Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

11288 results about "Protection system" patented technology

System protection is a Windows feature, called System Restore in the past versions of Windows, that creates and saves as restore points information about your PC's system files, software, drivers, and registry settings. It does this for all the drives that have system protection activated.

Method and Apparatus for Defending Against Zero-Day Worm-Based Attacks

InactiveUS20080098476A1Curb workloadEliminate usual spam and other simple attackMemory loss protectionError detection/correctionData packOperational system
Honey pots are used to attract computer attacks to a virtual operating system that is a virtual instantiation of a typical deployed operational system. Honey nets are a collection of these virtual systems assembled to create a virtual network. The subject system uses a forward deployed honey net combined with a parallel monitoring system collecting data into and from the honey net, leveraging the controlled environment to identify malicious behavior and new attacks. This honey net/monitoring pair is placed ahead of the real deployed operational network and the data it uncovers is used to reconfigure network protective devices in real time to prevent zero-day based attacks from entering the real network. The forward network protection system analyzes the data gathered by the honey pots and generates signatures and new rules for protection that are coupled to both advanced perimeter network security devices and to the real network itself so that these devices can be reconfigured with threat data and new rules to prevent infected packets from entering the real network and from propagating to other machines. Note the subject system applies to both zero-day exploit-based worms and also manual attacks conducted by an individual who is leveraging novel attack methods.
Owner:BAE SYST INFORMATION & ELECTRONICS SYST INTERGRATION INC

Behavior-based host-based intrusion prevention system

A method of protecting a system from attack that includes monitoring processes running on a system, identifying behavior of the processes and attributes of the processes, grouping the processes into process sets based on commonality of attributes, and generating behavior control descriptions for each process set.
Owner:SYMANTEC CORP

Identity theft and fraud protection system and method

A system and method for preventing personal identity theft when making online and offline purchases requires a purchaser to first subscribe and become a member user by registering and providing relevant personal identity information. Once registered, the member is assigned a user name and a password. The subscribing member's personal identity information is then encrypted and stored at one or more highly secure locations. The ID protection system obtains a controlled use card (CUC) through a CUC issuer on behalf of the member for use to make each purchase transaction. The CUC is anonymous with respect to user (member) identity and may be a purchase-specific single-use card or a multiple-use stored value card with no traceable connection to any other financial account. When the member makes a secure online purchase, the system software enters anonymous information (i.e. not revealing the member's real name, email address, billing information, etc.) on the merchant's order placement screen, except in instances where the member's real identity information is required (e.g. airline tickets). The merchant receives the completed checkout screen, obtains credit approval through a credit card association, and sends the shipping information to a shipper which independently obtains the correct shipping name and address from the ID protection system prior to shipping the purchased product(s).
Owner:VIPR SYST +1

Tag multiplication

An intelligent antenna system for extending the effective communication range of a machine-readable passive tag. The system includes intelligence that allows one of a plurality of extension antennas to be active at any given time in order to both facilitate communications and safeguard the system. The machine-readable tag and antenna system may be embedded in a structure. In a further embodiment, the system may include multiple passive tags that are active in correspondence to a display or advertisement currently being exhibited. The system includes means for operatively coupling a designated machine-readable tag to the embedded antenna network previously described. In a further embodiment of the invention, the machine-readable tag includes combined RFID and NFC functionality where both RFID listening functions and NFC read-write functions are to be available in the same NFC communications logic, where different RFID listening applications require different minimum separation distances between the reader and the NFC communications logic. The NFC communications logic chip is selectively connected to at least three antenna coils, the first antenna coil for operating with a first minimum separation distance between the reader and the NFC communications logic, the second antenna coil for operating with a second minimum separation distance between the reader and the NFC communications logic, and the third antenna coil for reading and writing. In a further embodiment of the invention, matching circuits are included with the respective antenna coils to tune the resonant frequency of the RLC oscillator circuit for each antenna coil in the NFC communications logic.
Owner:III HLDG 3
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products