JP2016513311A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2016513311A5 JP2016513311A5 JP2015556027A JP2015556027A JP2016513311A5 JP 2016513311 A5 JP2016513311 A5 JP 2016513311A5 JP 2015556027 A JP2015556027 A JP 2015556027A JP 2015556027 A JP2015556027 A JP 2015556027A JP 2016513311 A5 JP2016513311 A5 JP 2016513311A5
- Authority
- JP
- Japan
- Prior art keywords
- location
- processes
- behavior
- determining
- monitored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims 48
- 230000006399 behavior Effects 0.000 claims 18
- 238000012544 monitoring process Methods 0.000 claims 8
- 230000004044 response Effects 0.000 claims 3
- 238000004891 communication Methods 0.000 claims 1
- 238000010801 machine learning Methods 0.000 claims 1
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/757,268 | 2013-02-01 | ||
| US13/757,268 US9330256B2 (en) | 2013-02-01 | 2013-02-01 | Location based process-monitoring |
| PCT/US2014/010947 WO2014120409A1 (en) | 2013-02-01 | 2014-01-10 | Location based process-monitoring |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2016513311A JP2016513311A (ja) | 2016-05-12 |
| JP2016513311A5 true JP2016513311A5 (enExample) | 2017-10-26 |
Family
ID=50030516
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015556027A Pending JP2016513311A (ja) | 2013-02-01 | 2014-01-10 | ロケーションベースの処理監視 |
Country Status (6)
| Country | Link |
|---|---|
| US (2) | US9330256B2 (enExample) |
| EP (1) | EP2951752B1 (enExample) |
| JP (1) | JP2016513311A (enExample) |
| KR (1) | KR20150113100A (enExample) |
| CN (1) | CN104937604A (enExample) |
| WO (1) | WO2014120409A1 (enExample) |
Families Citing this family (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9698991B2 (en) | 2013-03-15 | 2017-07-04 | Ologn Technologies Ag | Systems, methods and apparatuses for device attestation based on speed of computation |
| US10177915B2 (en) | 2013-03-15 | 2019-01-08 | Ologn Technologies Ag | Systems, methods and apparatuses for device attestation based on speed of computation |
| US9456344B2 (en) | 2013-03-15 | 2016-09-27 | Ologn Technologies Ag | Systems, methods and apparatuses for ensuring proximity of communication device |
| KR101794116B1 (ko) | 2013-03-18 | 2017-11-06 | 더 트러스티스 오브 컬럼비아 유니버시티 인 더 시티 오브 뉴욕 | 하드웨어 특징들을 사용한 이상 프로세스들의 비감시된 검출 |
| WO2014149080A1 (en) * | 2013-03-18 | 2014-09-25 | The Trustees Of Columbia University In The City Of New York | Detection of anomalous program execution using hardware-based micro-architectural data |
| EP2995061B1 (en) | 2013-05-10 | 2018-04-18 | OLogN Technologies AG | Ensuring proximity of wifi communication devices |
| KR101752305B1 (ko) * | 2013-05-30 | 2017-06-29 | 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 | 무선 통신을 제공하기 위한 스킴 |
| US9455998B2 (en) | 2013-09-17 | 2016-09-27 | Ologn Technologies Ag | Systems, methods and apparatuses for prevention of relay attacks |
| US10027689B1 (en) * | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
| US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
| US10028084B2 (en) * | 2015-02-10 | 2018-07-17 | Qualcomm Incorporated | Adaptive position indicator |
| US20180011772A1 (en) * | 2015-03-31 | 2018-01-11 | Hewlett-Packard Development Company, L.P. | Peripheral device operation |
| US9606633B2 (en) * | 2015-05-08 | 2017-03-28 | John W. Downey | Method and apparatus for input to electronic devices |
| CN106332252A (zh) * | 2015-07-07 | 2017-01-11 | 手持产品公司 | 基于单元信号的wifi启用 |
| US10037419B2 (en) | 2016-07-11 | 2018-07-31 | Richard James Hallock | System, method, and apparatus for personal identification |
| US10216914B2 (en) | 2015-08-18 | 2019-02-26 | Richard James Hallock | System, method, and apparatus for personal identification |
| US11102648B2 (en) | 2015-08-18 | 2021-08-24 | Proteqsit Llc | System, method, and apparatus for enhanced personal identification |
| US10097560B1 (en) | 2016-03-08 | 2018-10-09 | Symantec Corporation | Systems and methods for automatically adjusting user access permissions based on beacon proximity |
| US10783397B2 (en) | 2016-06-29 | 2020-09-22 | Intel Corporation | Network edge device with image thresholding |
| US10664879B2 (en) * | 2016-07-07 | 2020-05-26 | Sony Corporation | Electronic device, apparatus and system |
| US10452840B2 (en) * | 2016-07-14 | 2019-10-22 | Qualcomm Incorporated | Devices and methods for classifying an execution session |
| US10878256B2 (en) * | 2016-10-07 | 2020-12-29 | Aisin Aw Co., Ltd. | Travel assistance device and computer program |
| US10878102B2 (en) * | 2017-05-16 | 2020-12-29 | Micro Focus Llc | Risk scores for entities |
| US11494502B2 (en) * | 2018-10-25 | 2022-11-08 | Microsoft Technology Licensing, Llc | Privacy awareness for personal assistant communications |
| US11023576B2 (en) * | 2018-11-28 | 2021-06-01 | International Business Machines Corporation | Detecting malicious activity on a computer system |
| US10638404B1 (en) * | 2018-12-13 | 2020-04-28 | Securus Technologies, Inc. | Controlled-environment facility mobile device location tracking |
| US12072405B2 (en) | 2021-11-08 | 2024-08-27 | Nightwing Group, Llc | Context-aware, intelligent beaconing |
| US12177229B2 (en) * | 2022-02-25 | 2024-12-24 | Bank Of America Corporation | Detecting and preventing botnet attacks using client-specific event payloads |
| CN116644421A (zh) * | 2023-07-19 | 2023-08-25 | 北京小米移动软件有限公司 | 一种定位引擎调用信息的获取方法及装置 |
Family Cites Families (45)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6236365B1 (en) * | 1996-09-09 | 2001-05-22 | Tracbeam, Llc | Location of a mobile station using a plurality of commercial wireless infrastructures |
| US7054614B1 (en) | 2000-08-07 | 2006-05-30 | Denso Corporation | Context privacy for delivery of context-aware content for wireless terminals |
| US7428411B2 (en) | 2000-12-19 | 2008-09-23 | At&T Delaware Intellectual Property, Inc. | Location-based security rules |
| US7051196B2 (en) | 2001-12-05 | 2006-05-23 | Hewlett-Packard Development Company, L.P. | Location-based security for a portable computer |
| US7591020B2 (en) * | 2002-01-18 | 2009-09-15 | Palm, Inc. | Location based security modification system and method |
| US8020192B2 (en) | 2003-02-28 | 2011-09-13 | Michael Wright | Administration of protection of data accessible by a mobile device |
| WO2005081110A2 (en) * | 2004-02-13 | 2005-09-01 | Memento Inc. | System and method for instrumenting a software application |
| US7788281B2 (en) * | 2004-03-12 | 2010-08-31 | International Business Machines Corporation | Evaluation of spatial rules over a mobile population |
| US20050277428A1 (en) * | 2004-05-13 | 2005-12-15 | International Business Machines Corporation | Location-based control of wireless communications device features |
| US8108929B2 (en) * | 2004-10-19 | 2012-01-31 | Reflex Systems, LLC | Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms |
| JP2006127293A (ja) | 2004-10-29 | 2006-05-18 | Toshiba Corp | 情報処理装置および動作制御方法 |
| US20060206941A1 (en) * | 2005-03-08 | 2006-09-14 | Praesidium Technologies, Ltd. | Communications system with distributed risk management |
| US20070129084A1 (en) * | 2005-12-05 | 2007-06-07 | Nortel Networks Limited | Creating and recognizing user-defined locations using communication terminals |
| US20080014964A1 (en) * | 2006-07-12 | 2008-01-17 | Loc-Aid Technologies, Inc. | System and method for generating use statistics for location-based applications |
| US8126456B2 (en) * | 2007-01-17 | 2012-02-28 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
| US8712396B2 (en) * | 2007-01-17 | 2014-04-29 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
| US7996005B2 (en) * | 2007-01-17 | 2011-08-09 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
| US7633438B2 (en) * | 2007-01-29 | 2009-12-15 | Research In Motion Limited | Method of downloading ephemeris data based on user activity |
| US8380179B2 (en) * | 2007-03-30 | 2013-02-19 | Samsung Electronics Co., Ltd. | System and method for learning based device management |
| JP2009070073A (ja) * | 2007-09-12 | 2009-04-02 | Sumitomo Electric Ind Ltd | 情報処理装置及びエージェントコンピュータプログラム |
| US8682960B2 (en) * | 2008-03-14 | 2014-03-25 | Nokia Corporation | Methods, apparatuses, and computer program products for providing filtered services and content based on user context |
| US9031536B2 (en) * | 2008-04-02 | 2015-05-12 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
| US8289130B2 (en) * | 2009-02-19 | 2012-10-16 | Apple Inc. | Systems and methods for identifying unauthorized users of an electronic device |
| US8271057B2 (en) * | 2009-03-16 | 2012-09-18 | Waze Mobile Ltd. | Condition-based activation, shut-down and management of applications of mobile devices |
| US8832828B2 (en) * | 2009-03-26 | 2014-09-09 | Sophos Limited | Dynamic scanning based on compliance metadata |
| US8412647B2 (en) * | 2009-06-02 | 2013-04-02 | Wavemarket, Inc. | Behavior monitoring system and method |
| US8254957B2 (en) * | 2009-06-16 | 2012-08-28 | Intel Corporation | Context-based limitation of mobile device operation |
| US8131846B1 (en) * | 2009-07-06 | 2012-03-06 | Symantec Corporation | Global, location-aware computer security |
| US8607340B2 (en) * | 2009-07-21 | 2013-12-10 | Sophos Limited | Host intrusion prevention system using software and user behavior analysis |
| US8776218B2 (en) * | 2009-07-21 | 2014-07-08 | Sophos Limited | Behavioral-based host intrusion prevention system |
| US20110087495A1 (en) * | 2009-10-14 | 2011-04-14 | Bank Of America Corporation | Suspicious entity investigation and related monitoring in a business enterprise environment |
| US20110099037A1 (en) * | 2009-10-27 | 2011-04-28 | Useful Networks, Inc. | Location-Based, Time Sensitive Wireless Exchange |
| US8800034B2 (en) * | 2010-01-26 | 2014-08-05 | Bank Of America Corporation | Insider threat correlation tool |
| US20110209215A1 (en) * | 2010-02-22 | 2011-08-25 | Hazem Kabbara | Intelligent Network Security Resource Deployment System |
| CN102281513B (zh) * | 2010-06-13 | 2013-12-11 | 电信科学技术研究院 | 一种机器类通信监测处理方法及设备 |
| US8606260B2 (en) * | 2010-08-18 | 2013-12-10 | Apple Inc. | Location-based profile |
| US8789144B2 (en) | 2010-10-06 | 2014-07-22 | Citrix Systems, Inc. | Mediating resource access based on a physical location of a mobile device |
| US9215244B2 (en) * | 2010-11-18 | 2015-12-15 | The Boeing Company | Context aware network security monitoring for threat detection |
| US9015843B2 (en) * | 2010-12-03 | 2015-04-21 | Microsoft Corporation | Predictive malware threat mitigation |
| US8994880B2 (en) * | 2011-03-25 | 2015-03-31 | Sony Corporation | System and methods for automatic power saving via device location identification |
| US8677497B2 (en) * | 2011-10-17 | 2014-03-18 | Mcafee, Inc. | Mobile risk assessment |
| US9058486B2 (en) * | 2011-10-18 | 2015-06-16 | Mcafee, Inc. | User behavioral risk assessment |
| US9832211B2 (en) * | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
| US9092616B2 (en) * | 2012-05-01 | 2015-07-28 | Taasera, Inc. | Systems and methods for threat identification and remediation |
| US20140172478A1 (en) * | 2012-12-13 | 2014-06-19 | TCT Hungqary Kft. | Methods and system for automatic work logging and tracking |
-
2013
- 2013-02-01 US US13/757,268 patent/US9330256B2/en not_active Expired - Fee Related
-
2014
- 2014-01-10 CN CN201480005775.6A patent/CN104937604A/zh active Pending
- 2014-01-10 JP JP2015556027A patent/JP2016513311A/ja active Pending
- 2014-01-10 WO PCT/US2014/010947 patent/WO2014120409A1/en not_active Ceased
- 2014-01-10 KR KR1020157023317A patent/KR20150113100A/ko not_active Abandoned
- 2014-01-10 EP EP14702138.0A patent/EP2951752B1/en not_active Not-in-force
-
2016
- 2016-04-01 US US15/088,556 patent/US20160217281A1/en not_active Abandoned
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2016513311A5 (enExample) | ||
| WO2015163953A3 (en) | Behavioral analytics driven host-based malicious behavior and data exfiltration disruption | |
| RU2016144028A (ru) | Человекоподобный робот со способностью автономного функцинирования | |
| JP2015525382A5 (enExample) | ||
| WO2016090379A3 (en) | Detection of print-based spoofing attacks | |
| SG10201805424RA (en) | User authentication method, device for executing same, and recording medium for storing same | |
| BR112018006327A2 (pt) | sistema e método para usar um símbolo como instrução para iniciar a transferência de informação de identidade autenticada a um sistema alvo | |
| JP2015506617A5 (enExample) | ||
| JP2016513434A5 (enExample) | ||
| JP2016514313A5 (enExample) | ||
| WO2016022705A8 (en) | Cyber security posture validation platform | |
| MX2016011044A (es) | Realizacion de acciones asociadas con presencia de individuo. | |
| JP2014225231A5 (enExample) | ||
| IL226747B (en) | A system and method for studying malware detection | |
| MX2016014224A (es) | Configuracion de flujos de trabajo en un dispositivo anfitrion que funciona en un sistema de control de procesos. | |
| JP2016513324A5 (enExample) | ||
| RU2015139025A (ru) | Способ и устройство для защиты терминальной аппаратуры и терминальная аппаратура | |
| JP2015153027A5 (enExample) | ||
| CN111131283A (zh) | 恶意软件检测系统攻击防止 | |
| RU2016147356A (ru) | Отменяемая защита возможных конфиденциальных элементов данных | |
| WO2015029037A3 (en) | Method and system handling malware | |
| WO2015142948A3 (en) | Methods and systems of preventing an automated routine from passing a challenge-response test | |
| WO2015127170A3 (en) | Method and system for providing a robust and efficient virtual asset vulnerability management and verification service | |
| JP2015194947A5 (enExample) | ||
| JP2016530609A5 (enExample) |