IN2013CH05877A - - Google Patents

Download PDF

Info

Publication number
IN2013CH05877A
IN2013CH05877A IN5877CH2013A IN2013CH05877A IN 2013CH05877 A IN2013CH05877 A IN 2013CH05877A IN 5877CH2013 A IN5877CH2013 A IN 5877CH2013A IN 2013CH05877 A IN2013CH05877 A IN 2013CH05877A
Authority
IN
India
Prior art keywords
proof
atleast
sanitizer
cloud computing
computing network
Prior art date
Application number
Other languages
English (en)
Inventor
Saxena Dr Ashutosh
K B Ponnapalli Harigopal
Chaitanya T Krishna
Original Assignee
Infosys Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infosys Ltd filed Critical Infosys Ltd
Priority to IN5877CH2013 priority Critical patent/IN2013CH05877A/en
Priority to US14/493,648 priority patent/US20150172310A1/en
Publication of IN2013CH05877A publication Critical patent/IN2013CH05877A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/031Protect user input by software means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)
IN5877CH2013 2013-12-17 2013-12-17 IN2013CH05877A (enExample)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN5877CH2013 IN2013CH05877A (enExample) 2013-12-17 2013-12-17
US14/493,648 US20150172310A1 (en) 2013-12-17 2014-09-23 Method and system to identify key logging activities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN5877CH2013 IN2013CH05877A (enExample) 2013-12-17 2013-12-17

Publications (1)

Publication Number Publication Date
IN2013CH05877A true IN2013CH05877A (enExample) 2015-06-19

Family

ID=53369917

Family Applications (1)

Application Number Title Priority Date Filing Date
IN5877CH2013 IN2013CH05877A (enExample) 2013-12-17 2013-12-17

Country Status (2)

Country Link
US (1) US20150172310A1 (enExample)
IN (1) IN2013CH05877A (enExample)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9984247B2 (en) 2015-11-19 2018-05-29 International Business Machines Corporation Password theft protection for controlling access to computer software
ES2728292T3 (es) 2016-05-17 2019-10-23 Nolve Dev S L Servidor y método para proporcionar un acceso seguro a servicios basados en la red
US20180075233A1 (en) * 2016-09-13 2018-03-15 Veracode, Inc. Systems and methods for agent-based detection of hacking attempts
US11741253B2 (en) 2019-01-31 2023-08-29 Hewlett Packard Enterprise Development Lp Operating system service sanitization of data associated with sensitive information

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178166B1 (en) * 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
US7509679B2 (en) * 2002-08-30 2009-03-24 Symantec Corporation Method, system and computer program product for security in a global computer network transaction
US20060075494A1 (en) * 2004-10-01 2006-04-06 Bertman Justin R Method and system for analyzing data for potential malware
US7721333B2 (en) * 2006-01-18 2010-05-18 Webroot Software, Inc. Method and system for detecting a keylogger on a computer
US9171157B2 (en) * 2006-03-28 2015-10-27 Blue Coat Systems, Inc. Method and system for tracking access to application data and preventing data exploitation by malicious programs
US20070240212A1 (en) * 2006-03-30 2007-10-11 Check Point Software Technologies, Inc. System and Methodology Protecting Against Key Logger Spyware
US8127316B1 (en) * 2006-11-30 2012-02-28 Quest Software, Inc. System and method for intercepting process creation events
US9098333B1 (en) * 2010-05-07 2015-08-04 Ziften Technologies, Inc. Monitoring computer process resource usage

Also Published As

Publication number Publication date
US20150172310A1 (en) 2015-06-18

Similar Documents

Publication Publication Date Title
WO2015073422A3 (en) System and method for updating an encryption key across a network
MX2014011953A (es) Deteccion de intrusion de red utilizando clave criptografica de señuelo.
WO2019046317A8 (en) Key data processing method and apparatus, and server
WO2016085883A3 (en) Call stack integrity check on client/server systems
SG10201805466SA (en) Methods and apparatus for a distributed database within a network
EP4589493A3 (en) Systems and methods for providing cybersecurity analysis based on operational technologies and information technologies
SG10201900964QA (en) Cloud-based transactions methods and systems
WO2014107438A3 (en) Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
MX356841B (es) Métodos y dispositivos para autorizar una operación.
EP4271017A3 (en) Secured home network
SG10201906917QA (en) Processing data from multiple sources
NZ735353A (en) Systems and methods for organizing devices in a policy hierarchy
GB2491101B (en) Detection of spoofing of remote client system information
PH12018501668A1 (en) Electronic payment service processing method and device, and electronic payment method and device
TW201613416A (en) Node-to-multinode communication
MX2016002141A (es) Acceso habilitado a datos.
EP3627843A3 (en) Systems and methods for performing transport i/o
HK1224398A1 (zh) 数据生成
WO2014117064A3 (en) System and method for detecting a compromised computing system
MY184704A (en) A system and method for authenticating a user based on user behaviour and environmental factors
TR201820719T4 (tr) Bi̇r şi̇fre ayarlama yöntemi̇ ve bunun i̇çi̇n bi̇r eki̇pman.
GB2525316A (en) System and method for generating profile-based alerts/alarms
WO2015127170A3 (en) Method and system for providing a robust and efficient virtual asset vulnerability management and verification service
WO2015102720A3 (en) Method and apparatus for performing intrusion detection with reduced computing resources
MX2018001426A (es) Motor de reglas para dispositivos conectados.