JP2015527629A - コンピュータ装置上のソフトウェアアプリケーションのコンポーネント分析 - Google Patents
コンピュータ装置上のソフトウェアアプリケーションのコンポーネント分析 Download PDFInfo
- Publication number
- JP2015527629A JP2015527629A JP2015516077A JP2015516077A JP2015527629A JP 2015527629 A JP2015527629 A JP 2015527629A JP 2015516077 A JP2015516077 A JP 2015516077A JP 2015516077 A JP2015516077 A JP 2015516077A JP 2015527629 A JP2015527629 A JP 2015527629A
- Authority
- JP
- Japan
- Prior art keywords
- component
- application
- user
- behavior
- mobile device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
Abstract
Description
本出願は、2012年6月5日に出願された、Halliday他による「アプリケーションコンポーネントの挙動を制御する意図の表現」という名称の米国仮特許出願第61/655,822号に対する優先権を主張する、2012年12月3日に出願された、Wyatt他による「コンピュータ装置上のソフトウェアアプリケーションのコンポーネント分析」という名称の米国特許出願第13/692,806号に対する優先権を主張するものであり、これらの特許出願の内容全体は本明細書に完全に記載されているかのように引用により本明細書に組み入れられる。
・LeadBolt
・AdFonic
・AdKnowledge
・AdMob
・BuzzCity
・Casee
・Everbadge
・JumpTap
以下、コンポーネント分析及び属性(例えば、アプリケーションのコンポーネントを識別して特定すること)に関連する様々な追加の実施形態を示す。以下の実施形態は、上述した説明におけるあらゆる実施形態の一般性を限定するものではない。
本説明では、説明を単純にするために、様々な機能及び動作をソフトウェアコードによって行われ、又は生じるものとして説明している場合がある。しかしながら、当業者であれば、このような表現が意味するところは、マイクロプロセッサなどのプロセッサがコードを実行することによりこれらの機能が行われることであると認識するであろう。これとは別に、又はこれと組み合わせて、特定用途向け集積回路(ASIC)又はフィールドプログラマブルゲートアレイ(FPGA)を使用するようなソフトウェア命令の有無に関わらず、専用回路を用いて機能及び動作を実装することもできる。ソフトウェア命令を伴わずに、又はソフトウェア命令と組み合わせて配線回路を用いて実施形態を実装することもできる。従って、これらの技術は、ハードウェア回路とソフトウェアのいずれの特定の組み合わせにも、データ処理システムにより実行される命令のいずれの特定のソースにも限定されるものではない。
104 コンポーネント
106 コンポーネント
108 ユーザポリシー
110 アイデンティティサーバ
112 データベース
114 コンポーネントアイデンティティ
116 ユーザポリシー
121 通信ネットワーク
123 アプリケーション市場
125 メッセージングサーバ
127 ソフトウェアサーバ
141 ユーザ端末A
143 ユーザ端末B
145 ユーザ端末C
147 モバイル装置
149 モバイル装置
Claims (59)
- コンピュータ可読命令を記憶する非一時的コンピュータ可読記憶媒体であって、前記コンピュータ可読命令は、実行時にコンピュータシステムに、
ユーザのコンピュータ装置にインストールされたアプリケーションに関し、該アプリケーションのコンポーネントを特定すること、
第1のコンポーネントに関連する第1の挙動を含む、前記コンポーネントの各々に関連する少なくとも1つの挙動を、少なくとも1つのプロセッサを介して識別すること、
を行わせる、
ことを特徴とする非一時的コンピュータ可読記憶媒体。 - 前記命令はさらに、前記コンピュータシステムに、前記コンピュータ装置のユーザディスプレイ上に前記コンポーネントの識別を提示させる、
ことを特徴とする請求項1に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータシステムに、前記ユーザの少なくとも1つの挙動的選好を決定させる、
ことを特徴とする請求項1に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータシステムに、前記少なくとも1つの挙動的選好に少なくとも部分的に基づくユーザポリシーを記憶し、前記コンピュータ装置にインストールされた新たなアプリケーションに対して前記ユーザポリシーを実行させる、
ことを特徴とする請求項3に記載の記憶媒体。 - 前記命令はさらに、前記第1のコンポーネントに、サーバのクエリからの結果に従って実行させる、
ことを特徴とする請求項1に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータシステムに、前記アプリケーションをインストールしたことに応答して、アイデンティティサーバに記憶されている前記ユーザのユーザポリシーへの準拠性を確認するために前記アプリケーションをスキャンさせる、
ことを特徴とする請求項1に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータシステムに、前記コンポーネントに関連する識別された挙動に基づいて前記コンポーネントの各々のためのユーザポリシーを実行させる、
ことを特徴とする請求項1に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータシステムに、前記コンポーネントのための前記ユーザポリシー内の許容される挙動を前記識別された挙動と比較させる、
ことを特徴とする請求項7に記載の記憶媒体。 - 前記許容される挙動を比較することは、1又はそれ以上の他のコンピュータ装置上のコンポーネントで観察されるデータリポジトリからの挙動を特定することを含む、
ことを特徴とする請求項8に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータ装置に、前記データリポジトリからの前記挙動を特定したことに応答して、前記コンピュータ装置上の前記コンポーネントのうちの1つ又はそれ以上の実行を設定又は無効化させる、
ことを特徴とする請求項9に記載の記憶媒体。 - 第1の既知のコンポーネントのデータを含む既知のコンポーネントのコンポーネントデータを記憶するデータリポジトリと、
少なくとも1つのプロセッサと、
命令を記憶するメモリと、
を備えたシステムであって、前記命令は、コンピュータ装置上で実行された時に、該コンピュータ装置に、
ユーザのコンピュータ装置の第1のアプリケーション内の新たなコンポーネントに関し、前記新たなコンポーネントと前記コンポーネントデータの比較を行うこと、及び、
前記比較に基づいて、前記新たなコンポーネントが前記第1の既知のコンポーネントに対応する旨の決定を行うこと、
を行わせる、
ことを特徴とするシステム。 - 前記命令はさらに、前記コンピュータ装置に、前記決定に応答して、
前記第1の既知のコンポーネントの第1の既知の挙動を前記ユーザのポリシーと比較すること、及び、
前記新たなコンポーネントの観察される挙動を前記ユーザポリシーと比較すること、
の少なくとも一方を行わせる、
ことを特徴とする請求項11に記載のシステム。 - 前記コンポーネントデータはコンポーネントアイデンティティを含み、各コンポーネントアイデンティティは、既知のコンポーネントのそれぞれの識別情報に対応する、
ことを特徴とする請求項11に記載のシステム。 - 前記決定は、前記コンピュータ装置に前記新たなコンポーネントをインストールする前に行われる、
ことを特徴とする請求項11に記載のシステム。 - 前記命令はさらに、前記コンピュータ装置に、前記比較に類似性値を関連付けさせ、前記決定は、前記類似性値が閾値よりも大きいことに応答して行われる、
ことを特徴とする請求項11に記載のシステム。 - 前記比較は、前記新たなコンポーネントの構造に少なくとも部分的に基づき、前記構造は、パッケージング構造、モジュール構造及び実行可能コード構造から成る群から選択される、
ことを特徴とする請求項11に記載のシステム。 - 前記比較は、前記新たなコンポーネントの実行可能コード構造に少なくとも部分的に基づく、
ことを特徴とする請求項11に記載のシステム。 - 前記コンポーネントデータは、既知の構造的特徴及び既知の挙動的特徴を含む、
ことを特徴とする請求項16に記載のシステム。 - 前記比較を行うことは、前記既知の構造的特徴及び前記既知の挙動的特徴を前記新たなコンポーネントの識別された特徴と比較することを含む、
ことを特徴とする請求項18に記載のシステム。 - 前記命令はさらに、前記コンピュータ装置に、前記識別された特徴が前記既知の構造的特徴及び前記既知の挙動的特徴の少なくとも一方と異なると判定された時に通知を生成させる、
ことを特徴とする請求項19に記載のシステム。 - 前記通知を生成することは、前記コンピュータ装置に警告を送ることを含む、
ことを特徴とする請求項20に記載のシステム。 - 第1の既知のコンポーネントのデータを含む既知のコンポーネントのコンポーネントデータをメモリに記憶するステップと、
ユーザのコンピュータ装置の第1のアプリケーション内の新たなコンポーネントに関し、少なくとも1つのプロセッサを介して前記新たなコンポーネントと前記コンポーネントデータの比較を行うステップと、
前記比較に基づいて、前記新たなコンポーネントが前記第1の既知のコンポーネントに対応する旨の決定を行うステップと、
を含むことを特徴とする方法。 - 前記新たなコンポーネントは、前記第1のアプリケーションからのコード、及び前記第1のアプリケーション内のライブラリから成る群から選択される、
ことを特徴とする請求項22に記載の方法。 - 前記新たなコンポーネントが複数の異なるアプリケーションの各々に含まれ、前記新たなコンポーネントは、コンピュータ装置上で実行された時の一連の挙動に対応し、前記コンポーネントデータは、前記一連の挙動を含む挙動データを含む、
ことを特徴とする請求項22に記載の方法。 - 前記一連の挙動を前記新たなコンポーネントに関連付けるステップをさらに含む、
ことを特徴とする請求項24に記載の方法。 - 前記異なるアプリケーションのそれぞれを実行した時に複数のコンピュータ装置の各々を観察し、該複数のコンピュータ装置の各々が前記一連の挙動を示す、
ことを特徴とする請求項25に記載の方法。 - 前記決定は、前記コンピュータ装置上の前記新たなコンポーネントの動作の背景に部分的に基づく、
ことを特徴とする請求項24に記載の方法。 - 前記背景は、前記第1のアプリケーションの実行中に該第1のアプリケーションがユーザに対して可視的に存在しながら位置情報がアクセスを受けていることであり、前記一連の挙動は、前記コンピュータ装置の位置を特定することを含む、
ことを特徴とする請求項27に記載の方法。 - 前記コンポーネントデータは、各々が少なくとも1つの受け入れ可能な挙動に関連する複数の背景を含む、
ことを特徴とする請求項28に記載の方法。 - 前記コンポーネントデータは、既知のコンポーネントのリスクスコアを含み、前記方法は、前記ユーザのコンピュータ装置にインストールされている又はインストールされる予定のアプリケーションに関するクエリに応答してリスクスコアを提供するステップをさらに含む、
ことを特徴とする請求項22に記載の方法。 - コンピュータ可読命令を含む第1のアプリケーションをメモリに記憶するステップを含む方法であって、前記コンピュータ可読命令は、実行時に、ユーザのモバイル装置に、
前記モバイル装置にインストールされた第2のアプリケーションの新たなコンポーネントに関し、該新たなコンポーネントと、第1の既知のコンポーネントのデータを含む既知のコンポーネントのコンポーネントデータとの比較を行うこと、及び、
前記比較に基づいて、前記新たなコンポーネントが前記第1の既知のコンポーネントに対応する旨の決定を行うこと、
を行わせ、前記方法は、
前記第1のアプリケーションを、後でデータ処理システムから前記モバイル装置にインストールできるように前記データ処理システムに記憶するために、少なくとも1つのプロセッサを通じて通信ネットワークを介して送信するステップをさらに含む、
ことを特徴とする方法。 - 少なくとも1つのプロセッサと、
第1のアプリケーションを記憶するメモリと、
を備えたシステムであって、前記第1のアプリケーションは、ユーザのモバイル装置上で実行された時に、該モバイル装置に、
前記モバイル装置にインストールされた第2のアプリケーションの新たなコンポーネントに関し、該新たなコンポーネントと、第1の既知のコンポーネントのデータを含む既知のコンポーネントのコンポーネントデータとの比較を行うこと、及び、
前記比較に基づいて、前記新たなコンポーネントが前記第1の既知のコンポーネントに対応する旨の決定を行うこと、
を行わせ、
前記メモリは、後で前記第1のアプリケーションをデータ処理システムから通信ネットワークを介して前記モバイル装置にインストールできるように、前記第1のアプリケーションを前記データ処理システムに送信するよう前記少なくとも1つのプロセッサに命令するように構成された命令をさらに記憶する、
ことを特徴とするシステム。 - コンピュータ可読命令を記憶する非一時的コンピュータ可読記憶媒体であって、前記コンピュータ可読命令は、実行時にコンピュータ装置に、
ユーザのコンピュータ装置にインストールされたアプリケーションに関し、該アプリケーションのコンポーネントを特定すること、
第1のコンポーネントに関連する第1の挙動を含む、前記コンポーネントの各々に関連する少なくとも1つの挙動を、少なくとも1つのプロセッサを介して識別すること、
前記識別することから得られる、前記第1の挙動を含む挙動のリストを含む結果を前記ユーザに提示すること、及び、
前記ユーザからの少なくとも1つの挙動的選好の選択を受け取ること、
を行わせる、
ことを特徴とする非一時的コンピュータ可読記憶媒体。 - 前記少なくとも1つの挙動的選好は、
前記第1の挙動をオプトアウトすること、
前記第1のコンポーネントを含む前記コンポーネントのうちの1つ又はそれ以上をオプトアウトすること、
明確に識別された挙動についての一連のユーザ選好、及び、
ポリシー、
から成る群から選択される、
ことを特徴とする請求項33に記載の記憶媒体。 - 前記少なくとも1つの挙動的選好はポリシーであり、前記命令はさらに、前記コンピュータ装置にインストールされた新たなアプリケーションに対して前記ポリシーを実行させる、
ことを特徴とする請求項33に記載の記憶媒体。 - 前記ユーザからの少なくとも1つの挙動的選好の選択は、前記第1の挙動をオプトアウトすることであり、前記命令はさらに、前記オプトアウトを行った後に、前記第1のコンポーネントを実行させて前記第1の挙動がアクティブであるかどうかを判定する、
ことを特徴とする請求項33に記載の記憶媒体。 - 前記ユーザからの少なくとも1つの挙動的選好の選択は、前記第1の挙動をオプトアウトすることであり、前記命令はさらに、前記オプトアウトを行った後に、前記第1のコンポーネントのアプリケーションプログラミングインターフェイスを用いて前記オプトアウトの状況を確認させる、
ことを特徴とする請求項33に記載の記憶媒体。 - 前記命令はさらに、前記コンピュータ装置に、前記ユーザからの選択に応答して、前記コンピュータ装置上でもはや前記第1の挙動が行われないように前記第1のコンポーネントの実行を再設定させる、
ことを特徴とする請求項33に記載の記憶媒体。 - コンピュータ可読命令を記憶する非一時的コンピュータ可読記憶媒体であって、前記コンピュータ可読命令は、実行時にコンピュータ装置に、
ユーザのコンピュータ装置にインストールされたアプリケーションに関し、該アプリケーションのコンポーネントを特定すること、
第1のコンポーネントに関連する第1の挙動を含む、前記コンポーネントの各々に関連する少なくとも1つの挙動を、少なくとも1つのプロセッサを介して識別すること、及び、
前記ユーザの少なくとも1つの挙動的選好を決定すること、
を行わせる、
ことを特徴とする非一時的コンピュータ可読記憶媒体。 - 前記命令はさらに、前記アプリケーションが前記少なくとも1つの挙動的選好をローカルに決定できるように、前記少なくとも1つの挙動的選好を前記コンピュータ装置上に記憶させる、
ことを特徴とする請求項39に記載の記憶媒体。 - 前記命令はさらに、前記第1のコンポーネントに、異なるコンピュータ装置の前記ユーザのユーザ識別子を含むクエリからの結果に従って実行させる、
ことを特徴とする請求項39に記載の記憶媒体。 - 前記命令はさらに、
前記アプリケーションをダウンロード又はインストールしたことに応答して、前記ユーザの少なくとも1つの挙動的選好への準拠性を確認するために前記アプリケーションをスキャンさせ、
前記アプリケーションが前記少なくとも1つの挙動的選好に違反している場合、前記ユーザに前記違反を知らせ、又は前記アプリケーションのインストールを阻止させる、
ことを特徴とする請求項39に記載の記憶媒体。 - コンピュータ可読命令を含む第1のアプリケーションをメモリに記憶するステップを含む方法であって、前記コンピュータ可読命令は、実行時に、ユーザのモバイル装置に、
前記モバイル装置にインストールされた第2のアプリケーションのコンポーネントを特定すること、及び、
第1のコンポーネントに関連する第1の挙動を含む、前記コンポーネントの各々に関連する少なくとも1つの挙動を識別すること、
を行わせ、前記方法は、
前記第1のアプリケーションを、後でデータ処理システムから前記モバイル装置にインストールできるように前記データ処理システムに記憶するために、少なくとも1つのプロセッサを通じて通信ネットワークを介して送信するステップをさらに含む、
ことを特徴とする方法。 - 前記モバイル装置に前記第1のアプリケーションがインストールされた後に、前記少なくとも1つのプロセッサを介して前記第1のアプリケーションと通信するステップをさらに含む、
ことを特徴とする請求項43に記載の方法。 - 前記データ処理システムは、アプリケーション市場を含む、
ことを特徴とする請求項43に記載の方法。 - 前記データ処理システムはネットワークオペレータにより制御され、前記モバイル装置は、前記ネットワークオペレータにより運営されるセルラーネットワークと共に動作するように構成される、
ことを特徴とする請求項43に記載の方法。 - 前記第1のコンポーネントは、前記モバイル装置に前記第2のアプリケーションがインストールされる前に該第2のアプリケーションをパッケージされたリンクライブラリである、
ことを特徴とする請求項43に記載の方法。 - 少なくとも1つのプロセッサと、
第1のアプリケーションを記憶するメモリと、
を備えたシステムであって、前記第1のアプリケーションは、ユーザのモバイル装置上で実行された時に、該モバイル装置に、
前記モバイル装置にインストールされた第2のアプリケーションのコンポーネントを特定すること、
第1のコンポーネントに関連する第1の挙動を含む、前記コンポーネントの各々に関連する少なくとも1つの挙動を識別すること、及び、
前記ユーザの少なくとも1つの挙動的選好を決定すること、
を行わせ、
前記メモリは、後で前記第1のアプリケーションをデータ処理システムから通信ネットワークを介して前記モバイル装置にインストールできるように、前記第1のアプリケーションを前記データ処理システムに送信するよう前記少なくとも1つのプロセッサに命令するように構成された命令をさらに記憶する、
ことを特徴とするシステム。 - 前記命令は、前記少なくとも1つのプロセッサに、前記モバイル装置に前記第1のアプリケーションがインストールされた後に該第1のアプリケーションと通信するように命令するようさらに構成される、
ことを特徴とする請求項48に記載のシステム。 - 前記第1のアプリケーションはさらに、前記モバイル装置に、前記ユーザにオプトアウトオプションを表示させ、前記オプトアウトオプションは、前記モバイル装置に既にインストールされているアプリケーションのみを対象とする、
ことを特徴とする請求項48に記載のシステム。 - 前記第1のアプリケーションはさらに、前記モバイル装置に、前記ユーザにオプトアウトオプションを表示させ、前記オプトアウトオプションは、データベースから決定された、前記モバイル装置上における前記ユーザにとって可能な全てのオプトアウトフローを含む、
ことを特徴とする請求項48に記載のシステム。 - 前記第1のコンポーネントは、前記第2のアプリケーションの実行可能コードの一部であり、該実行可能コードは、前記第2のアプリケーションとアドネットワーク又は分析ネットワークとのやりとりを可能にする、
ことを特徴とする請求項48に記載のシステム。 - ユーザのモバイル装置上で実行される、該モバイル装置上の少なくとも1つの挙動を識別するアプリケーションと少なくとも1つのプロセッサを介して通信するステップを含む方法であって、前記少なくとも1つの挙動は、前記モバイル装置にインストールされている他の複数のアプリケーションの複数のコンポーネントの各々に関連するとともに、第1のコンポーネントに関連する第1の挙動を含み、前記方法は、
前記ユーザからの入力に基づいて前記アプリケーションにより特定された前記ユーザの少なくとも1つの挙動的選好を前記モバイル装置から受け取るステップと、
前記少なくとも1つの挙動的選好をメモリに記憶するステップと、
をさらに含むことを特徴とする方法。 - 前記少なくとも1つの挙動を記憶するステップをさらに含む、
ことを特徴とする請求項53に記載の方法。 - 前記第1のコンポーネントに関連する広告ネットワークから、前記ユーザの少なくとも1つの挙動的選好を要求するクエリを受け取るステップをさらに含む、
ことを特徴とする請求項53に記載の方法。 - 前記第1のコンポーネントの識別を前記モバイル装置から受け取るステップと、
前記第1のコンポーネントを、前記少なくとも1つのプロセッサを介してエミュレート環境で実行して、前記第1の挙動がアクティブであるかどうかを判定するステップと、
をさらに含むことを特徴とする請求項53に記載の方法。 - 前記少なくとも1つの挙動的選好に対する新たなアプリケーションの準拠性を確認するために、前記少なくとも1つの挙動的選好に関するクエリを受け取るステップをさらに含む、
ことを特徴とする請求項53に記載の方法。 - 前記少なくとも1つの挙動的選好を評価して、前記第1のコンポーネントが前記モバイル装置上でどのように挙動すべきかを決定するために、通信ネットワークを介して受け取った要求に応答して情報を提供するステップをさらに含む、
ことを特徴とする請求項53に記載の方法。 - 前記アプリケーションは、前記ユーザからの前記入力に応答して、前記モバイル装置上の前記第1のコンポーネントの実行を無効化するようさらに構成される、
ことを特徴とする請求項53に記載の方法。
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261655822P | 2012-06-05 | 2012-06-05 | |
US61/655,822 | 2012-06-05 | ||
US13/692,806 | 2012-12-03 | ||
US13/692,806 US9407443B2 (en) | 2012-06-05 | 2012-12-03 | Component analysis of software applications on computing devices |
US13/786,210 US9215074B2 (en) | 2012-06-05 | 2013-03-05 | Expressing intent to control behavior of application components |
US13/786,210 | 2013-03-05 | ||
PCT/US2013/043569 WO2013184501A1 (en) | 2012-06-05 | 2013-05-31 | Component analysis of software applications on computing devices |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2015527629A true JP2015527629A (ja) | 2015-09-17 |
JP2015527629A5 JP2015527629A5 (ja) | 2016-04-28 |
JP6135026B2 JP6135026B2 (ja) | 2017-05-31 |
Family
ID=49671928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015516077A Active JP6135026B2 (ja) | 2012-06-05 | 2013-05-31 | コンピュータ装置上のソフトウェアアプリケーションのコンポーネント分析 |
Country Status (4)
Country | Link |
---|---|
US (7) | US9407443B2 (ja) |
EP (1) | EP2856320A4 (ja) |
JP (1) | JP6135026B2 (ja) |
WO (1) | WO2013184501A1 (ja) |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9361631B2 (en) | 2010-01-06 | 2016-06-07 | Ghostery, Inc. | Managing and monitoring digital advertising |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
US9239771B2 (en) * | 2012-07-24 | 2016-01-19 | Appboy, Inc. | Method and system for collecting and providing application usage analytics |
US10291492B2 (en) | 2012-08-15 | 2019-05-14 | Evidon, Inc. | Systems and methods for discovering sources of online content |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
CN103226583B (zh) * | 2013-04-08 | 2017-07-28 | 北京奇虎科技有限公司 | 一种广告插件识别的方法和装置 |
US9075989B2 (en) * | 2013-07-11 | 2015-07-07 | Symantec Corporation | Identifying misuse of legitimate objects |
US9454364B2 (en) | 2013-07-17 | 2016-09-27 | Accenture Global Services Limited | Mobile application optimization platform |
US9923953B2 (en) * | 2013-07-31 | 2018-03-20 | Adenda Media Inc. | Extending mobile applications to the lock screen of a mobile device |
AU2014308743A1 (en) * | 2013-08-21 | 2016-03-10 | Evidon, Inc. | A system and method for controlling targeted advertising |
US9027140B1 (en) * | 2013-08-22 | 2015-05-05 | Appthority, Inc. | Application malware filtering for advertising networks |
US9195833B2 (en) * | 2013-11-19 | 2015-11-24 | Veracode, Inc. | System and method for implementing application policies among development environments |
US9111093B1 (en) * | 2014-01-19 | 2015-08-18 | Google Inc. | Using signals from developer clusters |
US9734332B2 (en) * | 2014-03-17 | 2017-08-15 | Proofpoint, Inc. | Behavior profiling for malware detection |
US10204225B2 (en) * | 2014-05-15 | 2019-02-12 | Northwestern University | System and method for determining description-to-permission fidelity in mobile applications |
US11023923B2 (en) * | 2014-05-22 | 2021-06-01 | Facebook, Inc. | Detecting fraud in connection with adverstisements |
EP2975873A1 (en) * | 2014-07-17 | 2016-01-20 | Telefonica Digital España, S.L.U. | A computer implemented method for classifying mobile applications and computer programs thereof |
GB2528490A (en) | 2014-07-24 | 2016-01-27 | Ibm | Identifying unmatched registry entries |
GB2528679A (en) * | 2014-07-28 | 2016-02-03 | Ibm | Software discovery in an environment with heterogeneous machine groups |
US10021125B2 (en) * | 2015-02-06 | 2018-07-10 | Honeywell International Inc. | Infrastructure monitoring tool for collecting industrial process control and automation system risk data |
WO2016168125A1 (en) | 2015-04-11 | 2016-10-20 | Ghostery, Inc. | Methods, apparatus, and systems for providing notice of digital tracking technologies in mobile apps on mobile devices, and for recording user consent in connection with same |
EP3289510B1 (en) | 2015-05-01 | 2020-06-17 | Lookout Inc. | Determining source of side-loaded software |
US10176438B2 (en) | 2015-06-19 | 2019-01-08 | Arizona Board Of Regents On Behalf Of Arizona State University | Systems and methods for data driven malware task identification |
US9778914B2 (en) * | 2015-06-25 | 2017-10-03 | Ca, Inc. | Automatic discovery of comparable features based on N-gram analysis |
US10146512B1 (en) | 2015-08-28 | 2018-12-04 | Twitter, Inc. | Feature switching kits |
CN106485507B (zh) | 2015-09-01 | 2019-10-18 | 阿里巴巴集团控股有限公司 | 一种软件推广作弊的检测方法、装置及系统 |
US9841969B2 (en) * | 2015-09-02 | 2017-12-12 | Google Inc. | Software development and distribution platform |
US11424931B2 (en) * | 2016-01-27 | 2022-08-23 | Blackberry Limited | Trusted execution environment |
US11087024B2 (en) | 2016-01-29 | 2021-08-10 | Samsung Electronics Co., Ltd. | System and method to enable privacy-preserving real time services against inference attacks |
WO2017158542A1 (en) * | 2016-03-15 | 2017-09-21 | Ritchie Stuart | Privacy impact assessment system and associated methods |
WO2017205802A1 (en) * | 2016-05-27 | 2017-11-30 | App Annie Inc. | Advertisement data metric determination within mobile applications |
US10248788B2 (en) | 2016-06-28 | 2019-04-02 | International Business Machines Corporation | Detecting harmful applications prior to installation on a user device |
US10769267B1 (en) * | 2016-09-14 | 2020-09-08 | Ca, Inc. | Systems and methods for controlling access to credentials |
US10073692B2 (en) * | 2016-12-12 | 2018-09-11 | Google Llc | System and method of managing application updates |
US10581879B1 (en) * | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10614482B2 (en) * | 2017-05-04 | 2020-04-07 | App Annie Inc. | Attribution of a new application installation on a mobile device by analyzing network traffic of the device |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US11636416B2 (en) | 2017-11-13 | 2023-04-25 | Tracker Networks Inc. | Methods and systems for risk data generation and management |
CN107766061A (zh) * | 2017-11-20 | 2018-03-06 | 烽火通信科技股份有限公司 | 一种安卓应用程序的安装方法和安装系统 |
US20190236269A1 (en) * | 2018-01-31 | 2019-08-01 | International Business Machines Corporation | Detecting third party software elements |
US10915638B2 (en) * | 2018-05-16 | 2021-02-09 | Target Brands Inc. | Electronic security evaluator |
CN109032948A (zh) * | 2018-07-28 | 2018-12-18 | 安徽捷兴信息安全技术有限公司 | 一种通过usb接口对手机应用安全检测的方法及检测系统 |
US11374977B2 (en) * | 2018-09-20 | 2022-06-28 | Forcepoint Llc | Endpoint risk-based network protection |
US11165827B2 (en) * | 2018-10-30 | 2021-11-02 | International Business Machines Corporation | Suspending communication to/from non-compliant servers through a firewall |
RU2739873C2 (ru) * | 2019-02-07 | 2020-12-29 | Акционерное общество "Лаборатория Касперского" | Способ поиска пользователей, соответствующих требованиям |
US10601806B1 (en) * | 2019-02-22 | 2020-03-24 | Capital One Services, Llc | Runtime identity confirmation for restricted server communication control |
US11301569B2 (en) * | 2019-03-07 | 2022-04-12 | Lookout, Inc. | Quarantine of software based on analysis of updated device data |
US11818129B2 (en) | 2019-03-07 | 2023-11-14 | Lookout, Inc. | Communicating with client device to determine security risk in allowing access to data of a service provider |
US10785230B1 (en) * | 2019-03-07 | 2020-09-22 | Lookout, Inc. | Monitoring security of a client device to provide continuous conditional server access |
US10491603B1 (en) | 2019-03-07 | 2019-11-26 | Lookout, Inc. | Software component substitution based on rule compliance for computing device context |
CN110333997B (zh) * | 2019-07-15 | 2023-11-10 | 秒针信息技术有限公司 | 融合设备使用信息的方法及装置 |
US11275842B2 (en) | 2019-09-20 | 2022-03-15 | The Toronto-Dominion Bank | Systems and methods for evaluating security of third-party applications |
US11436336B2 (en) | 2019-09-23 | 2022-09-06 | The Toronto-Dominion Bank | Systems and methods for evaluating data access signature of third-party applications |
US11651075B2 (en) * | 2019-11-22 | 2023-05-16 | Pure Storage, Inc. | Extensible attack monitoring by a storage system |
US11579847B2 (en) * | 2020-06-10 | 2023-02-14 | Snap Inc. | Software development kit engagement monitor |
US20220116782A1 (en) * | 2020-10-08 | 2022-04-14 | Qatar Foundation For Education, Science And Community Development | Compromised mobile device detection system and method |
US20220237629A1 (en) * | 2021-01-28 | 2022-07-28 | Capital One Services, Llc | System, method, and computer-accessible medium for determining the veracity of a bank fraud call |
US11551122B2 (en) * | 2021-03-05 | 2023-01-10 | Microsoft Technology Licensing, Llc | Inferencing endpoint discovery in computing systems |
US20220335134A1 (en) * | 2021-04-14 | 2022-10-20 | International Business Machines Corporation | False-positives invalidation and static security scans without scanning based on regular scan history in pull requests |
US20230376936A1 (en) * | 2022-05-23 | 2023-11-23 | Capital One Services, Llc | Configuring applications on a device using a contactless card |
US11979410B1 (en) * | 2023-01-27 | 2024-05-07 | Lookout, Inc. | User presence for authentication |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012027588A1 (en) * | 2010-08-25 | 2012-03-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
Family Cites Families (593)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3416032A (en) | 1966-03-23 | 1968-12-10 | Motorola Inc | Lamp dimming circuit |
GB2123230B (en) | 1982-04-28 | 1986-03-26 | Pioneer Electronic Corp | Automatic sound volume control device |
US5319776A (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5574775A (en) | 1993-08-04 | 1996-11-12 | Lucent Technologies, Inc. | Universal wireless radiotelephone system |
US5715518A (en) | 1996-03-06 | 1998-02-03 | Cellular Technical Services Company, Inc. | Adaptive waveform matching for use in transmitter identification |
US6453345B2 (en) | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
US6167520A (en) | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
US6119103A (en) | 1997-05-27 | 2000-09-12 | Visa International Service Association | Financial risk prediction systems and methods therefor |
US6578077B1 (en) | 1997-05-27 | 2003-06-10 | Novell, Inc. | Traffic monitoring tool for bandwidth management |
US7975305B2 (en) | 1997-11-06 | 2011-07-05 | Finjan, Inc. | Method and system for adaptive rule-based content scanners for desktop computers |
US6035423A (en) | 1997-12-31 | 2000-03-07 | Network Associates, Inc. | Method and system for providing automated updating and upgrading of antivirus applications using a computer network |
KR200177090Y1 (ko) | 1998-04-04 | 2000-04-15 | 허명호 | 파워프레스의 급제동장치 |
US6185689B1 (en) | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
FI106823B (fi) | 1998-10-23 | 2001-04-12 | Nokia Mobile Phones Ltd | Tiedonhakujärjestelmä |
US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6873290B2 (en) | 1999-01-08 | 2005-03-29 | Trueposition, Inc. | Multiple pass location processor |
US7188138B1 (en) | 1999-03-22 | 2007-03-06 | Eric Schneider | Method, product, and apparatus for resource identifier registration and aftermarket services |
US6476828B1 (en) | 1999-05-28 | 2002-11-05 | International Business Machines Corporation | Systems, methods and computer program products for building and displaying dynamic graphical user interfaces |
US7882247B2 (en) | 1999-06-11 | 2011-02-01 | Netmotion Wireless, Inc. | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments |
US6959184B1 (en) | 1999-06-30 | 2005-10-25 | Lucent Technologies Inc. | Method for determining the security status of transmissions in a telecommunications network |
US7346605B1 (en) | 1999-07-22 | 2008-03-18 | Markmonitor, Inc. | Method and system for searching and monitoring internet trademark usage |
AU6835400A (en) | 1999-08-03 | 2001-02-19 | Roald M. Sieberath | A method and system for electronic messaging |
US6272353B1 (en) | 1999-08-20 | 2001-08-07 | Siemens Information And Communication Mobile Llc. | Method and system for mobile communications |
GB2353372B (en) | 1999-12-24 | 2001-08-22 | F Secure Oyj | Remote computer virus scanning |
EP1260028A2 (en) | 2000-01-24 | 2002-11-27 | Radioscape Limited | Digital wireless basestation |
US20010044339A1 (en) | 2000-02-17 | 2001-11-22 | Angel Cordero | Multi-player computer game, system and method |
US7159237B2 (en) | 2000-03-16 | 2007-01-02 | Counterpane Internet Security, Inc. | Method and system for dynamic network intrusion monitoring, detection and response |
WO2001091503A2 (en) | 2000-05-23 | 2001-11-29 | Invicta Networks, Inc. | Systems and methods for communication protection |
US7328349B2 (en) | 2001-12-14 | 2008-02-05 | Bbn Technologies Corp. | Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses |
US7162649B1 (en) | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
EP1170895B1 (en) | 2000-07-03 | 2008-08-13 | Alcatel Lucent | Optical transmission system with reduced raman effect depletion. |
US6707476B1 (en) | 2000-07-05 | 2004-03-16 | Ge Medical Systems Information Technologies, Inc. | Automatic layout selection for information monitoring system |
US7814180B2 (en) | 2000-07-13 | 2010-10-12 | Infoblox, Inc. | Domain name service server |
US7069589B2 (en) | 2000-07-14 | 2006-06-27 | Computer Associates Think, Inc.. | Detection of a class of viral code |
US7574499B1 (en) | 2000-07-19 | 2009-08-11 | Akamai Technologies, Inc. | Global traffic management system using IP anycast routing and dynamic load-balancing |
US6892225B1 (en) | 2000-07-19 | 2005-05-10 | Fusionone, Inc. | Agent system for a secure remote access system |
US8341297B2 (en) | 2000-07-19 | 2012-12-25 | Akamai Technologies, Inc. | Latencies and weightings in a domain name service (DNS) system |
SG118081A1 (en) | 2000-07-24 | 2006-01-27 | Sony Corp | Information processing method inter-task communication method and computer-excutable program for thesame |
GB2366693B (en) | 2000-08-31 | 2002-08-14 | F Secure Oyj | Software virus protection |
GB2368233B (en) | 2000-08-31 | 2002-10-16 | F Secure Oyj | Maintaining virus detection software |
JP4020576B2 (ja) | 2000-09-14 | 2007-12-12 | 株式会社東芝 | パケット転送方法、移動端末装置及びルータ装置 |
US7178166B1 (en) | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
US6748195B1 (en) | 2000-09-29 | 2004-06-08 | Motorola, Inc. | Wireless device having context-based operational behavior |
US20050015443A1 (en) | 2000-10-10 | 2005-01-20 | Alex Levine | Personal message delivery system |
US8556698B2 (en) | 2000-10-19 | 2013-10-15 | Igt | Executing multiple applications and their variations in computing environments |
US8831995B2 (en) | 2000-11-06 | 2014-09-09 | Numecent Holdings, Inc. | Optimized server for streamed applications |
US20020087483A1 (en) | 2000-12-29 | 2002-07-04 | Shlomi Harif | System, method and program for creating and distributing processes in a heterogeneous network |
US6907530B2 (en) | 2001-01-19 | 2005-06-14 | V-One Corporation | Secure internet applications with mobile code |
US6678758B2 (en) | 2001-02-05 | 2004-01-13 | Fujitsu Limited | Dynamic queuing for read/write requests |
US20020108058A1 (en) | 2001-02-08 | 2002-08-08 | Sony Corporation And Sony Electronics Inc. | Anti-theft system for computers and other electronic devices |
US7325249B2 (en) | 2001-04-30 | 2008-01-29 | Aol Llc | Identifying unwanted electronic messages |
KR100385136B1 (ko) | 2001-05-07 | 2003-05-23 | 엘지전자 주식회사 | 이기종 망 연동을 위한 맵 메시지 처리 시스템 및 방법 |
US20030028803A1 (en) | 2001-05-18 | 2003-02-06 | Bunker Nelson Waldo | Network vulnerability assessment system and method |
US20020191018A1 (en) | 2001-05-31 | 2002-12-19 | International Business Machines Corporation | System and method for implementing a graphical user interface across dissimilar platforms yet retaining similar look and feel |
US7123933B2 (en) | 2001-05-31 | 2006-10-17 | Orative Corporation | System and method for remote application management of a wireless device |
US7237264B1 (en) | 2001-06-04 | 2007-06-26 | Internet Security Systems, Inc. | System and method for preventing network misuse |
US7100200B2 (en) | 2001-06-13 | 2006-08-29 | Citrix Systems, Inc. | Method and apparatus for transmitting authentication credentials of a user across communication sessions |
US7228566B2 (en) | 2001-07-10 | 2007-06-05 | Core Sdi, Incorporated | Automated computer system security compromise |
CN100346338C (zh) | 2001-07-12 | 2007-10-31 | 捷讯研究有限公司 | 用于为移动通信设备提供远程数据访问和代码转换的系统和方法 |
US20030208527A1 (en) | 2001-07-20 | 2003-11-06 | Lino Lglesais | Method for smart device network application infrastructure (SDNA) |
US7861303B2 (en) | 2001-08-01 | 2010-12-28 | Mcafee, Inc. | Malware scanning wireless service agent system and method |
US6792543B2 (en) | 2001-08-01 | 2004-09-14 | Networks Associates Technology, Inc. | Virus scanning on thin client devices using programmable assembly language |
US20030046134A1 (en) | 2001-08-28 | 2003-03-06 | Frolick Harry A. | Web-based project management system |
US6696941B2 (en) | 2001-09-04 | 2004-02-24 | Agere Systems Inc. | Theft alarm in mobile device |
JP4237055B2 (ja) | 2001-09-28 | 2009-03-11 | ファイバーリンク コミュニケーションズ コーポレーション | クライアント側網アクセス・ポリシー及び管理アプリケーション |
US7076797B2 (en) | 2001-10-05 | 2006-07-11 | Microsoft Corporation | Granular authorization for network user sessions |
US7210168B2 (en) | 2001-10-15 | 2007-04-24 | Mcafee, Inc. | Updating malware definition data for mobile data processing devices |
US7526297B1 (en) | 2001-10-30 | 2009-04-28 | Cisco Technology, Inc. | Method and system for managing pushed data at a mobile unit |
DE60115967T2 (de) | 2001-10-31 | 2006-08-03 | Nokia Corp. | Eine methode für handhabung von meldungen zwischen einem terminal und einem datennetz |
US7355981B2 (en) | 2001-11-23 | 2008-04-08 | Apparent Networks, Inc. | Signature matching methods and apparatus for performing network diagnostics |
US7159036B2 (en) | 2001-12-10 | 2007-01-02 | Mcafee, Inc. | Updating data from a source computer to groups of destination computers |
US7401359B2 (en) | 2001-12-21 | 2008-07-15 | Mcafee, Inc. | Generating malware definition data for mobile computing devices |
MXPA04006473A (es) | 2001-12-31 | 2004-10-04 | Citadel Security Software Inc | Sistema de resolucion automatizado para vulnerabilidad de computadora. |
US6978439B2 (en) | 2002-01-10 | 2005-12-20 | Microsoft Corporation | Cross-platform software development with a software development peripheral |
US7543056B2 (en) | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7415270B2 (en) | 2002-02-15 | 2008-08-19 | Telefonaktiebolaget L M Ericsson (Publ) | Middleware services layer for platform system for mobile terminals |
US7139820B1 (en) | 2002-02-26 | 2006-11-21 | Cisco Technology, Inc. | Methods and apparatus for obtaining location information in relation to a target device |
JP4567275B2 (ja) | 2002-02-28 | 2010-10-20 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信端末、情報処理装置、中継サーバ装置、情報処理システム及び情報処理方法 |
GB0205130D0 (en) | 2002-03-06 | 2002-04-17 | Symbian Ltd | A method of enabling a wireless information device to access data services |
US7203909B1 (en) | 2002-04-04 | 2007-04-10 | Microsoft Corporation | System and methods for constructing personalized context-sensitive portal pages or views by analyzing patterns of users' information access activities |
US7266810B2 (en) | 2002-04-09 | 2007-09-04 | Hewlett-Packard Development Company, Lp. | Runtime profiling of platform-independent software applications |
US20060218482A1 (en) | 2002-04-19 | 2006-09-28 | Droplet Technology, Inc. | Mobile imaging application, device architecture, service platform architecture and services |
EP1540499A4 (en) | 2002-05-21 | 2010-06-02 | Jesse Russell | ADVANCED MULTI-HOME CLIENT DEVICE FOR BROADBAND MULTIMEDIA ACCESS TO PUBLIC AND PRIVATE WIRELESS NETWORKS |
US9565275B2 (en) | 2012-02-09 | 2017-02-07 | Rockwell Automation Technologies, Inc. | Transformation of industrial data into useful cloud information |
US20040022258A1 (en) | 2002-07-30 | 2004-02-05 | Docomo Communications Laboratories Usa, Inc. | System for providing access control platform service for private networks |
EP1540446A2 (en) | 2002-08-27 | 2005-06-15 | TD Security, Inc., dba Trust Digital, LLC | Enterprise-wide security system for computer devices |
JP3943467B2 (ja) | 2002-09-18 | 2007-07-11 | 株式会社エヌ・ティ・ティ・ドコモ | 中継装置、情報送信装置、および情報送信方法 |
US7437760B2 (en) | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
WO2004034687A1 (en) | 2002-10-10 | 2004-04-22 | Action Engine Corporation | Method and apparatus for remote control and updating of wireless mobile devices |
US7401064B1 (en) | 2002-11-07 | 2008-07-15 | Data Advantage Group, Inc. | Method and apparatus for obtaining metadata from multiple information sources within an organization in real time |
US7127455B2 (en) | 2002-11-12 | 2006-10-24 | Hewlett-Packard Development Company, L.P. | Taxonomy for mobile e-services |
EP1420572B1 (en) | 2002-11-14 | 2005-01-19 | Alcatel | Call establishment method |
US7376969B1 (en) | 2002-12-02 | 2008-05-20 | Arcsight, Inc. | Real time monitoring and analysis of events from multiple network security devices |
US7181252B2 (en) | 2002-12-10 | 2007-02-20 | Nokia Corporation | System and method for performing security functions of a mobile station |
US7467206B2 (en) | 2002-12-23 | 2008-12-16 | Microsoft Corporation | Reputation system for web services |
KR100551421B1 (ko) | 2002-12-28 | 2006-02-09 | 주식회사 팬택앤큐리텔 | 바이러스치료기능을 가진 이동통신 시스템 |
KR100487217B1 (ko) | 2003-01-06 | 2005-05-04 | 삼성전자주식회사 | 공통 소프트웨어 플랫폼을 이용한 공통 호 처리 관리 방법및 장치 |
JP3703457B2 (ja) | 2003-01-21 | 2005-10-05 | キヤノン株式会社 | アドレス通知方法、プログラム、及び、装置 |
JP3724577B2 (ja) | 2003-02-06 | 2005-12-07 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 情報処理装置、情報処理装置用制御方法、及び情報処理装置用制御プログラム |
US20040158741A1 (en) | 2003-02-07 | 2004-08-12 | Peter Schneider | System and method for remote virus scanning in wireless networks |
US7506368B1 (en) | 2003-02-13 | 2009-03-17 | Cisco Technology, Inc. | Methods and apparatus for network communications via a transparent security proxy |
US7890938B2 (en) | 2003-02-26 | 2011-02-15 | Novell, Inc. | Heterogeneous normalization of data characteristics |
US8042178B1 (en) | 2003-03-13 | 2011-10-18 | Mcafee, Inc. | Alert message control of security mechanisms in data processing systems |
US20040185900A1 (en) | 2003-03-20 | 2004-09-23 | Mcelveen William | Cell phone with digital camera and smart buttons and methods for using the phones for security monitoring |
KR100971320B1 (ko) | 2003-03-25 | 2010-07-20 | 트랜스퍼시픽 소닉, 엘엘씨 | 플래시롬의 응용 프로그램 저장/실행 방법 |
US20040205419A1 (en) | 2003-04-10 | 2004-10-14 | Trend Micro Incorporated | Multilevel virus outbreak alert based on collaborative behavior |
US7392043B2 (en) | 2003-04-17 | 2008-06-24 | Ntt Docomo, Inc. | API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework |
US7451488B2 (en) | 2003-04-29 | 2008-11-11 | Securify, Inc. | Policy-based vulnerability assessment |
US7454615B2 (en) | 2003-05-08 | 2008-11-18 | At&T Intellectual Property I, L.P. | Centralized authentication system |
ATE394748T1 (de) | 2003-06-18 | 2008-05-15 | Ericsson Telefon Ab L M | Anordnung und verfahren in bezug auf ip- netzwerkzugang |
US7392543B2 (en) | 2003-06-30 | 2008-06-24 | Symantec Corporation | Signature extraction system and method |
GB0319950D0 (en) | 2003-08-26 | 2003-09-24 | Mitel Networks Corp | Security monitor for PDA attached telephone |
US7472422B1 (en) | 2003-09-10 | 2008-12-30 | Symantec Corporation | Security management system including feedback and control |
US20050091308A1 (en) | 2003-09-29 | 2005-04-28 | Peter Bookman | Mobility device |
US7519986B2 (en) | 2003-10-01 | 2009-04-14 | Tara Chand Singhal | Method and apparatus for network security using a router based authentication system |
ATE336125T1 (de) | 2003-11-26 | 2006-09-15 | France Telecom | Authentifizierung zwischen einer zellularen mobilendgerät und einem kurzreichweitigen zugangspunkt |
US7194769B2 (en) | 2003-12-11 | 2007-03-20 | Massachusetts Institute Of Technology | Network security planning architecture |
US7519726B2 (en) | 2003-12-12 | 2009-04-14 | International Business Machines Corporation | Methods, apparatus and computer programs for enhanced access to resources within a network |
US7949329B2 (en) | 2003-12-18 | 2011-05-24 | Alcatel-Lucent Usa Inc. | Network support for mobile handset anti-virus protection |
US7287173B2 (en) | 2003-12-19 | 2007-10-23 | Intel Corporation | Method for computing power consumption levels of instruction and recompiling the program to reduce the excess power consumption |
KR101167827B1 (ko) | 2004-01-16 | 2012-07-26 | 힐크레스트 래보래토리스, 인크. | 메타데이터 중개 서버 및 방법 |
US8037203B2 (en) | 2004-02-19 | 2011-10-11 | International Business Machines Corporation | User defined preferred DNS reference |
US20050186954A1 (en) | 2004-02-20 | 2005-08-25 | Tom Kenney | Systems and methods that provide user and/or network personal data disabling commands for mobile devices |
US8548429B2 (en) | 2004-03-08 | 2013-10-01 | Rafi Nehushtan | Cellular device security apparatus and method |
US20070113090A1 (en) | 2004-03-10 | 2007-05-17 | Villela Agostinho De Arruda | Access control system based on a hardware and software signature of a requesting device |
BRPI0400265A (pt) | 2004-03-10 | 2006-02-07 | Legitimi Ltd | Sistema de controle de acesso a serviços de informação baseado em assinatura de hardware e software do dispositivo solicitante |
US7991854B2 (en) | 2004-03-19 | 2011-08-02 | Microsoft Corporation | Dynamic session maintenance for mobile computing devices |
WO2005096145A2 (en) | 2004-03-22 | 2005-10-13 | Motorola Inc., A Corporation Of The State Of Delaware | Method and apparatus for dynamic extension of device management tree data model on a mobile device |
US8042182B2 (en) | 2004-03-30 | 2011-10-18 | Telecom Italia S.P.A. | Method and system for network intrusion detection, related network and computer program product |
US20050221800A1 (en) | 2004-03-31 | 2005-10-06 | Jackson Riley W | Method for remote lockdown of a mobile computer |
US7525541B2 (en) | 2004-04-05 | 2009-04-28 | Actuality Systems, Inc. | Data processing for three-dimensional displays |
US20050227669A1 (en) | 2004-04-08 | 2005-10-13 | Ixi Mobile (R&D) Ltd. | Security key management system and method in a mobile communication network |
WO2005101789A1 (en) | 2004-04-14 | 2005-10-27 | Gurunath Samir Kalekar | A system for real-time network based vulnerability assessment of a host/device |
US8051477B2 (en) | 2004-04-19 | 2011-11-01 | The Boeing Company | Security state vector for mobile network platform |
US7783281B1 (en) | 2004-04-22 | 2010-08-24 | Sprint Spectrum L.P. | Method and system for securing a mobile device |
US7457823B2 (en) | 2004-05-02 | 2008-11-25 | Markmonitor Inc. | Methods and systems for analyzing data related to possible online fraud |
CA2509842A1 (en) | 2004-06-14 | 2005-12-14 | Hackerproof Security Inc. | Method and system for enforcing secure network connection |
US20050288043A1 (en) | 2004-06-23 | 2005-12-29 | Inventec Appliances Corporation | Method for preventing PHS mobile phones from being stolen by using remote control function of short message service |
US8146072B2 (en) | 2004-07-30 | 2012-03-27 | Hewlett-Packard Development Company, L.P. | System and method for updating software on a computer |
US8868774B2 (en) | 2004-08-19 | 2014-10-21 | Sk Planet Co., Ltd. | Method and apparatus for integrating and managing information of mobile terminal |
US20060048142A1 (en) * | 2004-09-02 | 2006-03-02 | Roese John J | System and method for rapid response network policy implementation |
US7877621B2 (en) | 2004-09-03 | 2011-01-25 | Virginia Tech Intellectual Properties, Inc. | Detecting software attacks by monitoring electric power consumption patterns |
US8312549B2 (en) | 2004-09-24 | 2012-11-13 | Ygor Goldberg | Practical threat analysis |
US20060080680A1 (en) | 2004-10-12 | 2006-04-13 | Majid Anwar | Platform independent dynamic linking |
AU2005330513B2 (en) | 2004-10-29 | 2011-07-14 | Skyhook Wireless, Inc. | Location beacon database and server, method of building location beacon database, and location based service using same |
US20060095454A1 (en) | 2004-10-29 | 2006-05-04 | Texas Instruments Incorporated | System and method for secure collaborative terminal identity authentication between a wireless communication device and a wireless operator |
US20060101518A1 (en) | 2004-11-05 | 2006-05-11 | Schumaker Troy T | Method to generate a quantitative measurement of computer security vulnerabilities |
KR100609708B1 (ko) | 2004-11-20 | 2006-08-08 | 한국전자통신연구원 | 악성코드 프로토콜 분석 및 유해 트래픽을 생성하는 방법및 장치 |
US7698744B2 (en) | 2004-12-03 | 2010-04-13 | Whitecell Software Inc. | Secure system for allowing the execution of authorized computer program code |
WO2006063118A2 (en) | 2004-12-07 | 2006-06-15 | Pure Networks, Inc. | Network management |
US20060129601A1 (en) | 2004-12-09 | 2006-06-15 | International Business Machines Corporation | System, computer program product and method of collecting metadata of application programs installed on a computer system |
US20060150238A1 (en) | 2005-01-04 | 2006-07-06 | Symbol Technologies, Inc. | Method and apparatus of adaptive network policy management for wireless mobile computers |
US7696923B2 (en) | 2005-02-03 | 2010-04-13 | Mexens Intellectual Property Holding Llc | System and method for determining geographic location of wireless computing devices |
US7397424B2 (en) | 2005-02-03 | 2008-07-08 | Mexens Intellectual Property Holding, Llc | System and method for enabling continuous geographic location estimation for wireless computing devices |
US7765596B2 (en) | 2005-02-09 | 2010-07-27 | Intrinsic Security, Inc. | Intrusion handling system and method for a packet network with dynamic network address utilization |
US20080275992A1 (en) | 2005-02-09 | 2008-11-06 | Access Systems Americas, Inc. | System and method of managing connections between a computing system and an available network using a connection manager |
US7502620B2 (en) | 2005-03-04 | 2009-03-10 | Shyhook Wireless, Inc. | Encoding and compression of a location beacon database |
US7493127B2 (en) | 2005-02-22 | 2009-02-17 | Skyhook Wireless, Inc. | Continuous data optimization of new access points in positioning systems |
KR100599084B1 (ko) | 2005-02-24 | 2006-07-12 | 삼성전자주식회사 | 이동 통신 네트워크에서의 바이러스 치료 방법 |
US8495700B2 (en) | 2005-02-28 | 2013-07-23 | Mcafee, Inc. | Mobile data security system and methods |
US20060217116A1 (en) | 2005-03-18 | 2006-09-28 | Cassett Tia M | Apparatus and methods for providing performance statistics on a wireless communication device |
CN1863095A (zh) | 2005-03-21 | 2006-11-15 | 奔峰电子(北京)有限公司 | 一种电子设备及其管理系统 |
US7610273B2 (en) | 2005-03-22 | 2009-10-27 | Microsoft Corporation | Application identity and rating service |
US20080046557A1 (en) | 2005-03-23 | 2008-02-21 | Cheng Joseph C | Method and system for designing, implementing, and managing client applications on mobile devices |
US7479882B2 (en) | 2005-04-14 | 2009-01-20 | Flexilis, Inc. | RFID security system and methods |
US7568220B2 (en) | 2005-04-19 | 2009-07-28 | Cisco Technology, Inc. | Connecting VPN users in a public network |
CN100364342C (zh) | 2005-04-26 | 2008-01-23 | 华为技术有限公司 | 一种推送业务实现方法 |
US20060253584A1 (en) | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US20060253205A1 (en) | 2005-05-09 | 2006-11-09 | Michael Gardiner | Method and apparatus for tabular process control |
CN1870808A (zh) | 2005-05-28 | 2006-11-29 | 华为技术有限公司 | 一种密钥更新方法 |
US7539882B2 (en) | 2005-05-30 | 2009-05-26 | Rambus Inc. | Self-powered devices and methods |
US7970386B2 (en) | 2005-06-03 | 2011-06-28 | Good Technology, Inc. | System and method for monitoring and maintaining a wireless device |
US7650522B2 (en) | 2005-06-28 | 2010-01-19 | Symbol Technologies, Inc. | Mobility policy manager for mobile computing devices |
GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
US8275810B2 (en) | 2005-07-05 | 2012-09-25 | Oracle International Corporation | Making and using abstract XML representations of data dictionary metadata |
US7899469B2 (en) | 2005-07-12 | 2011-03-01 | Qwest Communications International, Inc. | User defined location based notification for a mobile communications device systems and methods |
US7907966B1 (en) | 2005-07-19 | 2011-03-15 | Aol Inc. | System and method for cross-platform applications on a wireless phone |
US20070021112A1 (en) | 2005-07-21 | 2007-01-25 | Sun Microsystems, Inc. | Method and system for ensuring mobile data security |
US7730040B2 (en) | 2005-07-27 | 2010-06-01 | Microsoft Corporation | Feedback-driven malware detector |
US7827400B2 (en) | 2005-07-28 | 2010-11-02 | The Boeing Company | Security certificate management |
US20070028302A1 (en) | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Distributed meta-information query in a network |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US20070039053A1 (en) | 2005-08-03 | 2007-02-15 | Aladdin Knowledge Systems Ltd. | Security server in the cloud |
US7818800B1 (en) * | 2005-08-05 | 2010-10-19 | Symantec Corporation | Method, system, and computer program product for blocking malicious program behaviors |
US7304570B2 (en) | 2005-08-10 | 2007-12-04 | Scenera Technologies, Llc | Methods, systems, and computer program products for providing context-based, hierarchical security for a mobile device |
US8024711B2 (en) * | 2005-08-10 | 2011-09-20 | Microsoft Corporation | Software analysis tool |
US20070050471A1 (en) | 2005-08-31 | 2007-03-01 | Microsoft Corporation | Portable Remoting Component With A Scaleable Feature Set |
KR100790685B1 (ko) | 2005-09-16 | 2008-01-02 | 삼성전기주식회사 | 무선통신 단말기의 내장형 안테나 모듈 |
GB0519182D0 (en) | 2005-09-20 | 2005-10-26 | Univ Brunel | Wireless and mobile lottery and gaming system |
US8001610B1 (en) | 2005-09-28 | 2011-08-16 | Juniper Networks, Inc. | Network defense system utilizing endpoint health indicators and user identity |
US8340289B2 (en) * | 2005-09-29 | 2012-12-25 | Research In Motion Limited | System and method for providing an indication of randomness quality of random number data generated by a random data service |
US20070074033A1 (en) * | 2005-09-29 | 2007-03-29 | Research In Motion Limited | Account management in a system and method for providing code signing services |
US7797545B2 (en) * | 2005-09-29 | 2010-09-14 | Research In Motion Limited | System and method for registering entities for code signing services |
US8126866B1 (en) | 2005-09-30 | 2012-02-28 | Google Inc. | Identification of possible scumware sites by a search engine |
WO2007045150A1 (fr) | 2005-10-15 | 2007-04-26 | Huawei Technologies Co., Ltd. | Procede et systeme de controle de la securite d'un reseau |
US20090119143A1 (en) | 2005-10-17 | 2009-05-07 | Markmonitor Inc. | Brand notification systems and methods |
US7730539B2 (en) * | 2005-10-21 | 2010-06-01 | Microsoft Corporation | Authenticating third party products via a secure extensibility model |
US7734538B2 (en) | 2005-11-18 | 2010-06-08 | Chicago Mercantile Exchange Inc. | Multiple quote risk management |
US7730187B2 (en) | 2006-10-05 | 2010-06-01 | Limelight Networks, Inc. | Remote domain name service |
US7707314B2 (en) | 2005-11-21 | 2010-04-27 | Limelight Networks, Inc. | Domain name resolution resource allocation |
US7882557B2 (en) | 2005-11-23 | 2011-02-01 | Research In Motion Limited | System and method to provide built-in and mobile VPN connectivity |
US7707553B2 (en) | 2005-12-08 | 2010-04-27 | International Business Machines Corporation | Computer method and system for automatically creating tests for checking software |
US8091120B2 (en) | 2005-12-21 | 2012-01-03 | At&T Intellectual Property I, L.P. | Adaptive authentication methods, systems, devices, and computer program products |
US20070143851A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
US8027472B2 (en) | 2005-12-30 | 2011-09-27 | Selim Aissi | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel |
US7660296B2 (en) | 2005-12-30 | 2010-02-09 | Akamai Technologies, Inc. | Reliable, high-throughput, high-performance transport and routing mechanism for arbitrary data flows |
US8290433B2 (en) | 2007-11-14 | 2012-10-16 | Blaze Mobile, Inc. | Method and system for securing transactions made through a mobile communication device |
WO2007084973A2 (en) | 2006-01-20 | 2007-07-26 | Verimatrix, Inc. | Network security system and method |
EP1977334A4 (en) | 2006-01-25 | 2011-01-12 | Greystripe Inc | SYSTEM AND METHOD FOR MANAGING CONTENT IN PRE-EXISTING MOBILE APPLICATIONS |
US9166812B2 (en) | 2006-01-31 | 2015-10-20 | Sigma Designs, Inc. | Home electrical device control within a wireless mesh network |
US20070186282A1 (en) | 2006-02-06 | 2007-08-09 | Microsoft Corporation | Techniques for identifying and managing potentially harmful web traffic |
US20070190995A1 (en) | 2006-02-13 | 2007-08-16 | Nokia Corporation | Remote control of a mobile device |
US7471954B2 (en) | 2006-02-24 | 2008-12-30 | Skyhook Wireless, Inc. | Methods and systems for estimating a user position in a WLAN positioning system based on user assigned access point locations |
US8719391B2 (en) | 2006-03-07 | 2014-05-06 | Nokia Corporation | Method and system for controlling contextual information push services |
WO2007106826A2 (en) | 2006-03-13 | 2007-09-20 | Markmonitor Inc. | Domain name ownership validation |
US7685132B2 (en) | 2006-03-15 | 2010-03-23 | Mog, Inc | Automatic meta-data sharing of existing media through social networking |
DE602006003185D1 (de) | 2006-03-15 | 2008-11-27 | Nero Ag | System zur eindeutigen Identifizierung und Erreichen von VoIP Nutzern |
CN101444119A (zh) | 2006-03-27 | 2009-05-27 | 意大利电信股份公司 | 在移动通信设备上实施安全策略的系统 |
WO2007114066A1 (ja) | 2006-03-28 | 2007-10-11 | Kyocera Corporation | 携帯端末及び機能動作制御方法 |
WO2007117567A2 (en) | 2006-04-06 | 2007-10-18 | Smobile Systems Inc. | Malware detection system and method for limited access mobile platforms |
US20120059822A1 (en) | 2006-04-13 | 2012-03-08 | Tony Malandain | Knowledge management tool |
US8935416B2 (en) | 2006-04-21 | 2015-01-13 | Fortinet, Inc. | Method, apparatus, signals and medium for enforcing compliance with a policy on a client computer |
US20070253377A1 (en) | 2006-04-28 | 2007-11-01 | Motorola, Inc. | Apparatus and method for name resolution in an aggregation of mobile networks |
US7849507B1 (en) | 2006-04-29 | 2010-12-07 | Ironport Systems, Inc. | Apparatus for filtering server responses |
US7551929B2 (en) | 2006-05-08 | 2009-06-23 | Skyhook Wireless, Inc. | Estimation of speed and direction of travel in a WLAN positioning system using multiple position estimations |
US8014788B2 (en) | 2006-05-08 | 2011-09-06 | Skyhook Wireless, Inc. | Estimation of speed of travel using the dynamic signal strength variation of multiple WLAN access points |
US7551579B2 (en) | 2006-05-08 | 2009-06-23 | Skyhook Wireless, Inc. | Calculation of quality of wlan access point characterization for use in a wlan positioning system |
US7835754B2 (en) | 2006-05-08 | 2010-11-16 | Skyhook Wireless, Inc. | Estimation of speed and direction of travel in a WLAN positioning system |
US7515578B2 (en) | 2006-05-08 | 2009-04-07 | Skyhook Wireless, Inc. | Estimation of position using WLAN access point radio propagation characteristics in a WLAN positioning system |
EP2021968B1 (en) | 2006-05-18 | 2012-11-14 | Research In Motion Limited | Automatic security action invocation for mobile communications device |
US20080140767A1 (en) | 2006-06-14 | 2008-06-12 | Prasad Rao | Divitas description protocol and methods therefor |
US20070293263A1 (en) | 2006-06-14 | 2007-12-20 | Hossein Eslambolchi | Method and apparatus for providing multi-system cellular communications |
US7957532B2 (en) | 2006-06-23 | 2011-06-07 | Microsoft Corporation | Data protection for a mobile device |
US8315233B2 (en) | 2006-07-07 | 2012-11-20 | Skyhook Wireless, Inc. | System and method of gathering WLAN packet samples to improve position estimates of WLAN positioning device |
GB2440170B8 (en) | 2006-07-14 | 2014-07-16 | Vodafone Plc | Digital rights management |
US20080025515A1 (en) | 2006-07-25 | 2008-01-31 | Jason Scott Coombs | Systems and Methods for Digitally-Signed Updates |
US20080046369A1 (en) | 2006-07-27 | 2008-02-21 | Wood Charles B | Password Management for RSS Interfaces |
US7809936B2 (en) | 2006-08-02 | 2010-10-05 | Freescale Semiconductor, Inc. | Method and apparatus for reconfiguring a remote device |
US8239943B2 (en) | 2006-08-18 | 2012-08-07 | Microsoft Corporation | Network security page |
US8903365B2 (en) | 2006-08-18 | 2014-12-02 | Ca, Inc. | Mobile device management |
US8149746B2 (en) | 2006-08-28 | 2012-04-03 | Intel Corporation | Battery level based configuration of a mobile station by a base station |
US20080077956A1 (en) | 2006-09-12 | 2008-03-27 | James Morrison | Interactive digital media services |
US9860274B2 (en) | 2006-09-13 | 2018-01-02 | Sophos Limited | Policy management |
US8230509B2 (en) | 2006-09-14 | 2012-07-24 | Ca, Inc. | System and method for using rules to protect against malware |
US8397299B2 (en) | 2006-09-14 | 2013-03-12 | Interdigital Technology Corporation | Method and system for enhancing flow of behavior metrics and evaluation of security of a node |
US20080133327A1 (en) | 2006-09-14 | 2008-06-05 | Shah Ullah | Methods and systems for securing content played on mobile devices |
US7827549B2 (en) | 2006-09-15 | 2010-11-02 | Symantec Corporation | Method and system for creating and executing generic software packages |
US8201244B2 (en) | 2006-09-19 | 2012-06-12 | Microsoft Corporation | Automated malware signature generation |
US20080127179A1 (en) | 2006-09-25 | 2008-05-29 | Barrie Jon Moss | System and apparatus for deployment of application and content to different platforms |
US8407220B2 (en) | 2006-09-28 | 2013-03-26 | Augme Technologies, Inc. | Apparatuses, methods and systems for ambiguous code-triggered information querying and serving on mobile devices |
CA2701689C (en) | 2006-10-06 | 2016-09-06 | Smobile Systems, Inc. | System and method of malware sample collection on mobile networks |
WO2008043109A2 (en) | 2006-10-06 | 2008-04-10 | Smobile Systems, Inc. | System and method of reporting and visualizing malware on mobile networks |
US20080086638A1 (en) | 2006-10-06 | 2008-04-10 | Markmonitor Inc. | Browser reputation indicators with two-way authentication |
US20080098478A1 (en) | 2006-10-20 | 2008-04-24 | Redcannon, Inc. | System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device |
US8259568B2 (en) | 2006-10-23 | 2012-09-04 | Mcafee, Inc. | System and method for controlling mobile device access to a network |
US8413135B2 (en) * | 2006-10-30 | 2013-04-02 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for controlling software application installations |
US7877795B2 (en) | 2006-10-30 | 2011-01-25 | At&T Intellectual Property I, Lp | Methods, systems, and computer program products for automatically configuring firewalls |
US7856234B2 (en) | 2006-11-07 | 2010-12-21 | Skyhook Wireless, Inc. | System and method for estimating positioning error within a WLAN-based positioning system |
US7853721B2 (en) | 2006-11-09 | 2010-12-14 | Yahoo! Inc. | System and method for transmission of DNS beacons |
EP2084930B1 (en) | 2006-11-21 | 2013-10-23 | BlackBerry Limited | Saving a connection profile when unable to connect to a wireless local area network |
WO2008067335A2 (en) | 2006-11-27 | 2008-06-05 | Smobile Systems, Inc. | Wireless intrusion prevention system and method |
WO2008065662A2 (en) | 2006-11-30 | 2008-06-05 | Mobillion Ltd. | A method and apparatus for starting applications |
US9148422B2 (en) | 2006-11-30 | 2015-09-29 | Mcafee, Inc. | Method and system for enhanced wireless network security |
US20080147799A1 (en) | 2006-12-13 | 2008-06-19 | Morris Robert P | Methods, Systems, And Computer Program Products For Providing Access To A Secure Service Via A Link In A Message |
US8195196B2 (en) | 2006-12-29 | 2012-06-05 | United States Cellular Corporation | Mobility based service in wireless environment |
US8254568B2 (en) | 2007-01-07 | 2012-08-28 | Apple Inc. | Secure booting a computing device |
US8126456B2 (en) | 2007-01-17 | 2012-02-28 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US7830804B2 (en) | 2007-01-17 | 2010-11-09 | Sierra Wireless, Inc. | Quality of service application programming interface over socket |
US7996005B2 (en) | 2007-01-17 | 2011-08-09 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US7908660B2 (en) | 2007-02-06 | 2011-03-15 | Microsoft Corporation | Dynamic risk management |
US8385883B2 (en) | 2007-02-06 | 2013-02-26 | Qualcomm Incorporated | Apparatus and methods for locating, tracking and/or recovering a wireless communication device |
CA2714549A1 (en) | 2007-02-09 | 2008-08-14 | Smobile Systems, Inc. | Off-line mms malware scanning system and method |
US7430675B2 (en) | 2007-02-16 | 2008-09-30 | Apple Inc. | Anticipatory power management for battery-powered electronic device |
US9021590B2 (en) | 2007-02-28 | 2015-04-28 | Microsoft Technology Licensing, Llc | Spyware detection mechanism |
US8634788B2 (en) | 2007-03-02 | 2014-01-21 | Aegis Mobility, Inc. | System and methods for monitoring the context associated with a mobile communication device |
US8504775B2 (en) | 2007-03-12 | 2013-08-06 | Citrix Systems, Inc | Systems and methods of prefreshening cached objects based on user's current web page |
US7720936B2 (en) | 2007-03-12 | 2010-05-18 | Citrix Systems, Inc. | Systems and methods of freshening and prefreshening a DNS cache |
US8302196B2 (en) | 2007-03-20 | 2012-10-30 | Microsoft Corporation | Combining assessment models and client targeting to identify network security vulnerabilities |
WO2008140683A2 (en) | 2007-04-30 | 2008-11-20 | Sheltonix, Inc. | A method and system for assessing, managing, and monitoring information technology risk |
US20090271428A1 (en) | 2007-05-09 | 2009-10-29 | The Go Daddy Group, Inc. | Tracking digital identity related reputation data |
US8320886B2 (en) | 2007-05-23 | 2012-11-27 | Verint Americas, Inc. | Integrating mobile device based communication session recordings |
US8127358B1 (en) | 2007-05-30 | 2012-02-28 | Trend Micro Incorporated | Thin client for computer security applications |
US7877784B2 (en) | 2007-06-07 | 2011-01-25 | Alcatel Lucent | Verifying authenticity of webpages |
US8522043B2 (en) | 2007-06-21 | 2013-08-27 | Microsoft Corporation | Hardware-based computer theft deterrence |
US20090199298A1 (en) | 2007-06-26 | 2009-08-06 | Miliefsky Gary S | Enterprise security management for network equipment |
US8713680B2 (en) | 2007-07-10 | 2014-04-29 | Samsung Electronics Co., Ltd. | Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program |
US7978691B1 (en) | 2007-08-23 | 2011-07-12 | Advanced Micro Devices, Inc. | Connectivity manager with location services |
US8095172B1 (en) | 2007-08-23 | 2012-01-10 | Globalfoundries Inc. | Connectivity manager to manage connectivity services |
US8332922B2 (en) | 2007-08-31 | 2012-12-11 | Microsoft Corporation | Transferable restricted security tokens |
US7774637B1 (en) | 2007-09-05 | 2010-08-10 | Mu Dynamics, Inc. | Meta-instrumentation for security analysis |
KR20090027000A (ko) | 2007-09-11 | 2009-03-16 | 한국전자통신연구원 | 상황 인식 시스템 환경에서 발생한 이벤트 로그에 기초하여사용자 행동 패턴을 구축하는 장치 및 방법 |
CN101136837A (zh) | 2007-09-21 | 2008-03-05 | 华为技术有限公司 | 推送消息的控制方法、装置和系统 |
US9378373B2 (en) * | 2007-09-24 | 2016-06-28 | Symantec Corporation | Software publisher trust extension application |
US8214895B2 (en) | 2007-09-26 | 2012-07-03 | Microsoft Corporation | Whitelist and blacklist identification data |
US8560634B2 (en) | 2007-10-17 | 2013-10-15 | Dispersive Networks, Inc. | Apparatus, systems and methods utilizing dispersive networking |
WO2009052452A2 (en) | 2007-10-17 | 2009-04-23 | Dispersive Networks Inc. | Virtual dispersive routing |
US8539098B2 (en) | 2007-10-17 | 2013-09-17 | Dispersive Networks, Inc. | Multiplexed client server (MCS) communications and systems |
KR100916329B1 (ko) | 2007-11-01 | 2009-09-11 | 한국전자통신연구원 | 소프트웨어 취약점 점검 장치 및 방법 |
US8171388B2 (en) | 2007-11-15 | 2012-05-01 | Yahoo! Inc. | Trust based moderation |
US8875259B2 (en) | 2007-11-15 | 2014-10-28 | Salesforce.Com, Inc. | On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service |
WO2009076447A1 (en) | 2007-12-10 | 2009-06-18 | Courion Corporaton | Policy enforcement using esso |
US8099764B2 (en) | 2007-12-17 | 2012-01-17 | Microsoft Corporation | Secure push and status communication between client and server |
US8140796B2 (en) | 2007-12-27 | 2012-03-20 | Igt | Serial advanced technology attachment write protection: mass storage data protection device |
US8434151B1 (en) * | 2008-01-04 | 2013-04-30 | International Business Machines Corporation | Detecting malicious software |
US8261351B1 (en) | 2008-01-22 | 2012-09-04 | F5 Networks, Inc. | DNS flood protection platform for a network |
WO2009097350A1 (en) * | 2008-01-29 | 2009-08-06 | Palm, Inc. | Secure application signing |
US8650651B2 (en) | 2008-02-08 | 2014-02-11 | International Business Machines Corporation | Method and apparatus for security assessment of a computing platform |
US8635701B2 (en) | 2008-03-02 | 2014-01-21 | Yahoo! Inc. | Secure browser-based applications |
US9881152B2 (en) | 2008-04-01 | 2018-01-30 | Yougetitback Limited | System for monitoring the unauthorized use of a device |
US8769702B2 (en) | 2008-04-16 | 2014-07-01 | Micosoft Corporation | Application reputation service |
US8839431B2 (en) | 2008-05-12 | 2014-09-16 | Enpulz, L.L.C. | Network browser based virus detection |
US8468358B2 (en) * | 2010-11-09 | 2013-06-18 | Veritrix, Inc. | Methods for identifying the guarantor of an application |
US8214977B2 (en) | 2008-05-21 | 2012-07-10 | Symantec Corporation | Centralized scanner database with optimal definition distribution using network queries |
US8948719B2 (en) | 2008-05-22 | 2015-02-03 | At&T Mobility Ii Llc | Designation of cellular broadcast message identifiers for the commercial mobile alert system |
US8423306B2 (en) | 2008-05-22 | 2013-04-16 | Microsoft Corporation | Battery detection and user experience |
US20130276120A1 (en) | 2008-06-02 | 2013-10-17 | Gregory William Dalcher | System, method, and computer program product for determining whether a security status of data is known at a server |
US8432267B2 (en) | 2008-06-06 | 2013-04-30 | Apple Inc. | Method and apparatus to remotely set alarms on a mobile device |
EP2283641B1 (en) | 2008-06-06 | 2020-08-12 | Skyhook Wireless, Inc. | Method and system for determining location using a hybrid satellite and wlan positioning system by selecting the best wlan-ps solution |
US8266324B2 (en) | 2008-06-12 | 2012-09-11 | International Business Machines Corporation | Domain specific domain name service |
US9779234B2 (en) | 2008-06-18 | 2017-10-03 | Symantec Corporation | Software reputation establishment and monitoring system and method |
GB2461870B (en) | 2008-07-14 | 2012-02-29 | F Secure Oyj | Malware detection |
US8763071B2 (en) | 2008-07-24 | 2014-06-24 | Zscaler, Inc. | Systems and methods for mobile application security classification and enforcement |
US8129949B2 (en) | 2008-07-24 | 2012-03-06 | Symbol Technologies, Inc. | Device and method for instantaneous load reduction configuration to prevent under voltage condition |
KR100960262B1 (ko) | 2008-08-14 | 2010-06-07 | 한전케이피에스 주식회사 | 촬상소자를 이용한 형상 연성회로 박막형 내시경장치 |
US8321949B1 (en) * | 2008-08-29 | 2012-11-27 | Adobe Systems Incorporated | Managing software run in a computing system |
US9135433B2 (en) | 2008-08-29 | 2015-09-15 | Adobe Systems Incorporated | Identifying reputation and trust information for software |
US8051166B1 (en) | 2008-09-29 | 2011-11-01 | Amazon Technologies, Inc. | Service provider optimization of content management |
US8117306B1 (en) | 2008-09-29 | 2012-02-14 | Amazon Technologies, Inc. | Optimizing content management |
US8484338B2 (en) | 2008-10-02 | 2013-07-09 | Actiance, Inc. | Application detection architecture and techniques |
US9495194B1 (en) | 2008-10-17 | 2016-11-15 | Dispersive Networks, Inc. | Dispersive storage area networks |
US8087067B2 (en) | 2008-10-21 | 2011-12-27 | Lookout, Inc. | Secure mobile platform system |
US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
US9367680B2 (en) | 2008-10-21 | 2016-06-14 | Lookout, Inc. | System and method for mobile communication device application advisement |
US8185134B2 (en) | 2008-10-21 | 2012-05-22 | Qualcomm Incorporated | Multimode GPS-enabled camera |
US8108933B2 (en) | 2008-10-21 | 2012-01-31 | Lookout, Inc. | System and method for attack and malware prevention |
US9781148B2 (en) | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses between collections of mobile communications devices |
US8060936B2 (en) | 2008-10-21 | 2011-11-15 | Lookout, Inc. | Security status and information display system |
US9043919B2 (en) | 2008-10-21 | 2015-05-26 | Lookout, Inc. | Crawling multiple markets and correlating |
US8984628B2 (en) | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
US8347386B2 (en) * | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
US8099472B2 (en) | 2008-10-21 | 2012-01-17 | Lookout, Inc. | System and method for a mobile cross-platform software system |
US8051480B2 (en) | 2008-10-21 | 2011-11-01 | Lookout, Inc. | System and method for monitoring and analyzing multiple interfaces and multiple protocols |
US8266288B2 (en) | 2008-10-23 | 2012-09-11 | International Business Machines Corporation | Dynamic expiration of domain name service entries |
US8401521B2 (en) | 2008-11-25 | 2013-03-19 | Broadcom Corporation | Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery |
US8447856B2 (en) | 2008-11-25 | 2013-05-21 | Barracuda Networks, Inc. | Policy-managed DNS server for to control network traffic |
US8494560B2 (en) | 2008-11-25 | 2013-07-23 | Lansing Arthur Parker | System, method and program product for location based services, asset management and tracking |
US20100138501A1 (en) | 2008-12-03 | 2010-06-03 | Microsoft Corporation | End-to-end validation in a push environment |
US8121617B1 (en) | 2008-12-09 | 2012-02-21 | Lagrotta James Thomas | Method of remotely locating a mobile device equipped with a radio receiver |
US8549625B2 (en) | 2008-12-12 | 2013-10-01 | International Business Machines Corporation | Classification of unwanted or malicious software through the identification of encrypted data communication |
US8855601B2 (en) | 2009-02-17 | 2014-10-07 | Lookout, Inc. | System and method for remotely-initiated audio communication |
US8538815B2 (en) | 2009-02-17 | 2013-09-17 | Lookout, Inc. | System and method for mobile device replacement |
US20120188064A1 (en) | 2009-02-17 | 2012-07-26 | Lookout. Inc., a California Corporation | System and method for remotely initiating playing of sound on a mobile device |
US8467768B2 (en) | 2009-02-17 | 2013-06-18 | Lookout, Inc. | System and method for remotely securing or recovering a mobile device |
US8370942B1 (en) | 2009-03-12 | 2013-02-05 | Symantec Corporation | Proactively analyzing binary files from suspicious sources |
US20130167136A1 (en) * | 2009-03-18 | 2013-06-27 | Adobe Systems Incorporated | Component-based installation |
US8745088B2 (en) * | 2009-03-27 | 2014-06-03 | Sap Ag | System and method of performing risk analysis using a portal |
US20100299738A1 (en) | 2009-05-19 | 2010-11-25 | Microsoft Corporation | Claims-based authorization at an identity provider |
US8356001B2 (en) | 2009-05-19 | 2013-01-15 | Xybersecure, Inc. | Systems and methods for application-level security |
WO2010141826A2 (en) | 2009-06-05 | 2010-12-09 | The Regents Of The University Of Michigan | System and method for detecting energy consumption anomalies and mobile malware variants |
US20110113242A1 (en) | 2009-06-09 | 2011-05-12 | Beyond Encryption Limited | Protecting mobile devices using data and device control |
US20100325035A1 (en) | 2009-06-18 | 2010-12-23 | Nancy Hilgers | Fraud/risk bureau |
US9135629B2 (en) | 2009-06-23 | 2015-09-15 | Simeon S. Simeonov | User targeting management, monitoring and enforcement |
US20100332593A1 (en) | 2009-06-29 | 2010-12-30 | Igor Barash | Systems and methods for operating an anti-malware network on a cloud computing platform |
US8701192B1 (en) | 2009-06-30 | 2014-04-15 | Symantec Corporation | Behavior based signatures |
US7865937B1 (en) | 2009-08-05 | 2011-01-04 | Daon Holdings Limited | Methods and systems for authenticating users |
US8443202B2 (en) | 2009-08-05 | 2013-05-14 | Daon Holdings Limited | Methods and systems for authenticating users |
US7685629B1 (en) | 2009-08-05 | 2010-03-23 | Daon Holdings Limited | Methods and systems for authenticating users |
US8589691B1 (en) | 2009-08-17 | 2013-11-19 | Google Inc. | Self-signed certificates for computer application signatures |
US8661258B2 (en) | 2009-10-23 | 2014-02-25 | Vasco Data Security, Inc. | Compact security device with transaction risk level approval capability |
US20110107414A1 (en) | 2009-11-03 | 2011-05-05 | Broadcom Corporation | System and Method for Location Assisted Virtual Private Networks |
US8397301B2 (en) | 2009-11-18 | 2013-03-12 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communication device |
US8370933B1 (en) | 2009-11-24 | 2013-02-05 | Symantec Corporation | Systems and methods for detecting the insertion of poisoned DNS server addresses into DHCP servers |
US20110131204A1 (en) | 2009-12-02 | 2011-06-02 | International Business Machines Corporation | Deriving Asset Popularity by Number of Launches |
US8412626B2 (en) | 2009-12-10 | 2013-04-02 | Boku, Inc. | Systems and methods to secure transactions via mobile devices |
US9258715B2 (en) | 2009-12-14 | 2016-02-09 | Apple Inc. | Proactive security for mobile devices |
US8387119B2 (en) | 2009-12-21 | 2013-02-26 | Ebay Inc. | Secure application network |
US8745491B2 (en) * | 2009-12-22 | 2014-06-03 | International Business Machines Corporation | Determining event patterns for monitored applications |
US20110159845A1 (en) | 2009-12-29 | 2011-06-30 | Cellco Partnership D/B/A Verizon Wireless | Automated locating of a mobile station without an alert at the mobile station |
US9361631B2 (en) * | 2010-01-06 | 2016-06-07 | Ghostery, Inc. | Managing and monitoring digital advertising |
US8103915B2 (en) | 2010-02-12 | 2012-01-24 | Verizon Patent And Licensing Inc. | Failure system for domain name system client |
US8209491B2 (en) | 2010-04-27 | 2012-06-26 | Symantec Corporation | Techniques for directory server integration |
US20110270766A1 (en) | 2010-05-02 | 2011-11-03 | Offer XChange, LLC. | Internet Based Offer Routing and Workflow Engine Method |
US8984597B2 (en) | 2010-05-27 | 2015-03-17 | Microsoft Technology Licensing, Llc | Protecting user credentials using an intermediary component |
US8650558B2 (en) * | 2010-05-27 | 2014-02-11 | Rightware, Inc. | Online marketplace for pre-installed software and online services |
US8417962B2 (en) | 2010-06-11 | 2013-04-09 | Microsoft Corporation | Device booting with an initial protection component |
US8479290B2 (en) | 2010-06-16 | 2013-07-02 | Alcatel Lucent | Treatment of malicious devices in a mobile-communications network |
US8396759B2 (en) | 2010-06-18 | 2013-03-12 | Google Inc. | Context-influenced application recommendations |
US8549617B2 (en) | 2010-06-30 | 2013-10-01 | Juniper Networks, Inc. | Multi-service VPN network client for mobile device having integrated acceleration |
US8127350B2 (en) | 2010-06-30 | 2012-02-28 | Juniper Networks, Inc. | Multi-service VPN network client for mobile device |
US9147071B2 (en) * | 2010-07-20 | 2015-09-29 | Mcafee, Inc. | System and method for proactive detection of malware device drivers via kernel forensic behavioral monitoring and a back-end reputation system |
US20120042257A1 (en) * | 2010-08-11 | 2012-02-16 | Microsoft Corporation | Updating application data after anticipating imminent use |
US8839397B2 (en) | 2010-08-24 | 2014-09-16 | Verizon Patent And Licensing Inc. | End point context and trust level determination |
US20120054277A1 (en) | 2010-08-31 | 2012-03-01 | Gedikian Steve S | Classification and status of users of networking and social activity systems |
US8463915B1 (en) | 2010-09-17 | 2013-06-11 | Google Inc. | Method for reducing DNS resolution delay |
WO2012048257A2 (en) | 2010-10-08 | 2012-04-12 | Lumi Technologies, Inc. | Scalable synchronization of events among server and clients with varying lag-times |
US8839197B2 (en) | 2010-10-11 | 2014-09-16 | International Business Machines Corporation | Automated analysis of composite applications |
US8621591B2 (en) | 2010-10-19 | 2013-12-31 | Symantec Corporation | Software signing certificate reputation model |
US20120102568A1 (en) | 2010-10-26 | 2012-04-26 | Mcafee, Inc. | System and method for malware alerting based on analysis of historical network and process activity |
US9071580B2 (en) | 2010-11-01 | 2015-06-30 | Blackberry Limited | Method and system for securing data of a mobile communications device |
US8166164B1 (en) | 2010-11-01 | 2012-04-24 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
US8671221B2 (en) | 2010-11-17 | 2014-03-11 | Hola Networks Ltd. | Method and system for increasing speed of domain name system resolution within a computing device |
US8359016B2 (en) * | 2010-11-19 | 2013-01-22 | Mobile Iron, Inc. | Management of mobile applications |
US8868915B2 (en) | 2010-12-06 | 2014-10-21 | Verizon Patent And Licensing Inc. | Secure authentication for client application access to protected resources |
US9313085B2 (en) | 2010-12-16 | 2016-04-12 | Microsoft Technology Licensing, Llc | DNS-based determining whether a device is inside a network |
US8650620B2 (en) | 2010-12-20 | 2014-02-11 | At&T Intellectual Property I, L.P. | Methods and apparatus to control privileges of mobile device applications |
US20120159434A1 (en) | 2010-12-20 | 2012-06-21 | Microsoft Corporation | Code clone notification and architectural change visualization |
US20120166276A1 (en) | 2010-12-28 | 2012-06-28 | Microsoft Corporation | Framework that facilitates third party integration of applications into a search engine |
EP2661697B1 (en) | 2011-01-07 | 2018-11-21 | Seven Networks, LLC | System and method for reduction of mobile network traffic used for domain name system (dns) queries |
AU2011100168B4 (en) | 2011-02-09 | 2011-06-30 | Device Authority Ltd | Device-bound certificate authentication |
US8843752B1 (en) | 2011-01-24 | 2014-09-23 | Prima Cimema, Inc. | Multi-factor device authentication |
US8726387B2 (en) * | 2011-02-11 | 2014-05-13 | F-Secure Corporation | Detecting a trojan horse |
US9544396B2 (en) | 2011-02-23 | 2017-01-10 | Lookout, Inc. | Remote application installation and control for a mobile device |
KR20120096983A (ko) | 2011-02-24 | 2012-09-03 | 삼성전자주식회사 | 악성 프로그램 검출 방법 및 이를 구현하는 휴대 단말기 |
US8806609B2 (en) | 2011-03-08 | 2014-08-12 | Cisco Technology, Inc. | Security for remote access VPN |
US8869245B2 (en) | 2011-03-09 | 2014-10-21 | Ebay Inc. | Device reputation |
US8695095B2 (en) | 2011-03-11 | 2014-04-08 | At&T Intellectual Property I, L.P. | Mobile malicious software mitigation |
US9119017B2 (en) | 2011-03-18 | 2015-08-25 | Zscaler, Inc. | Cloud based mobile device security and policy enforcement |
US8464335B1 (en) | 2011-03-18 | 2013-06-11 | Zscaler, Inc. | Distributed, multi-tenant virtual private network cloud systems and methods for mobile security and policy enforcement |
US20130144785A1 (en) | 2011-03-29 | 2013-06-06 | Igor Karpenko | Social network payment authentication apparatuses, methods and systems |
US10481945B2 (en) | 2011-04-01 | 2019-11-19 | Facebook, Inc. | System and method for communication management of a multi-tasking mobile device |
US20120271903A1 (en) | 2011-04-19 | 2012-10-25 | Michael Luna | Shared resource and virtual resource management in a networked environment |
US8806647B1 (en) | 2011-04-25 | 2014-08-12 | Twitter, Inc. | Behavioral scanning of mobile applications |
GB2505585B (en) | 2011-04-27 | 2015-08-12 | Seven Networks Inc | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
EP2712442A1 (en) | 2011-05-09 | 2014-04-02 | Google, Inc. | Recommending applications for mobile devices based on installation histories |
GB201107978D0 (en) | 2011-05-13 | 2011-06-29 | Antix Labs Ltd | Method of distibuting a multi-user software application |
US8285808B1 (en) | 2011-05-20 | 2012-10-09 | Cloudflare, Inc. | Loading of web resources |
US8973088B1 (en) | 2011-05-24 | 2015-03-03 | Palo Alto Networks, Inc. | Policy enforcement using host information profile |
US8578443B2 (en) | 2011-06-01 | 2013-11-05 | Mobileasap, Inc. | Real-time mobile application management |
US20120317266A1 (en) | 2011-06-07 | 2012-12-13 | Research In Motion Limited | Application Ratings Based On Performance Metrics |
US20120317153A1 (en) | 2011-06-07 | 2012-12-13 | Apple Inc. | Caching responses for scoped and non-scoped domain name system queries |
US20120317172A1 (en) | 2011-06-13 | 2012-12-13 | International Business Machines Corporation | Mobile web app infrastructure |
US9107055B2 (en) | 2011-06-14 | 2015-08-11 | Sonifi Solutions, Inc. | Method and apparatus for pairing a mobile device to an output device |
US20120324568A1 (en) | 2011-06-14 | 2012-12-20 | Lookout, Inc., A California Corporation | Mobile web protection |
US8738765B2 (en) | 2011-06-14 | 2014-05-27 | Lookout, Inc. | Mobile device DNS optimization |
US9026814B2 (en) | 2011-06-17 | 2015-05-05 | Microsoft Technology Licensing, Llc | Power and load management based on contextual information |
JP5701715B2 (ja) * | 2011-08-12 | 2015-04-15 | 株式会社東芝 | エネルギー管理装置、電力管理システムおよびプログラム |
US9069943B2 (en) | 2011-08-15 | 2015-06-30 | Bank Of America Corporation | Method and apparatus for token-based tamper detection |
US8950002B2 (en) | 2011-08-15 | 2015-02-03 | Bank Of America Corporation | Method and apparatus for token-based access of related resources |
US9253197B2 (en) | 2011-08-15 | 2016-02-02 | Bank Of America Corporation | Method and apparatus for token-based real-time risk updating |
US9159065B2 (en) | 2011-08-15 | 2015-10-13 | Bank Of America Corporation | Method and apparatus for object security session validation |
US8726361B2 (en) | 2011-08-15 | 2014-05-13 | Bank Of America Corporation | Method and apparatus for token-based attribute abstraction |
US9166966B2 (en) | 2011-08-15 | 2015-10-20 | Bank Of America Corporation | Apparatus and method for handling transaction tokens |
US8789162B2 (en) | 2011-08-15 | 2014-07-22 | Bank Of America Corporation | Method and apparatus for making token-based access decisions |
US8752124B2 (en) | 2011-08-15 | 2014-06-10 | Bank Of America Corporation | Apparatus and method for performing real-time authentication using subject token combinations |
US8788881B2 (en) | 2011-08-17 | 2014-07-22 | Lookout, Inc. | System and method for mobile device push communications |
US8650649B1 (en) | 2011-08-22 | 2014-02-11 | Symantec Corporation | Systems and methods for determining whether to evaluate the trustworthiness of digitally signed files based on signer reputation |
TWI551333B (zh) | 2011-08-22 | 2016-10-01 | Cfph有限責任公司 | 涉及娛樂裝置和遊戲中風險的程式間通信或進程間通信的電腦和數位處理系統 |
US9059949B2 (en) | 2011-08-23 | 2015-06-16 | Bank Of America Corporation | Monitoring of regulated associates |
US8914893B2 (en) | 2011-08-24 | 2014-12-16 | Netqin Mobile (Beijing) Co. Ltd. | Method and system for mobile information security protection |
US8799647B2 (en) | 2011-08-31 | 2014-08-05 | Sonic Ip, Inc. | Systems and methods for application identification |
US9635028B2 (en) | 2011-08-31 | 2017-04-25 | Facebook, Inc. | Proxy authentication |
US9672355B2 (en) | 2011-09-16 | 2017-06-06 | Veracode, Inc. | Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security |
US8838982B2 (en) | 2011-09-21 | 2014-09-16 | Visa International Service Association | Systems and methods to secure user identification |
US9143529B2 (en) | 2011-10-11 | 2015-09-22 | Citrix Systems, Inc. | Modifying pre-existing mobile applications to implement enterprise security policies |
EP2767031A4 (en) | 2011-10-11 | 2015-07-08 | Tangome Inc | USER AUTHENTICATION OF DEVICE |
US9503460B2 (en) | 2011-10-13 | 2016-11-22 | Cisco Technology, Inc. | System and method for managing access for trusted and untrusted applications |
US8949993B2 (en) | 2011-10-17 | 2015-02-03 | Mcafee Inc. | Mobile risk assessment |
US20130097660A1 (en) | 2011-10-17 | 2013-04-18 | Mcafee, Inc. | System and method for whitelisting applications in a mobile network environment |
US8214910B1 (en) | 2011-10-26 | 2012-07-03 | Google Inc. | Obscuring an accelerometer signal |
US8612767B2 (en) | 2011-10-26 | 2013-12-17 | Google Inc. | Obscuring an accelerometer signal |
US8584243B2 (en) | 2011-11-09 | 2013-11-12 | Kaprica Security, Inc. | System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner |
GB2496841B (en) | 2011-11-15 | 2016-07-20 | Rosberg System As | Method of securing a computing device |
US8806641B1 (en) | 2011-11-15 | 2014-08-12 | Symantec Corporation | Systems and methods for detecting malware variants |
EP2595423B1 (en) | 2011-11-21 | 2018-01-03 | Swisscom AG | Application security evaluation system and method |
EP2783284B1 (en) * | 2011-11-22 | 2019-03-13 | Solano Labs, Inc. | System of distributed software quality improvement |
KR101143999B1 (ko) | 2011-11-22 | 2012-05-09 | 주식회사 안철수연구소 | Api 기반 어플리케이션 분석 장치 및 방법 |
US20130132330A1 (en) | 2011-11-22 | 2013-05-23 | Motorola Mobility, Inc. | Management of privacy settings for a user device |
US8897157B2 (en) | 2011-12-16 | 2014-11-25 | Maxlinear, Inc. | Method and apparatus for providing conditional access based on channel characteristics |
KR101430240B1 (ko) | 2011-12-19 | 2014-08-19 | 주식회사 케이티 | 어플리케이션 서명 장치 및 방법 |
US8799634B2 (en) * | 2011-12-23 | 2014-08-05 | Blackberry Limited | Method and system for temporarily reconfiguring system settings of a computing device during execution of a software application |
US8949243B1 (en) | 2011-12-28 | 2015-02-03 | Symantec Corporation | Systems and methods for determining a rating for an item from user reviews |
US9020925B2 (en) * | 2012-01-04 | 2015-04-28 | Trustgo Mobile, Inc. | Application certification and search system |
US8806643B2 (en) | 2012-01-25 | 2014-08-12 | Symantec Corporation | Identifying trojanized applications for mobile environments |
US8713684B2 (en) | 2012-02-24 | 2014-04-29 | Appthority, Inc. | Quantifying the risks of applications for mobile devices |
US9832211B2 (en) | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
US8683605B1 (en) | 2012-03-27 | 2014-03-25 | Adobe Systems Incorporated | Long-term validation of a digital signature status indicator |
EP2831825A4 (en) | 2012-03-30 | 2015-12-16 | Intel Corp | RATING A CUSTOMER'S SECURITY |
US9413893B2 (en) | 2012-04-05 | 2016-08-09 | Assurant, Inc. | System, method, apparatus, and computer program product for providing mobile device support services |
US9152784B2 (en) | 2012-04-18 | 2015-10-06 | Mcafee, Inc. | Detection and prevention of installation of malicious mobile applications |
US9253209B2 (en) | 2012-04-26 | 2016-02-02 | International Business Machines Corporation | Policy-based dynamic information flow control on mobile devices |
US8990948B2 (en) | 2012-05-01 | 2015-03-24 | Taasera, Inc. | Systems and methods for orchestrating runtime operational integrity |
US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US8756432B1 (en) | 2012-05-22 | 2014-06-17 | Symantec Corporation | Systems and methods for detecting malicious digitally-signed applications |
US8832841B2 (en) | 2012-05-22 | 2014-09-09 | Verizon Patent And Licensing Inc. | Mobile application security assessment |
US8763131B2 (en) | 2012-05-22 | 2014-06-24 | Verizon Patent And Licensing Inc. | Mobile application security score calculation |
US20130325779A1 (en) | 2012-05-30 | 2013-12-05 | Yahoo! Inc. | Relative expertise scores and recommendations |
KR102003850B1 (ko) | 2012-06-04 | 2019-07-25 | 삼성전자주식회사 | 단말의 애플리케이션 제공 방법 및 그 단말 |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
US20130333039A1 (en) | 2012-06-07 | 2013-12-12 | Mcafee, Inc. | Evaluating Whether to Block or Allow Installation of a Software Application |
US9349015B1 (en) | 2012-06-12 | 2016-05-24 | Galois, Inc. | Programmatically detecting collusion-based security policy violations |
US9218374B2 (en) | 2012-06-13 | 2015-12-22 | Commvault Systems, Inc. | Collaborative restore in a networked storage system |
US10409984B1 (en) | 2012-06-15 | 2019-09-10 | Square, Inc. | Hierarchical data security measures for a mobile device |
US9141783B2 (en) * | 2012-06-26 | 2015-09-22 | Ologn Technologies Ag | Systems, methods and apparatuses for the application-specific identification of devices |
US9256765B2 (en) | 2012-06-29 | 2016-02-09 | Kip Sign P1 Lp | System and method for identifying software changes |
US20140006618A1 (en) | 2012-06-29 | 2014-01-02 | William M. Pitts | Method of creating path signatures to facilitate the recovery from network link failures |
US20140006418A1 (en) | 2012-07-02 | 2014-01-02 | Andrea G. FORTE | Method and apparatus for ranking apps in the wide-open internet |
US9367865B2 (en) | 2012-07-03 | 2016-06-14 | Adam Phillip TREISER | System and method for providing consumers with access to an article while preventing theft thereof |
US9411962B2 (en) | 2012-07-18 | 2016-08-09 | Sequitur Labs Inc. | System and methods for secure utilization of attestation in policy-based decision making for mobile device management and security |
US8990933B1 (en) | 2012-07-24 | 2015-03-24 | Intuit Inc. | Securing networks against spear phishing attacks |
US8875303B2 (en) | 2012-08-02 | 2014-10-28 | Google Inc. | Detecting pirated applications |
WO2014036021A1 (en) * | 2012-08-28 | 2014-03-06 | Visa International Service Association | Secure device service enrollment |
KR101907529B1 (ko) | 2012-09-25 | 2018-12-07 | 삼성전자 주식회사 | 사용자 디바이스에서 어플리케이션 관리 방법 및 장치 |
US20150244737A1 (en) | 2012-09-25 | 2015-08-27 | Checkmarx Ltd. | Detecting malicious advertisements using source code analysis |
US20140096246A1 (en) | 2012-10-01 | 2014-04-03 | Google Inc. | Protecting users from undesirable content |
US9369476B2 (en) | 2012-10-18 | 2016-06-14 | Deutsche Telekom Ag | System for detection of mobile applications network behavior-netwise |
US8843627B1 (en) | 2012-10-19 | 2014-09-23 | Narus, Inc. | System and method for extracting signatures from seeded flow groups to classify network traffic |
EP2909775B1 (en) | 2012-10-19 | 2022-01-26 | McAfee, LLC | Mobile application management |
US20140244318A1 (en) | 2012-11-15 | 2014-08-28 | Wildfire Defense Systems, Inc. | System and method for collecting and assessing wildfire hazard data* |
KR101740256B1 (ko) | 2012-11-26 | 2017-06-09 | 한국전자통신연구원 | 모바일 앱 무결성 보증 장치 및 방법 |
TWI461952B (zh) | 2012-12-26 | 2014-11-21 | Univ Nat Taiwan Science Tech | 惡意程式偵測方法與系統 |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
US9374369B2 (en) | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US9137263B2 (en) | 2013-01-04 | 2015-09-15 | International Business Machines Corporation | Generating role-based access control policies based on discovered risk-averse roles |
CN103067401B (zh) | 2013-01-10 | 2015-07-01 | 天地融科技股份有限公司 | 密钥保护方法和系统 |
US8505102B1 (en) | 2013-01-14 | 2013-08-06 | Google Inc. | Detecting undesirable content |
US9191402B2 (en) | 2013-01-25 | 2015-11-17 | Opendns, Inc. | Domain classification based on client request behavior |
EP2765750B1 (en) | 2013-02-08 | 2015-10-14 | Nxp B.V. | Controlling application access to mobile device functions |
US9443073B2 (en) | 2013-08-08 | 2016-09-13 | Duo Security, Inc. | System and method for verifying status of an authentication device |
US9311480B2 (en) | 2013-03-15 | 2016-04-12 | Mcafee, Inc. | Server-assisted anti-malware client |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US20130254889A1 (en) | 2013-03-29 | 2013-09-26 | Sky Socket, Llc | Server-Side Restricted Software Compliance |
US9736147B1 (en) | 2013-04-08 | 2017-08-15 | Titanium Crypt, Inc. | Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD) |
GB2513168B (en) | 2013-04-18 | 2017-12-27 | F Secure Corp | Detecting unauthorised changes to website content |
US9307412B2 (en) | 2013-04-24 | 2016-04-05 | Lookout, Inc. | Method and system for evaluating security for an interactive service operation by a mobile device |
US20140359777A1 (en) | 2013-05-31 | 2014-12-04 | Fixmo, Inc. | Context-aware risk measurement mobile device management system |
WO2014204446A1 (en) | 2013-06-18 | 2014-12-24 | Empire Technology Development Llc | Remediating rogue applications |
US9021594B2 (en) | 2013-06-19 | 2015-04-28 | International Business Machines Corporation | Intelligent risk level grouping for resource access recertification |
US9185126B2 (en) | 2013-06-19 | 2015-11-10 | Verizon Patent And Licensing Inc. | Risk predictive engine |
RU2653985C2 (ru) * | 2013-06-28 | 2018-05-15 | Закрытое акционерное общество "Лаборатория Касперского" | Способ и система обнаружения вредоносного программного обеспечения путем контроля исполнения программного обеспечения запущенного по сценарию |
US9811830B2 (en) | 2013-07-03 | 2017-11-07 | Google Inc. | Method, medium, and system for online fraud prevention based on user physical location data |
SG10201801086RA (en) | 2013-08-08 | 2018-03-28 | Visa Int Service Ass | Methods and systems for provisioning mobile devices with payment credentials |
US9591003B2 (en) | 2013-08-28 | 2017-03-07 | Amazon Technologies, Inc. | Dynamic application security verification |
US9569618B2 (en) | 2013-08-28 | 2017-02-14 | Korea University Research And Business Foundation | Server and method for attesting application in smart device using random executable code |
US9202057B2 (en) | 2013-08-30 | 2015-12-01 | Symantec Corporation | Systems and methods for identifying private keys that have been compromised |
US9811435B2 (en) | 2013-09-03 | 2017-11-07 | Cisco Technology, Inc. | System for virtual machine risk monitoring |
US9294284B1 (en) | 2013-09-06 | 2016-03-22 | Symantec Corporation | Systems and methods for validating application signatures |
US20150074390A1 (en) | 2013-09-10 | 2015-03-12 | Opera Software Asa | Method and device for classifying risk level in user agent by combining multiple evaluations |
US10021169B2 (en) | 2013-09-20 | 2018-07-10 | Nuance Communications, Inc. | Mobile application daily user engagement scores and user profiles |
US9391968B2 (en) | 2013-09-24 | 2016-07-12 | At&T Intellectual Property I, L.P. | Scored factor-based authentication |
US20150135338A1 (en) | 2013-11-13 | 2015-05-14 | Fenwal, Inc. | Digital certificate with software enabling indicator |
EP2884784A1 (en) | 2013-12-11 | 2015-06-17 | Alcatel Lucent | Privacy ratings for applications of mobile terminals |
US20150186892A1 (en) | 2013-12-30 | 2015-07-02 | Tencent Technology (Shenzhen) Company Limited | Methods and systems for verifying a transaction |
EP2889799A1 (en) | 2013-12-30 | 2015-07-01 | Gemalto SA | Method for accessing a service and a corresponding server |
US9633355B2 (en) | 2014-01-07 | 2017-04-25 | Bank Of America Corporation | Knowledge based verification of the identity of a user |
US10506053B2 (en) | 2014-03-07 | 2019-12-10 | Comcast Cable Communications, Llc | Location aware security system |
GB2524010A (en) | 2014-03-10 | 2015-09-16 | Ibm | User authentication |
US20190294464A1 (en) | 2014-03-26 | 2019-09-26 | Dispersive Networks, Inc. | Dispersive storage area networks |
US20150324616A1 (en) | 2014-05-12 | 2015-11-12 | Sahal Alarabi | Security and protection device and methodology |
WO2015199719A1 (en) | 2014-06-27 | 2015-12-30 | Hewlett Packard Enterprise Development L.P. | Security policy based on risk |
US9565204B2 (en) | 2014-07-18 | 2017-02-07 | Empow Cyber Security Ltd. | Cyber-security system and methods thereof |
US20160027011A1 (en) | 2014-07-24 | 2016-01-28 | Panasonic Intellectual Property Management Co., Ltd. | Transaction terminal device, transaction processing method, and transaction processing system |
US20160080408A1 (en) | 2014-09-15 | 2016-03-17 | Lookingglass Cyber Solutions | Apparatuses, methods and systems for a cyber security assessment mechanism |
US10140615B2 (en) | 2014-09-22 | 2018-11-27 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
US20160119195A1 (en) | 2014-10-23 | 2016-04-28 | International Business Machines Corporation | Computing service level risk |
US9537886B1 (en) | 2014-10-23 | 2017-01-03 | A10 Networks, Inc. | Flagging security threats in web service requests |
US9888380B2 (en) | 2014-10-30 | 2018-02-06 | The Western Union Company | Methods and systems for validating mobile devices of customers via third parties |
US10057741B2 (en) | 2014-11-13 | 2018-08-21 | Branch Metrics, Inc. | Contextual deep linking of applications |
CN105763521B (zh) | 2014-12-18 | 2019-09-20 | 阿里巴巴集团控股有限公司 | 一种设备验证方法及装置 |
US10028102B2 (en) | 2014-12-26 | 2018-07-17 | Here Global B.V. | Localization of a device using multilateration |
CN105991590B (zh) | 2015-02-15 | 2019-10-18 | 阿里巴巴集团控股有限公司 | 一种验证用户身份的方法、系统、客户端及服务器 |
US20160344729A1 (en) | 2015-03-27 | 2016-11-24 | Thomas M. Slaight | Technologies for geolocation attestation of computing devices in a network path |
EP3289510B1 (en) | 2015-05-01 | 2020-06-17 | Lookout Inc. | Determining source of side-loaded software |
US10198182B2 (en) | 2015-05-31 | 2019-02-05 | Apple Inc. | Synchronization and verification groups among related devices |
US9913139B2 (en) | 2015-06-09 | 2018-03-06 | At&T Intellectual Property I, L.P. | Signal fingerprinting for authentication of communicating devices |
US9787709B2 (en) | 2015-06-17 | 2017-10-10 | Bank Of America Corporation | Detecting and analyzing operational risk in a network environment |
US9823843B2 (en) | 2015-07-23 | 2017-11-21 | Qualcomm Incorporated | Memory hierarchy monitoring systems and methods |
US9793939B2 (en) | 2015-08-05 | 2017-10-17 | International Business Machines Corporation | Automatic self-protection for a portable electronic device |
JP6531564B2 (ja) | 2015-08-26 | 2019-06-19 | 富士ゼロックス株式会社 | 情報処理システム |
US9942237B2 (en) | 2015-08-28 | 2018-04-10 | Bank Of America Corporation | Determining access requirements for online accounts based on characteristics of user devices |
US9904535B2 (en) | 2015-09-14 | 2018-02-27 | At&T Intellectual Property I, L.P. | Method and apparatus for distributing software |
WO2017079359A1 (en) | 2015-11-02 | 2017-05-11 | Dispersive Networks, Inc. | Virtual dispersive networking systems and methods |
US9807105B2 (en) | 2015-11-11 | 2017-10-31 | International Business Machines Corporation | Adaptive behavior profiling and anomaly scoring through continuous learning |
KR102457768B1 (ko) | 2015-11-20 | 2022-10-21 | 삼성전자주식회사 | 환경 정보에 기반한 전자 장치의 동작 방법 및 장치 |
US10009328B2 (en) | 2015-12-07 | 2018-06-26 | Mcafee, Llc | System, apparatus and method for providing privacy preserving interaction with a computing system |
US10348739B2 (en) | 2016-02-09 | 2019-07-09 | Ca, Inc. | Automated data risk assessment |
US10282726B2 (en) | 2016-03-03 | 2019-05-07 | Visa International Service Association | Systems and methods for domain restriction with remote authentication |
US20170262609A1 (en) | 2016-03-08 | 2017-09-14 | Lyra Health, Inc. | Personalized adaptive risk assessment service |
US10187366B2 (en) | 2016-04-28 | 2019-01-22 | Visa International Service Association | Systems and methods of user authentication for data services |
US10225740B2 (en) | 2016-05-12 | 2019-03-05 | Zscaler, Inc. | Multidimensional risk profiling for network access control of mobile devices through a cloud based security system |
US9888007B2 (en) | 2016-05-13 | 2018-02-06 | Idm Global, Inc. | Systems and methods to authenticate users and/or control access made by users on a computer network using identity services |
US20170359306A1 (en) | 2016-06-10 | 2017-12-14 | Sophos Limited | Network security |
US10027671B2 (en) | 2016-06-16 | 2018-07-17 | Ca, Inc. | Restricting access to content based on a posterior probability that a terminal signature was received from a previously unseen computer terminal |
US10237240B2 (en) | 2016-07-21 | 2019-03-19 | AT&T Global Network Services (U.K.) B.V. | Assessing risk associated with firewall rules |
US20180025344A1 (en) | 2016-07-25 | 2018-01-25 | Ca, Inc. | Communicating authentication information between mobile devices |
US20180054417A1 (en) | 2016-08-17 | 2018-02-22 | lnfersight LLC | Packet tracking |
US11144928B2 (en) | 2016-09-19 | 2021-10-12 | Early Warning Services, Llc | Authentication and fraud prevention in provisioning a mobile wallet |
US9948744B1 (en) | 2016-10-14 | 2018-04-17 | International Business Machines Corporation | Mobile device identification |
WO2018132211A1 (en) | 2017-01-12 | 2018-07-19 | Google Llc | Verified boot and key rotation |
US10652024B2 (en) | 2017-04-05 | 2020-05-12 | Ciena Corporation | Digital signature systems and methods for network path trace |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
-
2012
- 2012-12-03 US US13/692,806 patent/US9407443B2/en active Active
-
2013
- 2013-03-05 US US13/786,210 patent/US9215074B2/en active Active
- 2013-05-31 EP EP13800352.0A patent/EP2856320A4/en active Pending
- 2013-05-31 WO PCT/US2013/043569 patent/WO2013184501A1/en active Application Filing
- 2013-05-31 JP JP2015516077A patent/JP6135026B2/ja active Active
- 2013-12-13 US US14/105,950 patent/US10256979B2/en active Active
-
2014
- 2014-04-15 US US14/253,739 patent/US20150172146A1/en not_active Abandoned
- 2014-04-15 US US14/253,702 patent/US9992025B2/en active Active
- 2014-06-10 US US14/301,007 patent/US10419222B2/en active Active
-
2019
- 2019-08-05 US US16/532,304 patent/US11336458B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012027588A1 (en) * | 2010-08-25 | 2012-03-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
Also Published As
Publication number | Publication date |
---|---|
US20150172057A1 (en) | 2015-06-18 |
EP2856320A4 (en) | 2016-06-15 |
US9407443B2 (en) | 2016-08-02 |
US20150172146A1 (en) | 2015-06-18 |
US9215074B2 (en) | 2015-12-15 |
US11336458B2 (en) | 2022-05-17 |
US20150172060A1 (en) | 2015-06-18 |
JP6135026B2 (ja) | 2017-05-31 |
US20130326477A1 (en) | 2013-12-05 |
US9992025B2 (en) | 2018-06-05 |
WO2013184501A1 (en) | 2013-12-12 |
US20150169877A1 (en) | 2015-06-18 |
EP2856320A1 (en) | 2015-04-08 |
US20190363893A1 (en) | 2019-11-28 |
US20130326476A1 (en) | 2013-12-05 |
US10419222B2 (en) | 2019-09-17 |
US10256979B2 (en) | 2019-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6135026B2 (ja) | コンピュータ装置上のソフトウェアアプリケーションのコンポーネント分析 | |
US10498769B2 (en) | Monitoring a privacy rating for an application or website | |
US11755770B2 (en) | Dynamic management of data with context-based processing | |
US11537744B2 (en) | Sharing user information with and between bots | |
US9813454B2 (en) | Cybersecurity training system with automated application of branded content | |
US20220174494A1 (en) | Determining a security state based on communication with an authenticity server | |
US9940454B2 (en) | Determining source of side-loaded software using signature of authorship | |
US8984151B1 (en) | Content developer abuse detection | |
US20180005276A1 (en) | User controlled profiles | |
Montgomery | A Privacy Risk Scoring Framework for Mobile | |
Derks et al. | Fair Privacy: Improving Usability of the Android Permission System | |
Anwar | Privacy requirements of social networking services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160310 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20160310 |
|
A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20160310 |
|
A975 | Report on accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A971005 Effective date: 20160404 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20160425 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160712 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20160824 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20160930 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170222 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20170403 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20170407 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6135026 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |