IN2013CH05877A - - Google Patents

Download PDF

Info

Publication number
IN2013CH05877A
IN2013CH05877A IN5877CH2013A IN2013CH05877A IN 2013CH05877 A IN2013CH05877 A IN 2013CH05877A IN 5877CH2013 A IN5877CH2013 A IN 5877CH2013A IN 2013CH05877 A IN2013CH05877 A IN 2013CH05877A
Authority
IN
India
Prior art keywords
proof
atleast
sanitizer
cloud computing
computing network
Prior art date
Application number
Other languages
English (en)
Inventor
Saxena Dr Ashutosh
K B Ponnapalli Harigopal
Chaitanya T Krishna
Original Assignee
Infosys Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infosys Ltd filed Critical Infosys Ltd
Priority to IN5877CH2013 priority Critical patent/IN2013CH05877A/en
Priority to US14/493,648 priority patent/US20150172310A1/en
Publication of IN2013CH05877A publication Critical patent/IN2013CH05877A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/031Protect user input by software means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)
IN5877CH2013 2013-12-17 2013-12-17 IN2013CH05877A (cg-RX-API-DMAC7.html)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN5877CH2013 IN2013CH05877A (cg-RX-API-DMAC7.html) 2013-12-17 2013-12-17
US14/493,648 US20150172310A1 (en) 2013-12-17 2014-09-23 Method and system to identify key logging activities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN5877CH2013 IN2013CH05877A (cg-RX-API-DMAC7.html) 2013-12-17 2013-12-17

Publications (1)

Publication Number Publication Date
IN2013CH05877A true IN2013CH05877A (cg-RX-API-DMAC7.html) 2015-06-19

Family

ID=53369917

Family Applications (1)

Application Number Title Priority Date Filing Date
IN5877CH2013 IN2013CH05877A (cg-RX-API-DMAC7.html) 2013-12-17 2013-12-17

Country Status (2)

Country Link
US (1) US20150172310A1 (cg-RX-API-DMAC7.html)
IN (1) IN2013CH05877A (cg-RX-API-DMAC7.html)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9984247B2 (en) 2015-11-19 2018-05-29 International Business Machines Corporation Password theft protection for controlling access to computer software
PT3247084T (pt) 2016-05-17 2019-06-06 Nolve Dev S L Servidor e metodo para fornecer acesso seguro a serviços com base na web
US20180075233A1 (en) * 2016-09-13 2018-03-15 Veracode, Inc. Systems and methods for agent-based detection of hacking attempts
US11741253B2 (en) 2019-01-31 2023-08-29 Hewlett Packard Enterprise Development Lp Operating system service sanitization of data associated with sensitive information

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178166B1 (en) * 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
US7509679B2 (en) * 2002-08-30 2009-03-24 Symantec Corporation Method, system and computer program product for security in a global computer network transaction
US20060075494A1 (en) * 2004-10-01 2006-04-06 Bertman Justin R Method and system for analyzing data for potential malware
US7721333B2 (en) * 2006-01-18 2010-05-18 Webroot Software, Inc. Method and system for detecting a keylogger on a computer
US9171157B2 (en) * 2006-03-28 2015-10-27 Blue Coat Systems, Inc. Method and system for tracking access to application data and preventing data exploitation by malicious programs
US20070240212A1 (en) * 2006-03-30 2007-10-11 Check Point Software Technologies, Inc. System and Methodology Protecting Against Key Logger Spyware
US8127316B1 (en) * 2006-11-30 2012-02-28 Quest Software, Inc. System and method for intercepting process creation events
US9098333B1 (en) * 2010-05-07 2015-08-04 Ziften Technologies, Inc. Monitoring computer process resource usage

Also Published As

Publication number Publication date
US20150172310A1 (en) 2015-06-18

Similar Documents

Publication Publication Date Title
WO2015073422A3 (en) System and method for updating an encryption key across a network
MX2014011953A (es) Deteccion de intrusion de red utilizando clave criptografica de señuelo.
WO2019046317A8 (en) Key data processing method and apparatus, and server
WO2016085883A3 (en) Call stack integrity check on client/server systems
SG10201805466SA (en) Methods and apparatus for a distributed database within a network
EP4589493A3 (en) Systems and methods for providing cybersecurity analysis based on operational technologies and information technologies
MX2018012396A (es) Sistemas y metodos para proteger dispositivos de red con un cortafuegos.
SG10201900964QA (en) Cloud-based transactions methods and systems
BR112016022268A2 (pt) Treinamento, reconhecimento e geração em uma rede de extrema convicção de pico (dbn)
MX356841B (es) Métodos y dispositivos para autorizar una operación.
EP4271017A3 (en) Secured home network
SG10201906917QA (en) Processing data from multiple sources
NZ735353A (en) Systems and methods for organizing devices in a policy hierarchy
PH12018501668A1 (en) Electronic payment service processing method and device, and electronic payment method and device
TW201613416A (en) Node-to-multinode communication
HK1224398A1 (zh) 数据生成
MX2016000048A (es) Dispositivo y metodo para acuerdo de clave.
WO2014117064A3 (en) System and method for detecting a compromised computing system
MY184704A (en) A system and method for authenticating a user based on user behaviour and environmental factors
IN2013DE02920A (cg-RX-API-DMAC7.html)
TR201820719T4 (tr) Bi̇r şi̇fre ayarlama yöntemi̇ ve bunun i̇çi̇n bi̇r eki̇pman.
GB2525316A (en) System and method for generating profile-based alerts/alarms
WO2015102720A3 (en) Method and apparatus for performing intrusion detection with reduced computing resources
MX2018001426A (es) Motor de reglas para dispositivos conectados.
IN2013CH05877A (cg-RX-API-DMAC7.html)