Mobile malicious software mitigation

A Baliga, B Coskun, C Van Wart - US Patent 8,695,095, 2014 - Google Patents
BACKGROUND A wireless communication system can be utilized to pro vide wireless
access to various communication services (eg, Voice, video, data, messaging, content …

System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input

S Sankararaman, D Kolingivadi - US Patent 8,271,642, 2012 - Google Patents
(57) ABSTRACT A system, method, and computer program product are pro vided for
isolating a device associated with at least potential data leakage activity, based on user …

Systems and methods for forwarding traffic in a cluster network

A Chauhan, H Bots, S Gopinath - US Patent 9,866,475, 2018 - Google Patents
The present invention is directed towards forwarding network packets in a cluster network. A
predetermined identifier may be inserted into a Media Access Control (MAC) ID field of an …

Method of defending against battery exhaustion attack and wireless communication device and recording medium using the method

KW Kim - US Patent 8,495,229, 2013 - Google Patents
US8495229B2 - Method of defending against battery exhaustion attack and wireless
communication device and recording medium using the method - Google Patents …

Mitigating the impact from Internet attacks in a RAN using Internet transport

T Thyni, M Forsman, M Ullerstig - US Patent 10,050,992, 2018 - Google Patents
The present disclosure relates to methods and devices for mitigating the impact from Internet
attacks in a Radio Access Network, RAN, using Internet transport. This object is obtained by …

Runtime malware detection

D Bhattacharyya, S Shukla - US Patent 10,437,999, 2019 - Google Patents
A method for runtime malware detection is described. In one embodiment, the method may
include classifying a first file as clean and a second file as malware, performing a sample …

Method for mitigation of cyber attacks on industrial control systems

O Schneider, N Giller - US Patent 10,681,079, 2020 - Google Patents
Methods and systems for detecting a potential compromise of cyber security in an industrial
network are disclosed. These methods and systems comprise elements of hardware and …

Distributed information

JM Dahn - US Patent App. 13/749,678, 2013 - Google Patents
BACKGROUND 0002 Information processing systems take many forms. One of these forms
is a utility model of information manage ment called “Cloud Computing or the networked use …

Process cage providing attraction to distributed storage

SJ Broussard, JD Eisinger, R Mehta… - US Patent …, 2017 - Google Patents
A computer-implemented method may include running the process on a first processing
node. The process running on the first processing node initially operates on first data. The …

Mitigating the impact from internet attacks in a RAN using internet transport

T Thyni, M Forsman, M Ullerstig - US Patent 9,705,900, 2017 - Google Patents
BACKGROUND 3GPP Long Term Evolution, LTE, is the fourth-generation mobile
communication technologies standard developed within the 3rd Generation Partnership …