IN2015CH03057A - - Google Patents
Info
- Publication number
- IN2015CH03057A IN2015CH03057A IN3057CH2015A IN2015CH03057A IN 2015CH03057 A IN2015CH03057 A IN 2015CH03057A IN 3057CH2015 A IN3057CH2015 A IN 3057CH2015A IN 2015CH03057 A IN2015CH03057 A IN 2015CH03057A
- Authority
- IN
- India
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN3057CH2015 IN2015CH03057A (OSRAM) | 2015-06-18 | 2015-06-18 | |
| US14/814,912 US9781146B2 (en) | 2015-06-18 | 2015-07-31 | Method and device for evaluating security assessment of an application |
| EP15201794.3A EP3107027B1 (en) | 2015-06-18 | 2015-12-21 | Method and device for evaluating security assessment of an application |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN3057CH2015 IN2015CH03057A (OSRAM) | 2015-06-18 | 2015-06-18 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2015CH03057A true IN2015CH03057A (OSRAM) | 2015-07-03 |
Family
ID=54397108
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN3057CH2015 IN2015CH03057A (OSRAM) | 2015-06-18 | 2015-06-18 |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US9781146B2 (OSRAM) |
| IN (1) | IN2015CH03057A (OSRAM) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10250586B2 (en) * | 2015-12-08 | 2019-04-02 | Sap Se | Security certification and application categorization for mobile device management |
| US10467419B1 (en) * | 2018-10-31 | 2019-11-05 | Capital One Services, Llc | Methods and systems for determining software risk scores |
| US12229255B2 (en) | 2018-10-31 | 2025-02-18 | Capital One Services, Llc | Methods and systems for multi-tool orchestration |
| CN109450956B (zh) * | 2018-12-29 | 2021-06-08 | 奇安信科技集团股份有限公司 | 网络安全性评估方法、系统、介质和计算机系统 |
| US12242652B2 (en) | 2019-03-07 | 2025-03-04 | Lookout, Inc. | Security policy manager to configure permissions on computing devices |
| US11301569B2 (en) | 2019-03-07 | 2022-04-12 | Lookout, Inc. | Quarantine of software based on analysis of updated device data |
| US11899792B2 (en) | 2019-04-08 | 2024-02-13 | Walmart Apollo, Llc | System for security scanning code with minimal user interface |
| US20210349970A1 (en) * | 2020-05-07 | 2021-11-11 | Arris Enterprises Llc | Application protection enforcement in the cloud |
| US11756097B2 (en) | 2021-01-05 | 2023-09-12 | Walmart Apollo, Llc | Methods and apparatus for automatically detecting data attacks using machine learning processes |
| US12086269B2 (en) | 2022-03-21 | 2024-09-10 | Bank Of America Corporation | System for deployable software vulnerability testing platform |
| US12412141B2 (en) * | 2023-06-29 | 2025-09-09 | Acronis International Gmbh | Systems and methods of using business impact analysis data to assess the risk of security mitigation steps |
Family Cites Families (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8510571B1 (en) * | 2003-03-24 | 2013-08-13 | Hoi Chang | System and method for inserting security mechanisms into a software program |
| US9069967B2 (en) * | 2007-02-16 | 2015-06-30 | Veracode, Inc. | Assessment and analysis of software security flaws |
| US8613080B2 (en) * | 2007-02-16 | 2013-12-17 | Veracode, Inc. | Assessment and analysis of software security flaws in virtual machines |
| GB2459629A (en) | 2007-02-16 | 2009-11-04 | Veracode Inc | Assessment and analysis of software security flaws |
| CN102141956B (zh) * | 2010-01-29 | 2015-02-11 | 国际商业机器公司 | 用于开发中的安全漏洞响应管理的方法和系统 |
| US9560036B2 (en) * | 2010-07-08 | 2017-01-31 | International Business Machines Corporation | Cross-protocol federated single sign-on (F-SSO) for cloud enablement |
| US8701198B2 (en) | 2010-08-10 | 2014-04-15 | Salesforce.Com, Inc. | Performing security analysis on a software application |
| US20150195181A1 (en) * | 2010-09-30 | 2015-07-09 | Google Inc. | Testing of dynamic web content applications |
| WO2012109633A2 (en) * | 2011-02-11 | 2012-08-16 | Achilles Guard, Inc. D/B/A Critical Watch | Security countermeasure management platform |
| EP2610776B1 (en) | 2011-09-16 | 2019-08-21 | Veracode, Inc. | Automated behavioural and static analysis using an instrumented sandbox and machine learning classification for mobile security |
| US8875298B2 (en) * | 2012-02-16 | 2014-10-28 | Nec Laboratories America, Inc. | Method for scalable analysis of android applications for security vulnerability |
| US9661003B2 (en) * | 2012-05-11 | 2017-05-23 | Thomas W. Parker | System and method for forensic cyber adversary profiling, attribution and attack identification |
| GB2503920A (en) * | 2012-07-12 | 2014-01-15 | Ibm | Using a tag to identify the application context for a program object |
| EP2891101B1 (en) * | 2012-08-31 | 2016-11-09 | Iappsecure Solutions Pvt. Ltd. | A system for analyzing applications in order to find security and quality issues |
| EP2962239A4 (en) | 2013-02-28 | 2016-10-19 | Hewlett Packard Entpr Dev Lp | DETERMINATION OF DYNAMIC SECURITY SCAN COVERS USING RUNTIME AND STATIC CODE ANALYSIS |
| IN2013MU01201A (OSRAM) * | 2013-03-28 | 2015-04-10 | Tata Consultancy Services Ltd | |
| US8959646B2 (en) * | 2013-06-24 | 2015-02-17 | Sap Se | Automated detection and validation of sanitizers |
| US8881293B1 (en) * | 2013-07-01 | 2014-11-04 | Sap Se | Static application security testing |
| US9305168B2 (en) * | 2013-07-01 | 2016-04-05 | Sap Se | Modular static application security testing |
| US20150121532A1 (en) * | 2013-10-31 | 2015-04-30 | Comsec Consulting Ltd | Systems and methods for defending against cyber attacks at the software level |
| US9977904B2 (en) * | 2014-02-25 | 2018-05-22 | Board Of Regents, The University Of Texas System | Systems and methods for automated detection of application vulnerabilities |
| US9485268B2 (en) * | 2014-04-04 | 2016-11-01 | International Business Machines Corporation | System, method and apparatus to visually configure an analysis of a program |
| US10445496B2 (en) * | 2014-07-30 | 2019-10-15 | Entit Software Llc | Product risk profile |
| US10097574B2 (en) * | 2014-12-18 | 2018-10-09 | International Business Machines Corporation | Auto-tuning program analysis tools based on user feedback |
| US9785777B2 (en) * | 2014-12-19 | 2017-10-10 | International Business Machines Corporation | Static analysis based on abstract program representations |
| US9594913B2 (en) * | 2015-01-28 | 2017-03-14 | Wal-Mart Stores, Inc. | System, method, and non-transitory computer-readable storage media for analyzing software application modules and provide actionable intelligence on remediation efforts |
-
2015
- 2015-06-18 IN IN3057CH2015 patent/IN2015CH03057A/en unknown
- 2015-07-31 US US14/814,912 patent/US9781146B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US20160373480A1 (en) | 2016-12-22 |
| US9781146B2 (en) | 2017-10-03 |