KR102301721B1 - 다수의 네트워크 종점들을 보호하기 위한 듀얼 메모리 인트로스펙션 - Google Patents
다수의 네트워크 종점들을 보호하기 위한 듀얼 메모리 인트로스펙션 Download PDFInfo
- Publication number
- KR102301721B1 KR102301721B1 KR1020187015228A KR20187015228A KR102301721B1 KR 102301721 B1 KR102301721 B1 KR 102301721B1 KR 1020187015228 A KR1020187015228 A KR 1020187015228A KR 20187015228 A KR20187015228 A KR 20187015228A KR 102301721 B1 KR102301721 B1 KR 102301721B1
- Authority
- KR
- South Korea
- Prior art keywords
- tool
- computer system
- guest
- response
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
- Test And Diagnosis Of Digital Computers (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201562269952P | 2015-12-19 | 2015-12-19 | |
| US62/269,952 | 2015-12-19 | ||
| PCT/EP2016/081697 WO2017103254A1 (en) | 2015-12-19 | 2016-12-19 | Dual memory introspection for securing multiple network endpoints |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20180097527A KR20180097527A (ko) | 2018-08-31 |
| KR102301721B1 true KR102301721B1 (ko) | 2021-09-15 |
Family
ID=57777593
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020187015228A Active KR102301721B1 (ko) | 2015-12-19 | 2016-12-19 | 다수의 네트워크 종점들을 보호하기 위한 듀얼 메모리 인트로스펙션 |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US10630643B2 (enExample) |
| EP (1) | EP3391274B1 (enExample) |
| JP (1) | JP6772270B2 (enExample) |
| KR (1) | KR102301721B1 (enExample) |
| CN (1) | CN108369625B (enExample) |
| AU (1) | AU2016369460B2 (enExample) |
| CA (1) | CA3006003C (enExample) |
| ES (1) | ES2762988T3 (enExample) |
| IL (1) | IL259344B (enExample) |
| RU (1) | RU2714607C2 (enExample) |
| SG (1) | SG11201804327TA (enExample) |
| WO (1) | WO2017103254A1 (enExample) |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180063088A1 (en) * | 2016-09-01 | 2018-03-01 | Airwatch Llc | Hypervisor network profiles to facilitate vpn tunnel |
| EP3616115B1 (en) * | 2017-04-26 | 2023-12-06 | Cylance Inc. | Endpoint detection and response system event characterization data transfer |
| US10503910B2 (en) * | 2017-06-06 | 2019-12-10 | Sap Se | Security testing framework including virtualized server-side platform |
| US10505966B2 (en) * | 2017-06-06 | 2019-12-10 | Sap Se | Cross-site request forgery (CSRF) vulnerability detection |
| US10764169B2 (en) | 2017-10-09 | 2020-09-01 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for testing virtual network components deployed in virtual private clouds (VPCs) |
| US10693909B2 (en) | 2018-01-19 | 2020-06-23 | International Business Machines Corporation | Securing an endpoint in a computer network |
| US11038770B2 (en) * | 2018-02-01 | 2021-06-15 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for managing deployment and maintenance of network tools |
| US10812349B2 (en) | 2018-02-17 | 2020-10-20 | Keysight Technologies, Inc. | Methods, systems and computer readable media for triggering on-demand dynamic activation of cloud-based network visibility tools |
| US11347861B2 (en) | 2018-04-10 | 2022-05-31 | Raytheon Company | Controlling security state of commercial off the shelf (COTS) system |
| SG11202012485SA (en) * | 2018-07-18 | 2021-01-28 | Bitdefender Ipr Man Ltd | Systems and methods for reporting computer security incidents |
| US11178159B2 (en) | 2018-09-07 | 2021-11-16 | Raytheon Company | Cross-domain solution using network-connected hardware root-of-trust device |
| US11423150B2 (en) | 2018-09-07 | 2022-08-23 | Raytheon Company | System and method for booting processors with encrypted boot image |
| US10878101B2 (en) | 2018-09-07 | 2020-12-29 | Raytheon Company | Trusted booting by hardware root of trust (HRoT) device |
| US11178169B2 (en) * | 2018-12-27 | 2021-11-16 | Paypal, Inc. | Predicting online electronic attacks based on other attacks |
| WO2020205497A1 (en) | 2019-04-01 | 2020-10-08 | Raytheon Company | Root of trust assisted access control of secure encrypted drives |
| BR112021019741A2 (pt) | 2019-04-01 | 2021-12-21 | Raytheon Co | Sistemas e método para proteção de dados |
| US10951509B1 (en) | 2019-06-07 | 2021-03-16 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for providing intent-driven microapps for execution on communications network testing devices |
| US11249787B2 (en) * | 2019-10-01 | 2022-02-15 | Bank Of America Corporation | Method and system for data collection using hypervisor |
| US11489745B2 (en) | 2019-10-15 | 2022-11-01 | Keysight Technologies, Inc. | Methods, systems and computer readable media for providing a declarative network monitoring environment |
| US11379588B2 (en) | 2019-12-20 | 2022-07-05 | Raytheon Company | System validation by hardware root of trust (HRoT) device and system management mode (SMM) |
| CN114978566A (zh) * | 2021-02-12 | 2022-08-30 | 比特梵德知识产权管理有限公司 | 用于保护节电无线装置免受攻击的安全设备 |
| US11615181B2 (en) | 2021-03-30 | 2023-03-28 | Netapp, Inc. | Methods for managing verification and validation of third-party code and devices thereof |
| US11586725B2 (en) * | 2021-03-30 | 2023-02-21 | Netapp, Inc. | Methods for managing verification and validation of third-party code and devices thereof |
| US11681520B2 (en) * | 2021-04-20 | 2023-06-20 | International Business Machines Corporation | Software upgrading using dynamic link library injection |
| US12393437B1 (en) * | 2021-04-29 | 2025-08-19 | Marvell Asia Pte Ltd | Method and apparatus for supporting security implementation in a virtual network |
| US12020059B2 (en) * | 2021-08-30 | 2024-06-25 | International Business Machines Corporation | Inaccessible prefix pages during virtual machine execution |
| US20230409717A1 (en) * | 2022-06-15 | 2023-12-21 | AO Kaspersky Lab | System and method for detecting vulnerabilities in the operating system based on process and thread data |
| CN115794604B (zh) * | 2022-10-14 | 2024-04-19 | 寒武纪行歌(南京)科技有限公司 | 数据生成方法、装置、设备、介质及程序产品 |
| US12339958B2 (en) * | 2022-10-28 | 2025-06-24 | Dell Products, L.P. | Ransomware protection systems and methods leveraging smart network interface controllers |
| KR102548703B1 (ko) * | 2022-11-22 | 2023-06-28 | 에스지에이솔루션즈 주식회사 | 홈 네트워크 환경에서의 원격 시스템에 대한 접속 제어 방법, 장치 및 컴퓨터-판독가능 기록매체 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100115621A1 (en) * | 2008-11-03 | 2010-05-06 | Stuart Gresley Staniford | Systems and Methods for Detecting Malicious Network Content |
| US20100251363A1 (en) * | 2009-03-24 | 2010-09-30 | Rade Todorovic | Modified file tracking on virtual machines |
| US20130067558A1 (en) * | 2011-03-01 | 2013-03-14 | Honeywell International Inc. | Assured pipeline threat detection |
Family Cites Families (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5960170A (en) * | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
| JP2001222414A (ja) * | 2000-02-09 | 2001-08-17 | Dainippon Printing Co Ltd | Dtpツール自動更新システム |
| KR100551421B1 (ko) | 2002-12-28 | 2006-02-09 | 주식회사 팬택앤큐리텔 | 바이러스치료기능을 가진 이동통신 시스템 |
| US7496961B2 (en) * | 2003-10-15 | 2009-02-24 | Intel Corporation | Methods and apparatus to provide network traffic support and physical security support |
| JP4624181B2 (ja) * | 2004-07-28 | 2011-02-02 | 株式会社エヌ・ティ・ティ・データ | 不正アクセス対策制御装置および不正アクセス対策制御プログラム |
| US8024568B2 (en) | 2005-01-28 | 2011-09-20 | Citrix Systems, Inc. | Method and system for verification of an endpoint security scan |
| US20080320594A1 (en) | 2007-03-19 | 2008-12-25 | Xuxian Jiang | Malware Detector |
| US7797748B2 (en) | 2007-12-12 | 2010-09-14 | Vmware, Inc. | On-access anti-virus mechanism for virtual machine architecture |
| US8719936B2 (en) * | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
| US7979260B1 (en) * | 2008-03-31 | 2011-07-12 | Symantec Corporation | Simulating PXE booting for virtualized machines |
| US8443363B1 (en) * | 2008-05-30 | 2013-05-14 | Symantec Corporation | Coordinated virtualization activities |
| US9098698B2 (en) | 2008-09-12 | 2015-08-04 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
| JP4589996B2 (ja) * | 2008-10-14 | 2010-12-01 | 株式会社セキュアウェア | データ処理方法、データ処理装置、コンピュータプログラム、及び記録媒体 |
| US8544089B2 (en) * | 2009-08-17 | 2013-09-24 | Fatskunk, Inc. | Auditing a device |
| JP5725529B2 (ja) * | 2010-07-21 | 2015-05-27 | 日本電気株式会社 | Web脆弱性補修システム、Web脆弱性補修方法、及びプログラム |
| RU2444056C1 (ru) * | 2010-11-01 | 2012-02-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ ускорения решения проблем за счет накопления статистической информации |
| US20120144489A1 (en) * | 2010-12-07 | 2012-06-07 | Microsoft Corporation | Antimalware Protection of Virtual Machines |
| CN102122330B (zh) * | 2011-01-24 | 2014-12-03 | 中国人民解放军国防科学技术大学 | 基于虚拟机的“In-VM”恶意代码检测系统 |
| US8566899B2 (en) * | 2011-03-16 | 2013-10-22 | Symantec Corporation | Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure |
| US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
| US20120254993A1 (en) * | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
| US8601583B1 (en) * | 2011-04-14 | 2013-12-03 | Trend Micro Incorporated | Certification of virtual machine images in cloud computing environments |
| US9298910B2 (en) * | 2011-06-08 | 2016-03-29 | Mcafee, Inc. | System and method for virtual partition monitoring |
| US8099596B1 (en) * | 2011-06-30 | 2012-01-17 | Kaspersky Lab Zao | System and method for malware protection using virtualization |
| US8584235B2 (en) * | 2011-11-02 | 2013-11-12 | Bitdefender IPR Management Ltd. | Fuzzy whitelisting anti-malware systems and methods |
| US20130312096A1 (en) | 2012-05-18 | 2013-11-21 | Vmware, Inc. | On-demand data scan in a virtual machine |
| US9003408B2 (en) * | 2012-09-28 | 2015-04-07 | Adventium Enterprises | Providing virtual machine services by isolated virtual machines |
| CN103500304B (zh) * | 2013-10-13 | 2016-06-29 | 西安电子科技大学 | 基于Xen的虚拟机个性化安全监控系统及监控方法 |
| WO2015070376A1 (zh) * | 2013-11-12 | 2015-05-21 | 华为技术有限公司 | 一种实现虚拟化安全的方法和系统 |
| RU2568282C2 (ru) * | 2014-04-18 | 2015-11-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ обеспечения отказоустойчивости антивирусной защиты, реализуемой в виртуальной среде |
| US9798882B2 (en) * | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
| FR3022371A1 (fr) * | 2014-06-11 | 2015-12-18 | Orange | Procede de supervision de la securite d'une machine virtuelle dans une architecture d'informatique dans le nuage |
| US9009836B1 (en) * | 2014-07-17 | 2015-04-14 | Kaspersky Lab Zao | Security architecture for virtual machines |
| JP2014225302A (ja) * | 2014-09-08 | 2014-12-04 | 富士通株式会社 | ウイルス検出プログラム、ウイルス検出方法、及びコンピュータ |
| US9608909B1 (en) * | 2015-06-08 | 2017-03-28 | Cisco Technology, Inc. | Technique for mitigating effects of slow or stuck virtual machines in fibre channel communications networks |
-
2016
- 2016-12-19 RU RU2018126207A patent/RU2714607C2/ru active
- 2016-12-19 AU AU2016369460A patent/AU2016369460B2/en active Active
- 2016-12-19 KR KR1020187015228A patent/KR102301721B1/ko active Active
- 2016-12-19 JP JP2018532300A patent/JP6772270B2/ja active Active
- 2016-12-19 ES ES16825369T patent/ES2762988T3/es active Active
- 2016-12-19 US US15/383,082 patent/US10630643B2/en active Active
- 2016-12-19 WO PCT/EP2016/081697 patent/WO2017103254A1/en not_active Ceased
- 2016-12-19 SG SG11201804327TA patent/SG11201804327TA/en unknown
- 2016-12-19 EP EP16825369.8A patent/EP3391274B1/en active Active
- 2016-12-19 CN CN201680073890.6A patent/CN108369625B/zh active Active
- 2016-12-19 CA CA3006003A patent/CA3006003C/en active Active
-
2018
- 2018-05-14 IL IL259344A patent/IL259344B/en active IP Right Grant
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100115621A1 (en) * | 2008-11-03 | 2010-05-06 | Stuart Gresley Staniford | Systems and Methods for Detecting Malicious Network Content |
| US20100251363A1 (en) * | 2009-03-24 | 2010-09-30 | Rade Todorovic | Modified file tracking on virtual machines |
| US20130067558A1 (en) * | 2011-03-01 | 2013-03-14 | Honeywell International Inc. | Assured pipeline threat detection |
Also Published As
| Publication number | Publication date |
|---|---|
| SG11201804327TA (en) | 2018-07-30 |
| JP2018538633A (ja) | 2018-12-27 |
| RU2714607C2 (ru) | 2020-02-18 |
| EP3391274A1 (en) | 2018-10-24 |
| US20170180318A1 (en) | 2017-06-22 |
| ES2762988T3 (es) | 2020-05-26 |
| EP3391274B1 (en) | 2019-10-02 |
| US10630643B2 (en) | 2020-04-21 |
| IL259344B (en) | 2021-06-30 |
| CN108369625A (zh) | 2018-08-03 |
| CA3006003A1 (en) | 2017-06-22 |
| IL259344A (en) | 2018-07-31 |
| RU2018126207A (ru) | 2020-01-20 |
| WO2017103254A1 (en) | 2017-06-22 |
| CN108369625B (zh) | 2022-03-04 |
| RU2018126207A3 (enExample) | 2020-01-24 |
| JP6772270B2 (ja) | 2020-10-21 |
| CA3006003C (en) | 2021-11-23 |
| KR20180097527A (ko) | 2018-08-31 |
| HK1254985A1 (zh) | 2019-08-02 |
| AU2016369460B2 (en) | 2021-07-01 |
| AU2016369460A1 (en) | 2018-06-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR102301721B1 (ko) | 다수의 네트워크 종점들을 보호하기 위한 듀얼 메모리 인트로스펙션 | |
| US8910238B2 (en) | Hypervisor-based enterprise endpoint protection | |
| US11438349B2 (en) | Systems and methods for protecting devices from malware | |
| US10922418B2 (en) | Runtime detection and mitigation of vulnerabilities in application software containers | |
| EP3430556B1 (en) | System and method for process hollowing detection | |
| AU2014330136B2 (en) | Complex scoring for malware detection | |
| AU2014393471B2 (en) | Systems and methods for using a reputation indicator to facilitate malware scanning | |
| EP3017392B1 (en) | Process evaluation for malware detection in virtual machines | |
| US9251343B1 (en) | Detecting bootkits resident on compromised computers | |
| WO2019158915A1 (en) | Managing virtual machine security resources | |
| AU2014330136A1 (en) | Complex scoring for malware detection | |
| EP3314499B1 (en) | Temporary process deprivileging | |
| US20250378163A1 (en) | Clustered continuous data content integrity compromise detection | |
| HK1254985B (zh) | 用於保护多个网络端点的双重存储器内省 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
St.27 status event code: A-0-1-A10-A15-nap-PA0105 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-3-3-R10-R18-oth-X000 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| PA0302 | Request for accelerated examination |
St.27 status event code: A-1-2-D10-D17-exm-PA0302 St.27 status event code: A-1-2-D10-D16-exm-PA0302 |
|
| D13-X000 | Search requested |
St.27 status event code: A-1-2-D10-D13-srh-X000 |
|
| D14-X000 | Search report completed |
St.27 status event code: A-1-2-D10-D14-srh-X000 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| E701 | Decision to grant or registration of patent right | ||
| PE0701 | Decision of registration |
St.27 status event code: A-1-2-D10-D22-exm-PE0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U12-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| P22-X000 | Classification modified |
St.27 status event code: A-4-4-P10-P22-nap-X000 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 4 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 5 |
|
| U11 | Full renewal or maintenance fee paid |
Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U11-OTH-PR1001 (AS PROVIDED BY THE NATIONAL OFFICE) Year of fee payment: 5 |