Movatterモバイル変換


[0]ホーム

URL:


US20170235567A1 - Wireless router remote firmware upgrade - Google Patents

Wireless router remote firmware upgrade
Download PDF

Info

Publication number
US20170235567A1
US20170235567A1US15/383,862US201615383862AUS2017235567A1US 20170235567 A1US20170235567 A1US 20170235567A1US 201615383862 AUS201615383862 AUS 201615383862AUS 2017235567 A1US2017235567 A1US 2017235567A1
Authority
US
United States
Prior art keywords
firmware
wireless router
router
flash memory
chunks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/383,862
Inventor
Joseph P. Marino
Jonathan Fortin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gytheion Networks LLC
Original Assignee
Gytheion Networks LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/587,394external-prioritypatent/US8402109B2/en
Application filed by Gytheion Networks LLCfiledCriticalGytheion Networks LLC
Priority to US15/383,862priorityCriticalpatent/US20170235567A1/en
Assigned to GYTHEION NETWORKS LLCreassignmentGYTHEION NETWORKS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: OGILVIE, JOHN
Assigned to GYTHEION NETWORKS LLCreassignmentGYTHEION NETWORKS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FORTIN, JONATHAN, MARINO, JOSEPH P
Publication of US20170235567A1publicationCriticalpatent/US20170235567A1/en
Priority to US15/950,451prioritypatent/US20180232226A1/en
Assigned to MARINO, JOSEPH PreassignmentMARINO, JOSEPH PASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GYTHEION NETWORKS LLC
Assigned to MARINO, JOSEPH PreassignmentMARINO, JOSEPH PCORRECTIVE ASSIGNMENT TO CORRECT THE INCORRECT APPL. NO. 12/074,717 PREVIOUSLY RECORDED AT REEL: 045882 FRAME: 0175. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.Assignors: GYTHEION NETWORKS LLC
Assigned to GYTHEION NETWORKS LLCreassignmentGYTHEION NETWORKS LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MARINO, JOSEPH P
Assigned to BLACKBIRD TECH LLCreassignmentBLACKBIRD TECH LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GYTHEION NETWORKS LLC
Priority to US16/283,125prioritypatent/US20190250905A1/en
Priority to US16/752,505prioritypatent/US20200159521A1/en
Priority to US17/215,764prioritypatent/US20210216304A1/en
Priority to US18/090,111prioritypatent/US20230140329A1/en
Assigned to GYTHEION NETWORKS, LLCreassignmentGYTHEION NETWORKS, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BLACKBIRD TECH LLC
Assigned to GYTHEION NETWORKS, LLCreassignmentGYTHEION NETWORKS, LLCCORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA PREVIOUSLY RECORDED ON REEL 68890 FRAME 921. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.Assignors: SARTORI, Elisa
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then writes a kernel memory before going live with upgraded firmware. Some routers authenticate the firmware image. In some cases, image chunks are re-ordered into an executable order after receipt and before finishing their final arrangement in the flash memory. In some routers, a maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity. Some routers remap ROM to RAM memory. Some decompress data from flash into a RAM. Some save text file configuration settings in flash before rebooting. Some detect a user's inactive billing status and redirect a web browser to a billing activation page.

Description

Claims (20)

What is claimed is:
1. A method for upgrading a wireless router, comprising the steps of:
(a) containing a firmware version, namely, a flash memory in the wireless router containing a first version of router firmware, the router firmware including instructions to be executed by processor of the wireless router, the router firmware also including data;
(b) requesting a firmware update, namely, a request for a firmware update being sent between the wireless router and a server over a network connection;
(c) receiving a firmware update, namely, the wireless router receiving over the network connection a firmware update, the firmware update including at least a firmware image for a second version of router firmware which differs from the first version of router firmware by reason of containing at least one firmware change, a firmware change being a difference in firmware data and/or a difference in firmware instructions, the firmware image including a plurality of chunks, each chunk having a size which is no greater than a predetermined chunk size;
(d) destructively overwriting flash memory chunks, namely, the wireless router destructively overwriting the first version of router firmware in the flash memory with the second version of router firmware, and wherein the wireless router is configured to run a version of router firmware that is in the router's flash memory after being rebooted; and
(e) going live with upgraded firmware, namely, the wireless router rebooting, thereby making the firmware change(s) go live.
2. The wireless router upgrading method ofclaim 1, further comprising writing the flash memory and then writing a kernel memory, namely, the wireless router destructively overwriting the first version of router firmware in the flash memory with the second version of router firmware, and then writing a copy of content of the second version of router firmware to a kernel memory in a volatile RAM memory in the wireless router before going live with upgraded firmware.
3. The wireless router upgrading method ofclaim 1, further comprising writing both flash memory and a volatile RAM disk, namely, the wireless router destructively overwriting the first version of router firmware in the flash memory with the second version of router firmware, and also writing a copy of content of the second version of router firmware to a RAM disk in a volatile RAM memory of the router.
4. The wireless router upgrading method ofclaim 1, wherein the firmware image chunks have at least one predetermined executable order, namely, an order in which the chunks are arranged in an executable copy of the firmware image, wherein the step of receiving a responsive firmware image receives the chunks in a volatile RAM memory in the wireless router in an order which differs from the executable order, and wherein the method comprises re-ordering the chunks such that the step of destructively overwriting flash memory chunks arranges chunks in the flash memory in the executable order.
5. The wireless router upgrading method ofclaim 1, wherein the firmware image has a size and the flash memory has a storage capacity, and the method further comprises the step of the wireless router checking to see whether the size of the firmware image is less than a predetermined maximum firmware image size, and the predetermined maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity.
6. The wireless router upgrading method ofclaim 1, further comprising the step of the wireless router remapping a ROM memory address in the router to a RAM memory address in the router.
7. The wireless router upgrading method ofclaim 1, further comprising the step of the wireless router decompressing data held within the flash memory in the router and copying the data to a RAM-based file system in the router.
8. The wireless router upgrading method ofclaim 1, further comprising the steps of:
before going live with upgraded firmware, the wireless router overwriting at least a portion of the flash memory with user-definable configuration settings from a text file; and
after going live with upgraded firmware, the wireless router overwriting the text file with the configuration settings from the flash memory.
9. The wireless router upgrading method ofclaim 1, including receiving an indication that a billing status is inactive, and redirecting a web browser to a billing activation page.
10. The wireless router upgrading method ofclaim 1, wherein the firmware image chunks have at least one predetermined executable order, namely, an order in which the chunks are arranged in an executable copy of the firmware image, wherein the step of receiving a responsive firmware image receives the chunks in the wireless router in an order which differs from the executable order, and the method comprises re-ordering the chunks such that the step of destructively overwriting flash memory chunks arranges chunks in the flash memory in the executable order, and the method also comprises writing a copy of the chunks to a kernel memory in the wireless router.
11. A remotely upgradable wireless router, comprising:
a processor;
a volatile RAM memory in operable communication with the processor and containing a kernel, the kernel including data and including instructions which upon execution by the processor at least partially control operation of the wireless router, the kernel in particular containing a flash memory device driver;
a network interface card connectable to a TCP/IP network for two-way data communication of the wireless router with a remote server, the network interface card in operable communication with the volatile RAM memory;
a wireless link interface connectable to a wireless network for two-way data communication of the wireless router with a local device, the wireless link interface in operable communication with the volatile RAM memory;
a flash memory in operable communication with the processor by use of the flash memory device driver, the flash memory containing a version of wireless router firmware, the wireless router firmware including data and including instructions which upon execution by the processor at least partially control operation of the wireless link interface;
the wireless router further characterized in that upon execution of at least some of the instructions by the processor, the wireless router will do the following:
receive over the network interface from the remote server a wireless router firmware image,
write content of the wireless router firmware image to the flash memory,
write content of the wireless router firmware image to the kernel memory after writing the content to the flash memory, and then
reboot, thereby passing control to at least some of the wireless router firmware content that was written to the flash memory.
12. The remotely upgradable wireless router ofclaim 11, wherein the flash memory has a storage capacity, and the wireless router firmware image includes a plurality of chunks, each chunk having a size which is no greater than a predetermined chunk size and is less than one-eighth the flash memory storage capacity, and wherein the wireless router upon execution of at least some of the instructions by the processor destructively overwrites the version of wireless router firmware in the flash memory in a chunk-wise manner with chunks of the wireless router firmware image.
13. The remotely upgradable wireless router ofclaim 11, wherein the wireless router firmware image includes a plurality of chunks which have at least one predetermined executable order, namely, an order in which the chunks are arranged in an executable copy of the wireless router firmware image, and wherein the wireless router upon execution of at least some of the instructions by the processor receives the chunks in the RAM memory in an order which differs from the executable order, and re-orders chunks to arrange the chunks in the flash memory in the executable order.
14. The remotely upgradable wireless router ofclaim 11, further comprising a ROM memory address remapped to a RAM memory address in the router.
15. A system comprising the remotely upgradable wireless router ofclaim 11 and a text file containing user-defined configuration settings, wherein the flash memory contains a copy of the user-defined configuration settings.
16. The remotely upgradable wireless router ofclaim 11, wherein the wireless router firmware image has a size and the flash memory has a storage capacity, the wireless router firmware image includes a plurality of chunks, each chunk has a size which is no greater than a predetermined chunk size and is less than one-eighth the flash memory storage capacity, and the size of the wireless router firmware image is at least two chunk sizes smaller than the flash memory storage capacity.
17. The remotely upgradable wireless router ofclaim 11, wherein the wireless router upon execution of at least some of the instructions by the processor performs authentication to verify validity of the wireless router firmware image.
18. The remotely upgradable wireless router ofclaim 11, wherein the wireless link interface conforms with at least one 802.11 standard for wireless communications.
19. The remotely upgradable wireless router ofclaim 11, further comprising a 10/100 Mbps local area network interface card to provide a data communication connection to a local area network, the kernel including instructions which upon execution by the processor at least partially control operation of the local area network interface card.
20. The remotely upgradable wireless router ofclaim 11, wherein the kernel comprises open source operating system code.
US15/383,8622005-02-152016-12-19Wireless router remote firmware upgradeAbandonedUS20170235567A1 (en)

Priority Applications (6)

Application NumberPriority DateFiling DateTitle
US15/383,862US20170235567A1 (en)2005-02-152016-12-19Wireless router remote firmware upgrade
US15/950,451US20180232226A1 (en)2005-02-152018-04-11Wireless router remote firmware upgrade
US16/283,125US20190250905A1 (en)2005-02-152019-02-22Wireless router remote firmware upgrade
US16/752,505US20200159521A1 (en)2005-02-152020-01-24Wireless router remote firmware upgrade
US17/215,764US20210216304A1 (en)2005-02-152021-03-29Wireless router remote firmware upgrade
US18/090,111US20230140329A1 (en)2005-02-152022-12-28Wireless router remote firmware upgrade

Applications Claiming Priority (6)

Application NumberPriority DateFiling DateTitle
US65316305P2005-02-152005-02-15
US11/350,905US7904518B2 (en)2005-02-152006-02-08Apparatus and method for analyzing and filtering email and for providing web related services
US13/015,053US8326936B2 (en)2005-02-152011-01-27Apparatus and method for analyzing and filtering email and for providing web related services
US13/587,394US8402109B2 (en)2005-02-152012-08-16Wireless router remote firmware upgrade
US13/763,351US9558353B2 (en)2005-02-152013-02-08Wireless router remote firmware upgrade
US15/383,862US20170235567A1 (en)2005-02-152016-12-19Wireless router remote firmware upgrade

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/763,351ContinuationUS9558353B2 (en)2005-02-152013-02-08Wireless router remote firmware upgrade

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/950,451ContinuationUS20180232226A1 (en)2005-02-152018-04-11Wireless router remote firmware upgrade

Publications (1)

Publication NumberPublication Date
US20170235567A1true US20170235567A1 (en)2017-08-17

Family

ID=36816910

Family Applications (9)

Application NumberTitlePriority DateFiling Date
US11/350,905Expired - Fee RelatedUS7904518B2 (en)2005-02-152006-02-08Apparatus and method for analyzing and filtering email and for providing web related services
US13/015,053Expired - Fee RelatedUS8326936B2 (en)2005-02-152011-01-27Apparatus and method for analyzing and filtering email and for providing web related services
US13/763,351Expired - Fee RelatedUS9558353B2 (en)2005-02-152013-02-08Wireless router remote firmware upgrade
US15/383,862AbandonedUS20170235567A1 (en)2005-02-152016-12-19Wireless router remote firmware upgrade
US15/950,451AbandonedUS20180232226A1 (en)2005-02-152018-04-11Wireless router remote firmware upgrade
US16/283,125AbandonedUS20190250905A1 (en)2005-02-152019-02-22Wireless router remote firmware upgrade
US16/752,505AbandonedUS20200159521A1 (en)2005-02-152020-01-24Wireless router remote firmware upgrade
US17/215,764AbandonedUS20210216304A1 (en)2005-02-152021-03-29Wireless router remote firmware upgrade
US18/090,111AbandonedUS20230140329A1 (en)2005-02-152022-12-28Wireless router remote firmware upgrade

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US11/350,905Expired - Fee RelatedUS7904518B2 (en)2005-02-152006-02-08Apparatus and method for analyzing and filtering email and for providing web related services
US13/015,053Expired - Fee RelatedUS8326936B2 (en)2005-02-152011-01-27Apparatus and method for analyzing and filtering email and for providing web related services
US13/763,351Expired - Fee RelatedUS9558353B2 (en)2005-02-152013-02-08Wireless router remote firmware upgrade

Family Applications After (5)

Application NumberTitlePriority DateFiling Date
US15/950,451AbandonedUS20180232226A1 (en)2005-02-152018-04-11Wireless router remote firmware upgrade
US16/283,125AbandonedUS20190250905A1 (en)2005-02-152019-02-22Wireless router remote firmware upgrade
US16/752,505AbandonedUS20200159521A1 (en)2005-02-152020-01-24Wireless router remote firmware upgrade
US17/215,764AbandonedUS20210216304A1 (en)2005-02-152021-03-29Wireless router remote firmware upgrade
US18/090,111AbandonedUS20230140329A1 (en)2005-02-152022-12-28Wireless router remote firmware upgrade

Country Status (1)

CountryLink
US (9)US7904518B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170277529A1 (en)*2016-03-242017-09-28Nec CorporationFirmware distribution system, distribution apparatus, firmware distribution method and program recording medium
CN108540344A (en)*2018-03-292018-09-14四川斐讯信息技术有限公司A kind of router upgrade test method and system
CN109669708A (en)*2018-11-022019-04-23金卡智能集团股份有限公司Remote upgrade method for modularization internet-of-things terminal equipment
EP4365732A1 (en)*2022-11-072024-05-08Samsung Electronics Co., Ltd.Efficient firmware download operation in storage devices

Families Citing this family (274)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8578480B2 (en)*2002-03-082013-11-05Mcafee, Inc.Systems and methods for identifying potentially malicious messages
US20060015942A1 (en)2002-03-082006-01-19Ciphertrust, Inc.Systems and methods for classification of messaging entities
US8561167B2 (en)2002-03-082013-10-15Mcafee, Inc.Web reputation scoring
US20050223074A1 (en)*2004-03-312005-10-06Morris Robert PSystem and method for providing user selectable electronic message action choices and processing
US8375444B2 (en)2006-04-202013-02-12Fireeye, Inc.Dynamic signature creation and enforcement
US8561177B1 (en)2004-04-012013-10-15Fireeye, Inc.Systems and methods for detecting communication channels of bots
US8566946B1 (en)2006-04-202013-10-22Fireeye, Inc.Malware containment on connection
US8006305B2 (en)*2004-06-142011-08-23Fireeye, Inc.Computer worm defense system and method
US8539582B1 (en)2004-04-012013-09-17Fireeye, Inc.Malware containment and security analysis on connection
US7587537B1 (en)2007-11-302009-09-08Altera CorporationSerializer-deserializer circuits formed from input-output circuit registers
US8898788B1 (en)2004-04-012014-11-25Fireeye, Inc.Systems and methods for malware attack prevention
US8204984B1 (en)2004-04-012012-06-19Fireeye, Inc.Systems and methods for detecting encrypted bot command and control communication channels
US8171553B2 (en)2004-04-012012-05-01Fireeye, Inc.Heuristic based capture with replay to virtual machine
US9106694B2 (en)2004-04-012015-08-11Fireeye, Inc.Electronic message analysis for malware detection
US8793787B2 (en)2004-04-012014-07-29Fireeye, Inc.Detecting malicious network content using virtual environment components
US8528086B1 (en)2004-04-012013-09-03Fireeye, Inc.System and method of detecting computer worms
US8881282B1 (en)2004-04-012014-11-04Fireeye, Inc.Systems and methods for malware attack detection and identification
US8584239B2 (en)*2004-04-012013-11-12Fireeye, Inc.Virtual machine with dynamic data flow analysis
US8549638B2 (en)2004-06-142013-10-01Fireeye, Inc.System and method of containing computer worms
US9027135B1 (en)2004-04-012015-05-05Fireeye, Inc.Prospective client identification using malware attack detection
US8635690B2 (en)2004-11-052014-01-21Mcafee, Inc.Reputation based message processing
US8769663B2 (en)*2005-08-242014-07-01Fortinet, Inc.Systems and methods for detecting undesirable network traffic content
US7958557B2 (en)*2006-05-172011-06-07Computer Associates Think, Inc.Determining a source of malicious computer element in a computer network
US20080016572A1 (en)*2006-07-122008-01-17Microsoft CorporationMalicious software detection via memory analysis
US8095967B2 (en)2006-07-272012-01-10White Sky, Inc.Secure web site authentication using web site characteristics, secure user credentials and private browser
KR100859664B1 (en)*2006-11-132008-09-23삼성에스디에스 주식회사 How to determine if your email is virus infected
US8577968B2 (en)*2006-11-142013-11-05Mcafee, Inc.Method and system for handling unwanted email messages
US7779156B2 (en)*2007-01-242010-08-17Mcafee, Inc.Reputation based load balancing
US8763114B2 (en)2007-01-242014-06-24Mcafee, Inc.Detecting image spam
US8214497B2 (en)2007-01-242012-07-03Mcafee, Inc.Multi-dimensional reputation scoring
US8719364B2 (en)*2007-03-302014-05-06Canon Denshi Kabushiki KaishaSystem, method and program for network management using saved history information
US9394756B2 (en)2007-04-022016-07-19Halliburton Energy Services, Inc.Timeline from slumber to collection of RFID tags in a well environment
US9394785B2 (en)2007-04-022016-07-19Halliburton Energy Services, Inc.Methods and apparatus for evaluating downhole conditions through RFID sensing
US9394784B2 (en)2007-04-022016-07-19Halliburton Energy Services, Inc.Algorithm for zonal fault detection in a well environment
US8166535B2 (en)*2007-10-102012-04-24Microsoft CorporationUniversal media firewall
US8185930B2 (en)2007-11-062012-05-22Mcafee, Inc.Adjusting filter or classification control settings
US8589503B2 (en)2008-04-042013-11-19Mcafee, Inc.Prioritizing network traffic
JP5396779B2 (en)*2008-09-032014-01-22ヤマハ株式会社 Relay device and program
US8850571B2 (en)2008-11-032014-09-30Fireeye, Inc.Systems and methods for detecting malicious network content
US8997219B2 (en)2008-11-032015-03-31Fireeye, Inc.Systems and methods for detecting malicious PDF network content
US20100180027A1 (en)*2009-01-102010-07-15Barracuda Networks, IncControlling transmission of unauthorized unobservable content in email using policy
US8621614B2 (en)*2009-05-262013-12-31Microsoft CorporationManaging potentially phishing messages in a non-web mail client context
US8078691B2 (en)*2009-08-262011-12-13Microsoft CorporationWeb page load time prediction and simulation
US9565207B1 (en)2009-09-042017-02-07Amazon Technologies, Inc.Firmware updates from an external channel
US10177934B1 (en)*2009-09-042019-01-08Amazon Technologies, Inc.Firmware updates inaccessible to guests
US8887144B1 (en)2009-09-042014-11-11Amazon Technologies, Inc.Firmware updates during limited time period
US8214653B1 (en)2009-09-042012-07-03Amazon Technologies, Inc.Secured firmware updates
US8601170B1 (en)2009-09-082013-12-03Amazon Technologies, Inc.Managing firmware update attempts
US8971538B1 (en)2009-09-082015-03-03Amazon Technologies, Inc.Firmware validation from an external channel
US8300641B1 (en)2009-09-092012-10-30Amazon Technologies, Inc.Leveraging physical network interface functionality for packet processing
US8959611B1 (en)2009-09-092015-02-17Amazon Technologies, Inc.Secure packet management for bare metal access
US8381264B1 (en)2009-09-102013-02-19Amazon Technologies, Inc.Managing hardware reboot and reset in shared environments
US8832829B2 (en)2009-09-302014-09-09Fireeye, Inc.Network-based binary file extraction and analysis for malware detection
US9264342B2 (en)*2009-12-242016-02-16Samsung Electronics Co., Ltd.Terminal device based on content name, and method for routing based on content name
US9268813B2 (en)*2009-12-242016-02-23Samsung Electronics Co., Ltd.Terminal device based on content name, and method for routing based on content name
US8621638B2 (en)2010-05-142013-12-31Mcafee, Inc.Systems and methods for classification of messaging entities
US9465935B2 (en)2010-06-112016-10-11D2L CorporationSystems, methods, and apparatus for securing user documents
CN102098235B (en)*2011-01-182013-08-07南京邮电大学Fishing mail inspection method based on text characteristic analysis
US9634896B2 (en)*2011-02-172017-04-25Circle Media Inc.Plug-and-play network filter
US9419928B2 (en)2011-03-112016-08-16James Robert MinerSystems and methods for message collection
US8819156B2 (en)2011-03-112014-08-26James Robert MinerSystems and methods for message collection
US9285966B2 (en)*2011-07-182016-03-15Verizon Patent And Licensing Inc.Message notification system
US8484741B1 (en)*2012-01-272013-07-09Chapman Technology Group, Inc.Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US9519782B2 (en)2012-02-242016-12-13Fireeye, Inc.Detecting malicious network content
CN102663291B (en)*2012-03-232015-02-25北京奇虎科技有限公司 Mail information prompt method and device
US11245672B2 (en)2012-06-182022-02-08Microsoft Technologly Licensing, LLCSystem and method to access content of encrypted data items in unsupported digital environments
US9189225B2 (en)2012-10-162015-11-17Imprivata, Inc.Secure, non-disruptive firmware updating
US10572665B2 (en)2012-12-282020-02-25Fireeye, Inc.System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9053326B2 (en)2013-02-082015-06-09PhishMe, Inc.Simulated phishing attack with sequential messages
US8966637B2 (en)2013-02-082015-02-24PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US9253207B2 (en)2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US9009823B1 (en)2013-02-232015-04-14Fireeye, Inc.Framework for efficient security coverage of mobile software applications installed on mobile devices
US9367681B1 (en)2013-02-232016-06-14Fireeye, Inc.Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9159035B1 (en)2013-02-232015-10-13Fireeye, Inc.Framework for computer application analysis of sensitive information tracking
US9824209B1 (en)2013-02-232017-11-21Fireeye, Inc.Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
US9176843B1 (en)2013-02-232015-11-03Fireeye, Inc.Framework for efficient security coverage of mobile software applications
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US8990944B1 (en)2013-02-232015-03-24Fireeye, Inc.Systems and methods for automatically detecting backdoors
US9009822B1 (en)2013-02-232015-04-14Fireeye, Inc.Framework for multi-phase analysis of mobile applications
US9104867B1 (en)2013-03-132015-08-11Fireeye, Inc.Malicious content analysis using simulated user interaction without user involvement
US9626509B1 (en)2013-03-132017-04-18Fireeye, Inc.Malicious content analysis with multi-version application support within single operating environment
US9565202B1 (en)2013-03-132017-02-07Fireeye, Inc.System and method for detecting exfiltration content
US9355247B1 (en)2013-03-132016-05-31Fireeye, Inc.File extraction from memory dump for malicious content analysis
US9430646B1 (en)2013-03-142016-08-30Fireeye, Inc.Distributed systems and methods for automatically detecting unknown bots and botnets
US9311479B1 (en)2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack
US9251343B1 (en)2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
US9413781B2 (en)2013-03-152016-08-09Fireeye, Inc.System and method employing structured intelligence to verify and contain threats at endpoints
US10713358B2 (en)2013-03-152020-07-14Fireeye, Inc.System and method to extract and utilize disassembly features to classify software intent
US9495180B2 (en)2013-05-102016-11-15Fireeye, Inc.Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en)2013-05-132017-04-25Fireeye, Inc.Classifying sets of malicious indicators for detecting command and control communications associated with malware
US9843624B1 (en)*2013-06-132017-12-12Pouya TaagholDistributed software defined networking
US10133863B2 (en)2013-06-242018-11-20Fireeye, Inc.Zero-day discovery system
US9536091B2 (en)2013-06-242017-01-03Fireeye, Inc.System and method for detecting time-bomb malware
US9300686B2 (en)2013-06-282016-03-29Fireeye, Inc.System and method for detecting malicious links in electronic messages
US9888016B1 (en)2013-06-282018-02-06Fireeye, Inc.System and method for detecting phishing using password prediction
US9552368B1 (en)*2013-07-022017-01-24Google Inc.Electronic mail attachments garden
US9559996B1 (en)2013-07-022017-01-31Google Inc.Systems and methods for integrating cloud storage and network service
WO2016059846A1 (en)*2014-10-142016-04-21デジタルア-ツ株式会社Information processing device and program
JP5606599B1 (en)*2013-07-292014-10-15デジタルア−ツ株式会社 Information processing apparatus, program, and information processing method
US9294501B2 (en)2013-09-302016-03-22Fireeye, Inc.Fuzzy hash of behavioral results
US9736179B2 (en)2013-09-302017-08-15Fireeye, Inc.System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9628507B2 (en)2013-09-302017-04-18Fireeye, Inc.Advanced persistent threat (APT) detection center
US10089461B1 (en)2013-09-302018-10-02Fireeye, Inc.Page replacement code injection
US10192052B1 (en)2013-09-302019-01-29Fireeye, Inc.System, apparatus and method for classifying a file as malicious using static scanning
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9690936B1 (en)2013-09-302017-06-27Fireeye, Inc.Multistage system and method for analyzing obfuscated content for malware
US9921978B1 (en)2013-11-082018-03-20Fireeye, Inc.System and method for enhanced security of storage devices
US9189627B1 (en)2013-11-212015-11-17Fireeye, Inc.System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US9756074B2 (en)2013-12-262017-09-05Fireeye, Inc.System and method for IPS and VM-based detection of suspicious objects
US9747446B1 (en)2013-12-262017-08-29Fireeye, Inc.System and method for run-time object classification
US9740857B2 (en)2014-01-162017-08-22Fireeye, Inc.Threat-aware microvisor
US9262629B2 (en)2014-01-212016-02-16PhishMe, Inc.Methods and systems for preventing malicious use of phishing simulation records
US9262635B2 (en)2014-02-052016-02-16Fireeye, Inc.Detection efficacy of virtual machine-based analysis with application specific events
US10140381B2 (en)2014-03-112018-11-27Cisco Technology, Inc.HTML device tags to control operational features of devices in an internet of things
US9633131B2 (en)*2014-03-112017-04-25Cisco Technology, Inc.HTML network service tags used with web browsers for controlling network elements
US9241010B1 (en)2014-03-202016-01-19Fireeye, Inc.System and method for network behavior detection
US10242185B1 (en)2014-03-212019-03-26Fireeye, Inc.Dynamic guest image creation and rollback
US9591015B1 (en)2014-03-282017-03-07Fireeye, Inc.System and method for offloading packet processing and static analysis operations
US9223972B1 (en)2014-03-312015-12-29Fireeye, Inc.Dynamically remote tuning of a malware content detection system
US9432389B1 (en)2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9438623B1 (en)2014-06-062016-09-06Fireeye, Inc.Computer exploit detection using heap spray pattern matching
US9594912B1 (en)2014-06-062017-03-14Fireeye, Inc.Return-oriented programming detection
US9973531B1 (en)2014-06-062018-05-15Fireeye, Inc.Shellcode detection
US9723498B2 (en)*2014-06-182017-08-01Google Inc.Automatically updating an access point
US10084813B2 (en)2014-06-242018-09-25Fireeye, Inc.Intrusion prevention and remedy system
US9398028B1 (en)2014-06-262016-07-19Fireeye, Inc.System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US10805340B1 (en)2014-06-262020-10-13Fireeye, Inc.Infection vector and malware tracking with an interactive user display
US10002252B2 (en)2014-07-012018-06-19Fireeye, Inc.Verification of trusted threat-aware microvisor
US20160027516A1 (en)*2014-07-242016-01-28Elster Solutions, LlcEfficient modification of data in non-volatile memory
US10032027B2 (en)*2014-07-292018-07-24Digital Arts Inc.Information processing apparatus and program for executing an electronic data in an execution environment
US9363280B1 (en)2014-08-222016-06-07Fireeye, Inc.System and method of detecting delivery of malware using cross-customer data
US8964596B1 (en)*2014-08-292015-02-24Level 3 Communications, LlcNetwork service aware routers, and applications thereof
US9634894B2 (en)*2014-08-292017-04-25Level 3 Communications, LlcNetwork service aware routers, and applications thereof
US9571465B1 (en)2014-09-182017-02-14Amazon Technologies, Inc.Security verification by message interception and modification
US10671726B1 (en)2014-09-222020-06-02Fireeye Inc.System and method for malware analysis using thread-level event monitoring
US10027689B1 (en)2014-09-292018-07-17Fireeye, Inc.Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en)2014-09-292017-09-26Fireeye, Inc.Exploit detection of malware and malware families
US10331428B1 (en)*2014-09-302019-06-25EMC IP Holding Company LLCAutomated firmware update management on huge big-data clusters
US9798377B2 (en)2014-10-082017-10-24Apple Inc.Methods and apparatus for recovering errors with an inter-processor communication link between independently operable processors
IL235423A0 (en)*2014-10-302015-01-29Ironscales LtdMethod and system for mitigating spear-phishing attacks
WO2016072790A1 (en)*2014-11-072016-05-12박현수Protective system, device, and method for protecting electronic communication device
US9942182B2 (en)2014-11-172018-04-10At&T Intellectual Property I, L.P.System and method for cloud based IP mobile messaging spam detection and defense
US9690933B1 (en)2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en)2014-12-262018-09-11Fireeye, Inc.Zero-day rotating guest image profile
US9934376B1 (en)2014-12-292018-04-03Fireeye, Inc.Malware detection appliance architecture
US9838417B1 (en)2014-12-302017-12-05Fireeye, Inc.Intelligent context aware user interaction for malware detection
JP2016148967A (en)*2015-02-122016-08-18富士通株式会社 Information processing apparatus, information processing method, and program
US10148693B2 (en)2015-03-252018-12-04Fireeye, Inc.Exploit detection system
US9690606B1 (en)2015-03-252017-06-27Fireeye, Inc.Selective system call monitoring
US9438613B1 (en)2015-03-302016-09-06Fireeye, Inc.Dynamic content activation for automated analysis of embedded objects
US10474813B1 (en)2015-03-312019-11-12Fireeye, Inc.Code injection technique for remediation at an endpoint of a network
US10417031B2 (en)2015-03-312019-09-17Fireeye, Inc.Selective virtualization for security threat detection
US9483644B1 (en)2015-03-312016-11-01Fireeye, Inc.Methods for detecting file altering malware in VM based analysis
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US9654485B1 (en)2015-04-132017-05-16Fireeye, Inc.Analytics-based security monitoring system and method
US9594904B1 (en)2015-04-232017-03-14Fireeye, Inc.Detecting malware based on reflection
US10042794B2 (en)2015-06-122018-08-07Apple Inc.Methods and apparatus for synchronizing uplink and downlink transactions on an inter-device communication link
US9882934B2 (en)*2015-06-292018-01-30Synopsys, Inc.Simple trusted transfer to internet of things devices
US11113086B1 (en)2015-06-302021-09-07Fireeye, Inc.Virtual system and method for securing external network connectivity
US10642753B1 (en)2015-06-302020-05-05Fireeye, Inc.System and method for protecting a software component running in virtual machine using a virtualization layer
US10454950B1 (en)2015-06-302019-10-22Fireeye, Inc.Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10726127B1 (en)2015-06-302020-07-28Fireeye, Inc.System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10715542B1 (en)2015-08-142020-07-14Fireeye, Inc.Mobile application risk analysis
US10176321B2 (en)2015-09-222019-01-08Fireeye, Inc.Leveraging behavior-based rules for malware family classification
US10394572B2 (en)*2015-09-242019-08-27Guangdong Oppo Mobile Telecommunications Corp. Ltd.Power adapter and method for upgrading the power adapter
US10033747B1 (en)2015-09-292018-07-24Fireeye, Inc.System and method for detecting interpreter-based exploit attacks
US10210329B1 (en)2015-09-302019-02-19Fireeye, Inc.Method to detect application execution hijacking using memory protection
US10706149B1 (en)2015-09-302020-07-07Fireeye, Inc.Detecting delayed activation malware using a primary controller and plural time controllers
US9825976B1 (en)2015-09-302017-11-21Fireeye, Inc.Detection and classification of exploit kits
US9825989B1 (en)2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US10601865B1 (en)2015-09-302020-03-24Fireeye, Inc.Detection of credential spearphishing attacks using email analysis
US10817606B1 (en)2015-09-302020-10-27Fireeye, Inc.Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
EP3160167A1 (en)*2015-10-202017-04-26Gemalto SAMethod for updating a package
US10284575B2 (en)2015-11-102019-05-07Fireeye, Inc.Launcher for setting analysis environment variations for malware detection
US10447728B1 (en)2015-12-102019-10-15Fireeye, Inc.Technique for protecting guest processes using a layered virtualization architecture
US10846117B1 (en)2015-12-102020-11-24Fireeye, Inc.Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10108446B1 (en)2015-12-112018-10-23Fireeye, Inc.Late load technique for deploying a virtualization layer underneath a running operating system
DE102015016616A1 (en)*2015-12-222017-06-22Giesecke & Devrient Gmbh Device and method for connecting a production device to a network
US10050998B1 (en)2015-12-302018-08-14Fireeye, Inc.Malicious message analysis system
US10621338B1 (en)2015-12-302020-04-14Fireeye, Inc.Method to detect forgery and exploits using last branch recording registers
US10565378B1 (en)2015-12-302020-02-18Fireeye, Inc.Exploit of privilege detection framework
US10133866B1 (en)2015-12-302018-11-20Fireeye, Inc.System and method for triggering analysis of an object for malware in response to modification of that object
US9824216B1 (en)2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
US11552986B1 (en)2015-12-312023-01-10Fireeye Security Holdings Us LlcCyber-security framework for application of virtual features
US10581874B1 (en)2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US10191852B2 (en)2016-02-292019-01-29Apple Inc.Methods and apparatus for locking at least a portion of a shared memory resource
US10785255B1 (en)2016-03-252020-09-22Fireeye, Inc.Cluster configuration within a scalable malware detection system
US10671721B1 (en)2016-03-252020-06-02Fireeye, Inc.Timeout management services
US10601863B1 (en)2016-03-252020-03-24Fireeye, Inc.System and method for managing sensor enrollment
US10616266B1 (en)2016-03-252020-04-07Fireeye, Inc.Distributed malware detection system and submission workflow thereof
US10826933B1 (en)2016-03-312020-11-03Fireeye, Inc.Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US10893059B1 (en)2016-03-312021-01-12Fireeye, Inc.Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10198364B2 (en)2016-03-312019-02-05Apple Inc.Memory access protection apparatus and methods for memory mapped access between independently operable processors
US10333950B2 (en)2016-05-012019-06-25International Business Machines CorporationDefending against malicious electronic messages
US10169585B1 (en)2016-06-222019-01-01Fireeye, Inc.System and methods for advanced malware detection through placement of transition events
US10462173B1 (en)2016-06-302019-10-29Fireeye, Inc.Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10592678B1 (en)2016-09-092020-03-17Fireeye, Inc.Secure communications between peers using a verified virtual trusted platform module
US10491627B1 (en)2016-09-292019-11-26Fireeye, Inc.Advanced malware detection using similarity analysis
JP6753257B2 (en)*2016-10-042020-09-09富士通株式会社 Information processing device, information processing system, information processing device control method and information processing device control program
US10795991B1 (en)2016-11-082020-10-06Fireeye, Inc.Enterprise search
US10775871B2 (en)2016-11-102020-09-15Apple Inc.Methods and apparatus for providing individualized power control for peripheral sub-systems
US10591976B2 (en)2016-11-102020-03-17Apple Inc.Methods and apparatus for providing peripheral sub-system stability
US10587647B1 (en)2016-11-222020-03-10Fireeye, Inc.Technique for malware detection capability comparison of network security devices
US10581879B1 (en)2016-12-222020-03-03Fireeye, Inc.Enhanced malware detection for generated objects
US10552610B1 (en)2016-12-222020-02-04Fireeye, Inc.Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10523609B1 (en)2016-12-272019-12-31Fireeye, Inc.Multi-vector malware detection and analysis
US10757058B2 (en)*2017-02-172020-08-25International Business Machines CorporationOutgoing communication scam prevention
US10810510B2 (en)2017-02-172020-10-20International Business Machines CorporationConversation and context aware fraud and abuse prevention agent
US10102868B2 (en)2017-02-172018-10-16International Business Machines CorporationBot-based honeypot poison resilient data collection
CN108574588B (en)*2017-03-102023-09-15中兴通讯股份有限公司Client, server and differentiated upgrading method
US10904286B1 (en)2017-03-242021-01-26Fireeye, Inc.Detection of phishing attacks using similarity analysis
US10554507B1 (en)2017-03-302020-02-04Fireeye, Inc.Multi-level control for enhanced resource and object evaluation management of malware detection system
US10902119B1 (en)2017-03-302021-01-26Fireeye, Inc.Data extraction system for malware analysis
US10791138B1 (en)2017-03-302020-09-29Fireeye, Inc.Subscription-based malware detection
US10798112B2 (en)2017-03-302020-10-06Fireeye, Inc.Attribute-controlled malware detection
US10412736B2 (en)*2017-05-082019-09-10T-Mobile Usa, Inc.Internet of things (IoT) device firewalling
US10455416B2 (en)2017-05-262019-10-22Honeywell International Inc.Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware
US10503904B1 (en)2017-06-292019-12-10Fireeye, Inc.Ransomware detection and mitigation
US10855700B1 (en)2017-06-292020-12-01Fireeye, Inc.Post-intrusion detection of cyber-attacks during lateral movement within networks
US10601848B1 (en)2017-06-292020-03-24Fireeye, Inc.Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10893068B1 (en)2017-06-302021-01-12Fireeye, Inc.Ransomware file modification prevention technique
US10346226B2 (en)2017-08-072019-07-09Time Warner Cable Enterprises LlcMethods and apparatus for transmitting time sensitive data over a tunneled bus interface
US10747872B1 (en)2017-09-272020-08-18Fireeye, Inc.System and method for preventing malware evasion
US10805346B2 (en)2017-10-012020-10-13Fireeye, Inc.Phishing attack detection
US11108809B2 (en)2017-10-272021-08-31Fireeye, Inc.System and method for analyzing binary code for malware classification using artificial neural network techniques
CN111433773B (en)*2017-11-302023-04-11Abb瑞士股份有限公司Updating gateways in substations
EP3729766A1 (en)2017-12-242020-10-28Arilou Information Security Technologies Ltd.System and method for tunnel-based malware detection
US11271955B2 (en)2017-12-282022-03-08Fireeye Security Holdings Us LlcPlatform and method for retroactive reclassification employing a cybersecurity-based global data store
US11240275B1 (en)2017-12-282022-02-01Fireeye Security Holdings Us LlcPlatform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11005860B1 (en)2017-12-282021-05-11Fireeye, Inc.Method and system for efficient cybersecurity analysis of endpoint events
US10331612B1 (en)2018-01-092019-06-25Apple Inc.Methods and apparatus for reduced-latency data transmission with an inter-processor communication link between independently operable processors
US10826931B1 (en)2018-03-292020-11-03Fireeye, Inc.System and method for predicting and mitigating cybersecurity system misconfigurations
US11558401B1 (en)2018-03-302023-01-17Fireeye Security Holdings Us LlcMulti-vector malware detection data sharing system for improved detection
US11003773B1 (en)2018-03-302021-05-11Fireeye, Inc.System and method for automatically generating malware detection rule recommendations
US10956477B1 (en)2018-03-302021-03-23Fireeye, Inc.System and method for detecting malicious scripts through natural language processing modeling
US10838739B2 (en)2018-04-192020-11-17Circle Media Labs Inc.Network-connected computing devices and methods for executing operating programs in RAM memory
US10430352B1 (en)2018-05-182019-10-01Apple Inc.Methods and apparatus for reduced overhead data transfer with a shared ring buffer
US11314859B1 (en)2018-06-272022-04-26FireEye Security Holdings, Inc.Cyber-security system and method for detecting escalation of privileges within an access token
US11075930B1 (en)2018-06-272021-07-27Fireeye, Inc.System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11228491B1 (en)2018-06-282022-01-18Fireeye Security Holdings Us LlcSystem and method for distributed cluster configuration monitoring and management
US11316900B1 (en)2018-06-292022-04-26FireEye Security Holdings Inc.System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US10585699B2 (en)2018-07-302020-03-10Apple Inc.Methods and apparatus for verifying completion of groups of data transactions between processors
TWI678904B (en)*2018-08-272019-12-01宏碁股份有限公司E-mail checking method and email checking system
US11151248B1 (en)*2018-09-112021-10-19NuRD LLCIncreasing zero-day malware detection throughput on files attached to emails
US11182473B1 (en)2018-09-132021-11-23Fireeye Security Holdings Us LlcSystem and method for mitigating cyberattacks against processor operability by a guest process
US11763004B1 (en)2018-09-272023-09-19Fireeye Security Holdings Us LlcSystem and method for bootkit detection
CN109409032A (en)*2018-10-242019-03-01山东超越数控电子股份有限公司A kind of system kernel analysis method of Safety-Critical System
CN111104149A (en)*2018-10-252020-05-05华为技术有限公司 A firmware upgrade method, device and terminal
CN109558357B (en)*2018-10-312020-10-30许继集团有限公司 A method for collecting and controlling signals and main CPU plug-in and sub-plug-in
US11277495B2 (en)*2018-12-102022-03-15Electronics And Telecommunications Research InstituteSystem and method for providing microservice-based device control interface
US11368475B1 (en)2018-12-212022-06-21Fireeye Security Holdings Us LlcSystem and method for scanning remote services to locate stored objects with malware
US12074887B1 (en)2018-12-212024-08-27Musarubra Us LlcSystem and method for selectively processing content after identification and removal of malicious content
CN109933353B (en)*2019-03-222022-04-12陕西建工安装集团(河南)有限公司Embedded Web-based controller firmware upgrading method
US11258806B1 (en)2019-06-242022-02-22Mandiant, Inc.System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en)2019-06-272023-01-17Mandiant, Inc.Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en)2019-06-282022-07-19Fireeye Security Holdings Us LlcSystem and method for supporting cross-platform data verification
CN110460462A (en)*2019-07-242019-11-15中国移动通信集团黑龙江有限公司 Dual network router control system and dual network router
US11295020B2 (en)2019-08-052022-04-05Bank Of America CorporationSystem for integrated natural language processing and event analysis for threat detection in computing systems
US11886585B1 (en)2019-09-272024-01-30Musarubra Us LlcSystem and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en)2019-09-302023-04-25Mandiant, Inc.System and method for surfacing cyber-security threats with a self-learning recommendation engine
US12032948B2 (en)*2020-01-242024-07-09Insyde Software Corp.System and method for runtime capsule firmware update with low-latency software SMIs
US11625186B2 (en)*2020-07-162023-04-11Blancco Technology Group IP OyData erasure of network devices
US11379212B2 (en)*2020-08-312022-07-05Microsoft Technology Licensing, LlcSystems and methods for disaggregating system firmware configuration data into a management subsystem for seamless updates
US11888895B2 (en)*2020-09-022024-01-30Proofpoint, Inc.Using neural networks to process forensics and generate threat intelligence information
CN115576576A (en)*2021-06-212023-01-06广州视源电子科技股份有限公司 Firmware upgrade method, server and terminal equipment
CN113391836B (en)*2021-07-142022-11-18威海新北洋技术服务有限公司Firmware program upgrading method and device and electronic equipment
US12124841B2 (en)*2021-11-112024-10-22Carrier CorporationLive firmware and configuration updates of multi-node alarm systems
CN114513368B (en)*2022-03-292023-10-27广州长嘉电子有限公司Online software upgrading method, device and system for intelligent sound box
US12079619B2 (en)2022-07-272024-09-03T-Mobile Usa, Inc.Firmware-over-the-air (FOTA) update for wireless devices in an internet of things (IoT) network
CN116339776B (en)*2023-03-132025-09-26福建星云电子股份有限公司 A charging pile upgrade method that dynamically adapts to program size
TWI878036B (en)*2024-02-292025-03-21大陸商星宸科技股份有限公司Method for upgrading program and program upgrading device

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130347103A1 (en)*2012-06-212013-12-26Mark VeteikisPacket capture for error tracking
US20130346814A1 (en)*2012-06-212013-12-26Timothy ZadigianJtag-based programming and debug

Family Cites Families (45)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7809138B2 (en)1999-03-162010-10-05Intertrust Technologies CorporationMethods and apparatus for persistent control and protection of content
US6854007B1 (en)*1998-09-172005-02-08Micron Technology, Inc.Method and system for enhancing reliability of communication with electronic messages
US6321267B1 (en)1999-11-232001-11-20Escom CorporationMethod and apparatus for filtering junk email
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US20020007453A1 (en)*2000-05-232002-01-17Nemovicher C. KerrySecured electronic mail system and method
US6785732B1 (en)*2000-09-112004-08-31International Business Machines CorporationWeb server apparatus and method for virus checking
US7055148B2 (en)2000-12-072006-05-30Hewlett-Packard Development Company, L.P.System and method for updating firmware
US7069334B2 (en)2000-12-272006-06-27Intel CorporationImage restoration and reconfiguration support for crashed devices
JP2002244874A (en)2001-02-152002-08-30Toshiba Corp Information processing apparatus and firmware update method
US6941466B2 (en)*2001-02-222005-09-06International Business Machines CorporationMethod and apparatus for providing automatic e-mail filtering based on message semantics, sender's e-mail ID, and user's identity
CA2357382A1 (en)2001-09-172003-03-17Soma Networks, Inc.Software update method, apparatus and system
US7299463B2 (en)2001-09-282007-11-20Intel CorporationMethod for atomically updating a plurality of files
US7243347B2 (en)2002-06-212007-07-10International Business Machines CorporationMethod and system for maintaining firmware versions in a data processing system
US20040083469A1 (en)2002-10-232004-04-29Ping-Sheng ChenMethod for updating firmware of optical disk system
US7928310B2 (en)2002-11-122011-04-19MediaLab Solutions Inc.Systems and methods for portable audio synthesis
US20060168006A1 (en)*2003-03-242006-07-27Mr. Marvin ShannonSystem and method for the classification of electronic communication
US20050021968A1 (en)2003-06-252005-01-27Zimmer Vincent J.Method for performing a trusted firmware/bios update
EP1639435A4 (en)2003-06-272009-12-30Hewlett Packard Development CoSystem and method for downloading update packages into a mobile handset in a carrier network
US7027463B2 (en)2003-07-112006-04-11Sonolink Communications Systems, LlcSystem and method for multi-tiered rule filtering
US20050021637A1 (en)*2003-07-222005-01-27Red Hat, Inc.Electronic mail control system
US20050027807A1 (en)2003-07-302005-02-03Lynda FenglerSystems and methods for facilitating peripheral device firmware installation
US6986049B2 (en)*2003-08-262006-01-10Yahoo! Inc.Method and system for authenticating a message sender using domain keys
TWI256587B (en)2003-10-312006-06-11Asustek Comp IncFirmware upgrading method and system executing same
US20050198173A1 (en)2004-01-022005-09-08Evans Alexander W.System and method for controlling receipt of electronic messages
US20050198160A1 (en)2004-03-032005-09-08Marvin ShannonSystem and Method for Finding and Using Styles in Electronic Communications
US7870608B2 (en)2004-05-022011-01-11Markmonitor, Inc.Early detection and monitoring of online fraud
US7529802B2 (en)*2004-06-162009-05-05International Business Machines CorporationMethod for performing multiple hierarchically tests to verify identity of sender of an email message and assigning the highest confidence value
US20060004896A1 (en)*2004-06-162006-01-05International Business Machines CorporationManaging unwanted/unsolicited e-mail protection using sender identity
US20050283519A1 (en)2004-06-172005-12-22Commtouch Software, Ltd.Methods and systems for combating spam
US7364087B2 (en)2004-06-242008-04-29Intel CorporationVirtual firmware smart card
US7694135B2 (en)*2004-07-162010-04-06Geotrust, Inc.Security systems and services to provide identity and uniform resource identifier verification
US7398348B2 (en)2004-08-242008-07-08Sandisk 3D LlcMethod and apparatus for using a one-time or few-time programmable memory with a host device designed for erasable/rewritable memory
US20060047766A1 (en)*2004-08-302006-03-02Squareanswer, Inc.Controlling transmission of email
US20060069732A1 (en)2004-09-072006-03-30Marvin ShannonSystems and Methods to Rank Electronic Messages and Detect Spammer Probe Accounts
US7422115B2 (en)*2004-09-072008-09-09Iconix, Inc.Techniques for to defeat phishing
US7413085B2 (en)*2004-09-072008-08-19Iconix, Inc.Techniques for displaying emails listed in an email inbox
US7376870B2 (en)2004-09-302008-05-20Intel CorporationSelf-monitoring and updating of firmware over a network
US7770003B2 (en)2004-12-292010-08-03Intel CorporationUpdating firmware securely over a network
CA2600344A1 (en)*2005-03-022006-09-08Markmonitor Inc.Distribution of trust data
JP4669348B2 (en)*2005-05-112011-04-13株式会社エヌ・ティ・ティ・ドコモ Spam mail discrimination device and spam mail discrimination method
US7926108B2 (en)*2005-11-232011-04-12Trend Micro IncorporatedSMTP network security processing in a transparent relay in a computer network
US20060184635A1 (en)*2006-05-182006-08-17The Go Daddy Group, Inc.Electronic mail method using email tickler
US20070271342A1 (en)*2006-05-192007-11-22Sbc Knowledge Ventures, L.P.Methods and systems to deliver electronic mail using payments
US20070274230A1 (en)2006-05-232007-11-29Werber Ryan ASystem and method for modifying router firmware
US7797421B1 (en)*2006-12-152010-09-14Amazon Technologies, Inc.Method and system for determining and notifying users of undesirable network content

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130347103A1 (en)*2012-06-212013-12-26Mark VeteikisPacket capture for error tracking
US20130346814A1 (en)*2012-06-212013-12-26Timothy ZadigianJtag-based programming and debug

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170277529A1 (en)*2016-03-242017-09-28Nec CorporationFirmware distribution system, distribution apparatus, firmware distribution method and program recording medium
US10528338B2 (en)*2016-03-242020-01-07Nec CorporationFirmware distribution system, distribution apparatus, firmware distribution method and program recording medium
CN108540344A (en)*2018-03-292018-09-14四川斐讯信息技术有限公司A kind of router upgrade test method and system
CN109669708A (en)*2018-11-022019-04-23金卡智能集团股份有限公司Remote upgrade method for modularization internet-of-things terminal equipment
EP4365732A1 (en)*2022-11-072024-05-08Samsung Electronics Co., Ltd.Efficient firmware download operation in storage devices
US12353865B2 (en)2022-11-072025-07-08Samsung Electronics Co., Ltd.Efficient firmware download operation in storage devices

Also Published As

Publication numberPublication date
US20140052976A1 (en)2014-02-20
US20200159521A1 (en)2020-05-21
US8326936B2 (en)2012-12-04
US20210216304A1 (en)2021-07-15
US20180232226A1 (en)2018-08-16
US9558353B2 (en)2017-01-31
US20230140329A1 (en)2023-05-04
US7904518B2 (en)2011-03-08
US20060184632A1 (en)2006-08-17
US20190250905A1 (en)2019-08-15
US20110119343A1 (en)2011-05-19

Similar Documents

PublicationPublication DateTitle
US20230140329A1 (en)Wireless router remote firmware upgrade
US8402109B2 (en)Wireless router remote firmware upgrade
JP5396051B2 (en) Method and system for creating and updating a database of authorized files and trusted domains
Parampalli et al.A practical mimicry attack against powerful system-call monitors
US9038174B2 (en)Resisting the spread of unwanted code and data
JP5970141B2 (en) Method, boot loader, user trusted device, and system for executing software modules on a computer
RogersNessus network auditing
SainiSquid Proxy Server 3.1: beginner's guide
US20110289556A1 (en)Method and Apparatus for Serving Content Elements of a Markup Language Document Protected Against Cross-Site Scripting Attack
CN111030963B (en)Document tracking method, gateway equipment and server
JP2011525003A (en) Secure application streaming
ApvrilleSymbian worm Yxes: Towards mobile botnets?
WO2019184664A1 (en)Method, apparatus, and system for detecting malicious file
JP3630087B2 (en) Automatic data processor
Liu et al.Security analysis of vendor customized code in firmware of embedded device
OlegårdSecurity & Forensic Analysis of an Internet of Things Smart Home Ecosystem
Borg et al.IoT Pentesting: Obtaining the firmware of a smart lock
AvaznejadDisk encryption on Talos operating system
De DeckerA comparative study on the security of network-connected devices
BärschneiderForensic investigation artifacts on BSD
PorterDetecting Malicious Behavior in OpenWrt with QEMU Tracing
für die Master-Prüfung et al.Exploiting Network Printers
BakerInstalling and Configuring Services
KR101124634B1 (en)integrated management system of network based on embedded operating gateway
EdgecombeDetection of SSL-related security vulnerabilities in Android applications Computer Science Tripos, Part II Pembroke College

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:GYTHEION NETWORKS LLC, DELAWARE

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OGILVIE, JOHN;REEL/FRAME:042620/0357

Effective date:20170528

ASAssignment

Owner name:GYTHEION NETWORKS LLC, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MARINO, JOSEPH P;FORTIN, JONATHAN;REEL/FRAME:043027/0208

Effective date:20120814

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:MARINO, JOSEPH P, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GYTHEION NETWORKS LLC;REEL/FRAME:045882/0175

Effective date:20180428

ASAssignment

Owner name:MARINO, JOSEPH P, NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE INCORRECT APPL. NO. 12/074,717 PREVIOUSLY RECORDED AT REEL: 045882 FRAME: 0175. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:GYTHEION NETWORKS LLC;REEL/FRAME:046356/0658

Effective date:20180428

ASAssignment

Owner name:GYTHEION NETWORKS LLC, WYOMING

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARINO, JOSEPH P;REEL/FRAME:046372/0821

Effective date:20180612

ASAssignment

Owner name:BLACKBIRD TECH LLC, MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GYTHEION NETWORKS LLC;REEL/FRAME:046712/0767

Effective date:20180820

ASAssignment

Owner name:GYTHEION NETWORKS, LLC, WYOMING

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBIRD TECH LLC;REEL/FRAME:068890/0921

Effective date:20241003

ASAssignment

Owner name:GYTHEION NETWORKS, LLC, WYOMING

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA PREVIOUSLY RECORDED ON REEL 68890 FRAME 921. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:SARTORI, ELISA;REEL/FRAME:069333/0659

Effective date:20241003


[8]ページ先頭

©2009-2025 Movatter.jp