BR112018015014A2 - sistema de segurança de computador com base em inteligência artificial - Google Patents
sistema de segurança de computador com base em inteligência artificialInfo
- Publication number
- BR112018015014A2 BR112018015014A2 BR112018015014A BR112018015014A BR112018015014A2 BR 112018015014 A2 BR112018015014 A2 BR 112018015014A2 BR 112018015014 A BR112018015014 A BR 112018015014A BR 112018015014 A BR112018015014 A BR 112018015014A BR 112018015014 A2 BR112018015014 A2 BR 112018015014A2
- Authority
- BR
- Brazil
- Prior art keywords
- artificial intelligence
- based computer
- security system
- computer security
- retribution
- Prior art date
Links
- 238000013473 artificial intelligence Methods 0.000 title abstract 3
- 241000270322 Lepidosauria Species 0.000 abstract 1
- 101100206458 Mus musculus Them4 gene Proteins 0.000 abstract 1
- 230000007123 defense Effects 0.000 abstract 1
- 238000000605 extraction Methods 0.000 abstract 1
- 230000008447 perception Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/31—Programming languages or programming paradigms
- G06F8/311—Functional or applicative languages; Rewrite languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/31—Programming languages or programming paradigms
- G06F8/313—Logic programming, e.g. PROLOG programming language
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Physics (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Debugging And Monitoring (AREA)
Abstract
"sistema de segurança de computador com base em inteligência artificial" sistema de segurança de computador com base em inteligência artificial inclui proteção e retribuição de infraestrutura crítica (cipr) por meio de segurança de informações em nuvem e faseada (ctis), inteligência clandestina de máquina (macint) & retribuição por meio de operações secretas no ciberespaço, defesa em tempo real a priori de base de dados zero deduzida logicamente (lizard),memória & percepção de pensamento crítico (ctmp), extração de objetividade léxica (lom), transferência de informações quânticas atômicas lineares (laqit) e sistema de conexões integrais de bchain universal (ubec) com harmonização de conexão de base afixando nós integrados.
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662286437P | 2016-01-24 | 2016-01-24 | |
US201662294258P | 2016-02-11 | 2016-02-11 | |
US201662307558P | 2016-03-13 | 2016-03-13 | |
US201662323657P | 2016-04-16 | 2016-04-16 | |
US201662326723P | 2016-04-23 | 2016-04-23 | |
US15/145,800 US20160330219A1 (en) | 2015-05-04 | 2016-05-04 | Method and device for managing security in a computer network |
US201662341310P | 2016-05-25 | 2016-05-25 | |
US15/264,744 US20170076391A1 (en) | 2015-09-14 | 2016-09-14 | System of perpetual giving |
US201662439409P | 2016-12-27 | 2016-12-27 | |
PCT/US2017/014699 WO2017127850A1 (en) | 2016-01-24 | 2017-01-24 | Computer security based on artificial intelligence |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112018015014A2 true BR112018015014A2 (pt) | 2018-12-18 |
Family
ID=59362181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112018015014A BR112018015014A2 (pt) | 2016-01-24 | 2017-01-24 | sistema de segurança de computador com base em inteligência artificial |
Country Status (14)
Country | Link |
---|---|
EP (1) | EP3405911A4 (pt) |
JP (2) | JP2019511030A (pt) |
KR (2) | KR20180105688A (pt) |
CN (2) | CN115062297A (pt) |
AU (3) | AU2017210132A1 (pt) |
BR (1) | BR112018015014A2 (pt) |
CA (1) | CA3051164A1 (pt) |
IL (3) | IL306075B2 (pt) |
MX (1) | MX2018009079A (pt) |
MY (1) | MY195524A (pt) |
RU (1) | RU2750554C2 (pt) |
SG (2) | SG11201806117TA (pt) |
WO (1) | WO2017127850A1 (pt) |
ZA (1) | ZA201805385B (pt) |
Families Citing this family (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11574287B2 (en) | 2017-10-10 | 2023-02-07 | Text IQ, Inc. | Automatic document classification |
US10646998B2 (en) | 2017-11-27 | 2020-05-12 | Intuition Robotics, Ltd. | System and method for optimizing resource usage of a robot |
US11232523B2 (en) | 2018-01-02 | 2022-01-25 | Patrick Schur | System and method for providing an intelligent operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant tags, i-bubble tags, demojis and demoticons |
US11157295B2 (en) | 2018-01-02 | 2021-10-26 | Patrick Schur | System and method for providing intelligent operant operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant+198 tags, i-bubble+198 tags, demojis+198 and demoticons+198 |
CA3093021A1 (en) * | 2018-03-05 | 2019-09-12 | EzoTech Inc. | Automated security testing system and method |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US20190377881A1 (en) | 2018-06-06 | 2019-12-12 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10785108B1 (en) | 2018-06-21 | 2020-09-22 | Wells Fargo Bank, N.A. | Intelligent learning and management of a networked architecture |
US11068464B2 (en) | 2018-06-26 | 2021-07-20 | At&T Intellectual Property I, L.P. | Cyber intelligence system and method |
US10868782B2 (en) | 2018-07-12 | 2020-12-15 | Bank Of America Corporation | System for flagging data transmissions for retention of metadata and triggering appropriate transmission placement |
WO2020016906A1 (en) * | 2018-07-16 | 2020-01-23 | Sriram Govindan | Method and system for intrusion detection in an enterprise |
US11601442B2 (en) | 2018-08-17 | 2023-03-07 | The Research Foundation For The State University Of New York | System and method associated with expedient detection and reconstruction of cyber events in a compact scenario representation using provenance tags and customizable policy |
CN109189751B (zh) * | 2018-09-18 | 2023-05-26 | 平安科技(深圳)有限公司 | 基于区块链的数据同步方法及终端设备 |
US11122136B2 (en) | 2018-10-22 | 2021-09-14 | Red Hat, Inc. | Quantum payload service for facilitating communications between a quantum computing system and classical computing systems |
US10740930B2 (en) | 2018-11-07 | 2020-08-11 | Love Good Color LLC | Systems and methods for color selection and auditing |
US11144334B2 (en) | 2018-12-20 | 2021-10-12 | Red Hat, Inc. | Quantum computer task manager |
KR102167767B1 (ko) * | 2018-12-26 | 2020-10-19 | 단국대학교 산학협력단 | 머신러닝의 학습 데이터셋 생성을 위한 애플리케이션 자동화 빌드 장치 및 방법 |
EP3693873B1 (en) * | 2019-02-07 | 2022-02-16 | AO Kaspersky Lab | Systems and methods for configuring a gateway for protection of automated systems |
WO2020167586A1 (en) * | 2019-02-11 | 2020-08-20 | Db Cybertech, Inc. | Automated data discovery for cybersecurity |
FR3094600B1 (fr) * | 2019-03-29 | 2022-05-06 | Orange | Procédé d’extraction d’au moins un motif de communication dans un réseau de communication |
US11546366B2 (en) | 2019-05-08 | 2023-01-03 | International Business Machines Corporation | Threat information sharing based on blockchain |
CN111913892B (zh) * | 2019-05-09 | 2021-12-07 | 北京忆芯科技有限公司 | 使用cmb提供开放通道存储设备 |
US11309974B2 (en) | 2019-05-09 | 2022-04-19 | Red Hat, Inc. | Quantum channel routing utilizing a quantum channel measurement service |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
US12155646B2 (en) | 2019-06-10 | 2024-11-26 | Microsoft Technology Licensing, Llc | Authentication with random noise symbols and pattern recognition |
CN110187885B (zh) * | 2019-06-10 | 2023-03-31 | 合肥本源量子计算科技有限责任公司 | 一种量子程序编译的中间代码生成方法及装置 |
CN111027623A (zh) * | 2019-12-10 | 2020-04-17 | 深圳供电局有限公司 | 数据增强的智能终端安全等级分类方法及系统 |
KR102299145B1 (ko) * | 2020-02-25 | 2021-09-07 | 서울과학기술대학교 산학협력단 | 디지털 포렌식 증거 수집을 위한 사이버 물리 시스템 |
KR20210115728A (ko) * | 2020-03-16 | 2021-09-27 | 삼성전자주식회사 | 전자 장치 및 이의 제어 방법 |
CN111460129B (zh) * | 2020-03-27 | 2023-08-22 | 泰康保险集团股份有限公司 | 标识生成的方法、装置、电子设备和存储介质 |
KR102164203B1 (ko) * | 2020-04-03 | 2020-10-13 | 주식회사 이지시큐 | 정보보호 위험분석 자동화 시스템 및 그 동작 방법 |
CN111659124B (zh) * | 2020-05-27 | 2023-05-02 | 太原理工大学 | 一种用于对弈的智能鉴别系统 |
WO2021243321A1 (en) * | 2020-05-29 | 2021-12-02 | Qomplx, Inc. | A system and methods for score cybersecurity |
CN111651756B (zh) * | 2020-06-04 | 2022-05-31 | 成都安恒信息技术有限公司 | 一种应用于运维审计navicat的自动代填方法 |
CN112035797A (zh) * | 2020-08-31 | 2020-12-04 | 山东诺蓝信息科技有限公司 | 一种基于自主学习的功率状态判决算法 |
KR102233698B1 (ko) * | 2020-09-29 | 2021-03-30 | 주식회사 이지시큐 | 기밀성, 무결성, 가용성에 기반하여 정보보호 관련 위험등급을 설정하는 방법 및 그 시스템 |
KR102233694B1 (ko) * | 2020-09-29 | 2021-03-30 | 주식회사 이지시큐 | 비용절감 및 효과적인 인증관리를 제공하는 정보보호 시스템 |
KR102233695B1 (ko) * | 2020-09-29 | 2021-03-30 | 주식회사 이지시큐 | 정보보호 위험분석을 수행하는 정보통신 시스템 |
KR102232883B1 (ko) * | 2020-09-29 | 2021-03-26 | 주식회사 이지시큐 | 정보보호 관리체계 인증을 위한 인공지능 시스템 |
US11606694B2 (en) | 2020-10-08 | 2023-03-14 | Surendra Goel | System that provides cybersecurity in a home or office by interacting with internet of things devices and other devices |
KR102280845B1 (ko) | 2020-11-24 | 2021-07-22 | 한국인터넷진흥원 | 네트워크 내의 비정상 행위 탐지 방법 및 그 장치 |
US12081579B2 (en) * | 2020-12-15 | 2024-09-03 | Mastercard Technologies Canada ULC | Enterprise server and method with universal bypass mechanism for automatically testing real-time computer security services |
CN114745291A (zh) * | 2020-12-23 | 2022-07-12 | 北京国双科技有限公司 | 一种异常数据上云方法、装置、电子设备及存储介质 |
CN114765627B (zh) * | 2021-01-14 | 2024-09-20 | 京东科技控股股份有限公司 | 数据传输方法、设备、存储介质及计算机程序产品 |
US12003542B2 (en) | 2021-01-14 | 2024-06-04 | International Business Machines Corporation | Rapid initial deployment database security model |
US20240070276A1 (en) * | 2021-02-08 | 2024-02-29 | Hewlett-Packard Development Company, L.P. | Malware scans |
CN112783661B (zh) * | 2021-02-08 | 2022-08-12 | 上海交通大学 | 一种适用于容器环境下的内存重删方法及装置 |
CN112819590B (zh) * | 2021-02-25 | 2023-03-10 | 紫光云技术有限公司 | 一种云产品服务交付过程中产品配置信息管理的方法 |
CN113395593B (zh) * | 2021-08-17 | 2021-10-29 | 深圳佳力拓科技有限公司 | 减少信息泄漏的数字电视终端的数据发送方法和装置 |
CN113961518B (zh) * | 2021-09-08 | 2022-09-23 | 北京百度网讯科技有限公司 | 日志的可视化展示方法、装置、电子设备及存储介质 |
US12052274B2 (en) | 2021-09-23 | 2024-07-30 | Armis Security Ltd. | Techniques for enriching device profiles and mitigating cybersecurity threats using enriched device profiles |
CN113986589B (zh) * | 2021-10-09 | 2024-12-20 | 广州博依特智能信息科技有限公司 | 智能边缘计算网闸的容错策略选择方法及系统 |
WO2023097026A2 (en) * | 2021-11-23 | 2023-06-01 | Strong Force TX Portfolio 2018, LLC | Transaction platforms where systems include sets of other systems |
CN114722400B (zh) * | 2022-03-18 | 2024-12-20 | 西安电子科技大学 | 一种侧信道漏洞检测的方法、系统、介质、设备及终端 |
JP2023169666A (ja) | 2022-05-17 | 2023-11-30 | 日本電気株式会社 | 連携システム、連携方法、およびプログラム |
KR102509102B1 (ko) * | 2022-07-15 | 2023-03-09 | 신헌주 | 인공지능을 이용한 육성 시스템 |
CN115203689B (zh) * | 2022-07-25 | 2023-05-02 | 广州正则纬创信息科技有限公司 | 一种数据安全分享方法及系统 |
CN115987176B (zh) * | 2023-02-01 | 2023-09-12 | 北京东土科技股份有限公司 | 对电机位置进行回零控制的方法、装置和边缘控制器 |
US20240289463A1 (en) * | 2023-02-28 | 2024-08-29 | International Business Machines Corporation | Modification of vulnerable pods |
US12052140B1 (en) * | 2023-04-21 | 2024-07-30 | Capital One Services, Llc | Compliance for cloud-based applications and computer systems using machine learning |
CN116522895B (zh) * | 2023-06-16 | 2023-09-12 | 中国传媒大学 | 一种基于写作风格的文本内容真实性评估方法及设备 |
CN117150551B (zh) * | 2023-09-04 | 2024-02-27 | 东方魂数字科技(北京)有限公司 | 基于大数据的用户隐私保护方法和系统 |
CN117540038B (zh) * | 2024-01-10 | 2024-03-22 | 中国信息通信研究院 | 智能检测虚假数据合成方法和系统 |
CN118643518B (zh) * | 2024-08-09 | 2024-11-08 | 水发(北京)建设有限公司 | 工业园区污水近零排放的水资源优化配置系统及方法 |
CN118941063B (zh) * | 2024-10-15 | 2025-01-21 | 电子科技大学 | 一种基于双三角演化机制的项目资源协同筹划方法 |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1245572A (zh) * | 1997-10-30 | 2000-02-23 | 全昌龙 | 计算机安全部件 |
US20020165947A1 (en) * | 2000-09-25 | 2002-11-07 | Crossbeam Systems, Inc. | Network application apparatus |
US9064115B2 (en) * | 2006-04-06 | 2015-06-23 | Pulse Secure, Llc | Malware detection system and method for limited access mobile platforms |
US7991724B2 (en) * | 2006-12-21 | 2011-08-02 | Support Machines Ltd. | Method and a computer program product for providing a response to a statement of a user |
JP2008234409A (ja) * | 2007-03-22 | 2008-10-02 | Toshiba Corp | セキュリティ脅威分析支援システムおよびその方法、ならびにセキュリティ脅威分析支援プログラム |
US9489647B2 (en) * | 2008-06-19 | 2016-11-08 | Csc Agility Platform, Inc. | System and method for a cloud computing abstraction with self-service portal for publishing resources |
US8353033B1 (en) * | 2008-07-02 | 2013-01-08 | Symantec Corporation | Collecting malware samples via unauthorized download protection |
JP5219783B2 (ja) * | 2008-12-24 | 2013-06-26 | 三菱電機株式会社 | 不正アクセス検知装置及び不正アクセス検知プログラム及び記録媒体及び不正アクセス検知方法 |
US8516594B2 (en) * | 2009-04-24 | 2013-08-20 | Jeff Bennett | Enterprise information security management software for prediction modeling with interactive graphs |
US20120123829A1 (en) * | 2009-07-30 | 2012-05-17 | CENX, Inc. | Independent carrier ethernet interconnection platform |
US10019677B2 (en) * | 2009-11-20 | 2018-07-10 | Alert Enterprise, Inc. | Active policy enforcement |
US8806568B2 (en) * | 2011-07-11 | 2014-08-12 | International Business Machines Corporation | Automatic generation of user account policies based on configuration management database information |
US9386030B2 (en) * | 2012-09-18 | 2016-07-05 | Vencore Labs, Inc. | System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks |
US10096316B2 (en) * | 2013-11-27 | 2018-10-09 | Sri International | Sharing intents to provide virtual assistance in a multi-person dialog |
EP2725728B1 (en) * | 2012-10-29 | 2018-08-15 | ADVA Optical Networking SE | Method and device for assessing the performance of one or more packet synchronization services in a packet data transmission network |
JP6086423B2 (ja) * | 2012-11-14 | 2017-03-01 | 国立研究開発法人情報通信研究機構 | 複数センサの観測情報の突合による不正通信検知方法 |
CA2895522A1 (en) * | 2012-12-21 | 2014-06-26 | Seccuris Inc. | System and method for monitoring data in a client environment |
RU2522019C1 (ru) * | 2012-12-25 | 2014-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ обнаружения угроз в коде, исполняемом виртуальной машиной |
US9406143B2 (en) * | 2013-02-21 | 2016-08-02 | Samsung Electronics Co., Ltd. | Electronic device and method of operating electronic device |
US9875494B2 (en) * | 2013-04-16 | 2018-01-23 | Sri International | Using intents to analyze and personalize a user's dialog experience with a virtual personal assistant |
KR20140136350A (ko) * | 2013-05-20 | 2014-11-28 | 삼성전자주식회사 | 전자장치의 사용 방법 및 장치 |
CN103593610B (zh) * | 2013-10-09 | 2016-08-31 | 中国电子科技集团公司第二十八研究所 | 基于计算机免疫的间谍软件自适应诱导与检测方法 |
US9489514B2 (en) * | 2013-10-11 | 2016-11-08 | Verisign, Inc. | Classifying malware by order of network behavior artifacts |
GB2524583B (en) * | 2014-03-28 | 2017-08-09 | Kaizen Reaux-Savonte Corey | System, architecture and methods for an intelligent, self-aware and context-aware digital organism-based telecommunication system |
RU2014111971A (ru) * | 2014-03-28 | 2015-10-10 | Юрий Михайлович Буров | Способ и система голосового интерфейса |
US9519686B2 (en) * | 2014-04-09 | 2016-12-13 | International Business Machines Corporation | Confidence ranking of answers based on temporal semantics |
US9130906B1 (en) * | 2014-05-23 | 2015-09-08 | The United States Of America As Represented By The Secretary Of The Navy | Method and apparatus for automated secure one-way data transmission |
EP3160565B1 (en) * | 2014-06-30 | 2021-08-18 | Syqe Medical Ltd. | Devices and systems for pulmonary delivery of active agents |
-
2017
- 2017-01-24 RU RU2018129947A patent/RU2750554C2/ru active
- 2017-01-24 JP JP2018538714A patent/JP2019511030A/ja active Pending
- 2017-01-24 IL IL306075A patent/IL306075B2/en unknown
- 2017-01-24 KR KR1020187024400A patent/KR20180105688A/ko not_active Application Discontinuation
- 2017-01-24 MY MYPI2018702527A patent/MY195524A/en unknown
- 2017-01-24 AU AU2017210132A patent/AU2017210132A1/en not_active Abandoned
- 2017-01-24 SG SG11201806117TA patent/SG11201806117TA/en unknown
- 2017-01-24 MX MX2018009079A patent/MX2018009079A/es unknown
- 2017-01-24 IL IL260711A patent/IL260711B2/en unknown
- 2017-01-24 BR BR112018015014A patent/BR112018015014A2/pt unknown
- 2017-01-24 EP EP17742143.5A patent/EP3405911A4/en active Pending
- 2017-01-24 WO PCT/US2017/014699 patent/WO2017127850A1/en active Application Filing
- 2017-01-24 SG SG10202108336PA patent/SG10202108336PA/en unknown
- 2017-01-24 CA CA3051164A patent/CA3051164A1/en active Pending
- 2017-01-24 KR KR1020247032720A patent/KR20240151252A/ko active Search and Examination
- 2017-01-24 CN CN202210557303.8A patent/CN115062297A/zh active Pending
- 2017-01-24 CN CN201780019904.0A patent/CN109313687B/zh active Active
- 2017-01-24 IL IL315165A patent/IL315165A/en unknown
-
2018
- 2018-08-13 ZA ZA2018/05385A patent/ZA201805385B/en unknown
-
2022
- 2022-04-27 AU AU2022202786A patent/AU2022202786A1/en not_active Abandoned
- 2022-07-29 JP JP2022121072A patent/JP2022141966A/ja active Pending
-
2024
- 2024-03-27 AU AU2024202003A patent/AU2024202003A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
CA3051164A1 (en) | 2017-07-27 |
RU2018129947A (ru) | 2020-02-25 |
IL306075B2 (en) | 2025-01-01 |
IL306075A (en) | 2023-11-01 |
KR20180105688A (ko) | 2018-09-28 |
SG11201806117TA (en) | 2018-08-30 |
IL260711B1 (en) | 2023-10-01 |
IL260711B2 (en) | 2024-02-01 |
JP2019511030A (ja) | 2019-04-18 |
EP3405911A1 (en) | 2018-11-28 |
MY195524A (en) | 2023-01-30 |
IL306075B1 (en) | 2024-09-01 |
CN109313687A (zh) | 2019-02-05 |
KR20240151252A (ko) | 2024-10-17 |
JP2022141966A (ja) | 2022-09-29 |
ZA201805385B (en) | 2022-07-27 |
WO2017127850A1 (en) | 2017-07-27 |
EP3405911A4 (en) | 2019-09-18 |
CN115062297A (zh) | 2022-09-16 |
RU2750554C2 (ru) | 2021-06-29 |
RU2018129947A3 (pt) | 2020-07-08 |
IL260711A (pt) | 2018-09-20 |
AU2022202786A1 (en) | 2022-05-19 |
IL315165A (en) | 2024-10-01 |
SG10202108336PA (en) | 2021-08-30 |
AU2017210132A1 (en) | 2018-08-23 |
AU2024202003A1 (en) | 2024-04-18 |
MX2018009079A (es) | 2022-12-15 |
CN109313687B (zh) | 2022-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112018015014A2 (pt) | sistema de segurança de computador com base em inteligência artificial | |
BR112019007797A2 (pt) | sistema de mapeamento e orientação terrestre | |
BR112016024554A2 (pt) | ?conjunto de cabeça de trépano para recuperação de testemunhos? | |
BR112018012111A2 (pt) | sistema de monitoramento ambiental e fisiológico animal | |
WO2015200110A3 (en) | Techniques for machine language translation of text from an image based on non-textual context information from the image | |
BR112018013423A2 (pt) | geração de modelos digitais de rendimento de cultura com base em datas de plantio de cultura e valores de maturidade relativa | |
WO2018013247A3 (en) | Physics informed learning machine | |
GB2563340A8 (en) | Labeling computing objects for improved threat detection | |
BR112017019334A2 (pt) | métodos e sistemas para fornecer e receber informações para gerenciamento de riscos no campo | |
AR098579A1 (es) | Medición electromagnética triaxial dentro del pozo | |
BR112014017203A8 (pt) | método, sistema de computador e meio não transitório de leitura por computador | |
BR112015019342A2 (pt) | sistema e método de aquisição de dados sísmicos de azimutes amplo e estreito combinados | |
BR112019007580A2 (pt) | avaliação e mitigação de risco e perigo geomecânico | |
CL2016001600A1 (es) | Sistema y método sensor de perforación. | |
BR112015023770A2 (pt) | sistemas de seguros de saúde para animal de estimação e métodos para prover seguros de saúde e gerar indicador de estado para animais de estimação | |
BR112017007201A2 (pt) | buscas múltiplas e tarefas múltiplas em busca | |
MY181677A (en) | System and method for generating knowledge base automatically | |
WO2017172669A3 (en) | Tagged tracing, logging and performance measurements | |
GB2565512A (en) | A system for the automated semantic analysis processing of query strings | |
MX2016005281A (es) | Sistema y metodo para implementación de consultas de busqueda multifacetadas. | |
MY189291A (en) | Automatically generating certification documents | |
AR107604A1 (es) | Método y sistema para la identificación in-situ de fluidos de trabajo | |
CO2019013990A2 (es) | Generación de interfaz de usuario con base en reglas | |
BR102017017508A8 (pt) | Sistema de um ou mais processadores para criar uma ordem de engenharia para aeronaves a partir de um boletim de serviço eletrônico publicado | |
AR098974A1 (es) | Métodos y aparato para evaluar las condiciones en el fondo del pozo a través de detección rfid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B350 | Update of information on the portal [chapter 15.35 patent gazette] | ||
B06W | Patent application suspended after preliminary examination (for patents with searches from other patent authorities) chapter 6.23 patent gazette] | ||
B15K | Others concerning applications: alteration of classification |
Free format text: AS CLASSIFICACOES ANTERIORES ERAM: G06N 5/02 , G06F 17/30 , G06F 21/50 , G06F 21/51 , G06F 21/53 , G06F 21/54 , G06F 21/55 , G06F 21/56 , G06F 21/57 Ipc: G06F 21/56 (2013.01), G06F 21/57 (2013.01), G06N 5 |
|
B07A | Application suspended after technical examination (opinion) [chapter 7.1 patent gazette] |