IN2014MN02026A - - Google Patents
Download PDFInfo
- Publication number
- IN2014MN02026A IN2014MN02026A IN2026MUN2014A IN2014MN02026A IN 2014MN02026 A IN2014MN02026 A IN 2014MN02026A IN 2026MUN2014 A IN2026MUN2014 A IN 2026MUN2014A IN 2014MN02026 A IN2014MN02026 A IN 2014MN02026A
- Authority
- IN
- India
- Prior art keywords
- signature
- behavioral
- caching
- scalability
- latency
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1433—Saving, restoring, recovering or retrying at system level during software upgrading
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
- G06F11/3072—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
- G06F11/3082—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting the data filtering being achieved by aggregating or compressing the monitored data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
- H04W52/0258—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity controlling an operation mode according to history or models of usage information, e.g. activity schedule or time of day
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Medical Informatics (AREA)
- Debugging And Monitoring (AREA)
- Retry When Errors Occur (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
- Telephonic Communication Services (AREA)
- Memory System Of A Hierarchy Structure (AREA)
- Indicating Or Recording The Presence, Absence, Or Direction Of Movement (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
- Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261646590P | 2012-05-14 | 2012-05-14 | |
| US201261683274P | 2012-08-15 | 2012-08-15 | |
| US13/749,948 US9349001B2 (en) | 2012-05-14 | 2013-01-25 | Methods and systems for minimizing latency of behavioral analysis |
| PCT/US2013/023646 WO2013172881A1 (en) | 2012-05-14 | 2013-01-29 | Minimizing latency of behavioral analysis using signature caches |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2014MN02026A true IN2014MN02026A (enExample) | 2015-08-14 |
Family
ID=49548974
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN2172MUN2014 IN2014MN02172A (enExample) | 2012-05-14 | 2012-12-04 | |
| IN2026MUN2014 IN2014MN02026A (enExample) | 2012-05-14 | 2013-01-29 |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN2172MUN2014 IN2014MN02172A (enExample) | 2012-05-14 | 2012-12-04 |
Country Status (8)
| Country | Link |
|---|---|
| US (6) | US9202047B2 (enExample) |
| EP (3) | EP2850864B1 (enExample) |
| JP (1) | JP6110482B2 (enExample) |
| KR (2) | KR101626243B1 (enExample) |
| CN (4) | CN104272786B (enExample) |
| IN (2) | IN2014MN02172A (enExample) |
| TW (1) | TW201407406A (enExample) |
| WO (4) | WO2013172865A1 (enExample) |
Families Citing this family (155)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013006553A1 (en) * | 2011-07-01 | 2013-01-10 | Fiberlink Communications Corporation | Rules based actions for mobile device management |
| US9916192B2 (en) * | 2012-01-12 | 2018-03-13 | International Business Machines Corporation | Thread based dynamic data collection |
| US8973137B1 (en) * | 2012-02-29 | 2015-03-03 | Symantec Corporation | Systems and methods for detecting illegitimate out-of-band authentication attempts |
| US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
| US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
| US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
| US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
| US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
| US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
| US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
| US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
| US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US10162693B1 (en) * | 2012-10-18 | 2018-12-25 | Sprint Communications Company L.P. | Evaluation of mobile device state and performance metrics for diagnosis and troubleshooting of performance issues |
| US20150220734A1 (en) * | 2012-10-19 | 2015-08-06 | Mcafee, Inc. | Mobile application management |
| US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
| US9659085B2 (en) * | 2012-12-28 | 2017-05-23 | Microsoft Technology Licensing, Llc | Detecting anomalies in behavioral network with contextual side information |
| US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
| US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
| US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
| US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
| TWI556098B (zh) * | 2013-01-25 | 2016-11-01 | 高通公司 | 於一行動器件上之行為特徵之適應性觀察 |
| US20160110551A1 (en) * | 2013-02-14 | 2016-04-21 | The United States Of America As Represented By The Secretary Of The Navy | Computer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata |
| US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
| GB2526501A (en) | 2013-03-01 | 2015-11-25 | Redowl Analytics Inc | Modeling social behavior |
| US20140250052A1 (en) | 2013-03-01 | 2014-09-04 | RedOwl Analytics, Inc. | Analyzing social behavior |
| US20140292998A1 (en) * | 2013-04-02 | 2014-10-02 | James Toga | Managing Use of Resources in Mobile Devices |
| US9307374B2 (en) * | 2013-06-19 | 2016-04-05 | Globalfoundries Inc. | Transferring information on a first mobile computing device to a peer mobile computing device |
| US9231921B2 (en) * | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
| US9826439B2 (en) | 2013-09-30 | 2017-11-21 | Elwha Llc | Mobile device sharing facilitation methods and systems operable in network equipment |
| US20150095477A1 (en) * | 2013-09-30 | 2015-04-02 | Elwha LLC, a limited liability company of the State of Delaware | Mobile device sharing facilitation methods and systems featuring party identifier inclusions that are conditional |
| US9774728B2 (en) | 2013-09-30 | 2017-09-26 | Elwha Llc | Mobile device sharing facilitation methods and systems in a context of plural communication records |
| US9838536B2 (en) | 2013-09-30 | 2017-12-05 | Elwha, Llc | Mobile device sharing facilitation methods and systems |
| US9805208B2 (en) * | 2013-09-30 | 2017-10-31 | Elwha Llc | Mobile device sharing facilitation methods and systems with recipient-dependent inclusion of a data selection |
| US9740875B2 (en) * | 2013-09-30 | 2017-08-22 | Elwha Llc | Mobile device sharing facilitation methods and systems featuring exclusive data presentation |
| TWI533159B (zh) * | 2013-10-18 | 2016-05-11 | 國立臺灣科技大學 | 用於電腦的持續性身分驗證方法 |
| DE102013224702A1 (de) * | 2013-12-03 | 2015-06-03 | Robert Bosch Gmbh | Steuergerät für ein Kraftfahrzeug |
| US9813992B2 (en) | 2013-12-06 | 2017-11-07 | Mcp Llc | Tracking systems and methods for remotely tracking a location of a person on a map of a monitored premise |
| US9652362B2 (en) | 2013-12-06 | 2017-05-16 | Qualcomm Incorporated | Methods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors |
| WO2015094271A1 (en) * | 2013-12-19 | 2015-06-25 | Intel Corporation | Protection system including machine learning snapshot evaluation |
| CN103699208B (zh) * | 2013-12-31 | 2016-11-23 | 贝壳网际(北京)安全技术有限公司 | 一种移动终端的硬件设置方法、移动终端及服务器 |
| US9501346B2 (en) * | 2014-01-21 | 2016-11-22 | Oracle International Corporation | Fine and coarse granularity logging handler |
| WO2015112760A1 (en) * | 2014-01-23 | 2015-07-30 | Qualcomm Incorporated | Adaptive observation of determined behavioral features on a mobile device |
| EP3097675B1 (en) * | 2014-01-23 | 2021-08-04 | Koninklijke KPN N.V. | Crash recovery for smart objects |
| US10176428B2 (en) * | 2014-03-13 | 2019-01-08 | Qualcomm Incorporated | Behavioral analysis for securing peripheral devices |
| US9684787B2 (en) | 2014-04-08 | 2017-06-20 | Qualcomm Incorporated | Method and system for inferring application states by performing behavioral analysis operations in a mobile device |
| US9559918B2 (en) * | 2014-05-15 | 2017-01-31 | Cisco Technology, Inc. | Ground truth evaluation for voting optimization |
| US9672263B1 (en) | 2014-06-23 | 2017-06-06 | The United States Of America As Represented By The Secretary Of The Navy | Reliability engineering data integration |
| US9357397B2 (en) | 2014-07-23 | 2016-05-31 | Qualcomm Incorporated | Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device |
| US10228751B2 (en) | 2014-08-06 | 2019-03-12 | Apple Inc. | Low power mode |
| US9647489B2 (en) | 2014-08-26 | 2017-05-09 | Apple Inc. | Brownout avoidance |
| WO2016032022A1 (ko) * | 2014-08-27 | 2016-03-03 | 삼성전자주식회사 | 전자 장치에서 배터리 소모를 줄이기 위한 방법 |
| FR3025627B1 (fr) * | 2014-09-10 | 2018-03-23 | Bull Sas | Mecanisme haute performance pour generation d'informations de journalisation d'un processus informatique |
| US9710752B2 (en) * | 2014-09-11 | 2017-07-18 | Qualcomm Incorporated | Methods and systems for aggregated multi-application behavioral analysis of mobile device behaviors |
| US20160078362A1 (en) * | 2014-09-15 | 2016-03-17 | Qualcomm Incorporated | Methods and Systems of Dynamically Determining Feature Sets for the Efficient Classification of Mobile Device Behaviors |
| US20160125094A1 (en) * | 2014-11-05 | 2016-05-05 | Nec Laboratories America, Inc. | Method and system for behavior query construction in temporal graphs using discriminative sub-trace mining |
| US9411363B2 (en) * | 2014-12-10 | 2016-08-09 | Intel Corporation | Synchronization in a computing device |
| US10200866B1 (en) | 2014-12-12 | 2019-02-05 | Aeris Communications, Inc. | Method and system for detecting and minimizing harmful network device and application behavior on cellular networks |
| US9774604B2 (en) | 2015-01-16 | 2017-09-26 | Zingbox, Ltd. | Private cloud control |
| US10275341B2 (en) * | 2015-01-21 | 2019-04-30 | Somo Innovations Ltd | Mobile application usability testing |
| US10685142B2 (en) | 2015-02-02 | 2020-06-16 | Indiana University Research And Technology Corporation | External resource control of mobile devices |
| US20160232353A1 (en) * | 2015-02-09 | 2016-08-11 | Qualcomm Incorporated | Determining Model Protection Level On-Device based on Malware Detection in Similar Devices |
| US9910984B2 (en) | 2015-02-27 | 2018-03-06 | Qualcomm Incorporated | Methods and systems for on-device high-granularity classification of device behaviors using multi-label models |
| US9787695B2 (en) * | 2015-03-24 | 2017-10-10 | Qualcomm Incorporated | Methods and systems for identifying malware through differences in cloud vs. client behavior |
| US10659479B2 (en) * | 2015-03-27 | 2020-05-19 | Mcafee, Llc | Determination of sensor usage |
| US10212178B2 (en) | 2015-04-07 | 2019-02-19 | Zingbox, Ltd. | Packet analysis based IoT management |
| EP3289510B1 (en) | 2015-05-01 | 2020-06-17 | Lookout Inc. | Determining source of side-loaded software |
| US10104107B2 (en) * | 2015-05-11 | 2018-10-16 | Qualcomm Incorporated | Methods and systems for behavior-specific actuation for real-time whitelisting |
| CN105049592B (zh) * | 2015-05-27 | 2020-02-14 | 中国科学院信息工程研究所 | 移动智能终端语音安全防护方法及系统 |
| KR102446325B1 (ko) * | 2015-06-24 | 2022-09-22 | 삼성전자주식회사 | 어플리케이션 프로그램 운용 방법 및 이를 지원하는 전자 장치 |
| US9954873B2 (en) | 2015-09-30 | 2018-04-24 | The Mitre Corporation | Mobile device-based intrusion prevention system |
| CN105426296B (zh) * | 2015-11-24 | 2018-04-10 | 无锡江南计算技术研究所 | 基于插装标签的核间协同多线程pmu事件监测方法 |
| CN105653903B (zh) * | 2015-12-18 | 2019-10-08 | 小米科技有限责任公司 | 应用程序权限的管理方法及装置 |
| US10064139B2 (en) * | 2015-12-26 | 2018-08-28 | Intel IP Corporation | Context-assisted thermal management scheme in a portable device |
| US10133639B2 (en) | 2016-02-10 | 2018-11-20 | International Business Machines Corporation | Privacy protection of media files for automatic cloud backup systems |
| US10552615B2 (en) | 2016-02-18 | 2020-02-04 | Swimlane Llc | Threat response systems and methods |
| US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
| US10826933B1 (en) * | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
| US10157134B2 (en) * | 2016-04-11 | 2018-12-18 | International Business Machines Corporation | Decreasing the data handoff interval for a reserved cache line based on an early indication of a systemwide coherence response |
| CN106095593B (zh) * | 2016-05-31 | 2019-04-16 | Oppo广东移动通信有限公司 | 一种前、后景应用程序行为同步方法及装置 |
| CN106709342B (zh) * | 2016-07-01 | 2018-11-09 | 腾讯科技(深圳)有限公司 | 恶意程序检测方法及装置 |
| US10678921B2 (en) | 2016-09-30 | 2020-06-09 | AVAST Software s.r.o. | Detecting malware with hash-based fingerprints |
| US10380348B2 (en) | 2016-11-21 | 2019-08-13 | ZingBox, Inc. | IoT device risk assessment |
| US10318723B1 (en) | 2016-11-29 | 2019-06-11 | Sprint Communications Company L.P. | Hardware-trusted network-on-chip (NOC) and system-on-chip (SOC) network function virtualization (NFV) data communications |
| US10708282B2 (en) * | 2017-03-27 | 2020-07-07 | International Business Machines Corporation | Unauthorized data access detection based on cyber security images |
| EP3619629A4 (en) | 2017-05-10 | 2020-12-09 | Embee Mobile, Inc. | SYSTEM AND METHOD FOR DETECTING MOBILE BEHAVIOR, USE OR CONTENT EXPOSURE |
| US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
| US10999297B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Using expected behavior of an entity when prepopulating an adaptive trust profile |
| US10917423B2 (en) | 2017-05-15 | 2021-02-09 | Forcepoint, LLC | Intelligently differentiating between different types of states and attributes when using an adaptive trust profile |
| US9882918B1 (en) | 2017-05-15 | 2018-01-30 | Forcepoint, LLC | User behavior profile in a blockchain |
| US10943019B2 (en) | 2017-05-15 | 2021-03-09 | Forcepoint, LLC | Adaptive trust profile endpoint |
| US10129269B1 (en) | 2017-05-15 | 2018-11-13 | Forcepoint, LLC | Managing blockchain access to user profile information |
| US10862927B2 (en) | 2017-05-15 | 2020-12-08 | Forcepoint, LLC | Dividing events into sessions during adaptive trust profile operations |
| US11888859B2 (en) | 2017-05-15 | 2024-01-30 | Forcepoint Llc | Associating a security risk persona with a phase of a cyber kill chain |
| US10447718B2 (en) | 2017-05-15 | 2019-10-15 | Forcepoint Llc | User profile definition and management |
| JP6767924B2 (ja) | 2017-05-19 | 2020-10-14 | 東芝映像ソリューション株式会社 | システム、方法及びプログラム |
| JP6767926B2 (ja) | 2017-05-23 | 2020-10-14 | 東芝映像ソリューション株式会社 | 電子装置、方法及びプログラム |
| US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
| US10305923B2 (en) * | 2017-06-30 | 2019-05-28 | SparkCognition, Inc. | Server-supported malware detection and protection |
| US10318729B2 (en) * | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
| US20190141068A1 (en) * | 2017-09-21 | 2019-05-09 | Camp Mobile Corporation | Online service abuser detection |
| US20190102543A1 (en) | 2017-09-29 | 2019-04-04 | AVAST Software s.r.o. | Observation and classification of device events |
| US20190104141A1 (en) * | 2017-10-02 | 2019-04-04 | Zuk Avraham | System and Method for Providing and Facilitating an Information Security Marketplace |
| US10803178B2 (en) | 2017-10-31 | 2020-10-13 | Forcepoint Llc | Genericized data model to perform a security analytics operation |
| US11363133B1 (en) | 2017-12-20 | 2022-06-14 | Apple Inc. | Battery health-based power management |
| US10599199B1 (en) | 2017-12-20 | 2020-03-24 | Apple Inc. | Systems and methods for power management at device shutdown |
| US10817307B1 (en) * | 2017-12-20 | 2020-10-27 | Apple Inc. | API behavior modification based on power source health |
| CN109471655B (zh) * | 2017-12-25 | 2021-08-13 | 北京安天网络安全技术有限公司 | 一种基于封闭式壁垒模型的业务应用更新方法及系统 |
| US10311404B1 (en) | 2018-01-05 | 2019-06-04 | Accenture Global Solutions Limited | Software product development defect and issue prediction and diagnosis |
| US11314787B2 (en) | 2018-04-18 | 2022-04-26 | Forcepoint, LLC | Temporal resolution of an entity |
| CN112640381B (zh) | 2018-06-18 | 2024-03-08 | 帕洛阿尔托网络公司 | 检测物联网设备的不合期望的行为的方法和系统 |
| US11755584B2 (en) | 2018-07-12 | 2023-09-12 | Forcepoint Llc | Constructing distributions of interrelated event features |
| US11436512B2 (en) | 2018-07-12 | 2022-09-06 | Forcepoint, LLC | Generating extracted features from an event |
| US10949428B2 (en) | 2018-07-12 | 2021-03-16 | Forcepoint, LLC | Constructing event distributions via a streaming scoring operation |
| US11810012B2 (en) | 2018-07-12 | 2023-11-07 | Forcepoint Llc | Identifying event distributions using interrelated events |
| US10776208B2 (en) * | 2018-07-18 | 2020-09-15 | EMC IP Holding Company LLC | Distributed memory checkpointing using storage class memory systems |
| US11025638B2 (en) | 2018-07-19 | 2021-06-01 | Forcepoint, LLC | System and method providing security friction for atypical resource access requests |
| US11811799B2 (en) | 2018-08-31 | 2023-11-07 | Forcepoint Llc | Identifying security risks using distributions of characteristic features extracted from a plurality of events |
| WO2020051161A1 (en) | 2018-09-04 | 2020-03-12 | ZingBox, Inc. | Iot application learning |
| US10248527B1 (en) * | 2018-09-19 | 2019-04-02 | Amplero, Inc | Automated device-specific dynamic operation modifications |
| US10740656B2 (en) * | 2018-09-19 | 2020-08-11 | Hughes Network Systems, Llc | Machine learning clustering models for determining the condition of a communication system |
| US11916953B2 (en) * | 2018-09-24 | 2024-02-27 | Cybereason, Inc. | Method and mechanism for detection of pass-the-hash attacks |
| CN119782027A (zh) | 2018-10-15 | 2025-04-08 | 帕洛阿尔托网络公司 | IoT设备行为的多维周期性检测 |
| US11025659B2 (en) | 2018-10-23 | 2021-06-01 | Forcepoint, LLC | Security system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors |
| CN109302402A (zh) * | 2018-10-26 | 2019-02-01 | 北京芯盾时代科技有限公司 | 一种行为检测方法及装置 |
| US11171980B2 (en) | 2018-11-02 | 2021-11-09 | Forcepoint Llc | Contagion risk detection, analysis and protection |
| CN111309402B (zh) * | 2018-12-11 | 2023-06-27 | 阿里巴巴集团控股有限公司 | 数据监测及针对应用程序的处理方法、装置及设备 |
| US11689573B2 (en) | 2018-12-31 | 2023-06-27 | Palo Alto Networks, Inc. | Multi-layered policy management |
| US10997295B2 (en) | 2019-04-26 | 2021-05-04 | Forcepoint, LLC | Adaptive trust profile reference architecture |
| US11256802B1 (en) * | 2019-05-10 | 2022-02-22 | Ca, Inc. | Application behavioral fingerprints |
| CN110287023B (zh) * | 2019-06-11 | 2021-12-10 | 广州海格通信集团股份有限公司 | 消息处理方法、装置、计算机设备和可读存储介质 |
| CN110990829B (zh) * | 2019-11-21 | 2021-09-28 | 支付宝(杭州)信息技术有限公司 | 在可信执行环境中训练gbdt模型的方法、装置及设备 |
| CN111258824B (zh) * | 2020-01-18 | 2024-02-27 | 重庆宏帆动能科技有限公司 | 一种云计算中基于人工势场的增量检查点容错方法 |
| US11570197B2 (en) | 2020-01-22 | 2023-01-31 | Forcepoint Llc | Human-centric risk modeling framework |
| US11630901B2 (en) | 2020-02-03 | 2023-04-18 | Forcepoint Llc | External trigger induced behavioral analyses |
| US12216791B2 (en) | 2020-02-24 | 2025-02-04 | Forcepoint Llc | Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology |
| US11080109B1 (en) | 2020-02-27 | 2021-08-03 | Forcepoint Llc | Dynamically reweighting distributions of event observations |
| US11836265B2 (en) | 2020-03-02 | 2023-12-05 | Forcepoint Llc | Type-dependent event deduplication |
| US11429697B2 (en) | 2020-03-02 | 2022-08-30 | Forcepoint, LLC | Eventually consistent entity resolution |
| JP7280849B2 (ja) * | 2020-03-19 | 2023-05-24 | 株式会社日立製作所 | ログ統合装置、ログ統合システムおよびログ統合方法 |
| US11080032B1 (en) | 2020-03-31 | 2021-08-03 | Forcepoint Llc | Containerized infrastructure for deployment of microservices |
| US12175745B2 (en) * | 2020-04-15 | 2024-12-24 | Randy Alan Andrews | Covert spying device detector |
| US11568136B2 (en) | 2020-04-15 | 2023-01-31 | Forcepoint Llc | Automatically constructing lexicons from unlabeled datasets |
| US20210326436A1 (en) * | 2020-04-21 | 2021-10-21 | Docusign, Inc. | Malicious behavior detection and mitigation in a document execution environment |
| US12130908B2 (en) | 2020-05-01 | 2024-10-29 | Forcepoint Llc | Progressive trigger data and detection model |
| US11516206B2 (en) | 2020-05-01 | 2022-11-29 | Forcepoint Llc | Cybersecurity system having digital certificate reputation system |
| US11544390B2 (en) | 2020-05-05 | 2023-01-03 | Forcepoint Llc | Method, system, and apparatus for probabilistic identification of encrypted files |
| US11895158B2 (en) | 2020-05-19 | 2024-02-06 | Forcepoint Llc | Cybersecurity system having security policy visualization |
| US12302451B2 (en) | 2020-06-01 | 2025-05-13 | Palo Alto Networks, Inc. | IoT security policy on a firewall |
| US11704387B2 (en) | 2020-08-28 | 2023-07-18 | Forcepoint Llc | Method and system for fuzzy matching and alias matching for streaming data sets |
| US11190589B1 (en) | 2020-10-27 | 2021-11-30 | Forcepoint, LLC | System and method for efficient fingerprinting in cloud multitenant data loss prevention |
| US11552975B1 (en) | 2021-10-26 | 2023-01-10 | Palo Alto Networks, Inc. | IoT device identification with packet flow behavior machine learning model |
| US12301600B2 (en) * | 2022-01-18 | 2025-05-13 | Palo Alto Networks, Inc. | IoT device identification by machine learning with time series behavioral and statistical features |
| US12107742B2 (en) | 2022-08-31 | 2024-10-01 | Hughes Network Systems, Llc | Machine learning to enhance satellite terminal performance |
Family Cites Families (209)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5870735A (en) | 1996-05-01 | 1999-02-09 | International Business Machines Corporation | Method and system for generating a decision-tree classifier in parallel in a multi-processor system |
| US9195784B2 (en) | 1998-08-31 | 2015-11-24 | Cadence Design Systems, Inc. | Common shared memory in a verification system |
| US6532541B1 (en) | 1999-01-22 | 2003-03-11 | The Trustees Of Columbia University In The City Of New York | Method and apparatus for image authentication |
| US6647260B2 (en) | 1999-04-09 | 2003-11-11 | Openwave Systems Inc. | Method and system facilitating web based provisioning of two-way mobile communications devices |
| US6681331B1 (en) | 1999-05-11 | 2004-01-20 | Cylant, Inc. | Dynamic software system intrusion detection |
| US6643802B1 (en) | 2000-04-27 | 2003-11-04 | Ncr Corporation | Coordinated multinode dump collection in response to a fault |
| JP2002033798A (ja) * | 2000-07-14 | 2002-01-31 | Shinji Aoyama | 携帯型電話機のデータバックアップシステム及び携帯型電話機のデータバックアップ方法 |
| EP1182552A3 (en) | 2000-08-21 | 2003-10-01 | Texas Instruments France | Dynamic hardware configuration for energy management systems using task attributes |
| US7234126B2 (en) | 2000-08-23 | 2007-06-19 | Interuniversitair Microelektronica Centrum | Task concurrency management design method |
| US7600014B2 (en) | 2000-11-16 | 2009-10-06 | Symantec Corporation | Method and system for monitoring the performance of a distributed application |
| US20040068721A1 (en) | 2000-11-17 | 2004-04-08 | O'neill Patrick | Network for updating firmware and / or software in wireless communication devices |
| US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
| US7051327B1 (en) | 2001-05-08 | 2006-05-23 | Gateway Inc. | System for providing data backup and restore with updated version by creating data package based upon configuration data application data and user response to suggestion |
| US7849360B2 (en) | 2001-05-21 | 2010-12-07 | Vir2Us, Inc. | Computer system and method of controlling communication port to prevent computer contamination by virus or malicious code |
| US7401359B2 (en) | 2001-12-21 | 2008-07-15 | Mcafee, Inc. | Generating malware definition data for mobile computing devices |
| US7290282B1 (en) | 2002-04-08 | 2007-10-30 | Symantec Corporation | Reducing false positive computer virus detections |
| US7694139B2 (en) | 2002-10-24 | 2010-04-06 | Symantec Corporation | Securing executable content using a trusted computing platform |
| US7103772B2 (en) | 2003-05-02 | 2006-09-05 | Giritech A/S | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
| US8201249B2 (en) | 2003-05-14 | 2012-06-12 | Northrop Grumman Systems Corporation | Steady state computer intrusion and misuse detection |
| US8458805B2 (en) | 2003-06-23 | 2013-06-04 | Architecture Technology Corporation | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data |
| EP1668117A4 (en) | 2003-08-18 | 2006-12-13 | Gen Hospital Corp | NANOTOPOGRAPHIC COMPOSITIONS AND METHOD FOR CELLULAR ORGANIZATION IN TISSUE CONSTRUCTION STRUCTURES |
| KR100623552B1 (ko) | 2003-12-29 | 2006-09-18 | 한국정보보호진흥원 | 자동침입대응시스템에서의 위험수준 분석 방법 |
| US7694150B1 (en) | 2004-06-22 | 2010-04-06 | Cisco Technology, Inc | System and methods for integration of behavioral and signature based security |
| CN101023662B (zh) | 2004-07-20 | 2010-08-04 | 高通股份有限公司 | 用于运动矢量处理的方法和设备 |
| US7793262B2 (en) | 2004-07-29 | 2010-09-07 | International Business Machines Corporation | Method and apparatus for facilitating software testing and report generation with interactive graphical user interface |
| US7559053B2 (en) | 2004-08-24 | 2009-07-07 | Microsoft Corporation | Program and system performance data correlation |
| WO2006028558A1 (en) | 2004-09-03 | 2006-03-16 | Virgina Tech Intellectual Properties, Inc. | Detecting software attacks by monitoring electric power consumption patterns |
| KR100645735B1 (ko) | 2004-10-14 | 2006-11-15 | 주식회사 팬택 | 모바일 플랫폼의 컨텐츠 오동작 통신 검출 장치 및 방법 |
| US8108929B2 (en) | 2004-10-19 | 2012-01-31 | Reflex Systems, LLC | Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms |
| US7561877B2 (en) | 2005-03-18 | 2009-07-14 | Qualcomm Incorporated | Apparatus and methods for managing malfunctions on a wireless device |
| US7881291B2 (en) | 2005-05-26 | 2011-02-01 | Alcatel Lucent | Packet classification acceleration using spectral analysis |
| US20060288209A1 (en) | 2005-06-20 | 2006-12-21 | Vogler Dean H | Method and apparatus for secure inter-processor communications |
| US20070006304A1 (en) | 2005-06-30 | 2007-01-04 | Microsoft Corporation | Optimizing malware recovery |
| US8161548B1 (en) | 2005-08-15 | 2012-04-17 | Trend Micro, Inc. | Malware detection using pattern classification |
| US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
| US7809670B2 (en) | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
| US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
| EP1977334A4 (en) | 2006-01-25 | 2011-01-12 | Greystripe Inc | SYSTEM AND METHOD FOR MANAGING CONTENT IN PRE-EXISTING MOBILE APPLICATIONS |
| US8490194B2 (en) | 2006-01-31 | 2013-07-16 | Robert Moskovitch | Method and system for detecting malicious behavioral patterns in a computer, using machine learning |
| IL181041A0 (en) | 2007-01-29 | 2007-07-04 | Deutsche Telekom Ag | Improved method and system for detecting malicious behavioral patterns in a computer, using machine learning |
| US7831237B2 (en) * | 2006-02-03 | 2010-11-09 | Broadcom Corporation | Authenticating mobile network provider equipment |
| KR100791290B1 (ko) | 2006-02-10 | 2008-01-04 | 삼성전자주식회사 | 디바이스 간에 악성 어플리케이션의 행위 정보를 사용하는장치 및 방법 |
| US20070220327A1 (en) | 2006-02-23 | 2007-09-20 | Evergrid, Inc., A Delaware Corporation | Dynamically Controlled Checkpoint Timing |
| US8443446B2 (en) | 2006-03-27 | 2013-05-14 | Telecom Italia S.P.A. | Method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor |
| US9009818B2 (en) | 2006-04-06 | 2015-04-14 | Pulse Secure, Llc | Malware detection system and method for compressed data on mobile platforms |
| US20070283170A1 (en) | 2006-06-05 | 2007-12-06 | Kabushiki Kaisha Toshiba | System and method for secure inter-process data communication |
| KR101225374B1 (ko) | 2006-06-09 | 2013-01-22 | 삼성전자주식회사 | 이동 통신 단말에 대한 디바이스 관리 장치 및 방법 |
| US20080016339A1 (en) | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
| US20080047009A1 (en) | 2006-07-20 | 2008-02-21 | Kevin Overcash | System and method of securing networks against applications threats |
| US8788829B2 (en) | 2006-08-17 | 2014-07-22 | Aol Inc. | System and method for interapplication communications |
| US7774599B2 (en) | 2006-09-15 | 2010-08-10 | Panasonic Corporation | Methodologies to secure inter-process communication based on trust |
| US8201244B2 (en) | 2006-09-19 | 2012-06-12 | Microsoft Corporation | Automated malware signature generation |
| WO2008043109A2 (en) | 2006-10-06 | 2008-04-10 | Smobile Systems, Inc. | System and method of reporting and visualizing malware on mobile networks |
| US7747575B2 (en) | 2006-11-07 | 2010-06-29 | Magix Ag | Application-specific intelligent backup and restore system |
| CA2706721C (en) | 2006-11-27 | 2016-05-31 | Smobile Systems, Inc. | Wireless intrusion prevention system and method |
| US8225093B2 (en) | 2006-12-05 | 2012-07-17 | Qualcomm Incorporated | Providing secure inter-application communication for a mobile operating environment |
| US7650317B2 (en) | 2006-12-06 | 2010-01-19 | Microsoft Corporation | Active learning framework for automatic field extraction from network traffic |
| US7778792B2 (en) | 2006-12-08 | 2010-08-17 | Chumby Industries, Inc. | Systems and methods for location, motion, and contact detection and tracking in a networked audiovisual device |
| JP4805116B2 (ja) | 2006-12-11 | 2011-11-02 | 株式会社日立製作所 | 情報処理システム、情報処理システムの制御方法、サービス利用装置及びサービス提供装置 |
| US7945955B2 (en) | 2006-12-18 | 2011-05-17 | Quick Heal Technologies Private Limited | Virus detection in mobile devices having insufficient resources to execute virus detection software |
| US8769099B2 (en) | 2006-12-28 | 2014-07-01 | Yahoo! Inc. | Methods and systems for pre-caching information on a mobile computing device |
| US9021605B2 (en) | 2007-01-03 | 2015-04-28 | International Business Machines Corporation | Method and system for protecting sensitive data in a program |
| US7996005B2 (en) * | 2007-01-17 | 2011-08-09 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
| EP2132643B1 (en) | 2007-03-05 | 2017-10-25 | Cupp Computing AS | System and method for providing data and device security between external and host devices |
| JP4618263B2 (ja) | 2007-03-23 | 2011-01-26 | 株式会社豊田中央研究所 | ソフトウェア挙動監視装置及びソフトウェア挙動監視システム |
| JP2008271126A (ja) * | 2007-04-19 | 2008-11-06 | Ntt Docomo Inc | 移動端末装置、移動端末装置の診断方法 |
| US8331987B2 (en) * | 2007-04-19 | 2012-12-11 | Apple Inc. | Personal area network systems and devices and methods for use thereof |
| US20080301796A1 (en) | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Adjusting the Levels of Anti-Malware Protection |
| JP4956292B2 (ja) | 2007-06-25 | 2012-06-20 | パナソニック株式会社 | 情報セキュリティ装置およびカウンタ制御方法 |
| US8239505B2 (en) | 2007-06-29 | 2012-08-07 | Microsoft Corporation | Progressively implementing declarative models in distributed systems |
| US8245295B2 (en) | 2007-07-10 | 2012-08-14 | Samsung Electronics Co., Ltd. | Apparatus and method for detection of malicious program using program behavior |
| US8713680B2 (en) | 2007-07-10 | 2014-04-29 | Samsung Electronics Co., Ltd. | Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program |
| US7890443B2 (en) | 2007-07-13 | 2011-02-15 | Microsoft Corporation | Learning classifiers using combined boosting and weight trimming |
| US20100199264A1 (en) * | 2007-08-02 | 2010-08-05 | Naoto Maeda | Pattern inspection system, pattern inspection device, method and pattern inspection program |
| CN101350054B (zh) | 2007-10-15 | 2011-05-25 | 北京瑞星信息技术有限公司 | 计算机有害程序自动防护方法及装置 |
| CN101976315A (zh) | 2008-01-02 | 2011-02-16 | 桑迪士克以色列有限公司 | 具有直接用户访问的存储装置 |
| US8160975B2 (en) | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
| US8719936B2 (en) | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
| US8595834B2 (en) | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
| US7676573B2 (en) | 2008-02-08 | 2010-03-09 | Microsoft Corporation | Node monitor client cache synchronization for mobile device management |
| US8320329B2 (en) | 2008-03-24 | 2012-11-27 | Cisco Technology, Inc. | Policy for a roaming terminal based on a home internet protocol (IP) address |
| US20090288080A1 (en) | 2008-05-13 | 2009-11-19 | Partridge Lucas W | Method of Delivering Software Over a Network |
| US8108323B2 (en) | 2008-05-19 | 2012-01-31 | Yahoo! Inc. | Distributed spam filtering utilizing a plurality of global classifiers and a local classifier |
| US20090293121A1 (en) | 2008-05-21 | 2009-11-26 | Bigus Joseph P | Deviation detection of usage patterns of computer resources |
| IL191744A0 (en) | 2008-05-27 | 2009-02-11 | Yuval Elovici | Unknown malcode detection using classifiers with optimal training sets |
| US20090327168A1 (en) | 2008-06-26 | 2009-12-31 | Yahoo! Inc. | Playful incentive for labeling content |
| JP2010016443A (ja) | 2008-07-01 | 2010-01-21 | Toshiba Corp | 状況認識装置、状況認識方法、及び無線端末装置 |
| JP4710933B2 (ja) | 2008-07-09 | 2011-06-29 | ソニー株式会社 | 学習装置、学習方法、およびプログラム |
| GB2461870B (en) | 2008-07-14 | 2012-02-29 | F Secure Oyj | Malware detection |
| US8069128B2 (en) | 2008-08-08 | 2011-11-29 | Yahoo! Inc. | Real-time ad-hoc spam filtering of email |
| US8775333B1 (en) | 2008-08-20 | 2014-07-08 | Symantec Corporation | Systems and methods for generating a threat classifier to determine a malicious process |
| US8095964B1 (en) | 2008-08-29 | 2012-01-10 | Symantec Corporation | Peer computer based threat detection |
| US8245315B2 (en) | 2008-09-10 | 2012-08-14 | Qualcomm Incorporated | Remote diagnosis of unauthorized hardware change |
| US8504504B2 (en) | 2008-09-26 | 2013-08-06 | Oracle America, Inc. | System and method for distributed denial of service identification and prevention |
| WO2010045596A1 (en) | 2008-10-16 | 2010-04-22 | Qualys, Inc. | Systems and methods for assessing the compliance of a computer across a network |
| US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
| US8984628B2 (en) | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
| US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
| US8087067B2 (en) | 2008-10-21 | 2011-12-27 | Lookout, Inc. | Secure mobile platform system |
| US8347386B2 (en) | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
| US9537613B2 (en) | 2008-10-24 | 2017-01-03 | Qualcomm Incorporated | Acknowledgment based on short cell radio network temporary identifier |
| US20100107257A1 (en) | 2008-10-29 | 2010-04-29 | International Business Machines Corporation | System, method and program product for detecting presence of malicious software running on a computer system |
| IL195081A0 (en) | 2008-11-03 | 2011-08-01 | Deutche Telekom Ag | Acquisition of malicious code using active learning |
| JP4576452B2 (ja) * | 2008-11-06 | 2010-11-10 | イーソル株式会社 | オペレーティングシステムおよび情報処理装置 |
| DE102008043954A1 (de) | 2008-11-21 | 2010-05-27 | Robert Bosch Gmbh | Sensornetzwerksystem, Übertragunsprotokoll, Verfahren zum Wiedererkennen eines Objekts sowie Computerprogramm |
| US8549625B2 (en) | 2008-12-12 | 2013-10-01 | International Business Machines Corporation | Classification of unwanted or malicious software through the identification of encrypted data communication |
| US20100153371A1 (en) | 2008-12-16 | 2010-06-17 | Yahoo! Inc. | Method and apparatus for blending search results |
| CN101770453A (zh) | 2008-12-31 | 2010-07-07 | 华建机器翻译有限公司 | 基于领域本体结合机器学习模型的汉语文本共指消解方法 |
| US20100192222A1 (en) | 2009-01-23 | 2010-07-29 | Microsoft Corporation | Malware detection using multiple classifiers |
| US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
| US20100192201A1 (en) | 2009-01-29 | 2010-07-29 | Breach Security, Inc. | Method and Apparatus for Excessive Access Rate Detection |
| EP2222048A1 (en) * | 2009-02-24 | 2010-08-25 | BRITISH TELECOMMUNICATIONS public limited company | Detecting malicious behaviour on a computer network |
| US8266698B1 (en) | 2009-03-09 | 2012-09-11 | Symantec Corporation | Using machine infection characteristics for behavior-based detection of malware |
| EP2406717A4 (en) | 2009-03-13 | 2012-12-26 | Univ Rutgers | SYSTEMS AND METHODS FOR DETECTING DAMAGE PROGRAMS |
| US8490187B2 (en) | 2009-03-20 | 2013-07-16 | Microsoft Corporation | Controlling malicious activity detection using behavioral models |
| US8683554B2 (en) | 2009-03-27 | 2014-03-25 | Wavemarket, Inc. | System and method for managing third party application program access to user information via a native application program interface (API) |
| US8161130B2 (en) | 2009-04-10 | 2012-04-17 | Microsoft Corporation | Bottom-up analysis of network sites |
| JP5244686B2 (ja) | 2009-04-24 | 2013-07-24 | 株式会社東芝 | 監視装置およびサーバー |
| US8918876B2 (en) | 2009-04-30 | 2014-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | Deviating behaviour of a user terminal |
| US8694624B2 (en) | 2009-05-19 | 2014-04-08 | Symbol Technologies, Inc. | Systems and methods for concurrent wireless local area network access and sensing |
| US8356001B2 (en) | 2009-05-19 | 2013-01-15 | Xybersecure, Inc. | Systems and methods for application-level security |
| WO2010141826A2 (en) | 2009-06-05 | 2010-12-09 | The Regents Of The University Of Michigan | System and method for detecting energy consumption anomalies and mobile malware variants |
| US9074897B2 (en) | 2009-06-15 | 2015-07-07 | Qualcomm Incorporated | Real-time data with post-processing |
| US8701192B1 (en) | 2009-06-30 | 2014-04-15 | Symantec Corporation | Behavior based signatures |
| US20110013528A1 (en) | 2009-07-16 | 2011-01-20 | Chen Byron H | Method for providing presence and location information of mobiles in a wireless network |
| US8776218B2 (en) * | 2009-07-21 | 2014-07-08 | Sophos Limited | Behavioral-based host intrusion prevention system |
| US8311956B2 (en) | 2009-08-11 | 2012-11-13 | At&T Intellectual Property I, L.P. | Scalable traffic classifier and classifier training system |
| WO2011026604A1 (en) * | 2009-09-01 | 2011-03-10 | Nec Europe Ltd. | Method for monitoring a network and network including a monitoring functionality |
| CA2712002C (en) | 2009-09-09 | 2016-08-30 | Aastra Technologies Limited | Diagnostics methods for a communications device |
| US8509755B2 (en) | 2009-10-30 | 2013-08-13 | Research In Motion Limited | System and method for activating a component on an electronic device |
| US8397301B2 (en) | 2009-11-18 | 2013-03-12 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communication device |
| EP2326057A1 (en) | 2009-11-20 | 2011-05-25 | British Telecommunications public limited company | Detecting malicious behaviour on a network |
| US20110161452A1 (en) | 2009-12-24 | 2011-06-30 | Rajesh Poornachandran | Collaborative malware detection and prevention on mobile devices |
| JP2011138219A (ja) * | 2009-12-25 | 2011-07-14 | Toshiba Corp | 並列プログラム解析結果表示装置および並列プログラム解析結果表示方法 |
| US8806620B2 (en) | 2009-12-26 | 2014-08-12 | Intel Corporation | Method and device for managing security events |
| US20120254333A1 (en) | 2010-01-07 | 2012-10-04 | Rajarathnam Chandramouli | Automated detection of deception in short and multilingual electronic messages |
| US8458809B2 (en) | 2010-01-20 | 2013-06-04 | Research In Motion Limited | Apparatus, and an associated method, for facilitating secure operations of a wireless device |
| CN102859967A (zh) | 2010-03-01 | 2013-01-02 | 诺基亚公司 | 用于基于用户交互数据来估计用户特征的方法和设备 |
| US20110219449A1 (en) * | 2010-03-04 | 2011-09-08 | St Neitzel Michael | Malware detection method, system and computer program product |
| KR101051641B1 (ko) | 2010-03-30 | 2011-07-26 | 주식회사 안철수연구소 | 이동통신 단말 및 이를 이용한 행위기반 악성 코드 진단 방법 |
| US8694744B1 (en) | 2010-03-31 | 2014-04-08 | Emc Corporation | Mobile device snapshot backup |
| WO2011129805A1 (en) | 2010-04-12 | 2011-10-20 | Siemens Aktiengesellschaft | Method for computer-aided closed-loop and/or open-loop control of a technical system |
| EP3242465B1 (en) | 2010-04-26 | 2020-01-01 | BlackBerry Limited | Mobile wireless communications device providing enhanced file transfer management features and related methods |
| US8570993B2 (en) | 2010-05-20 | 2013-10-29 | At&T Mobility Ii Llc | Wi-Fi intelligent selection engine |
| DE102010021825A1 (de) | 2010-05-28 | 2011-12-01 | Christmann Informationstechnik + Medien Gmbh & Co. Kg | Mehrprozessor-Computersystem |
| US9449175B2 (en) | 2010-06-03 | 2016-09-20 | Nokia Technologies Oy | Method and apparatus for analyzing and detecting malicious software |
| CN101882000B (zh) | 2010-06-18 | 2012-08-22 | 华南理工大学 | 一种基于加速度传感器的手势识别方法 |
| US20120180126A1 (en) | 2010-07-13 | 2012-07-12 | Lei Liu | Probable Computing Attack Detector |
| US20120016633A1 (en) | 2010-07-16 | 2012-01-19 | Andreas Wittenstein | System and method for automatic detection of anomalous recurrent behavior |
| US9294946B2 (en) | 2010-08-27 | 2016-03-22 | Qualcomm Incorporated | Adaptive automatic detail diagnostic log collection in a wireless communication system |
| US8424093B2 (en) | 2010-11-01 | 2013-04-16 | Kaspersky Lab Zao | System and method for updating antivirus cache |
| US8683591B2 (en) | 2010-11-18 | 2014-03-25 | Nant Holdings Ip, Llc | Vector-based anomaly detection |
| US8875286B2 (en) | 2010-12-01 | 2014-10-28 | Cisco Technology, Inc. | Method and apparatus for detecting malicious software using machine learning techniques |
| US20120151479A1 (en) | 2010-12-10 | 2012-06-14 | Salesforce.Com, Inc. | Horizontal splitting of tasks within a homogenous pool of virtual machines |
| US9710645B2 (en) | 2010-12-23 | 2017-07-18 | Ebay Inc. | Systems and methods to detect and neutralize malware infected electronic communications |
| US20120167218A1 (en) | 2010-12-23 | 2012-06-28 | Rajesh Poornachandran | Signature-independent, system behavior-based malware detection |
| US8640245B2 (en) | 2010-12-24 | 2014-01-28 | Kaspersky Lab, Zao | Optimization of anti-malware processing by automated correction of detection rules |
| US8762298B1 (en) | 2011-01-05 | 2014-06-24 | Narus, Inc. | Machine learning based botnet detection using real-time connectivity graph based traffic features |
| CN102591696A (zh) | 2011-01-14 | 2012-07-18 | 中国科学院软件研究所 | 一种手机软件行为数据提取方法及系统 |
| US9326698B2 (en) | 2011-02-18 | 2016-05-03 | The Trustees Of The University Of Pennsylvania | Method for automatic, unsupervised classification of high-frequency oscillations in physiological recordings |
| US8695095B2 (en) | 2011-03-11 | 2014-04-08 | At&T Intellectual Property I, L.P. | Mobile malicious software mitigation |
| US8554912B1 (en) * | 2011-03-14 | 2013-10-08 | Sprint Communications Company L.P. | Access management for wireless communication devices failing authentication for a communication network |
| JP5665188B2 (ja) * | 2011-03-31 | 2015-02-04 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | ソフトウエア更新を適用した情報処理装置を検査するシステム |
| US8533857B2 (en) | 2011-04-12 | 2013-09-10 | Teletech Holdings, Inc. | Methods for providing cross-vendor support services |
| RU2454705C1 (ru) | 2011-04-19 | 2012-06-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ защиты компьютерного устройства от вредоносных объектов, использующих сложные схемы заражения |
| KR101906410B1 (ko) | 2011-04-19 | 2018-10-11 | 삼성전자주식회사 | 푸쉬 서비스 관리 방법 및 장치와 그 방법에 대한 프로그램 소스를 저장한 기록 매체 |
| CN102790758B (zh) | 2011-05-18 | 2017-08-18 | 海尔集团公司 | 防火墙系统及其处理方法 |
| US9323928B2 (en) | 2011-06-01 | 2016-04-26 | Mcafee, Inc. | System and method for non-signature based detection of malicious processes |
| US8819471B2 (en) | 2011-06-03 | 2014-08-26 | Apple Inc. | Methods and apparatus for power state based backup |
| US20120317306A1 (en) | 2011-06-10 | 2012-12-13 | Microsoft Corporation | Statistical Network Traffic Signature Analyzer |
| US9152882B2 (en) | 2011-06-17 | 2015-10-06 | Microsoft Technology Licensing, Llc. | Location-aided recognition |
| US9286182B2 (en) | 2011-06-17 | 2016-03-15 | Microsoft Technology Licensing, Llc | Virtual machine snapshotting and analysis |
| CN102202102B (zh) * | 2011-07-05 | 2014-08-13 | 施昊 | 基于云计算架构的网络服务聚合系统及其聚合方法 |
| US20130203440A1 (en) | 2011-07-27 | 2013-08-08 | Qualcomm Labs, Inc. | Selectively performing a positioning procedure at an access terminal based on a behavior model |
| WO2013015994A1 (en) | 2011-07-27 | 2013-01-31 | Seven Networks, Inc. | Monitoring mobile application activities for malicious traffic on a mobile device |
| US8782412B2 (en) | 2011-08-31 | 2014-07-15 | AstherPal Inc. | Secured privileged access to an embedded client on a mobile device |
| WO2012149719A1 (zh) * | 2011-08-31 | 2012-11-08 | 华为技术有限公司 | 一种建立检查点的方法和系统 |
| US20130066815A1 (en) | 2011-09-13 | 2013-03-14 | Research In Motion Limited | System and method for mobile context determination |
| ES2755780T3 (es) | 2011-09-16 | 2020-04-23 | Veracode Inc | Análisis estático y de comportamiento automatizado mediante la utilización de un espacio aislado instrumentado y clasificación de aprendizaje automático para seguridad móvil |
| US8793593B2 (en) | 2011-09-21 | 2014-07-29 | Facebook, Inc. | Integrating structured objects and actions generated on external systems into a social networking system |
| US8869235B2 (en) | 2011-10-11 | 2014-10-21 | Citrix Systems, Inc. | Secure mobile browser for protecting enterprise data |
| US9317702B2 (en) | 2011-11-29 | 2016-04-19 | Sony Corporation | System and method for providing secure inter-process communications |
| US9413538B2 (en) | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
| US9071636B2 (en) | 2011-12-21 | 2015-06-30 | Verizon Patent And Licensing Inc. | Predictive scoring management system for application behavior |
| AU2013207269A1 (en) | 2012-01-06 | 2014-07-24 | Optio Labs, LLC | Systems and methods for enforcing security in mobile computing |
| US8943204B2 (en) | 2012-01-23 | 2015-01-27 | Cellco Partnership | Method and system for conserving network resources when sending information to mobile devices |
| US9832211B2 (en) | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
| US9439077B2 (en) | 2012-04-10 | 2016-09-06 | Qualcomm Incorporated | Method for malicious activity detection in a mobile station |
| US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
| US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
| US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
| US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
| US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
| US20130304677A1 (en) | 2012-05-14 | 2013-11-14 | Qualcomm Incorporated | Architecture for Client-Cloud Behavior Analyzer |
| EP2680182B1 (en) | 2012-06-29 | 2016-03-16 | GSMK Gesellschaft für sichere Mobile Kommunikation mbH | Mobile device and method to monitor a baseband processor in relation to the actions on an application processor |
| KR101512278B1 (ko) | 2012-07-25 | 2015-04-17 | 아로, 인코포레이티드 | 스토리라인을 생성하고, 사용자 루틴 및 개성을 모델링하고, 맞춤형 추천 에이전트를 생성하는 모바일 장치 데이터 사용 |
| US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US20140150100A1 (en) | 2012-08-15 | 2014-05-29 | Qualcomm Incorporated | Adaptive Observation of Driver and Hardware Level Behavioral Features on a Mobile Device |
| US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
| US9330257B2 (en) * | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| US20140096246A1 (en) | 2012-10-01 | 2014-04-03 | Google Inc. | Protecting users from undesirable content |
| US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
| US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
| US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
| US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
| US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
| WO2014165230A1 (en) | 2013-03-13 | 2014-10-09 | Lookout, Inc. | System and method for changing security behavior of a device based on proximity to another device |
| US20140279745A1 (en) | 2013-03-14 | 2014-09-18 | Sm4rt Predictive Systems | Classification based on prediction of accuracy of multiple data models |
-
2012
- 2012-09-26 US US13/627,401 patent/US9202047B2/en not_active Expired - Fee Related
- 2012-12-04 CN CN201280072995.1A patent/CN104272786B/zh active Active
- 2012-12-04 KR KR1020147035054A patent/KR101626243B1/ko not_active Expired - Fee Related
- 2012-12-04 IN IN2172MUN2014 patent/IN2014MN02172A/en unknown
- 2012-12-04 EP EP12812764.4A patent/EP2850864B1/en active Active
- 2012-12-04 WO PCT/US2012/067726 patent/WO2013172865A1/en not_active Ceased
-
2013
- 2013-01-22 US US13/747,115 patent/US9292685B2/en active Active
- 2013-01-25 US US13/749,948 patent/US9349001B2/en not_active Expired - Fee Related
- 2013-01-25 CN CN201380023620.0A patent/CN104272787B/zh not_active Expired - Fee Related
- 2013-01-25 KR KR1020147035051A patent/KR102103613B1/ko not_active Expired - Fee Related
- 2013-01-25 WO PCT/US2013/023246 patent/WO2013172877A1/en not_active Ceased
- 2013-01-29 CN CN201380023666.2A patent/CN104303538B/zh not_active Expired - Fee Related
- 2013-01-29 WO PCT/US2013/023646 patent/WO2013172881A1/en not_active Ceased
- 2013-01-29 EP EP13707226.0A patent/EP2850865B1/en not_active Not-in-force
- 2013-01-29 IN IN2026MUN2014 patent/IN2014MN02026A/en unknown
- 2013-02-22 US US13/773,877 patent/US9152787B2/en active Active
- 2013-04-10 CN CN201380024849.6A patent/CN104303156B/zh active Active
- 2013-04-10 JP JP2015512656A patent/JP6110482B2/ja not_active Expired - Fee Related
- 2013-04-10 EP EP13718700.1A patent/EP2850524B1/en active Active
- 2013-04-10 WO PCT/US2013/035952 patent/WO2013173001A1/en not_active Ceased
- 2013-04-23 TW TW102114436A patent/TW201407406A/zh unknown
-
2014
- 2014-05-02 US US14/268,547 patent/US9189624B2/en active Active
-
2015
- 2015-01-29 US US14/609,113 patent/US9898602B2/en not_active Expired - Fee Related
Also Published As
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2014MN02026A (enExample) | ||
| GB2510091A (en) | Collaborative processor and system performance and power management | |
| TWD163932S (zh) | 外殼之部分 | |
| EP3086239A4 (en) | Scenario generation device and computer program therefor | |
| EP2740096A4 (en) | DYNAMIC LABELING FOR GENERATING LOGICAL MODELS AND FOR CACHE STORAGE OPTIMIZATION IN POWER MANAGEMENT SYSTEMS | |
| TWD163515S (zh) | 攜帶型電腦 | |
| GB201212220D0 (en) | Data verification using checksum sidefile | |
| GB2506783A (en) | Enabling a computing device to utilize another computing device | |
| EP3039569A4 (en) | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |
| EP3063545A4 (en) | Systems and methods for processing data relating to energy usage | |
| GB201305379D0 (en) | Methods and systems for enrolling biometric data | |
| MX351728B (es) | Metodo y dispositivo para el analisis de optimizacion de la forma. | |
| GB201000874D0 (en) | Client-server system | |
| TWD162094S (zh) | 電腦 | |
| MX2016007151A (es) | Indicacion de disponibilidad de usuario para comunicacion. | |
| IN2014CN00797A (enExample) | ||
| GB2505797A (en) | Smart window and display enclosure | |
| EP2540466A4 (en) | PREPREG COATING HEAD AND PREFREG AUTOMATIC COATING DEVICE ALREADY EQUIPPED THEREFOR | |
| EP2766818A4 (en) | EMERGENCY RECOVERY FAILOVER IN CLOUD COMPUTING | |
| EP2883274A4 (en) | PORTABLE ELECTRONIC DEVICE WITH BACK CASE AND ANTENNA COMBINATION | |
| GB2507225A (en) | Loyalty systems and methods | |
| GB2520854B (en) | Computing system and processor with fast power surge detection and instruction throttle down to provide for low cost power supply unit | |
| TWD163927S (zh) | 電腦之部分 | |
| GB2520444A (en) | Firmware agent | |
| BR112013008613A2 (pt) | método executado pelo menos em parte em um dispositivo de computação, servidor para proporcionar controles de intensificação do comportamento da página da web e meio de armazenagem legível em computador |