Movatterモバイル変換


[0]ホーム

URL:


IL260711A - - Google Patents

Info

Publication number
IL260711A
IL260711AIL26071118AIL26071118AIL260711AIL 260711 AIL260711 AIL 260711AIL 26071118 AIL26071118 AIL 26071118AIL 26071118 AIL26071118 AIL 26071118AIL 260711 AIL260711 AIL 260711A
Authority
IL
Israel
Application number
IL26071118A
Other versions
IL260711B1 (en
IL260711B2 (en
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/145,800external-prioritypatent/US20160330219A1/en
Priority claimed from US15/264,744external-prioritypatent/US20170076391A1/en
Application filedfiledCritical
Publication of IL260711ApublicationCriticalpatent/IL260711A/en
Publication of IL260711B1publicationCriticalpatent/IL260711B1/en
Publication of IL260711B2publicationCriticalpatent/IL260711B2/en

Links

Classifications

Landscapes

IL260711A2016-01-242017-01-24 Computer security is based on artificial intelligenceIL260711B2 (en)

Applications Claiming Priority (10)

Application NumberPriority DateFiling DateTitle
US201662286437P2016-01-242016-01-24
US201662294258P2016-02-112016-02-11
US201662307558P2016-03-132016-03-13
US201662323657P2016-04-162016-04-16
US201662326723P2016-04-232016-04-23
US15/145,800US20160330219A1 (en)2015-05-042016-05-04Method and device for managing security in a computer network
US201662341310P2016-05-252016-05-25
US15/264,744US20170076391A1 (en)2015-09-142016-09-14System of perpetual giving
US201662439409P2016-12-272016-12-27
PCT/US2017/014699WO2017127850A1 (en)2016-01-242017-01-24Computer security based on artificial intelligence

Publications (3)

Publication NumberPublication Date
IL260711Atrue IL260711A (en)2018-09-20
IL260711B1 IL260711B1 (en)2023-10-01
IL260711B2 IL260711B2 (en)2024-02-01

Family

ID=59362181

Family Applications (3)

Application NumberTitlePriority DateFiling Date
IL306075AIL306075B2 (en)2016-01-242017-01-24Computer security based on artificial intelligence
IL315165AIL315165A (en)2016-01-242017-01-24 Computer security is based on artificial intelligence
IL260711AIL260711B2 (en)2016-01-242017-01-24 Computer security is based on artificial intelligence

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
IL306075AIL306075B2 (en)2016-01-242017-01-24Computer security based on artificial intelligence
IL315165AIL315165A (en)2016-01-242017-01-24 Computer security is based on artificial intelligence

Country Status (14)

CountryLink
EP (1)EP3405911A4 (en)
JP (2)JP2019511030A (en)
KR (2)KR20240151252A (en)
CN (2)CN115062297A (en)
AU (3)AU2017210132A1 (en)
BR (1)BR112018015014A2 (en)
CA (1)CA3051164A1 (en)
IL (3)IL306075B2 (en)
MX (1)MX2018009079A (en)
MY (1)MY195524A (en)
RU (1)RU2750554C2 (en)
SG (2)SG10202108336PA (en)
WO (1)WO2017127850A1 (en)
ZA (1)ZA201805385B (en)

Families Citing this family (78)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11574287B2 (en)2017-10-102023-02-07Text IQ, Inc.Automatic document classification
WO2019104189A1 (en)*2017-11-272019-05-31Intuition Robotics, LtdSystem and method for optimizing resource usage of a robot
US11232523B2 (en)2018-01-022022-01-25Patrick SchurSystem and method for providing an intelligent operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant tags, i-bubble tags, demojis and demoticons
US11157295B2 (en)2018-01-022021-10-26Patrick SchurSystem and method for providing intelligent operant operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant+198 tags, i-bubble+198 tags, demojis+198 and demoticons+198
WO2019169486A1 (en)*2018-03-052019-09-12EzoTech Inc.Automated security testing system and method
US10965703B2 (en)2018-06-062021-03-30Reliaquest Holdings, LlcThreat mitigation system and method
US11709946B2 (en)2018-06-062023-07-25Reliaquest Holdings, LlcThreat mitigation system and method
US10785108B1 (en)2018-06-212020-09-22Wells Fargo Bank, N.A.Intelligent learning and management of a networked architecture
US11068464B2 (en)2018-06-262021-07-20At&T Intellectual Property I, L.P.Cyber intelligence system and method
US10868782B2 (en)2018-07-122020-12-15Bank Of America CorporationSystem for flagging data transmissions for retention of metadata and triggering appropriate transmission placement
WO2020016906A1 (en)*2018-07-162020-01-23Sriram GovindanMethod and system for intrusion detection in an enterprise
US11601442B2 (en)2018-08-172023-03-07The Research Foundation For The State University Of New YorkSystem and method associated with expedient detection and reconstruction of cyber events in a compact scenario representation using provenance tags and customizable policy
CN109189751B (en)*2018-09-182023-05-26平安科技(深圳)有限公司Data synchronization method based on block chain and terminal equipment
US11122136B2 (en)2018-10-222021-09-14Red Hat, Inc.Quantum payload service for facilitating communications between a quantum computing system and classical computing systems
US10740930B2 (en)2018-11-072020-08-11Love Good Color LLCSystems and methods for color selection and auditing
US11144334B2 (en)2018-12-202021-10-12Red Hat, Inc.Quantum computer task manager
KR102167767B1 (en)*2018-12-262020-10-19단국대학교 산학협력단Automatic build apparatus and method of application for generating training data set of machine learning
EP3693873B1 (en)*2019-02-072022-02-16AO Kaspersky LabSystems and methods for configuring a gateway for protection of automated systems
WO2020167586A1 (en)*2019-02-112020-08-20Db Cybertech, Inc.Automated data discovery for cybersecurity
FR3094600B1 (en)*2019-03-292022-05-06Orange Method for extracting at least one communication pattern in a communication network
US11546366B2 (en)2019-05-082023-01-03International Business Machines CorporationThreat information sharing based on blockchain
CN114064522B (en)*2019-05-092025-09-26北京忆芯科技有限公司A kind of computer
US11309974B2 (en)2019-05-092022-04-19Red Hat, Inc.Quantum channel routing utilizing a quantum channel measurement service
USD926810S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926809S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926811S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926782S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926200S1 (en)2019-06-062021-07-27Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
CN110187885B (en)*2019-06-102023-03-31合肥本源量子计算科技有限责任公司Intermediate code generation method and device for quantum program compiling
US12155646B2 (en)2019-06-102024-11-26Microsoft Technology Licensing, LlcAuthentication with random noise symbols and pattern recognition
CN111027623A (en)*2019-12-102020-04-17深圳供电局有限公司Data-enhanced intelligent terminal security level classification method and system
KR102299145B1 (en)*2020-02-252021-09-07서울과학기술대학교 산학협력단Cyber Physical System for digital forensic evidence collection
KR20210115728A (en)*2020-03-162021-09-27삼성전자주식회사Electronic apparatus and control method thereof
CN111460129B (en)*2020-03-272023-08-22泰康保险集团股份有限公司Method, device, electronic equipment and storage medium for generating identification
KR102164203B1 (en)*2020-04-032020-10-13주식회사 이지시큐Information security risk analysis automation system and operation method thereof
CN111659124B (en)*2020-05-272023-05-02太原理工大学 An Intelligent Discrimination System for Chess
WO2021243321A1 (en)*2020-05-292021-12-02Qomplx, Inc.A system and methods for score cybersecurity
CN111651756B (en)*2020-06-042022-05-31成都安恒信息技术有限公司Automatic substitution and filling method applied to operation and maintenance audit navicat
CN112035797A (en)*2020-08-312020-12-04山东诺蓝信息科技有限公司 A Power State Judgment Algorithm Based on Self-Learning
KR102233698B1 (en)*2020-09-292021-03-30주식회사 이지시큐method and system for setting risk level related to information protection based on confidentiality, integrity, availability
KR102233694B1 (en)*2020-09-292021-03-30주식회사 이지시큐Information security system providing cost reduction and effective authentication management
KR102232883B1 (en)*2020-09-292021-03-26주식회사 이지시큐Artificial intelligence system for authentication of information security management system
KR102233695B1 (en)*2020-09-292021-03-30주식회사 이지시큐Information and communication system for performing information protection risk analysis
US11606694B2 (en)2020-10-082023-03-14Surendra GoelSystem that provides cybersecurity in a home or office by interacting with internet of things devices and other devices
KR102280845B1 (en)2020-11-242021-07-22한국인터넷진흥원Method and apparatus for detecting abnormal behavior in network
WO2022126260A1 (en)*2020-12-152022-06-23Mastercard Technologies Canada ULCEnterprise server and method with universal bypass mechanism for automatically testing real-time cybersecurity microservice with live data
CN114745291A (en)*2020-12-232022-07-12北京国双科技有限公司Abnormal data cloud method and device, electronic equipment and storage medium
CN114765627B (en)*2021-01-142024-09-20京东科技控股股份有限公司Data transmission method, device, storage medium and computer program product
US12003542B2 (en)2021-01-142024-06-04International Business Machines CorporationRapid initial deployment database security model
CN112783661B (en)*2021-02-082022-08-12上海交通大学 A memory deduplication method and device suitable for container environment
WO2022169461A1 (en)*2021-02-082022-08-11Hewlett-Packard Development Company, L.P.Malware scans
CN112819590B (en)*2021-02-252023-03-10紫光云技术有限公司Method for managing product configuration information in cloud product service delivery process
CN113395593B (en)*2021-08-172021-10-29深圳佳力拓科技有限公司Data transmission method and device for digital television terminal with reduced information leakage
CN113961518B (en)*2021-09-082022-09-23北京百度网讯科技有限公司Log visual display method and device, electronic equipment and storage medium
US12052274B2 (en)2021-09-232024-07-30Armis Security Ltd.Techniques for enriching device profiles and mitigating cybersecurity threats using enriched device profiles
CN113986589B (en)*2021-10-092024-12-20广州博依特智能信息科技有限公司 Fault-tolerant strategy selection method and system for intelligent edge computing gateway
AU2022396273A1 (en)*2021-11-232024-05-30Strong Force TX Portfolio 2018, LLCTransaction platforms where systems include sets of other systems
CN114722400B (en)*2022-03-182024-12-20西安电子科技大学 A method, system, medium, device and terminal for side channel vulnerability detection
JP2023169666A (en)2022-05-172023-11-30日本電気株式会社Coordination system, coordination method, and program
KR102509102B1 (en)*2022-07-152023-03-09신헌주Fostering System Using Artificial Intelligence
CN115203689B (en)*2022-07-252023-05-02广州正则纬创信息科技有限公司Data security sharing method and system
CN115866083B (en)*2022-11-212025-08-01苏州浪潮智能科技有限公司Internet of things communication method, system, equipment and storage medium
CN115811457B (en)*2022-12-012025-07-15上海叠念信息科技有限公司 Integrated data acquisition method based on multi-source data fusion
CN115987176B (en)*2023-02-012023-09-12北京东土科技股份有限公司 Method, device and edge controller for zero return control of motor position
US20240289463A1 (en)*2023-02-282024-08-29International Business Machines CorporationModification of vulnerable pods
US12052140B1 (en)*2023-04-212024-07-30Capital One Services, LlcCompliance for cloud-based applications and computer systems using machine learning
US12399759B2 (en)2023-05-182025-08-26Wells Fargo Bank, N.A.Data enhancements for remote procedure call frameworks
CN116522895B (en)*2023-06-162023-09-12中国传媒大学 A method and device for text content authenticity assessment based on writing style
CN117134950B (en)*2023-08-042024-08-02华能信息技术有限公司Safety analysis method and system based on protocol state
CN117150551B (en)*2023-09-042024-02-27东方魂数字科技(北京)有限公司User privacy protection method and system based on big data
CN117540038B (en)*2024-01-102024-03-22中国信息通信研究院 Intelligent detection of false data synthesis method and system
CN118643518B (en)*2024-08-092024-11-08水发(北京)建设有限公司 Water resource optimization configuration system and method for near-zero sewage discharge in industrial parks
KR102819284B1 (en)*2024-08-202025-06-11주식회사 씨에이치엔네트웍스Method, apparatus, and system for monitoring input and output information of a chatbot service based on a generative artificial intelligence model and driving a security agent solution
CN118941063B (en)*2024-10-152025-01-21电子科技大学 A project resource collaborative planning method based on double triangle evolution mechanism
KR102851776B1 (en)2024-12-272025-08-27한국인터넷진흥원Method for identifying attack infrastructure and system therefor
CN120030064B (en)*2025-04-222025-08-08支付宝(杭州)信息技术有限公司 Vector retrieval method and device for protecting data privacy
CN120389916B (en)*2025-06-302025-08-22济南职业学院Network security vulnerability detection method and system based on artificial intelligence
CN120434415B (en)*2025-07-082025-09-23杭州市消费者权益保护委员会秘书处(杭州国家电子商务产品质量监测处置中心)Voice monitoring method and system for live selling of electronic commerce products

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1245572A (en)*1997-10-302000-02-23全昌龙Computer security device
US20020165947A1 (en)*2000-09-252002-11-07Crossbeam Systems, Inc.Network application apparatus
WO2007117636A2 (en)*2006-04-062007-10-18Smobile Systems, Inc.Malware detection system and method for comprssed data on mobile platforms
US7991724B2 (en)*2006-12-212011-08-02Support Machines Ltd.Method and a computer program product for providing a response to a statement of a user
JP2008234409A (en)*2007-03-222008-10-02Toshiba Corp Security threat analysis support system and method, and security threat analysis support program
US9489647B2 (en)*2008-06-192016-11-08Csc Agility Platform, Inc.System and method for a cloud computing abstraction with self-service portal for publishing resources
US8353033B1 (en)*2008-07-022013-01-08Symantec CorporationCollecting malware samples via unauthorized download protection
JP5219783B2 (en)*2008-12-242013-06-26三菱電機株式会社 Unauthorized access detection device, unauthorized access detection program, recording medium, and unauthorized access detection method
WO2010123586A2 (en)*2009-04-242010-10-28Allgress, Inc.Enterprise information security management software for prediction modeling with interactive graphs
US20120123829A1 (en)*2009-07-302012-05-17CENX, Inc.Independent carrier ethernet interconnection platform
US10019677B2 (en)*2009-11-202018-07-10Alert Enterprise, Inc.Active policy enforcement
US8806568B2 (en)*2011-07-112014-08-12International Business Machines CorporationAutomatic generation of user account policies based on configuration management database information
US9386030B2 (en)*2012-09-182016-07-05Vencore Labs, Inc.System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
US10096316B2 (en)*2013-11-272018-10-09Sri InternationalSharing intents to provide virtual assistance in a multi-person dialog
EP2725728B1 (en)*2012-10-292018-08-15ADVA Optical Networking SEMethod and device for assessing the performance of one or more packet synchronization services in a packet data transmission network
JP6086423B2 (en)*2012-11-142017-03-01国立研究開発法人情報通信研究機構 Unauthorized communication detection method by collating observation information of multiple sensors
WO2014094151A1 (en)*2012-12-212014-06-26Seccuris Inc.System and method for monitoring data in a client environment
RU2522019C1 (en)*2012-12-252014-07-10Закрытое акционерное общество "Лаборатория Касперского"System and method of detecting threat in code executed by virtual machine
US9406143B2 (en)*2013-02-212016-08-02Samsung Electronics Co., Ltd.Electronic device and method of operating electronic device
US9875494B2 (en)*2013-04-162018-01-23Sri InternationalUsing intents to analyze and personalize a user's dialog experience with a virtual personal assistant
KR20140136350A (en)*2013-05-202014-11-28삼성전자주식회사Method and apparatus for using a electronic device
CN103593610B (en)*2013-10-092016-08-31中国电子科技集团公司第二十八研究所Spyware self adaptation based on computer immunity induction and detection method
US9489514B2 (en)*2013-10-112016-11-08Verisign, Inc.Classifying malware by order of network behavior artifacts
RU2014111971A (en)*2014-03-282015-10-10Юрий Михайлович Буров METHOD AND SYSTEM OF VOICE INTERFACE
GB2524583B (en)*2014-03-282017-08-09Kaizen Reaux-Savonte CoreySystem, architecture and methods for an intelligent, self-aware and context-aware digital organism-based telecommunication system
US9519686B2 (en)*2014-04-092016-12-13International Business Machines CorporationConfidence ranking of answers based on temporal semantics
US9130906B1 (en)*2014-05-232015-09-08The United States Of America As Represented By The Secretary Of The NavyMethod and apparatus for automated secure one-way data transmission
WO2016001924A2 (en)*2014-06-302016-01-07Syqe Medical Ltd.Methods, devices and systems for pulmonary delivery of active agents

Also Published As

Publication numberPublication date
IL315165A (en)2024-10-01
BR112018015014A2 (en)2018-12-18
IL260711B1 (en)2023-10-01
MX2018009079A (en)2022-12-15
AU2024202003A1 (en)2024-04-18
CN115062297A (en)2022-09-16
CN109313687A (en)2019-02-05
SG10202108336PA (en)2021-08-30
RU2018129947A (en)2020-02-25
EP3405911A1 (en)2018-11-28
IL306075B1 (en)2024-09-01
IL260711B2 (en)2024-02-01
IL306075B2 (en)2025-01-01
AU2022202786A1 (en)2022-05-19
JP2019511030A (en)2019-04-18
CN109313687B (en)2022-06-24
CA3051164A1 (en)2017-07-27
RU2750554C2 (en)2021-06-29
ZA201805385B (en)2022-07-27
WO2017127850A1 (en)2017-07-27
RU2018129947A3 (en)2020-07-08
KR20180105688A (en)2018-09-28
EP3405911A4 (en)2019-09-18
KR20240151252A (en)2024-10-17
SG11201806117TA (en)2018-08-30
AU2017210132A1 (en)2018-08-23
MY195524A (en)2023-01-30
IL306075A (en)2023-11-01
JP2022141966A (en)2022-09-29

Similar Documents

PublicationPublication DateTitle
IL260711A (en)
CN303538877S (en)
CN303854642S (en)
CN303537277S (en)
CN303537266S (en)
CN303536286S (en)
CN303536579S (en)
CN303536278S (en)
CN303536549S (en)
CN303537318S (en)
CN303328802S8 (en)
CN303538849S (en)
CN303831136S (en)
CN303808914S (en)
CN303772963S (en)
CN303656583S (en)
CN303601955S (en)
CN303590230S (en)
CN303563073S (en)
CN303538954S (en)
CN303536534S (en)
CN303536519S (en)
CN303538951S (en)
CN303537290S (en)
CN303536440S (en)

[8]ページ先頭

©2009-2025 Movatter.jp