MX349569B - Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. - Google Patents
Sistemas y metodos de reglas a base de riesgo para control de aplicaciones.Info
- Publication number
- MX349569B MX349569B MX2015010893A MX2015010893A MX349569B MX 349569 B MX349569 B MX 349569B MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 349569 B MX349569 B MX 349569B
- Authority
- MX
- Mexico
- Prior art keywords
- module
- rule
- application
- risk information
- systems
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
Abstract
En varias modalidades, un agente en un dispositivo digital puede comprender un módulo de monitor, un módulo de identificación de aplicación, un módulo de vulnerabilidad, una base de datos de reglas y un módulo de reglas. El módulo de monitor puede estar configurado para monitorear un dispositivo en cuanto a una instrucción para ejecutar una aplicación legítima. El módulo de identificación de aplicación puede estar configurado para identificar uno o más atributos de una aplicación legítima. El módulo de vulnerabilidad puede estar configurado para recuperar información de riesgo en base al uno o más atributos de la aplicación legítima. La información de riesgo puede ser determinada a partir de las vulnerabilidades conocidas de la aplicación legítima. La base de datos de reglas puede ser para almacenar una regla asociada con la información de riesgo. El módulo de reglas puede estar configurado para recuperar la regla de la base de datos de reglas, en base a la información de riesgo y al control de la aplicación legítima en base a la regla.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361768809P | 2013-02-25 | 2013-02-25 | |
US14/156,375 US20140201843A1 (en) | 2013-01-15 | 2014-01-15 | Systems and methods for identifying and reporting application and file vulnerabilities |
PCT/US2014/016976 WO2014130472A1 (en) | 2013-02-25 | 2014-02-18 | Systems and methods of risk based rules for application control |
Publications (2)
Publication Number | Publication Date |
---|---|
MX2015010893A MX2015010893A (es) | 2016-05-05 |
MX349569B true MX349569B (es) | 2017-08-03 |
Family
ID=51391742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2015010893A MX349569B (es) | 2013-02-25 | 2014-02-18 | Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP2959418A4 (es) |
JP (1) | JP6134395B2 (es) |
AU (2) | AU2014219077A1 (es) |
CA (1) | CA2902110C (es) |
MX (1) | MX349569B (es) |
SG (1) | SG11201506642PA (es) |
WO (1) | WO2014130472A1 (es) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10445505B2 (en) * | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
RU2595511C2 (ru) * | 2014-12-05 | 2016-08-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ ограничения работы доверенных приложений при наличии подозрительных приложений |
US9858410B2 (en) * | 2015-10-26 | 2018-01-02 | Symantec Corporation | Techniques for automated application analysis |
CN106537344A (zh) * | 2016-03-30 | 2017-03-22 | 北京小米移动软件有限公司 | 一种应用程序调用管理的方法和装置 |
AU2018224839B2 (en) * | 2017-02-27 | 2021-12-09 | Ivanti, Inc. | Systems and methods for context-based mitigation of computer security risks |
US11609984B2 (en) * | 2018-02-14 | 2023-03-21 | Digital Guardian Llc | Systems and methods for determining a likelihood of an existence of malware on an executable |
EP3591556A1 (en) * | 2018-07-07 | 2020-01-08 | 1830291 Ontario Inc. | Automated security assessment of information systems |
US11356449B2 (en) * | 2018-10-20 | 2022-06-07 | Walmart Apollo, Llc | Managing access to vulnerability data at scale |
WO2021079495A1 (ja) * | 2019-10-25 | 2021-04-29 | 日本電気株式会社 | 評価装置、評価システム、評価方法及びプログラム |
CN110929267A (zh) * | 2019-11-29 | 2020-03-27 | 深信服科技股份有限公司 | 代码漏洞检测方法、装置、设备及存储介质 |
JP7215525B2 (ja) * | 2020-04-08 | 2023-01-31 | 日本電気株式会社 | 端末、制御方法、及びプログラム |
WO2022000024A1 (en) * | 2020-06-29 | 2022-01-06 | Blue Eagle Technologies Pty Limited | A method for securing a software application |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040225877A1 (en) * | 2003-05-09 | 2004-11-11 | Zezhen Huang | Method and system for protecting computer system from malicious software operation |
EP1583013A1 (en) * | 2004-03-31 | 2005-10-05 | Swiss Reinsurance Company | Computer-based system and method for detecting risks |
JP4688472B2 (ja) * | 2004-11-01 | 2011-05-25 | 株式会社エヌ・ティ・ティ・ドコモ | 端末制御装置及び端末制御方法 |
US8006088B2 (en) * | 2005-08-18 | 2011-08-23 | Beyondtrust Corporation | Methods and systems for network-based management of application security |
US20070169199A1 (en) * | 2005-09-09 | 2007-07-19 | Forum Systems, Inc. | Web service vulnerability metadata exchange system |
US20070094735A1 (en) * | 2005-10-26 | 2007-04-26 | Cohen Matthew L | Method to consolidate and prioritize web application vulnerabilities |
US20070180509A1 (en) * | 2005-12-07 | 2007-08-02 | Swartz Alon R | Practical platform for high risk applications |
US20070174824A1 (en) * | 2006-01-23 | 2007-07-26 | Microsoft Corporation | Techniques for generating and executing browser-hosted applications |
CN101513008B (zh) * | 2006-07-31 | 2012-09-19 | 意大利电信股份公司 | 在电信终端上实现安全性的系统 |
JP4751431B2 (ja) * | 2008-09-12 | 2011-08-17 | 株式会社東芝 | 脆弱性判定装置及びプログラム |
US8473508B2 (en) * | 2009-10-01 | 2013-06-25 | Oracle International Corporation | Dynamic rule creation and caching |
JP5585303B2 (ja) * | 2010-08-25 | 2014-09-10 | 日本電気株式会社 | ライブラリ実行管理システム、ライブラリ実行管理方法およびプログラム |
US8738906B1 (en) * | 2011-11-30 | 2014-05-27 | Juniper Networks, Inc. | Traffic classification and control on a network node |
-
2014
- 2014-02-18 EP EP14754482.9A patent/EP2959418A4/en not_active Withdrawn
- 2014-02-18 SG SG11201506642PA patent/SG11201506642PA/en unknown
- 2014-02-18 WO PCT/US2014/016976 patent/WO2014130472A1/en active Application Filing
- 2014-02-18 MX MX2015010893A patent/MX349569B/es active IP Right Grant
- 2014-02-18 JP JP2015558911A patent/JP6134395B2/ja active Active
- 2014-02-18 AU AU2014219077A patent/AU2014219077A1/en not_active Abandoned
- 2014-02-18 CA CA2902110A patent/CA2902110C/en active Active
-
2019
- 2019-10-08 AU AU2019246773A patent/AU2019246773B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2019246773A1 (en) | 2019-10-31 |
JP6134395B2 (ja) | 2017-05-24 |
CA2902110C (en) | 2018-07-31 |
JP2016513324A (ja) | 2016-05-12 |
EP2959418A4 (en) | 2016-10-05 |
SG11201506642PA (en) | 2015-09-29 |
AU2019246773B2 (en) | 2020-10-08 |
WO2014130472A1 (en) | 2014-08-28 |
CA2902110A1 (en) | 2014-08-28 |
AU2014219077A1 (en) | 2015-09-17 |
EP2959418A1 (en) | 2015-12-30 |
MX2015010893A (es) | 2016-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2015010893A (es) | Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. | |
PH12019550067A1 (en) | Iot security service | |
MX2018004173A (es) | Sistemas y metodos para evaluacion de seguridad y riesgos y pruebas de aplicaciones. | |
TW201614501A (en) | Systems and methods for segmenting data structures in a memory system | |
EP4277317A3 (en) | Sequencing the validity of access control keys | |
EA201690730A1 (ru) | Система и способ управления, объединения и распространения ключей шифрования | |
MX2016005769A (es) | Alineacion de tiempo de datos de sensor. | |
MX2015012671A (es) | Sistemas y metodos de definicion de atributos de ubucaciones asistidas de entrega / recuperacion. | |
EP4242892A3 (en) | Code pointer authentication for hardware flow control | |
MX2017012016A (es) | Comunicaciones de usuario con un comerciante a traves de un sistema de red social. | |
EP3398091A4 (en) | System, method, and device for unified access control on federated database | |
WO2014186713A3 (en) | Semantic naming model | |
WO2015177647A3 (en) | Technologies for protecting systems and data to prevent cyber-attacks | |
EP3005202A4 (en) | System and method for biometric authentication with device attestation | |
WO2014140926A3 (en) | Systems, methods, and computer-readable media for identifying when a subject is likely to be affected by a medical condition | |
WO2014016695A3 (en) | Presence-based credential updating | |
MX342365B (es) | Sistema de lector inalámbrico. | |
GB2555340A (en) | Protection of sensitive data | |
WO2018075388A3 (en) | ENHANCED LOGISTIC MANAGEMENT SYSTEM | |
MX346915B (es) | Sistemas y metodos para el procesamiento seguro con unidad criptografica incorporada. | |
MX362756B (es) | Sistema y métodos para una credencial incluyendo múltiples privilegios de acceso. | |
EP3197090A4 (en) | Management system, portable terminal device, management method, information processing method and program | |
WO2014137820A3 (en) | Systems and methods for associating microposts with geographic locations | |
BR112014030582A2 (pt) | dispositivo de processamento de informação, servidor, método de processamento de informação, e, programa. | |
PH12014501692A1 (en) | Control method, system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Grant or registration |