobile Reach Media Inc. | Monitoring method and system |
| US7490356B2 (en) * | 2004-07-20 | 2009-02-10 | Reflectent Software, Inc. | End user risk management |
| US7571448B1 (en) | 2004-07-28 | 2009-08-04 | Symantec Corporation | Lightweight hooking mechanism for kernel level operations |
| JP4624181B2 (ja) * | 2004-07-28 | 2011-02-02 | 株式会社エヌ・ティ・ティ・データ | 不正アクセス対策制御装置および不正アクセス対策制御プログラム |
| US20060070089A1 (en) | 2004-08-20 | 2006-03-30 | Shahid Shoaib | Method and apparatus for dynamic replacement of device drivers in the operating system (OS) kernel |
| US7478237B2 (en) * | 2004-11-08 | 2009-01-13 | Microsoft Corporation | System and method of allowing user mode applications with access to file data |
| US7765400B2 (en) * | 2004-11-08 | 2010-07-27 | Microsoft Corporation | Aggregation of the knowledge base of antivirus software |
| US7765410B2 (en) * | 2004-11-08 | 2010-07-27 | Microsoft Corporation | System and method of aggregating the knowledge base of antivirus software applications |
| KR101201118B1 (ko) * | 2004-11-08 | 2012-11-13 | 마이크로소프트 코포레이션 | 바이러스 방지 소프트웨어 어플리케이션들의 지식 베이스를모으는 시스템 및 방법 |
| WO2006101549A2 (en) | 2004-12-03 | 2006-09-28 | Whitecell Software, Inc. | Secure system for allowing the execution of authorized computer program code |
| US7366891B2 (en) | 2004-12-30 | 2008-04-29 | Intel Corporation | Methods and apparatus to provide dual-mode drivers in processor systems |
| US7979889B2 (en) * | 2005-01-07 | 2011-07-12 | Cisco Technology, Inc. | Methods and apparatus providing security to computer systems and networks |
| US8365293B2 (en) | 2005-01-25 | 2013-01-29 | Redphone Security, Inc. | Securing computer network interactions between entities with authorization assurances |
| US8572733B1 (en) * | 2005-07-06 | 2013-10-29 | Raytheon Company | System and method for active data collection in a network security system |
| US7874001B2 (en) | 2005-07-15 | 2011-01-18 | Microsoft Corporation | Detecting user-mode rootkits |
| US20070094496A1 (en) * | 2005-10-25 | 2007-04-26 | Michael Burtscher | System and method for kernel-level pestware management |
| US7882560B2 (en) * | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
| US8239947B1 (en) * | 2006-02-06 | 2012-08-07 | Symantec Corporation | Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system |
| US8201243B2 (en) | 2006-04-20 | 2012-06-12 | Webroot Inc. | Backwards researching activity indicative of pestware |
| US7441113B2 (en) | 2006-07-10 | 2008-10-21 | Devicevm, Inc. | Method and apparatus for virtualization of appliances |
| JP5079803B2 (ja) | 2006-07-18 | 2012-11-21 | サーティコム コーポレーション | ゲーム装置を認証するシステムおよび方法 |
| US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
| CN100485700C (zh) | 2006-08-11 | 2009-05-06 | 珠海金山软件股份有限公司 | 一种可对文件实时监控的防治计算机病毒的装置及其升级方法 |
| US9111088B2 (en) | 2006-08-14 | 2015-08-18 | Quantum Security, Inc. | Policy-based physical security system for restricting access to computer resources and data flow through network equipment |
| JP5112787B2 (ja) | 2006-09-01 | 2013-01-09 | 株式会社リコー | 情報処理装置、プログラム更新方法及びプログラム |
| US8321677B2 (en) | 2006-09-21 | 2012-11-27 | Google Inc. | Pre-binding and tight binding of an on-line identity to a digital signature |
| US20080162589A1 (en) | 2006-12-29 | 2008-07-03 | Microsoft Corporation | Weakly-consistent distributed collection compromised replica recovery |
| US7765374B2 (en) * | 2007-01-25 | 2010-07-27 | Microsoft Corporation | Protecting operating-system resources |
| US8181264B2 (en) | 2007-02-07 | 2012-05-15 | Apple Inc. | Method and apparatus for deferred security analysis |
| US8578477B1 (en) | 2007-03-28 | 2013-11-05 | Trend Micro Incorporated | Secure computer system integrity check |
| US8565799B2 (en) | 2007-04-04 | 2013-10-22 | Qualcomm Incorporated | Methods and apparatus for flow data acquisition in a multi-frequency network |
| US7908656B1 (en) | 2007-04-23 | 2011-03-15 | Network Appliance, Inc. | Customized data generating data storage system filter for data security |
| US8918717B2 (en) | 2007-05-07 | 2014-12-23 | International Business Machines Corporation | Method and sytem for providing collaborative tag sets to assist in the use and navigation of a folksonomy |
| US20080301669A1 (en) | 2007-05-30 | 2008-12-04 | Google Inc. | Dynamically Self-Updating by a Software Application on a Device |
| WO2008151321A2 (en) * | 2007-06-08 | 2008-12-11 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for enforcing a security policy in a network including a plurality of components |
| JP4931711B2 (ja) | 2007-07-02 | 2012-05-16 | 日本電信電話株式会社 | カーネル更新方法、情報処理装置、プログラムおよび記憶媒体 |
| US8099740B1 (en) | 2007-08-17 | 2012-01-17 | Mcafee, Inc. | System, method, and computer program product for terminating a hidden kernel process |
| US8065728B2 (en) * | 2007-09-10 | 2011-11-22 | Wisconsin Alumni Research Foundation | Malware prevention system monitoring kernel events |
| US20090094039A1 (en) | 2007-10-04 | 2009-04-09 | Zhura Corporation | Collaborative production of rich media content |
| US8255926B2 (en) | 2007-11-06 | 2012-08-28 | International Business Machines Corporation | Virus notification based on social groups |
| CA2625274C (en) | 2007-12-13 | 2018-11-20 | Kevin Gerard Boyce | Method and system for protecting a computer system during boot operation |
| US8407698B2 (en) | 2008-01-25 | 2013-03-26 | Citrix Systems, Inc. | Driver installation and diskless booting of virtual and physical machines based on machine characteristic |
| EP2245837B1 (en) | 2008-02-11 | 2011-12-28 | Dolby Laboratories Licensing Corporation | Dynamic DNS system for private networks |
| US20090216806A1 (en) | 2008-02-24 | 2009-08-27 | Allofme Ltd. | Digital assets internet timeline aggregation and sharing platform |
| JP2009238153A (ja) * | 2008-03-28 | 2009-10-15 | Nec Corp | マルウェア対処システム、方法及びプログラム |
| US7890664B1 (en) | 2008-03-31 | 2011-02-15 | Emc Corporation | Methods and apparatus for non-disruptive upgrade by redirecting I/O operations |
| US8806630B2 (en) * | 2008-05-13 | 2014-08-12 | At&T Intellectual Property, I, L.P. | Methods and apparatus for intrusion protection in systems that monitor for improper network usage |
| US8413261B2 (en) | 2008-05-30 | 2013-04-02 | Red Hat, Inc. | Sharing private data publicly and anonymously |
| US20090307140A1 (en) | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
| US8631488B2 (en) | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
| GB0815587D0 (en) | 2008-08-27 | 2008-10-01 | Applied Neural Technologies Ltd | Computer/network security application |
| US8401195B2 (en) | 2008-09-22 | 2013-03-19 | Motorola Solutions, Inc. | Method of automatically populating a list of managed secure communications group members |
| WO2010059864A1 (en) | 2008-11-19 | 2010-05-27 | Yoggie Security Systems Ltd. | Systems and methods for providing real time access monitoring of a removable media device |
| US8234693B2 (en) | 2008-12-05 | 2012-07-31 | Raytheon Company | Secure document management |
| KR20100078081A (ko) * | 2008-12-30 | 2010-07-08 | (주) 세인트 시큐리티 | 커널 기반 시스템 행위 분석을 통한 알려지지 않은 악성코드 탐지 시스템 및 방법 |
| KR101021708B1 (ko) | 2009-01-20 | 2011-03-15 | 성균관대학교산학협력단 | 그룹키 분배 방법 및 이를 위한 서버 및 클라이언트 |
| JP2010182019A (ja) * | 2009-02-04 | 2010-08-19 | Kddi Corp | 異常検知装置およびプログラム |
| EP2406749B1 (en) | 2009-03-13 | 2018-06-13 | Assa Abloy Ab | Transfer device for sensitive material such as a cryptographic key |
| US8533830B1 (en) | 2009-03-31 | 2013-09-10 | Mcafee, Inc. | System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system |
| US20110010522A1 (en) | 2009-06-12 | 2011-01-13 | Cray Inc. | Multiprocessor communication protocol bridge between scalar and vector compute nodes |
| US8776218B2 (en) * | 2009-07-21 | 2014-07-08 | Sophos Limited | Behavioral-based host intrusion prevention system |
| US8607340B2 (en) * | 2009-07-21 | 2013-12-10 | Sophos Limited | Host intrusion prevention system using software and user behavior analysis |
| US8589904B2 (en) | 2009-08-10 | 2013-11-19 | Symantec Corporation | Systems and methods for updating a software product |
| US8572740B2 (en) * | 2009-10-01 | 2013-10-29 | Kaspersky Lab, Zao | Method and system for detection of previously unknown malware |
| US8429429B1 (en) | 2009-10-23 | 2013-04-23 | Secure Vector, Inc. | Computer security system and method |
| US8510569B2 (en) | 2009-12-16 | 2013-08-13 | Intel Corporation | Providing integrity verification and attestation in a hidden execution environment |
| KR101038048B1 (ko) | 2009-12-21 | 2011-06-01 | 한국인터넷진흥원 | 봇넷 악성행위 실시간 분석 시스템 |
| US8528091B2 (en) * | 2009-12-31 | 2013-09-03 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for detecting covert malware |
| US8621628B2 (en) * | 2010-02-25 | 2013-12-31 | Microsoft Corporation | Protecting user mode processes from improper tampering or termination |
| US9384112B2 (en) | 2010-07-01 | 2016-07-05 | Logrhythm, Inc. | Log collection, structuring and processing |
| KR101329847B1 (ko) | 2010-07-26 | 2013-11-14 | 주식회사 팬택 | 인체통신을 이용한 소셜 네트워크 서비스를 제공하는 휴대용 단말기 및 그 방법 |
| US8539584B2 (en) * | 2010-08-30 | 2013-09-17 | International Business Machines Corporation | Rootkit monitoring agent built into an operating system kernel |
| KR101174751B1 (ko) | 2010-09-27 | 2012-08-17 | 한국인터넷진흥원 | 커널 콜백 매커니즘을 이용한 악성코드 자동 분석 방법 |
| US8776227B1 (en) * | 2010-10-21 | 2014-07-08 | Symantec Corporation | User interface based malware detection |
| KR20120072266A (ko) | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | 전역 네트워크 보안상황 제어 장치 및 방법 |
| US8762298B1 (en) | 2011-01-05 | 2014-06-24 | Narus, Inc. | Machine learning based botnet detection using real-time connectivity graph based traffic features |
| ES2442747T3 (es) | 2011-02-10 | 2014-02-13 | Telefónica, S.A. | Procedimiento y sistema para mejorar la detección de amenazas de seguridad en redes de comunicación |
| US20120246297A1 (en) | 2011-03-25 | 2012-09-27 | Vijaya Shanker | Agent based monitoring for saas it service management |
| US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
| US8549648B2 (en) | 2011-03-29 | 2013-10-01 | Mcafee, Inc. | Systems and methods for identifying hidden processes |
| US8966629B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for below-operating system trapping of driver loading and unloading |
| US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
| JP2014514651A (ja) | 2011-03-28 | 2014-06-19 | マカフィー, インコーポレイテッド | バーチャルマシーンモニタベースのアンチマルウェアセキュリティのためのシステム及び方法 |
| US8739281B2 (en) * | 2011-12-06 | 2014-05-27 | At&T Intellectual Property I, L.P. | Multilayered deception for intrusion detection and prevention |
| US8789034B1 (en) | 2011-12-31 | 2014-07-22 | Parallels IP Holdings GmbH | Method for updating operating system without memory reset |
| CA2773095C (en) | 2012-03-27 | 2014-12-02 | Yin Sheng Zhang | Computer with flexible operating system |
| US9081960B2 (en) * | 2012-04-27 | 2015-07-14 | Ut-Battelle, Llc | Architecture for removable media USB-ARM |
| IL219597A0 (en) | 2012-05-03 | 2012-10-31 | Syndrome X Ltd | Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention |
| US8997201B2 (en) | 2012-05-14 | 2015-03-31 | Cisco Technology, Inc. | Integrity monitoring to detect changes at network device for use in secure network access |
| US20130312099A1 (en) | 2012-05-21 | 2013-11-21 | Mcafee, Inc. | Realtime Kernel Object Table and Type Protection |
| US9317687B2 (en) * | 2012-05-21 | 2016-04-19 | Mcafee, Inc. | Identifying rootkits based on access permissions |
| US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
| US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
| US9158914B2 (en) | 2013-04-19 | 2015-10-13 | Crowdstrike, Inc. | Executable component injection utilizing hotpatch mechanisms |
| US9596077B2 (en) | 2013-04-22 | 2017-03-14 | Unisys Corporation | Community of interest-based secured communications over IPsec |
| US9225739B2 (en) | 2013-06-26 | 2015-12-29 | Microsoft Technology Licensing, Llc | Providing user-specific malware assessment based on social interactions |
| US9197654B2 (en) | 2013-06-28 | 2015-11-24 | Mcafee, Inc. | Rootkit detection by using HW resources to detect inconsistencies in network traffic |
| US9477835B2 (en) | 2013-10-08 | 2016-10-25 | Crowdstrike, Inc. | Event model for correlating system component states |
| US20150128206A1 (en) | 2013-11-04 | 2015-05-07 | Trusteer Ltd. | Early Filtering of Events Using a Kernel-Based Filter |
| US9170803B2 (en) | 2013-12-19 | 2015-10-27 | Novell, Inc. | Runtime patching of an operating system (OS) without stopping execution |
| KR101554633B1 (ko) | 2014-03-04 | 2015-09-21 | 한국전자통신연구원 | 악성 코드 검출 장치 및 그 방법 |
| US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
| US9798882B2 (en) | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
| US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
| US10033536B2 (en) | 2016-03-25 | 2018-07-24 | Credly, Inc. | Generation, management, and tracking of digital credentials |
| JP6786960B2 (ja) * | 2016-08-26 | 2020-11-18 | 富士通株式会社 | サイバー攻撃分析支援プログラム、サイバー攻撃分析支援方法およびサイバー攻撃分析支援装置 |
| US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
| US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
| KR101921052B1 (ko) * | 2017-11-15 | 2018-11-22 | 한국인터넷진흥원 | 바이너리에 대한 보안 취약점 및 그 원인 위치의 식별 방법 및 그 장치 |
| US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
| US11200317B2 (en) * | 2018-07-22 | 2021-12-14 | Minerva Labs Ltd. | Systems and methods for protecting a computing device against malicious code |
-
2012
- 2012-06-08 US US13/492,672 patent/US9043903B2/en active Active
-
2013
- 2013-05-09 CA CA2872786A patent/CA2872786A1/en not_active Abandoned
- 2013-05-09 EP EP13800519.4A patent/EP2859493B1/en active Active
- 2013-05-09 IN IN9583DEN2014 patent/IN2014DN09583A/en unknown
- 2013-05-09 EP EP20150542.7A patent/EP3654218B1/en active Active
- 2013-05-09 BR BR112014030746A patent/BR112014030746A2/pt not_active IP Right Cessation
- 2013-05-09 AU AU2013272198A patent/AU2013272198A1/en not_active Abandoned
- 2013-05-09 JP JP2015516024A patent/JP6212548B2/ja active Active
- 2013-05-09 WO PCT/US2013/040420 patent/WO2013184281A1/en not_active Ceased
- 2013-05-09 SG SG11201407292QA patent/SG11201407292QA/en unknown
- 2013-05-09 EP EP24167449.8A patent/EP4404508A3/en active Pending
- 2013-12-24 US US14/140,323 patent/US9571453B2/en active Active
-
2014
- 2014-11-25 IL IL235905A patent/IL235905B/en active IP Right Grant
-
2015
- 2015-05-12 US US14/709,779 patent/US9621515B2/en active Active
-
2016
- 2016-12-29 US US15/393,797 patent/US10002250B2/en active Active
-
2017
- 2017-04-10 US US15/483,153 patent/US9904784B2/en active Active
- 2017-09-15 JP JP2017177787A patent/JP2017216018A/ja active Pending
-
2018
- 2018-06-13 US US16/007,507 patent/US10853491B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| AU2013272198A1 (en) | 2014-11-27 |
| EP4404508A3 (en) | 2024-10-16 |
| US20140109226A1 (en) | 2014-04-17 |
| US10002250B2 (en) | 2018-06-19 |
| US20170213031A1 (en) | 2017-07-27 |
| EP2859493B1 (en) | 2020-01-08 |
| JP2017216018A (ja) | 2017-12-07 |
| IL235905B (en) | 2018-02-28 |
| JP6212548B2 (ja) | 2017-10-11 |
| US20170109530A1 (en) | 2017-04-20 |
| WO2013184281A1 (en) | 2013-12-12 |
| IN2014DN09583A (enExample) | 2015-07-17 |
| US10853491B2 (en) | 2020-12-01 |
| EP3654218B1 (en) | 2024-04-03 |
| US20150244679A1 (en) | 2015-08-27 |
| EP4404508A2 (en) | 2024-07-24 |
| EP2859493A4 (en) | 2016-03-16 |
| SG11201407292QA (en) | 2014-12-30 |
| IL235905A0 (en) | 2015-01-29 |
| US9904784B2 (en) | 2018-02-27 |
| US20190138723A1 (en) | 2019-05-09 |
| CA2872786A1 (en) | 2013-12-12 |
| US9043903B2 (en) | 2015-05-26 |
| EP3654218A3 (en) | 2020-08-05 |
| US9621515B2 (en) | 2017-04-11 |
| EP3654218A2 (en) | 2020-05-20 |
| US20130333040A1 (en) | 2013-12-12 |
| EP2859493A1 (en) | 2015-04-15 |
| JP2015522874A (ja) | 2015-08-06 |
| US9571453B2 (en) | 2017-02-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BR112014030746A2 (pt) | agente de segurança ao nível do núcleo | |
| BR112015009225A2 (pt) | bloqueio/desbloqueio de dispositivo contextual | |
| BR112014004920A2 (pt) | decisões de filtro de desbloqueio de baixa complexidade | |
| WO2013119786A3 (en) | Selectively triggering execution of services in a computing environment | |
| CN201786217U (zh) | 护窗防摔板 | |
| Mohanty | Racial Discrimination and Northeast Indian Women: The Pandemic Experience | |
| Paton | More people seeking help in the workplace for mental ill health | |
| 劉俊玲 | Factors affecting hand hygiene compliance in intensive care units: A systematic review | |
| Childress | How Workforce Policies and Infrastructure Shape Health Security across the US: Implications for Employers | |
| Carver | Optimism and Pessimism | |
| KR20200142483A (ko) | 노예주의 타파 | |
| Feuer | Battle Over the Bailout | |
| Bereketeab | The hopes and worries of a newborn state | |
| Tang | Monitoring of garment pressure and physical activity level for pressure garment therapy using wearable sensors | |
| TIE et al. | The application value of the combination of personality responsibility theory and motivation theory in the identification of the criminal responsibility ability of the patients with mental disorders | |
| Chakraverty | Case-Series of Human West Nile Virus Infections in Shelby County, Tennessee | |
| Matiiko | The concept of protection of property rights among other legal concepts | |
| Wane | ELISHA LIM | |
| Mohay et al. | Recognising and assisting children at risk of PTSD following natural disasters. | |
| Cooke | Obesity discrimination | |
| Strohl et al. | Separate & Unequal: How Higher Education Reinforces the Intergenerational Reproduction of White Racial Privilege | |
| Sniffer | A Story, Part | |
| 黎景宜 | Optimism in Failure——Found in The Old Man and the Sea | |
| Wisetsan | Environment and Dangerous Factors on Proceses of Laudry, Lamphun Hospital | |
| Cotton | We need to accept that work and society make a huge difference to our mental health: improvements to social policy and workplaces can make real and profound improvements to people’s external and internal lives |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
| B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 6A ANUIDADE. |
|
| B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2513 DE 06-03-2019 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013. |