IN2014MN02026A - - Google Patents
Download PDFInfo
- Publication number
- IN2014MN02026A IN2014MN02026A IN2026MUN2014A IN2014MN02026A IN 2014MN02026 A IN2014MN02026 A IN 2014MN02026A IN 2026MUN2014 A IN2026MUN2014 A IN 2026MUN2014A IN 2014MN02026 A IN2014MN02026 A IN 2014MN02026A
- Authority
- IN
- India
- Prior art keywords
- signature
- behavioral
- caching
- scalability
- latency
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1433—Saving, restoring, recovering or retrying at system level during software upgrading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
- G06F11/3072—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
- G06F11/3082—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting the data filtering being achieved by aggregating or compressing the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
- H04W52/0258—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity controlling an operation mode according to history or models of usage information, e.g. activity schedule or time of day
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Mathematical Physics (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Debugging And Monitoring (AREA)
- Retry When Errors Occur (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Memory System Of A Hierarchy Structure (AREA)
- Indicating Or Recording The Presence, Absence, Or Direction Of Movement (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
- Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)
Abstract
The various aspects include methods systems and devices configured to make use of caching techniques and behavior signature caches to improve processor performance and/or reduce the amount of power consumed by the computing device by reducing analyzer latency. The signature caching system may be configured to adapt to rapid and frequent changes in behavioral specifications and models and provide a multi fold improvement in the scalability of behavioral analysis operations performed on the mobile device.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261646590P | 2012-05-14 | 2012-05-14 | |
US201261683274P | 2012-08-15 | 2012-08-15 | |
US13/749,948 US9349001B2 (en) | 2012-05-14 | 2013-01-25 | Methods and systems for minimizing latency of behavioral analysis |
PCT/US2013/023646 WO2013172881A1 (en) | 2012-05-14 | 2013-01-29 | Minimizing latency of behavioral analysis using signature caches |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014MN02026A true IN2014MN02026A (en) | 2015-08-14 |
Family
ID=49548974
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN2172MUN2014 IN2014MN02172A (en) | 2012-05-14 | 2012-12-04 | |
IN2026MUN2014 IN2014MN02026A (en) | 2012-05-14 | 2013-01-29 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN2172MUN2014 IN2014MN02172A (en) | 2012-05-14 | 2012-12-04 |
Country Status (8)
Country | Link |
---|---|
US (6) | US9202047B2 (en) |
EP (3) | EP2850864B1 (en) |
JP (1) | JP6110482B2 (en) |
KR (2) | KR101626243B1 (en) |
CN (4) | CN104272786B (en) |
IN (2) | IN2014MN02172A (en) |
TW (1) | TW201407406A (en) |
WO (4) | WO2013172865A1 (en) |
Families Citing this family (141)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9071518B2 (en) * | 2011-07-01 | 2015-06-30 | Fiberlink Communications Corporation | Rules based actions for mobile device management |
US9916192B2 (en) * | 2012-01-12 | 2018-03-13 | International Business Machines Corporation | Thread based dynamic data collection |
US8973137B1 (en) * | 2012-02-29 | 2015-03-03 | Symantec Corporation | Systems and methods for detecting illegitimate out-of-band authentication attempts |
US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
US10162693B1 (en) * | 2012-10-18 | 2018-12-25 | Sprint Communications Company L.P. | Evaluation of mobile device state and performance metrics for diagnosis and troubleshooting of performance issues |
WO2014063124A1 (en) * | 2012-10-19 | 2014-04-24 | Mcafee, Inc. | Mobile application management |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
US9659085B2 (en) * | 2012-12-28 | 2017-05-23 | Microsoft Technology Licensing, Llc | Detecting anomalies in behavioral network with contextual side information |
US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
EP2949144B1 (en) * | 2013-01-25 | 2020-09-16 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US20160110551A1 (en) * | 2013-02-14 | 2016-04-21 | The United States Of America As Represented By The Secretary Of The Navy | Computer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata |
US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
GB2526501A (en) | 2013-03-01 | 2015-11-25 | Redowl Analytics Inc | Modeling social behavior |
US20140249785A1 (en) | 2013-03-01 | 2014-09-04 | RedOwl Analytics, Inc. | Modeling social behavior |
US20140292998A1 (en) * | 2013-04-02 | 2014-10-02 | James Toga | Managing Use of Resources in Mobile Devices |
US9307374B2 (en) * | 2013-06-19 | 2016-04-05 | Globalfoundries Inc. | Transferring information on a first mobile computing device to a peer mobile computing device |
US9231921B2 (en) | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
US20150095477A1 (en) * | 2013-09-30 | 2015-04-02 | Elwha LLC, a limited liability company of the State of Delaware | Mobile device sharing facilitation methods and systems featuring party identifier inclusions that are conditional |
US9805208B2 (en) * | 2013-09-30 | 2017-10-31 | Elwha Llc | Mobile device sharing facilitation methods and systems with recipient-dependent inclusion of a data selection |
US9774728B2 (en) | 2013-09-30 | 2017-09-26 | Elwha Llc | Mobile device sharing facilitation methods and systems in a context of plural communication records |
US9740875B2 (en) * | 2013-09-30 | 2017-08-22 | Elwha Llc | Mobile device sharing facilitation methods and systems featuring exclusive data presentation |
US9838536B2 (en) | 2013-09-30 | 2017-12-05 | Elwha, Llc | Mobile device sharing facilitation methods and systems |
US9826439B2 (en) | 2013-09-30 | 2017-11-21 | Elwha Llc | Mobile device sharing facilitation methods and systems operable in network equipment |
TWI533159B (en) * | 2013-10-18 | 2016-05-11 | 國立臺灣科技大學 | A continuous identity authentication method for computer users |
DE102013224702A1 (en) * | 2013-12-03 | 2015-06-03 | Robert Bosch Gmbh | Control device for a motor vehicle |
US9652362B2 (en) | 2013-12-06 | 2017-05-16 | Qualcomm Incorporated | Methods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors |
US9813992B2 (en) | 2013-12-06 | 2017-11-07 | Mcp Llc | Tracking systems and methods for remotely tracking a location of a person on a map of a monitored premise |
EP3084672B1 (en) | 2013-12-19 | 2019-09-18 | Intel Corporation | Protection system including machine learning snapshot evaluation |
CN103699208B (en) * | 2013-12-31 | 2016-11-23 | 贝壳网际(北京)安全技术有限公司 | Hardware setting method, mobile terminal and the server of a kind of mobile terminal |
US9501346B2 (en) * | 2014-01-21 | 2016-11-22 | Oracle International Corporation | Fine and coarse granularity logging handler |
WO2015110494A1 (en) * | 2014-01-23 | 2015-07-30 | Koninklijke Kpn N.V. | Crash recovery for smart objects |
WO2015112760A1 (en) * | 2014-01-23 | 2015-07-30 | Qualcomm Incorporated | Adaptive observation of determined behavioral features on a mobile device |
US10176428B2 (en) | 2014-03-13 | 2019-01-08 | Qualcomm Incorporated | Behavioral analysis for securing peripheral devices |
US9684787B2 (en) * | 2014-04-08 | 2017-06-20 | Qualcomm Incorporated | Method and system for inferring application states by performing behavioral analysis operations in a mobile device |
US9559918B2 (en) * | 2014-05-15 | 2017-01-31 | Cisco Technology, Inc. | Ground truth evaluation for voting optimization |
US9672263B1 (en) | 2014-06-23 | 2017-06-06 | The United States Of America As Represented By The Secretary Of The Navy | Reliability engineering data integration |
US9357397B2 (en) | 2014-07-23 | 2016-05-31 | Qualcomm Incorporated | Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device |
US10228751B2 (en) | 2014-08-06 | 2019-03-12 | Apple Inc. | Low power mode |
US9647489B2 (en) | 2014-08-26 | 2017-05-09 | Apple Inc. | Brownout avoidance |
US20170285722A1 (en) * | 2014-08-27 | 2017-10-05 | Samsung Electronics Co., Ltd. | Method for reducing battery consumption in electronic device |
FR3025627B1 (en) * | 2014-09-10 | 2018-03-23 | Bull Sas | HIGH PERFORMANCE MECHANISM FOR GENERATING JOURNALIZATION INFORMATION OF A COMPUTER PROCESS |
US9710752B2 (en) * | 2014-09-11 | 2017-07-18 | Qualcomm Incorporated | Methods and systems for aggregated multi-application behavioral analysis of mobile device behaviors |
US20160078362A1 (en) * | 2014-09-15 | 2016-03-17 | Qualcomm Incorporated | Methods and Systems of Dynamically Determining Feature Sets for the Efficient Classification of Mobile Device Behaviors |
US20160125094A1 (en) * | 2014-11-05 | 2016-05-05 | Nec Laboratories America, Inc. | Method and system for behavior query construction in temporal graphs using discriminative sub-trace mining |
US9411363B2 (en) * | 2014-12-10 | 2016-08-09 | Intel Corporation | Synchronization in a computing device |
US10200866B1 (en) | 2014-12-12 | 2019-02-05 | Aeris Communications, Inc. | Method and system for detecting and minimizing harmful network device and application behavior on cellular networks |
US10275341B2 (en) * | 2015-01-21 | 2019-04-30 | Somo Innovations Ltd | Mobile application usability testing |
US10685142B2 (en) | 2015-02-02 | 2020-06-16 | Indiana University Research And Technology Corporation | External resource control of mobile devices |
US20160232353A1 (en) * | 2015-02-09 | 2016-08-11 | Qualcomm Incorporated | Determining Model Protection Level On-Device based on Malware Detection in Similar Devices |
US9910984B2 (en) | 2015-02-27 | 2018-03-06 | Qualcomm Incorporated | Methods and systems for on-device high-granularity classification of device behaviors using multi-label models |
US9787695B2 (en) * | 2015-03-24 | 2017-10-10 | Qualcomm Incorporated | Methods and systems for identifying malware through differences in cloud vs. client behavior |
US10659479B2 (en) * | 2015-03-27 | 2020-05-19 | Mcafee, Llc | Determination of sensor usage |
EP3289510B1 (en) | 2015-05-01 | 2020-06-17 | Lookout Inc. | Determining source of side-loaded software |
US10104107B2 (en) * | 2015-05-11 | 2018-10-16 | Qualcomm Incorporated | Methods and systems for behavior-specific actuation for real-time whitelisting |
CN105049592B (en) * | 2015-05-27 | 2020-02-14 | 中国科学院信息工程研究所 | Mobile intelligent terminal voice safety protection method and system |
KR102446325B1 (en) | 2015-06-24 | 2022-09-22 | 삼성전자주식회사 | Operating Method For Application Program and electronic device supporting the same |
US9954873B2 (en) | 2015-09-30 | 2018-04-24 | The Mitre Corporation | Mobile device-based intrusion prevention system |
CN105426296B (en) * | 2015-11-24 | 2018-04-10 | 无锡江南计算技术研究所 | Internuclear collaboration multithreading PMU event monitoring methods based on inserting label |
CN105653903B (en) * | 2015-12-18 | 2019-10-08 | 小米科技有限责任公司 | The management method and device of application program permission |
US10064139B2 (en) * | 2015-12-26 | 2018-08-28 | Intel IP Corporation | Context-assisted thermal management scheme in a portable device |
US10133639B2 (en) | 2016-02-10 | 2018-11-20 | International Business Machines Corporation | Privacy protection of media files for automatic cloud backup systems |
US10552615B2 (en) | 2016-02-18 | 2020-02-04 | Swimlane Llc | Threat response systems and methods |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10826933B1 (en) * | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10157134B2 (en) * | 2016-04-11 | 2018-12-18 | International Business Machines Corporation | Decreasing the data handoff interval for a reserved cache line based on an early indication of a systemwide coherence response |
CN106095593B (en) | 2016-05-31 | 2019-04-16 | Oppo广东移动通信有限公司 | A kind of forward and backward scape application behavior synchronous method and device |
CN106709342B (en) * | 2016-07-01 | 2018-11-09 | 腾讯科技(深圳)有限公司 | Malware detection methods and device |
US10678921B2 (en) | 2016-09-30 | 2020-06-09 | AVAST Software s.r.o. | Detecting malware with hash-based fingerprints |
US10318723B1 (en) | 2016-11-29 | 2019-06-11 | Sprint Communications Company L.P. | Hardware-trusted network-on-chip (NOC) and system-on-chip (SOC) network function virtualization (NFV) data communications |
US10708282B2 (en) * | 2017-03-27 | 2020-07-07 | International Business Machines Corporation | Unauthorized data access detection based on cyber security images |
US11095733B2 (en) | 2017-05-10 | 2021-08-17 | Embee Mobile, Inc. | System and method for the capture of mobile behavior, usage, or content exposure based on changes in UI layout |
US10917423B2 (en) | 2017-05-15 | 2021-02-09 | Forcepoint, LLC | Intelligently differentiating between different types of states and attributes when using an adaptive trust profile |
US10943019B2 (en) | 2017-05-15 | 2021-03-09 | Forcepoint, LLC | Adaptive trust profile endpoint |
US10129269B1 (en) | 2017-05-15 | 2018-11-13 | Forcepoint, LLC | Managing blockchain access to user profile information |
US9882918B1 (en) | 2017-05-15 | 2018-01-30 | Forcepoint, LLC | User behavior profile in a blockchain |
US10447718B2 (en) | 2017-05-15 | 2019-10-15 | Forcepoint Llc | User profile definition and management |
US10999297B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Using expected behavior of an entity when prepopulating an adaptive trust profile |
US10862927B2 (en) | 2017-05-15 | 2020-12-08 | Forcepoint, LLC | Dividing events into sessions during adaptive trust profile operations |
US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
US11888859B2 (en) | 2017-05-15 | 2024-01-30 | Forcepoint Llc | Associating a security risk persona with a phase of a cyber kill chain |
JP6767924B2 (en) | 2017-05-19 | 2020-10-14 | 東芝映像ソリューション株式会社 | Systems, methods and programs |
JP6767926B2 (en) | 2017-05-23 | 2020-10-14 | 東芝映像ソリューション株式会社 | Electronics, methods and programs |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US10305923B2 (en) * | 2017-06-30 | 2019-05-28 | SparkCognition, Inc. | Server-supported malware detection and protection |
US10318729B2 (en) * | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
US20190141068A1 (en) * | 2017-09-21 | 2019-05-09 | Camp Mobile Corporation | Online service abuser detection |
US20190102543A1 (en) | 2017-09-29 | 2019-04-04 | AVAST Software s.r.o. | Observation and classification of device events |
US20190104141A1 (en) * | 2017-10-02 | 2019-04-04 | Zuk Avraham | System and Method for Providing and Facilitating an Information Security Marketplace |
US10803178B2 (en) | 2017-10-31 | 2020-10-13 | Forcepoint Llc | Genericized data model to perform a security analytics operation |
US11363133B1 (en) | 2017-12-20 | 2022-06-14 | Apple Inc. | Battery health-based power management |
US10599199B1 (en) | 2017-12-20 | 2020-03-24 | Apple Inc. | Systems and methods for power management at device shutdown |
US10817307B1 (en) * | 2017-12-20 | 2020-10-27 | Apple Inc. | API behavior modification based on power source health |
CN109471655B (en) * | 2017-12-25 | 2021-08-13 | 北京安天网络安全技术有限公司 | Business application updating method and system based on closed barrier model |
US10311404B1 (en) | 2018-01-05 | 2019-06-04 | Accenture Global Solutions Limited | Software product development defect and issue prediction and diagnosis |
US11314787B2 (en) | 2018-04-18 | 2022-04-26 | Forcepoint, LLC | Temporal resolution of an entity |
US11755584B2 (en) | 2018-07-12 | 2023-09-12 | Forcepoint Llc | Constructing distributions of interrelated event features |
US11810012B2 (en) | 2018-07-12 | 2023-11-07 | Forcepoint Llc | Identifying event distributions using interrelated events |
US10949428B2 (en) | 2018-07-12 | 2021-03-16 | Forcepoint, LLC | Constructing event distributions via a streaming scoring operation |
US11436512B2 (en) | 2018-07-12 | 2022-09-06 | Forcepoint, LLC | Generating extracted features from an event |
US10776208B2 (en) * | 2018-07-18 | 2020-09-15 | EMC IP Holding Company LLC | Distributed memory checkpointing using storage class memory systems |
US11025638B2 (en) | 2018-07-19 | 2021-06-01 | Forcepoint, LLC | System and method providing security friction for atypical resource access requests |
US11811799B2 (en) | 2018-08-31 | 2023-11-07 | Forcepoint Llc | Identifying security risks using distributions of characteristic features extracted from a plurality of events |
US10248527B1 (en) * | 2018-09-19 | 2019-04-02 | Amplero, Inc | Automated device-specific dynamic operation modifications |
US10740656B2 (en) * | 2018-09-19 | 2020-08-11 | Hughes Network Systems, Llc | Machine learning clustering models for determining the condition of a communication system |
US11916953B2 (en) * | 2018-09-24 | 2024-02-27 | Cybereason, Inc. | Method and mechanism for detection of pass-the-hash attacks |
US11025659B2 (en) | 2018-10-23 | 2021-06-01 | Forcepoint, LLC | Security system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors |
CN109302402A (en) * | 2018-10-26 | 2019-02-01 | 北京芯盾时代科技有限公司 | A kind of behavioral value method and device |
US11171980B2 (en) | 2018-11-02 | 2021-11-09 | Forcepoint Llc | Contagion risk detection, analysis and protection |
CN111309402B (en) * | 2018-12-11 | 2023-06-27 | 阿里巴巴集团控股有限公司 | Data monitoring and application program processing method, device and equipment |
US10997295B2 (en) | 2019-04-26 | 2021-05-04 | Forcepoint, LLC | Adaptive trust profile reference architecture |
US11256802B1 (en) * | 2019-05-10 | 2022-02-22 | Ca, Inc. | Application behavioral fingerprints |
CN110287023B (en) * | 2019-06-11 | 2021-12-10 | 广州海格通信集团股份有限公司 | Message processing method and device, computer equipment and readable storage medium |
CN110990829B (en) * | 2019-11-21 | 2021-09-28 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for training GBDT model in trusted execution environment |
CN111258824B (en) * | 2020-01-18 | 2024-02-27 | 重庆宏帆动能科技有限公司 | Incremental check point fault tolerance method based on artificial potential field in cloud computing |
US11489862B2 (en) | 2020-01-22 | 2022-11-01 | Forcepoint Llc | Anticipating future behavior using kill chains |
US11630901B2 (en) | 2020-02-03 | 2023-04-18 | Forcepoint Llc | External trigger induced behavioral analyses |
US11080109B1 (en) | 2020-02-27 | 2021-08-03 | Forcepoint Llc | Dynamically reweighting distributions of event observations |
US11429697B2 (en) | 2020-03-02 | 2022-08-30 | Forcepoint, LLC | Eventually consistent entity resolution |
US11836265B2 (en) | 2020-03-02 | 2023-12-05 | Forcepoint Llc | Type-dependent event deduplication |
JP7280849B2 (en) * | 2020-03-19 | 2023-05-24 | 株式会社日立製作所 | Log integration device, log integration system, and log integration method |
US11080032B1 (en) | 2020-03-31 | 2021-08-03 | Forcepoint Llc | Containerized infrastructure for deployment of microservices |
US11568136B2 (en) | 2020-04-15 | 2023-01-31 | Forcepoint Llc | Automatically constructing lexicons from unlabeled datasets |
US20210329441A1 (en) * | 2020-04-15 | 2021-10-21 | Randy Alan Andrews | Covert spying device detector |
US11516206B2 (en) | 2020-05-01 | 2022-11-29 | Forcepoint Llc | Cybersecurity system having digital certificate reputation system |
US11544390B2 (en) | 2020-05-05 | 2023-01-03 | Forcepoint Llc | Method, system, and apparatus for probabilistic identification of encrypted files |
US11895158B2 (en) | 2020-05-19 | 2024-02-06 | Forcepoint Llc | Cybersecurity system having security policy visualization |
US11704387B2 (en) | 2020-08-28 | 2023-07-18 | Forcepoint Llc | Method and system for fuzzy matching and alias matching for streaming data sets |
US11190589B1 (en) | 2020-10-27 | 2021-11-30 | Forcepoint, LLC | System and method for efficient fingerprinting in cloud multitenant data loss prevention |
Family Cites Families (209)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870735A (en) | 1996-05-01 | 1999-02-09 | International Business Machines Corporation | Method and system for generating a decision-tree classifier in parallel in a multi-processor system |
US9195784B2 (en) | 1998-08-31 | 2015-11-24 | Cadence Design Systems, Inc. | Common shared memory in a verification system |
US6532541B1 (en) | 1999-01-22 | 2003-03-11 | The Trustees Of Columbia University In The City Of New York | Method and apparatus for image authentication |
US6647260B2 (en) | 1999-04-09 | 2003-11-11 | Openwave Systems Inc. | Method and system facilitating web based provisioning of two-way mobile communications devices |
US6681331B1 (en) | 1999-05-11 | 2004-01-20 | Cylant, Inc. | Dynamic software system intrusion detection |
US6643802B1 (en) | 2000-04-27 | 2003-11-04 | Ncr Corporation | Coordinated multinode dump collection in response to a fault |
JP2002033798A (en) * | 2000-07-14 | 2002-01-31 | Shinji Aoyama | System and method for data backup for portable telephone set |
EP1182552A3 (en) | 2000-08-21 | 2003-10-01 | Texas Instruments France | Dynamic hardware configuration for energy management systems using task attributes |
US7234126B2 (en) | 2000-08-23 | 2007-06-19 | Interuniversitair Microelektronica Centrum | Task concurrency management design method |
US7600014B2 (en) | 2000-11-16 | 2009-10-06 | Symantec Corporation | Method and system for monitoring the performance of a distributed application |
US20040068721A1 (en) | 2000-11-17 | 2004-04-08 | O'neill Patrick | Network for updating firmware and / or software in wireless communication devices |
US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
US7051327B1 (en) | 2001-05-08 | 2006-05-23 | Gateway Inc. | System for providing data backup and restore with updated version by creating data package based upon configuration data application data and user response to suggestion |
US7849360B2 (en) | 2001-05-21 | 2010-12-07 | Vir2Us, Inc. | Computer system and method of controlling communication port to prevent computer contamination by virus or malicious code |
US7401359B2 (en) | 2001-12-21 | 2008-07-15 | Mcafee, Inc. | Generating malware definition data for mobile computing devices |
US7290282B1 (en) | 2002-04-08 | 2007-10-30 | Symantec Corporation | Reducing false positive computer virus detections |
US7694139B2 (en) | 2002-10-24 | 2010-04-06 | Symantec Corporation | Securing executable content using a trusted computing platform |
US7103772B2 (en) | 2003-05-02 | 2006-09-05 | Giritech A/S | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US8201249B2 (en) | 2003-05-14 | 2012-06-12 | Northrop Grumman Systems Corporation | Steady state computer intrusion and misuse detection |
US8458805B2 (en) | 2003-06-23 | 2013-06-04 | Architecture Technology Corporation | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data |
US8097456B2 (en) | 2003-08-18 | 2012-01-17 | The Charles Stark Draper Laboratory | Nanotopographic compositions and methods for cellular organization in tissue engineered structures |
KR100623552B1 (en) | 2003-12-29 | 2006-09-18 | 한국정보보호진흥원 | Method of risk analysis in automatic intrusion response system |
US7694150B1 (en) | 2004-06-22 | 2010-04-06 | Cisco Technology, Inc | System and methods for integration of behavioral and signature based security |
EP1774780A1 (en) | 2004-07-20 | 2007-04-18 | QUALCOMM Incorporated | Method and apparatus for motion vector processing |
US7793262B2 (en) | 2004-07-29 | 2010-09-07 | International Business Machines Corporation | Method and apparatus for facilitating software testing and report generation with interactive graphical user interface |
US7559053B2 (en) | 2004-08-24 | 2009-07-07 | Microsoft Corporation | Program and system performance data correlation |
WO2006028558A1 (en) | 2004-09-03 | 2006-03-16 | Virgina Tech Intellectual Properties, Inc. | Detecting software attacks by monitoring electric power consumption patterns |
KR100645735B1 (en) | 2004-10-14 | 2006-11-15 | 주식회사 팬택 | Apparatus And Method For Detecting Contents Bug Communication Of The Mobile Platform |
US8108929B2 (en) | 2004-10-19 | 2012-01-31 | Reflex Systems, LLC | Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms |
US7561877B2 (en) | 2005-03-18 | 2009-07-14 | Qualcomm Incorporated | Apparatus and methods for managing malfunctions on a wireless device |
US7881291B2 (en) | 2005-05-26 | 2011-02-01 | Alcatel Lucent | Packet classification acceleration using spectral analysis |
US20060288209A1 (en) | 2005-06-20 | 2006-12-21 | Vogler Dean H | Method and apparatus for secure inter-processor communications |
US20070006304A1 (en) | 2005-06-30 | 2007-01-04 | Microsoft Corporation | Optimizing malware recovery |
US8161548B1 (en) | 2005-08-15 | 2012-04-17 | Trend Micro, Inc. | Malware detection using pattern classification |
US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
US7809670B2 (en) | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
WO2007087251A2 (en) | 2006-01-25 | 2007-08-02 | Greystripe, Inc. | System and methods for managing content in pre-existing mobile applications |
IL181041A0 (en) | 2007-01-29 | 2007-07-04 | Deutsche Telekom Ag | Improved method and system for detecting malicious behavioral patterns in a computer, using machine learning |
US8490194B2 (en) | 2006-01-31 | 2013-07-16 | Robert Moskovitch | Method and system for detecting malicious behavioral patterns in a computer, using machine learning |
US7831237B2 (en) * | 2006-02-03 | 2010-11-09 | Broadcom Corporation | Authenticating mobile network provider equipment |
KR100791290B1 (en) | 2006-02-10 | 2008-01-04 | 삼성전자주식회사 | Apparatus and method for using information of malicious application's behavior across devices |
US20070220327A1 (en) | 2006-02-23 | 2007-09-20 | Evergrid, Inc., A Delaware Corporation | Dynamically Controlled Checkpoint Timing |
EP1999925B1 (en) | 2006-03-27 | 2011-07-06 | Telecom Italia S.p.A. | A method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor |
WO2007117585A2 (en) | 2006-04-06 | 2007-10-18 | Smobile Systems Inc. | System and method for managing malware protection on mobile devices |
US20070283170A1 (en) | 2006-06-05 | 2007-12-06 | Kabushiki Kaisha Toshiba | System and method for secure inter-process data communication |
KR101225374B1 (en) | 2006-06-09 | 2013-01-22 | 삼성전자주식회사 | Apparatus and method for device management in mobile communication terminal |
US20080016339A1 (en) | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
US20080047009A1 (en) | 2006-07-20 | 2008-02-21 | Kevin Overcash | System and method of securing networks against applications threats |
US8788829B2 (en) | 2006-08-17 | 2014-07-22 | Aol Inc. | System and method for interapplication communications |
US7774599B2 (en) | 2006-09-15 | 2010-08-10 | Panasonic Corporation | Methodologies to secure inter-process communication based on trust |
US8201244B2 (en) | 2006-09-19 | 2012-06-12 | Microsoft Corporation | Automated malware signature generation |
WO2008043109A2 (en) | 2006-10-06 | 2008-04-10 | Smobile Systems, Inc. | System and method of reporting and visualizing malware on mobile networks |
EP1921545A3 (en) | 2006-11-07 | 2013-09-04 | Magix Ag | Application-Specific Intelligent Backup and Restore System |
US8087085B2 (en) | 2006-11-27 | 2011-12-27 | Juniper Networks, Inc. | Wireless intrusion prevention system and method |
US8225093B2 (en) | 2006-12-05 | 2012-07-17 | Qualcomm Incorporated | Providing secure inter-application communication for a mobile operating environment |
US7650317B2 (en) | 2006-12-06 | 2010-01-19 | Microsoft Corporation | Active learning framework for automatic field extraction from network traffic |
US7778792B2 (en) | 2006-12-08 | 2010-08-17 | Chumby Industries, Inc. | Systems and methods for location, motion, and contact detection and tracking in a networked audiovisual device |
JP4805116B2 (en) | 2006-12-11 | 2011-11-02 | 株式会社日立製作所 | Information processing system, information processing system control method, service using device, and service providing device |
US7945955B2 (en) | 2006-12-18 | 2011-05-17 | Quick Heal Technologies Private Limited | Virus detection in mobile devices having insufficient resources to execute virus detection software |
US8769099B2 (en) | 2006-12-28 | 2014-07-01 | Yahoo! Inc. | Methods and systems for pre-caching information on a mobile computing device |
US9021605B2 (en) | 2007-01-03 | 2015-04-28 | International Business Machines Corporation | Method and system for protecting sensitive data in a program |
US7996005B2 (en) * | 2007-01-17 | 2011-08-09 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
AU2008325044A1 (en) | 2007-03-05 | 2009-05-14 | Cupp Computing As | System and method for providing data and device security between external and host devices |
JP4618263B2 (en) | 2007-03-23 | 2011-01-26 | 株式会社豊田中央研究所 | Software behavior monitoring apparatus and software behavior monitoring system |
US8331987B2 (en) * | 2007-04-19 | 2012-12-11 | Apple Inc. | Personal area network systems and devices and methods for use thereof |
JP2008271126A (en) * | 2007-04-19 | 2008-11-06 | Ntt Docomo Inc | Mobile terminal apparatus and diagnosis method for mobile terminal apparatus |
US20080301796A1 (en) | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Adjusting the Levels of Anti-Malware Protection |
JP4956292B2 (en) | 2007-06-25 | 2012-06-20 | パナソニック株式会社 | Information security apparatus and counter control method |
US8239505B2 (en) | 2007-06-29 | 2012-08-07 | Microsoft Corporation | Progressively implementing declarative models in distributed systems |
US8713680B2 (en) | 2007-07-10 | 2014-04-29 | Samsung Electronics Co., Ltd. | Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program |
US8245295B2 (en) | 2007-07-10 | 2012-08-14 | Samsung Electronics Co., Ltd. | Apparatus and method for detection of malicious program using program behavior |
US7890443B2 (en) | 2007-07-13 | 2011-02-15 | Microsoft Corporation | Learning classifiers using combined boosting and weight trimming |
US20100199264A1 (en) * | 2007-08-02 | 2010-08-05 | Naoto Maeda | Pattern inspection system, pattern inspection device, method and pattern inspection program |
CN101350054B (en) | 2007-10-15 | 2011-05-25 | 北京瑞星信息技术有限公司 | Method and apparatus for automatically protecting computer noxious program |
KR20100106609A (en) | 2008-01-02 | 2010-10-01 | 샌디스크 아이엘 엘티디 | Storage device having direct user access |
US8160975B2 (en) | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
US8719936B2 (en) | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
US8595834B2 (en) | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
US7676573B2 (en) | 2008-02-08 | 2010-03-09 | Microsoft Corporation | Node monitor client cache synchronization for mobile device management |
US8320329B2 (en) | 2008-03-24 | 2012-11-27 | Cisco Technology, Inc. | Policy for a roaming terminal based on a home internet protocol (IP) address |
US20090288080A1 (en) | 2008-05-13 | 2009-11-19 | Partridge Lucas W | Method of Delivering Software Over a Network |
US8108323B2 (en) | 2008-05-19 | 2012-01-31 | Yahoo! Inc. | Distributed spam filtering utilizing a plurality of global classifiers and a local classifier |
US20090293121A1 (en) | 2008-05-21 | 2009-11-26 | Bigus Joseph P | Deviation detection of usage patterns of computer resources |
IL191744A0 (en) | 2008-05-27 | 2009-02-11 | Yuval Elovici | Unknown malcode detection using classifiers with optimal training sets |
US20090327168A1 (en) | 2008-06-26 | 2009-12-31 | Yahoo! Inc. | Playful incentive for labeling content |
JP2010016443A (en) | 2008-07-01 | 2010-01-21 | Toshiba Corp | Situation recognizing apparatus, situation recognizing method, and radio terminal apparatus |
JP4710933B2 (en) | 2008-07-09 | 2011-06-29 | ソニー株式会社 | Learning device, learning method, and program |
GB2461870B (en) | 2008-07-14 | 2012-02-29 | F Secure Oyj | Malware detection |
US8069128B2 (en) | 2008-08-08 | 2011-11-29 | Yahoo! Inc. | Real-time ad-hoc spam filtering of email |
US8775333B1 (en) | 2008-08-20 | 2014-07-08 | Symantec Corporation | Systems and methods for generating a threat classifier to determine a malicious process |
US8095964B1 (en) | 2008-08-29 | 2012-01-10 | Symantec Corporation | Peer computer based threat detection |
US8245315B2 (en) | 2008-09-10 | 2012-08-14 | Qualcomm Incorporated | Remote diagnosis of unauthorized hardware change |
US8504504B2 (en) | 2008-09-26 | 2013-08-06 | Oracle America, Inc. | System and method for distributed denial of service identification and prevention |
WO2010045596A1 (en) | 2008-10-16 | 2010-04-22 | Qualys, Inc. | Systems and methods for assessing the compliance of a computer across a network |
US8087067B2 (en) | 2008-10-21 | 2011-12-27 | Lookout, Inc. | Secure mobile platform system |
US8347386B2 (en) | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
US8984628B2 (en) | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
US9537613B2 (en) | 2008-10-24 | 2017-01-03 | Qualcomm Incorporated | Acknowledgment based on short cell radio network temporary identifier |
US20100107257A1 (en) | 2008-10-29 | 2010-04-29 | International Business Machines Corporation | System, method and program product for detecting presence of malicious software running on a computer system |
IL195081A0 (en) | 2008-11-03 | 2011-08-01 | Deutche Telekom Ag | Acquisition of malicious code using active learning |
JP4576452B2 (en) * | 2008-11-06 | 2010-11-10 | イーソル株式会社 | Operating system and information processing apparatus |
DE102008043954A1 (en) | 2008-11-21 | 2010-05-27 | Robert Bosch Gmbh | Sensor network system, transmission protocol, method for recognizing an object and computer program |
US8549625B2 (en) | 2008-12-12 | 2013-10-01 | International Business Machines Corporation | Classification of unwanted or malicious software through the identification of encrypted data communication |
US20100153371A1 (en) | 2008-12-16 | 2010-06-17 | Yahoo! Inc. | Method and apparatus for blending search results |
CN101770453A (en) | 2008-12-31 | 2010-07-07 | 华建机器翻译有限公司 | Chinese text coreference resolution method based on domain ontology through being combined with machine learning model |
US20100192222A1 (en) | 2009-01-23 | 2010-07-29 | Microsoft Corporation | Malware detection using multiple classifiers |
US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
WO2010088550A2 (en) | 2009-01-29 | 2010-08-05 | Breach Security, Inc. | A method and apparatus for excessive access rate detection |
EP2222048A1 (en) * | 2009-02-24 | 2010-08-25 | BRITISH TELECOMMUNICATIONS public limited company | Detecting malicious behaviour on a computer network |
US8266698B1 (en) | 2009-03-09 | 2012-09-11 | Symantec Corporation | Using machine infection characteristics for behavior-based detection of malware |
US8763127B2 (en) | 2009-03-13 | 2014-06-24 | Rutgers, The State University Of New Jersey | Systems and method for malware detection |
US8490187B2 (en) | 2009-03-20 | 2013-07-16 | Microsoft Corporation | Controlling malicious activity detection using behavioral models |
US8683554B2 (en) | 2009-03-27 | 2014-03-25 | Wavemarket, Inc. | System and method for managing third party application program access to user information via a native application program interface (API) |
US8161130B2 (en) | 2009-04-10 | 2012-04-17 | Microsoft Corporation | Bottom-up analysis of network sites |
JP5244686B2 (en) | 2009-04-24 | 2013-07-24 | 株式会社東芝 | Monitoring device and server |
JP2012525626A (en) | 2009-04-30 | 2012-10-22 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | Deviating behavior of user terminal |
US8694624B2 (en) | 2009-05-19 | 2014-04-08 | Symbol Technologies, Inc. | Systems and methods for concurrent wireless local area network access and sensing |
US8356001B2 (en) | 2009-05-19 | 2013-01-15 | Xybersecure, Inc. | Systems and methods for application-level security |
US8332945B2 (en) | 2009-06-05 | 2012-12-11 | The Regents Of The University Of Michigan | System and method for detecting energy consumption anomalies and mobile malware variants |
US9074897B2 (en) | 2009-06-15 | 2015-07-07 | Qualcomm Incorporated | Real-time data with post-processing |
US8701192B1 (en) | 2009-06-30 | 2014-04-15 | Symantec Corporation | Behavior based signatures |
US20110013528A1 (en) | 2009-07-16 | 2011-01-20 | Chen Byron H | Method for providing presence and location information of mobiles in a wireless network |
US8776218B2 (en) * | 2009-07-21 | 2014-07-08 | Sophos Limited | Behavioral-based host intrusion prevention system |
US8311956B2 (en) | 2009-08-11 | 2012-11-13 | At&T Intellectual Property I, L.P. | Scalable traffic classifier and classifier training system |
WO2011026604A1 (en) * | 2009-09-01 | 2011-03-10 | Nec Europe Ltd. | Method for monitoring a network and network including a monitoring functionality |
CA2712002C (en) | 2009-09-09 | 2016-08-30 | Aastra Technologies Limited | Diagnostics methods for a communications device |
US8509755B2 (en) | 2009-10-30 | 2013-08-13 | Research In Motion Limited | System and method for activating a component on an electronic device |
US8397301B2 (en) | 2009-11-18 | 2013-03-12 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communication device |
EP2326057A1 (en) | 2009-11-20 | 2011-05-25 | British Telecommunications public limited company | Detecting malicious behaviour on a network |
US20110161452A1 (en) | 2009-12-24 | 2011-06-30 | Rajesh Poornachandran | Collaborative malware detection and prevention on mobile devices |
JP2011138219A (en) * | 2009-12-25 | 2011-07-14 | Toshiba Corp | Device and method for displaying result of parallel program analysis |
US8806620B2 (en) | 2009-12-26 | 2014-08-12 | Intel Corporation | Method and device for managing security events |
US20120254333A1 (en) | 2010-01-07 | 2012-10-04 | Rajarathnam Chandramouli | Automated detection of deception in short and multilingual electronic messages |
US8458809B2 (en) | 2010-01-20 | 2013-06-04 | Research In Motion Limited | Apparatus, and an associated method, for facilitating secure operations of a wireless device |
WO2011106925A1 (en) | 2010-03-01 | 2011-09-09 | Nokia Corporation | Method and apparatus for estimating user characteristics based on user interaction data |
US20110219449A1 (en) * | 2010-03-04 | 2011-09-08 | St Neitzel Michael | Malware detection method, system and computer program product |
KR101051641B1 (en) | 2010-03-30 | 2011-07-26 | 주식회사 안철수연구소 | Mobile communication terminal and behavior based checking virus program method using the same |
US8694744B1 (en) | 2010-03-31 | 2014-04-08 | Emc Corporation | Mobile device snapshot backup |
US9043254B2 (en) | 2010-04-12 | 2015-05-26 | Siemens Aktiengesellschaft | Method for computer-aided closed-loop and/or open-loop control of a technical system |
EP3242465B1 (en) | 2010-04-26 | 2020-01-01 | BlackBerry Limited | Mobile wireless communications device providing enhanced file transfer management features and related methods |
US8570993B2 (en) | 2010-05-20 | 2013-10-29 | At&T Mobility Ii Llc | Wi-Fi intelligent selection engine |
DE102010021825A1 (en) | 2010-05-28 | 2011-12-01 | Christmann Informationstechnik + Medien Gmbh & Co. Kg | Multiprocessor computer system |
US9449175B2 (en) | 2010-06-03 | 2016-09-20 | Nokia Technologies Oy | Method and apparatus for analyzing and detecting malicious software |
CN101882000B (en) | 2010-06-18 | 2012-08-22 | 华南理工大学 | Gesture identification method based on acceleration sensor |
US20120180126A1 (en) | 2010-07-13 | 2012-07-12 | Lei Liu | Probable Computing Attack Detector |
US20120016633A1 (en) | 2010-07-16 | 2012-01-19 | Andreas Wittenstein | System and method for automatic detection of anomalous recurrent behavior |
US9294946B2 (en) | 2010-08-27 | 2016-03-22 | Qualcomm Incorporated | Adaptive automatic detail diagnostic log collection in a wireless communication system |
US8424093B2 (en) | 2010-11-01 | 2013-04-16 | Kaspersky Lab Zao | System and method for updating antivirus cache |
US8683591B2 (en) | 2010-11-18 | 2014-03-25 | Nant Holdings Ip, Llc | Vector-based anomaly detection |
US9088601B2 (en) | 2010-12-01 | 2015-07-21 | Cisco Technology, Inc. | Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques |
US20120151479A1 (en) | 2010-12-10 | 2012-06-14 | Salesforce.Com, Inc. | Horizontal splitting of tasks within a homogenous pool of virtual machines |
US20120167218A1 (en) | 2010-12-23 | 2012-06-28 | Rajesh Poornachandran | Signature-independent, system behavior-based malware detection |
US9710645B2 (en) | 2010-12-23 | 2017-07-18 | Ebay Inc. | Systems and methods to detect and neutralize malware infected electronic communications |
US8640245B2 (en) | 2010-12-24 | 2014-01-28 | Kaspersky Lab, Zao | Optimization of anti-malware processing by automated correction of detection rules |
US8762298B1 (en) | 2011-01-05 | 2014-06-24 | Narus, Inc. | Machine learning based botnet detection using real-time connectivity graph based traffic features |
CN102591696A (en) | 2011-01-14 | 2012-07-18 | 中国科学院软件研究所 | Method and system for extracting behavioral data of mobile phone software |
US9326698B2 (en) | 2011-02-18 | 2016-05-03 | The Trustees Of The University Of Pennsylvania | Method for automatic, unsupervised classification of high-frequency oscillations in physiological recordings |
US8695095B2 (en) | 2011-03-11 | 2014-04-08 | At&T Intellectual Property I, L.P. | Mobile malicious software mitigation |
US8554912B1 (en) * | 2011-03-14 | 2013-10-08 | Sprint Communications Company L.P. | Access management for wireless communication devices failing authentication for a communication network |
JP5665188B2 (en) * | 2011-03-31 | 2015-02-04 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | System for inspecting information processing equipment to which software update is applied |
US8533857B2 (en) | 2011-04-12 | 2013-09-10 | Teletech Holdings, Inc. | Methods for providing cross-vendor support services |
RU2454705C1 (en) | 2011-04-19 | 2012-06-27 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of protecting computing device from malicious objects using complex infection schemes |
KR101906410B1 (en) | 2011-04-19 | 2018-10-11 | 삼성전자주식회사 | Push service management method, apparatus thereof, and medium storing program source thereof |
CN102790758B (en) | 2011-05-18 | 2017-08-18 | 海尔集团公司 | Firewall system and its processing method |
US9323928B2 (en) | 2011-06-01 | 2016-04-26 | Mcafee, Inc. | System and method for non-signature based detection of malicious processes |
US8819471B2 (en) | 2011-06-03 | 2014-08-26 | Apple Inc. | Methods and apparatus for power state based backup |
US20120317306A1 (en) | 2011-06-10 | 2012-12-13 | Microsoft Corporation | Statistical Network Traffic Signature Analyzer |
US9152882B2 (en) | 2011-06-17 | 2015-10-06 | Microsoft Technology Licensing, Llc. | Location-aided recognition |
US9286182B2 (en) | 2011-06-17 | 2016-03-15 | Microsoft Technology Licensing, Llc | Virtual machine snapshotting and analysis |
CN102202102B (en) * | 2011-07-05 | 2014-08-13 | 施昊 | Network service polymerization system and polymerization method thereof based on cloud computing configuration |
US20130203440A1 (en) | 2011-07-27 | 2013-08-08 | Qualcomm Labs, Inc. | Selectively performing a positioning procedure at an access terminal based on a behavior model |
WO2013015995A1 (en) | 2011-07-27 | 2013-01-31 | Seven Networks, Inc. | Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network |
US8782412B2 (en) | 2011-08-31 | 2014-07-15 | AstherPal Inc. | Secured privileged access to an embedded client on a mobile device |
WO2012149719A1 (en) * | 2011-08-31 | 2012-11-08 | 华为技术有限公司 | Method and system for establishing checkpoint |
US20130066815A1 (en) | 2011-09-13 | 2013-03-14 | Research In Motion Limited | System and method for mobile context determination |
ES2755780T3 (en) | 2011-09-16 | 2020-04-23 | Veracode Inc | Automated behavior and static analysis using an instrumented sandbox and machine learning classification for mobile security |
US8793593B2 (en) | 2011-09-21 | 2014-07-29 | Facebook, Inc. | Integrating structured objects and actions generated on external systems into a social networking system |
US9143530B2 (en) | 2011-10-11 | 2015-09-22 | Citrix Systems, Inc. | Secure container for protecting enterprise data on a mobile device |
CN104205114B (en) | 2011-11-29 | 2018-08-07 | 索尼移动通信公司 | System and method for providing safe interprocess communication |
US9413538B2 (en) | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
US9071636B2 (en) | 2011-12-21 | 2015-06-30 | Verizon Patent And Licensing Inc. | Predictive scoring management system for application behavior |
WO2013103989A1 (en) | 2012-01-06 | 2013-07-11 | Optio Labs, LLC | Systems and meathods for enforcing secutity in mobile computing |
US8943204B2 (en) | 2012-01-23 | 2015-01-27 | Cellco Partnership | Method and system for conserving network resources when sending information to mobile devices |
US9832211B2 (en) | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
US9439077B2 (en) | 2012-04-10 | 2016-09-06 | Qualcomm Incorporated | Method for malicious activity detection in a mobile station |
US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
US20130304677A1 (en) | 2012-05-14 | 2013-11-14 | Qualcomm Incorporated | Architecture for Client-Cloud Behavior Analyzer |
US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
EP2680182B1 (en) | 2012-06-29 | 2016-03-16 | GSMK Gesellschaft für sichere Mobile Kommunikation mbH | Mobile device and method to monitor a baseband processor in relation to the actions on an application processor |
US8892480B2 (en) | 2012-07-25 | 2014-11-18 | Aro, Inc. | Contextual information provider |
US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
US20140150100A1 (en) | 2012-08-15 | 2014-05-29 | Qualcomm Incorporated | Adaptive Observation of Driver and Hardware Level Behavioral Features on a Mobile Device |
US9330257B2 (en) * | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US20140096246A1 (en) | 2012-10-01 | 2014-04-03 | Google Inc. | Protecting users from undesirable content |
US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
WO2014165230A1 (en) | 2013-03-13 | 2014-10-09 | Lookout, Inc. | System and method for changing security behavior of a device based on proximity to another device |
US20140279745A1 (en) | 2013-03-14 | 2014-09-18 | Sm4rt Predictive Systems | Classification based on prediction of accuracy of multiple data models |
-
2012
- 2012-09-26 US US13/627,401 patent/US9202047B2/en not_active Expired - Fee Related
- 2012-12-04 CN CN201280072995.1A patent/CN104272786B/en active Active
- 2012-12-04 WO PCT/US2012/067726 patent/WO2013172865A1/en active Application Filing
- 2012-12-04 IN IN2172MUN2014 patent/IN2014MN02172A/en unknown
- 2012-12-04 EP EP12812764.4A patent/EP2850864B1/en active Active
- 2012-12-04 KR KR1020147035054A patent/KR101626243B1/en not_active IP Right Cessation
-
2013
- 2013-01-22 US US13/747,115 patent/US9292685B2/en active Active
- 2013-01-25 US US13/749,948 patent/US9349001B2/en not_active Expired - Fee Related
- 2013-01-25 CN CN201380023620.0A patent/CN104272787B/en not_active Expired - Fee Related
- 2013-01-25 WO PCT/US2013/023246 patent/WO2013172877A1/en active Application Filing
- 2013-01-25 KR KR1020147035051A patent/KR102103613B1/en active IP Right Grant
- 2013-01-29 CN CN201380023666.2A patent/CN104303538B/en not_active Expired - Fee Related
- 2013-01-29 WO PCT/US2013/023646 patent/WO2013172881A1/en active Application Filing
- 2013-01-29 EP EP13707226.0A patent/EP2850865B1/en not_active Not-in-force
- 2013-01-29 IN IN2026MUN2014 patent/IN2014MN02026A/en unknown
- 2013-02-22 US US13/773,877 patent/US9152787B2/en active Active
- 2013-04-10 CN CN201380024849.6A patent/CN104303156B/en active Active
- 2013-04-10 JP JP2015512656A patent/JP6110482B2/en not_active Expired - Fee Related
- 2013-04-10 EP EP13718700.1A patent/EP2850524B1/en active Active
- 2013-04-10 WO PCT/US2013/035952 patent/WO2013173001A1/en active Application Filing
- 2013-04-23 TW TW102114436A patent/TW201407406A/en unknown
-
2014
- 2014-05-02 US US14/268,547 patent/US9189624B2/en active Active
-
2015
- 2015-01-29 US US14/609,113 patent/US9898602B2/en not_active Expired - Fee Related
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014MN02026A (en) | ||
GB2510091A (en) | Collaborative processor and system performance and power management | |
EP3086239A4 (en) | Scenario generation device and computer program therefor | |
TWD163515S (en) | Portable computers | |
EP2740096A4 (en) | Dynamic tagging to create logical models and optimize caching in energy management systems | |
EP3039569A4 (en) | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |
EP3063545A4 (en) | Systems and methods for processing data relating to energy usage | |
GB201212220D0 (en) | Data verification using checksum sidefile | |
GB201305379D0 (en) | Methods and systems for enrolling biometric data | |
MX351728B (en) | Method and device for analysis of shapeoptimization. | |
GB2506783A (en) | Enabling a computing device to utilize another computing device | |
EP2972895A4 (en) | Hash-based spatial sampling for efficient cache utility curve estimation and cache allocation | |
TWD156868S (en) | Electronic tablet with input device | |
TWD166139S (en) | Portion of portable electronic device | |
TWD162094S (en) | Electronic computer | |
MX2016007151A (en) | Indicating user availability for communication. | |
IN2014CN00797A (en) | ||
GB201321064D0 (en) | Smart window and display enclosure | |
EP2883274A4 (en) | Portable electronic device with merged rear housing and antenna | |
IN2013DE03292A (en) | ||
AP2015008771A0 (en) | Four-stroke engine unit for use in vehicle and vehicle | |
EP3086240A4 (en) | Complex predicate template gathering device, and computer program therefor | |
TR201820516T4 (en) | The method for signaling the progressive temporal layer access image. | |
GB2507225A (en) | Loyalty systems and methods | |
GB2520854B (en) | Computing system and processor with fast power surge detection and instruction throttle down to provide for low cost power supply unit |