-
1.
公开(公告)号:US20180077188A1
公开(公告)日:2018-03-15
申请号:US15262918
申请日:2016-09-12
Applicant: QUALCOMM Incorporated
Inventor: Giridhar Mandyam , Sudha Anil Kumar Gathala , Saumitra Mohan Das , Nayeem Islam , Dallas James Wiener , Hugo Romero , Harold Gilkey
IPC: H04L29/06
CPC classification number: H04L63/1433 , G06F21/56 , H04L67/42
Abstract: Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from a third-party server (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate one or more threat scores and send the one or more threat scores to the client computing device for use in devising a customized security response.
-
公开(公告)号:US12003656B2
公开(公告)日:2024-06-04
申请号:US17666309
申请日:2022-02-07
Applicant: QUALCOMM INCORPORATED
CPC classification number: H04L9/3278 , G06F1/206 , G06F9/30036
Abstract: Systems, methods and computer-readable mediums may use intrinsic behavior of an integrated circuit (IC) chip to generate Physically Unclonable Function (PUF) vector bits. A processor of the system may be configured to receive a plurality of temperature values corresponding to a plurality of respective temperature measurement values obtained by a plurality of respective temperature sensors disposed on the IC chip. The processor may be further configured to process the temperature measurement values to generate PUF vector bits that can be used to generate a security key.
-
公开(公告)号:US10333965B2
公开(公告)日:2019-06-25
申请号:US15262858
申请日:2016-09-12
Applicant: QUALCOMM Incorporated
Inventor: Sudha Anil Kumar Gathala , Saumitra Mohan Das , Nayeem Islam , Dallas James Wiener , Hugo Romero , Harold Gilkey , Giridhar Mandyam
Abstract: Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from third-party servers (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate threat scores (e.g., one for each pass, etc.), and the threat scores to the client computing device for use in devising a customized security response.
-
公开(公告)号:US20180091553A1
公开(公告)日:2018-03-29
申请号:US15274025
申请日:2016-09-23
Applicant: QUALCOMM Incorporated
Inventor: Giridhar Mandyam , Dallas James Wiener
CPC classification number: H04L63/1408 , H04L63/1433 , H04W12/12
Abstract: Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling dynamically modifying the polling frequency of endpoint devices within an endpoint protection system. Various embodiments may include determining, by an endpoint device of a network environment, whether communication device endpoint protection is active on the endpoint device. That is, the endpoint device may check to ensure that anomaly detection software, device health monitors, or other malware detection is in active operation. The endpoint device may adjust, modify, or alter the frequency with which it transmits polling messages to a network server based, at least in part, on a result of the determination as to whether communication device endpoint protection is active. For example, if the endpoint device determines that communication device endpoint protection is active, the endpoint device may reduce the polling frequency.
-
5.
公开(公告)号:US20180077195A1
公开(公告)日:2018-03-15
申请号:US15262858
申请日:2016-09-12
Applicant: QUALCOMM Incorporated
Inventor: Sudha Anil Kumar Gathala , Saumitra Mohan Das , Nayeem Islam , Dallas James Wiener , Hugo Romero , Harold Gilkey , Giridhar Mandyam
IPC: H04L29/06
CPC classification number: H04L63/1441 , G06F21/53 , G06F21/577 , G06F2221/2115 , G06F2221/2139 , H04L63/1433 , H04L63/20 , H04W12/1208
Abstract: Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from third-party servers (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate threat scores (e.g., one for each pass, etc.), and the threat scores to the client computing device for use in devising a customized security response.
-
-
-
-