Processing

Please wait...

Settings

Settings

Goto Application

1. WO2014120409 - LOCATION BASED PROCESS-MONITORING

Publication Number WO/2014/120409
Publication Date 07.08.2014
International Application No. PCT/US2014/010947
International Filing Date 10.01.2014
Chapter 2 Demand Filed 23.06.2014
IPC
G06F 21/50 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
H04M 1/725 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
MTELEPHONIC COMMUNICATION
1Substation equipment, e.g. for use by subscribers
72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
725Cordless telephones
CPC
G06F 21/52
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity ; ; Preventing unwanted data erasure; Buffer overflow
G06F 21/552
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
552involving long-term monitoring or reporting
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
G06F 2221/034
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
034Test or assess a computer or a system
H04L 63/107
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
10for controlling access to network resources
107wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
H04L 63/1416
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
1416Event detection, e.g. attack signature detection
Applicants
  • QUALCOMM INCORPORATED [US]/[US]
Inventors
  • GUPTA, Rajarshi
  • DAS, Saumitra Mohan
  • NAGUIB, Ayman Fawzy
Agents
  • HUNTER CLARK PLLC
  • RABINOVITCH, Ido
Priority Data
13/757,26801.02.2013US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) LOCATION BASED PROCESS-MONITORING
(FR) SURVEILLANCE DE PROCESSUS BASÉE SUR LA LOCALISATION
Abstract
(EN) Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining location of a device, and controlling monitoring of behavior of one or more processes executing on the device based on the determined location of the device to identify potential one or more security-risky processes from the monitored one or more executing processes. In some embodiments, controlling the monitoring of the behavior of the one or more processes may include one or more of, for example, adjusting frequency of the monitoring of the one or more processes based on the determined location of the device, adjusting level of detail obtained for the monitored behavior of the one or more processes based on the determined location of the device, and/or adjusting features being observed for the monitored one or more processes based on the determined location of the device.
(FR) L'invention porte sur des systèmes, des appareils, des dispositifs, des procédés, des produits programmes d'ordinateur et d'autres mises en œuvre, y compris un procédé qui consiste à déterminer l'emplacement d'un dispositif et à commander la surveillance de comportement d'un ou plusieurs processus s'exécutant sur le dispositif sur la base de l'emplacement déterminé du dispositif afin d'identifier un ou plusieurs processus potentiels posant un risque de sécurité parmi le ou les processus surveillés en cours d'exécution. Selon certains modes de réalisation, la commande de la surveillance du comportement du ou des processus peut comprendre une ou plusieurs opérations parmi, par exemple, l'ajustement des fréquences de la surveillance du ou des processus sur la base de l'emplacement déterminé du dispositif, l'ajustement de niveau de détail obtenu pour le comportement surveillé du ou des processus sur la base de l'emplacement déterminé du dispositif, et l'ajustement de caractéristiques qui sont observées pour le ou les processus surveillés sur la base de l'emplacement déterminé du dispositif.
Latest bibliographic data on file with the International Bureau