IN2013CH05877A - - Google Patents
Download PDFInfo
- Publication number
- IN2013CH05877A IN2013CH05877A IN5877CH2013A IN2013CH05877A IN 2013CH05877 A IN2013CH05877 A IN 2013CH05877A IN 5877CH2013 A IN5877CH2013 A IN 5877CH2013A IN 2013CH05877 A IN2013CH05877 A IN 2013CH05877A
- Authority
- IN
- India
- Prior art keywords
- proof
- atleast
- sanitizer
- cloud computing
- computing network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/031—Protect user input by software means
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN5877CH2013 IN2013CH05877A (enExample) | 2013-12-17 | 2013-12-17 | |
| US14/493,648 US20150172310A1 (en) | 2013-12-17 | 2014-09-23 | Method and system to identify key logging activities |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN5877CH2013 IN2013CH05877A (enExample) | 2013-12-17 | 2013-12-17 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2013CH05877A true IN2013CH05877A (enExample) | 2015-06-19 |
Family
ID=53369917
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN5877CH2013 IN2013CH05877A (enExample) | 2013-12-17 | 2013-12-17 |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US20150172310A1 (enExample) |
| IN (1) | IN2013CH05877A (enExample) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9984247B2 (en) | 2015-11-19 | 2018-05-29 | International Business Machines Corporation | Password theft protection for controlling access to computer software |
| ES2728292T3 (es) | 2016-05-17 | 2019-10-23 | Nolve Dev S L | Servidor y método para proporcionar un acceso seguro a servicios basados en la red |
| US20180075233A1 (en) * | 2016-09-13 | 2018-03-15 | Veracode, Inc. | Systems and methods for agent-based detection of hacking attempts |
| US11741253B2 (en) | 2019-01-31 | 2023-08-29 | Hewlett Packard Enterprise Development Lp | Operating system service sanitization of data associated with sensitive information |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7178166B1 (en) * | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
| US7509679B2 (en) * | 2002-08-30 | 2009-03-24 | Symantec Corporation | Method, system and computer program product for security in a global computer network transaction |
| US20060075494A1 (en) * | 2004-10-01 | 2006-04-06 | Bertman Justin R | Method and system for analyzing data for potential malware |
| US7721333B2 (en) * | 2006-01-18 | 2010-05-18 | Webroot Software, Inc. | Method and system for detecting a keylogger on a computer |
| US9171157B2 (en) * | 2006-03-28 | 2015-10-27 | Blue Coat Systems, Inc. | Method and system for tracking access to application data and preventing data exploitation by malicious programs |
| US20070240212A1 (en) * | 2006-03-30 | 2007-10-11 | Check Point Software Technologies, Inc. | System and Methodology Protecting Against Key Logger Spyware |
| US8127316B1 (en) * | 2006-11-30 | 2012-02-28 | Quest Software, Inc. | System and method for intercepting process creation events |
| US9098333B1 (en) * | 2010-05-07 | 2015-08-04 | Ziften Technologies, Inc. | Monitoring computer process resource usage |
-
2013
- 2013-12-17 IN IN5877CH2013 patent/IN2013CH05877A/en unknown
-
2014
- 2014-09-23 US US14/493,648 patent/US20150172310A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| US20150172310A1 (en) | 2015-06-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2015073422A3 (en) | System and method for updating an encryption key across a network | |
| MX2014011953A (es) | Deteccion de intrusion de red utilizando clave criptografica de señuelo. | |
| WO2019046317A8 (en) | Key data processing method and apparatus, and server | |
| WO2016085883A3 (en) | Call stack integrity check on client/server systems | |
| SG10201805466SA (en) | Methods and apparatus for a distributed database within a network | |
| EP4589493A3 (en) | Systems and methods for providing cybersecurity analysis based on operational technologies and information technologies | |
| SG10201900964QA (en) | Cloud-based transactions methods and systems | |
| WO2014107438A3 (en) | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors | |
| MX356841B (es) | Métodos y dispositivos para autorizar una operación. | |
| EP4271017A3 (en) | Secured home network | |
| SG10201906917QA (en) | Processing data from multiple sources | |
| NZ735353A (en) | Systems and methods for organizing devices in a policy hierarchy | |
| GB2491101B (en) | Detection of spoofing of remote client system information | |
| PH12018501668A1 (en) | Electronic payment service processing method and device, and electronic payment method and device | |
| TW201613416A (en) | Node-to-multinode communication | |
| MX2016002141A (es) | Acceso habilitado a datos. | |
| EP3627843A3 (en) | Systems and methods for performing transport i/o | |
| HK1224398A1 (zh) | 数据生成 | |
| WO2014117064A3 (en) | System and method for detecting a compromised computing system | |
| MY184704A (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
| TR201820719T4 (tr) | Bi̇r şi̇fre ayarlama yöntemi̇ ve bunun i̇çi̇n bi̇r eki̇pman. | |
| GB2525316A (en) | System and method for generating profile-based alerts/alarms | |
| WO2015127170A3 (en) | Method and system for providing a robust and efficient virtual asset vulnerability management and verification service | |
| WO2015102720A3 (en) | Method and apparatus for performing intrusion detection with reduced computing resources | |
| MX2018001426A (es) | Motor de reglas para dispositivos conectados. |