[go: up one dir, main page]

MX2015010893A - Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. - Google Patents

Sistemas y metodos de reglas a base de riesgo para control de aplicaciones.

Info

Publication number
MX2015010893A
MX2015010893A MX2015010893A MX2015010893A MX2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A
Authority
MX
Mexico
Prior art keywords
module
rule
application
risk information
systems
Prior art date
Application number
MX2015010893A
Other languages
English (en)
Other versions
MX349569B (es
Inventor
Chris Silva
Brad Hibbert
Original Assignee
Beyondtrust Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/156,375 external-priority patent/US20140201843A1/en
Application filed by Beyondtrust Software Inc filed Critical Beyondtrust Software Inc
Publication of MX2015010893A publication Critical patent/MX2015010893A/es
Publication of MX349569B publication Critical patent/MX349569B/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Stored Programmes (AREA)

Abstract

En varias modalidades, un agente en un dispositivo digital puede comprender un módulo de monitor, un módulo de identificación de aplicación, un módulo de vulnerabilidad, una base de datos de reglas y un módulo de reglas. El módulo de monitor puede estar configurado para monitorear un dispositivo en cuanto a una instrucción para ejecutar una aplicación legítima. El módulo de identificación de aplicación puede estar configurado para identificar uno o más atributos de una aplicación legítima. El módulo de vulnerabilidad puede estar configurado para recuperar información de riesgo en base al uno o más atributos de la aplicación legítima. La información de riesgo puede ser determinada a partir de las vulnerabilidades conocidas de la aplicación legítima. La base de datos de reglas puede ser para almacenar una regla asociada con la información de riesgo. El módulo de reglas puede estar configurado para recuperar la regla de la base de datos de reglas, en base a la información de riesgo y al control de la aplicación legítima en base a la regla.
MX2015010893A 2013-02-25 2014-02-18 Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. MX349569B (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361768809P 2013-02-25 2013-02-25
US14/156,375 US20140201843A1 (en) 2013-01-15 2014-01-15 Systems and methods for identifying and reporting application and file vulnerabilities
PCT/US2014/016976 WO2014130472A1 (en) 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control

Publications (2)

Publication Number Publication Date
MX2015010893A true MX2015010893A (es) 2016-05-05
MX349569B MX349569B (es) 2017-08-03

Family

ID=51391742

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2015010893A MX349569B (es) 2013-02-25 2014-02-18 Sistemas y metodos de reglas a base de riesgo para control de aplicaciones.

Country Status (7)

Country Link
EP (1) EP2959418A4 (es)
JP (1) JP6134395B2 (es)
AU (2) AU2014219077A1 (es)
CA (1) CA2902110C (es)
MX (1) MX349569B (es)
SG (1) SG11201506642PA (es)
WO (1) WO2014130472A1 (es)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
RU2595511C2 (ru) * 2014-12-05 2016-08-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ ограничения работы доверенных приложений при наличии подозрительных приложений
US9858410B2 (en) * 2015-10-26 2018-01-02 Symantec Corporation Techniques for automated application analysis
CN106537344A (zh) * 2016-03-30 2017-03-22 北京小米移动软件有限公司 一种应用程序调用管理的方法和装置
AU2018224839B2 (en) * 2017-02-27 2021-12-09 Ivanti, Inc. Systems and methods for context-based mitigation of computer security risks
US11609984B2 (en) * 2018-02-14 2023-03-21 Digital Guardian Llc Systems and methods for determining a likelihood of an existence of malware on an executable
EP3591556A1 (en) * 2018-07-07 2020-01-08 1830291 Ontario Inc. Automated security assessment of information systems
US11356449B2 (en) * 2018-10-20 2022-06-07 Walmart Apollo, Llc Managing access to vulnerability data at scale
US11481498B2 (en) * 2019-01-28 2022-10-25 Visa International Service Association Continuous vulnerability management for modern applications
WO2021079495A1 (ja) * 2019-10-25 2021-04-29 日本電気株式会社 評価装置、評価システム、評価方法及びプログラム
CN110929267A (zh) * 2019-11-29 2020-03-27 深信服科技股份有限公司 代码漏洞检测方法、装置、设备及存储介质
JP7215525B2 (ja) * 2020-04-08 2023-01-31 日本電気株式会社 端末、制御方法、及びプログラム
WO2022000024A1 (en) * 2020-06-29 2022-01-06 Blue Eagle Technologies Pty Limited A method for securing a software application
IT202000025771A1 (it) * 2020-10-29 2022-04-29 Beatcode S R L Metodo per certificare l’autenticità di file digitali generati da un dispositivo di comunicazione

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040225877A1 (en) * 2003-05-09 2004-11-11 Zezhen Huang Method and system for protecting computer system from malicious software operation
EP1583013A1 (en) * 2004-03-31 2005-10-05 Swiss Reinsurance Company Computer-based system and method for detecting risks
JP4688472B2 (ja) * 2004-11-01 2011-05-25 株式会社エヌ・ティ・ティ・ドコモ 端末制御装置及び端末制御方法
US8006088B2 (en) * 2005-08-18 2011-08-23 Beyondtrust Corporation Methods and systems for network-based management of application security
US20070169199A1 (en) * 2005-09-09 2007-07-19 Forum Systems, Inc. Web service vulnerability metadata exchange system
US20070094735A1 (en) * 2005-10-26 2007-04-26 Cohen Matthew L Method to consolidate and prioritize web application vulnerabilities
US20070180509A1 (en) * 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070174824A1 (en) * 2006-01-23 2007-07-26 Microsoft Corporation Techniques for generating and executing browser-hosted applications
EP2050242A1 (en) * 2006-07-31 2009-04-22 Telecom Italia S.p.A. A system for implementing security on telecommunications terminals
JP4751431B2 (ja) * 2008-09-12 2011-08-17 株式会社東芝 脆弱性判定装置及びプログラム
US8473508B2 (en) * 2009-10-01 2013-06-25 Oracle International Corporation Dynamic rule creation and caching
JP5585303B2 (ja) * 2010-08-25 2014-09-10 日本電気株式会社 ライブラリ実行管理システム、ライブラリ実行管理方法およびプログラム
US8738906B1 (en) * 2011-11-30 2014-05-27 Juniper Networks, Inc. Traffic classification and control on a network node

Also Published As

Publication number Publication date
AU2014219077A1 (en) 2015-09-17
CA2902110C (en) 2018-07-31
AU2019246773B2 (en) 2020-10-08
MX349569B (es) 2017-08-03
CA2902110A1 (en) 2014-08-28
JP2016513324A (ja) 2016-05-12
JP6134395B2 (ja) 2017-05-24
AU2019246773A1 (en) 2019-10-31
EP2959418A4 (en) 2016-10-05
SG11201506642PA (en) 2015-09-29
EP2959418A1 (en) 2015-12-30
WO2014130472A1 (en) 2014-08-28

Similar Documents

Publication Publication Date Title
MX2015010893A (es) Sistemas y metodos de reglas a base de riesgo para control de aplicaciones.
PH12019550067A1 (en) Iot security service
EP3696687A4 (en) INFORMATION MANAGEMENT PROCESS, DEVICE AND SYSTEM
EP3707990A4 (en) DATA PROCESSING DEVICE AND PROCESS, AND VEGETATION MANAGEMENT SYSTEM
EP4277317A3 (en) Sequencing the validity of access control keys
TW201614501A (en) Systems and methods for segmenting data structures in a memory system
EA201690730A1 (ru) Система и способ управления, объединения и распространения ключей шифрования
MX370367B (es) Sistemas y métodos para evaluación de seguridad y riesgos y pruebas de aplicaciones.
MX2015012671A (es) Sistemas y metodos de definicion de atributos de ubucaciones asistidas de entrega / recuperacion.
MX2016005769A (es) Alineacion de tiempo de datos de sensor.
GB2525719A8 (en) Method and system for providing a vulnerability management and verification service
EP3398091A4 (en) System, method, and device for unified access control on federated database
WO2015177647A3 (en) Technologies for protecting systems and data to prevent cyber-attacks
WO2014186713A3 (en) Semantic naming model
GB2555340A (en) Protection of sensitive data
HK1232328A1 (zh) 用於计算装置保护的系统和方法
MX2014013295A (es) Sistemas y metodos para el procesamiento seguro con unidad criptografica incorporada.
MX362756B (es) Sistema y métodos para una credencial incluyendo múltiples privilegios de acceso.
EP3657315A4 (en) PROCESS, DEVICE AND SYSTEM FOR ACCESSING DATA
MX2018007736A (es) Sistema para control de velocidad de un vehiculo.
WO2014122451A3 (en) System and method for mobile wallet data access
EP3627461A4 (en) INFORMATION PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE AND INFORMATION MEDIUM
EP3197090A4 (en) Management system, portable terminal device, management method, information processing method and program
WO2014137820A3 (en) Systems and methods for associating microposts with geographic locations
MX388376B (es) Manejo basado en red de conjuntos de datos protegidos.

Legal Events

Date Code Title Description
FG Grant or registration