CN104937604A - 基于地点的进程监视 - Google Patents

基于地点的进程监视 Download PDF

Info

Publication number
CN104937604A
CN104937604A CN201480005775.6A CN201480005775A CN104937604A CN 104937604 A CN104937604 A CN 104937604A CN 201480005775 A CN201480005775 A CN 201480005775A CN 104937604 A CN104937604 A CN 104937604A
Authority
CN
China
Prior art keywords
location
processes
behavior
monitored
determined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201480005775.6A
Other languages
English (en)
Chinese (zh)
Inventor
拉贾什·古普塔
萨乌米特拉·莫汉·达斯
艾曼·福齐·纳吉布
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN104937604A publication Critical patent/CN104937604A/zh
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)
CN201480005775.6A 2013-02-01 2014-01-10 基于地点的进程监视 Pending CN104937604A (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/757,268 2013-02-01
US13/757,268 US9330256B2 (en) 2013-02-01 2013-02-01 Location based process-monitoring
PCT/US2014/010947 WO2014120409A1 (en) 2013-02-01 2014-01-10 Location based process-monitoring

Publications (1)

Publication Number Publication Date
CN104937604A true CN104937604A (zh) 2015-09-23

Family

ID=50030516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480005775.6A Pending CN104937604A (zh) 2013-02-01 2014-01-10 基于地点的进程监视

Country Status (6)

Country Link
US (2) US9330256B2 (enExample)
EP (1) EP2951752B1 (enExample)
JP (1) JP2016513311A (enExample)
KR (1) KR20150113100A (enExample)
CN (1) CN104937604A (enExample)
WO (1) WO2014120409A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109478218A (zh) * 2016-07-14 2019-03-15 高通股份有限公司 用于分类执行会话的装置和方法
CN116644421A (zh) * 2023-07-19 2023-08-25 北京小米移动软件有限公司 一种定位引擎调用信息的获取方法及装置

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9698991B2 (en) 2013-03-15 2017-07-04 Ologn Technologies Ag Systems, methods and apparatuses for device attestation based on speed of computation
US10177915B2 (en) 2013-03-15 2019-01-08 Ologn Technologies Ag Systems, methods and apparatuses for device attestation based on speed of computation
US9456344B2 (en) 2013-03-15 2016-09-27 Ologn Technologies Ag Systems, methods and apparatuses for ensuring proximity of communication device
KR101794116B1 (ko) 2013-03-18 2017-11-06 더 트러스티스 오브 컬럼비아 유니버시티 인 더 시티 오브 뉴욕 하드웨어 특징들을 사용한 이상 프로세스들의 비감시된 검출
WO2014149080A1 (en) * 2013-03-18 2014-09-25 The Trustees Of Columbia University In The City Of New York Detection of anomalous program execution using hardware-based micro-architectural data
EP2995061B1 (en) 2013-05-10 2018-04-18 OLogN Technologies AG Ensuring proximity of wifi communication devices
KR101752305B1 (ko) * 2013-05-30 2017-06-29 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 무선 통신을 제공하기 위한 스킴
US9455998B2 (en) 2013-09-17 2016-09-27 Ologn Technologies Ag Systems, methods and apparatuses for prevention of relay attacks
US10027689B1 (en) * 2014-09-29 2018-07-17 Fireeye, Inc. Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en) 2014-09-29 2017-09-26 Fireeye, Inc. Exploit detection of malware and malware families
US10028084B2 (en) * 2015-02-10 2018-07-17 Qualcomm Incorporated Adaptive position indicator
US20180011772A1 (en) * 2015-03-31 2018-01-11 Hewlett-Packard Development Company, L.P. Peripheral device operation
US9606633B2 (en) * 2015-05-08 2017-03-28 John W. Downey Method and apparatus for input to electronic devices
CN106332252A (zh) * 2015-07-07 2017-01-11 手持产品公司 基于单元信号的wifi启用
US10037419B2 (en) 2016-07-11 2018-07-31 Richard James Hallock System, method, and apparatus for personal identification
US10216914B2 (en) 2015-08-18 2019-02-26 Richard James Hallock System, method, and apparatus for personal identification
US11102648B2 (en) 2015-08-18 2021-08-24 Proteqsit Llc System, method, and apparatus for enhanced personal identification
US10097560B1 (en) 2016-03-08 2018-10-09 Symantec Corporation Systems and methods for automatically adjusting user access permissions based on beacon proximity
US10783397B2 (en) 2016-06-29 2020-09-22 Intel Corporation Network edge device with image thresholding
US10664879B2 (en) * 2016-07-07 2020-05-26 Sony Corporation Electronic device, apparatus and system
US10878256B2 (en) * 2016-10-07 2020-12-29 Aisin Aw Co., Ltd. Travel assistance device and computer program
US10878102B2 (en) * 2017-05-16 2020-12-29 Micro Focus Llc Risk scores for entities
US11494502B2 (en) * 2018-10-25 2022-11-08 Microsoft Technology Licensing, Llc Privacy awareness for personal assistant communications
US11023576B2 (en) * 2018-11-28 2021-06-01 International Business Machines Corporation Detecting malicious activity on a computer system
US10638404B1 (en) * 2018-12-13 2020-04-28 Securus Technologies, Inc. Controlled-environment facility mobile device location tracking
US12072405B2 (en) 2021-11-08 2024-08-27 Nightwing Group, Llc Context-aware, intelligent beaconing
US12177229B2 (en) * 2022-02-25 2024-12-24 Bank Of America Corporation Detecting and preventing botnet attacks using client-specific event payloads

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140246A1 (en) * 2002-01-18 2003-07-24 Palm, Inc. Location based security modification system and method
CN1697553A (zh) * 2004-05-13 2005-11-16 国际商业机器公司 对无线通信设备部件进行基于位置的控制
EP1653386A2 (en) * 2004-10-29 2006-05-03 Kabushiki Kaisha Toshiba Information processing apparatus and operation control method
US20100251365A1 (en) * 2009-03-26 2010-09-30 Lyne James I G Dynamic scanning based on compliance metadata

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6236365B1 (en) * 1996-09-09 2001-05-22 Tracbeam, Llc Location of a mobile station using a plurality of commercial wireless infrastructures
US7054614B1 (en) 2000-08-07 2006-05-30 Denso Corporation Context privacy for delivery of context-aware content for wireless terminals
US7428411B2 (en) 2000-12-19 2008-09-23 At&T Delaware Intellectual Property, Inc. Location-based security rules
US7051196B2 (en) 2001-12-05 2006-05-23 Hewlett-Packard Development Company, L.P. Location-based security for a portable computer
US8020192B2 (en) 2003-02-28 2011-09-13 Michael Wright Administration of protection of data accessible by a mobile device
WO2005081110A2 (en) * 2004-02-13 2005-09-01 Memento Inc. System and method for instrumenting a software application
US7788281B2 (en) * 2004-03-12 2010-08-31 International Business Machines Corporation Evaluation of spatial rules over a mobile population
US8108929B2 (en) * 2004-10-19 2012-01-31 Reflex Systems, LLC Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms
US20060206941A1 (en) * 2005-03-08 2006-09-14 Praesidium Technologies, Ltd. Communications system with distributed risk management
US20070129084A1 (en) * 2005-12-05 2007-06-07 Nortel Networks Limited Creating and recognizing user-defined locations using communication terminals
US20080014964A1 (en) * 2006-07-12 2008-01-17 Loc-Aid Technologies, Inc. System and method for generating use statistics for location-based applications
US8126456B2 (en) * 2007-01-17 2012-02-28 Eagency, Inc. Mobile communication device monitoring systems and methods
US8712396B2 (en) * 2007-01-17 2014-04-29 Eagency, Inc. Mobile communication device monitoring systems and methods
US7996005B2 (en) * 2007-01-17 2011-08-09 Eagency, Inc. Mobile communication device monitoring systems and methods
US7633438B2 (en) * 2007-01-29 2009-12-15 Research In Motion Limited Method of downloading ephemeris data based on user activity
US8380179B2 (en) * 2007-03-30 2013-02-19 Samsung Electronics Co., Ltd. System and method for learning based device management
JP2009070073A (ja) * 2007-09-12 2009-04-02 Sumitomo Electric Ind Ltd 情報処理装置及びエージェントコンピュータプログラム
US8682960B2 (en) * 2008-03-14 2014-03-25 Nokia Corporation Methods, apparatuses, and computer program products for providing filtered services and content based on user context
US9031536B2 (en) * 2008-04-02 2015-05-12 Yougetitback Limited Method for mitigating the unauthorized use of a device
US8289130B2 (en) * 2009-02-19 2012-10-16 Apple Inc. Systems and methods for identifying unauthorized users of an electronic device
US8271057B2 (en) * 2009-03-16 2012-09-18 Waze Mobile Ltd. Condition-based activation, shut-down and management of applications of mobile devices
US8412647B2 (en) * 2009-06-02 2013-04-02 Wavemarket, Inc. Behavior monitoring system and method
US8254957B2 (en) * 2009-06-16 2012-08-28 Intel Corporation Context-based limitation of mobile device operation
US8131846B1 (en) * 2009-07-06 2012-03-06 Symantec Corporation Global, location-aware computer security
US8607340B2 (en) * 2009-07-21 2013-12-10 Sophos Limited Host intrusion prevention system using software and user behavior analysis
US8776218B2 (en) * 2009-07-21 2014-07-08 Sophos Limited Behavioral-based host intrusion prevention system
US20110087495A1 (en) * 2009-10-14 2011-04-14 Bank Of America Corporation Suspicious entity investigation and related monitoring in a business enterprise environment
US20110099037A1 (en) * 2009-10-27 2011-04-28 Useful Networks, Inc. Location-Based, Time Sensitive Wireless Exchange
US8800034B2 (en) * 2010-01-26 2014-08-05 Bank Of America Corporation Insider threat correlation tool
US20110209215A1 (en) * 2010-02-22 2011-08-25 Hazem Kabbara Intelligent Network Security Resource Deployment System
CN102281513B (zh) * 2010-06-13 2013-12-11 电信科学技术研究院 一种机器类通信监测处理方法及设备
US8606260B2 (en) * 2010-08-18 2013-12-10 Apple Inc. Location-based profile
US8789144B2 (en) 2010-10-06 2014-07-22 Citrix Systems, Inc. Mediating resource access based on a physical location of a mobile device
US9215244B2 (en) * 2010-11-18 2015-12-15 The Boeing Company Context aware network security monitoring for threat detection
US9015843B2 (en) * 2010-12-03 2015-04-21 Microsoft Corporation Predictive malware threat mitigation
US8994880B2 (en) * 2011-03-25 2015-03-31 Sony Corporation System and methods for automatic power saving via device location identification
US8677497B2 (en) * 2011-10-17 2014-03-18 Mcafee, Inc. Mobile risk assessment
US9058486B2 (en) * 2011-10-18 2015-06-16 Mcafee, Inc. User behavioral risk assessment
US9832211B2 (en) * 2012-03-19 2017-11-28 Qualcomm, Incorporated Computing device to detect malware
US9092616B2 (en) * 2012-05-01 2015-07-28 Taasera, Inc. Systems and methods for threat identification and remediation
US20140172478A1 (en) * 2012-12-13 2014-06-19 TCT Hungqary Kft. Methods and system for automatic work logging and tracking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140246A1 (en) * 2002-01-18 2003-07-24 Palm, Inc. Location based security modification system and method
CN1697553A (zh) * 2004-05-13 2005-11-16 国际商业机器公司 对无线通信设备部件进行基于位置的控制
EP1653386A2 (en) * 2004-10-29 2006-05-03 Kabushiki Kaisha Toshiba Information processing apparatus and operation control method
US20100251365A1 (en) * 2009-03-26 2010-09-30 Lyne James I G Dynamic scanning based on compliance metadata

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BRYAN DIXON等: "《SPSM "11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices》", 17 October 2011 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109478218A (zh) * 2016-07-14 2019-03-15 高通股份有限公司 用于分类执行会话的装置和方法
CN109478218B (zh) * 2016-07-14 2021-10-29 高通股份有限公司 用于分类执行会话的装置和方法
CN116644421A (zh) * 2023-07-19 2023-08-25 北京小米移动软件有限公司 一种定位引擎调用信息的获取方法及装置

Also Published As

Publication number Publication date
KR20150113100A (ko) 2015-10-07
EP2951752A1 (en) 2015-12-09
EP2951752B1 (en) 2017-09-27
US20140223553A1 (en) 2014-08-07
WO2014120409A1 (en) 2014-08-07
US20160217281A1 (en) 2016-07-28
JP2016513311A (ja) 2016-05-12
US9330256B2 (en) 2016-05-03

Similar Documents

Publication Publication Date Title
EP2951752B1 (en) Location based process-monitoring
US20140331272A1 (en) Location based enforcement of mobile policy
KR102252566B1 (ko) 로케이션 서비스를 개선하기 위해 3차원 로케이션 정보를 사용하기 위한 시스템 및 방법
EP3664513B1 (en) Positioning method and apparatus
US9119169B2 (en) Beacon group information assisted wireless location determination
KR101589419B1 (ko) 모바일 디바이스 포지셔닝을 위한 적응성 패시브 스캐닝 및/또는 액티브 프로빙 기술들
US9247381B2 (en) System, method and devices for delivering positioning assistance data
US10254188B2 (en) Adaptive pressure sensor sampling rate
US8781494B2 (en) Crowd sourcing with robust device position determination
US9329036B2 (en) Mobile device positioning based on independently obtained barometric pressure measurements
US9820233B2 (en) Motion state based mobile device positioning
US9361889B2 (en) Landmark based positioning with verbal input
US20140064112A1 (en) Context-based position determination
JP2016528750A (ja) ベニュー測位能力に適応するための方法
CN106461398B (zh) 基于所估计轨迹的潜在阻碍的量度的移动装置位置不确定性
KR20150094665A (ko) Rssi 및 rtt 데이터에 기초한 위치 결정에서 지도들의 제공 및 활용
RU2696603C1 (ru) Способ, устройство и система для определения внутреннего местоположения

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150923

WD01 Invention patent application deemed withdrawn after publication