Movatterモバイル変換


[0]ホーム

URL:


US20050182969A1 - Periodic filesystem integrity checks - Google Patents

Periodic filesystem integrity checks
Download PDF

Info

Publication number
US20050182969A1
US20050182969A1US11/102,050US10205005AUS2005182969A1US 20050182969 A1US20050182969 A1US 20050182969A1US 10205005 AUS10205005 AUS 10205005AUS 2005182969 A1US2005182969 A1US 2005182969A1
Authority
US
United States
Prior art keywords
agent
network
data
alarm
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/102,050
Inventor
Andrew Ginter
Kegan Kawano
Tom Hutchinson
Rui Manuel Lopes
Erik Hope
Brad McMillan
Adam Muegge
Andy Mah
Brett Jensen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capgemini Cyber Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US11/102,050priorityCriticalpatent/US20050182969A1/en
Publication of US20050182969A1publicationCriticalpatent/US20050182969A1/en
Assigned to INDUSTRIAL DEFENDER, INC.reassignmentINDUSTRIAL DEFENDER, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: VERANO, INC.
Assigned to INDUSTRIAL DEFENDER, INC.reassignmentINDUSTRIAL DEFENDER, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: VERANO, INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.

Description

Claims (9)

US11/102,0502003-06-092005-04-08Periodic filesystem integrity checksAbandonedUS20050182969A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/102,050US20050182969A1 (en)2003-06-092005-04-08Periodic filesystem integrity checks

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US47708803P2003-06-092003-06-09
US10/815,222US7246156B2 (en)2003-06-092004-03-31Method and computer program product for monitoring an industrial network
US11/102,050US20050182969A1 (en)2003-06-092005-04-08Periodic filesystem integrity checks

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/815,222DivisionUS7246156B2 (en)2003-06-092004-03-31Method and computer program product for monitoring an industrial network

Publications (1)

Publication NumberPublication Date
US20050182969A1true US20050182969A1 (en)2005-08-18

Family

ID=33555439

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US10/815,222Expired - LifetimeUS7246156B2 (en)2003-06-092004-03-31Method and computer program product for monitoring an industrial network
US11/102,050AbandonedUS20050182969A1 (en)2003-06-092005-04-08Periodic filesystem integrity checks
US11/807,877AbandonedUS20100023598A9 (en)2003-06-092007-05-30Event monitoring and management
US11/807,699Expired - LifetimeUS7779119B2 (en)2003-06-092007-05-30Event monitoring and management

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/815,222Expired - LifetimeUS7246156B2 (en)2003-06-092004-03-31Method and computer program product for monitoring an industrial network

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US11/807,877AbandonedUS20100023598A9 (en)2003-06-092007-05-30Event monitoring and management
US11/807,699Expired - LifetimeUS7779119B2 (en)2003-06-092007-05-30Event monitoring and management

Country Status (5)

CountryLink
US (4)US7246156B2 (en)
EP (1)EP1636704A4 (en)
AU (1)AU2004248605B2 (en)
CA (1)CA2526759C (en)
WO (1)WO2004111785A2 (en)

Cited By (92)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040250169A1 (en)*2003-04-172004-12-09Kddi CorporationIDS log analysis support apparatus, IDS log analysis support method and IDS log analysis support program
US20050044535A1 (en)*2003-08-202005-02-24Acres Gaming IncorporatedMethod and apparatus for monitoring and updating system software
US20050135236A1 (en)*2003-12-232005-06-23International Business Machines CorporationSmart access point
US20050195738A1 (en)*2003-12-142005-09-08Krishnam DatlaMethod and system for automatically determining commands for a network element
US20050273851A1 (en)*2004-06-082005-12-08Krishnam Raju DatlaMethod and apparatus providing unified compliant network audit
US20060004742A1 (en)*2004-06-082006-01-05Datla Krishnam RMethod and apparatus for configuration syntax and semantic validation
US20060013217A1 (en)*2004-06-082006-01-19Datla Krishnam RMethod and apparatus providing programmable network intelligence
US20060015591A1 (en)*2004-06-082006-01-19Datla Krishnam RApparatus and method for intelligent configuration editor
US20060056366A1 (en)*2004-09-162006-03-16The Boeing Company"Wireless ISLAND" mobile LAN-to-LAN tunneling solution
US20070005298A1 (en)*2005-06-222007-01-04International Business Machines CorporationMonitoring method, system, and computer program based on severity and persistence of problems
US20070043974A1 (en)*2005-08-172007-02-22Microsoft CorporationTechniques for performing memory diagnostics
US20070156375A1 (en)*2005-12-292007-07-05Microsoft CorporationPerformance engineering and the application life cycle
US20070157311A1 (en)*2005-12-292007-07-05Microsoft CorporationSecurity modeling and the application life cycle
US20070180101A1 (en)*2006-01-102007-08-02A10 Networks Inc.System and method for storing data-network activity information
US20070192344A1 (en)*2005-12-292007-08-16Microsoft CorporationThreats and countermeasures schema
US20070199050A1 (en)*2006-02-142007-08-23Microsoft CorporationWeb application security frame
US20070204346A1 (en)*2006-02-272007-08-30Microsoft CorporationServer security schema
US20070239999A1 (en)*2002-01-252007-10-11Andrew HonigSystems and methods for adaptive model generation for detecting intrusions in computer systems
US20070300103A1 (en)*2004-02-192007-12-27Microsoft CorporationMethod and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
US20080004763A1 (en)*2006-06-302008-01-03Caterpillar Inc.Method and system for preventing excessive tire wear on machines
US20080022093A1 (en)*2006-06-202008-01-24Microsoft CorporationIntegrating security protection tools with computer device integrity and privacy policy
US20080027568A1 (en)*2006-07-272008-01-31Scott Allan PearsonMethod and Apparatus for Equipment Health Monitoring
US20080052508A1 (en)*2006-08-252008-02-28Huotari Allen JNetwork security status indicators
US20080072277A1 (en)*2006-09-192008-03-20Searete Llc, A Limited Liability Corporation Of The State Of DelawareEvaluation systems and methods for coordinating software agents
US20080072278A1 (en)*2006-09-192008-03-20Searete Llc, A Limited Liability Corporation Of The State Of DelawareEvaluation systems and methods for coordinating software agents
US20080072241A1 (en)*2006-09-192008-03-20Searete Llc, A Limited Liability Corporation Of The State Of DelawareEvaluation systems and methods for coordinating software agents
US20080109890A1 (en)*2006-11-032008-05-08Microsoft CorporationSelective auto-revocation of firewall security settings
US20080126031A1 (en)*2006-11-292008-05-29Mitsubishi Electric Research LaboratoriesSystem and Method for Measuring Performances of Surveillance Systems
US20080126884A1 (en)*2006-11-282008-05-29Siemens AktiengesellschaftMethod for providing detailed information and support regarding an event message
US20080126856A1 (en)*2006-08-182008-05-29Microsoft CorporationConfiguration replication for system recovery and migration
US20080127293A1 (en)*2006-09-192008-05-29Searete LLC, a liability corporation of the State of DelawareEvaluation systems and methods for coordinating software agents
US20080201337A1 (en)*2004-02-192008-08-21Microsoft CorporationMethod and system for collecting information from computer systems based on a trusted relationship
US20080209033A1 (en)*2003-06-092008-08-28Andrew GinterEvent monitoring and management
US20080270369A1 (en)*2007-04-262008-10-30Microsoft CorporationFramework for providing metrics from any datasource
US20080270469A1 (en)*2007-04-262008-10-30Microsoft CorporationBusiness metrics aggregated by custom hierarchy
US20090025077A1 (en)*2007-07-182009-01-22Bart TrojanowskiManaging configurations of a firewall
US20090064332A1 (en)*2007-04-042009-03-05Phillip Andrew PorrasMethod and apparatus for generating highly predictive blacklists
US20090300762A1 (en)*2008-05-312009-12-03Ramachandra YalakantiMethods And Systems For Managing A Potential Security Threat To A Network
US20100169970A1 (en)*2001-08-162010-07-01Stolfo Salvatore JSystem and methods for detecting malicious email transmission
US7818797B1 (en)*2001-10-112010-10-19The Trustees Of Columbia University In The City Of New YorkMethods for cost-sensitive modeling for intrusion detection and response
US20100325687A1 (en)*2009-06-222010-12-23Iverson Gyle TSystems and Methods for Custom Device Automatic Password Management
US20100325707A1 (en)*2009-06-222010-12-23Gyle IversonSystems and Methods for Automatic Discovery of Systems and Accounts
US20100325705A1 (en)*2009-06-222010-12-23Symark International, Inc.Systems and Methods for A2A and A2DB Security Using Program Authentication Factors
US20110016513A1 (en)*2009-07-172011-01-20American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US20110154034A1 (en)*2009-12-172011-06-23American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transactions
US20110154497A1 (en)*2009-12-172011-06-23American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110178933A1 (en)*2010-01-202011-07-21American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US20120084413A1 (en)*2010-10-052012-04-05Red Hat Israel, Ltd.Mechanism for Installing Monitoring Utilities Using Universal Performance Monitor
US20120324591A1 (en)*2011-06-142012-12-20International Business Machines CorporationSystem and method to protect a resource using an active avatar
US8504841B1 (en)2006-10-192013-08-06United Services Automobile Association (Usaa)Systems and methods for software application security management
US8544087B1 (en)2001-12-142013-09-24The Trustess Of Columbia University In The City Of New YorkMethods of unsupervised anomaly detection using a geometric framework
US8544071B1 (en)*2006-10-192013-09-24United Services Automobile Association (Usaa)Systems and methods for software application security management
US20130305343A1 (en)*2006-01-132013-11-14Fortinet, Inc.Computerized system and method for handling network traffic
US8621288B2 (en)*2010-10-052013-12-31Canon Kabushiki KaishaManagement apparatus, method for controlling same, and storage medium for same
US20140108319A1 (en)*2012-10-122014-04-17Bruno KLAUSERAutonomic network sentinels
US8782751B2 (en)2006-05-162014-07-15A10 Networks, Inc.Systems and methods for user access authentication based on network access point
US8800031B2 (en)2011-02-032014-08-05International Business Machines CorporationControlling access to sensitive data based on changes in information classification
US20140283044A1 (en)*2013-01-312014-09-18Tencent Technology (Shenzhen) Company LimitedMethod and Device For Preventing Application in an Operating System From Being Uninstalled
US8850539B2 (en)2010-06-222014-09-30American Express Travel Related Services Company, Inc.Adaptive policies and protections for securing financial transaction data at rest
US8868765B1 (en)2006-10-172014-10-21A10 Networks, Inc.System and method to associate a private user identity with a public user identity
US8924296B2 (en)2010-06-222014-12-30American Express Travel Related Services Company, Inc.Dynamic pairing system for securing a trusted communication channel
US9122853B2 (en)2013-06-242015-09-01A10 Networks, Inc.Location determination for user authentication
WO2016003716A1 (en)*2014-06-302016-01-07Intuit Inc.Method and system for secure delivery of information to computing environments
US20160020976A1 (en)*2014-07-212016-01-21Nimal K. K. GamageIncident-Based Adaptive Monitoring of Information in a Distributed Computing Environment
US9256488B2 (en)2010-10-052016-02-09Red Hat Israel, Ltd.Verification of template integrity of monitoring templates used for customized monitoring of system activities
US9306966B2 (en)2001-12-142016-04-05The Trustees Of Columbia University In The City Of New YorkMethods of unsupervised anomaly detection using a geometric framework
US9325726B2 (en)2014-02-032016-04-26Intuit Inc.Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
US9323926B2 (en)2013-12-302016-04-26Intuit Inc.Method and system for intrusion and extrusion detection
US9330263B2 (en)2014-05-272016-05-03Intuit Inc.Method and apparatus for automating the building of threat models for the public cloud
US9363107B2 (en)2010-10-052016-06-07Red Hat Israel, Ltd.Accessing and processing monitoring data resulting from customized monitoring of system activities
US9374389B2 (en)2014-04-252016-06-21Intuit Inc.Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
US9459987B2 (en)2014-03-312016-10-04Intuit Inc.Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
US9473481B2 (en)2014-07-312016-10-18Intuit Inc.Method and system for providing a virtual asset perimeter
US9497201B2 (en)2006-10-172016-11-15A10 Networks, Inc.Applying security policy to an application session
US9501345B1 (en)2013-12-232016-11-22Intuit Inc.Method and system for creating enriched log data
US9516064B2 (en)2013-10-142016-12-06Intuit Inc.Method and system for dynamic and comprehensive vulnerability management
US9524224B2 (en)2010-10-052016-12-20Red Hat Israel, Ltd.Customized monitoring of system activities
US9596251B2 (en)2014-04-072017-03-14Intuit Inc.Method and system for providing security aware applications
EP3171567A1 (en)*2015-11-232017-05-24Alcatel LucentAdvanced persistent threat detection
US9678492B2 (en)2012-02-012017-06-13Abb Research Ltd.Dynamic configuration of an industrial control system
US9729508B2 (en)2005-11-222017-08-08Fortinet, Inc.Policy-based content filtering
US9900322B2 (en)2014-04-302018-02-20Intuit Inc.Method and system for providing permissions management
US9923909B2 (en)2014-02-032018-03-20Intuit Inc.System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment
US10102082B2 (en)2014-07-312018-10-16Intuit Inc.Method and system for providing automated self-healing virtual assets
US10261489B2 (en)2015-04-152019-04-16Indegy Ltd.Detection of mis-configuration and hostile attacks in industrial control networks using active querying
US10360625B2 (en)2010-06-222019-07-23American Express Travel Related Services Company, Inc.Dynamically adaptive policy management for securing mobile financial transactions
CN110543452A (en)*2019-08-072019-12-06浙江大华技术股份有限公司data acquisition method and equipment
US10757133B2 (en)2014-02-212020-08-25Intuit Inc.Method and system for creating and deploying virtual assets
US10977361B2 (en)2017-05-162021-04-13Beyondtrust Software, Inc.Systems and methods for controlling privileged operations
US11165770B1 (en)2013-12-062021-11-02A10 Networks, Inc.Biometric verification of a human internet user
US11294700B2 (en)2014-04-182022-04-05Intuit Inc.Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US11528149B2 (en)2019-04-262022-12-13Beyondtrust Software, Inc.Root-level application selective configuration

Families Citing this family (539)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8564661B2 (en)*2000-10-242013-10-22Objectvideo, Inc.Video analytic rule detection system and method
US9892606B2 (en)*2001-11-152018-02-13Avigilon Fortress CorporationVideo surveillance system employing video primitives
US7389204B2 (en)*2001-03-012008-06-17Fisher-Rosemount Systems, Inc.Data presentation system for abnormal situation prevention in a process plant
US8073967B2 (en)2002-04-152011-12-06Fisher-Rosemount Systems, Inc.Web services-based communications for use with process control systems
US7720727B2 (en)*2001-03-012010-05-18Fisher-Rosemount Systems, Inc.Economic calculations in process control system
US7587481B1 (en)*2001-04-052009-09-08Dj Inventions, LlcEnterprise server for SCADA system with security interface
US20020191102A1 (en)*2001-05-312002-12-19Casio Computer Co., Ltd.Light emitting device, camera with light emitting device, and image pickup method
US8910241B2 (en)2002-04-252014-12-09Citrix Systems, Inc.Computer security system
US7420929B1 (en)2002-07-022008-09-02Juniper Networks, Inc.Adaptive network flow analysis
US9069666B2 (en)*2003-05-212015-06-30Hewlett-Packard Development Company, L.P.Systems and methods for controlling error reporting and resolution
WO2004107130A2 (en)*2003-05-282004-12-09Caymas Systems, Inc.Multilayer access control security system
US20090271504A1 (en)*2003-06-092009-10-29Andrew Francis GinterTechniques for agent configuration
US20050033701A1 (en)*2003-08-082005-02-10International Business Machines CorporationSystem and method for verifying the identity of a remote meter transmitting utility usage data
US20050050357A1 (en)*2003-09-022005-03-03Su-Huei JengMethod and system for detecting unauthorized hardware devices
US20060015630A1 (en)2003-11-122006-01-19The Trustees Of Columbia University In The City Of New YorkApparatus method and medium for identifying files using n-gram distribution of data
US7590726B2 (en)*2003-11-252009-09-15Microsoft CorporationSystems and methods for unifying and/or utilizing state information for managing networked systems
US7613804B2 (en)*2003-11-252009-11-03Microsoft CorporationSystems and methods for state management of networked systems
US7430598B2 (en)*2003-11-252008-09-30Microsoft CorporationSystems and methods for health monitor alert management for networked systems
US20050114707A1 (en)*2003-11-262005-05-26Destefano Jason MichaelMethod for processing log data from local and remote log-producing devices
US20050114321A1 (en)*2003-11-262005-05-26Destefano Jason M.Method and apparatus for storing and reporting summarized log data
US8234256B2 (en)*2003-11-262012-07-31Loglogic, Inc.System and method for parsing, summarizing and reporting log data
US20050114505A1 (en)*2003-11-262005-05-26Destefano Jason M.Method and apparatus for retrieving and combining summarized log data in a distributed log data processing system
US7599939B2 (en)*2003-11-262009-10-06Loglogic, Inc.System and method for storing raw log data
US20050198099A1 (en)*2004-02-242005-09-08Covelight Systems, Inc.Methods, systems and computer program products for monitoring protocol responses for a server application
US7079984B2 (en)*2004-03-032006-07-18Fisher-Rosemount Systems, Inc.Abnormal situation prevention in a process plant
US7676287B2 (en)*2004-03-032010-03-09Fisher-Rosemount Systems, Inc.Configuration system and method for abnormal situation prevention in a process plant
US8224937B2 (en)*2004-03-042012-07-17International Business Machines CorporationEvent ownership assigner with failover for multiple event server system
US20050234988A1 (en)*2004-04-162005-10-20Messick Randall EMessage-based method and system for managing a storage area network
US7669199B2 (en)*2004-04-282010-02-23Openlogic, Inc.Installation of software stacks including uncoordinated projects
DE102004021031A1 (en)*2004-04-292005-11-24Siemens Ag Method for generating and managing templates for event management
US7664855B1 (en)*2004-05-052010-02-16Juniper Networks, Inc.Port scanning mitigation within a network through establishment of an a prior network connection
US20050273673A1 (en)*2004-05-192005-12-08Paul GassowaySystems and methods for minimizing security logs
WO2005117370A2 (en)*2004-05-192005-12-08Computer Associates Think, Inc.Using address ranges to detect malicious activity
US20050271128A1 (en)*2004-06-022005-12-08Williams Jeffery DDistributed SCADA system for remote monitoring and control of access points utilizing an intelligent uninterruptible power supply system for a WISP network
US20050289232A1 (en)*2004-06-072005-12-29Rudiger EbertMethod, apparatus, and system for monitoring performance remotely from a user
US20060021021A1 (en)*2004-06-082006-01-26Rajesh PatelSecurity event data normalization
JP2006013737A (en)*2004-06-242006-01-12Fujitsu Ltd Abnormal traffic removal device
US10284571B2 (en)*2004-06-282019-05-07Riverbed Technology, Inc.Rule based alerting in anomaly detection
US8458783B2 (en)*2004-06-302013-06-04Citrix Systems, Inc.Using application gateways to protect unauthorized transmission of confidential data via web applications
US9154511B1 (en)2004-07-132015-10-06Dell Software Inc.Time zero detection of infectious messages
US7343624B1 (en)2004-07-132008-03-11Sonicwall, Inc.Managing infectious messages as identified by an attachment
US8589531B2 (en)*2004-07-142013-11-19Riverbed Technology, Inc.Network difference reporting
US8127344B2 (en)*2004-07-212012-02-28Iternity GmbhRapid archivable WORM memory system based on a hard disc
US7546635B1 (en)2004-08-112009-06-09Juniper Networks, Inc.Stateful firewall protection for control plane traffic within a network device
US20060034305A1 (en)*2004-08-132006-02-16Honeywell International Inc.Anomaly-based intrusion detection
US7280030B1 (en)*2004-09-242007-10-09Sielox, LlcSystem and method for adjusting access control based on homeland security levels
US8499337B1 (en)*2004-10-062013-07-30Mcafee, Inc.Systems and methods for delegation and notification of administration of internet access
US8433768B1 (en)*2004-10-142013-04-30Lockheed Martin CorporationEmbedded model interaction within attack projection framework of information system
US7408441B2 (en)*2004-10-252008-08-05Electronic Data Systems CorporationSystem and method for analyzing user-generated event information and message information from network devices
US7408440B2 (en)2004-10-252008-08-05Electronics Data Systems CorporationSystem and method for analyzing message information from diverse network devices
US20060168170A1 (en)*2004-10-252006-07-27Korzeniowski Richard WSystem and method for analyzing information relating to network devices
JP4938233B2 (en)*2004-11-092012-05-23キヤノン電子株式会社 Management server, information processing apparatus, control method therefor, network management system, computer program, and computer-readable storage medium
JP4422595B2 (en)*2004-11-262010-02-24富士通株式会社 Monitoring system, monitored device, monitoring device, and monitoring method
US8756682B2 (en)*2004-12-202014-06-17Hewlett-Packard Development Company, L.P.Method and system for network intrusion prevention
US8974304B2 (en)*2004-12-222015-03-10Wms Gaming Inc.System, method, and apparatus for detecting abnormal behavior of a wagering game machine
US8266320B1 (en)*2005-01-272012-09-11Science Applications International CorporationComputer network defense
US9325728B1 (en)2005-01-272016-04-26Leidos, Inc.Systems and methods for implementing and scoring computer network defense exercises
US7895167B2 (en)*2005-02-162011-02-22Xpolog Ltd.System and method for analysis and management of logs and events
US20060203736A1 (en)*2005-03-102006-09-14Stsn General Holdings Inc.Real-time mobile user network operations center
US8418226B2 (en)*2005-03-182013-04-09Absolute Software CorporationPersistent servicing agent
US9438683B2 (en)*2005-04-042016-09-06Aol Inc.Router-host logging
US7685292B1 (en)2005-04-072010-03-23Dell Marketing Usa L.P.Techniques for establishment and use of a point-to-point tunnel between source and target devices
US8140614B2 (en)*2005-06-022012-03-20International Business Machines CorporationDistributed computing environment with remote data collection management
JP4313336B2 (en)*2005-06-032009-08-12株式会社日立製作所 Monitoring system and monitoring method
US7184935B1 (en)*2005-06-102007-02-27Hewlett-Packard Development Company, L.P.Determining and annotating a signature of a computer resource
US8364841B2 (en)*2005-06-162013-01-29Infinera CorporationXML over TCP management protocol with tunneled proxy support and connection management
US7295950B2 (en)*2005-06-232007-11-13International Business Machines CorporationMonitoring multiple channels of data from real time process to detect recent abnormal behavior
US20060294588A1 (en)*2005-06-242006-12-28International Business Machines CorporationSystem, method and program for identifying and preventing malicious intrusions
US7877803B2 (en)*2005-06-272011-01-25Hewlett-Packard Development Company, L.P.Automated immune response for a computer
US7664849B1 (en)*2005-06-302010-02-16Symantec Operating CorporationMethod and apparatus for controlling finite impulse responses using alert definitions in policy-based automation
CN100479575C (en)2005-06-302009-04-15华为技术有限公司Method and apparatus for realizing scheduled operation in equipment management
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US7647634B2 (en)*2005-06-302010-01-12Microsoft CorporationManaging access to a network
US9418040B2 (en)*2005-07-072016-08-16Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system
US7832006B2 (en)*2005-08-092010-11-09At&T Intellectual Property I, L.P.System and method for providing network security
US8769663B2 (en)*2005-08-242014-07-01Fortinet, Inc.Systems and methods for detecting undesirable network traffic content
US20070168349A1 (en)*2005-09-302007-07-19Microsoft CorporationSchema for template based management system
US7899903B2 (en)*2005-09-302011-03-01Microsoft CorporationTemplate based management system
CN102904749B (en)2005-10-052015-12-09拜尔斯安全公司Adopt the method for safety means protecting network device, safety means and data network
US7502971B2 (en)*2005-10-122009-03-10Hewlett-Packard Development Company, L.P.Determining a recurrent problem of a computer resource using signatures
WO2007053708A2 (en)2005-10-312007-05-10The Trustees Of Columbia University In The City Of New YorkMethods, media, and systems for securing communications between a first node and a second node
JP4459890B2 (en)*2005-11-042010-04-28株式会社日立製作所 Information processing apparatus, incident response apparatus control method, and program
WO2007062004A2 (en)2005-11-222007-05-31The Trustees Of Columbia University In The City Of New YorkMethods, media, and devices for moving a connection from one point of access to another point of access
IL172289A (en)*2005-11-302011-07-31Rafael Advanced Defense SysLimited bandwidth surveillance system and method with rotation among monitors
US20070157316A1 (en)*2005-12-302007-07-05Intel CorporationManaging rogue IP traffic in a global enterprise
JP2007215162A (en)*2006-01-112007-08-23Canon Inc Information processing apparatus, control method therefor, program, and storage medium
US9183106B2 (en)*2006-01-132015-11-10Dell Products L.P.System and method for the automated generation of events within a server environment
US8090838B2 (en)*2006-02-162012-01-03Microsoft CorporationShell operation flow change
US7721157B2 (en)*2006-03-082010-05-18Omneon Video NetworksMulti-node computer system component proactive monitoring and proactive repair
US7996895B2 (en)*2006-03-272011-08-09Avaya Inc.Method and apparatus for protecting networks from unauthorized applications
US8732476B1 (en)*2006-04-132014-05-20Xceedium, Inc.Automatic intervention
US7675867B1 (en)2006-04-192010-03-09Owl Computing Technologies, Inc.One-way data transfer system with built-in data verification mechanism
US8065666B2 (en)*2006-06-022011-11-22Rockwell Automation Technologies, Inc.Change management methodologies for industrial automation and information systems
US7913245B2 (en)*2006-06-212011-03-22International Business Machines CorporationApparatus, system and method for modular distribution and maintenance of non-“object code only” dynamic components
US20070300312A1 (en)*2006-06-222007-12-27Microsoft Corporation Microsoft Patent GroupUser presence detection for altering operation of a computing system
EP2035948B1 (en)*2006-06-272016-04-13Waterfall Security Solutions Ltd.Unidirectional secure links from and to a security engine
US20130276109A1 (en)*2006-07-112013-10-17Mcafee, Inc.System, method and computer program product for detecting activity in association with program resources that has at least a potential of an unwanted effect on the program
US8484718B2 (en)*2006-08-032013-07-09Citrix System, Inc.Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic
US7843912B2 (en)*2006-08-032010-11-30Citrix Systems, Inc.Systems and methods of fine grained interception of network communications on a virtual private network
US8869262B2 (en)2006-08-032014-10-21Citrix Systems, Inc.Systems and methods for application based interception of SSL/VPN traffic
US8495181B2 (en)2006-08-032013-07-23Citrix Systems, IncSystems and methods for application based interception SSI/VPN traffic
US8903968B2 (en)*2006-08-292014-12-02International Business Machines CorporationDistributed computing environment
IL177756A (en)*2006-08-292014-11-30Lior FrenkelEncryption-based attack prevention
US8522304B2 (en)*2006-09-082013-08-27Ibahn General Holdings CorporationMonitoring and reporting policy compliance of home networks
US20120284790A1 (en)*2006-09-112012-11-08Decision-Zone Inc.Live service anomaly detection system for providing cyber protection for the electric grid
US20080125887A1 (en)*2006-09-272008-05-29Rockwell Automation Technologies, Inc.Event context data and aggregation for industrial control systems
EP3493074A1 (en)2006-10-052019-06-05Splunk Inc.Time series search engine
IL180020A (en)*2006-12-122013-03-24Waterfall Security Solutions LtdEncryption -and decryption-enabled interfaces
US7944357B2 (en)*2006-12-182011-05-17Cummings Engineering Consultants, Inc.Method and system for a grass roots intelligence program
US8055760B1 (en)*2006-12-182011-11-08Sprint Communications Company L.P.Firewall doctor
US8640086B2 (en)*2006-12-292014-01-28Sap AgGraphical user interface system and method for presenting objects
IL180748A (en)2007-01-162013-03-24Waterfall Security Solutions LtdSecure archive
US8254882B2 (en)*2007-01-292012-08-28Cisco Technology, Inc.Intrusion prevention system for wireless networks
US8312135B2 (en)*2007-02-022012-11-13Microsoft CorporationComputing system infrastructure to administer distress messages
JP4905165B2 (en)*2007-02-072012-03-28富士通株式会社 Monitoring support program, monitoring method and monitoring system
US8856782B2 (en)2007-03-012014-10-07George Mason Research Foundation, Inc.On-demand disposable virtual work system
US7865589B2 (en)2007-03-122011-01-04Citrix Systems, Inc.Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance
US8490148B2 (en)*2007-03-122013-07-16Citrix Systems, IncSystems and methods for managing application security profiles
US7870277B2 (en)*2007-03-122011-01-11Citrix Systems, Inc.Systems and methods for using object oriented expressions to configure application security policies
US7853678B2 (en)*2007-03-122010-12-14Citrix Systems, Inc.Systems and methods for configuring flow control of policy expressions
US8631147B2 (en)2007-03-122014-01-14Citrix Systems, Inc.Systems and methods for configuring policy bank invocations
US7853679B2 (en)*2007-03-122010-12-14Citrix Systems, Inc.Systems and methods for configuring handling of undefined policy events
EP2135385B1 (en)2007-03-122013-11-13Citrix Systems, Inc.Method of configuring a policy of a network device, and appliance and method of applying object-oriented expressions in a policy
US9185123B2 (en)2008-02-122015-11-10Finsphere CorporationSystem and method for mobile identity protection for online user authentication
US8280348B2 (en)2007-03-162012-10-02Finsphere CorporationSystem and method for identity protection using mobile device signaling network derived location pattern recognition
US9432845B2 (en)2007-03-162016-08-30Visa International Service AssociationSystem and method for automated analysis comparing a wireless device location with another geographic location
US9922323B2 (en)2007-03-162018-03-20Visa International Service AssociationSystem and method for automated analysis comparing a wireless device location with another geographic location
US9420448B2 (en)2007-03-162016-08-16Visa International Service AssociationSystem and method for automated analysis comparing a wireless device location with another geographic location
US20080249826A1 (en)*2007-03-262008-10-09Jeff TolnarSystem and method for integrated asset protection
WO2008118976A1 (en)*2007-03-262008-10-02The Trustees Of Culumbia University In The City Of New YorkMethods and media for exchanging data between nodes of disconnected networks
KR101397147B1 (en)*2007-04-112014-05-19엘지전자 주식회사Mobile communication device having web alarm function and operating method thereof
US8068415B2 (en)*2007-04-182011-11-29Owl Computing Technologies, Inc.Secure one-way data transfer using communication interface circuitry
US8139581B1 (en)2007-04-192012-03-20Owl Computing Technologies, Inc.Concurrent data transfer involving two or more transport layer protocols over a single one-way data link
US8352450B1 (en)2007-04-192013-01-08Owl Computing Technologies, Inc.Database update through a one-way data link
US7941526B1 (en)2007-04-192011-05-10Owl Computing Technologies, Inc.Transmission of syslog messages over a one-way data link
US7966660B2 (en)*2007-05-232011-06-21Honeywell International Inc.Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices
US8108924B1 (en)*2007-05-242012-01-31Sprint Communications Company L.P.Providing a firewall's connection data in a comprehendible format
DE102008024668A1 (en)*2007-05-242008-11-27ABB Inc., Norwalk Inventory monitor for fieldbus devices
US8533821B2 (en)*2007-05-252013-09-10International Business Machines CorporationDetecting and defending against man-in-the-middle attacks
US20080313228A1 (en)*2007-06-152008-12-18Rockwell Automation Technologies, Inc.Controller log and log aggregation
WO2009006937A1 (en)*2007-07-092009-01-15Abb Research LtdData recording apparatus
US7992209B1 (en)2007-07-192011-08-02Owl Computing Technologies, Inc.Bilateral communication using multiple one-way data links
US9336387B2 (en)*2007-07-302016-05-10Stroz Friedberg, Inc.System, method, and computer program product for detecting access to a memory device
US8024802B1 (en)*2007-07-312011-09-20Hewlett-Packard Development Company, L.P.Methods and systems for using state ranges for processing regular expressions in intrusion-prevention systems
US8301676B2 (en)*2007-08-232012-10-30Fisher-Rosemount Systems, Inc.Field device with capability of calculating digital filter coefficients
US8239922B2 (en)*2007-08-272012-08-07Honeywell International Inc.Remote HVAC control with user privilege setup
US7702401B2 (en)2007-09-052010-04-20Fisher-Rosemount Systems, Inc.System for preserving and displaying process control data associated with an abnormal situation
IL187492A0 (en)*2007-09-062008-02-09Human Interface Security LtdInformation protection device
US8074278B2 (en)*2007-09-142011-12-06Fisher-Rosemount Systems, Inc.Apparatus and methods for intrusion protection in safety instrumented process control systems
DE102007046079A1 (en)*2007-09-262009-04-02Siemens Ag A method for establishing a secure connection from a service technician to an incident affected component of a remote diagnosable and / or remote controllable automation environment
US20090088883A1 (en)*2007-09-272009-04-02Rockwell Automation Technologies, Inc.Surface-based computing in an industrial automation environment
US8296414B1 (en)*2007-09-282012-10-23Emc CorporationTechniques for automated application discovery
US8224942B1 (en)*2007-10-022012-07-17Google Inc.Network failure detection
US8055479B2 (en)2007-10-102011-11-08Fisher-Rosemount Systems, Inc.Simplified algorithm for abnormal situation prevention in load following applications including plugged line diagnostics in a dynamic process
US20090100430A1 (en)*2007-10-152009-04-16Marco ValentinMethod and system for a task automation tool
US8223205B2 (en)*2007-10-242012-07-17Waterfall Solutions Ltd.Secure implementation of network-based sensors
US8959624B2 (en)*2007-10-312015-02-17Bank Of America CorporationExecutable download tracking system
US9282005B1 (en)*2007-11-012016-03-08Emc CorporationIT infrastructure policy breach investigation interface
US8516539B2 (en)*2007-11-092013-08-20Citrix Systems, IncSystem and method for inferring access policies from access event records
US8990910B2 (en)*2007-11-132015-03-24Citrix Systems, Inc.System and method using globally unique identities
US20090150513A1 (en)*2007-12-102009-06-11At&T Knowledge Ventures, LpMethod and System for Gathering Network Data
KR20090065183A (en)*2007-12-172009-06-22한국전자통신연구원 Apparatus and Method for Automatic Generation of CellInux Security Policy in Celt Gram Format
US8095938B1 (en)*2007-12-212012-01-10Emc CorporationManaging alert generation
US20090204702A1 (en)*2008-02-082009-08-13Autiq AsSystem and method for network management using self-discovering thin agents
US9336385B1 (en)*2008-02-112016-05-10Adaptive Cyber Security Instruments, Inc.System for real-time threat detection and management
TWI406151B (en)*2008-02-272013-08-21Asustek Comp IncAntivirus protection method and electronic device with antivirus protection
US20090228838A1 (en)*2008-03-042009-09-10Ryan Christopher NContent design tool
US8850568B2 (en)*2008-03-072014-09-30Qualcomm IncorporatedMethod and apparatus for detecting unauthorized access to a computing device and securely communicating information about such unauthorized access
US8839460B2 (en)*2008-03-072014-09-16Qualcomm IncorporatedMethod for securely communicating information about the location of a compromised computing device
US8965719B1 (en)*2008-03-072015-02-24Versify Solutions, Inc.Universal performance monitor for power generators
US8606686B1 (en)2008-03-072013-12-10Versify Solutions, Inc.System and method for gathering and performing complex analyses on power data from multiple remote sources
US9240945B2 (en)*2008-03-192016-01-19Citrix Systems, Inc.Access, priority and bandwidth management based on application identity
US20090254970A1 (en)*2008-04-042009-10-08Avaya Inc.Multi-tier security event correlation and mitigation
US8595831B2 (en)*2008-04-172013-11-26Siemens Industry, Inc.Method and system for cyber security management of industrial control systems
US8761948B1 (en)2008-04-252014-06-24Versify Solutions, Inc.System and method for managing and monitoring renewable energy power generation
US8943575B2 (en)2008-04-302015-01-27Citrix Systems, Inc.Method and system for policy simulation
US20090276852A1 (en)*2008-05-012009-11-05International Business Machines CorporationStatistical worm discovery within a security information management architecture
US20090276469A1 (en)*2008-05-012009-11-05International Business Machines CorporationMethod for transactional behavior extaction in distributed applications
US8339959B1 (en)2008-05-202012-12-25Juniper Networks, Inc.Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US8713177B2 (en)*2008-05-302014-04-29Red Hat, Inc.Remote management of networked systems using secure modular platform
US20100042912A1 (en)*2008-06-122010-02-18Eva WhitakerReminder and notification system for a parent
US8312540B1 (en)*2008-06-132012-11-13Juniper Networks, Inc.System for slowing password attacks
US8689335B2 (en)*2008-06-252014-04-01Microsoft CorporationMapping between users and machines in an enterprise security assessment sharing system
US8260468B2 (en)*2008-06-252012-09-04Versify Solutions, Inc.Aggregator, monitor, and manager of distributed demand response
DE102008030939A1 (en)*2008-07-022010-01-07Deutsche Thomson Ohg Method and device for managing data transmission in a network
US20110087761A1 (en)*2008-07-072011-04-14Mo-Han FongPower saving schemes for wireless systems
US8711747B2 (en)2008-07-072014-04-29Apple Inc.Power saving methods for wireless systems
US8745268B2 (en)*2008-08-182014-06-03Schneider Electric USA, Inc.In-line security device
US9100297B2 (en)2008-08-202015-08-04Red Hat, Inc.Registering new machines in a software provisioning environment
US9098698B2 (en)2008-09-122015-08-04George Mason Research Foundation, Inc.Methods and apparatus for application isolation
US8955107B2 (en)*2008-09-122015-02-10Juniper Networks, Inc.Hierarchical application of security services within a computer network
US20100088197A1 (en)*2008-10-022010-04-08Dehaan Michael PaulSystems and methods for generating remote system inventory capable of differential update reports
US8301759B2 (en)*2008-10-242012-10-30Microsoft CorporationMonitoring agent programs in a distributed computing platform
IL194943A0 (en)*2008-10-272009-09-22Human Interface Security LtdVerification of data transmitted by computer
US8990573B2 (en)*2008-11-102015-03-24Citrix Systems, Inc.System and method for using variable security tag location in network communications
US8028196B2 (en)*2008-11-182011-09-27Gtech CorporationPredictive diagnostics and fault management
US9084937B2 (en)2008-11-182015-07-21Gtech Canada UlcFaults and performance issue prediction
US8775574B2 (en)*2008-11-262014-07-08Red Hat, Inc.Remote network management having multi-node awareness
US8782204B2 (en)2008-11-282014-07-15Red Hat, Inc.Monitoring hardware resources in a software provisioning environment
US8578491B2 (en)*2008-12-112013-11-05Alcatel LucentNetwork based malware detection and reporting
US7996713B2 (en)*2008-12-152011-08-09Juniper Networks, Inc.Server-to-server integrity checking
US8019860B2 (en)*2008-12-222011-09-13Sap AgService accounting method and apparatus for composite service
US8737398B2 (en)*2008-12-312014-05-27Schneider Electric USA, Inc.Communication module with network isolation and communication filter
US9313105B2 (en)*2009-02-272016-04-12Red Hat, Inc.Network management using secure mesh command and control framework
US9558195B2 (en)2009-02-272017-01-31Red Hat, Inc.Depopulation of user data from network
US8719392B2 (en)*2009-02-272014-05-06Red Hat, Inc.Searching a managed network for setting and configuration data
US8402267B1 (en)2009-03-182013-03-19University Of Louisville Research Foundation, Inc.Security enhanced network device and method for secure operation of same
US8868907B2 (en)2009-03-182014-10-21University Of Louisville Research Foundation, Inc.Device, method, and system for processing communications for secure operation of industrial control system field devices
US8935773B2 (en)2009-04-092015-01-13George Mason Research Foundation, Inc.Malware detector
US9305189B2 (en)2009-04-142016-04-05Owl Computing Technologies, Inc.Ruggedized, compact and integrated one-way controlled interface to enforce confidentiality of a secure enclave
US20100269162A1 (en)2009-04-152010-10-21Jose BravoWebsite authentication
FR2944886B1 (en)*2009-04-222011-07-15Thales Sa INTEGRATED SUPERVISION AND COMMAND SYSTEM
US8914878B2 (en)2009-04-292014-12-16Juniper Networks, Inc.Detecting malicious network software agents
US8504636B2 (en)*2009-05-082013-08-06Raytheon CompanyMonitoring communications using a unified communications protocol
EP2252006A1 (en)*2009-05-152010-11-17Panda Security S.L.System and method for obtaining a classification of an identifier
US8566459B2 (en)*2009-05-292013-10-22Red Hat, Inc.Systems and methods for integrated console management interface
US9280399B2 (en)*2009-05-292016-03-08Red Hat, Inc.Detecting, monitoring, and configuring services in a netwowk
US9134987B2 (en)2009-05-292015-09-15Red Hat, Inc.Retiring target machines by a provisioning server
US9298583B2 (en)*2009-06-042016-03-29International Business Machines CorporationNetwork traffic based power consumption estimation of information technology systems
US8694905B2 (en)*2009-06-102014-04-08International Business Machines CorporationModel-driven display of metric annotations on a resource/relationship graph
US8839422B2 (en)2009-06-302014-09-16George Mason Research Foundation, Inc.Virtual browsing environment
US20110004589A1 (en)*2009-07-062011-01-06Rockwell Automation Technologies, Inc.Diagnostics in a distributed directory system
US11797997B2 (en)2009-07-072023-10-24Visa International Service AssociationData verification in transactions in distributed network
US8788652B2 (en)*2009-07-272014-07-22IxiaReal world network testing combining lower layer network tests, application layer tests and interdependent interactions
DE112010004940B4 (en)2009-08-132018-07-12International Business Machines Corporation Automatic recognition of address ranges for IP networks
US8311987B2 (en)*2009-08-172012-11-13Sap AgData staging system and method
US9425976B2 (en)*2009-08-192016-08-23Hewlett Packard Enterprise Development LpReporting operational information of a network device
US20110047406A1 (en)*2009-08-242011-02-24General DevicesSystems and methods for sending, receiving and managing electronic messages
US8463885B2 (en)*2009-08-312013-06-11Red Hat, Inc.Systems and methods for generating management agent installations
US8914787B2 (en)*2009-08-312014-12-16Red Hat, Inc.Registering software management component types in a managed network
US8607093B2 (en)*2009-08-312013-12-10Red Hat, Inc.Systems and methods for detecting machine faults in network using acoustic monitoring
US8166341B2 (en)*2009-08-312012-04-24Red Hat, Inc.Systems and methods for testing results of configuration management activity
US8789173B2 (en)*2009-09-032014-07-22Juniper Networks, Inc.Protecting against distributed network flood attacks
GB2474545B (en)*2009-09-242015-06-24Fisher Rosemount Systems IncIntegrated unified threat management for a process control system
US9967169B2 (en)*2009-09-302018-05-08Red Hat, Inc.Detecting network conditions based on correlation between trend lines
US8335989B2 (en)*2009-10-262012-12-18Nokia CorporationMethod and apparatus for presenting polymorphic notes in a graphical user interface
US8719782B2 (en)2009-10-292014-05-06Red Hat, Inc.Integrated package development and machine configuration management
US20110106738A1 (en)*2009-10-292011-05-05Marianna CheklinSystem and method for managing implementations
CN101714990B (en)*2009-10-302013-06-05清华大学Network security safeguarding integrated system and control method thereof
US8369345B1 (en)2009-11-132013-02-05Juniper Networks, Inc.Multi-router system having shared network interfaces
US8302189B2 (en)*2009-11-302012-10-30At&T Intellectual Property I, L.P.Methods, devices, systems, and computer program products for edge driven communications network security monitoring
US8683609B2 (en)*2009-12-042014-03-25International Business Machines CorporationMobile phone and IP address correlation service
US8832707B2 (en)*2009-12-212014-09-09International Business Machines CorporationTunable error resilience computing
US8793789B2 (en)2010-07-222014-07-29Bank Of America CorporationInsider threat correlation tool
US8782209B2 (en)*2010-01-262014-07-15Bank Of America CorporationInsider threat correlation tool
US8800034B2 (en)*2010-01-262014-08-05Bank Of America CorporationInsider threat correlation tool
US9038187B2 (en)*2010-01-262015-05-19Bank Of America CorporationInsider threat correlation tool
US10210162B1 (en)2010-03-292019-02-19Carbonite, Inc.Log file management
US8782794B2 (en)2010-04-162014-07-15Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
US8544100B2 (en)2010-04-162013-09-24Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
US20110258302A1 (en)*2010-04-202011-10-20No Limits Software, LLCSystem And Method For Remotely Determining Identification And Physical Location Of Equipment In A Rack
CN101848241B (en)*2010-05-062012-12-19安徽省电力公司合肥供电公司Ies500 automatic real-time data and information system
US9372482B2 (en)*2010-05-142016-06-21Harnischfeger Technologies, Inc.Predictive analysis for remote machine monitoring
US8489525B2 (en)2010-05-202013-07-16International Business Machines CorporationAutomatic model evolution
US8533319B2 (en)2010-06-022013-09-10Lockheed Martin CorporationMethods and systems for prioritizing network assets
CN102281164A (en)*2010-06-082011-12-14腾讯科技(深圳)有限公司Method, equipment and system for monitoring data
US8498982B1 (en)2010-07-072013-07-30Openlogic, Inc.Noise reduction for content matching analysis results for protectable content
WO2012012266A2 (en)2010-07-192012-01-26Owl Computing Technologies. Inc.Secure acknowledgment device for one-way data transfer system
KR101377462B1 (en)*2010-08-242014-03-25한국전자통신연구원Automated Control Method And Apparatus of DDos Attack Prevention Policy Using the status of CPU and Memory
US8423638B2 (en)*2010-09-292013-04-16International Business Machines CorporationPerformance monitoring of a computer resource
US8683591B2 (en)2010-11-182014-03-25Nant Holdings Ip, LlcVector-based anomaly detection
US8788654B2 (en)*2010-12-072014-07-22Cisco Technology, Inc.System and method for allocating resources based on events in a network environment
US8826437B2 (en)2010-12-142014-09-02General Electric CompanyIntelligent system and method for mitigating cyber attacks in critical systems through controlling latency of messages in a communications network
TWI447574B (en)2010-12-272014-08-01IbmMethod,computer readable medium, appliance,and system for recording and prevevting crash in an appliance
US8499348B1 (en)*2010-12-282013-07-30Amazon Technologies, Inc.Detection of and responses to network attacks
RU2453917C1 (en)*2010-12-302012-06-20Закрытое акционерное общество "Лаборатория Касперского"System and method for optimising execution of antivirus tasks in local area network
US8935383B2 (en)*2010-12-312015-01-13Verisign, Inc.Systems, apparatus, and methods for network data analysis
US8935743B2 (en)2011-01-272015-01-13Sap SeWeb service security cockpit
US8695095B2 (en)*2011-03-112014-04-08At&T Intellectual Property I, L.P.Mobile malicious software mitigation
US9058029B2 (en)*2011-03-312015-06-16Brad RadlSystem and method for creating a graphical control programming environment
US20120260251A1 (en)*2011-04-052012-10-11International Business Machines CorporationPrevention of event flooding
US8838988B2 (en)2011-04-122014-09-16International Business Machines CorporationVerification of transactional integrity
US20120272314A1 (en)*2011-04-212012-10-25Cybyl Technologies, Inc.Data collection system
EP2518969A1 (en)*2011-04-272012-10-31Siemens AktiengesellschaftMethod for operating an automation device
US9237127B2 (en)*2011-05-122016-01-12Airmagnet, Inc.Method and apparatus for dynamic host operating system firewall configuration
US9927788B2 (en)2011-05-192018-03-27Fisher-Rosemount Systems, Inc.Software lockout coordination between a process control system and an asset management system
US9665458B2 (en)2011-06-012017-05-30Data Security Solutions, LlcMethod and system for providing information from third party applications to devices
US9065744B2 (en)*2011-06-202015-06-23Netscout Systems, Inc.Performance optimized and configurable state based heuristic for the classification of real-time transport protocol traffic
US9894261B2 (en)*2011-06-242018-02-13Honeywell International Inc.Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
US8547975B2 (en)2011-06-282013-10-01Verisign, Inc.Parallel processing for multiple instance real-time monitoring
US8526470B2 (en)2011-07-052013-09-03IxiaSynchronized commands for network testing
US8943177B1 (en)*2011-07-132015-01-27Google Inc.Modifying a computer program configuration based on variable-bin histograms
US8688828B2 (en)2011-08-292014-04-01Cisco Technology, Inc.Session layer for monitoring utility application traffic
US8533219B2 (en)*2011-09-022013-09-10Bbs Technologies, Inc.Adjusting one or more trace filters in a database system
US9298917B2 (en)*2011-09-272016-03-29Redwall Technologies, LlcEnhanced security SCADA systems and methods
JP5742635B2 (en)*2011-09-292015-07-01東京エレクトロン株式会社 Substrate processing apparatus, alarm management method for substrate processing apparatus, and storage medium
US20130086680A1 (en)*2011-09-302013-04-04General Electric CompanySystem and method for communication in a network
US20130086635A1 (en)*2011-09-302013-04-04General Electric CompanySystem and method for communication in a network
EP2575065A1 (en)*2011-09-302013-04-03General Electric CompanyRemote health monitoring system
US8856936B2 (en)2011-10-142014-10-07Albeado Inc.Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
US8839089B2 (en)*2011-11-012014-09-16Microsoft CorporationMulti-dimensional data manipulation and presentation
US9081959B2 (en)2011-12-022015-07-14Invincea, Inc.Methods and apparatus for control and detection of malicious content using a sandbox environment
US9356839B2 (en)*2011-12-092016-05-31Riverbed Technology, Inc.Policy aggregation for computing network health
US8707100B2 (en)2011-12-132014-04-22IxiaTesting a network using randomly distributed commands
US9741003B2 (en)2011-12-192017-08-22Microsoft Technology Licensing, LlcMethod and system for providing centralized notifications to an administrator
CN102495619B (en)*2011-12-292013-08-28深圳市再丰达科技有限公司Parking lot management system
US9251535B1 (en)2012-01-052016-02-02Juniper Networks, Inc.Offload of data transfer statistics from a mobile access gateway
CL2013000281A1 (en)2012-01-302014-08-18Harnischfeger Tech Inc Monitoring methods of a mining machine that includes determining if the machine is operating in a first state, detecting a transition from the first state to a second operating state, generating messages that indicate parameters of machine operation in both states; mining machine monitor for the control of mining machines; a procedure for monitoring a mining drill; mining machine monitor for the monitoring of a mine drilling drill
US9294924B2 (en)*2012-04-132016-03-22Nokia Solutions And Networks OyMonitoring suspicious events in a cellular network
US8966321B2 (en)2012-05-092015-02-24IxiaLogical port and layer protocol test configuration resource manager
US9715325B1 (en)2012-06-212017-07-25Open Text CorporationActivity stream based interaction
US8843953B1 (en)*2012-06-242014-09-23Time Warner Cable Enterprises LlcMethods and apparatus for providing parental or guardian control and visualization over communications to various devices in the home
US12375508B2 (en)*2012-06-262025-07-29Aeris Communications, Inc.Methodology for intelligent pattern detection and anomaly detection in machine to machine communication network
US8917826B2 (en)2012-07-312014-12-23International Business Machines CorporationDetecting man-in-the-middle attacks in electronic transactions using prompts
US9258321B2 (en)2012-08-232016-02-09Raytheon Foreground Security, Inc.Automated internet threat detection and mitigation system and associated methods
US9392003B2 (en)2012-08-232016-07-12Raytheon Foreground Security, Inc.Internet security cyber threat reporting system and method
US9635037B2 (en)2012-09-062017-04-25Waterfall Security Solutions Ltd.Remote control of secure installations
US10394946B2 (en)2012-09-072019-08-27Splunk Inc.Refining extraction rules based on selected text within events
US9047181B2 (en)*2012-09-072015-06-02Splunk Inc.Visualization of data from clusters
US9753909B2 (en)2012-09-072017-09-05Splunk, Inc.Advanced field extractor with multiple positive examples
US9594814B2 (en)2012-09-072017-03-14Splunk Inc.Advanced field extractor with modification of an extracted field
US20140208217A1 (en)2013-01-222014-07-24Splunk Inc.Interface for managing splittable timestamps across event records
US8751963B1 (en)2013-01-232014-06-10Splunk Inc.Real time indication of previously extracted data fields for regular expressions
US8682906B1 (en)2013-01-232014-03-25Splunk Inc.Real time display of data field values based on manual editing of regular expressions
US11477068B2 (en)2012-09-272022-10-18Kaseya LimitedData network notification bar user interface
US10025686B2 (en)*2012-10-302018-07-17Intel CorporationGenerating and communicating platform event digests from a processor of a system
US9189644B2 (en)2012-12-202015-11-17Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9529629B2 (en)*2012-12-202016-12-27Bank Of America CorporationComputing resource inventory system
US9177139B2 (en)*2012-12-302015-11-03Honeywell International Inc.Control system cyber security
CA2889685C (en)2013-01-082018-12-11Secure-Nok AsMethod, device, and computer program for monitoring an industrial control system
US9152929B2 (en)*2013-01-232015-10-06Splunk Inc.Real time display of statistics and values for selected regular expressions
US9245147B1 (en)*2013-01-302016-01-26White Badger Group, LLCState machine reference monitor for information system security
US9729505B2 (en)2013-01-312017-08-08Entit Software LlcSecurity threat analysis
US9456001B2 (en)2013-01-312016-09-27Hewlett Packard Enterprise Development LpAttack notification
US9275348B2 (en)2013-01-312016-03-01Hewlett Packard Enterprise Development LpIdentifying participants for collaboration in a threat exchange community
US9143517B2 (en)2013-01-312015-09-22Hewlett-Packard Development Company, L.P.Threat exchange information protection
WO2014120181A1 (en)2013-01-312014-08-07Hewlett-Packard Development Company, L.P.Targeted security alerts
US9118603B2 (en)*2013-03-082015-08-25Edward Blake MILLERSystem and method for managing attempted access of objectionable content and/or tampering with a content filtering device
US9596245B2 (en)*2013-04-042017-03-14Owl Computing Technologies, Inc.Secure one-way interface for a network device
US9419975B2 (en)2013-04-222016-08-16Waterfall Security Solutions Ltd.Bi-directional communication over a one-way link
US12373497B1 (en)2013-04-302025-07-29Splunk Inc.Dynamic generation of performance state tree
US10225136B2 (en)2013-04-302019-03-05Splunk Inc.Processing of log data and performance data obtained via an application programming interface (API)
US10019496B2 (en)2013-04-302018-07-10Splunk Inc.Processing of performance data and log data from an information technology environment by using diverse data stores
US10318541B2 (en)2013-04-302019-06-11Splunk Inc.Correlating log data with performance measurements having a specified relationship to a threshold value
US10614132B2 (en)2013-04-302020-04-07Splunk Inc.GUI-triggered processing of performance data and log data from an information technology environment
US10353957B2 (en)2013-04-302019-07-16Splunk Inc.Processing of performance data and raw log data from an information technology environment
US9495187B2 (en)2013-04-302016-11-15Splunk, Inc.Interactive, top-down presentation of the architecture and performance of a hypervisor environment
US10346357B2 (en)2013-04-302019-07-09Splunk Inc.Processing of performance data and structure data from an information technology environment
US10997191B2 (en)2013-04-302021-05-04Splunk Inc.Query-triggered processing of performance data and log data from an information technology environment
US10031647B2 (en)2013-05-142018-07-24Google LlcSystem for universal remote media control in a multi-user, multi-platform, multi-device environment
US9331894B2 (en)*2013-05-312016-05-03International Business Machines CorporationInformation exchange in data center systems
US20140359694A1 (en)*2013-06-032014-12-04eSentire, Inc.System and method for computer system security
US10574548B2 (en)*2013-07-312020-02-25Splunk Inc.Key indicators view
US20150061858A1 (en)*2013-08-282015-03-05Unisys CorporationAlert filter for defining rules for processing received alerts
US20150067762A1 (en)*2013-09-032015-03-05Samsung Electronics Co., Ltd.Method and system for configuring smart home gateway firewall
US9680794B2 (en)2013-09-042017-06-13Owl Computing Technologies, LlcSecure one-way interface for archestra data transfer
CN103439911B (en)*2013-09-112016-05-04北京四方继保自动化股份有限公司A kind of industrial control system method for managing security of various dimensions
CN103501345B (en)*2013-10-122016-11-09成都阜特科技股份有限公司A kind of control method of remote centralized control system
US9148869B2 (en)2013-10-152015-09-29The Toronto-Dominion BankLocation-based account activity alerts
US8667589B1 (en)*2013-10-272014-03-04Konstantin SapryginProtection against unauthorized access to automated system for control of technological processes
US8779919B1 (en)2013-11-032014-07-15Instant Care, Inc.Event communication apparatus and method
WO2015063000A1 (en)*2013-11-042015-05-07Koninklijke Philips N.V.Method of notifying a user on a task on an apparatus
US8989053B1 (en)2013-11-292015-03-24Fedex Corporate Services, Inc.Association management in a wireless node network
US20150163945A1 (en)2013-12-112015-06-11Honeywell International Inc.Hvac controller with thermistor biased against an outer housing
US9794278B1 (en)*2013-12-192017-10-17Symantec CorporationNetwork-based whitelisting approach for critical systems
US10225347B2 (en)*2013-12-242019-03-05Verizon Patent And Licensing Inc.Message controlled appliances
US9742624B2 (en)*2014-01-212017-08-22Oracle International CorporationLogging incident manager
US9311810B2 (en)2014-01-232016-04-12General Electric CompanyImplementing standardized behaviors in a hosting device
DE102014201592A1 (en)*2014-01-292015-07-30Siemens Aktiengesellschaft Methods and apparatus for detecting autonomous, self-propagating software
EP2908195B1 (en)*2014-02-132017-07-05Siemens AktiengesellschaftMethod for monitoring security in an automation network, and automation network
WO2015126734A1 (en)*2014-02-232015-08-27Intel CorporationOrchestration and management of services to deployed devices
US11405410B2 (en)2014-02-242022-08-02Cyphort Inc.System and method for detecting lateral movement and data exfiltration
JP6252254B2 (en)*2014-02-282017-12-27富士通株式会社 Monitoring program, monitoring method and monitoring apparatus
WO2015134572A1 (en)*2014-03-062015-09-11Foreground SecurityInternet security cyber threat reporting
US9235982B2 (en)*2014-05-062016-01-12International Business Machines CorporationDetermining alert criteria in a network environment
US10313257B1 (en)*2014-06-122019-06-04Tripwire, Inc.Agent message delivery fairness
US9634951B1 (en)2014-06-122017-04-25Tripwire, Inc.Autonomous agent messaging
WO2015200211A1 (en)2014-06-222015-12-30Webroot Inc.Network threat prediction and blocking
US9575987B2 (en)2014-06-232017-02-21Owl Computing Technologies, Inc.System and method for providing assured database updates via a one-way data link
US10182046B1 (en)*2015-06-232019-01-15Amazon Technologies, Inc.Detecting a network crawler
US20160092045A1 (en)2014-09-302016-03-31Splunk, Inc.Event View Selector
US12346542B1 (en)2014-10-052025-07-01Splunk Inc.Presenting events based on selected search option
US10261673B2 (en)2014-10-052019-04-16Splunk Inc.Statistics value chart interface cell mode drill down
US11231840B1 (en)2014-10-052022-01-25Splunk Inc.Statistics chart row mode drill down
IL235175A (en)2014-10-192017-08-31Frenkel LiorSecure remote desktop
US9489517B2 (en)*2014-10-212016-11-08Fujitsu LimitedDetermining an attack surface of software
US9960975B1 (en)*2014-11-052018-05-01Amazon Technologies, Inc.Analyzing distributed datasets
DE102014226398A1 (en)*2014-12-182016-06-23Siemens Aktiengesellschaft Method and device for the feedback-free acquisition of data
US11023449B2 (en)*2014-12-192021-06-01EMC IP Holding Company LLCMethod and system to search logs that contain a massive number of entries
US10021137B2 (en)2014-12-272018-07-10Mcafee, LlcReal-time mobile security posture
US9699209B2 (en)2014-12-292017-07-04Cyence Inc.Cyber vulnerability scan analyses with actionable feedback
US11863590B2 (en)2014-12-292024-01-02Guidewire Software, Inc.Inferential analysis using feedback for extracting and combining cyber risk information
WO2017078986A1 (en)2014-12-292017-05-11Cyence Inc.Diversity analysis with actionable feedback methodologies
US10341376B2 (en)2014-12-292019-07-02Guidewire Software, Inc.Diversity analysis with actionable feedback methodologies
US10050989B2 (en)2014-12-292018-08-14Guidewire Software, Inc.Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses
US11855768B2 (en)2014-12-292023-12-26Guidewire Software, Inc.Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
US10050990B2 (en)2014-12-292018-08-14Guidewire Software, Inc.Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
US11817993B2 (en)2015-01-272023-11-14Dell Products L.P.System for decomposing events and unstructured data
US11362881B2 (en)*2015-01-272022-06-14Moogsoft Inc.Distributed system for self updating agents and provides security
US11924018B2 (en)2015-01-272024-03-05Dell Products L.P.System for decomposing events and unstructured data
US10061824B2 (en)2015-01-302018-08-28Splunk Inc.Cell-based table manipulation of event data
US9922082B2 (en)2015-01-302018-03-20Splunk Inc.Enforcing dependency between pipelines
US9842160B2 (en)2015-01-302017-12-12Splunk, Inc.Defining fields from particular occurences of field labels in events
US9977803B2 (en)2015-01-302018-05-22Splunk Inc.Column-based table manipulation of event data
US10915583B2 (en)2015-01-302021-02-09Splunk Inc.Suggested field extraction
US11615073B2 (en)2015-01-302023-03-28Splunk Inc.Supplementing events displayed in a table format
US9922084B2 (en)2015-01-302018-03-20Splunk Inc.Events sets in a visually distinct display format
US11544248B2 (en)2015-01-302023-01-03Splunk Inc.Selective query loading across query interfaces
US10013454B2 (en)2015-01-302018-07-03Splunk Inc.Text-based table manipulation of event data
US9916346B2 (en)2015-01-302018-03-13Splunk Inc.Interactive command entry list
US10726037B2 (en)2015-01-302020-07-28Splunk Inc.Automatic field extraction from filed values
US11442924B2 (en)2015-01-302022-09-13Splunk Inc.Selective filtered summary graph
EP3065076A1 (en)*2015-03-042016-09-07Secure-Nok ASSystem and method for responding to a cyber-attack-related incident against an industrial control system
US10404748B2 (en)2015-03-312019-09-03Guidewire Software, Inc.Cyber risk analysis and remediation using network monitored sensors and methods of use
US9350750B1 (en)*2015-04-032016-05-24Area 1 Security, Inc.Distribution of security rules among sensor computers
US10395133B1 (en)2015-05-082019-08-27Open Text CorporationImage box filtering for optical character recognition
US10599844B2 (en)2015-05-122020-03-24Webroot, Inc.Automatic threat detection of executable files based on static data analysis
US9917753B2 (en)*2015-06-122018-03-13Level 3 Communications, LlcNetwork operational flaw detection using metrics
US10290022B1 (en)2015-06-232019-05-14Amazon Technologies, Inc.Targeting content based on user characteristics
US10275320B2 (en)2015-06-262019-04-30Commvault Systems, Inc.Incrementally accumulating in-process performance data and hierarchical reporting thereof for a data stream in a secondary copy operation
US10289686B1 (en)2015-06-302019-05-14Open Text CorporationMethod and system for using dynamic content types
US9923758B2 (en)*2015-06-302018-03-20Ca, Inc.Alert damage index
US10057133B2 (en)*2015-07-082018-08-21Fedex Corporate Services, Inc.Systems, apparatus, and methods of enhanced monitoring for an event candidate associated with cycling power of an ID node within a wireless node network
HK1244072A1 (en)*2015-07-162018-07-27Canfield RaymondCyber security system and method using intelligent agents
US10419452B2 (en)2015-07-282019-09-17Sap SeContextual monitoring and tracking of SSH sessions
US10015178B2 (en)*2015-07-282018-07-03Sap SeReal-time contextual monitoring intrusion detection and prevention
US10158657B1 (en)*2015-08-062018-12-18Microsoft Technology Licensing LlcRating IP addresses based on interactions between users and an online service
US9641544B1 (en)2015-09-182017-05-02Palo Alto Networks, Inc.Automated insider threat prevention
US20170093887A1 (en)*2015-09-242017-03-30General Electric CompanyNetwork command evaluation and response system
US10326789B1 (en)*2015-09-252019-06-18Amazon Technologies, Inc.Web Bot detection and human differentiation
EP3151152B1 (en)*2015-09-302020-04-08Secure-Nok ASNon-intrusive software agent for monitoring and detection of cyber security events and cyber-attacks in an industrial control system
US11991154B2 (en)*2015-10-282024-05-21Qomplx LlcSystem and method for fingerprint-based network mapping of cyber-physical assets
US10375026B2 (en)*2015-10-282019-08-06Shape Security, Inc.Web transaction status tracking
US10324956B1 (en)2015-11-112019-06-18Microsoft Technology Licensing, LlcAutomatically mapping organizations to addresses
US10955810B2 (en)*2015-11-132021-03-23International Business Machines CorporationMonitoring communications flow in an industrial system to detect and mitigate hazardous conditions
US9894036B2 (en)2015-11-172018-02-13Cyber Adapt, Inc.Cyber threat attenuation using multi-source threat data analysis
US10594656B2 (en)*2015-11-172020-03-17Zscaler, Inc.Multi-tenant cloud-based firewall systems and methods
IL242808A0 (en)*2015-11-262016-04-21Rafael Advanced Defense SysSystem and method for detecting a cyber-attack at scada/ics managed plants
US9929970B1 (en)2015-12-032018-03-27Innovium, Inc.Efficient resource tracking
US10366129B2 (en)2015-12-042019-07-30Bank Of America CorporationData security threat control monitoring system
US10218589B1 (en)2015-12-172019-02-26Innovium, Inc.Efficient resource status reporting apparatuses
CN105607954B (en)*2015-12-212019-05-14华南师范大学A kind of method and apparatus that stateful container migrates online
US10154046B2 (en)*2015-12-282018-12-11Schneider Electric USA, Inc.System and method for evaluation and response to cyber security exposure in an embedded control device
IL250010B (en)2016-02-142020-04-30Waterfall Security Solutions LtdSecure connection with protected facilities
US10432429B1 (en)2016-02-162019-10-01Innovium, Inc.Efficient traffic management
US10027699B2 (en)*2016-03-102018-07-17Siemens AktiengesellschaftProduction process knowledge-based intrusion detection for industrial control systems
US9743272B1 (en)2016-03-282017-08-22Bank Of America CorporationSecurity implementation for resource distribution
US10080132B2 (en)2016-03-282018-09-18Bank Of America CorporationSystem for adaptation of multiple digital signatures in a distributed network
US10135817B2 (en)2016-03-282018-11-20Bank Of America CorporationEnhancing authentication and source of proof through a dynamically updatable biometrics database
US10039113B2 (en)2016-03-282018-07-31Bank Of America CorporationIntelligent resource procurement system based on physical proximity to related resources
US11108793B2 (en)*2016-04-292021-08-31Vmware, Inc.Preemptive alerts in a connected environment
US10796253B2 (en)2016-06-172020-10-06Bank Of America CorporationSystem for resource use allocation and distribution
US10038607B2 (en)2016-06-172018-07-31Bank Of America CorporationSystem for aggregated machine-initiated resource distribution
US10103936B2 (en)2016-06-212018-10-16Bank Of America CorporationComputerized resource reallocation system for transferring resource blocks based on custodian event
US10334462B2 (en)*2016-06-232019-06-25Bank Of America CorporationPredictive analytics for resource development based on information communicated from inter-related communication devices
US10439913B2 (en)2016-07-012019-10-08Bank Of America CorporationDynamic replacement and upgrade of existing resources based on resource utilization
JP6786960B2 (en)2016-08-262020-11-18富士通株式会社 Cyber attack analysis support program, cyber attack analysis support method and cyber attack analysis support device
JP6690469B2 (en)*2016-08-262020-04-28富士通株式会社 Control program, control method, and information processing apparatus
US10242187B1 (en)*2016-09-142019-03-26Symantec CorporationSystems and methods for providing integrated security management
US10685279B2 (en)2016-09-262020-06-16Splunk Inc.Automatically generating field extraction recommendations
US10127400B2 (en)2016-09-262018-11-13Bank Of America CorporationControl device for aggregation and distribution of machine-initiated resource distribution
US10909140B2 (en)*2016-09-262021-02-02Splunk Inc.Clustering events based on extraction rules
US10467632B1 (en)2016-12-132019-11-05Massachusetts Mutual Life Insurance CompanySystems and methods for a multi-tiered fraud alert review
US10771483B2 (en)*2016-12-302020-09-08British Telecommunications Public Limited CompanyIdentifying an attacked computing device
US10572658B2 (en)*2017-01-232020-02-25Paypal, Inc.Identifying computer behavior using visual data organization and graphs
EP3373181A1 (en)*2017-03-092018-09-12Siemens AktiengesellschaftMethod and computers to control protection measures against cyber criminal threats
US10230690B2 (en)*2017-03-232019-03-12International Business Machines CorporationDigital media content distribution blocking
US10440037B2 (en)*2017-03-312019-10-08Mcafee, LlcIdentifying malware-suspect end points through entropy changes in consolidated logs
US10826925B2 (en)*2017-04-282020-11-03Honeywell International Inc.Consolidated enterprise view of cybersecurity data from multiple sites
RU2651196C1 (en)2017-06-162018-04-18Акционерное общество "Лаборатория Касперского"Method of the anomalous events detecting by the event digest popularity
US12387270B2 (en)2017-07-262025-08-12Guidewire Software, Inc.Synthetic diversity analysis with actionable feedback methodologies
US10560487B2 (en)2017-07-262020-02-11International Business Machines CorporationIntrusion detection and mitigation in data processing
US10855656B2 (en)2017-09-152020-12-01Palo Alto Networks, Inc.Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
US10931637B2 (en)2017-09-152021-02-23Palo Alto Networks, Inc.Outbound/inbound lateral traffic punting based on process risk
WO2019060326A1 (en)*2017-09-202019-03-28University Of Utah Research FoundationParsing system event logs while streaming
EP3480672B1 (en)*2017-11-062020-02-19Siemens AktiengesellschaftMethod for identifying and indicating operator access to process objects and operator system
SE1751567A1 (en)*2017-12-182019-06-19Komatsu Forest Ab Work machine and method for monitoring a control system at a work machine
EP3525054A1 (en)*2018-02-072019-08-14Siemens AktiengesellschaftAn intrusion detection system for detection of intrusions in an automated infrastructure
US11463457B2 (en)*2018-02-202022-10-04Darktrace Holdings LimitedArtificial intelligence (AI) based cyber threat analyst to support a cyber security appliance
US11522887B2 (en)*2018-02-202022-12-06Darktrace Holdings LimitedArtificial intelligence controller orchestrating network components for a cyber threat defense
US10728034B2 (en)2018-02-232020-07-28Webroot Inc.Security privilege escalation exploit detection and mitigation
US10169135B1 (en)*2018-03-022019-01-01Uptake Technologies, Inc.Computer system and method of detecting manufacturing network anomalies
US10554518B1 (en)2018-03-022020-02-04Uptake Technologies, Inc.Computer system and method for evaluating health of nodes in a manufacturing network
JP7163593B2 (en)2018-03-092022-11-01富士通株式会社 Fraud monitoring program, fraud monitoring method, and information processing device
US11318969B2 (en)*2018-04-092022-05-03Cervello LtdMethods systems devices circuits and functionally related machine executable instructions for securing communication between management units of a transportation network
US10999304B2 (en)2018-04-112021-05-04Palo Alto Networks (Israel Analytics) Ltd.Bind shell attack detection
US11122064B2 (en)*2018-04-232021-09-14Micro Focus LlcUnauthorized authentication event detection
WO2020006562A1 (en)*2018-06-292020-01-02Rocus Group, LlcIntegrated security and threat prevention and detection device
US10602099B2 (en)*2018-07-102020-03-24Saudi Arabian Oil CompanyCogen-mom integration using tabulated information recognition
US10986117B1 (en)*2018-08-072021-04-20Ca, Inc.Systems and methods for providing an integrated cyber threat defense exchange platform
US10740134B2 (en)2018-08-202020-08-11Interwise Ltd.Agentless personal network firewall in virtualized datacenters
US11212322B2 (en)*2018-10-102021-12-28Rockwelll Automation Technologies, Inc.Automated discovery of security policy from design data
US11025657B2 (en)*2018-12-132021-06-01Imperva, Inc.Selective database logging with smart sampling
US20200192572A1 (en)2018-12-142020-06-18Commvault Systems, Inc.Disk usage growth prediction system
US11184377B2 (en)2019-01-302021-11-23Palo Alto Networks (Israel Analytics) Ltd.Malicious port scan detection using source profiles
US11184376B2 (en)2019-01-302021-11-23Palo Alto Networks (Israel Analytics) Ltd.Port scan detection using destination profiles
US11184378B2 (en)2019-01-302021-11-23Palo Alto Networks (Israel Analytics) Ltd.Scanner probe detection
EP3924946A4 (en)*2019-02-152023-11-01AVEVA Software, LLCProcess mapping and monitoring using artificial intelligence
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US10949322B2 (en)*2019-04-082021-03-16Hewlett Packard Enterprise Development LpCollecting performance metrics of a device
CN113874895A (en)2019-05-092021-12-31杜尔系统股份公司Analysis method and apparatus for the same
FI3966650T3 (en)2019-05-092024-05-16Duerr Systems AgMethod for control and after-treatment of workpieces, control system and treatment installation
DE112020002303A5 (en)*2019-05-092022-03-03Dürr Systems Ag Analysis methods and devices for this
CN110191017B (en)*2019-05-282021-09-10上海尚往网络科技有限公司Monitoring system and method for monitoring routing equipment abnormity
WO2020257729A1 (en)*2019-06-212020-12-24Cyemptive Technologies, Inc.Method to prevent root level access attack and measurable sla security and compliance platform
US11736466B2 (en)*2019-09-182023-08-22Bioconnect Inc.Access control system
US20230028886A1 (en)*2019-11-202023-01-26University Of Tennessee Research FoundationMethods of detecting anomalous operation of industrial systems and respective control systems, and related systems and articles of manufacture
US12248565B2 (en)*2020-01-222025-03-11Siemens Industry, IncReal-time and independent cyber-attack monitoring and automatic cyber-attack response system
US12086261B2 (en)*2020-03-132024-09-10International Business Machines CorporationDisplaying cyber threat data in a narrative-like format
US20210294713A1 (en)*2020-03-202021-09-235thColumn LLCGeneration of an identification evaluation regarding a system aspect of a system
US11140553B1 (en)*2020-05-212021-10-05Motorola Solutions, Inc.Threat detection and mitigation for remote wireless communication network control systems
US11449407B2 (en)2020-05-282022-09-20Bank Of America CorporationSystem and method for monitoring computing platform parameters and dynamically generating and deploying monitoring packages
US10958523B1 (en)2020-07-282021-03-23Bank Of America CorporationConsistent deployment of monitoring configurations on multiple computing systems
US11188437B1 (en)2020-07-302021-11-30Bank Of America CorporationRemote deployment of monitoring agents on computing systems
US12340670B2 (en)2020-08-062025-06-24Saudi Arabian Oil CompanyEmulated facility safety with embedded enhanced interface management
US12347296B2 (en)2020-08-062025-07-01Saudi Arabian Oil CompanyEmulated facility safety with correlated sound frequency modeling
US11341830B2 (en)2020-08-062022-05-24Saudi Arabian Oil CompanyInfrastructure construction digital integrated twin (ICDIT)
US11529277B2 (en)2020-09-102022-12-20Mammen ThomasPatient puller
US11509680B2 (en)*2020-09-302022-11-22Palo Alto Networks (Israel Analytics) Ltd.Classification of cyber-alerts into security incidents
US11461166B2 (en)2020-11-102022-10-04Sap SeIntelligent integration error handling in enterprise systems
CN112887267A (en)*2021-01-052021-06-01天津七所精密机电技术有限公司Network isolation system with message authentication function and method thereof
US11687053B2 (en)2021-03-082023-06-27Saudi Arabian Oil CompanyIntelligent safety motor control center (ISMCC)
CN112994990B (en)*2021-05-202021-07-30蚂蚁金服(杭州)网络技术有限公司 A loop detection method, device, electronic device and storage medium
FR3123527A1 (en)*2021-05-282022-12-02Orange Network monitoring method, associated device and system
US20240430281A1 (en)*2021-06-242024-12-26Airgap Networks Inc.System and Method for Device Health Check and Monitoring Using a Security Appliance as a Default Gateway with Point-to-Point Links Between Endpoints
FR3125140B1 (en)*2021-07-072023-12-08Arc Ind Secure Transfer Gateway
US20230010673A1 (en)*2021-07-072023-01-12Jpmorgan Chase Bank, N.A.Method and system for jobsite monitoring
CN113344554A (en)*2021-08-062021-09-03捷尔杰(天津)设备有限公司Digital solution method and system for auditing hierarchical process of factory
CN113472821A (en)*2021-09-062021-10-01成都卡莱博尔信息技术股份有限公司Data acquisition and management integrated method, system, device and storage medium
CA3130972C (en)2021-09-162024-04-09Cameron Mackenzie ClarkWearable device that provides spaced retrieval alerts to assist the wearer to remember desired information
US12039017B2 (en)2021-10-202024-07-16Palo Alto Networks (Israel Analytics) Ltd.User entity normalization and association
US12113794B2 (en)2021-11-172024-10-08Saudi Arabian Oil CompanySystem and method for controlling login access to computer resource assets
US11936621B2 (en)*2021-11-192024-03-19The Bank Of New York MellonFirewall drift monitoring and detection
US11777823B1 (en)2021-11-242023-10-03Amazon Technologies, Inc.Metric anomaly detection across high-scale data
CN114301712B (en)*2021-12-312023-04-07西安交通大学Industrial internet alarm log correlation analysis method and system based on graph method
US11799880B2 (en)2022-01-102023-10-24Palo Alto Networks (Israel Analytics) Ltd.Network adaptive alert prioritization system
US12024985B2 (en)2022-03-242024-07-02Saudi Arabian Oil CompanySelective inflow control device, system, and method
US11880266B2 (en)2022-05-042024-01-23Target Brands, Inc.Malfunction monitor for computing devices
WO2024063761A1 (en)*2022-09-212024-03-28Rakuten Mobile, Inc.Alarm tracking system and method
CN116149226B (en)*2023-02-222023-11-10山东中安电力科技有限公司Switch cabinet remote control system based on data analysis
US20240323199A1 (en)*2023-03-212024-09-26Honeywell International Inc.Apparatuses, computer-implemented methods, and computer program products for improved remote access cybersecurity
WO2024248851A1 (en)*2023-05-312024-12-05Rakuten Symphony, Inc.Communication network failure detection and restoration
US12278846B2 (en)*2023-06-222025-04-15Obsidian Security, Inc.Methods and apparatuses to provide information security to an entity by using multiple cloud-based application services
JP2025018543A (en)*2023-07-272025-02-06株式会社東芝 Information processing device, information processing method, and information processing program
CN116722941B (en)*2023-08-102023-10-20南方电网数字电网研究院有限公司Interactive verification method and device based on alarm information and secondary network data
US20250078007A1 (en)*2023-09-062025-03-06Honeywell International Inc.Method and system for predicting kpi values, plant states and alarms in an industrial process
US11924027B1 (en)*2023-10-262024-03-05Citibank, N.A.Detecting network operation validation anomalies in conglomerate-application-based ecosystems systems and methods
US12184480B1 (en)*2023-10-262024-12-31Citibank, N.A.Detecting and mitigating network operation validation anomalies in conglomerate-application-based ecosystems and systems and methods of the same
EP4564738A1 (en)*2023-11-282025-06-04Siemens AktiengesellschaftFiltering network traffic based on a compliance status of a communication endpoint

Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5050212A (en)*1990-06-201991-09-17Apple Computer, Inc.Method and apparatus for verifying the integrity of a file stored separately from a computer
US5144659A (en)*1989-04-191992-09-01Richard P. JonesComputer file protection system
US5475844A (en)*1992-11-271995-12-12Nec CorporationHeavily loaded resource evaluation system
US5608865A (en)*1995-03-141997-03-04Network Integrity, Inc.Stand-in Computer file server providing fast recovery from computer file server failures
US5642483A (en)*1993-07-301997-06-24Nec CorporationMethod for efficiently broadcast messages to all concerned users by limiting the number of messages that can be sent at one time
US6279113B1 (en)*1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6304975B1 (en)*1996-10-072001-10-16Peter M. ShipleyIntelligent network security device and method
US6361034B1 (en)*1999-03-032002-03-26Kurt Manufacturing Company, Inc.Magnetic insert in jaw plate for holding vise parallels
US6374305B1 (en)*1997-07-212002-04-16Oracle CorporationWeb applications interface system in a mobile-based client-server system
US20020046275A1 (en)*2000-06-122002-04-18Mark CrosbieSystem and method for host and network based intrusion detection and response
US6377955B1 (en)*1999-03-302002-04-23Cisco Technology, Inc.Method and apparatus for generating user-specified reports from radius information
US20020083168A1 (en)*2000-12-222002-06-27Sweeney Geoffrey GeorgeIntegrated monitoring system
US6438374B1 (en)*1999-05-262002-08-20Lucent Technologies Inc.Dynamic multi-step overload control for message processing in wireless communication service network
US6550012B1 (en)*1998-12-112003-04-15Network Associates, Inc.Active firewall system and methodology
US6574666B1 (en)*1998-10-222003-06-03At&T Corp.System and method for dynamic retrieval loading and deletion of packet rules in a network firewall
US6609083B2 (en)*2001-06-012003-08-19Hewlett-Packard Development Company, L.P.Adaptive performance data measurement and collections
US20030158615A1 (en)*1998-06-262003-08-21Patrick WeberControl system and method therefor
US20030163608A1 (en)*2002-02-212003-08-28Ashutosh TiwaryInstrumentation and workload recording for a system for performance testing of N-tiered computer systems using recording and playback of workloads
US20030177324A1 (en)*2002-03-142003-09-18International Business Machines CorporationMethod, system, and program for maintaining backup copies of files in a backup storage device
US6912533B1 (en)*2001-07-312005-06-28Oracle International CorporationData mining agents for efficient hardware utilization
US6971018B1 (en)*2000-04-282005-11-29Microsoft CorporationFile protection service for a computer system
US6973590B1 (en)*2001-11-142005-12-06Unisys CorporationTerminating a child process without risk of data corruption to a shared resource for subsequent processes
US7043505B1 (en)*2003-01-282006-05-09Unisys CorporationMethod variation for collecting stability data from proprietary systems
US20070050777A1 (en)*2003-06-092007-03-01Hutchinson Thomas WDuration of alerts and scanning of large data stores
US7343356B2 (en)*2004-04-302008-03-11Commvault Systems, Inc.Systems and methods for storage modeling and costing
US7380171B2 (en)*2004-12-062008-05-27Microsoft CorporationControlling software failure data reporting and responses
US7395187B2 (en)*2006-02-062008-07-01International Business Machines CorporationSystem and method for recording behavior history for abnormality detection
US20080209033A1 (en)*2003-06-092008-08-28Andrew GinterEvent monitoring and management

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5619656A (en)1994-05-051997-04-08Openservice, Inc.System for uninterruptively displaying only relevant and non-redundant alert message of the highest severity for specific condition associated with group of computers being managed
US6181981B1 (en)*1996-05-152001-01-30Marconi Communications LimitedApparatus and method for improved vending machine inventory maintenance
US6914893B2 (en)*1998-06-222005-07-05Statsignal Ipc, LlcSystem and method for monitoring and controlling remote devices
US6367034B1 (en)*1998-09-212002-04-02Microsoft CorporationUsing query language for event filtering and aggregation
US6560611B1 (en)*1998-10-132003-05-06Netarx, Inc.Method, apparatus, and article of manufacture for a network monitoring system
US6405318B1 (en)*1999-03-122002-06-11Psionic Software, Inc.Intrusion detection system
US6944774B2 (en)*1999-06-182005-09-13Zoom Telephonics, Inc.Data flow control unit
US6714977B1 (en)*1999-10-272004-03-30Netbotz, Inc.Method and system for monitoring computer networks and equipment
US20010044840A1 (en)*1999-12-132001-11-22Live Networking, Inc.Method and system for real-tme monitoring and administration of computer networks
AT412196B (en)*2000-03-172004-11-25Keba Ag METHOD FOR ASSIGNING A MOBILE OPERATING AND / OR OBSERVATION DEVICE TO A MACHINE AND OPERATING AND / OR OBSERVATION DEVICE THEREFOR
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US20020032871A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US20020065898A1 (en)*2000-11-272002-05-30Daniel LeontievRemote Internet control of instruments
US20020078382A1 (en)*2000-11-292002-06-20Ali SheikhScalable system for monitoring network system and components and methodology therefore
US6973336B2 (en)*2000-12-202005-12-06Nokia CorpMethod and apparatus for providing a notification of received message
JP2004533034A (en)*2001-02-222004-10-28コーヨームセン アメリカ,インコーポレイテッド Apparatus, method and system for capturing, analyzing, integrating, distributing and utilizing data on current events
US7284267B1 (en)*2001-03-082007-10-16Mcafee, Inc.Automatically configuring a computer firewall based on network connection
US7747764B2 (en)*2001-04-202010-06-29Rockwell Automation Technologies, Inc.Web access for non-TCP/IP control devices of an industrial control system
US6832332B2 (en)*2001-06-222004-12-14Honeywell International Inc.Automatic detection and correction of marginal data in polling loop system
US20030097557A1 (en)*2001-10-312003-05-22Tarquini Richard PaulMethod, node and computer readable medium for performing multiple signature matching in an intrusion prevention system
US7325248B2 (en)*2001-11-192008-01-29Stonesoft CorporationPersonal firewall with location dependent functionality
US7484097B2 (en)*2002-04-042009-01-27Symantec CorporationMethod and system for communicating data to and from network security devices
US7373666B2 (en)*2002-07-012008-05-13Microsoft CorporationDistributed threat management
US7376969B1 (en)*2002-12-022008-05-20Arcsight, Inc.Real time monitoring and analysis of events from multiple network security devices
US8024795B2 (en)*2003-05-092011-09-20Q1 Labs, Inc.Network intelligence system
US20050183143A1 (en)*2004-02-132005-08-18Anderholm Eric J.Methods and systems for monitoring user, application or device activity

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5144659A (en)*1989-04-191992-09-01Richard P. JonesComputer file protection system
US5050212A (en)*1990-06-201991-09-17Apple Computer, Inc.Method and apparatus for verifying the integrity of a file stored separately from a computer
US5475844A (en)*1992-11-271995-12-12Nec CorporationHeavily loaded resource evaluation system
US5642483A (en)*1993-07-301997-06-24Nec CorporationMethod for efficiently broadcast messages to all concerned users by limiting the number of messages that can be sent at one time
US5608865A (en)*1995-03-141997-03-04Network Integrity, Inc.Stand-in Computer file server providing fast recovery from computer file server failures
US6304975B1 (en)*1996-10-072001-10-16Peter M. ShipleyIntelligent network security device and method
US6374305B1 (en)*1997-07-212002-04-16Oracle CorporationWeb applications interface system in a mobile-based client-server system
US6279113B1 (en)*1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US20030158615A1 (en)*1998-06-262003-08-21Patrick WeberControl system and method therefor
US6574666B1 (en)*1998-10-222003-06-03At&T Corp.System and method for dynamic retrieval loading and deletion of packet rules in a network firewall
US6550012B1 (en)*1998-12-112003-04-15Network Associates, Inc.Active firewall system and methodology
US6361034B1 (en)*1999-03-032002-03-26Kurt Manufacturing Company, Inc.Magnetic insert in jaw plate for holding vise parallels
US6377955B1 (en)*1999-03-302002-04-23Cisco Technology, Inc.Method and apparatus for generating user-specified reports from radius information
US6438374B1 (en)*1999-05-262002-08-20Lucent Technologies Inc.Dynamic multi-step overload control for message processing in wireless communication service network
US6971018B1 (en)*2000-04-282005-11-29Microsoft CorporationFile protection service for a computer system
US20020046275A1 (en)*2000-06-122002-04-18Mark CrosbieSystem and method for host and network based intrusion detection and response
US20020083168A1 (en)*2000-12-222002-06-27Sweeney Geoffrey GeorgeIntegrated monitoring system
US6609083B2 (en)*2001-06-012003-08-19Hewlett-Packard Development Company, L.P.Adaptive performance data measurement and collections
US6912533B1 (en)*2001-07-312005-06-28Oracle International CorporationData mining agents for efficient hardware utilization
US6973590B1 (en)*2001-11-142005-12-06Unisys CorporationTerminating a child process without risk of data corruption to a shared resource for subsequent processes
US20030163608A1 (en)*2002-02-212003-08-28Ashutosh TiwaryInstrumentation and workload recording for a system for performance testing of N-tiered computer systems using recording and playback of workloads
US20030177324A1 (en)*2002-03-142003-09-18International Business Machines CorporationMethod, system, and program for maintaining backup copies of files in a backup storage device
US7043505B1 (en)*2003-01-282006-05-09Unisys CorporationMethod variation for collecting stability data from proprietary systems
US20070050777A1 (en)*2003-06-092007-03-01Hutchinson Thomas WDuration of alerts and scanning of large data stores
US20080209033A1 (en)*2003-06-092008-08-28Andrew GinterEvent monitoring and management
US7343356B2 (en)*2004-04-302008-03-11Commvault Systems, Inc.Systems and methods for storage modeling and costing
US7380171B2 (en)*2004-12-062008-05-27Microsoft CorporationControlling software failure data reporting and responses
US7395187B2 (en)*2006-02-062008-07-01International Business Machines CorporationSystem and method for recording behavior history for abnormality detection

Cited By (190)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100169970A1 (en)*2001-08-162010-07-01Stolfo Salvatore JSystem and methods for detecting malicious email transmission
US8931094B2 (en)2001-08-162015-01-06The Trustees Of Columbia University In The City Of New YorkSystem and methods for detecting malicious email transmission
US8443441B2 (en)2001-08-162013-05-14The Trustees Of Columbia University In The City Of New YorkSystem and methods for detecting malicious email transmission
US7818797B1 (en)*2001-10-112010-10-19The Trustees Of Columbia University In The City Of New YorkMethods for cost-sensitive modeling for intrusion detection and response
US9306966B2 (en)2001-12-142016-04-05The Trustees Of Columbia University In The City Of New YorkMethods of unsupervised anomaly detection using a geometric framework
US8544087B1 (en)2001-12-142013-09-24The Trustess Of Columbia University In The City Of New YorkMethods of unsupervised anomaly detection using a geometric framework
US8887281B2 (en)2002-01-252014-11-11The Trustees Of Columbia University In The City Of New YorkSystem and methods for adaptive model generation for detecting intrusion in computer systems
US20070239999A1 (en)*2002-01-252007-10-11Andrew HonigSystems and methods for adaptive model generation for detecting intrusions in computer systems
US8893273B2 (en)2002-01-252014-11-18The Trustees Of Columbia University In The City Of New YorkSystems and methods for adaptive model generation for detecting intrusions in computer systems
US9497203B2 (en)2002-01-252016-11-15The Trustees Of Columbia University In The City Of New YorkSystem and methods for adaptive model generation for detecting intrusion in computer systems
US20040250169A1 (en)*2003-04-172004-12-09Kddi CorporationIDS log analysis support apparatus, IDS log analysis support method and IDS log analysis support program
US7779119B2 (en)2003-06-092010-08-17Industrial Defender, Inc.Event monitoring and management
US20080209033A1 (en)*2003-06-092008-08-28Andrew GinterEvent monitoring and management
US20100064039A9 (en)*2003-06-092010-03-11Andrew GinterEvent monitoring and management
US7712083B2 (en)*2003-08-202010-05-04IgtMethod and apparatus for monitoring and updating system software
US20050044535A1 (en)*2003-08-202005-02-24Acres Gaming IncorporatedMethod and apparatus for monitoring and updating system software
US8190723B2 (en)2003-12-142012-05-29Cisco Technology, Inc.Method and system for automatically determining commands for a network element
US20050195738A1 (en)*2003-12-142005-09-08Krishnam DatlaMethod and system for automatically determining commands for a network element
US20050135236A1 (en)*2003-12-232005-06-23International Business Machines CorporationSmart access point
US7359339B2 (en)*2003-12-232008-04-15Lenovo Singapore Pte LtdSmart access point
US7890807B2 (en)*2004-02-192011-02-15Microsoft CorporationMethod and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
US20070300103A1 (en)*2004-02-192007-12-27Microsoft CorporationMethod and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
US7962571B2 (en)2004-02-192011-06-14Microsoft CorporationMethod and system for collecting information from computer systems based on a trusted relationship
US20080201337A1 (en)*2004-02-192008-08-21Microsoft CorporationMethod and system for collecting information from computer systems based on a trusted relationship
US7735140B2 (en)*2004-06-082010-06-08Cisco Technology, Inc.Method and apparatus providing unified compliant network audit
US8010952B2 (en)2004-06-082011-08-30Cisco Technology, Inc.Method and apparatus for configuration syntax and semantic validation
US7721304B2 (en)2004-06-082010-05-18Cisco Technology, Inc.Method and apparatus providing programmable network intelligence
US20060015591A1 (en)*2004-06-082006-01-19Datla Krishnam RApparatus and method for intelligent configuration editor
US20060013217A1 (en)*2004-06-082006-01-19Datla Krishnam RMethod and apparatus providing programmable network intelligence
US20060004742A1 (en)*2004-06-082006-01-05Datla Krishnam RMethod and apparatus for configuration syntax and semantic validation
US20050273851A1 (en)*2004-06-082005-12-08Krishnam Raju DatlaMethod and apparatus providing unified compliant network audit
US20060056366A1 (en)*2004-09-162006-03-16The Boeing Company"Wireless ISLAND" mobile LAN-to-LAN tunneling solution
US7778228B2 (en)*2004-09-162010-08-17The Boeing Company“Wireless ISLAND” mobile LAN-to-LAN tunneling solution
US20070005298A1 (en)*2005-06-222007-01-04International Business Machines CorporationMonitoring method, system, and computer program based on severity and persistence of problems
US7702780B2 (en)*2005-06-222010-04-20International Business Machines CorporationMonitoring method, system, and computer program based on severity and persistence of problems
US7818625B2 (en)*2005-08-172010-10-19Microsoft CorporationTechniques for performing memory diagnostics
US20070043974A1 (en)*2005-08-172007-02-22Microsoft CorporationTechniques for performing memory diagnostics
US10084750B2 (en)2005-11-222018-09-25Fortinet, Inc.Policy-based content filtering
US9729508B2 (en)2005-11-222017-08-08Fortinet, Inc.Policy-based content filtering
US9762540B2 (en)2005-11-222017-09-12Fortinet, Inc.Policy based content filtering
US20070156375A1 (en)*2005-12-292007-07-05Microsoft CorporationPerformance engineering and the application life cycle
US20070192344A1 (en)*2005-12-292007-08-16Microsoft CorporationThreats and countermeasures schema
US20070157311A1 (en)*2005-12-292007-07-05Microsoft CorporationSecurity modeling and the application life cycle
US7890315B2 (en)2005-12-292011-02-15Microsoft CorporationPerformance engineering and the application life cycle
US20070180101A1 (en)*2006-01-102007-08-02A10 Networks Inc.System and method for storing data-network activity information
US10038668B2 (en)*2006-01-132018-07-31Fortinet, Inc.Computerized system and method for handling network traffic
US20130305343A1 (en)*2006-01-132013-11-14Fortinet, Inc.Computerized system and method for handling network traffic
US20070199050A1 (en)*2006-02-142007-08-23Microsoft CorporationWeb application security frame
US7818788B2 (en)2006-02-142010-10-19Microsoft CorporationWeb application security frame
US7712137B2 (en)2006-02-272010-05-04Microsoft CorporationConfiguring and organizing server security information
US20070204346A1 (en)*2006-02-272007-08-30Microsoft CorporationServer security schema
US9344421B1 (en)2006-05-162016-05-17A10 Networks, Inc.User access authentication based on network access point
US8782751B2 (en)2006-05-162014-07-15A10 Networks, Inc.Systems and methods for user access authentication based on network access point
US20080022093A1 (en)*2006-06-202008-01-24Microsoft CorporationIntegrating security protection tools with computer device integrity and privacy policy
US8347085B2 (en)*2006-06-202013-01-01Microsoft CorporationIntegrating security protection tools with computer device integrity and privacy policy
US8117441B2 (en)*2006-06-202012-02-14Microsoft CorporationIntegrating security protection tools with computer device integrity and privacy policy
US20120102577A1 (en)*2006-06-202012-04-26Microsoft CorporationIntegrating security protection tools with computer device integrity and privacy policy
US20080004763A1 (en)*2006-06-302008-01-03Caterpillar Inc.Method and system for preventing excessive tire wear on machines
US20080027568A1 (en)*2006-07-272008-01-31Scott Allan PearsonMethod and Apparatus for Equipment Health Monitoring
US7536276B2 (en)*2006-07-272009-05-19Siemens Buildings Technologies, Inc.Method and apparatus for equipment health monitoring
US7571349B2 (en)*2006-08-182009-08-04Microsoft CorporationConfiguration replication for system recovery and migration
US20080126856A1 (en)*2006-08-182008-05-29Microsoft CorporationConfiguration replication for system recovery and migration
US20080052508A1 (en)*2006-08-252008-02-28Huotari Allen JNetwork security status indicators
US8984579B2 (en)2006-09-192015-03-17The Innovation Science Fund I, LLCEvaluation systems and methods for coordinating software agents
US8627402B2 (en)2006-09-192014-01-07The Invention Science Fund I, LlcEvaluation systems and methods for coordinating software agents
US20080072277A1 (en)*2006-09-192008-03-20Searete Llc, A Limited Liability Corporation Of The State Of DelawareEvaluation systems and methods for coordinating software agents
US8607336B2 (en)*2006-09-192013-12-10The Invention Science Fund I, LlcEvaluation systems and methods for coordinating software agents
US8601530B2 (en)2006-09-192013-12-03The Invention Science Fund I, LlcEvaluation systems and methods for coordinating software agents
US20080072278A1 (en)*2006-09-192008-03-20Searete Llc, A Limited Liability Corporation Of The State Of DelawareEvaluation systems and methods for coordinating software agents
US20080072241A1 (en)*2006-09-192008-03-20Searete Llc, A Limited Liability Corporation Of The State Of DelawareEvaluation systems and methods for coordinating software agents
US9680699B2 (en)2006-09-192017-06-13Invention Science Fund I, LlcEvaluation systems and methods for coordinating software agents
US20080127293A1 (en)*2006-09-192008-05-29Searete LLC, a liability corporation of the State of DelawareEvaluation systems and methods for coordinating software agents
US9178911B2 (en)2006-09-192015-11-03Invention Science Fund I, LlcEvaluation systems and methods for coordinating software agents
US9060003B2 (en)2006-10-172015-06-16A10 Networks, Inc.System and method to associate a private user identity with a public user identity
US9712493B2 (en)2006-10-172017-07-18A10 Networks, Inc.System and method to associate a private user identity with a public user identity
US8868765B1 (en)2006-10-172014-10-21A10 Networks, Inc.System and method to associate a private user identity with a public user identity
US9294467B2 (en)2006-10-172016-03-22A10 Networks, Inc.System and method to associate a private user identity with a public user identity
US9954868B2 (en)2006-10-172018-04-24A10 Networks, Inc.System and method to associate a private user identity with a public user identity
US9497201B2 (en)2006-10-172016-11-15A10 Networks, Inc.Applying security policy to an application session
US8504841B1 (en)2006-10-192013-08-06United Services Automobile Association (Usaa)Systems and methods for software application security management
US8544071B1 (en)*2006-10-192013-09-24United Services Automobile Association (Usaa)Systems and methods for software application security management
US20080109890A1 (en)*2006-11-032008-05-08Microsoft CorporationSelective auto-revocation of firewall security settings
US8214889B2 (en)*2006-11-032012-07-03Microsoft CorporationSelective auto-revocation of firewall security settings
US20080126884A1 (en)*2006-11-282008-05-29Siemens AktiengesellschaftMethod for providing detailed information and support regarding an event message
US20080126031A1 (en)*2006-11-292008-05-29Mitsubishi Electric Research LaboratoriesSystem and Method for Measuring Performances of Surveillance Systems
US7415385B2 (en)*2006-11-292008-08-19Mitsubishi Electric Research Laboratories, Inc.System and method for measuring performances of surveillance systems
US20090064332A1 (en)*2007-04-042009-03-05Phillip Andrew PorrasMethod and apparatus for generating highly predictive blacklists
US9083712B2 (en)*2007-04-042015-07-14Sri InternationalMethod and apparatus for generating highly predictive blacklists
US20080270369A1 (en)*2007-04-262008-10-30Microsoft CorporationFramework for providing metrics from any datasource
US8234240B2 (en)2007-04-262012-07-31Microsoft CorporationFramework for providing metrics from any datasource
US20080270469A1 (en)*2007-04-262008-10-30Microsoft CorporationBusiness metrics aggregated by custom hierarchy
US20090025077A1 (en)*2007-07-182009-01-22Bart TrojanowskiManaging configurations of a firewall
US8132248B2 (en)*2007-07-182012-03-06Trend Micro IncorporatedManaging configurations of a firewall
US8327431B2 (en)2007-07-182012-12-04Trend Micro IncorporatedManaging configurations of a firewall
US8365292B2 (en)*2008-05-312013-01-29Hewlett-Packard Development Company, L.P.Methods and systems for managing a potential security threat to a network
US8122503B2 (en)*2008-05-312012-02-21Hewlett-Packard Development Company, L.P.Methods and systems for managing a potential security threat to a network
US20120117654A1 (en)*2008-05-312012-05-10Ramachandra YalakantiMethods and systems for managing a potential security threat to a network
US20090300762A1 (en)*2008-05-312009-12-03Ramachandra YalakantiMethods And Systems For Managing A Potential Security Threat To A Network
US9531726B2 (en)2009-06-222016-12-27Beyondtrust Software, Inc.Systems and methods for automatic discovery of systems and accounts
US8863253B2 (en)*2009-06-222014-10-14Beyondtrust Software, Inc.Systems and methods for automatic discovery of systems and accounts
US9225723B2 (en)2009-06-222015-12-29Beyondtrust Software, Inc.Systems and methods for automatic discovery of systems and accounts
US20100325705A1 (en)*2009-06-222010-12-23Symark International, Inc.Systems and Methods for A2A and A2DB Security Using Program Authentication Factors
US20100325707A1 (en)*2009-06-222010-12-23Gyle IversonSystems and Methods for Automatic Discovery of Systems and Accounts
US9160545B2 (en)2009-06-222015-10-13Beyondtrust Software, Inc.Systems and methods for A2A and A2DB security using program authentication factors
US20100325687A1 (en)*2009-06-222010-12-23Iverson Gyle TSystems and Methods for Custom Device Automatic Password Management
US9378375B2 (en)*2009-07-172016-06-28American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US20140310815A1 (en)*2009-07-172014-10-16American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
JP2012533935A (en)*2009-07-172012-12-27アメリカン エクスプレス トラベル リレイテッド サービシーズ カンパニー, インコーポレイテッド System, method and computer program product for adapting security measures of a communication network based on feedback
US9635059B2 (en)*2009-07-172017-04-25American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US9848011B2 (en)*2009-07-172017-12-19American Express Travel Related Services Company, Inc.Security safeguard modification
US20160277450A1 (en)*2009-07-172016-09-22American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US20110016513A1 (en)*2009-07-172011-01-20American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US8752142B2 (en)*2009-07-172014-06-10American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US20170187744A1 (en)*2009-07-172017-06-29American Express Travel Related Services Company, Inc.Security safeguard modification
US10735473B2 (en)2009-07-172020-08-04American Express Travel Related Services Company, Inc.Security related data for a risk variable
US20110154497A1 (en)*2009-12-172011-06-23American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US9973526B2 (en)2009-12-172018-05-15American Express Travel Related Services Company, Inc.Mobile device sensor data
US9712552B2 (en)2009-12-172017-07-18American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US10218737B2 (en)2009-12-172019-02-26American Express Travel Related Services Company, Inc.Trusted mediator interactions with mobile device sensor data
US10997571B2 (en)2009-12-172021-05-04American Express Travel Related Services Company, Inc.Protection methods for financial transactions
US8955140B2 (en)2009-12-172015-02-10American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US9756076B2 (en)2009-12-172017-09-05American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transactions
US8621636B2 (en)2009-12-172013-12-31American Express Travel Related Services Company, Inc.Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110154034A1 (en)*2009-12-172011-06-23American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transactions
US9514453B2 (en)2010-01-202016-12-06American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US10931717B2 (en)2010-01-202021-02-23American Express Travel Related Services Company, Inc.Selectable encryption methods
US8650129B2 (en)2010-01-202014-02-11American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US20110178933A1 (en)*2010-01-202011-07-21American Express Travel Related Services Company, Inc.Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US10432668B2 (en)2010-01-202019-10-01American Express Travel Related Services Company, Inc.Selectable encryption methods
US10715515B2 (en)2010-06-222020-07-14American Express Travel Related Services Company, Inc.Generating code for a multimedia item
US10395250B2 (en)2010-06-222019-08-27American Express Travel Related Services Company, Inc.Dynamic pairing system for securing a trusted communication channel
US9213975B2 (en)2010-06-222015-12-15American Express Travel Related Services Company, Inc.Adaptive policies and protections for securing financial transaction data at rest
US9847995B2 (en)2010-06-222017-12-19American Express Travel Related Services Company, Inc.Adaptive policies and protections for securing financial transaction data at rest
US8924296B2 (en)2010-06-222014-12-30American Express Travel Related Services Company, Inc.Dynamic pairing system for securing a trusted communication channel
US8850539B2 (en)2010-06-222014-09-30American Express Travel Related Services Company, Inc.Adaptive policies and protections for securing financial transaction data at rest
US10360625B2 (en)2010-06-222019-07-23American Express Travel Related Services Company, Inc.Dynamically adaptive policy management for securing mobile financial transactions
US10104070B2 (en)2010-06-222018-10-16American Express Travel Related Services Company, Inc.Code sequencing
US9363107B2 (en)2010-10-052016-06-07Red Hat Israel, Ltd.Accessing and processing monitoring data resulting from customized monitoring of system activities
US9256488B2 (en)2010-10-052016-02-09Red Hat Israel, Ltd.Verification of template integrity of monitoring templates used for customized monitoring of system activities
US20120084413A1 (en)*2010-10-052012-04-05Red Hat Israel, Ltd.Mechanism for Installing Monitoring Utilities Using Universal Performance Monitor
US9355004B2 (en)*2010-10-052016-05-31Red Hat Israel, Ltd.Installing monitoring utilities using universal performance monitor
US8621288B2 (en)*2010-10-052013-12-31Canon Kabushiki KaishaManagement apparatus, method for controlling same, and storage medium for same
US9524224B2 (en)2010-10-052016-12-20Red Hat Israel, Ltd.Customized monitoring of system activities
US8800031B2 (en)2011-02-032014-08-05International Business Machines CorporationControlling access to sensitive data based on changes in information classification
US20120324591A1 (en)*2011-06-142012-12-20International Business Machines CorporationSystem and method to protect a resource using an active avatar
US10229280B2 (en)*2011-06-142019-03-12International Business Machines CorporationSystem and method to protect a resource using an active avatar
US9678492B2 (en)2012-02-012017-06-13Abb Research Ltd.Dynamic configuration of an industrial control system
US20140108319A1 (en)*2012-10-122014-04-17Bruno KLAUSERAutonomic network sentinels
US9450819B2 (en)*2012-10-122016-09-20Cisco Technology, Inc.Autonomic network sentinels
US20140283044A1 (en)*2013-01-312014-09-18Tencent Technology (Shenzhen) Company LimitedMethod and Device For Preventing Application in an Operating System From Being Uninstalled
US9747449B2 (en)*2013-01-312017-08-29Tencent Technology (Shenzhen) Company LimitedMethod and device for preventing application in an operating system from being uninstalled
US10176327B2 (en)*2013-01-312019-01-08Tencent Technology (Shenzhen) Company LimitedMethod and device for preventing application in an operating system from being uninstalled
US20170316209A1 (en)*2013-01-312017-11-02Tencent Technology (Shenzhen) Company Limited (2p)Method and device for preventing application in an operating system from being uninstalled
US9825943B2 (en)2013-06-242017-11-21A10 Networks, Inc.Location determination for user authentication
US9122853B2 (en)2013-06-242015-09-01A10 Networks, Inc.Location determination for user authentication
US10158627B2 (en)2013-06-242018-12-18A10 Networks, Inc.Location determination for user authentication
US9398011B2 (en)2013-06-242016-07-19A10 Networks, Inc.Location determination for user authentication
US9516064B2 (en)2013-10-142016-12-06Intuit Inc.Method and system for dynamic and comprehensive vulnerability management
US11165770B1 (en)2013-12-062021-11-02A10 Networks, Inc.Biometric verification of a human internet user
US9501345B1 (en)2013-12-232016-11-22Intuit Inc.Method and system for creating enriched log data
US9323926B2 (en)2013-12-302016-04-26Intuit Inc.Method and system for intrusion and extrusion detection
US9325726B2 (en)2014-02-032016-04-26Intuit Inc.Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
US9923909B2 (en)2014-02-032018-03-20Intuit Inc.System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment
US10360062B2 (en)2014-02-032019-07-23Intuit Inc.System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment
US9686301B2 (en)2014-02-032017-06-20Intuit Inc.Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment
US11411984B2 (en)2014-02-212022-08-09Intuit Inc.Replacing a potentially threatening virtual asset
US10757133B2 (en)2014-02-212020-08-25Intuit Inc.Method and system for creating and deploying virtual assets
US9459987B2 (en)2014-03-312016-10-04Intuit Inc.Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
US9596251B2 (en)2014-04-072017-03-14Intuit Inc.Method and system for providing security aware applications
US11294700B2 (en)2014-04-182022-04-05Intuit Inc.Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US10055247B2 (en)2014-04-182018-08-21Intuit Inc.Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US9374389B2 (en)2014-04-252016-06-21Intuit Inc.Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
US9900322B2 (en)2014-04-302018-02-20Intuit Inc.Method and system for providing permissions management
US9330263B2 (en)2014-05-272016-05-03Intuit Inc.Method and apparatus for automating the building of threat models for the public cloud
US9742794B2 (en)2014-05-272017-08-22Intuit Inc.Method and apparatus for automating threat model generation and pattern identification
US10050997B2 (en)2014-06-302018-08-14Intuit Inc.Method and system for secure delivery of information to computing environments
WO2016003716A1 (en)*2014-06-302016-01-07Intuit Inc.Method and system for secure delivery of information to computing environments
US9866581B2 (en)2014-06-302018-01-09Intuit Inc.Method and system for secure delivery of information to computing environments
US20160020976A1 (en)*2014-07-212016-01-21Nimal K. K. GamageIncident-Based Adaptive Monitoring of Information in a Distributed Computing Environment
US9917759B2 (en)*2014-07-212018-03-13Ca, Inc.Incident-based adaptive monitoring of information in a distributed computing environment
US10102082B2 (en)2014-07-312018-10-16Intuit Inc.Method and system for providing automated self-healing virtual assets
US9473481B2 (en)2014-07-312016-10-18Intuit Inc.Method and system for providing a virtual asset perimeter
US10261489B2 (en)2015-04-152019-04-16Indegy Ltd.Detection of mis-configuration and hostile attacks in industrial control networks using active querying
US10673872B2 (en)2015-11-232020-06-02Alcatel LucentAdvanced persistent threat detection
EP3171567A1 (en)*2015-11-232017-05-24Alcatel LucentAdvanced persistent threat detection
WO2017089102A1 (en)*2015-11-232017-06-01Alcatel LucentAdvanced persistent threat detection
US10977361B2 (en)2017-05-162021-04-13Beyondtrust Software, Inc.Systems and methods for controlling privileged operations
US11528149B2 (en)2019-04-262022-12-13Beyondtrust Software, Inc.Root-level application selective configuration
US11943371B2 (en)2019-04-262024-03-26Beyond Trust Software, Inc.Root-level application selective configuration
CN110543452A (en)*2019-08-072019-12-06浙江大华技术股份有限公司data acquisition method and equipment

Also Published As

Publication numberPublication date
US20100064039A9 (en)2010-03-11
US20070294369A1 (en)2007-12-20
EP1636704A2 (en)2006-03-22
AU2004248605B2 (en)2009-08-13
CA2526759A1 (en)2004-12-23
US7246156B2 (en)2007-07-17
AU2004248605A1 (en)2004-12-23
US20080209033A1 (en)2008-08-28
US20100023598A9 (en)2010-01-28
WO2004111785A3 (en)2005-12-22
EP1636704A4 (en)2008-06-11
US20050015624A1 (en)2005-01-20
US7779119B2 (en)2010-08-17
CA2526759C (en)2011-08-16
WO2004111785A2 (en)2004-12-23

Similar Documents

PublicationPublication DateTitle
US7246156B2 (en)Method and computer program product for monitoring an industrial network
US20090271504A1 (en)Techniques for agent configuration
US20070050777A1 (en)Duration of alerts and scanning of large data stores
US11888890B2 (en)Cloud management of connectivity for edge networking devices
US11689556B2 (en)Incorporating software-as-a-service data into a cyber threat defense system
EP1894443A2 (en)Duration of alerts and scanning of large data stores
CN113660224B (en)Situation awareness defense method, device and system based on network vulnerability scanning
US7007301B2 (en)Computer architecture for an intrusion detection system
US7134141B2 (en)System and method for host and network based intrusion detection and response
WO2021236663A1 (en)Cyber security for instant messaging across platforms
US8640234B2 (en)Method and apparatus for predictive and actual intrusion detection on a network
US20040117658A1 (en)Security monitoring and intrusion detection system
US20060203815A1 (en)Compliance verification and OSI layer 2 connection of device using said compliance verification
CN101018119A (en)Hardware-based server network security centralized management system without relevance to the operation system
CN114553537A (en) An abnormal flow monitoring method and system for industrial Internet
GB2381722A (en)intrusion detection (id) system which uses signature and squelch values to prevent bandwidth (flood) attacks on a server
Patel et al.Autonomic agent-based self-managed intrusion detection and prevention system
KR20130033161A (en)Intrusion detection system for cloud computing service
US12341672B2 (en)Logging configuration system and method
PetersonIntrusion detection and cyber security monitoring of SCADA and DCS Networks
AllanIntrusion Detection Systems (IDSs): Perspective
IudicaA monitoring system for embedded devices widely distributed
KR20110070658A (en) Flight data automatic recovery device and method
Kaskar et al.A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set
Wu et al.Integrated vulnerability management system for enterprise networks

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INDUSTRIAL DEFENDER, INC., MASSACHUSETTS

Free format text:CHANGE OF NAME;ASSIGNOR:VERANO, INC.;REEL/FRAME:020453/0384

Effective date:20070501

ASAssignment

Owner name:INDUSTRIAL DEFENDER, INC., MASSACHUSETTS

Free format text:CHANGE OF NAME;ASSIGNOR:VERANO, INC.;REEL/FRAME:020529/0922

Effective date:20070501

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp