CN101558384B - 软件漏洞利用防护 - Google Patents
软件漏洞利用防护 Download PDFInfo
- Publication number
- CN101558384B CN101558384B CN2007800189492A CN200780018949A CN101558384B CN 101558384 B CN101558384 B CN 101558384B CN 2007800189492 A CN2007800189492 A CN 2007800189492A CN 200780018949 A CN200780018949 A CN 200780018949A CN 101558384 B CN101558384 B CN 101558384B
- Authority
- CN
- China
- Prior art keywords
- malicious code
- evidence
- security
- message
- utilizes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000009471 action Effects 0.000 claims abstract description 49
- 238000000034 method Methods 0.000 claims description 45
- 238000012544 monitoring process Methods 0.000 claims description 12
- 238000009434 installation Methods 0.000 claims description 8
- 230000008878 coupling Effects 0.000 claims description 5
- 238000010168 coupling process Methods 0.000 claims description 5
- 238000005859 coupling reaction Methods 0.000 claims description 5
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 235000012907 honey Nutrition 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims 2
- 230000005540 biological transmission Effects 0.000 abstract description 18
- 230000007246 mechanism Effects 0.000 abstract description 7
- 230000006854 communication Effects 0.000 abstract description 4
- 238000004891 communication Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012360 testing method Methods 0.000 description 5
- 238000009826 distribution Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000033228 biological regulation Effects 0.000 description 3
- 230000019771 cognition Effects 0.000 description 3
- 230000007812 deficiency Effects 0.000 description 3
- 230000002950 deficient Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000007175 bidirectional communication Effects 0.000 description 2
- 230000027455 binding Effects 0.000 description 2
- 238000009739 binding Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000005352 clarification Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
- Medicines That Contain Protein Lipid Enzymes And Other Medicines (AREA)
Abstract
Description
Claims (19)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US78572306P | 2006-03-24 | 2006-03-24 | |
US60/785,723 | 2006-03-24 | ||
PCT/US2007/064949 WO2007149612A2 (en) | 2006-03-24 | 2007-03-26 | Software vulnerability exploitation shield |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012104605752A Division CN103218563A (zh) | 2006-03-24 | 2007-03-26 | 软件漏洞利用防护 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101558384A CN101558384A (zh) | 2009-10-14 |
CN101558384B true CN101558384B (zh) | 2013-01-02 |
Family
ID=38834179
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007800189492A Active CN101558384B (zh) | 2006-03-24 | 2007-03-26 | 软件漏洞利用防护 |
CN2012104605752A Pending CN103218563A (zh) | 2006-03-24 | 2007-03-26 | 软件漏洞利用防护 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012104605752A Pending CN103218563A (zh) | 2006-03-24 | 2007-03-26 | 软件漏洞利用防护 |
Country Status (12)
Country | Link |
---|---|
US (1) | US8898787B2 (zh) |
EP (1) | EP2008188B1 (zh) |
JP (1) | JP5000703B2 (zh) |
CN (2) | CN101558384B (zh) |
AU (1) | AU2007261272B2 (zh) |
BR (1) | BRPI0709368A8 (zh) |
CA (1) | CA2647337A1 (zh) |
HK (1) | HK1134560A1 (zh) |
MY (1) | MY150011A (zh) |
RU (1) | RU2417429C2 (zh) |
WO (1) | WO2007149612A2 (zh) |
ZA (1) | ZA200808923B (zh) |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7971257B2 (en) * | 2006-08-03 | 2011-06-28 | Symantec Corporation | Obtaining network origins of potential software threats |
US8869268B1 (en) * | 2007-10-24 | 2014-10-21 | Symantec Corporation | Method and apparatus for disrupting the command and control infrastructure of hostile programs |
US8037536B2 (en) * | 2007-11-14 | 2011-10-11 | Bank Of America Corporation | Risk scoring system for the prevention of malware |
US8539593B2 (en) * | 2009-01-23 | 2013-09-17 | International Business Machines Corporation | Extraction of code level security specification |
US8205257B1 (en) * | 2009-07-28 | 2012-06-19 | Symantec Corporation | Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process |
US20110185353A1 (en) * | 2010-01-27 | 2011-07-28 | Jack Matthew | Mitigating Problems Arising From Incompatible Software |
KR101055267B1 (ko) * | 2010-03-05 | 2011-08-09 | 한국전자통신연구원 | 액티브엑스 컨트롤의 배포 사이트 식별 방법과 보안 취약점 검출 방법 및 면역화 방법 |
US8402547B2 (en) * | 2010-03-14 | 2013-03-19 | Virtual Forge GmbH | Apparatus and method for detecting, prioritizing and fixing security defects and compliance violations in SAP® ABAP™ code |
US10025688B2 (en) | 2010-03-14 | 2018-07-17 | Virtual Forge GmbH | System and method for detecting data extrusion in software applications |
KR101201622B1 (ko) * | 2010-08-19 | 2012-11-14 | 삼성에스디에스 주식회사 | 보안 기능을 가진 시스템 온 칩 및 이를 이용한 디바이스 및 스캔 방법 |
US11269977B2 (en) | 2010-11-29 | 2022-03-08 | Biocatch Ltd. | System, apparatus, and method of collecting and processing data in electronic devices |
US10834590B2 (en) | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US10586036B2 (en) | 2010-11-29 | 2020-03-10 | Biocatch Ltd. | System, device, and method of recovery and resetting of user authentication factor |
US10069837B2 (en) | 2015-07-09 | 2018-09-04 | Biocatch Ltd. | Detection of proxy server |
US11210674B2 (en) | 2010-11-29 | 2021-12-28 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US20190057200A1 (en) * | 2017-08-16 | 2019-02-21 | Biocatch Ltd. | System, apparatus, and method of collecting and processing data in electronic devices |
US11223619B2 (en) | 2010-11-29 | 2022-01-11 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US20190158535A1 (en) * | 2017-11-21 | 2019-05-23 | Biocatch Ltd. | Device, System, and Method of Detecting Vishing Attacks |
US10917431B2 (en) * | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US10621585B2 (en) | 2010-11-29 | 2020-04-14 | Biocatch Ltd. | Contextual mapping of web-pages, and generation of fraud-relatedness score-values |
US10897482B2 (en) | 2010-11-29 | 2021-01-19 | Biocatch Ltd. | Method, device, and system of back-coloring, forward-coloring, and fraud detection |
US10474815B2 (en) | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | System, device, and method of detecting malicious automatic script and code injection |
US10970394B2 (en) | 2017-11-21 | 2021-04-06 | Biocatch Ltd. | System, device, and method of detecting vishing attacks |
US10776476B2 (en) | 2010-11-29 | 2020-09-15 | Biocatch Ltd. | System, device, and method of visual login |
US10728761B2 (en) | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
US10949514B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | Device, system, and method of differentiating among users based on detection of hardware components |
RU2477929C2 (ru) * | 2011-04-19 | 2013-03-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ предотвращения инцидентов безопасности на основании рейтингов опасности пользователей |
RU2510074C2 (ru) * | 2012-02-24 | 2014-03-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ проверки исполняемого кода перед его выполнением |
US9208316B1 (en) * | 2012-02-27 | 2015-12-08 | Amazon Technologies, Inc. | Selective disabling of content portions |
US8844032B2 (en) | 2012-03-02 | 2014-09-23 | Sri International | Method and system for application-based policy monitoring and enforcement on a mobile device |
RU2523114C2 (ru) * | 2012-04-06 | 2014-07-20 | Закрытое акционерное общество "Лаборатория Касперского" | Способ анализа вредоносной активности в сети интернет, выявления вредоносных узлов сети и ближайших узлов-посредников |
CN102799502B (zh) * | 2012-06-28 | 2016-03-30 | 航天恒星科技有限公司 | 一种星载嵌入式软件在轨维护方法 |
RU2495487C1 (ru) * | 2012-08-10 | 2013-10-10 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ для определения доверия при обновлении разрешенного программного обеспечения |
CN103856456A (zh) * | 2012-12-04 | 2014-06-11 | 中山大学深圳研究院 | 一种网络安全的方法和系统 |
US9298911B2 (en) | 2013-03-15 | 2016-03-29 | Intel Corporation | Method, apparatus, system, and computer readable medium for providing apparatus security |
US9015839B2 (en) * | 2013-08-30 | 2015-04-21 | Juniper Networks, Inc. | Identifying malicious devices within a computer network |
US20160127412A1 (en) * | 2014-11-05 | 2016-05-05 | Samsung Electronics Co., Ltd. | Method and system for detecting execution of a malicious code in a web based operating system |
GB2539705B (en) | 2015-06-25 | 2017-10-25 | Aimbrain Solutions Ltd | Conditional behavioural biometrics |
RU2613535C1 (ru) * | 2015-11-20 | 2017-03-16 | Илья Самуилович Рабинович | Способ обнаружения вредоносных программ и элементов |
KR20170135495A (ko) * | 2016-05-31 | 2017-12-08 | 주식회사 씨티아이랩 | 보안 위협 정보 분석 및 관리 시스템 |
GB2552032B (en) | 2016-07-08 | 2019-05-22 | Aimbrain Solutions Ltd | Step-up authentication |
US10579784B2 (en) | 2016-11-02 | 2020-03-03 | Biocatch Ltd. | System, device, and method of secure utilization of fingerprints for user authentication |
RU2668710C1 (ru) | 2018-01-17 | 2018-10-02 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Вычислительное устройство и способ для обнаружения вредоносных доменных имен в сетевом трафике |
US11222135B2 (en) * | 2018-05-28 | 2022-01-11 | International Business Machines Corporation | User device privacy protection |
US11050772B2 (en) * | 2018-12-05 | 2021-06-29 | Bank Of America Corporation | Method and system for identification and prevention of profiling attacks in electronic authorization systems |
RU2701040C1 (ru) * | 2018-12-28 | 2019-09-24 | Общество с ограниченной ответственностью "Траст" | Способ и вычислительное устройство для информирования о вредоносных веб-ресурсах |
US11128670B2 (en) | 2019-02-26 | 2021-09-21 | Oracle International Corporation | Methods, systems, and computer readable media for dynamically remediating a security system entity |
US11606353B2 (en) | 2021-07-22 | 2023-03-14 | Biocatch Ltd. | System, device, and method of generating and utilizing one-time passwords |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1612532A (zh) * | 2003-10-31 | 2005-05-04 | 国际商业机器公司 | 基于主机的网络入侵检测系统 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2368233B (en) * | 2000-08-31 | 2002-10-16 | F Secure Oyj | Maintaining virus detection software |
JP2002342279A (ja) * | 2001-03-13 | 2002-11-29 | Fujitsu Ltd | フィルタリング装置、フィルタリング方法およびこの方法をコンピュータに実行させるプログラム |
US7308714B2 (en) * | 2001-09-27 | 2007-12-11 | International Business Machines Corporation | Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack |
US7197762B2 (en) * | 2001-10-31 | 2007-03-27 | Hewlett-Packard Development Company, L.P. | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits |
MXPA04006473A (es) | 2001-12-31 | 2004-10-04 | Citadel Security Software Inc | Sistema de resolucion automatizado para vulnerabilidad de computadora. |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
CA2496779C (en) * | 2002-08-26 | 2011-02-15 | Guardednet, Inc. | Determining threat level associated with network activity |
JP2004139177A (ja) | 2002-10-15 | 2004-05-13 | Sony Corp | 情報検査方法及び装置、並びにプログラム |
US7454499B2 (en) * | 2002-11-07 | 2008-11-18 | Tippingpoint Technologies, Inc. | Active network defense system and method |
EP1591860A4 (en) * | 2003-02-04 | 2010-10-13 | Fujitsu Ltd | SYSTEM AND METHOD FOR PROVIDING SOFTWARE MAINTENANCE SERVICES AND THE EXECUTION PROGRAM |
US7251822B2 (en) * | 2003-10-23 | 2007-07-31 | Microsoft Corporation | System and methods providing enhanced security model |
US7389538B2 (en) * | 2003-11-12 | 2008-06-17 | Fortinet, Inc. | Static code image modeling and recognition |
US7661123B2 (en) * | 2003-12-05 | 2010-02-09 | Microsoft Corporation | Security policy update supporting at least one security service provider |
US7748038B2 (en) * | 2004-06-16 | 2010-06-29 | Ironport Systems, Inc. | Method and apparatus for managing computer virus outbreaks |
JP2006067279A (ja) | 2004-08-27 | 2006-03-09 | Matsushita Electric Ind Co Ltd | 侵入検知システム及び通信装置 |
US20080189784A1 (en) * | 2004-09-10 | 2008-08-07 | The Regents Of The University Of California | Method and Apparatus for Deep Packet Inspection |
WO2009146747A1 (en) * | 2008-06-05 | 2009-12-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Traffic monitoring by lowest transmission layer marking |
-
2007
- 2007-03-26 CN CN2007800189492A patent/CN101558384B/zh active Active
- 2007-03-26 EP EP07759401.8A patent/EP2008188B1/en active Active
- 2007-03-26 CN CN2012104605752A patent/CN103218563A/zh active Pending
- 2007-03-26 MY MYPI20083741A patent/MY150011A/en unknown
- 2007-03-26 RU RU2008142138/08A patent/RU2417429C2/ru active
- 2007-03-26 BR BRPI0709368A patent/BRPI0709368A8/pt not_active Application Discontinuation
- 2007-03-26 US US11/691,094 patent/US8898787B2/en active Active
- 2007-03-26 JP JP2009503200A patent/JP5000703B2/ja active Active
- 2007-03-26 AU AU2007261272A patent/AU2007261272B2/en active Active
- 2007-03-26 WO PCT/US2007/064949 patent/WO2007149612A2/en active Application Filing
- 2007-03-26 CA CA002647337A patent/CA2647337A1/en not_active Abandoned
-
2008
- 2008-10-17 ZA ZA200808923A patent/ZA200808923B/xx unknown
-
2009
- 2009-12-11 HK HK09111672.3A patent/HK1134560A1/xx not_active IP Right Cessation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1612532A (zh) * | 2003-10-31 | 2005-05-04 | 国际商业机器公司 | 基于主机的网络入侵检测系统 |
Also Published As
Publication number | Publication date |
---|---|
AU2007261272B2 (en) | 2012-04-19 |
WO2007149612A2 (en) | 2007-12-27 |
EP2008188B1 (en) | 2017-05-31 |
CN103218563A (zh) | 2013-07-24 |
RU2417429C2 (ru) | 2011-04-27 |
MY150011A (en) | 2013-11-15 |
CN101558384A (zh) | 2009-10-14 |
AU2007261272A1 (en) | 2007-12-27 |
RU2008142138A (ru) | 2010-04-27 |
HK1134560A1 (en) | 2010-04-30 |
WO2007149612A3 (en) | 2008-11-20 |
JP5000703B2 (ja) | 2012-08-15 |
EP2008188A2 (en) | 2008-12-31 |
BRPI0709368A2 (pt) | 2011-07-12 |
CA2647337A1 (en) | 2007-12-27 |
ZA200808923B (en) | 2009-08-26 |
EP2008188A4 (en) | 2012-01-18 |
JP2009543163A (ja) | 2009-12-03 |
US20070226797A1 (en) | 2007-09-27 |
US8898787B2 (en) | 2014-11-25 |
BRPI0709368A8 (pt) | 2018-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101558384B (zh) | 软件漏洞利用防护 | |
RU2622870C2 (ru) | Система и способ оценки опасности веб-сайтов | |
US11962606B2 (en) | Protecting serverless applications | |
CN100530208C (zh) | 适于病毒防护的网络隔离技术 | |
CN1841397B (zh) | 聚合计算机系统的知识库以主动保护计算机免受恶意软件侵害 | |
CN112637220B (zh) | 一种工控系统安全防护方法及装置 | |
CN112702300B (zh) | 一种安全漏洞的防御方法和设备 | |
CN114598525A (zh) | 一种针对网络攻击的ip自动封禁的方法和装置 | |
CN113839935B (zh) | 网络态势感知方法、装置及系统 | |
CN113660224A (zh) | 基于网络漏洞扫描的态势感知防御方法、装置及系统 | |
KR100989347B1 (ko) | 보안규칙 기반의 웹공격 탐지 방법 | |
CN110162978A (zh) | 一种终端安全风险评估管理方法、装置及系统 | |
KR20170091989A (ko) | 산업 제어 네트워크에서의 보안 관제 평가 시스템 및 방법 | |
Kácha | Idea: security event taxonomy mapping | |
RU2481633C2 (ru) | Система и способ автоматического расследования инцидентов безопасности | |
CN112788023B (zh) | 基于安全网络的蜜罐管理方法及相关装置 | |
CN110086812B (zh) | 一种安全可控的内网安全巡警系统及方法 | |
KR101767591B1 (ko) | 침입탐지 오탐 개선을 위한 시스템 및 방법 | |
Bezobrazov et al. | Artificial immune system for Android OS | |
CN116089940A (zh) | 多源安全威胁检测方法和装置 | |
Kim et al. | A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments. | |
CN114189360B (zh) | 态势感知的网络漏洞防御方法、装置及系统 | |
CN117714126A (zh) | 一种基于人工智能的自动网络安全防护系统及方法 | |
An et al. | Cooperative component testing architecture in collaborating network environment | |
CN116961977A (zh) | 安全检测方法、装置、设备及计算机程序产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1134560 Country of ref document: HK |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: AVG NETHERLANDS PTE. LTD. Free format text: FORMER OWNER: AVG TECHNOLOGIES CY LIMITED Effective date: 20130521 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20130521 Address after: Amsterdam, The Netherlands Patentee after: AVG Netherlands, B.V. Address before: Cyprus Nicosia Patentee before: AVG TECHNOLOGIES CY Ltd. |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1134560 Country of ref document: HK |
|
TR01 | Transfer of patent right |
Effective date of registration: 20190506 Address after: Prague Patentee after: AVAST SOFTWARE S.R.O. Address before: Holland Schiphol Patentee before: Avis Software Pte. Ltd. Effective date of registration: 20190506 Address after: Holland Schiphol Patentee after: Avis Software Pte. Ltd. Address before: Amsterdam, The Netherlands Patentee before: AVG Netherlands, B.V. |
|
TR01 | Transfer of patent right |