BRPI0414155A - sistema de segurança de internet de computador pessoal - Google Patents
sistema de segurança de internet de computador pessoalInfo
- Publication number
- BRPI0414155A BRPI0414155A BRPI0414155-5A BRPI0414155A BRPI0414155A BR PI0414155 A BRPI0414155 A BR PI0414155A BR PI0414155 A BRPI0414155 A BR PI0414155A BR PI0414155 A BRPI0414155 A BR PI0414155A
- Authority
- BR
- Brazil
- Prior art keywords
- operating system
- personal computer
- primary
- computer
- security system
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
"SISTEMA DE SEGURANçA DE INTERNET DE COMPUTADOR PESSOAL". Um aplicativo de software (100), que pode ser instalado em um computador pessoal (20), protege os arquivos de dados primários do computador de serem acessados por código malicioso (por exemplo, vírus, worms e trovans) , importados de uma fonte de dados externa, tal como a Internet (14). Um arquivo mestre serve como a imagem da qual todos os outros códigos de software e funções são derivados. A ativação do arquivo de imagem mestre estabelece um ambiente operacional secundário (bolha de isolamento) (120), na qual um sistema operacional secundário (126) que inclui um navegador e quaisquer outros aplicativos desejados são instalados e executados. As permissões de acesso para comunicações entre o computador, em geral, (sistema operacional primário) (20) e o sistema operacional secundário (126) para impedir qualquer acesso aos arquivos no sistema operacional primário (20) de quaisquer operações que originam do sistema operacional secundário (126). A ativação do sistema operacional secundário (126) é requerida, antes de qualquer conexão para a Internet (14) (ou outra fonte de dados externa) ser habilitada.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/656,570 US7146640B2 (en) | 2002-09-05 | 2003-09-05 | Personal computer internet security system |
| PCT/US2004/000028 WO2005027402A1 (en) | 2003-09-05 | 2004-01-02 | Personal computer internet security system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BRPI0414155A true BRPI0414155A (pt) | 2006-10-31 |
Family
ID=34312662
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BRPI0414155-5A BRPI0414155A (pt) | 2003-09-05 | 2004-01-02 | sistema de segurança de internet de computador pessoal |
Country Status (11)
| Country | Link |
|---|---|
| US (2) | US7146640B2 (pt) |
| EP (1) | EP1661290A4 (pt) |
| JP (1) | JP2007534039A (pt) |
| CN (1) | CN1846393A (pt) |
| AU (1) | AU2004303330A1 (pt) |
| BR (1) | BRPI0414155A (pt) |
| CA (1) | CA2537582A1 (pt) |
| MX (1) | MXPA06002447A (pt) |
| NZ (1) | NZ546112A (pt) |
| WO (1) | WO2005027402A1 (pt) |
| ZA (1) | ZA200602534B (pt) |
Families Citing this family (87)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| IT1249817B (it) * | 1991-07-23 | 1995-03-28 | Sviluppo Materiali Spa | Procedimento per la produzione di polveri per materiali ceramici superconduttori |
| US7076633B2 (en) * | 2001-03-28 | 2006-07-11 | Swsoft Holdings, Ltd. | Hosting service providing platform system and method |
| US7243339B2 (en) * | 2001-07-03 | 2007-07-10 | Hewlett-Packard Development Company, L.P. | System and method to decrease program analysis overhead |
| US7302566B2 (en) * | 2002-09-13 | 2007-11-27 | Wayne Yingling | Internet security system |
| US7788669B2 (en) * | 2003-05-02 | 2010-08-31 | Microsoft Corporation | System for isolating first computing environment from second execution environment while sharing resources by copying data from first portion to second portion of memory |
| FI20030929L (fi) * | 2003-06-19 | 2004-12-20 | Nokia Corp | Menetelmä ja järjestelyjä langattoman tiedonsiirron toteuttamiseksi kulkuvälineessä |
| US8856927B1 (en) | 2003-07-22 | 2014-10-07 | Acronis International Gmbh | System and method for using snapshots for rootkit detection |
| US7739403B1 (en) | 2003-10-03 | 2010-06-15 | Juniper Networks, Inc. | Synchronizing state information between control units |
| US7797752B1 (en) * | 2003-12-17 | 2010-09-14 | Vimal Vaidya | Method and apparatus to secure a computing environment |
| US20050172280A1 (en) * | 2004-01-29 | 2005-08-04 | Ziegler Jeremy R. | System and method for preintegration of updates to an operating system |
| US20050171977A1 (en) * | 2004-02-02 | 2005-08-04 | Osborne James W. | Methods, systems and products for data preservation |
| US7877747B2 (en) * | 2004-02-20 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Flexible operating system operable as either native or as virtualized |
| US8793787B2 (en) * | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
| US7509465B1 (en) * | 2004-06-25 | 2009-03-24 | Emc Corporation | System and method for managing memory or session resources used for movement of data being copied in a data storage environment |
| US7299332B1 (en) * | 2004-06-25 | 2007-11-20 | Emc Corporation | System and method for managing sessions and allocating memory resources used for replication of data in a data storage environment |
| US8307174B1 (en) | 2004-06-25 | 2012-11-06 | Emc Corporation | System and method for managing sessions and reallocating memory resources used for replication of data in a data storage environment |
| US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
| US20120099219A1 (en) * | 2004-08-09 | 2012-04-26 | Jasim Saleh Al-Azzawi | Secure data storage device |
| US8112601B2 (en) * | 2004-08-09 | 2012-02-07 | Jasim Saleh Al-Azzawi | Data storage device with security feature |
| US7690033B2 (en) * | 2004-09-28 | 2010-03-30 | Exobox Technologies Corp. | Electronic computer system secured from unauthorized access to and manipulation of data |
| US20060137013A1 (en) * | 2004-12-06 | 2006-06-22 | Simon Lok | Quarantine filesystem |
| AT501652A1 (de) * | 2005-01-14 | 2006-10-15 | Diaplan Elektronic Gmbh | Computersicherheitssystem |
| US9104773B2 (en) | 2005-06-21 | 2015-08-11 | Microsoft Technology Licensing, Llc | Finding and consuming web subscriptions in a web browser |
| US8661459B2 (en) | 2005-06-21 | 2014-02-25 | Microsoft Corporation | Content syndication platform |
| US8074272B2 (en) | 2005-07-07 | 2011-12-06 | Microsoft Corporation | Browser security notification |
| US7831547B2 (en) | 2005-07-12 | 2010-11-09 | Microsoft Corporation | Searching and browsing URLs and URL history |
| US7865830B2 (en) | 2005-07-12 | 2011-01-04 | Microsoft Corporation | Feed and email content |
| US7606241B1 (en) | 2005-08-12 | 2009-10-20 | Juniper Networks, Inc. | Extending standalone router syntax to multi-chassis routers |
| US8407785B2 (en) | 2005-08-18 | 2013-03-26 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media protecting a digital data processing device from attack |
| CN100403212C (zh) * | 2005-08-23 | 2008-07-16 | 北京软通科技有限责任公司 | 一种实现操作系统隔离的系统及方法 |
| US8112799B1 (en) | 2005-08-24 | 2012-02-07 | Symantec Corporation | Method, system, and computer program product for avoiding cross-site scripting attacks |
| US7552262B1 (en) | 2005-08-31 | 2009-06-23 | Juniper Networks, Inc. | Integration of an operative standalone router into a multi-chassis router |
| US8135857B1 (en) | 2005-09-26 | 2012-03-13 | Juniper Networks, Inc. | Centralized configuration of a multi-chassis router |
| US7747999B1 (en) | 2005-09-26 | 2010-06-29 | Juniper Networks, Inc. | Software installation in a multi-chassis network device |
| US7518986B1 (en) | 2005-11-16 | 2009-04-14 | Juniper Networks, Inc. | Push-based hierarchical state propagation within a multi-chassis network device |
| US7804769B1 (en) * | 2005-12-01 | 2010-09-28 | Juniper Networks, Inc. | Non-stop forwarding in a multi-chassis router |
| US20090271867A1 (en) * | 2005-12-30 | 2009-10-29 | Peng Zhang | Virtual machine to detect malicious code |
| US7917715B2 (en) * | 2006-01-28 | 2011-03-29 | Tallman Jr Leon C | Internet-safe computer |
| US7845005B2 (en) * | 2006-02-07 | 2010-11-30 | International Business Machines Corporation | Method for preventing malicious software installation on an internet-connected computer |
| AU2006100099A4 (en) * | 2006-02-08 | 2006-03-16 | Pc Tools Technology Pty Limited | Automated Threat Analysis System |
| US8270941B2 (en) | 2006-02-24 | 2012-09-18 | Qualcomm Incorporated | System and method for downloading user interface components to wireless devices |
| US20070206546A1 (en) * | 2006-03-02 | 2007-09-06 | Alberth William P Jr | Method and apparatus for preventing denial of service attacks on cellular infrastructure access channels |
| US8280843B2 (en) | 2006-03-03 | 2012-10-02 | Microsoft Corporation | RSS data-processing object |
| US7979803B2 (en) | 2006-03-06 | 2011-07-12 | Microsoft Corporation | RSS hostable control |
| US7996901B2 (en) | 2006-03-31 | 2011-08-09 | Lenovo (Singapore) Pte. Ltd. | Hypervisor area for email virus testing |
| AU2007243254A1 (en) * | 2006-04-26 | 2007-11-08 | Exobox Technologies Corp. | Secure user environment software |
| US8738786B2 (en) | 2006-05-18 | 2014-05-27 | Sanggyu Lee | Method for protecting client and server |
| US8266692B2 (en) * | 2006-07-05 | 2012-09-11 | Bby Solutions, Inc. | Malware automated removal system and method |
| US8453197B2 (en) * | 2006-09-07 | 2013-05-28 | Intel Corporation | Method, apparatus and system for isolating a temporary partition on a host |
| US8024806B2 (en) | 2006-10-17 | 2011-09-20 | Intel Corporation | Method, apparatus and system for enabling a secure location-aware platform |
| US20080250407A1 (en) * | 2007-04-05 | 2008-10-09 | Microsoft Corporation | Network group name for virtual machines |
| US8166476B2 (en) * | 2007-08-24 | 2012-04-24 | Symantec Corporation | On-demand access to a virtual representation of a physical computer system |
| US8424078B2 (en) * | 2007-11-06 | 2013-04-16 | International Business Machines Corporation | Methodology for secure application partitioning enablement |
| US8448218B2 (en) * | 2008-01-17 | 2013-05-21 | Josep Bori | Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability |
| WO2009113157A1 (ja) * | 2008-03-11 | 2009-09-17 | 富士通株式会社 | 認証装置、認証方法、およびデータ利用方法 |
| US8001237B2 (en) * | 2008-03-21 | 2011-08-16 | Young Yee | Remote monitoring of user input devices |
| US20090254970A1 (en) * | 2008-04-04 | 2009-10-08 | Avaya Inc. | Multi-tier security event correlation and mitigation |
| US8813066B2 (en) * | 2008-05-06 | 2014-08-19 | International Business Machines Corporation | Multi-component software application installation facility |
| US20090319432A1 (en) * | 2008-06-19 | 2009-12-24 | Renfro Chadwick R | Secure transaction personal computer |
| US9679135B2 (en) | 2008-06-19 | 2017-06-13 | Bank Of America Corporation | Computing device for secured transactions and virtual monitoring external from the operating system |
| US9317851B2 (en) | 2008-06-19 | 2016-04-19 | Bank Of America Corporation | Secure transaction personal computer |
| US7975034B1 (en) * | 2008-10-31 | 2011-07-05 | Symantec Corporation | Systems and methods to secure data and hardware through virtualization |
| US8239667B2 (en) * | 2008-11-13 | 2012-08-07 | Intel Corporation | Switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory |
| US8489685B2 (en) | 2009-07-17 | 2013-07-16 | Aryaka Networks, Inc. | Application acceleration as a service system and method |
| KR20110062937A (ko) * | 2009-12-04 | 2011-06-10 | 삼성전자주식회사 | 화상형성장치 및 클라이언트와 연결된 서버, 클라이언트 및 화상형성장치의 드라이버 원격설치방법 |
| CN105095748B (zh) * | 2010-11-19 | 2018-06-01 | 北京奇虎科技有限公司 | 一种浏览器隔离使用的方法 |
| US9104514B2 (en) * | 2011-01-11 | 2015-08-11 | International Business Machines Corporation | Automated deployment of applications with tenant-isolation requirements |
| US8650640B2 (en) * | 2011-02-24 | 2014-02-11 | International Business Machines Corporation | Using a declaration of security requirements to determine whether to permit application operations |
| JP5697206B2 (ja) | 2011-03-31 | 2015-04-08 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 不正アクセスに対する防御をするシステム、方法およびプログラム |
| US9495541B2 (en) | 2011-09-15 | 2016-11-15 | The Trustees Of Columbia University In The City Of New York | Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload |
| US8972966B2 (en) * | 2012-01-05 | 2015-03-03 | Lenovo (Singapore) Pte. Ltd. | Updating firmware in a hybrid computing environment |
| CN103369456B (zh) * | 2012-03-29 | 2016-08-17 | 英华达(上海)科技有限公司 | 手机防盗系统及其方法 |
| CN104038469B (zh) * | 2013-03-07 | 2017-12-29 | 中国银联股份有限公司 | 用于安全性信息交互的设备 |
| US9170828B2 (en) | 2013-05-16 | 2015-10-27 | Microsoft Technology Licensing, Llc. | Extraction of operating system-specific characteristics via a communication interface |
| WO2014204363A1 (en) * | 2013-06-19 | 2014-12-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
| US10171483B1 (en) | 2013-08-23 | 2019-01-01 | Symantec Corporation | Utilizing endpoint asset awareness for network intrusion detection |
| CN103902902A (zh) * | 2013-10-24 | 2014-07-02 | 哈尔滨安天科技股份有限公司 | 一种基于嵌入式系统的Rootkit检测方法及系统 |
| CN103713937B (zh) * | 2013-12-13 | 2017-08-25 | 广东电网公司信息中心 | 变电站终端系统运行方法 |
| CN104215894B (zh) * | 2014-08-28 | 2017-04-05 | 工业和信息化部电子第五研究所 | 集成电路硬件木马检测方法和系统 |
| US9600682B2 (en) * | 2015-06-08 | 2017-03-21 | Accenture Global Services Limited | Mapping process changes |
| US10546299B1 (en) * | 2015-06-18 | 2020-01-28 | Wells Fargo Bank, N.A. | Fraudulent activity shell |
| US10375111B2 (en) * | 2016-11-12 | 2019-08-06 | Microsoft Technology Licensing, Llc | Anonymous containers |
| MX2019006678A (es) * | 2016-12-11 | 2019-12-16 | Ensilo Ltd | Sistema y procedimientos de deteccion de cryptoware. |
| US10061923B1 (en) * | 2017-06-26 | 2018-08-28 | Pritam Nath | Safe and secure internet or network connected computing machine providing means for processing, manipulating, receiving, transmitting and storing information free from hackers, hijackers, virus, malware etc. |
| CN111385508B (zh) * | 2018-12-28 | 2021-08-20 | 广州市百果园信息技术有限公司 | 一种视频处理方法、装置、设备和存储介质 |
| US11336684B2 (en) * | 2019-06-07 | 2022-05-17 | Lookout, Inc. | Mobile device security using a secure execution context |
| US20250080537A1 (en) * | 2023-09-04 | 2025-03-06 | Zscaler, Inc. | Systems and methods for pause and resume functionality for shared Privileged Remote Access (PRA) sessions |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB9605338D0 (en) * | 1996-03-13 | 1996-05-15 | Arendee Ltd | Improvements in or relating to computer systems |
| US6167520A (en) * | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
| US6067618A (en) * | 1998-03-26 | 2000-05-23 | Innova Patent Trust | Multiple operating system and disparate user mass storage resource separation for a computer system |
| US6401210B1 (en) | 1998-09-23 | 2002-06-04 | Intel Corporation | Method of managing computer virus infected files |
| US6405318B1 (en) | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
| US6564326B2 (en) | 1999-07-06 | 2003-05-13 | Walter A. Helbig, Sr. | Method and apparatus for enhancing computer system security |
| US6473825B1 (en) | 2000-01-12 | 2002-10-29 | Trw Inc. | Apparatus and method for controlling secure communications between peripheral components on computer buses connected by a bridge circuit |
| US6578140B1 (en) | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
| US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| DK1297446T3 (da) * | 2000-07-05 | 2006-01-30 | Ernst & Young Llp | Fremgangsmåde og apparat for tilvejebringelse af computertjenester |
| CA2454828A1 (en) * | 2001-07-24 | 2003-02-06 | Theresa Eileen Phillips | Network security architecture |
| WO2003036914A1 (en) * | 2001-10-25 | 2003-05-01 | General Dynamics Government Systems Corporation | A method and system for modeling, analysis and display of network security events |
-
2003
- 2003-09-05 US US10/656,570 patent/US7146640B2/en not_active Expired - Fee Related
-
2004
- 2004-01-02 CA CA002537582A patent/CA2537582A1/en not_active Abandoned
- 2004-01-02 BR BRPI0414155-5A patent/BRPI0414155A/pt not_active IP Right Cessation
- 2004-01-02 WO PCT/US2004/000028 patent/WO2005027402A1/en not_active Ceased
- 2004-01-02 NZ NZ546112A patent/NZ546112A/en unknown
- 2004-01-02 JP JP2006526049A patent/JP2007534039A/ja active Pending
- 2004-01-02 MX MXPA06002447A patent/MXPA06002447A/es not_active Application Discontinuation
- 2004-01-02 AU AU2004303330A patent/AU2004303330A1/en not_active Abandoned
- 2004-01-02 CN CN200480025318.XA patent/CN1846393A/zh active Pending
- 2004-01-02 EP EP04700074A patent/EP1661290A4/en not_active Withdrawn
-
2006
- 2006-03-28 ZA ZA200602534A patent/ZA200602534B/xx unknown
- 2006-10-31 US US11/591,112 patent/US7281266B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| JP2007534039A (ja) | 2007-11-22 |
| NZ546112A (en) | 2008-04-30 |
| EP1661290A4 (en) | 2008-01-16 |
| AU2004303330A1 (en) | 2005-03-24 |
| ZA200602534B (en) | 2007-05-30 |
| CN1846393A (zh) | 2006-10-11 |
| EP1661290A1 (en) | 2006-05-31 |
| US20040111578A1 (en) | 2004-06-10 |
| US7281266B2 (en) | 2007-10-09 |
| US7146640B2 (en) | 2006-12-05 |
| MXPA06002447A (es) | 2006-06-20 |
| US20070044148A1 (en) | 2007-02-22 |
| WO2005027402A1 (en) | 2005-03-24 |
| CA2537582A1 (en) | 2005-03-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BRPI0414155A (pt) | sistema de segurança de internet de computador pessoal | |
| Hussain et al. | A security framework for mHealth apps on Android platform | |
| TW201346560A (zh) | 硬體強制記憶體存取許可 | |
| BRPI0404095A (pt) | Entrada e saìda segura para um agente confiável em um sistema com um ambiente de execução de alta segurança | |
| BRPI0511151A (pt) | sistema e método para o gerenciamento de acesso a conteúdo protegido por aplicações não-confiáveis | |
| JP2022533359A (ja) | モノリシック・カーネルのための制限された実行環境 | |
| BRPI0406385A (pt) | Sistema e método para resolução de nome | |
| Hawkins et al. | A systematic approach for developing software safety arguments | |
| Watson et al. | Balancing disruption and deployability in the CHERI instruction-set architecture (ISA) | |
| Svartvik | ‘East is East, and West is West’: The Concept of Torah in Paul and Mark | |
| CN106096429A (zh) | 基于内存隔离的安全架构处理方法及处理器 | |
| Yang et al. | Endoprocess: Programmable and extensible subprocess isolation | |
| KR101708014B1 (ko) | 정형 및 비정형 데이터를 포함하는 빅데이터에서의 개인정보 익명화 관리 시스템 | |
| Nawaz Khan et al. | Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware | |
| Baker et al. | Building a corpus of spoken sylheti. | |
| Gasbarri | South Africa’s diplomacy of conflict resolution in the post-apartheid era: the case of the DRC | |
| Wang et al. | Intel SYSRET Privilege Escalation Vulnerability Analysis | |
| Parker et al. | Ultra-high-definition video transmission for mission-critical communication systems applications | |
| Knowles et al. | The Dark Side of Data Sharing: Considering the Ethicality of Data Brokering within the Context of Health | |
| Prakash | CAREER: Binary-Level Security via ABI-Centric Semantic Inference | |
| Haupt | Treaty-specific conferences, including review conferences | |
| Sweeney | A'credible'response to persons fleeing armed conflict | |
| Criswell | TWC: Small: Thwarting Kernel-Level Malware with Secure Virtual Architecture | |
| Payer | CRII: SaTC: Lockdown: Guarded Control-Flow and Data Privacy for Sensitive Data | |
| BR112022024916A2 (pt) | Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE AS 7A E 8A ANUIDADES. |
|
| B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2159 DE 22/05/2012. |