Hardware Assisted Asset Tracking for Information Leak Prevention
    61.
    发明申请
    Hardware Assisted Asset Tracking for Information Leak Prevention 有权
    硬件辅助资产跟踪信息泄漏预防

    公开(公告)号:US20150230108A1

    公开(公告)日:2015-08-13

    申请号:US14174956

    申请日:2014-02-07

    CPC classification number: H04W24/08 G06F21/552 H04W4/60

    Abstract: Mobile computing devices may be equipped with hardware components configured to monitor key assets of the mobile device at a low level (e.g., firmware level, hardware level, etc.). The hardware component may also be configured to dynamically determine the key assets that are to be monitored in the mobile device, monitor the access or use of these key assets by monitoring data flows, transactions, or operations in a system data bus of the mobile device, and report suspicious activities to a comprehensive behavioral monitoring and analysis system of the mobile device. The comprehensive behavioral monitoring and analysis system may then use this information to quickly identify and respond to malicious or performance degrading activities of the mobile device.

    Abstract translation: 移动计算设备可以配备有被配置为以低水平(例如,固件级别,硬件级别等)监视移动设备的关键资产的硬件组件。 硬件组件还可以被配置为动态地确定在移动设备中要被监视的关键资产,通过监视移动设备的系统数据总线中的数据流,事务或操作来监视这些关键资产的访问或使用 将可疑活动报告给移动设备的综合行为监测和分析系统。 然后,综合行为监测和分析系统可以使用该信息来快速识别和响应移动设备的恶意或性能降级活动。

    Pre-identifying Probable Malicious Rootkit Behavior Using Behavioral Contracts
    62.
    发明申请
    Pre-identifying Probable Malicious Rootkit Behavior Using Behavioral Contracts 有权
    使用行为合约预先识别可能的恶意Rootkit行为

    公开(公告)号:US20150150130A1

    公开(公告)日:2015-05-28

    申请号:US14090200

    申请日:2013-11-26

    CPC classification number: G06F21/56 G06F21/566

    Abstract: The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root access will not cause malicious behavior while after receiving root access. Before giving the application root access, the computing device may identify operations the application intends to execute while having root access, determine whether executing the operations will cause malicious behavior by simulating execution of the operations, and pre-approve those operations after determining that executing those operations will not result in malicious behavior. Further, after giving the application root access, the computing device may only allow the application to perform pre-approved operations by quickly checking the application's pending operations against the pre-approved operations before allowing the application to perform those operations. Thus, the various aspects may ensure that an application receives root access without compromising the performance or security integrity of the computing device.

    Abstract translation: 各种方面提供了一种计算设备和由设备实现的方法,以确保在接收根访问之后在设备上执行并寻求root访问的应用不会引起恶意行为。 在给予应用程序根访问之前,计算设备可以识别应用程序在具有root访问的同时执行的操作,确定执行操作是否会通过模拟操作的执行而导致恶意行为,并且在确定执行这些操作之后预先批准这些操作 操作不会导致恶意行为。 此外,在给予应用程序根访问之后,计算设备可以仅允许应用程序通过在允许应用程序执行这些操作之前快速检查应用程序针对预先批准的操作的待处理操作来执行预先批准的操作。 因此,各个方面可以确保应用程序接收根访问,而不会影响计算设备的性能或安全完整性。

    Method and System for Performing Behavioral Analysis Operations in a Mobile Device based on Application State
    63.
    发明申请
    Method and System for Performing Behavioral Analysis Operations in a Mobile Device based on Application State 有权
    基于应用状态在移动设备中执行行为分析操作的方法和系统

    公开(公告)号:US20150121524A1

    公开(公告)日:2015-04-30

    申请号:US14064437

    申请日:2013-10-28

    CPC classification number: G06F21/566 G06F21/552

    Abstract: Methods, systems and devices use operating system execution states while monitoring applications executing on a mobile device to perform comprehensive behavioral monitoring and analysis include configuring a mobile device to monitor an activity of a software application, generate a shadow feature value that identifies an operating system execution state of the software application during that activity, generate a behavior vector that associates the monitored activity with the shadow feature value, and determine whether the activity is malicious or benign based on the generated behavior vector, shadow feature value and/or operating system execution states. The mobile device may also be configured to intelligently determine whether the operating system execution state of a software application is relevant to determining whether any of the monitored mobile device behaviors are malicious or suspicious, and monitor only the operating system execution states of the software applications for which such determinations are relevant.

    Abstract translation: 方法,系统和设备使用操作系统执行状态,同时监视在移动设备上执行的执行综合行为监控和分析的应用程序,包括配置移动设备来监视软件应用程序的活动,生成标识操作系统执行的阴影特征值 在该活动期间生成软件应用程序的状态,生成将所监视的活动与影子特征值相关联的行为向量,并基于生成的行为向量,阴影特征值和/或操作系统执行状态来确定活动是恶意还是良性 。 移动设备还可以被配置为智能地确定软件应用的操作系统执行状态是否与确定所监视的移动设备行为是否是恶意的或可疑的相关,并且仅监视软件应用的操作系统执行状态 这些确定是相关的。

    Image-based indoor position determination
    64.
    发明授权
    Image-based indoor position determination 有权
    基于图像的室内位置确定

    公开(公告)号:US09020191B2

    公开(公告)日:2015-04-28

    申请号:US13757645

    申请日:2013-02-01

    CPC classification number: G06K9/00664 G06K9/6202 G06T7/75

    Abstract: In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building.

    Abstract translation: 在一个实现中,方法可以包括:至少部分地基于建筑物的室内部分的图像中的线的位置或数量来确定建筑物的室内部分的拓扑表示; 以及将拓扑表示与一个或多个存储的拓扑表示(例如在建筑物的数字地图中)进行比较,以确定建筑物的室内部分的潜在位置。

    Method for efficient behavioral analysis on a mobile station
    66.
    发明申请
    Method for efficient behavioral analysis on a mobile station 审中-公开
    移动台有效行为分析的方法

    公开(公告)号:US20140283024A1

    公开(公告)日:2014-09-18

    申请号:US13801431

    申请日:2013-03-13

    CPC classification number: G06F21/552 H04L63/1416 H04W12/12

    Abstract: Disclosed is a method for efficient behavioral analysis on a mobile station. In the method, one or more first behavioral characteristics associated with a first state of a finite state machine are observed. The one or more first behavioral characteristics may comprise a first subset of observable behavioral characteristics. The mobile station transitions from the first state to a second state. One or more second behavioral characteristics associated with the second state of the finite state machine are observed. The one or more second behavioral characteristics may comprise a second subset of the observable behavioral characteristics.

    Abstract translation: 公开了一种用于在移动台上进行有效行为分析的方法。 在该方法中,观察到与有限状态机的第一状态相关联的一个或多个第一行为特征。 一个或多个第一行为特征可以包括可观察行为特征的第一子集。 移动站从第一状态转换到第二状态。 观察到与有限状态机的第二状态相关联的一个或多个第二行为特征。 一个或多个第二行为特征可以包括可观察行为特征的第二子集。

    Synchronizing a Base Station in a Wireless Communication System
    67.
    发明申请
    Synchronizing a Base Station in a Wireless Communication System 有权
    在无线通信系统中同步基站

    公开(公告)号:US20140071897A1

    公开(公告)日:2014-03-13

    申请号:US14081893

    申请日:2013-11-15

    CPC classification number: H04W56/0015

    Abstract: A method for synchronizing a wireless communication system is disclosed. A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple base stations level may cease transmissions at the same time, thus mitigating interference.

    Abstract translation: 公开了一种同步无线通信系统的方法。 基于相邻基站获得或维持同步所需的时间来确定基站的静默持续时间。 来自基站的所有传输在静默持续时间内停止。 多个基站级别可以同时停止传输,从而减轻干扰。

    Techniques for Autonomic Reverting to Behavioral Checkpoints
    69.
    发明申请
    Techniques for Autonomic Reverting to Behavioral Checkpoints 有权
    自动恢复行为检查点的技术

    公开(公告)号:US20130305101A1

    公开(公告)日:2013-11-14

    申请号:US13747115

    申请日:2013-01-22

    Abstract: Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns.

    Abstract translation: 方面方法,系统和设备可以被配置为创建/捕获检查点,而不会显着影响移动设备的性能,功耗或响应性。 移动设备的观察者模块可以在移动设备系统的各个级别对各种应用编程接口(API)进行仪器或协调,并且不断监视移动设备(经由低功率过程,后台进程等)来识别正常操作 移动设备的模式和/或识别与先前计算的正常操作模式不一致的行为。 当确定移动设备的行为与正常操作模式一致时,移动设备可以将存储器中的移动设备状态信息存储在存储器中,并且当它确定移动设备行为时将先前存储的检查点上传到备份存储系统 与正常的操作模式不一致。

Patent Agency Ranking