Description
This portfolio contains the entire content of each of the patents cited in this patent litigation case. You can download the portfolio as a single complete PDF file, for ease of viewing and sharing. Below is a summary/preview of what is in the PDF file.
Patents
US8365272B2 — System and method for providing network and computer firewall protection with dynamic address isolation to a device
US8631488B2 — Systems and methods for providing security services during power management mode
US8789202B2 — Systems and methods for providing real time access monitoring of a removable media device
US9106683B2 — Systems and methods for providing security services during power management mode
US9747444B1 — System and method for providing network security to mobile devices
US9756079B2 — System and method for providing network and computer firewall protection with dynamic address isolation to a device
US9781164B2 — System and method for providing network security to mobile devices
US9843595B2 — Systems and methods for providing security services during power management mode
Classifications
H04L63/20 | Network architectures or network communication protocols for network security for managing network security; network security policies in general |
H04L29/1233 | Mapping of addresses of the same type; Address translation |
H04L61/25 | Network arrangements or network protocols for addressing or naming mapping of addresses of the same type; address translation |
H04L63/02 | Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls |
H04L63/0236 | Filtering by address, protocol, port number or service, e.g. IP-address or URL |
H04L63/0245 | Filtering by information in the payload |
H04L63/1408 | Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic |
G06F1/3209 | Monitoring remote activity, e.g. over telephone lines or network connections |
G06F21/56 | Computer malware detection or handling, e.g. anti-virus arrangements |
G06F21/57 | Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities |
H04L63/14 | Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic |
H04W12/06 | Authentication |
H04W12/0602 | Pre-authentication |
G06F2221/034 | Test or assess a computer or a system |
G06F8/62 | Uninstallation |
H04L63/0227 | Filtering policies |
H04L63/1425 | Traffic logging, e.g. anomaly detection |
G06F21/31 | User authentication |
G06F21/554 | Detecting local intrusion or implementing counter-measures involving event detection and direct action |
H04L63/1441 | Countermeasures against malicious traffic |
G06F11/1446 | Point-in-time backing up or restoration of persistent data |
G06F21/52 | Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow |
H04L63/083 | Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords |
H04L63/102 | Entity profiles |
G06F21/562 | Static detection |
H04L63/0263 | Rule management |
H04L63/1416 | Event detection, e.g. attack signature detection |
H04L63/145 | Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms |
H04W12/00 | Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception |
H04W12/12 | Fraud detection or prevention |
H04W12/1208 | Anti-malware arrangements, e.g. protecting against SMS fraud or mobile malware |
Abstracts ( 3 of 8 )
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting a wake event, providing a wake signal in response to the wake event to wake a mobile device from a power management mode, and managing security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.
A mobile security system connects to a mobile device and filters out attacks and malicious code. Using the mobile security system, a mobile device can be protected by greater security and possibly by the same level of security offered by a corporation, enterprise, or other entity associated with the mobile device.
Reviews
There are no reviews yet.