JP5632915B2 - フィードバックに基づいて通信ネットワークのセキュリティ処置を適応させるためのシステム、方法およびコンピュータプログラム製品 - Google Patents
フィードバックに基づいて通信ネットワークのセキュリティ処置を適応させるためのシステム、方法およびコンピュータプログラム製品 Download PDFInfo
- Publication number
- JP5632915B2 JP5632915B2 JP2012520759A JP2012520759A JP5632915B2 JP 5632915 B2 JP5632915 B2 JP 5632915B2 JP 2012520759 A JP2012520759 A JP 2012520759A JP 2012520759 A JP2012520759 A JP 2012520759A JP 5632915 B2 JP5632915 B2 JP 5632915B2
- Authority
- JP
- Japan
- Prior art keywords
- security
- trust mediator
- communication network
- trust
- related data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Description
Claims (18)
- 通信ネットワークに関するセキュリティ関連データに基づくセキュリティシステムを適応するための方法であって、
複数のトラストメディエイターエージェントによって、複数の通信ネットワークモジュールに関係するセキュリティ関連データを収集するステップであって、複数のトラストメディエイターエージェントが複数の通信ネットワークモジュールとそれぞれ関係しており、複数の通信ネットワークモジュールのうちの少なくとも1つが、金融取引を完了するためのリクエストを作るように作動可能な移動通信デバイスであり、セキュリティ関連データが、1又はそれ以上のセンサによって、それに相応して、生成された1以上のリスク変数に関して収集され、移動通信デバイスと関連した位置データに基づいてトラストメディエイターによって選択され、トラストメディエイターによって選択された1以上のリスク変数に関するセキュリティ関連データが移動通信デバイスと関連した位置データに基づいてトラストメディエイターによって判断されたタイムインターバルで周期的に収集される、ことを特徴とする収集するステップと、
複数のトラストメディエイターエージェントによって、通信ネットワークにわたってトラストメディエイターにセキュリティ関連データを送信するステップと、
メモリにストアされた所定のルールおよびトラストメディエイターエージェントによって送信されたセキュリティ関連データの少なくとも1つに基づいて、トラストメディエイターによって、1以上のセキュリティセーフガードに対する修正を判断するステップと、
トラストメディエイターによって、修正に対応する命令を、通信ネットワークにわたって複数のトラストメディエイターエージェントの少なくとも1つに送信するステップと
を有することを特徴とする方法。 - トラストメディエイターによって、1以上のセキュリティセーフガードによって提供されたセーフガード時間が、アタックタイムおよびユーザ予想の少なくとも1つを満たすかどうかを判断するステップを更に有することを特徴とする請求項1に記載の方法。
- 前記セキュリティ関連データが、複数の通信ネットワークモジュールの少なくとも1つに対応する脅威データと、ユーザ予想データと、現在稼動しているセキュリティセーフガードのリストと、現在稼動しているセキュリティセーフガードによって提供される保護時間との少なくとも1つを含むことを特徴とする請求項1に記載の方法。
- 前記修正に対応する命令が、通信ネットワークにわたって移動通信デバイスから受信したセキュリティセーフガード修正リクエストに基づいていることを特徴とする請求項1に記載の方法。
- セキュリティ関連データを収集するステップおよび送信するステップの少なくとも1つが、所定の繰返しレートおよびイベントの検出の少なくとも1つに基づいて複数のトラストメディエイターエージェントによって実行されることを特徴とする請求項1に記載の方法。
- 前記イベントが、複数のトラストメディエイターエージェントの少なくとも1つによって、移動通信デバイスからの金融取引を完了するためのリクエストを受信することを含むことを特徴とする請求項5に記載の方法。
- 通信ネットワークに関して適応できるセキュリティシステムであって、
通信ネットワークにわたって相互接続され、金融取引を完了するためのリクエストを作るように作動可能な移動通信デバイスを包含する、複数の通信ネットワークモジュールと、
複数の通信ネットワークモジュールにそれぞれ結合された複数のトラストメディエイターエージェントであって、トラストメディエイターエージェントが、複数の通信ネットワークモジュールに関連して、1又はそれ以上のセンサによって、それに相応して、生成された1以上のリスク変数に関するセキュリティ関連データを収集するように構成されていることを特徴とする、複数のトラストメディエイターエージェントと、
移動通信デバイスと関連した位置データに基づいて1以上のリスク変数を選択し、
移動通信デバイスと関連した位置データに基づいてタイムインターバルを判断し、
複数のトラストメディエイターエージェントからセキュリティ関連データを通信ネットワークにわたって受信し、
トラストメディエイターエージェントおよびメモリにストアされた所定のルールによって送信された少なくとも1つのセキュリティ関連データに基づいて、1以上のセキュリティセーフガードに対する修正を判断し、
通信ネットワークにわたって複数のトラストメディエイターエージェントの少なくとも1つに対する修正に対応する命令を送信する
ように構成され、メモリに結合されたトラストメディエイターと
を有することを特徴とするシステム。 - 前記トラストメディエイターが、1以上のセキュリティセーフガードによって提供されるセーフガード時間がアタックタイムおよびユーザ予想の少なくとも1つを満たすかどうか判断するように更に構成されることを特徴とする請求項7に記載のシステム。
- 前記セキュリティ関連データが、複数の通信ネットワークモジュールの少なくとも1つに対応する脅威データと、ユーザ予想データと、現在稼動しているセキュリティセーフガードのリストと、現在稼動しているセキュリティセーフガードによって提供される保護時間との少なくとも1つを含むことを特徴とする請求項7に記載のシステム。
- 前記修正に対応する命令が、通信ネットワークにわたって移動通信デバイスから受信したセキュリティセーフガード修正リクエストに基づいていることを特徴とする請求項7に記載のシステム。
- 複数のトラストメディエイターエージェントが、所定の繰返しレートおよびイベントの検出の少なくとも1つに基づいてセキュリティ関連データをトラストメディエイターに送信し、収集するように構成されることを特徴とする請求項7に記載のシステム。
- 前記イベントが、複数のトラストメディエイターエージェントの少なくとも1つによって、移動通信デバイスからの金融取引を完了するためのリクエストを受信することを含むことを特徴とする請求項11に記載のシステム。
- コンピュータシステムによって以下のステップを実行させるときの命令を包含する、命令のシーケンスがストアされた非一時的なコンピュータ読取可能媒体であって、
複数のトラストメディエイターエージェントによって、複数の通信ネットワークモジュールに関係するセキュリティ関連データを収集するステップであって、複数のトラストメディエイターエージェントが複数の通信ネットワークモジュールとそれぞれ関係しており、複数の通信ネットワークモジュールのうちの少なくとも1つが、金融取引を完了するためのリクエストを作るように作動可能な移動通信デバイスであり、セキュリティ関連データが、1又はそれ以上のセンサによって、それに相応して、生成された1以上のリスク変数に関して収集され、移動通信デバイスと関連した位置データに基づいてトラストメディエイターによって選択され、トラストメディエイターによって選択された1以上のリスク変数に関するセキュリティ関連データが移動通信デバイスと関連した位置データに基づいてトラストメディエイターによって判断されたタイムインターバルで周期的に収集される、ことを特徴とする収集するステップと、
複数のトラストメディエイターエージェントによって、通信ネットワークにわたってトラストメディエイターにセキュリティ関連データを送信するステップと、
メモリにストアされた所定のルールおよびトラストメディエイターエージェントによって送信されたセキュリティ関連データの少なくとも1つに基づいて、トラストメディエイターによって、1以上のセキュリティセーフガードに対する修正を判断するステップと、
トラストメディエイターによって、修正に対応する命令を、通信ネットワークにわたって複数のトラストメディエイターエージェントの少なくとも1つに送信するステップと
を実行するためにストアされたコンピュータ読取可能媒体。 - 命令のシーケンスが更に、コンピュータシステムによって実行される命令を包含し、
トラストメディエイターによって、1以上のセキュリティセーフガードによって提供されたセーフガード時間が、アタックタイムおよびユーザ予想の少なくとも1つを満たすかどうかを判断するステップを実行するためにストアされたことを特徴とする請求項13に記載の非一時的なコンピュータ読取可能媒体。 - 前記セキュリティ関連データが、複数の通信ネットワークモジュールの少なくとも1つに対応する脅威データと、ユーザ予想データと、現在稼動しているセキュリティセーフガードのリストと、現在稼動しているセキュリティセーフガードによって提供される保護時間との少なくとも1つを含むことを特徴とする請求項13に記載の非一時的なコンピュータ読取可能媒体。
- 前記修正に対応する命令が、通信ネットワークにわたって移動通信デバイスから受信したセキュリティセーフガード修正リクエストに基づいていることを特徴とする請求項13に記載の非一時的なコンピュータ読取可能媒体。
- セキュリティ関連データを収集するステップおよび送信するステップの少なくとも1つが、所定の繰返しレートおよびイベントの検出の少なくとも1つに基づいて複数のトラストメディエイターエージェントによって実行されることを特徴とする請求項13に記載の非一時的なコンピュータ読取可能媒体。
- 前記イベントが、複数のトラストメディエイターエージェントの少なくとも1つによって、移動通信デバイスからの金融取引を完了するためのリクエストを受信することを含むことを特徴とする請求項17に記載の非一時的なコンピュータ読取可能媒体。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/504,828 | 2009-07-17 | ||
US12/504,828 US8752142B2 (en) | 2009-07-17 | 2009-07-17 | Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback |
PCT/US2010/042043 WO2011008902A1 (en) | 2009-07-17 | 2010-07-15 | Systems, methods, and computer program products for adapting security measures of a communication network based on feedback |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2012533935A JP2012533935A (ja) | 2012-12-27 |
JP5632915B2 true JP5632915B2 (ja) | 2014-11-26 |
Family
ID=43449778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2012520759A Active JP5632915B2 (ja) | 2009-07-17 | 2010-07-15 | フィードバックに基づいて通信ネットワークのセキュリティ処置を適応させるためのシステム、方法およびコンピュータプログラム製品 |
Country Status (8)
Country | Link |
---|---|
US (5) | US8752142B2 (ja) |
EP (1) | EP2454667B1 (ja) |
JP (1) | JP5632915B2 (ja) |
CN (2) | CN104601584B (ja) |
CA (1) | CA2767862C (ja) |
HK (2) | HK1171526A1 (ja) |
MX (1) | MX2012000606A (ja) |
WO (1) | WO2011008902A1 (ja) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8752142B2 (en) | 2009-07-17 | 2014-06-10 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback |
EP2515496A4 (en) * | 2009-12-15 | 2013-07-03 | Telefonica Sa | SYSTEM AND METHOD OF TRUSTING TRUST BETWEEN DATA NETWORKING USERS |
US8621636B2 (en) | 2009-12-17 | 2013-12-31 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for collecting and reporting sensor data in a communication network |
US9756076B2 (en) | 2009-12-17 | 2017-09-05 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transactions |
US8650129B2 (en) | 2010-01-20 | 2014-02-11 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transaction data in transit |
US8850539B2 (en) | 2010-06-22 | 2014-09-30 | American Express Travel Related Services Company, Inc. | Adaptive policies and protections for securing financial transaction data at rest |
US8924296B2 (en) | 2010-06-22 | 2014-12-30 | American Express Travel Related Services Company, Inc. | Dynamic pairing system for securing a trusted communication channel |
US10360625B2 (en) | 2010-06-22 | 2019-07-23 | American Express Travel Related Services Company, Inc. | Dynamically adaptive policy management for securing mobile financial transactions |
US20120072990A1 (en) * | 2010-09-22 | 2012-03-22 | The Boeing Company | Cost function for data transmission |
US8381282B1 (en) | 2011-09-30 | 2013-02-19 | Kaspersky Lab Zao | Portable security device and methods for maintenance of authentication information |
US8490175B2 (en) * | 2011-12-06 | 2013-07-16 | Telcordia Technologies, Inc. | Security method for mobile ad hoc networks with efficient flooding mechanism using layer independent passive clustering (LIPC) |
US9390243B2 (en) * | 2012-02-28 | 2016-07-12 | Disney Enterprises, Inc. | Dynamic trust score for evaluating ongoing online relationships |
US9351163B2 (en) | 2012-12-26 | 2016-05-24 | Mcafee, Inc. | Automatic sanitization of data on a mobile device in a network environment |
US9444824B1 (en) * | 2014-02-28 | 2016-09-13 | Intuit Inc. | Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system |
WO2015160357A1 (en) * | 2014-04-18 | 2015-10-22 | Hewlett-Packard Development Company, L.P. | Rating threat submitter |
US10521791B2 (en) | 2014-05-07 | 2019-12-31 | Mastercard International Incorporated | Systems and methods for communicating liability acceptance with payment card transactions |
US9338137B1 (en) | 2015-02-13 | 2016-05-10 | AO Kaspersky Lab | System and methods for protecting confidential data in wireless networks |
CN104901957B (zh) * | 2015-05-21 | 2018-07-10 | 北京智付融汇科技有限公司 | 电子令牌设备初始化方法及装置 |
US10027717B2 (en) * | 2015-06-26 | 2018-07-17 | Mcafee, Llc | Peer-to-peer group vigilance |
US10580006B2 (en) * | 2015-07-13 | 2020-03-03 | Mastercard International Incorporated | System and method of managing data injection into an executing data processing system |
US10348787B2 (en) | 2015-08-27 | 2019-07-09 | The Boeing Company | Flight data recorder streaming (FDRS) solution |
US20170149828A1 (en) | 2015-11-24 | 2017-05-25 | International Business Machines Corporation | Trust level modifier |
US11044266B2 (en) | 2016-02-26 | 2021-06-22 | Micro Focus Llc | Scan adaptation during scan execution |
US10482468B2 (en) | 2016-11-11 | 2019-11-19 | Mastercard International Incorporated | Systems and methods of improved electronic messaging |
JP7091354B2 (ja) * | 2017-02-27 | 2022-06-27 | イヴァンティ,インコーポレイテッド | コンピュータセキュリティリスクのコンテキストベースの軽減のためのシステム及び方法 |
WO2019097382A1 (en) | 2017-11-15 | 2019-05-23 | Xm Cyber Ltd. | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
GB2575667A (en) * | 2018-07-19 | 2020-01-22 | British Telecomm | Dynamic data encryption |
EP3811561B8 (en) | 2018-07-19 | 2022-02-16 | British Telecommunications public limited company | Dynamic data encryption |
CA3107076A1 (en) * | 2018-07-25 | 2020-01-30 | Resilience Financing Inc. | A business method, apparatus and system for monitoring quantitative and qualitative environmental analytics and managing associated financial transactions |
JP7016777B2 (ja) | 2018-08-23 | 2022-02-07 | 株式会社ミツバ | センサユニットの製造方法 |
US11050773B2 (en) * | 2019-01-03 | 2021-06-29 | International Business Machines Corporation | Selecting security incidents for advanced automatic analysis |
US11283827B2 (en) | 2019-02-28 | 2022-03-22 | Xm Cyber Ltd. | Lateral movement strategy during penetration testing of a networked system |
US11206281B2 (en) | 2019-05-08 | 2021-12-21 | Xm Cyber Ltd. | Validating the use of user credentials in a penetration testing campaign |
US10880326B1 (en) | 2019-08-01 | 2020-12-29 | Xm Cyber Ltd. | Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic |
US11275585B2 (en) * | 2019-09-12 | 2022-03-15 | Intuit Inc. | System and method for approximating branching operations for use with data encrypted by fully homomorphic encryption (FHE) |
US11005878B1 (en) | 2019-11-07 | 2021-05-11 | Xm Cyber Ltd. | Cooperation between reconnaissance agents in penetration testing campaigns |
US11575700B2 (en) | 2020-01-27 | 2023-02-07 | Xm Cyber Ltd. | Systems and methods for displaying an attack vector available to an attacker of a networked system |
US11582256B2 (en) | 2020-04-06 | 2023-02-14 | Xm Cyber Ltd. | Determining multiple ways for compromising a network node in a penetration testing campaign |
Family Cites Families (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US633546A (en) * | 1899-04-13 | 1899-09-19 | William O Emery | Mail-bag fastener. |
US4796025A (en) * | 1985-06-04 | 1989-01-03 | Simplex Time Recorder Co. | Monitor/control communication net with intelligent peripherals |
US5053956A (en) * | 1985-06-17 | 1991-10-01 | Coats Viyella | Interactive system for retail transactions |
US5819226A (en) * | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
US6571279B1 (en) * | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US5784566A (en) * | 1996-01-11 | 1998-07-21 | Oracle Corporation | System and method for negotiating security services and algorithms for communication across a computer network |
US6088450A (en) * | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US5796942A (en) | 1996-11-21 | 1998-08-18 | Computer Associates International, Inc. | Method and apparatus for automated network-wide surveillance and security breach intervention |
US6484182B1 (en) * | 1998-06-12 | 2002-11-19 | International Business Machines Corporation | Method and apparatus for publishing part datasheets |
US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6530024B1 (en) * | 1998-11-20 | 2003-03-04 | Centrax Corporation | Adaptive feedback security system and method |
US6744780B1 (en) * | 1999-10-27 | 2004-06-01 | Lucent Technologies Inc. | Method and system for adaptively managing a communications network |
JP2001195051A (ja) * | 2000-01-12 | 2001-07-19 | Konami Co Ltd | 画像表示用データ生成装置及び記録媒体 |
US7113994B1 (en) * | 2000-01-24 | 2006-09-26 | Microsoft Corporation | System and method of proxy authentication in a secured network |
US6611863B1 (en) | 2000-06-05 | 2003-08-26 | Intel Corporation | Automatic device assignment through programmable device discovery for policy based network management |
US6961858B2 (en) * | 2000-06-16 | 2005-11-01 | Entriq, Inc. | Method and system to secure content for distribution via a network |
US7107462B2 (en) * | 2000-06-16 | 2006-09-12 | Irdeto Access B.V. | Method and system to store and distribute encryption keys |
US8010469B2 (en) * | 2000-09-25 | 2011-08-30 | Crossbeam Systems, Inc. | Systems and methods for processing data flows |
US6862354B1 (en) | 2000-09-29 | 2005-03-01 | Cisco Technology, Inc. | Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream |
US7150045B2 (en) * | 2000-12-14 | 2006-12-12 | Widevine Technologies, Inc. | Method and apparatus for protection of electronic media |
US7428411B2 (en) * | 2000-12-19 | 2008-09-23 | At&T Delaware Intellectual Property, Inc. | Location-based security rules |
US6915437B2 (en) * | 2000-12-20 | 2005-07-05 | Microsoft Corporation | System and method for improved network security |
EP1381928B1 (en) * | 2001-01-10 | 2008-12-31 | Cisco Technology, Inc. | Computer security and management system |
CA2337292A1 (en) * | 2001-02-15 | 2002-08-15 | Linmor Technologies Inc. | Dynamically adaptive network element telemetry system |
US20020129145A1 (en) * | 2001-03-06 | 2002-09-12 | Accelerate Software Inc. | Method and system for real-time querying, retrieval and integration of data from database over a computer network |
US8402129B2 (en) * | 2001-03-21 | 2013-03-19 | Alcatel Lucent | Method and apparatus for efficient reactive monitoring |
US7865427B2 (en) | 2001-05-30 | 2011-01-04 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US8001054B1 (en) * | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US7080049B2 (en) * | 2001-09-21 | 2006-07-18 | Paymentone Corporation | Method and system for processing a transaction |
US6898288B2 (en) | 2001-10-22 | 2005-05-24 | Telesecura Corporation | Method and system for secure key exchange |
US7020635B2 (en) * | 2001-11-21 | 2006-03-28 | Line 6, Inc | System and method of secure electronic commerce transactions including tracking and recording the distribution and usage of assets |
US20030110392A1 (en) | 2001-12-06 | 2003-06-12 | Aucsmith David W. | Detecting intrusions |
US7254601B2 (en) * | 2001-12-20 | 2007-08-07 | Questra Corporation | Method and apparatus for managing intelligent assets in a distributed environment |
US6941358B1 (en) * | 2001-12-21 | 2005-09-06 | Networks Associates Technology, Inc. | Enterprise interface for network analysis reporting |
US7076803B2 (en) * | 2002-01-28 | 2006-07-11 | International Business Machines Corporation | Integrated intrusion detection services |
US7650634B2 (en) * | 2002-02-08 | 2010-01-19 | Juniper Networks, Inc. | Intelligent integrated network security device |
US6965294B1 (en) * | 2002-02-28 | 2005-11-15 | Kimball International, Inc. | Workspace security system |
DE60237715D1 (de) * | 2002-03-27 | 2010-10-28 | Nokia Corp | Mobiltelekommunikationseinrichtung, -system und verfahren mit mehreren sicherheitsniveaus |
US7698182B2 (en) | 2002-04-29 | 2010-04-13 | Evercom Systems, Inc. | Optimizing profitability in business transactions |
US7519819B2 (en) | 2002-05-29 | 2009-04-14 | Digimarc Corporatino | Layered security in digital watermarking |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
JP2004078539A (ja) | 2002-08-16 | 2004-03-11 | Phoenix Technologies Kk | ハードディスクのプライバシー保護システム |
US20040049698A1 (en) * | 2002-09-06 | 2004-03-11 | Ott Allen Eugene | Computer network security system utilizing dynamic mobile sensor agents |
US7152242B2 (en) | 2002-09-11 | 2006-12-19 | Enterasys Networks, Inc. | Modular system for detecting, filtering and providing notice about attack events associated with network security |
US8272061B1 (en) | 2002-10-01 | 2012-09-18 | Skyobox security Inc. | Method for evaluating a network |
US7174462B2 (en) * | 2002-11-12 | 2007-02-06 | Intel Corporation | Method of authentication using familiar photographs |
US8990723B1 (en) * | 2002-12-13 | 2015-03-24 | Mcafee, Inc. | System, method, and computer program product for managing a plurality of applications via a single interface |
US9237514B2 (en) * | 2003-02-28 | 2016-01-12 | Apple Inc. | System and method for filtering access points presented to a user and locking onto an access point |
US7143095B2 (en) | 2002-12-31 | 2006-11-28 | American Express Travel Related Services Company, Inc. | Method and system for implementing and managing an enterprise identity management for distributed security |
JP4354201B2 (ja) * | 2003-03-18 | 2009-10-28 | 富士通株式会社 | 不正アクセス対処システム、及び不正アクセス対処処理プログラム |
US7895649B1 (en) * | 2003-04-04 | 2011-02-22 | Raytheon Company | Dynamic rule generation for an enterprise intrusion detection system |
US7246156B2 (en) * | 2003-06-09 | 2007-07-17 | Industrial Defender, Inc. | Method and computer program product for monitoring an industrial network |
US7685254B2 (en) | 2003-06-10 | 2010-03-23 | Pandya Ashish A | Runtime adaptable search processor |
US7337466B2 (en) * | 2003-07-08 | 2008-02-26 | Intel Corporation | Information hiding through time synchronization |
AU2003903958A0 (en) * | 2003-07-29 | 2003-08-14 | Cortec Systems Pty Ltd | Virtual circuits in packet networks |
US7260844B1 (en) | 2003-09-03 | 2007-08-21 | Arcsight, Inc. | Threat detection in a network security system |
US9311676B2 (en) | 2003-09-04 | 2016-04-12 | Hartford Fire Insurance Company | Systems and methods for analyzing sensor data |
US7090128B2 (en) * | 2003-09-08 | 2006-08-15 | Systems And Software Enterprises, Inc. | Mobile electronic newsstand |
WO2005027008A1 (en) | 2003-09-10 | 2005-03-24 | Ntt Docomo, Inc. | Method and apparatus for secure and small credits for verifiable service provider metering |
CN104200152B (zh) * | 2003-09-12 | 2020-02-14 | Emc公司 | 用于基于风险的验证的系统和方法 |
US9027120B1 (en) | 2003-10-10 | 2015-05-05 | Hewlett-Packard Development Company, L.P. | Hierarchical architecture in a network security system |
US20050125360A1 (en) * | 2003-12-09 | 2005-06-09 | Tidwell Lisa C. | Systems and methods for obtaining authentication marks at a point of sale |
JP4034743B2 (ja) * | 2004-01-23 | 2008-01-16 | 株式会社東芝 | 多重署名方法、装置、プログラム及びシステム |
US8146160B2 (en) * | 2004-03-24 | 2012-03-27 | Arbor Networks, Inc. | Method and system for authentication event security policy generation |
US8312549B2 (en) * | 2004-09-24 | 2012-11-13 | Ygor Goldberg | Practical threat analysis |
US7950044B2 (en) * | 2004-09-28 | 2011-05-24 | Rockwell Automation Technologies, Inc. | Centrally managed proxy-based security for legacy automation systems |
KR100611741B1 (ko) * | 2004-10-19 | 2006-08-11 | 한국전자통신연구원 | 네트워크 침입 탐지 및 방지 시스템 및 그 방법 |
US7461398B2 (en) * | 2004-10-21 | 2008-12-02 | At&T Intellectual Property I, L.P., By Transfer Of Ownership From At&T Delaware Intellectual Property, Inc. | Methods, systems, and computer program products for dynamic management of security parameters during a communications session |
TW200642408A (en) * | 2004-12-07 | 2006-12-01 | Farsheed Atef | System and method for identity verification and management |
US7636842B2 (en) * | 2005-01-10 | 2009-12-22 | Interdigital Technology Corporation | System and method for providing variable security level in a wireless communication system |
US8639629B1 (en) | 2005-02-02 | 2014-01-28 | Nexus Payments, LLC | System and method for accessing an online user account registry via a thin-client unique user code |
US7711586B2 (en) * | 2005-02-24 | 2010-05-04 | Rearden Corporation | Method and system for unused ticket management |
US20060200427A1 (en) * | 2005-03-01 | 2006-09-07 | Morrison Robert A | Systems and methods for securing transactions with biometric information |
US20060200666A1 (en) * | 2005-03-01 | 2006-09-07 | Bailey Samuel Jr | Methods, communication networks, and computer program products for monitoring communications of a network device using a secure digital certificate |
US7769207B2 (en) * | 2005-04-01 | 2010-08-03 | Olivo Jr John W | System and method for collection, storage, and analysis of biometric data |
US7908645B2 (en) * | 2005-04-29 | 2011-03-15 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
US7587502B2 (en) * | 2005-05-13 | 2009-09-08 | Yahoo! Inc. | Enabling rent/buy redirection in invitation to an online service |
US8904486B2 (en) | 2005-05-19 | 2014-12-02 | International Business Machines Corporation | Method and system for autonomic security configuration |
US7496348B2 (en) * | 2005-06-07 | 2009-02-24 | Motorola, Inc. | Wireless communication network security method and system |
WO2006134269A1 (fr) | 2005-06-14 | 2006-12-21 | Patrice Guichard | Procede et dispositif de protection de donnees et de systeme informatique |
US7653188B2 (en) * | 2005-07-20 | 2010-01-26 | Avaya Inc. | Telephony extension attack detection, recording, and intelligent prevention |
US20100294927A1 (en) * | 2005-09-12 | 2010-11-25 | Nanolnk, Inc. | High throughput inspecting |
US20070101432A1 (en) | 2005-10-28 | 2007-05-03 | Microsoft Corporation | Risk driven compliance management |
US8091120B2 (en) * | 2005-12-21 | 2012-01-03 | At&T Intellectual Property I, L.P. | Adaptive authentication methods, systems, devices, and computer program products |
US20070234412A1 (en) * | 2006-03-29 | 2007-10-04 | Smith Ned M | Using a proxy for endpoint access control |
US20070250709A1 (en) * | 2006-04-21 | 2007-10-25 | Bailey Samuel Jr | Methods, apparatus, and computer programs for automatic detection and registration of IP multimedia devices situated in a customer device zone |
CN101438249A (zh) * | 2006-05-07 | 2009-05-20 | 应用材料股份有限公司 | 用于错误诊断的多种错误特征 |
US8539586B2 (en) | 2006-05-19 | 2013-09-17 | Peter R. Stephenson | Method for evaluating system risk |
US8117458B2 (en) * | 2006-05-24 | 2012-02-14 | Vidoop Llc | Methods and systems for graphical image authentication |
US8307444B1 (en) * | 2006-06-12 | 2012-11-06 | Redseal Networks, Inc. | Methods and apparatus for determining network risk based upon incomplete network configuration data |
US8239677B2 (en) | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
US8006300B2 (en) * | 2006-10-24 | 2011-08-23 | Authernative, Inc. | Two-channel challenge-response authentication method in random partial shared secret recognition system |
US7962756B2 (en) | 2006-10-31 | 2011-06-14 | At&T Intellectual Property Ii, L.P. | Method and apparatus for providing automatic generation of webpages |
US9137663B2 (en) * | 2006-11-02 | 2015-09-15 | Cisco Technology, Inc. | Radio frequency firewall coordination |
US20080120707A1 (en) * | 2006-11-22 | 2008-05-22 | Alexander Ramia | Systems and methods for authenticating a device by a centralized data server |
WO2008067335A2 (en) * | 2006-11-27 | 2008-06-05 | Smobile Systems, Inc. | Wireless intrusion prevention system and method |
US20080139195A1 (en) * | 2006-12-07 | 2008-06-12 | David John Marsyla | Remote access for mobile devices |
US7937353B2 (en) * | 2007-01-15 | 2011-05-03 | International Business Machines Corporation | Method and system for determining whether to alter a firewall configuration |
US8959568B2 (en) | 2007-03-14 | 2015-02-17 | Microsoft Corporation | Enterprise security assessment sharing |
US20080243439A1 (en) | 2007-03-28 | 2008-10-02 | Runkle Paul R | Sensor exploration and management through adaptive sensing framework |
US7921205B2 (en) * | 2007-04-13 | 2011-04-05 | Compuware Corporation | Website load testing using a plurality of remotely operating agents distributed over a wide area |
US8706914B2 (en) * | 2007-04-23 | 2014-04-22 | David D. Duchesneau | Computing infrastructure |
US10769290B2 (en) | 2007-05-11 | 2020-09-08 | Fair Isaac Corporation | Systems and methods for fraud detection via interactive link analysis |
US20090025084A1 (en) | 2007-05-11 | 2009-01-22 | Fraud Management Technologies Pty Ltd | Fraud detection filter |
US8191106B2 (en) * | 2007-06-07 | 2012-05-29 | Alcatel Lucent | System and method of network access security policy management for multimodal device |
US8746581B2 (en) | 2007-06-19 | 2014-06-10 | Codebroker, Llc | Techniques for providing an electronic representation of a card |
GB2456742A (en) | 2007-06-28 | 2009-07-29 | Symbian Software Ltd | Determining trust levels for data sources |
EP2179532B1 (en) * | 2007-08-06 | 2019-07-10 | Bernard De Monseignat | System and method for authentication, data transfer, and protection against phishing |
US20090112767A1 (en) | 2007-10-25 | 2009-04-30 | Ayman Hammad | Escrow system and method |
CN101897165B (zh) * | 2007-10-30 | 2013-06-12 | 意大利电信股份公司 | 数据处理系统中验证用户的方法 |
JP2009110334A (ja) | 2007-10-31 | 2009-05-21 | Mitsubishi Electric Corp | 端末及びセキュリティシステム及び端末プログラム及びセキュリティ情報管理方法 |
US20090125977A1 (en) * | 2007-10-31 | 2009-05-14 | Docomo Communications Laboratories Usa, Inc. | Language framework and infrastructure for safe and composable applications |
US8650616B2 (en) * | 2007-12-18 | 2014-02-11 | Oracle International Corporation | User definable policy for graduated authentication based on the partial orderings of principals |
US20090165125A1 (en) * | 2007-12-19 | 2009-06-25 | Research In Motion Limited | System and method for controlling user access to a computing device |
US8559914B2 (en) * | 2008-01-16 | 2013-10-15 | M. Kelly Jones | Interactive personal surveillance and security (IPSS) system |
US8510805B2 (en) * | 2008-04-23 | 2013-08-13 | Samsung Electronics Co., Ltd. | Safe and efficient access control mechanisms for computing environments |
US20090292568A1 (en) | 2008-05-22 | 2009-11-26 | Reza Khosravani | Adaptive Risk Variables |
US8799984B2 (en) * | 2008-05-27 | 2014-08-05 | Open Invention Network, Llc | User agent to exercise privacy control management in a user-centric identity management system |
US8392975B1 (en) | 2008-05-29 | 2013-03-05 | Google Inc. | Method and system for image-based user authentication |
CA2727831C (en) | 2008-06-12 | 2019-02-05 | Guardian Analytics, Inc. | Modeling users for fraud detection and analysis |
US8856926B2 (en) * | 2008-06-27 | 2014-10-07 | Juniper Networks, Inc. | Dynamic policy provisioning within network security devices |
US20100010874A1 (en) * | 2008-07-10 | 2010-01-14 | Carissa Tener Howard | Systems and methods of evaluating and extending a loan secured by an invention idea of a borrower |
US8504504B2 (en) * | 2008-09-26 | 2013-08-06 | Oracle America, Inc. | System and method for distributed denial of service identification and prevention |
US8516606B2 (en) * | 2009-03-24 | 2013-08-20 | Aol Inc. | Systems and methods for challenge-response animation and randomization testing |
US9489674B2 (en) | 2009-05-04 | 2016-11-08 | Visa International Service Association | Frequency-based transaction prediction and processing |
US20100293090A1 (en) | 2009-05-14 | 2010-11-18 | Domenikos Steven D | Systems, methods, and apparatus for determining fraud probability scores and identity health scores |
US8752142B2 (en) | 2009-07-17 | 2014-06-10 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback |
US9756076B2 (en) | 2009-12-17 | 2017-09-05 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transactions |
US8621636B2 (en) | 2009-12-17 | 2013-12-31 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for collecting and reporting sensor data in a communication network |
US8650129B2 (en) | 2010-01-20 | 2014-02-11 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transaction data in transit |
US20110252479A1 (en) | 2010-04-08 | 2011-10-13 | Yolanta Beresnevichiene | Method for analyzing risk |
US8850539B2 (en) | 2010-06-22 | 2014-09-30 | American Express Travel Related Services Company, Inc. | Adaptive policies and protections for securing financial transaction data at rest |
US8924296B2 (en) | 2010-06-22 | 2014-12-30 | American Express Travel Related Services Company, Inc. | Dynamic pairing system for securing a trusted communication channel |
US10360625B2 (en) | 2010-06-22 | 2019-07-23 | American Express Travel Related Services Company, Inc. | Dynamically adaptive policy management for securing mobile financial transactions |
US9672374B2 (en) | 2012-10-19 | 2017-06-06 | Mcafee, Inc. | Secure disk access control |
US9292695B1 (en) | 2013-04-10 | 2016-03-22 | Gabriel Bassett | System and method for cyber security analysis and human behavior prediction |
US20150161611A1 (en) | 2013-12-10 | 2015-06-11 | Sas Institute Inc. | Systems and Methods for Self-Similarity Measure |
-
2009
- 2009-07-17 US US12/504,828 patent/US8752142B2/en active Active
-
2010
- 2010-07-15 WO PCT/US2010/042043 patent/WO2011008902A1/en active Application Filing
- 2010-07-15 CN CN201510029327.6A patent/CN104601584B/zh active Active
- 2010-07-15 EP EP10800510.9A patent/EP2454667B1/en active Active
- 2010-07-15 CA CA2767862A patent/CA2767862C/en active Active
- 2010-07-15 CN CN201080029478.7A patent/CN102473119B/zh active Active
- 2010-07-15 MX MX2012000606A patent/MX2012000606A/es active IP Right Grant
- 2010-07-15 JP JP2012520759A patent/JP5632915B2/ja active Active
-
2012
- 2012-11-23 HK HK12112036.7A patent/HK1171526A1/xx unknown
-
2014
- 2014-04-14 US US14/252,276 patent/US9378375B2/en active Active
-
2015
- 2015-09-22 HK HK15109287.6A patent/HK1208106A1/xx unknown
-
2016
- 2016-05-27 US US15/166,673 patent/US9635059B2/en active Active
-
2017
- 2017-03-10 US US15/456,252 patent/US9848011B2/en active Active
- 2017-11-21 US US15/819,136 patent/US10735473B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN102473119B (zh) | 2015-02-25 |
CN104601584B (zh) | 2018-05-11 |
US20110016513A1 (en) | 2011-01-20 |
CA2767862C (en) | 2016-09-27 |
EP2454667A4 (en) | 2016-08-24 |
MX2012000606A (es) | 2012-02-13 |
EP2454667B1 (en) | 2020-04-08 |
US8752142B2 (en) | 2014-06-10 |
EP2454667A1 (en) | 2012-05-23 |
CN104601584A (zh) | 2015-05-06 |
US20170187744A1 (en) | 2017-06-29 |
US20140310815A1 (en) | 2014-10-16 |
WO2011008902A8 (en) | 2012-02-16 |
US10735473B2 (en) | 2020-08-04 |
CN102473119A (zh) | 2012-05-23 |
WO2011008902A1 (en) | 2011-01-20 |
US20180097834A1 (en) | 2018-04-05 |
HK1171526A1 (en) | 2013-03-28 |
US9848011B2 (en) | 2017-12-19 |
CA2767862A1 (en) | 2011-01-20 |
US9378375B2 (en) | 2016-06-28 |
US9635059B2 (en) | 2017-04-25 |
JP2012533935A (ja) | 2012-12-27 |
HK1208106A1 (en) | 2016-02-19 |
US20160277450A1 (en) | 2016-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5632915B2 (ja) | フィードバックに基づいて通信ネットワークのセキュリティ処置を適応させるためのシステム、方法およびコンピュータプログラム製品 | |
US9973526B2 (en) | Mobile device sensor data | |
US10997571B2 (en) | Protection methods for financial transactions | |
US10360625B2 (en) | Dynamically adaptive policy management for securing mobile financial transactions | |
US10432668B2 (en) | Selectable encryption methods | |
US20190340618A1 (en) | Risk level for modifying security safeguards | |
CN107005563B (zh) | 用于机器对机器装置的供应平台 | |
US20190007389A1 (en) | Generating code for a multimedia item | |
US20130110658A1 (en) | Systems and methods for enabling mobile payments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20130206 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140124 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140424 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20140912 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20141010 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5632915 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |