Methods and Systems of Using Application-Specific and Application-Type-Specific Models for the Efficient Classification of Mobile Device Behaviors
    2.
    发明申请
    Methods and Systems of Using Application-Specific and Application-Type-Specific Models for the Efficient Classification of Mobile Device Behaviors 有权
    使用特定应用程序和应用程序类型的模型进行移动设备行为的有效分类的方法和系统

    公开(公告)号:US20150161386A1

    公开(公告)日:2015-06-11

    申请号:US14259501

    申请日:2014-04-23

    Abstract: Methods, and mobile devices implementing the methods, use application-specific and/or application-type specific classifier to improve the efficiency and performance of a comprehensive behavioral monitoring and analysis system predicting whether a software application is causing undesirable or performance depredating behavior. The application-specific and application-type specific classifier models may include a reduced and more focused subset of the decision nodes that are included in a full or more complete classifier model that may be received or generated in the mobile device. The locally generated application-specific and/or application-type specific classifier models may be used to perform real-time behavior monitoring and analysis operations by applying the application-based classifier models to a behavior/feature vector generated by monitoring mobile device behavior. The various aspects focus monitoring and analysis operations on a small number of features that are most important for determining whether operations of a software application are contributing to undesirable or performance depredating behavior.

    Abstract translation: 实现这些方法的方法和移动设备使用特定应用程序和/或应用程序类型的分类器来提高综合行为监视和分析系统的效率和性能,以预测软件应用程序是否导致不良或性能下降的行为。 特定于应用程序和应用程序类型的分类器模型可以包括被包括在可以在移动设备中接收或生成的完整或更完整的分类器模型中的决策节点的简化和更集中的子集。 本地生成的特定应用程序和/或应用程序类型的分类器模型可用于通过将基于应用程序的分类器模型应用于通过监视移动设备行为生成的行为/特征向量来执行实时行为监视和分析操作。 各个方面将监视和分析操作集中在对确定软件应用程序的操作是否导致不良或性能下降行为最为重要的少量功能上。

    Method and device for secure phone banking
    3.
    发明申请
    Method and device for secure phone banking 审中-公开
    用于安全电话银行的方法和设备

    公开(公告)号:US20140016780A1

    公开(公告)日:2014-01-16

    申请号:US14025533

    申请日:2013-09-12

    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.

    Abstract translation: 提供了一种小型的安全设备,其可以与电话线串联插入以从电话加密双音多频(DTMF)音,以防止未经授权的泄露敏感信息。 接收设备解密加密的DTMF音,以接收由电话发送的原始信息。 安全设备作为双重身份认证方案的第二个因素,与认证安全设备的远程服务安全服务器。

    Small public-key based digital signatures for authentication

    公开(公告)号:US20130227297A1

    公开(公告)日:2013-08-29

    申请号:US13859646

    申请日:2013-04-09

    CPC classification number: H04L9/3247 H04L9/3013 H04L2209/20

    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.

    METHODS AND SYSTEMS FOR IDENTIFYING MALWARE THROUGH DIFFERENCES IN CLOUD VS. CLIENT BEHAVIOR
    6.
    发明申请
    METHODS AND SYSTEMS FOR IDENTIFYING MALWARE THROUGH DIFFERENCES IN CLOUD VS. CLIENT BEHAVIOR 有权
    通过云中差异识别恶意软件的方法和系统 客户行为

    公开(公告)号:US20160285897A1

    公开(公告)日:2016-09-29

    申请号:US14667461

    申请日:2015-03-24

    Abstract: A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is benign or non-benign. This may be accomplished via the server performing static and/or dynamic analysis operations, generating a behavior information structure that describes or characterizes the range of correct or expected behaviors of the software application, and sending the behavior information structure to a computing device. The computing device may compare the received behavior information structure to a locally generated behavior information structure to determining whether the observed behavior of the software application differs or deviates from the expected behavior of the software application or whether the observed behavior is within the range of expected behaviors. The computing device may increase its level of security/scrutiny when the behavior information structure does not match the local behavior information structure.

    Abstract translation: 计算设备可以被配置为与另一组件(例如,服务器)结合工作,以更好地确定软件应用是良性还是非良性。 这可以通过执行静态和/或动态分析操作的服务器来实现,生成描述或表征软件应用的正确或预期行为的范围的行为信息结构,以及将行为信息结构发送到计算设备。 计算设备可以将接收到的行为信息结构与本地生成的行为信息结构进行比较,以确定所观察到的软件应用的行为是否不同或偏离了软件应用的预期行为,或观察到的行为是否在预期行为的范围内 。 当行为信息结构与本地行为信息结构不匹配时,计算设备可能会提高其安全性/审查级别。

    Binding microprocessor to memory chips to prevent re-use of microprocessor
    7.
    发明申请
    Binding microprocessor to memory chips to prevent re-use of microprocessor 审中-公开
    将微处理器绑定到内存芯片,以防止微处理器重复使用

    公开(公告)号:US20140101368A1

    公开(公告)日:2014-04-10

    申请号:US13644816

    申请日:2012-10-04

    CPC classification number: G06F21/73 G06F21/44 G11C7/20

    Abstract: A processor is provided that binds itself to a circuit such that the processor cannot be subsequently reused in other circuits. On a first startup of the processor, a memory segment of an external volatile memory device is read to obtain information prior to initialization of the memory segment. An original/initial identifier may be generated from the information read from the memory segment. The original/initial identifier may then be stored in a non-volatile storage of the processor. On subsequent startups of the processor, it verifies that the processor is still coupled to the same external volatile memory device by using the stored identifier. For instance, on a subsequent startup, the processor again reads the same memory segment of the external memory device and generates a new identifier. If the identifier matches the previously stored identifier, then the processor may continue its operations; otherwise the processor is disabled/halted.

    Abstract translation: 提供了一种处理器,其将其自身绑定到电路,使得处理器不能随后在其他电路中重复使用。 在处理器的第一启动时,读取外部易失性存储器件的存储器段,以在存储器段的初始化之前获得信息。 可以从从存储器段读取的信息生成原始/初始标识符。 原始/初始标识符然后可以存储在处理器的非易失性存储器中。 在处理器的后续启动时,它通过使用存储的标识来验证处理器仍然耦合到相同的外部易失性存储器设备。 例如,在随后的启动中,处理器再次读取外部存储器件的相同存储器段并产生新的标识符。 如果标识符与先前存储的标识符匹配,则处理器可以继续其操作; 否则处理器被禁用/停止。

    Method and apparatus for determining and utilizing value of digital assets
    8.
    发明申请
    Method and apparatus for determining and utilizing value of digital assets 审中-公开
    确定和利用数字资产价值的方法和装置

    公开(公告)号:US20140032424A1

    公开(公告)日:2014-01-30

    申请号:US14040232

    申请日:2013-09-27

    CPC classification number: G06Q30/0278 G06Q40/00 G06Q40/08

    Abstract: Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison.

    Abstract translation: 本文描述了用于保护与计算设备相关联的数字资产的系统和方法。 根据本公开的方法的示例包括向与设备相关联的相应数字资产分配至少一个资产价值,使用分配给与该设备相关联的数字资产的至少一个资产值计算至少一个设备价值 ,识别至少一个设备价值阈值,执行所述至少一个设备价值与所述至少一个价值阈值的比较,以及基于所述比较来启动相对于与所述设备相关联的数字资产的至少一个动作 。

    DYNAMICALLY GENERATED CODE PROCESS SANDBOXING USING AUTHENTICATED POINTERS

    公开(公告)号:US20190102540A1

    公开(公告)日:2019-04-04

    申请号:US16142611

    申请日:2018-09-26

    Abstract: A method is provided for safely executing dynamically generated code to avoid the possibility of an attack in unprotected memory space. Upon ascertaining that dynamically generated code is to be executed, a processing circuit and/or operating system kernel restrict the dynamically generated code to use a first memory region within an unprotected memory space, where the first memory region is distinct (e.g., reserved) from other memory regions used by other processes executed by the processing circuit. A first processing stack is maintained for the dynamically generated code within the first memory region. This first processing stack is separate from a general processing stack used by other processes executed by the processing circuit. A stack pointer is switched/pointed to the first processing stack when the dynamically generated code is executed and the stack pointer is switched/pointed to the general processing stack when the dynamically generated code ends.

Patent Agency Ranking