JP2012520530A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2012520530A5 JP2012520530A5 JP2011554270A JP2011554270A JP2012520530A5 JP 2012520530 A5 JP2012520530 A5 JP 2012520530A5 JP 2011554270 A JP2011554270 A JP 2011554270A JP 2011554270 A JP2011554270 A JP 2011554270A JP 2012520530 A5 JP2012520530 A5 JP 2012520530A5
- Authority
- JP
- Japan
- Prior art keywords
- envelope
- signature
- document
- ability
- settings
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Description
システムによる認証を通して現在課せられているビジネス(業務)ルールは次の行動を保障する。
・レシピエントがドキュメント上に署名/イニシャルタスク(署名/イニシャルを書くタスク)を有する場合、どのレシピエントもそのドキュメント上に署名/イニシャルタスクを有していなければならない。いくつかの署名/イニシャルタスクを含む、1つのドキュメント上に署名/イニシャルタスクがないエンベロープ(envelope)を有するレシピエントが存在する場合、システムは創出時にエンベロープを拒絶するであろう。
・ドキュメントがエンベロープを有するレシピエントのための署名/イニシャルタスクを有していない場合、そのドキュメントを全てのレシピエントが見ることができるものと認められ、エンベロープは創出許可される。
・レシピエントがドキュメント上に署名/イニシャルタスク(署名/イニシャルを書くタスク)を有する場合、どのレシピエントもそのドキュメント上に署名/イニシャルタスクを有していなければならない。いくつかの署名/イニシャルタスクを含む、1つのドキュメント上に署名/イニシャルタスクがないエンベロープ(envelope)を有するレシピエントが存在する場合、システムは創出時にエンベロープを拒絶するであろう。
・ドキュメントがエンベロープを有するレシピエントのための署名/イニシャルタスクを有していない場合、そのドキュメントを全てのレシピエントが見ることができるものと認められ、エンベロープは創出許可される。
このシステムは好適には次の追加的設定/オプションを許可する。
・配信証明及び複写されたレシピエント、全ての署名者のエンベローブの履歴及び完了の証明書(Certificate of Completion and Envelope History for all Sighners、Certified DeliveryおよびCarbon Copy Recipients)への動的抑制アクセス(これらのドキュメント/スクリーンは全ての署名者のリストを表示する)
・アカウントレベル(Account−level)のセッティングとして、またはエンベローブベース上に(エンベローブを基礎として)システム動作を特定する能力。1実施例では、そのセッティングはアカウントアドミニストレータ(Account Administrators)が管理するようにはなっていない。すなわちアカウントレベルのセッティングは、彼ら自身はセッティングを変化させる能力を有さないであろうシステムユーザを特定できる。
・エンベローブの履歴内にシステムの視認性のセッティングを反映させる能力。この情報は人による判読性のため並びにプログラムアクセスのために利用可能である。
・全てのドキュメントをエンベローブの送り手に視認可能にする能力。
・アカウントを送るメンバーが全てのドキュメントを見ることができるか、または彼らは視認ポリシーの規制対象であるかを指定する能力。
・配信証明及び複写されたレシピエント、全ての署名者のエンベローブの履歴及び完了の証明書(Certificate of Completion and Envelope History for all Sighners、Certified DeliveryおよびCarbon Copy Recipients)への動的抑制アクセス(これらのドキュメント/スクリーンは全ての署名者のリストを表示する)
・アカウントレベル(Account−level)のセッティングとして、またはエンベローブベース上に(エンベローブを基礎として)システム動作を特定する能力。1実施例では、そのセッティングはアカウントアドミニストレータ(Account Administrators)が管理するようにはなっていない。すなわちアカウントレベルのセッティングは、彼ら自身はセッティングを変化させる能力を有さないであろうシステムユーザを特定できる。
・エンベローブの履歴内にシステムの視認性のセッティングを反映させる能力。この情報は人による判読性のため並びにプログラムアクセスのために利用可能である。
・全てのドキュメントをエンベローブの送り手に視認可能にする能力。
・アカウントを送るメンバーが全てのドキュメントを見ることができるか、または彼らは視認ポリシーの規制対象であるかを指定する能力。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16023709P | 2009-03-13 | 2009-03-13 | |
US61/160,237 | 2009-03-13 | ||
PCT/US2010/027326 WO2010105262A1 (en) | 2009-03-13 | 2010-03-15 | Systems and methods for document management transformation and security |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2012520530A JP2012520530A (ja) | 2012-09-06 |
JP2012520530A5 true JP2012520530A5 (ja) | 2015-05-14 |
JP5889638B2 JP5889638B2 (ja) | 2016-03-30 |
Family
ID=42728846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011554270A Active JP5889638B2 (ja) | 2009-03-13 | 2010-03-15 | ドキュメント管理変換および機密保全のためのシステムおよび方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US8239496B2 (ja) |
EP (1) | EP2406715A4 (ja) |
JP (1) | JP5889638B2 (ja) |
CN (1) | CN102422269B (ja) |
AU (1) | AU2010223873B2 (ja) |
CA (1) | CA2755286C (ja) |
SG (2) | SG174343A1 (ja) |
WO (1) | WO2010105262A1 (ja) |
Families Citing this family (179)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8539582B1 (en) | 2004-04-01 | 2013-09-17 | Fireeye, Inc. | Malware containment and security analysis on connection |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US8898788B1 (en) | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
US8375444B2 (en) | 2006-04-20 | 2013-02-12 | Fireeye, Inc. | Dynamic signature creation and enforcement |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US8566946B1 (en) | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
US9514117B2 (en) | 2007-02-28 | 2016-12-06 | Docusign, Inc. | System and method for document tagging templates |
US8655961B2 (en) | 2007-07-18 | 2014-02-18 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8949706B2 (en) | 2007-07-18 | 2015-02-03 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US7930447B2 (en) | 2008-10-17 | 2011-04-19 | International Business Machines Corporation | Listing windows of active applications of computing devices sharing a keyboard based upon requests for attention |
US8850571B2 (en) | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
US8997219B2 (en) * | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
US8484723B2 (en) | 2009-06-05 | 2013-07-09 | Signix, Inc. | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US9251131B2 (en) | 2010-05-04 | 2016-02-02 | Docusign, Inc. | Systems and methods for distributed electronic signature documents including version control |
SG10201504580YA (en) | 2010-06-11 | 2015-07-30 | Docusign Inc | Web-based electronically signed documents |
US9064238B2 (en) | 2011-03-04 | 2015-06-23 | Factify | Method and apparatus for certification of facts |
US9268758B2 (en) | 2011-07-14 | 2016-02-23 | Docusign, Inc. | Method for associating third party content with online document signing |
CA2841812C (en) | 2011-07-14 | 2019-09-24 | Docusign, Inc. | Online signature identity and verification in community |
US9824198B2 (en) | 2011-07-14 | 2017-11-21 | Docusign, Inc. | System and method for identity and reputation score based on transaction history |
US10511732B2 (en) | 2011-08-25 | 2019-12-17 | Docusign, Inc. | Mobile solution for importing and signing third-party electronic signature documents |
SG11201400184YA (en) * | 2011-08-25 | 2014-08-28 | Docusign Inc | Mobile solution for signing and retaining third-party documents |
US10108928B2 (en) | 2011-10-18 | 2018-10-23 | Dotloop, Llc | Systems, methods and apparatus for form building |
US9519782B2 (en) | 2012-02-24 | 2016-12-13 | Fireeye, Inc. | Detecting malicious network content |
US9230130B2 (en) | 2012-03-22 | 2016-01-05 | Docusign, Inc. | System and method for rules-based control of custody of electronic signature transactions |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US10826951B2 (en) | 2013-02-11 | 2020-11-03 | Dotloop, Llc | Electronic content sharing |
US9367681B1 (en) | 2013-02-23 | 2016-06-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
US9824209B1 (en) | 2013-02-23 | 2017-11-21 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications that is usable to harden in the field code |
US8990944B1 (en) | 2013-02-23 | 2015-03-24 | Fireeye, Inc. | Systems and methods for automatically detecting backdoors |
US9159035B1 (en) | 2013-02-23 | 2015-10-13 | Fireeye, Inc. | Framework for computer application analysis of sensitive information tracking |
US9009823B1 (en) | 2013-02-23 | 2015-04-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications installed on mobile devices |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
US9009822B1 (en) | 2013-02-23 | 2015-04-14 | Fireeye, Inc. | Framework for multi-phase analysis of mobile applications |
US9176843B1 (en) | 2013-02-23 | 2015-11-03 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications |
AU2014225984B2 (en) | 2013-03-04 | 2017-06-22 | Docusign, Inc. | Systems and methods for cloud data security |
US9355247B1 (en) | 2013-03-13 | 2016-05-31 | Fireeye, Inc. | File extraction from memory dump for malicious content analysis |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9565202B1 (en) | 2013-03-13 | 2017-02-07 | Fireeye, Inc. | System and method for detecting exfiltration content |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
US9430646B1 (en) | 2013-03-14 | 2016-08-30 | Fireeye, Inc. | Distributed systems and methods for automatically detecting unknown bots and botnets |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9251343B1 (en) | 2013-03-15 | 2016-02-02 | Fireeye, Inc. | Detecting bootkits resident on compromised computers |
US9413781B2 (en) | 2013-03-15 | 2016-08-09 | Fireeye, Inc. | System and method employing structured intelligence to verify and contain threats at endpoints |
US9575622B1 (en) | 2013-04-02 | 2017-02-21 | Dotloop, Llc | Systems and methods for electronic signature |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
US9536091B2 (en) | 2013-06-24 | 2017-01-03 | Fireeye, Inc. | System and method for detecting time-bomb malware |
US10133863B2 (en) | 2013-06-24 | 2018-11-20 | Fireeye, Inc. | Zero-day discovery system |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9888016B1 (en) | 2013-06-28 | 2018-02-06 | Fireeye, Inc. | System and method for detecting phishing using password prediction |
US9223528B2 (en) * | 2013-07-30 | 2015-12-29 | Konica Minolta Laboratory U.S.A., Inc. | Electronic content management workflow |
CN105474226B (zh) * | 2013-08-27 | 2019-02-19 | 爱克发医疗保健公司 | 用于处理文档的系统和方法 |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US9294501B2 (en) | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US10089461B1 (en) | 2013-09-30 | 2018-10-02 | Fireeye, Inc. | Page replacement code injection |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US10192052B1 (en) | 2013-09-30 | 2019-01-29 | Fireeye, Inc. | System, apparatus and method for classifying a file as malicious using static scanning |
US9189627B1 (en) | 2013-11-21 | 2015-11-17 | Fireeye, Inc. | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9507935B2 (en) | 2014-01-16 | 2016-11-29 | Fireeye, Inc. | Exploit detection system with threat-aware microvisor |
WO2015120086A1 (en) | 2014-02-04 | 2015-08-13 | Shoobx, Inc. | Computer-guided corporate governance with document generation and execution |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US10552525B1 (en) | 2014-02-12 | 2020-02-04 | Dotloop, Llc | Systems, methods and apparatuses for automated form templating |
US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9432389B1 (en) | 2014-03-31 | 2016-08-30 | Fireeye, Inc. | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
US9594912B1 (en) | 2014-06-06 | 2017-03-14 | Fireeye, Inc. | Return-oriented programming detection |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US10733364B1 (en) | 2014-09-02 | 2020-08-04 | Dotloop, Llc | Simplified form interface system and method |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
US11494711B2 (en) | 2014-11-19 | 2022-11-08 | Shoobx, Inc. | Computer-guided corporate relationship management |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US10075455B2 (en) | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US9690606B1 (en) | 2015-03-25 | 2017-06-27 | Fireeye, Inc. | Selective system call monitoring |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US9438613B1 (en) | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US9594904B1 (en) | 2015-04-23 | 2017-03-14 | Fireeye, Inc. | Detecting malware based on reflection |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US10176321B2 (en) | 2015-09-22 | 2019-01-08 | Fireeye, Inc. | Leveraging behavior-based rules for malware family classification |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US9825976B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Detection and classification of exploit kits |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US10284575B2 (en) | 2015-11-10 | 2019-05-07 | Fireeye, Inc. | Launcher for setting analysis environment variations for malware detection |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10621338B1 (en) | 2015-12-30 | 2020-04-14 | Fireeye, Inc. | Method to detect forgery and exploits using last branch recording registers |
US9824216B1 (en) | 2015-12-31 | 2017-11-21 | Fireeye, Inc. | Susceptible environment detection system |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10616266B1 (en) | 2016-03-25 | 2020-04-07 | Fireeye, Inc. | Distributed malware detection system and submission workflow thereof |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US20180024807A1 (en) * | 2016-07-21 | 2018-01-25 | Vision Menu, Inc. | System and Method of Document and Signature Management |
SG11201901778YA (en) | 2016-09-02 | 2019-03-28 | Futurevault Inc | Automated document filing and processing methods and systems |
EP3507723A4 (en) | 2016-09-02 | 2020-04-01 | FutureVault Inc. | SYSTEMS AND METHODS FOR SHARING DOCUMENTS |
EP3507721B1 (en) | 2016-09-02 | 2022-11-23 | FutureVault Inc. | Real-time document filtering systems and methods |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US11182549B2 (en) | 2017-03-06 | 2021-11-23 | AppExtremes, LLC | Systems and methods for modifying and reconciling negotiated documents |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
US11003654B2 (en) | 2017-09-20 | 2021-05-11 | AppExtremes, LLC | Systems and methods for requesting, tracking and reporting modifications to a record |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
WO2020142719A1 (en) | 2019-01-04 | 2020-07-09 | AppExtremes, LLC, d/b/a Conga | Systems and methods for dynamic assignment, monitoring and management of discrete tasks |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
Family Cites Families (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5220675A (en) * | 1990-01-08 | 1993-06-15 | Microsoft Corporation | Method and system for customizing a user interface in an integrated environment |
CA2093094C (en) * | 1992-04-06 | 2000-07-11 | Addison M. Fischer | Method and apparatus for creating, supporting, and using travelling programs |
US5222138A (en) * | 1992-08-06 | 1993-06-22 | Balabon Sam D | Remote signature rendering system & apparatus |
US5465299A (en) * | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
JP2762909B2 (ja) * | 1993-12-27 | 1998-06-11 | 日本電気株式会社 | 電子署名装置 |
US5544255A (en) * | 1994-08-31 | 1996-08-06 | Peripheral Vision Limited | Method and system for the capture, storage, transport and authentication of handwritten signatures |
US5748738A (en) * | 1995-01-17 | 1998-05-05 | Document Authentication Systems, Inc. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US7162635B2 (en) * | 1995-01-17 | 2007-01-09 | Eoriginal, Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US5615268A (en) * | 1995-01-17 | 1997-03-25 | Document Authentication Systems, Inc. | System and method for electronic transmission storage and retrieval of authenticated documents |
US6367013B1 (en) * | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
CN1183841A (zh) * | 1995-02-13 | 1998-06-03 | 英特特拉斯特技术公司 | 用于安全交易管理和电子权利保护的系统和方法 |
US5553145A (en) * | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
US5813009A (en) * | 1995-07-28 | 1998-09-22 | Univirtual Corp. | Computer based records management system method |
US6327656B2 (en) * | 1996-07-03 | 2001-12-04 | Timestamp.Com, Inc. | Apparatus and method for electronic document certification and verification |
US5898156A (en) * | 1996-08-29 | 1999-04-27 | Lucent Technologies Inc. | Validation stamps for electronic signatures |
US6470448B1 (en) * | 1996-10-30 | 2002-10-22 | Fujitsu Limited | Apparatus and method for proving transaction between users in network environment |
US6021202A (en) * | 1996-12-20 | 2000-02-01 | Financial Services Technology Consortium | Method and system for processing electronic documents |
US5872848A (en) * | 1997-02-18 | 1999-02-16 | Arcanvs | Method and apparatus for witnessed authentication of electronic documents |
US6119229A (en) * | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
US6128740A (en) * | 1997-12-08 | 2000-10-03 | Entrust Technologies Limited | Computer security system and method with on demand publishing of certificate revocation lists |
US6199052B1 (en) * | 1998-03-06 | 2001-03-06 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary with archive and verification request services |
CA2242130A1 (en) * | 1998-08-07 | 2000-02-07 | Silanis Technology Inc. | Method for parallel approval of documents in a distributed network |
US6615348B1 (en) * | 1999-04-16 | 2003-09-02 | Intel Corporation | Method and apparatus for an adapted digital signature |
US6210276B1 (en) * | 1998-08-25 | 2001-04-03 | Wayne L. Mullins | Game with multiple incentives and multiple levels of game play and combined lottery game with time of purchase win progressive jackpot |
CA2246049A1 (en) * | 1998-09-25 | 2000-03-25 | Silanis Technology Inc. | Method of creating authenticated verifiable reproductions of electronic documents |
US6321333B1 (en) * | 1998-10-14 | 2001-11-20 | Wave Systems Corporation | Efficient digital certificate processing in a data processing system |
US6584466B1 (en) * | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US6671805B1 (en) * | 1999-06-17 | 2003-12-30 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
CA2272723A1 (en) * | 1999-05-25 | 2000-11-25 | Rdm Corporation | Digital signature server |
EP1055989A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for digitally signing a document |
US6785815B1 (en) * | 1999-06-08 | 2004-08-31 | Intertrust Technologies Corp. | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US6367010B1 (en) * | 1999-07-02 | 2002-04-02 | Postx Corporation | Method for generating secure symmetric encryption and decryption |
US6289460B1 (en) * | 1999-09-13 | 2001-09-11 | Astus Corporation | Document management system |
US6931420B1 (en) * | 1999-09-24 | 2005-08-16 | Silanis Technology Inc. | Method for the separate authentication of a template and user data |
US20030078880A1 (en) * | 1999-10-08 | 2003-04-24 | Nancy Alley | Method and system for electronically signing and processing digital documents |
JP4011243B2 (ja) * | 1999-10-15 | 2007-11-21 | 富士通株式会社 | 電子原本管理装置および方法 |
US7237114B1 (en) * | 2000-04-26 | 2007-06-26 | Pronvest, Inc. | Method and system for signing and authenticating electronic documents |
US6796489B2 (en) * | 2000-06-06 | 2004-09-28 | Ingeo Systems, Inc. | Processing electronic documents with embedded digital signatures |
AU2001275298A1 (en) * | 2000-06-06 | 2001-12-17 | Ingeo Systems, Inc. | Creating and verifying electronic documents |
US20020019937A1 (en) * | 2000-06-06 | 2002-02-14 | Edstrom Trevor W. | Secure document transport process |
JP4134494B2 (ja) * | 2000-06-15 | 2008-08-20 | 株式会社日立製作所 | 契約方法及び契約処理システム |
AU2001273624A1 (en) * | 2000-06-21 | 2002-01-02 | Docutouch Corporation | Digital signature system and method |
US6938157B2 (en) * | 2000-08-18 | 2005-08-30 | Jonathan C. Kaplan | Distributed information system and protocol for affixing electronic signatures and authenticating documents |
US6944648B2 (en) * | 2000-09-22 | 2005-09-13 | Docusign, Inc. | System and method for managing transferable records |
JP2002139997A (ja) * | 2000-11-02 | 2002-05-17 | Dainippon Printing Co Ltd | 電子捺印システム |
US7100045B2 (en) * | 2000-11-22 | 2006-08-29 | Kabushiki Kaisha Toshiba | System, method, and program for ensuring originality |
WO2002054652A2 (en) * | 2001-01-05 | 2002-07-11 | Yozons, Inc. | System and method for processing digital documents utilizing secure communications over a network |
SG111920A1 (en) * | 2001-09-03 | 2005-06-29 | Trusted Hub Pte Ltd | Authentication of electronic documents |
US7395436B1 (en) * | 2002-01-31 | 2008-07-01 | Kerry Nemovicher | Methods, software programs, and systems for electronic information security |
JP2003271529A (ja) * | 2002-03-18 | 2003-09-26 | Honda Motor Co Ltd | 提案文書回覧システム、提案文書回覧方法、その管理サーバ、提案者端末、閲覧者端末および記録媒体 |
US7562053B2 (en) * | 2002-04-02 | 2009-07-14 | Soluble Technologies, Llc | System and method for facilitating transactions between two or more parties |
CA2849152C (en) * | 2002-06-17 | 2015-08-25 | Robert Al-Jaar | System and method for creating, vaulting, transferring, and controlling transferable electronic records with unique ownership |
CA2509039A1 (en) * | 2002-11-04 | 2004-05-21 | Timothy K. Ford | Method and system for comprehensive real estate transaction management |
US7581105B2 (en) * | 2003-12-16 | 2009-08-25 | Sap Aktiengesellschaft | Electronic signing apparatus and methods |
US7523315B2 (en) * | 2003-12-22 | 2009-04-21 | Ingeo Systems, Llc | Method and process for creating an electronically signed document |
US8572388B2 (en) * | 2004-03-10 | 2013-10-29 | Elynx, Ltd. | Electronic document management system |
US7568101B1 (en) * | 2004-05-13 | 2009-07-28 | Microsoft Corporation | Digital signatures with an embedded view |
US7568104B2 (en) * | 2005-01-19 | 2009-07-28 | International Business Machines Corporation | Method and apparatus for adding signature information to electronic documents |
US8221210B2 (en) * | 2005-03-08 | 2012-07-17 | Scientific Games International, Inc. | Lottery game having secondary game with multiplier and second payout |
US20060259440A1 (en) * | 2005-05-13 | 2006-11-16 | Keycorp | Method and system for electronically signing a document |
US7654529B2 (en) * | 2005-05-17 | 2010-02-02 | Scientific Games International, Inc. | Combination scratch ticket and on-line game ticket |
US7554576B2 (en) * | 2005-06-20 | 2009-06-30 | Ricoh Company, Ltd. | Information capture and recording system for controlling capture devices |
US7442122B2 (en) * | 2005-07-26 | 2008-10-28 | Advanced Gaming Concepts, Llc | Variable lottery game allowing participation in several different lottery games within a single drawing |
US7890659B2 (en) * | 2005-12-15 | 2011-02-15 | Microsoft Corporation | Conforming web services to an updated contract |
JP4821307B2 (ja) * | 2005-12-21 | 2011-11-24 | 沖電気工業株式会社 | 契約受付端末及び契約システム |
JP4137951B2 (ja) * | 2006-03-28 | 2008-08-20 | シャープ株式会社 | 画像処理装置、システム、情報処理装置、及びプログラム |
JP2008077340A (ja) * | 2006-09-20 | 2008-04-03 | Oki Electric Ind Co Ltd | 契約受付端末及び契約システム |
JP2008083823A (ja) * | 2006-09-26 | 2008-04-10 | Oki Electric Ind Co Ltd | 契約受付端末及び契約システム |
US20080097777A1 (en) * | 2006-10-23 | 2008-04-24 | Ctm Software Corporation | Electronic document execution |
US9514117B2 (en) * | 2007-02-28 | 2016-12-06 | Docusign, Inc. | System and method for document tagging templates |
JP2008217462A (ja) * | 2007-03-05 | 2008-09-18 | Oki Electric Ind Co Ltd | 契約システム |
JP2008225527A (ja) * | 2007-03-08 | 2008-09-25 | Tadayuki Hattori | 「家、家庭」を参加単位とするコミュニケーションおよびワークフローを実現するための、システム管理者に権限が集中しない、汎用的で安全なホーム・コンピューティング・プラットフォーム |
JP2008234500A (ja) * | 2007-03-23 | 2008-10-02 | Oki Electric Ind Co Ltd | 契約受付端末及び契約システム |
WO2009012388A1 (en) * | 2007-07-17 | 2009-01-22 | Peirson William Howard Jr | Systems and processes for obtaining and managing electronic signatures for real estate transaction documents |
US8655961B2 (en) * | 2007-07-18 | 2014-02-18 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8949706B2 (en) * | 2007-07-18 | 2015-02-03 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
CN101299256A (zh) * | 2008-06-18 | 2008-11-05 | 深圳市永达电子有限公司 | 一种基于网格计算与数据融合的电子合同识别方法和系统 |
-
2010
- 2010-03-15 CA CA2755286A patent/CA2755286C/en active Active
- 2010-03-15 WO PCT/US2010/027326 patent/WO2010105262A1/en active Application Filing
- 2010-03-15 AU AU2010223873A patent/AU2010223873B2/en active Active
- 2010-03-15 SG SG2011065562A patent/SG174343A1/en unknown
- 2010-03-15 JP JP2011554270A patent/JP5889638B2/ja active Active
- 2010-03-15 SG SG10201400603VA patent/SG10201400603VA/en unknown
- 2010-03-15 EP EP10751541A patent/EP2406715A4/en not_active Withdrawn
- 2010-03-15 US US12/724,147 patent/US8239496B2/en active Active
- 2010-03-15 CN CN201080020761.3A patent/CN102422269B/zh not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2012520530A5 (ja) | ||
JP5889638B2 (ja) | ドキュメント管理変換および機密保全のためのシステムおよび方法 | |
US20180332077A1 (en) | Anti-phishing protection | |
JP7118708B2 (ja) | 通信検証のためのシステムおよび方法 | |
CA2731116C (en) | Systems and methods for distributed electronic signature documents | |
US9473534B2 (en) | System and method for switching between messaging security policies | |
WO2012016091A3 (en) | Protecting documents using policies and encryption | |
AU2010264441A1 (en) | Systems and methods for distributed electronic signature documents | |
Rushe | Google: don't expect privacy when sending to Gmail | |
JP2017527900A5 (ja) | ||
US11936687B2 (en) | Systems and methods for end-user security awareness training for calendar-based threats | |
US20220377101A1 (en) | System and methods to incentivize engagement in security awareness training | |
US10560442B2 (en) | Participation thresholding for extending communication security functionality | |
TW201416900A (zh) | 資料保護方法及電子裝置 | |
US11526588B2 (en) | Systems and methods for digital content anti-counterfeiting | |
Liu et al. | Sequential digital multi-signature scheme without using Hash and Redundancy functions | |
Lyons | Facebook busted in clumsy smear on Google | |
Gituma | Prototype for the authentication of university certificates: case of Strathmore University | |
WO2015017950A1 (zh) | 对互联网信息发布进行身份鉴别的一种方法 | |
Dwivedi | Social Media and its Implications for Intellectual Property Law the Facebook and Twitter Saga | |
TOPÇUOĞLU et al. | The incidence and severity of postoperative pain after root canal treatment performed in one visit or multiple visits | |
Baumgarten-Sharon | B'Tselem, The Right to Demonstrate in the Occupied Territories, Position Paper, July 2010, English | |
TW201126992A (en) | Digital file time-proven system | |
Lee | In praise of pragmatism | |
Carlsson et al. | Effektivitet versus Informationssäkerhet |