Movatterモバイル変換


[0]ホーム

URL:


US20140143864A1 - System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware - Google Patents

System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware
Download PDF

Info

Publication number
US20140143864A1
US20140143864A1US13/904,547US201313904547AUS2014143864A1US 20140143864 A1US20140143864 A1US 20140143864A1US 201313904547 AUS201313904547 AUS 201313904547AUS 2014143864 A1US2014143864 A1US 2014143864A1
Authority
US
United States
Prior art keywords
turn
hardware device
networked computing
switch
device interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/904,547
Inventor
Gary S. Miliefsky
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SNOOPWALL LLC
Original Assignee
SNOOPWALL LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SNOOPWALL LLCfiledCriticalSNOOPWALL LLC
Priority to US13/904,547priorityCriticalpatent/US20140143864A1/en
Priority to PCT/US2013/043240prioritypatent/WO2014081468A1/en
Assigned to SNOOPWALL LLCreassignmentSNOOPWALL LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MILIEFSKY, GARY S.
Publication of US20140143864A1publicationCriticalpatent/US20140143864A1/en
Priority to US14/285,769prioritypatent/US9942269B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device. Next, providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device. Next, providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device. Next, monitoring status of each available hardware device interface and data traffic across each available hardware device interface. Upon detecting an unauthorized change of status of a specific hardware device interface or unauthorized data traffic across a specific hardware device interface providing a warning signal, turning off the specific hardware device interface by activating the turn-off switch for the specific hardware device interface or the turn-all-off switch.

Description

Claims (23)

What is claimed is:
1. A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices comprising:
providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device;
providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device;
providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device;
monitoring status of each available hardware device interface and data traffic across each available hardware device interface;
upon detecting an unauthorized change of status of a specific hardware device interface or unauthorized data traffic across a specific hardware device interface providing a warning signal; and
turning off the specific hardware device interface by activating the turn-off switch for the specific hardware device interface or the turn-all-off switch.
2. The method ofclaim 1, further comprising upon resolving the unauthorized change of status or unauthorized data traffic across the specific hardware device interface, turning on the specific hardware device interface by activating the turn-on switch for the specific hardware device interface or the turn-on-off switch.
3. The method ofclaim 1, wherein activation of the turn-on, turn-off, turn-all-on, turn-all-off switches is initiated locally by a user of the networked computing device.
4. The method ofclaim 1, wherein activation of the turn-on, turn-off, turn-all-on, turn-all-off switches is initiated remotely by an administrator of the networked computing device.
5. The method ofclaim 1, wherein said networked computing device comprises a central processing unit (CPU), a security application, and a display, wherein the security application provides computer implemented operations and instructions that monitor, detect and block data leakage, eavesdropping and spyware across all available hardware device interfaces in each of the networked computing device; wherein the CPU executes the computer implemented instruction provided by the security application, and wherein the display displays the GUI.
6. The method ofclaim 1, further comprising providing a first table comprising a list of applications and authorized status of each available hardware device interface for each application and storing said first table in a database.
7. The method ofclaim 6, further comprising providing a second table comprising a list of known malicious applications and storing said second table in said database.
8. The method ofclaim 1 further comprising providing a server configured to access the one or more networked computing devices via a network connection and wherein said server comprises a command center, a dashboard, a toolbar, a taskbar, a standalone GUI and an application programmers interface (API), and wherein said command center is configured to manage remotely security applications in the one or more networked computing devices.
9. The method ofclaim 8, further comprising creating rules and policies and installing them in the security applications of the one or more networked computing devices and the server via the command center.
10. The method ofclaim 8, further comprising summarizing and presenting in the dashboard real-time events occurring in the one or more networked computing devices and the server.
11. The method ofclaim 8, further comprising displaying the status of all available hardware device interfaces in the toolbar for the one or more networked computing devices and the server.
12. The method ofclaim 8, wherein communications between the server and the one or more networked computing devices comprise secure communications protocols.
13. The method ofclaim 12, wherein said secure communication protocols comprise one of secure socket layer (SSL), or transport layer security (TLS).
14. The method ofclaim 8, wherein the server further comprises a real-time kernel driver and a rootkit ‘system’ healer, and wherein the real-time kernel constantly monitors the status of all controlling interfaces and settings and in the event a hacker or malicious code tampers with the security applications, the rootkit “system” healer restores the security applications.
15. The method ofclaim 1, wherein the available hardware device interfaces comprise one or more of keyboard, mouse, touchscreen, webcam, USB hardware device interface, microphone, Flash memory, Infrared, Bluetooth, Ethernet, Wireless, LAN, WAN, VPN, text messaging interfaces, telephone interfaces, modem, cellular, GPS interfaces, gesture based interfaces or eye-motion based interfaces.
16. The method ofclaim 1, wherein the turn-on, turn-off, turn-all-on, turn-all-off switches comprise slidably activated switches.
17. The method ofclaim 1, wherein the turn-on, turn-off, turn-all-on, turn-all-off switches comprise pressure activated switches.
18. The method ofclaim 1, wherein the networked computing devices comprise one of personal computers, servers, desktops, laptops, mobile phones, iPhones™, iPads™, iTouches™, Droids™, Blackberry™ devices, Windows™ phone, Android™ phones, personal digital assistants (PDAs), or tablet devices.
19. The method ofclaim 1, wherein the warning signal comprises a visual warning signal or an acoustical warning signal.
20. The method ofclaim 11, wherein the visual warning signal comprises flashing of the specific hardware device interface image in the GUI.
21. The method ofclaim 1, further comprising, prior to installing a new application in any of the one or more networked computing devices, sending a message comprising the hardware device interfaces to which the new application requests access and asking for installation permission and which hardware device interfaces should be blocked.
22. A system for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices comprising:
a graphical user interface (GUI) displaying all available hardware device interfaces in each networked computing device;
a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device;
a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device;
a security application configured to monitor status of each available hardware device interface and data traffic across each available hardware device interface, and upon detecting an unauthorized change of status of a specific hardware device interface or unauthorized data traffic across a specific hardware device interface providing a warning signal and turning off the specific hardware device interface by activating the turn-off switch for the specific hardware device interface or the turn-all-off switch.
23. A computer program product for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices, wherein said computer program product is stored on a computer readable medium and comprises:
computer code for providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device;
computer code for providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device;
computer code for providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device;
computer code for monitoring status of each available hardware device interface and data traffic across each available hardware device interface;
computer code for providing a warning signal, upon detecting an unauthorized change of status of a specific hardware device interface or unauthorized data traffic across a specific hardware device interface; and
computer code for turning off the specific hardware device interface by activating the turn-off switch for the specific hardware device interface or the turn-all-off switch.
US13/904,5472012-11-212013-05-29System and method for detecting, alerting and blocking data leakage, eavesdropping and spywareAbandonedUS20140143864A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US13/904,547US20140143864A1 (en)2012-11-212013-05-29System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware
PCT/US2013/043240WO2014081468A1 (en)2012-11-212013-05-30System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware
US14/285,769US9942269B2 (en)2012-11-212014-05-23Effectively preventing data leakage, spying and eavesdropping through a networked computing device by controlling access to a plurality of its device interfaces

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201261729202P2012-11-212012-11-21
US13/904,547US20140143864A1 (en)2012-11-212013-05-29System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/285,769ContinuationUS9942269B2 (en)2012-11-212014-05-23Effectively preventing data leakage, spying and eavesdropping through a networked computing device by controlling access to a plurality of its device interfaces

Publications (1)

Publication NumberPublication Date
US20140143864A1true US20140143864A1 (en)2014-05-22

Family

ID=50729261

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/904,547AbandonedUS20140143864A1 (en)2012-11-212013-05-29System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware
US14/285,769Expired - Fee RelatedUS9942269B2 (en)2012-11-212014-05-23Effectively preventing data leakage, spying and eavesdropping through a networked computing device by controlling access to a plurality of its device interfaces

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US14/285,769Expired - Fee RelatedUS9942269B2 (en)2012-11-212014-05-23Effectively preventing data leakage, spying and eavesdropping through a networked computing device by controlling access to a plurality of its device interfaces

Country Status (2)

CountryLink
US (2)US20140143864A1 (en)
WO (1)WO2014081468A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20150215330A1 (en)*2014-01-302015-07-30Shine Security Ltd.Methods and systems of controlling distribution of personal data over network(s)
US20150215804A1 (en)*2014-01-302015-07-30Shine Security Ltd.Network traffic event management at the client terminal level
WO2016064930A1 (en)*2014-10-212016-04-28Proofpoint, Inc.Systems and methods for application security analysis
US20170083705A1 (en)*2015-09-222017-03-23Electronics And Telecommunications Research InstituteApparatus and method for analyzing malicious code in multi-core environment
WO2017075087A1 (en)2015-10-272017-05-04Blackberry LimitedDetecting resource access
US9838391B2 (en)2014-10-312017-12-05Proofpoint, Inc.Systems and methods for privately performing application security analysis
US9866572B2 (en)2014-11-202018-01-09International Business Machines CorporationMonitoring use of a sensor of a computing device
US9954873B2 (en)2015-09-302018-04-24The Mitre CorporationMobile device-based intrusion prevention system
US10008814B1 (en)*2017-02-152018-06-26Holster Lab LLCMicrophone muting device
US10270804B2 (en)*2014-08-132019-04-23F-Secure CorporationDetection of webcam abuse
WO2019164623A1 (en)*2018-02-222019-08-29Motorola Solutions, Inc.Disabling a digital assistant during a conference call based on security level
US20190361917A1 (en)*2018-05-252019-11-28Bao TranSmart device
WO2019246024A1 (en)*2018-06-182019-12-26A7Technology Inc.Systems and methods for computer security
US10764860B2 (en)2015-10-272020-09-01Blackberry LimitedMonitoring resource access
CN113986985A (en)*2021-12-242022-01-28深圳市聚能优电科技有限公司IO reading method, system, equipment and storage medium for energy management

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB201521137D0 (en)*2015-12-012016-01-13Qatar Foundation For Education Science And Community DevHoneybot: Mobile Honeypot detection and isolation techniques for adhoc malicious communications
US10333949B1 (en)*2016-03-152019-06-25Symantec CorporationProactive protection of mobile operating system malware via blocking of infection vector
US12153674B2 (en)2016-04-152024-11-26Sophos LimitedTracking malware root causes with an event graph
US9928366B2 (en)2016-04-152018-03-27Sophos LimitedEndpoint malware detection using an event graph
US9967267B2 (en)2016-04-152018-05-08Sophos LimitedForensic analysis of computing activity
CN106454498B (en)*2016-11-032019-06-04四川长虹电器股份有限公司The method of Android platform management USB device
WO2018227559A1 (en)*2017-06-162018-12-20深圳市海和高新技术有限公司Wireless communication device
CN108683662B (en)*2018-05-142020-08-14深圳市联软科技股份有限公司Individual online equipment risk assessment method and system
US11552962B2 (en)2018-08-312023-01-10Sophos LimitedComputer assisted identification of intermediate level threats
CN113132381B (en)*2021-04-192022-08-02何文刚Computer network information safety controller
US11921842B2 (en)*2021-06-142024-03-05Kyndryl, Inc.Multifactor authorization on accessing hardware resources
US12130923B2 (en)2022-03-312024-10-29Sophos LimitedMethods and apparatus for augmenting training data using large language models
US12204870B2 (en)2022-03-312025-01-21Sophos LimitedNatural language analysis of a command line using a machine learning model to generate a natural language description of the command line
US12265526B2 (en)2022-03-312025-04-01Sophos LimitedMethods and apparatus for natural language interface for constructing complex database queries

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060253712A1 (en)*2003-05-132006-11-09Francois-Dominique ArmingaudSystem for real-time healing of vital computer files
US7353538B2 (en)*2002-11-082008-04-01Federal Network Systems LlcServer resource management, analysis, and intrusion negation
US20090106834A1 (en)*2007-10-192009-04-23Andrew Gerard BorzyckiSystems and methods for enhancing security by selectively opening a listening port when an incoming connection is expected
US8271642B1 (en)*2007-08-292012-09-18Mcafee, Inc.System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input
US20130054962A1 (en)*2011-08-312013-02-28Deepak ChawlaPolicy configuration for mobile device applications
US20130055347A1 (en)*2011-08-312013-02-28Deepak ChawlaHardware interface access control for mobile applications
US8590033B2 (en)*2008-09-252013-11-19Fisher-Rosemount Systems, Inc.One button security lockdown of a process control network
US8650620B2 (en)*2010-12-202014-02-11At&T Intellectual Property I, L.P.Methods and apparatus to control privileges of mobile device applications

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP0610677A3 (en)1993-02-121995-08-02IbmBimodal communications device driver.
JP2000503154A (en)*1996-01-112000-03-14エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US6189050B1 (en)*1998-05-082001-02-13Compaq Computer CorporationMethod and apparatus for adding or removing devices from a computer system without restarting
TWI281107B (en)*2001-08-132007-05-11Qualcomm IncUsing permissions to allocate device resources to an application
US20030084340A1 (en)2001-10-312003-05-01Schertz Richard L.System and method of graphically displaying data for an intrusion protection system
US7269851B2 (en)*2002-01-072007-09-11Mcafee, Inc.Managing malware protection upon a computer network
US7146638B2 (en)*2002-06-272006-12-05International Business Machines CorporationFirewall protocol providing additional information
US6782000B2 (en)2002-10-312004-08-24Ciena CorporationMethod, system and storage medium for providing a cross connect user interface
US7739693B2 (en)2002-11-252010-06-15Sap AgGeneric application program interface for native drivers
US8127359B2 (en)*2003-04-112012-02-28Samir Gurunath KelekarSystems and methods for real-time network-based vulnerability assessment
US7310664B1 (en)*2004-02-062007-12-18Extreme NetworksUnified, configurable, adaptive, network architecture
CN1934822A (en)*2004-03-172007-03-21皇家飞利浦电子股份有限公司Method of and device for generating authorization status list
US7417953B2 (en)*2004-11-012008-08-26Alcatel LucentPort re-enabling by monitoring link status
US8291063B2 (en)*2005-03-042012-10-16Netapp, Inc.Method and apparatus for communicating between an agent and a remote management module in a processing system
US8140664B2 (en)2005-05-092012-03-20Trend Micro IncorporatedGraphical user interface based sensitive information and internal information vulnerability management system
US7421625B2 (en)*2005-05-262008-09-02Microsoft CorporationIndicating data connection and status conditions
CN1852129A (en)*2005-07-082006-10-25华为技术有限公司Apparatus port monitoring system and method
US7752436B2 (en)2005-08-092010-07-06Intel CorporationExclusive access for secure audio program
US7712132B1 (en)2005-10-062010-05-04Ogilvie John WDetecting surreptitious spyware
US8554748B1 (en)*2005-11-302013-10-08Netapp, Inc.Method and apparatus for differential file based update for embedded systems
US8011013B2 (en)*2006-07-192011-08-30Quickvault, Inc.Method for securing and controlling USB ports
IL186275A0 (en)*2007-09-252008-08-07Newvaltech Knowledge ServicesTelecommunication policy program systems, processes and devices
US8935741B2 (en)2008-04-172015-01-13iAnywhere Solutions, IncPolicy enforcement in mobile devices
GB0815587D0 (en)*2008-08-272008-10-01Applied Neural Technologies LtdComputer/network security application
US9043919B2 (en)*2008-10-212015-05-26Lookout, Inc.Crawling multiple markets and correlating
CA2722980C (en)*2009-12-012019-01-08Inside ContactlessProcess for controlling access to a contactless interface in a contact and contactless double communication interface integrated circuit
US8539584B2 (en)*2010-08-302013-09-17International Business Machines CorporationRootkit monitoring agent built into an operating system kernel
KR20120096983A (en)*2011-02-242012-09-03삼성전자주식회사Malware detection method and mobile terminal therefor
US9053337B2 (en)*2011-06-072015-06-09Blackberry LimitedMethods and devices for controlling access to a computing resource by applications executable on a computing device
WO2013022655A1 (en)2011-08-082013-02-14Intel CorporationDelivering data from a range of input devices over a secure path to trusted services in a secure element
US9507967B2 (en)2012-02-152016-11-29Blackberry LimitedThwarting attacks that involve analyzing hardware sensor output
US8595489B1 (en)*2012-10-292013-11-26Google Inc.Grouping and ranking of application permissions
EP2784714B1 (en)2013-03-282021-04-28Alcatel LucentMethod of preventing access to sensitive data of a computing device
US9208349B1 (en)2015-01-132015-12-08Snoopwall, Inc.Securing data gathering devices of a personal computing device while performing sensitive data gathering activities to prevent the misappropriation of personal user data gathered therewith

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7353538B2 (en)*2002-11-082008-04-01Federal Network Systems LlcServer resource management, analysis, and intrusion negation
US20060253712A1 (en)*2003-05-132006-11-09Francois-Dominique ArmingaudSystem for real-time healing of vital computer files
US8271642B1 (en)*2007-08-292012-09-18Mcafee, Inc.System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input
US20090106834A1 (en)*2007-10-192009-04-23Andrew Gerard BorzyckiSystems and methods for enhancing security by selectively opening a listening port when an incoming connection is expected
US8590033B2 (en)*2008-09-252013-11-19Fisher-Rosemount Systems, Inc.One button security lockdown of a process control network
US8650620B2 (en)*2010-12-202014-02-11At&T Intellectual Property I, L.P.Methods and apparatus to control privileges of mobile device applications
US20130054962A1 (en)*2011-08-312013-02-28Deepak ChawlaPolicy configuration for mobile device applications
US20130055347A1 (en)*2011-08-312013-02-28Deepak ChawlaHardware interface access control for mobile applications

Cited By (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9807639B2 (en)*2014-01-302017-10-31Shine Security Ltd.Network traffic event management at the client terminal level
US20150215804A1 (en)*2014-01-302015-07-30Shine Security Ltd.Network traffic event management at the client terminal level
US20150215330A1 (en)*2014-01-302015-07-30Shine Security Ltd.Methods and systems of controlling distribution of personal data over network(s)
US20180070261A1 (en)*2014-01-302018-03-08Shine Security Ltd.Network traffic event management at the client terminal level
US10270804B2 (en)*2014-08-132019-04-23F-Secure CorporationDetection of webcam abuse
WO2016064930A1 (en)*2014-10-212016-04-28Proofpoint, Inc.Systems and methods for application security analysis
US11336678B2 (en)2014-10-212022-05-17Proofpoint, Inc.Methods and systems for security analysis of applications on mobile devices brought into an enterprise network environment
US9967278B2 (en)2014-10-212018-05-08Proofpoint, Inc.Systems and methods for application security analysis
US10623435B2 (en)2014-10-212020-04-14Proofpoint, Inc.Application security analysis
US10097576B2 (en)*2014-10-212018-10-09Proofpoint, Inc.Systems and methods for application security analysis
US9838391B2 (en)2014-10-312017-12-05Proofpoint, Inc.Systems and methods for privately performing application security analysis
US11540133B2 (en)2014-10-312022-12-27Proofpoint, Inc.Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy
US11032711B2 (en)2014-10-312021-06-08Proofpoint, Inc.Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy
US10505933B2 (en)*2014-10-312019-12-10Proofpoint, Inc.Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy
US20190182247A1 (en)*2014-10-312019-06-13Proofpoint, Inc.Systems and Methods for Security Analysis of Applications on User Mobile Devices While Maintaining User Application Privacy
US10270769B2 (en)2014-10-312019-04-23Proofpoint, Inc.Privately performing application security analysis
US10778698B2 (en)2014-11-202020-09-15International Business Machines CorporationMonitoring use of a sensor of a computing device
US9866572B2 (en)2014-11-202018-01-09International Business Machines CorporationMonitoring use of a sensor of a computing device
US10225267B2 (en)2014-11-202019-03-05International Business Machines CorporationMonitoring use of a sensor of a computing device
US20170083705A1 (en)*2015-09-222017-03-23Electronics And Telecommunications Research InstituteApparatus and method for analyzing malicious code in multi-core environment
US9965631B2 (en)*2015-09-222018-05-08Electronics And Telecommunications Research InstituteApparatus and method for analyzing malicious code in multi-core environment using a program flow tracer
US9954873B2 (en)2015-09-302018-04-24The Mitre CorporationMobile device-based intrusion prevention system
WO2017075087A1 (en)2015-10-272017-05-04Blackberry LimitedDetecting resource access
US10764860B2 (en)2015-10-272020-09-01Blackberry LimitedMonitoring resource access
CN108370499A (en)*2015-10-272018-08-03黑莓有限公司Resource is detected to access
US10952087B2 (en)2015-10-272021-03-16Blackberry LimitedDetecting resource access
EP3369191A4 (en)*2015-10-272019-05-22BlackBerry Limited DETECTION OF ACCESS TO A RESOURCE
US10008814B1 (en)*2017-02-152018-06-26Holster Lab LLCMicrophone muting device
WO2019164623A1 (en)*2018-02-222019-08-29Motorola Solutions, Inc.Disabling a digital assistant during a conference call based on security level
GB2585771A (en)*2018-02-222021-01-20Motorola Solutions IncDisabling a digital assistant during a conference call based on security level
US20190361917A1 (en)*2018-05-252019-11-28Bao TranSmart device
US20210133310A1 (en)*2018-06-182021-05-06A7Technology Inc.Systems and methods for computer security
WO2019246024A1 (en)*2018-06-182019-12-26A7Technology Inc.Systems and methods for computer security
CN113986985A (en)*2021-12-242022-01-28深圳市聚能优电科技有限公司IO reading method, system, equipment and storage medium for energy management

Also Published As

Publication numberPublication date
WO2014081468A1 (en)2014-05-30
US20170324775A9 (en)2017-11-09
US20140359768A1 (en)2014-12-04
US9942269B2 (en)2018-04-10

Similar Documents

PublicationPublication DateTitle
US9942269B2 (en)Effectively preventing data leakage, spying and eavesdropping through a networked computing device by controlling access to a plurality of its device interfaces
US12099596B2 (en)Mobile device policy enforcement
US20230208879A1 (en)Detecting phishing attacks
US10657277B2 (en)Behavioral-based control of access to encrypted content by a process
US12021831B2 (en)Network security
US10650154B2 (en)Process-level control of encrypted content
US20180359272A1 (en)Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
US10728269B2 (en)Method for conditionally hooking endpoint processes with a security agent
US20170206351A1 (en)Mobile device security monitoring and notification
US10122753B2 (en)Using reputation to avoid false malware detections
US9392015B2 (en)Advanced persistent threat detection
US12388795B2 (en)Encrypted cache protection
US20170346824A1 (en)Methods and systems for mobile device risk management
US11368361B2 (en)Tamper-resistant service management for enterprise systems
GB2549546A (en)Boot security
US20160373447A1 (en)Unauthorized access detecting system and unauthorized access detecting method
US10951642B2 (en)Context-dependent timeout for remote security services
GB2574283A (en)Detecting triggering events for distributed denial of service attacks
WO2022208045A1 (en)Encrypted cache protection
WO2019211592A1 (en)Locally securing endpoints in an enterprise network using remote network resources
WO2019122832A1 (en)Electronic mail security using a user-based inquiry
US12399990B2 (en)Variable timeouts between operating modes of a computer for detecting malicious software

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SNOOPWALL LLC, NEW HAMPSHIRE

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MILIEFSKY, GARY S.;REEL/FRAME:030664/0359

Effective date:20130614

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp