BR112015015437A2 - representação em tempo real de um estado relevante à segurança de um sistema - Google Patents

representação em tempo real de um estado relevante à segurança de um sistema

Info

Publication number
BR112015015437A2
BR112015015437A2 BR112015015437A BR112015015437A BR112015015437A2 BR 112015015437 A2 BR112015015437 A2 BR 112015015437A2 BR 112015015437 A BR112015015437 A BR 112015015437A BR 112015015437 A BR112015015437 A BR 112015015437A BR 112015015437 A2 BR112015015437 A2 BR 112015015437A2
Authority
BR
Brazil
Prior art keywords
state
security
monitored device
real
situational model
Prior art date
Application number
BR112015015437A
Other languages
English (en)
Inventor
F Diehl David
Original Assignee
Crowdstrike Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Crowdstrike Inc filed Critical Crowdstrike Inc
Publication of BR112015015437A2 publication Critical patent/BR112015015437A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Alarm Systems (AREA)
  • Debugging And Monitoring (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

resumo “representação em tempo real de um estado relevante à segurança de um sistema” o presente documento descreve um modelo situacional que representa o estado de um dispositivo monitorado. o modelo situacional é construído com informações relevantes à segurança substancialmente em tempo real enquanto atividades em execução do dispositivo monitorado associadas às informações relevantes à segurança são observadas. o estado representado pode incluir um estado atual e um estado passado do dispositivo monitorado. além disso, o modelo situacional pode ser usado para validar eventos associados a informações de estado ocorrendo no dispositivo monitorado. ademais, um serviço de segurança remoto configura o dispositivo monitorado, incluindo configurar o modelo situacional, e constrói um modelo situacional adicional que representa o estado de um grupo de dispositivos monitorados.
BR112015015437A 2012-12-27 2013-12-17 representação em tempo real de um estado relevante à segurança de um sistema BR112015015437A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/728,746 US10409980B2 (en) 2012-12-27 2012-12-27 Real-time representation of security-relevant system state
PCT/US2013/075856 WO2014105535A1 (en) 2012-12-27 2013-12-17 Real-time representation of security-relevant system state

Publications (1)

Publication Number Publication Date
BR112015015437A2 true BR112015015437A2 (pt) 2017-07-11

Family

ID=51018945

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112015015437A BR112015015437A2 (pt) 2012-12-27 2013-12-17 representação em tempo real de um estado relevante à segurança de um sistema

Country Status (9)

Country Link
US (1) US10409980B2 (pt)
EP (1) EP2939173B1 (pt)
JP (1) JP2016505981A (pt)
AU (1) AU2013368213A1 (pt)
BR (1) BR112015015437A2 (pt)
CA (1) CA2893612A1 (pt)
IL (1) IL239567A0 (pt)
SG (1) SG11201504944TA (pt)
WO (1) WO2014105535A1 (pt)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014087597A1 (ja) 2012-12-07 2014-06-12 キヤノン電子株式会社 ウイルス侵入経路特定装置、ウイルス侵入経路特定方法およびプログラム
US10409980B2 (en) 2012-12-27 2019-09-10 Crowdstrike, Inc. Real-time representation of security-relevant system state
US9396360B2 (en) * 2013-06-27 2016-07-19 Advanced Micro Devices, Inc. System and method for secure control over performance state
US9798882B2 (en) * 2014-06-06 2017-10-24 Crowdstrike, Inc. Real-time model of states of monitored devices
JP6461992B2 (ja) 2014-11-05 2019-01-30 キヤノン電子株式会社 特定装置、その制御方法、及びプログラム
US9680646B2 (en) * 2015-02-05 2017-06-13 Apple Inc. Relay service for communication between controllers and accessories
AU2017223566B2 (en) 2016-02-23 2021-10-21 Carbon Black, Inc. Cybersecurity systems and techniques
US10354066B2 (en) 2016-02-26 2019-07-16 Cylance Inc. Retention and accessibility of data characterizing events on an endpoint computer
US10320820B2 (en) 2016-03-24 2019-06-11 Carbon Black, Inc. Systems and techniques for guiding a response to a cybersecurity incident
US10225238B2 (en) * 2016-04-11 2019-03-05 Facebook, Inc. Data security for content delivery networks
US10417441B2 (en) * 2016-04-29 2019-09-17 International Business Machines Corporation Effectively validating dynamic database queries through database activity monitoring
US10681059B2 (en) 2016-05-25 2020-06-09 CyberOwl Limited Relating to the monitoring of network security
EP3475866B1 (en) 2016-06-24 2024-09-04 Siemens Aktiengesellschaft Plc virtual patching and automated distribution of security context
US10699012B2 (en) 2017-01-11 2020-06-30 Cylance Inc. Endpoint detection and response utilizing machine learning
EP3616115B1 (en) * 2017-04-26 2023-12-06 Cylance Inc. Endpoint detection and response system event characterization data transfer
EP3611587A1 (de) * 2018-08-16 2020-02-19 Siemens Aktiengesellschaft System zur steuerung und überwachung von adaptiven cyber-physikalischen systemen
US11095642B2 (en) 2018-11-07 2021-08-17 Cylance Inc. Verifying user identity through human / computer interaction
EP3805965B1 (de) * 2019-10-08 2023-06-14 Camelot ITLAB GmbH Verfahren zum validieren von vertrauenswürdigen daten in einem computersystem
US11321463B2 (en) * 2020-01-09 2022-05-03 Rockwell Collins, Inc. Hardware malware profiling and detection system

Family Cites Families (102)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088804A (en) 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US7418504B2 (en) 1998-10-30 2008-08-26 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
EP1085396A1 (en) * 1999-09-17 2001-03-21 Hewlett-Packard Company Operation of trusted state in computing platform
US7203868B1 (en) * 1999-11-24 2007-04-10 Unisys Corporation Dynamic monitoring of resources using snapshots of system states
US20020123966A1 (en) 2000-06-23 2002-09-05 Luke Chu System and method for administration of network financial transaction terminals
US7072876B1 (en) 2000-09-19 2006-07-04 Cigital System and method for mining execution traces with finite automata
US6985845B1 (en) 2000-09-26 2006-01-10 Koninklijke Philips Electronics N.V. Security monitor of system runs software simulator in parallel
US7669051B2 (en) 2000-11-13 2010-02-23 DigitalDoors, Inc. Data security system and method with multiple independent levels of security
US7290266B2 (en) 2001-06-14 2007-10-30 Cisco Technology, Inc. Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy
CA2464402C (en) 2001-10-25 2010-04-06 General Dynamics Government Systems Corporation A method and system for modeling, analysis and display of network security events
US7275048B2 (en) 2001-10-30 2007-09-25 International Business Machines Corporation Product support of computer-related products using intelligent agents
US20040049698A1 (en) 2002-09-06 2004-03-11 Ott Allen Eugene Computer network security system utilizing dynamic mobile sensor agents
US9503470B2 (en) 2002-12-24 2016-11-22 Fred Herz Patents, LLC Distributed agent based model for security monitoring and response
US8201249B2 (en) 2003-05-14 2012-06-12 Northrop Grumman Systems Corporation Steady state computer intrusion and misuse detection
US7133977B2 (en) 2003-06-13 2006-11-07 Microsoft Corporation Scalable rundown protection for object lifetime management
WO2005058018A2 (en) 2003-12-16 2005-06-30 Aerulean Plant Identification Systems, Inc. System and method for plant identification
JP2006053788A (ja) 2004-08-12 2006-02-23 Ntt Docomo Inc ソフトウェア動作監視装置及びソフトウェア動作監視方法
US7478237B2 (en) 2004-11-08 2009-01-13 Microsoft Corporation System and method of allowing user mode applications with access to file data
US7765400B2 (en) 2004-11-08 2010-07-27 Microsoft Corporation Aggregation of the knowledge base of antivirus software
US7765410B2 (en) 2004-11-08 2010-07-27 Microsoft Corporation System and method of aggregating the knowledge base of antivirus software applications
US9450966B2 (en) * 2004-11-29 2016-09-20 Kip Sign P1 Lp Method and apparatus for lifecycle integrity verification of virtual machines
WO2006101549A2 (en) * 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
US8365293B2 (en) 2005-01-25 2013-01-29 Redphone Security, Inc. Securing computer network interactions between entities with authorization assurances
US8140664B2 (en) 2005-05-09 2012-03-20 Trend Micro Incorporated Graphical user interface based sensitive information and internal information vulnerability management system
US7874001B2 (en) 2005-07-15 2011-01-18 Microsoft Corporation Detecting user-mode rootkits
US20070028291A1 (en) 2005-07-29 2007-02-01 Bit 9, Inc. Parametric content control in a network security system
US7832006B2 (en) 2005-08-09 2010-11-09 At&T Intellectual Property I, L.P. System and method for providing network security
US20070094496A1 (en) 2005-10-25 2007-04-26 Michael Burtscher System and method for kernel-level pestware management
US7882560B2 (en) 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US8732824B2 (en) * 2006-01-23 2014-05-20 Microsoft Corporation Method and system for monitoring integrity of running computer system
TWI353536B (en) * 2006-01-26 2011-12-01 Infortrend Technology Inc Virtualized storage computer system and method of
US8201243B2 (en) 2006-04-20 2012-06-12 Webroot Inc. Backwards researching activity indicative of pestware
US8190868B2 (en) 2006-08-07 2012-05-29 Webroot Inc. Malware management through kernel detection
US9111088B2 (en) 2006-08-14 2015-08-18 Quantum Security, Inc. Policy-based physical security system for restricting access to computer resources and data flow through network equipment
US8321677B2 (en) 2006-09-21 2012-11-27 Google Inc. Pre-binding and tight binding of an on-line identity to a digital signature
US20080148398A1 (en) 2006-10-31 2008-06-19 Derek John Mezack System and Method for Definition and Automated Analysis of Computer Security Threat Models
KR100885293B1 (ko) 2006-12-04 2009-02-23 한국전자통신연구원 네트워크 보안 상황 표시 장치 및 그 방법
US8468244B2 (en) 2007-01-05 2013-06-18 Digital Doors, Inc. Digital information infrastructure and method for security designated data and with granular data stores
US8181264B2 (en) 2007-02-07 2012-05-15 Apple Inc. Method and apparatus for deferred security analysis
US8205244B2 (en) 2007-02-27 2012-06-19 Airdefense, Inc. Systems and methods for generating, managing, and displaying alarms for wireless network monitoring
US20090328193A1 (en) 2007-07-20 2009-12-31 Hezi Moore System and Method for Implementing a Virtualized Security Platform
US8565799B2 (en) 2007-04-04 2013-10-22 Qualcomm Incorporated Methods and apparatus for flow data acquisition in a multi-frequency network
US8918717B2 (en) 2007-05-07 2014-12-23 International Business Machines Corporation Method and sytem for providing collaborative tag sets to assist in the use and navigation of a folksonomy
ITMI20070916A1 (it) * 2007-05-07 2008-11-08 Campagnolo Srl Cerchio e ruota di bicicletta con alette ad ondulazione localizzata compensata
US8336108B2 (en) 2007-06-22 2012-12-18 Red Hat, Inc. Method and system for collaboration involving enterprise nodes
US8065728B2 (en) 2007-09-10 2011-11-22 Wisconsin Alumni Research Foundation Malware prevention system monitoring kernel events
US8595834B2 (en) * 2008-02-04 2013-11-26 Samsung Electronics Co., Ltd Detecting unauthorized use of computing devices based on behavioral patterns
JP5159899B2 (ja) 2008-02-11 2013-03-13 ドルビー ラボラトリーズ ライセンシング コーポレイション プライベートネットワークのダイナミックdnsシステム
US20090216806A1 (en) 2008-02-24 2009-08-27 Allofme Ltd. Digital assets internet timeline aggregation and sharing platform
US8839419B2 (en) 2008-04-05 2014-09-16 Microsoft Corporation Distributive security investigation
WO2009128905A1 (en) 2008-04-17 2009-10-22 Siemens Energy, Inc. Method and system for cyber security management of industrial control systems
US8296850B2 (en) 2008-05-28 2012-10-23 Empire Technology Development Llc Detecting global anomalies
GB0815587D0 (en) 2008-08-27 2008-10-01 Applied Neural Technologies Ltd Computer/network security application
US8401195B2 (en) 2008-09-22 2013-03-19 Motorola Solutions, Inc. Method of automatically populating a list of managed secure communications group members
JP2010108469A (ja) 2008-10-01 2010-05-13 Sky Co Ltd 操作監視システム及び操作監視プログラム
US8069210B2 (en) 2008-10-10 2011-11-29 Microsoft Corporation Graph based bot-user detection
US8881288B1 (en) 2008-10-28 2014-11-04 Intelligent Automation, Inc. Graphical models for cyber security analysis in enterprise networks
US8234693B2 (en) 2008-12-05 2012-07-31 Raytheon Company Secure document management
KR20100078081A (ko) 2008-12-30 2010-07-08 (주) 세인트 시큐리티 커널 기반 시스템 행위 분석을 통한 알려지지 않은 악성코드 탐지 시스템 및 방법
KR101021708B1 (ko) 2009-01-20 2011-03-15 성균관대학교산학협력단 그룹키 분배 방법 및 이를 위한 서버 및 클라이언트
EP2406749B1 (en) 2009-03-13 2018-06-13 Assa Abloy Ab Transfer device for sensitive material such as a cryptographic key
US8667121B2 (en) 2009-03-25 2014-03-04 Mcafee, Inc. System and method for managing data and policies
US8171049B2 (en) 2009-09-18 2012-05-01 Xerox Corporation System and method for information seeking in a multimedia collection
US20120137367A1 (en) 2009-11-06 2012-05-31 Cataphora, Inc. Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
US20110138469A1 (en) 2009-12-03 2011-06-09 Recursion Software, Inc. System and method for resolving vulnerabilities in a computer network
KR101038048B1 (ko) 2009-12-21 2011-06-01 한국인터넷진흥원 봇넷 악성행위 실시간 분석 시스템
US8621628B2 (en) 2010-02-25 2013-12-31 Microsoft Corporation Protecting user mode processes from improper tampering or termination
US8549650B2 (en) 2010-05-06 2013-10-01 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US9384112B2 (en) * 2010-07-01 2016-07-05 Logrhythm, Inc. Log collection, structuring and processing
KR101329847B1 (ko) 2010-07-26 2013-11-14 주식회사 팬택 인체통신을 이용한 소셜 네트워크 서비스를 제공하는 휴대용 단말기 및 그 방법
GB201012753D0 (en) * 2010-07-29 2010-09-15 Ford Global Tech Llc A curtain airbag for a motor vehicle
US8689336B2 (en) 2010-09-27 2014-04-01 Bank Of America Corporation Tiered exposure model for event correlation
KR20120072266A (ko) 2010-12-23 2012-07-03 한국전자통신연구원 전역 네트워크 보안상황 제어 장치 및 방법
US8762298B1 (en) * 2011-01-05 2014-06-24 Narus, Inc. Machine learning based botnet detection using real-time connectivity graph based traffic features
ES2442747T3 (es) 2011-02-10 2014-02-13 Telefónica, S.A. Procedimiento y sistema para mejorar la detección de amenazas de seguridad en redes de comunicación
JP5731223B2 (ja) 2011-02-14 2015-06-10 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation 異常検知装置、監視制御システム、異常検知方法、プログラムおよび記録媒体
US9119017B2 (en) 2011-03-18 2015-08-25 Zscaler, Inc. Cloud based mobile device security and policy enforcement
US20120246297A1 (en) * 2011-03-25 2012-09-27 Vijaya Shanker Agent based monitoring for saas it service management
EP2691908B1 (en) 2011-03-28 2018-12-05 McAfee, LLC System and method for virtual machine monitor based anti-malware security
US8813227B2 (en) * 2011-03-29 2014-08-19 Mcafee, Inc. System and method for below-operating system regulation and control of self-modifying code
US20120255003A1 (en) * 2011-03-31 2012-10-04 Mcafee, Inc. System and method for securing access to the objects of an operating system
US20120324236A1 (en) * 2011-06-16 2012-12-20 Microsoft Corporation Trusted Snapshot Generation
US9286182B2 (en) * 2011-06-17 2016-03-15 Microsoft Technology Licensing, Llc Virtual machine snapshotting and analysis
US8955111B2 (en) 2011-09-24 2015-02-10 Elwha Llc Instruction set adapted for security risk monitoring
US8856936B2 (en) 2011-10-14 2014-10-07 Albeado Inc. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
US9203859B2 (en) 2012-02-01 2015-12-01 The Boeing Company Methods and systems for cyber-physical security modeling, simulation and architecture for the smart grid
US9081960B2 (en) 2012-04-27 2015-07-14 Ut-Battelle, Llc Architecture for removable media USB-ARM
IL219597A0 (en) 2012-05-03 2012-10-31 Syndrome X Ltd Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention
US8661538B2 (en) 2012-05-09 2014-02-25 Nice-Systems Ltd. System and method for determining a risk root cause
WO2013177311A1 (en) 2012-05-23 2013-11-28 Observable Networks, Llc System and method for continuous device profiling (cdp)
US9043903B2 (en) 2012-06-08 2015-05-26 Crowdstrike, Inc. Kernel-level security agent
US9292881B2 (en) 2012-06-29 2016-03-22 Crowdstrike, Inc. Social sharing of security information in a group
KR101868893B1 (ko) 2012-07-09 2018-06-19 한국전자통신연구원 네트워크 보안 상황 시각화 방법 및 그 장치
JPWO2014020908A1 (ja) 2012-08-03 2016-07-21 日本電気株式会社 システム状態判別支援装置、及び、システム状態判別支援方法
US9392003B2 (en) 2012-08-23 2016-07-12 Raytheon Foreground Security, Inc. Internet security cyber threat reporting system and method
US9954884B2 (en) 2012-10-23 2018-04-24 Raytheon Company Method and device for simulating network resiliance against attacks
US8984633B2 (en) 2012-11-14 2015-03-17 Click Security, Inc. Automated security analytics platform with visualization agnostic selection linked portlets
US10409980B2 (en) 2012-12-27 2019-09-10 Crowdstrike, Inc. Real-time representation of security-relevant system state
US9712543B2 (en) 2013-01-23 2017-07-18 Owl Cyber Defense Solutions, LLP System for remotely monitoring status information of devices connected to a network
US9477835B2 (en) 2013-10-08 2016-10-25 Crowdstrike, Inc. Event model for correlating system component states
US9753796B2 (en) 2013-12-06 2017-09-05 Lookout, Inc. Distributed monitoring, evaluation, and response for multiple devices
US9798882B2 (en) 2014-06-06 2017-10-24 Crowdstrike, Inc. Real-time model of states of monitored devices

Also Published As

Publication number Publication date
SG11201504944TA (en) 2015-07-30
EP2939173B1 (en) 2019-07-24
IL239567A0 (en) 2015-08-31
US20140189776A1 (en) 2014-07-03
AU2013368213A1 (en) 2015-07-02
WO2014105535A1 (en) 2014-07-03
JP2016505981A (ja) 2016-02-25
CA2893612A1 (en) 2014-07-03
EP2939173A4 (en) 2016-08-10
EP2939173A1 (en) 2015-11-04
US10409980B2 (en) 2019-09-10

Similar Documents

Publication Publication Date Title
BR112015015437A2 (pt) representação em tempo real de um estado relevante à segurança de um sistema
WO2014116367A3 (en) Realtime inspection management
PH12018500388A1 (en) Processing of resource consumption data via monitoring physically observable behaviors of an existing resource meter and provision of functionalities based on processing of resource consumption data
BR112017003886A2 (pt) adaptação de contexto de usuário específico de dispositivo de ambiente de computação
BR112016015111A2 (pt) Esquema de localização usando assinaturas de ultrassons emitidas a partir de dispositivo de confiança
WO2015073338A3 (en) Aggregating and presenting event information
WO2014002041A3 (en) Privacy control in a social network
BR112015023770A2 (pt) sistemas de seguros de saúde para animal de estimação e métodos para prover seguros de saúde e gerar indicador de estado para animais de estimação
AR081287A1 (es) Medio legible por computadora, metodo y sistema para proporcionar integracion de aplicacion cliente y pagina web
WO2015187444A3 (en) Analyzing accelerometer data to identify emergency events
MX2015013385A (es) Sistema y metodo de manejo de datos para un dispositivo de destino de un vehiculo.
AR095134A1 (es) Dispositivo informático, sistema y método relacionado con gráficos y tarjetas de actividad
BR112016028915A2 (pt) aparelho de comunicação, sistema de comunicação, sistema de gerenciamento de comunicação, método de controle de comunicação e produto de programa de computador
BR112017013125A2 (pt) método e dispositivo para configuração de dispositivo
BR112016002740A2 (pt) sistemas e métodos para propaganda
BR102012018608A2 (pt) Método para configurar medidor de consumo e sistema
WO2014111725A3 (en) An attendance device
Ghez et al. Detection of Galactic Center Source G2 at 3.8 micron during Periapse Passage Around the Central Black Hole
WO2013189320A3 (zh) 一种虚拟桌面监控方法及装置
BR112014030521A2 (pt) rótulos que têm um corante de informações
Stefanova Savcheva Analyzing an IRIS Blowout and Standard jets via Magnetofrictional Simulation
Savcheva et al. Analyzing an IRIS Blowout jet via Magnetofrictional Simulation
Reymond et al. The Chilean tsunami of 16 September 2015: operational aspects and tsunami warning process in French Polynesia.
Reza et al. Overview of the OSIRIS-REx Parachute Recovery Subsystem
Goodwell et al. A network approach to evaluate ecosystem vulnerability

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]
B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]