MEMORY ATTACK DETECTION
    1.
    发明申请

    公开(公告)号:US20180330084A1

    公开(公告)日:2018-11-15

    申请号:US15973455

    申请日:2018-05-07

    CPC classification number: G06F21/554 G06F12/1425 G06F21/74 G06F21/79

    Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.

    MEMORY ATTACK DETECTION
    2.
    发明申请
    MEMORY ATTACK DETECTION 审中-公开
    记忆攻击检测

    公开(公告)号:US20150161388A1

    公开(公告)日:2015-06-11

    申请号:US14370399

    申请日:2013-07-18

    CPC classification number: G06F21/554 G06F12/1425 G06F21/74 G06F21/79

    Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.

    Abstract translation: 通常描述了有效地检测对存储器件的存储器的潜在攻击的系统,设备和方法的技术。 在一些示例中,处理器可以向存储器件发送请求。 请求可以包括对与存储器设备的存储器的存储器写入相关的信息的请求。 处理器可以从存储器装置接收响应。 响应可以包括与存储器写入有关的信息。 处理器可以基于响应来确定在一段时间间隔期间写入的存储器件的存储器量。 处理器可以基于写入的存储器的量并基于时间间隔来检测潜在的攻击。 然后,处理器可以基于潜在攻击的检测来生成警报。

    REMOTELY CONTROLLED CROWD-SOURCED MEDIA CAPTURE
    3.
    发明申请
    REMOTELY CONTROLLED CROWD-SOURCED MEDIA CAPTURE 有权
    远程控制的采购媒体捕获

    公开(公告)号:US20140218549A1

    公开(公告)日:2014-08-07

    申请号:US13978850

    申请日:2013-02-01

    Abstract: The disclosed technology receives at a second computing device a message from a first computing device comprising at least an indication of a physical motion, a requested motion, or an indication of a camera control operation. The indicated motion can correspond to a physical motion made to the first computing device. The indicated camera control operation can correspond to a camera control operation made at the first computing device. The technology requests to physically move the second computing device if the received message indicates a motion; and controls a digital camera associated with the second computing device if the received message indicates a camera control operation made at the first computing device.

    Abstract translation: 所公开的技术在第二计算设备处接收来自第一计算设备的消息,该消息至少包括物理运动,所请求的运动或相机控制操作的指示的指示。 所指示的运动可以对应于对第一计算设备进行的物理运动。 所指示的相机控制操作可以对应于在第一计算设备处进行的相机控制操作。 如果接收到的消息指示运动,则技术要求物理地移动第二计算设备; 并且如果所接收的消息指示在第一计算设备处进行的相机控制操作,则控制与第二计算设备相关联的数字照相机。

    USER INTERFACE DELEGATION TO A DELEGATED DEVICE
    7.
    发明申请
    USER INTERFACE DELEGATION TO A DELEGATED DEVICE 有权
    用户界面代表一个代表的设备

    公开(公告)号:US20150237111A1

    公开(公告)日:2015-08-20

    申请号:US14342377

    申请日:2013-06-24

    Inventor: David Hirshberg

    Abstract: The present technology provides an illustrative method for delegating user interface-related tasks. In some examples, the method includes receiving a request to delegate a user interface-related task to a delegated computing device, and causing the transceiver of the delegating device to send a delegation command to the delegated computing device to establish a delegation session on the delegated computing device. The delegation command requests establishment of a delegated user interface to facilitate performance of the user interface-related task on the delegated computing device, and the delegated user interface is substantially similar to the user interface of the delegating device. The method also includes exchanging data associated with the user interface-related task with the delegated computing device.

    Abstract translation: 本技术提供了用于委托用户界面相关任务的说明性方法。 在一些示例中,该方法包括接收将用户界面相关任务委托给委托的计算设备的请求,并且使得委托设备的收发器向授权的计算设备发送授权命令,以在被委派的计算设备上建立委派会话 计算设备。 委托命令请求建立委托的用户界面,以促进委派的计算设备上与用户界面相关的任务的执行,委托的用户界面基本上类似于委托设备的用户界面。 该方法还包括与委托的计算设备交换与用户界面相关的任务相关联的数据。

    MALWARE ATTACK PREVENTION USING BLOCK CODE PERMUTATION
    8.
    发明申请
    MALWARE ATTACK PREVENTION USING BLOCK CODE PERMUTATION 审中-公开
    恶意程序使用块代码进行防范

    公开(公告)号:US20140165197A1

    公开(公告)日:2014-06-12

    申请号:US13976661

    申请日:2012-12-06

    CPC classification number: G06F21/56 G06F21/54

    Abstract: Technologies are generally described for systems and methods configured to produce an executable code. In some examples, a developer may send machine language code to a system manager. The machine language code may include two or more machine language blocks and linking information. The system manager may include a processor configured to permute the machine language blocks to produce permuted machine language code. The processor may modify the linking information based on the permuted machine language code to produce modified linking information. The processor may link the permuted machine language code with use of the modified linking information to produce the executable code.

    Abstract translation: 通常描述了用于生成可执行代码的系统和方法的技术。 在某些示例中,开发人员可能会将机器语言代码发送给系统管理员。 机器语言代码可以包括两个或更多个机器语言块和链接信息。 系统管理器可以包括配置成置换机器语言块以产生置换的机器语言代码的处理器。 处理器可以基于置换的机器语言代码修改链接信息以产生修改的链接信息。 处理器可以使用修改的链接信息来链接置换的机器语言代码以产生可执行代码。

Patent Agency Ranking