Described systems and methods protect client devices such as personal computers and IoT devices against malicious software. In some embodiments, a plurality of client devices report the occurrence of various events to a security server, each such event caused by a local instance of a target application (e.g., mobile app) executing on a respective device. The security server then collates the behavior of the respective target application across the plurality of client devices. Some embodiments compute an aggregate event set and/or sequence combining events detected on one device with events detected on other devices, and determine whether the target application is malicious according to the aggregate event set/sequence.
Described systems and methods protect client devices such as personal computers and IoT devices against malicious software. In some embodiments, a plurality of client devices report the occurrence of various events to a security server, each such event caused by a local instance of a target application (e.g., mobile app) executing on a respective device. The security server then collates the behavior of the respective target application across the plurality of client devices. Some embodiments compute an aggregate event set and/or sequence combining events detected on one device with events detected on other devices, and determine whether the target application is malicious according to the aggregate event set/sequence.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, trojan horses, adware, spyware,
and other malware; internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; computer software for the
detection and analysis of online scams; fraud protection
software; computer optimization software; computer software
to prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
provision of computer software for the detection and
analysis of online scams; maintenance of computer software;
computer programming; technological computer on-line
services in the nature of providing information about
computer software through a website; audit for computer
software and networks in the nature of data security
auditing; computer services, namely, creation and
maintenance, design and implementation of data recovery
software; database design and development in the nature of
supplying of databases characteristics; supplying of
Internet search engines, design of computer websites,
computer software installation, computer software updating,
software design; computer system analysis; providing
temporary use of on-line non-downloadable software for
accessing computer and software applications; rental of
software applications; computer design; research and
development for software applications; technical assistance
for software applications, namely, troubleshooting of
computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, trojan horses, adware, spyware,
and other malware; internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; computer software for the
detection and analysis of online scams; fraud protection
software; computer optimization software; computer software
to prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
provision of computer software for the detection and
analysis of online scams; maintenance of computer software;
computer programming; technological computer on-line
services in the nature of providing information about
computer software through a website; audit for computer
software and networks in the nature of data security
auditing; computer services, namely, creation and
maintenance, design and implementation of data recovery
software; database design and development in the nature of
supplying of databases characteristics; supplying of
Internet search engines, design of computer websites,
computer software installation, computer software updating,
software design; computer system analysis; providing
temporary use of on-line non-downloadable software for
accessing computer and software applications; rental of
software applications; computer design; research and
development for software applications; technical assistance
for software applications, namely, troubleshooting of
computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
computer on-line services in the nature of a website for
providing information about computer software; audit for
computer software and networks in the nature of data
security auditing; computer services, namely, creation and
maintenance, design and implementation of software for data
recovery; database design and development in the nature of
supplying of databases characteristics; supplying of
Internet search engines, design of computer websites,
computer software installation, computer software updating,
software design; computer system analysis; providing
temporary use of on-line non-downloadable software for
accessing computer and software applications; rental of
software applications; computer design; research and
development for software applications; technical assistance
for software applications, namely, troubleshooting of
computer software problems.
Described systems and methods protect client devices such as personal computers and IoT devices against harmful or inappropriate Internet content. When a client uses an encrypted handshake to hide the identity of the end server, e.g., in applications implementing an encrypted client hello (ECH), some embodiments employ a modified DNS server to provide a surrogate key to the client instead of the genuine handshake key. A traffic filter executing for instance on a network gateway may then intercept and decrypt the handshake and apply an access policy to selectively allow or deny access to the respective end server. When access is allowed, the traffic filter may re-encrypt the server identifier using the genuine handshake key before forwarding the handshake to its destination. Communication privacy is maintained since the illustrated methods only decrypt the handshake, and not the actual payload.
BTD-2104 5/2/2023 33 Privacy-Preserving Filtering of Encrypted Traffic ABSTRACT Described systems and methods protect client devices such as personal computers and IoT 5 devices against harmful or inappropriate Internet content. When a client uses an encrypted handshake to hide the identity of the end server, e.g., in applications implementing an encrypted client hello (ECH), some embodiments employ a modified DNS server to provide a surrogate key to the client instead of the genuine handshake key. A traffic filter executing for instance on a network gateway may then intercept and decrypt the handshake and apply an access policy to 10 selectively allow or deny access to the respective end server. When access is allowed, the traffic filter may re-encrypt the server identifier using the genuine handshake key before forwarding the handshake to its destination. Communication privacy is maintained since the illustrated methods only decrypt the handshake, and not the actual payload.
Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. (1) Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; technological computer on-line services in the nature of providing information about computer software through a website; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery software; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; technological computer on-line services in the nature of providing information about computer software through a website; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery software; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. (1) Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; technological computer on-line services in the nature of providing information about computer software through a website; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery software; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; technological computer on-line services in the nature of providing information about computer software through a website; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery software; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; computer software for the detection and analysis of online scams; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; provision of computer software for the detection and analysis of online scams; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
16.
Computer Security Systems and Methods Using Self-Supervised Consensus-Building Machine Learning
Some embodiments employ a consensus-building procedure to train a multitask graph comprising a plurality of nodes interconnected by a plurality of edges, wherein each node is associated with a task of determining a set of node-specific attributes of a set of input data, and each edge comprises an AI module (e.g., neural network) configured to determine attributes of an end node according to attributes of a start node of the respective edge. Training fosters consensus between all edges converging to a node. The trained multitask graph may then be deployed in a threat detector configured to determine whether an input set of data is indicative of malice (e.g., malware, intrusion, online threat, etc.).
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06K 9/62 - Methods or arrangements for recognition using electronic means
G06N 3/04 - Architecture, e.g. interconnection topology
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
firewall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
providing information about computer software on-line via a
website; audit for computer software and networks in the
nature of data security auditing; computer services, namely,
creation and maintenance, design and implementation of data
recovery; database design and development in the nature of
supplying of databases characteristics; provision of
Internet search engines, design of computer websites,
computer software installation, computer software updating,
software design; computer system analysis; providing
temporary use of on-line non-downloadable software for
accessing computer and software applications; rental of
software applications; computer design; research and
development in the field of software applications; technical
assistance for software applications, namely,
troubleshooting of computer software problems.
36 - Financial, insurance and real estate services
Goods & Services
Investment services; investment advice; hedge fund services;
hedge fund management services; management of hedge fund
institutions; provision of hedge fund information and
advice; hedge fund brokerage; asset management services;
investment and fund investment services; investment, fund
and fund investment management services; investment fund
management; provision of investment and fund management
information; trust and investment trust management; capital
fund investment and management; corporate funds management;
mutual fund administration and management; mutual fund
investment services; international and domestic fund
investment; trusteeship of superannuation funds; venture
capital fund management and financing; capital investment;
portfolio and financial administration of pension funds;
placement of funds; computerised transfer of funds;
financial analysis and evaluations; financial management and
planning; financial research; preparation of financial
reports and analyses; fiscal assessments; financial
investment consultancy; retirement payment services; real
estate affairs; consultancy, information and advisory
services related to the foregoing; none of the aforesaid
including credit card services.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of software for data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable anti-malware software applications; Downloadable computer software for providing network, Internet, and computer security; Downloadable computer software for providing online identity protection and parental control; Downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; Downloadable fraud protection software; Downloadable computer optimization software; Downloadable computer software to prevent, diagnose, and repair computer problems; Downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; Downloadable enterprise security software; Downloadable fire wall software; Downloadable privacy control software; Downloadable content filtering software; Downloadable computer software for the creation of virtual private network; Downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; Downloadable computer software for use in updating other computer software; Downloadable computer software for use in administering networking applications; Downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; Downloadable computer software for file management and transfer; Downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; Downloadable computer software for use in file, disk and systems management; Downloadable computer software for use in data storage management and administering storage area networks; Downloadable computer software for backing up and restoring computer data; Downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; Downloadable computer software for generating reports from databases, computer software for scheduling automated processes; Downloadable computer software for use in the central management of computers attached to a computer network; Downloadable computer software for replicating and archiving files from one data store to another; Recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; Recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; Recorded computer programs for managing the software configurations of computer systems and computer networks; Recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; Recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of software for data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design services; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Digital and video advertising via electronic media,
specifically the Internet, wireless networks, and mobile and
portable devices in relation to anti-malware software
applications, computer software for providing network,
Internet, and computer security, computer software for
providing online identity protection and parental control,
computer software for scanning, detecting, and removing
viruses, worms, Trojan horses, adware, spyware, and other
malware and Internet security software; publishing of
advertising texts; advertising; publicity; marketing;
presentation of goods on communication media, for retail
purposes; providing business information in the social media
field; providing business information via the internet,
wired networks or other forms of data transmission;
distribution of advertising materials; distribution of
advertising and advertising materials (flyers, prospectuses,
brochures, leaflets); all the above in relation to
anti-malware software applications, computer software for
providing network, Internet, and computer security, computer
software for providing online identity protection and
parental control, computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware and Internet security software; analyzing
and compiling business data; database management for others
of a database comprised of data collected for business
purposes; systematization of data in computer databases;
business data analysis; data management services for
business purposes; updating and maintenance of data in
computer databases; data processing services; compilation
and management of computerized databases and consulting
services related thereto; business consultation services in
the fields of data analytics, business intelligence,
predictive analytics, big data and business data analysis
and visualization, complex event processing, mining the most
relevant information from disparate data sources, and
creating searchable databases of information and data, and
software and application development. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
computer on-line technological services in the nature of a
website for providing information about computer software;
audit for computer software and networks in the nature of
data security auditing; technological computer services,
namely, creation and maintenance, design and implementation
of data recovery softwares; database design and development
in the nature of supplying of databases characteristics;
supplying of Internet search engines, design of computer
websites, computer software installation, computer software
updating, software design; computer system analysis;
providing temporary use of on-line non-downloadable software
for accessing computer and software applications; rental of
software applications; computer design; research and
development for software applications; technical assistance
for software applications, namely, troubleshooting of
computer software problems.
22.
Security Appliance for Protecting Power-Saving Wireless Devices Against Attack
Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.
H04W 12/48 - Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
H04W 12/122 - Counter-measures against attacks; Protection against rogue devices
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
computer on-line services in the nature of providing
information about computer software via a website; audit for
computer software and networks in the nature of data
security auditing; computer services, namely, creation,
maintenance, design and implementation of database; database
design and development in the nature of supplying of
databases characteristics; supplying of Internet search
engines, design of computer websites, computer software
installation, computer software updating, software design;
computer system analysis; providing temporary use of on-line
non-downloadable software for accessing computer and
software applications; rental of software applications;
computer design; research and development for software
applications; technical assistance for software
applications, namely, troubleshooting of computer software
problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
computer on-line services in the nature of providing
information about computer software via a website; audit for
computer software and networks in the nature of data
security auditing; computer services, namely, creation,
maintenance, design and implementation of database; database
design and development in the nature of supplying of
databases characteristics; supplying of Internet search
engines, design of computer websites, computer software
installation, computer software updating, software design;
computer system analysis; providing temporary use of on-line
non-downloadable software for accessing computer and
software applications; rental of software applications;
computer design; research and development for software
applications; technical assistance for software
applications, namely, troubleshooting of computer software
problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
computer on-line services in the nature of a providing
information about computer software via a website; audit for
computer software and networks in the nature of data
security auditing; computer services, namely, creation,
maintenance, design and implementation of database; database
design and development in the nature of supplying of
databases characteristics; supplying of Internet search
engines, design of computer websites, computer software
installation, computer software updating, software design;
computer system analysis; providing temporary use of on-line
non-downloadable software for accessing computer and
software applications; rental of software applications;
computer design; research and development for software
applications; technical assistance for software
applications, namely, troubleshooting of computer software
problems.
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for
providing network, Internet, and computer security; computer
software for providing online identity protection and
parental control; computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; Internet security software, namely,
computer software for use in the monitoring and control of
computer and online activity; fraud protection software;
computer optimization software; computer software to
prevent, diagnose, and repair computer problems; computer
software for the back-up, storage, restoration and recovery
of data, folders, and files; enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in administering networking
applications; computer software for connecting and managing
remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer; computer software that
provides firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other computer
security functions and file serving storage management;
computer software for use in file, disk and systems
management; computer software for use in data storage
management and administering storage area networks; computer
software for backing up and restoring computer data;
computer software for monitoring, identifying, and
rectifying file, disk, system, and computer network problems
and errors; computer software for generating reports from
databases, computer software for scheduling automated
processes; computer software for use in the central
management of computers attached to a computer network;
computer software for replicating and archiving files from
one data store to another; computer programs for operating
data communications applications, and for the encryption and
authentication of electronic information; computer programs
for use in the field of computer system administration,
namely, programs for the administration and management of
computer programs and electronic data about computer
systems; computer programs for managing the software
configurations of computer systems and computer networks;
computer programs for the sending and receiving of computer
software across a computer network to accomplish software
distribution and computer programs for installing and
upgrading other computer software without manual user
intervention; computer programs for copying data from one
electronic storage medium to another electronic storage
medium; embedded software for network monitoring and
security. Conversion of the computer code for others; computer advice,
namely, technical advice relating to the operation of
computers; design, development and maintenance of computer
data bases; diagnosis services for computers in the nature
of diagnosing computer hardware and software problems;
maintenance of computer software; computer programming;
computer on-line services in the nature of a website for
providing information about computer software; audit for
computer software and networks in the nature of data
security auditing; computer services, namely, creation and
maintenance, design and implementation of data recovery;
database design and development in the nature of supplying
of databases characteristics; supplying of Internet search
engines, design of computer websites, computer software
installation, computer software updating, software design;
computer system analysis; providing temporary use of on-line
non-downloadable software for accessing computer and
software applications; rental of software applications;
computer design; research and development for software
applications; technical assistance for software
applications, namely, troubleshooting of computer software
problems.
30.
SYSTEMS AND METHODS OF CONTROLLING INTERNET ACCESS USING ENCRYPTED DNS
Described systems and methods enable protecting client devices (e.g., personal computers and IoT devices) implementing encrypted DNS protocols against harmful or inappropriate Internet content. A DNS proxy intercepts an attempt to establish an encrypted communication session between a client device and a DNS server. Without decrypting any communications, some embodiments of the DNS proxy determine an identifier of the respective session and an identifier of the client device, and send a query tracer connecting the session identifier with the client identifier to a security server. In some embodiments, the security server obtains the domain name included in an encrypted DNS query from the DNS server and instructs the DNS server to allow or block access of the client device to the respective Internet domain according to a device- and/or user-specific access policy.
Described systems and methods enable protecting client devices (e.g., personal computers and IoT devices) implementing encrypted DNS protocols against harmful or inappropriate Internet content. A DNS proxy intercepts an attempt to establish an encrypted communication session between a client device and a DNS server. Without decrypting any communications, some embodiments of the DNS proxy determine an identifier of the respective session and an identifier of the client device, and send a query tracer connecting the session identifier with the client identifier to a security server. In some embodiments, the security server obtains the domain name included in an encrypted DNS query from the DNS server and instructs the DNS server to allow or block access of the client device to the respective Internet domain according to a device- and/or user-specific access policy.
09 - Scientific and electric apparatus and instruments
Goods & Services
Anti-malware software applications, computer software for
providing network, Internet, and computer security, computer
software for providing online identity protection and
parental control, computer software for scanning, detecting,
and removing viruses, worms, Trojan horses, ad-ware,
spyware, and other malware; Internet security software,
namely, computer software for use in the monitoring and
control of computer and online activity, fraud protection
software, computer optimization software; computer software
to prevent, diagnose, and repair computer problems, computer
software for the back-up, storage, restoration and recovery
of data, folders, and files, enterprise security software;
fire wall software; privacy control software; content
filtering software; computer software for the creation of
virtual private network; utility software for facilitating
computer use at remote locations and for facilitating
communications among mobile users over networks; computer
software for use in updating other computer software;
computer software for use in networking applications;
computer software for connecting and managing remote
computers, for synchronization of files through e-mail, for
providing security to remote computer users, for
implementing computer, software and network security
measures for remote computer users; computer software for
file management and transfer, computer software that provide
firewall, content filtering, intrusion alert, virus
protection, virtual private networking and other security
functions and file serving storage management; computer
software for use in file, disk and systems management;
computer software for data storage management in storage
area networks; computer software for backing up and
restoring computer data; computer software for monitoring,
identifying, and rectifying file, disk, system, and computer
network problems and errors; computer software for
generating reports from databases, computer software for
scheduling automated processes; computer software for
central management of computers attached to a computer
network; computer software for replicating and archiving
files from one data store to another; computer programs for
encryption and authentication of electronic information for
use in data communication application, computer programs for
use in the field of computer system administration, namely,
programs for the administration and management of computer
programs and electronic data about computer systems,
computer programs for managing the software configurations
of computer systems and computer networks; computer programs
for the sending and receiving of computer software across a
computer network to accomplish software distribution and
computer programs for installing and upgrading other
computer software without manual user intervention; computer
programs for copying data from one electronic storage medium
to another electronic storage medium; embedded software for
network monitoring and security.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, downloadable or recorded computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security digital and video advertising via the internet, wireless networks, and mobile and portable devices in the field of anti-malware software applications; digital and video advertising via the internet, wireless networks, and mobile and portable devices in the field of computer software for providing network, internet, and computer security; digital and video advertising via the internet, wireless networks, and mobile and portable devices in the field of computer software for providing online identity protection and parental control; digital and video advertising via the internet, wireless networks, and mobile and portable devices in the field of computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware and internet security software; publishing of advertising texts; advertising services; publicity agency services; marketing services; presentation of goods on communication media, for retail purposes; provide business information in the social media field; provide business information via the internet, wired networks or other forms of data transmission; distribution of advertising materials; distribution of advertising and advertising materials, namely, flyers, prospectuses, brochures, leaflets; all the above in relation to anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware and internet security software; analyzing and compiling business data; database management for others of a database comprised of data collected for business purposes; systematization of data in computer databases; business data analysis; data management services for business purposes; updating and maintenance of data in computer databases; data processing services; compilation and management of computerized databases and consulting services related thereto; business consultation services in the fields of data analytics; business intelligence services; predictive analytics in the nature of business consulting specializing in the use of analytic models for the understanding and predicting of consumer, business, and retail market trends and actions conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of software for data recovery; database design and development in the nature of supplying of databases characteristics; supplying of internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design services; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Digital and video advertising via electronic media, specifically the Internet, wireless networks, and mobile and portable devices in relation to anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware and Internet security software; publishing of advertising texts; advertising; publicity; marketing; presentation of goods on communication media, for retail purposes; providing business information in the social media field; providing business information via the internet, wired networks or other forms of data transmission; distribution of advertising materials; distribution of advertising and advertising materials (flyers, prospectuses, brochures, leaflets); all the above in relation to anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware and Internet security software; analyzing and compiling business data; database management for others of a database comprised of data collected for business purposes; systematization of data in computer databases; business data analysis; data management services for business purposes; updating and maintenance of data in computer databases; data processing services; compilation and management of computerized databases and consulting services related thereto; business consultation services in the fields of data analytics, business intelligence, predictive analytics, big data and business data analysis and visualization, complex event processing, mining the most relevant information from disparate data sources, and creating searchable databases of information and data, and software and application development Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line technological services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; technological computer services, namely, creation and maintenance, design and implementation of data recovery softwares; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Digital and video advertising via electronic media, specifically the Internet, wireless networks, and mobile and portable devices in relation to anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware and Internet security software; Publishing of advertising texts; advertising; publicity; marketing; presentation of goods on communication media, for retail purposes; provide business information in the social media field; provide business information via the internet, wired networks or other forms of data transmission; distribution of advertising materials; distribution of advertising and advertising materials (flyers, prospectuses, brochures, leaflets); all the above in relation to anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware and Internet security software; analyzing and compiling business data, not being related to vehicle data; database management for others of a database comprised of data collected for business purposes,not being related to vehicle data; systematization of data in computer databases,not being related to vehicle data; business data analysis,not being related to vehicle data; data management services for business purposes,not being related to vehicle data; updating and maintenance of data in computer databases,not being related to vehicle data; data processing services; compilation and management of computerized databases and consulting services related thereto; business consultation services in the fields of data analytics, business intelligence, predictive analytics, big data and business data analysis and visualization, complex event processing, mining the most relevant information from disparate data sources, and creating searchable databases of information and data, and software and application development,not being related to vehicle data. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
36 - Financial, insurance and real estate services
Goods & Services
Investment services; investment advice; hedge fund services; hedge fund management services; management of hedge fund institutions; provision of hedge fund information and advice; hedge fund brokerage; asset management services; investment and fund investment services; investment, fund and fund investment management services; investment fund management; provision of investment and fund management information; trust and investment trust management; capital fund investment and management; corporate funds management; mutual fund administration and management; mutual fund investment services; international and domestic fund investment; trusteeship of superannuation funds; venture capital fund management and financing; capital investment; portfolio and financial administration of pension funds; placement of funds; computerised transfer of funds; financial analysis and evaluations; financial management and planning; financial research; preparation of financial reports and analyses; fiscal assessments; financial investment consultancy; retirement payment services; real estate affairs; consultancy, information and advisory services related to the foregoing; none of the aforesaid including credit card services
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; firewall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; providing information about computer software on-line via a website; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; provision of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development in the field of software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.
Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
36 - Financial, insurance and real estate services
Goods & Services
Investment services; investment advice; hedge fund services; hedge fund management services; management of hedge fund institutions; provision of hedge fund information and advice; hedge fund brokerage; asset management services; investment and fund investment services; investment, fund and fund investment management services; investment fund management; provision of investment and fund management information; trust and investment trust management; capital fund investment and management; corporate funds management; mutual fund administration and management; mutual fund investment services; international and domestic fund investment; trusteeship of superannuation funds; venture capital fund management and financing; capital investment; portfolio and pension administration services; placement of funds; computerised transfer of funds; financial analysis and evaluations; financial management and planning; financial research; preparation of financial reports and analyses; fiscal assessments; financial investment consultancy; retirement payment services; real estate affairs; consultancy, information and advisory services related to the foregoing; none of the aforesaid including credit card services; none relating to vehicle financing or insurance.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non- downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non-downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; providing online, non-downloadable privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non- downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non-downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non-downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non- downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non- downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non- downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non- downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non- downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non- downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non-downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; providing online, non-downloadable privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non- downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non-downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non-downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non- downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non-downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; providing online, non-downloadable privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non- downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non-downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non-downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non-downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; providing online, non-downloadable privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non-downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non- downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non-downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
54.
Systems and methods of controlling internet access using encrypted DNS
Described systems and methods enable protecting client devices (e.g., personal computers and IoT devices) implementing encrypted DNS protocols against harmful or inappropriate Internet content. A DNS proxy intercepts an attempt to establish an encrypted communication session between a client device and a DNS server. Without decrypting any communications, some embodiments of the DNS proxy determine an identifier of the respective session and an identifier of the client device, and send a query tracer connecting the session identifier with the client identifier to a security server. In some embodiments, the security server obtains the domain name included in an encrypted DNS query from the DNS server and instructs the DNS server to allow or block access of the client device to the respective Internet domain according to a device- and/or user-specific access policy.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non- downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non-downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; providing online, non-downloadable privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non-downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non-downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non-downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
Some embodiments employ a novel procedure of training an artificial intelligence system (e.g., set of deep neural networks) for anomaly detection in applications such as natural language processing and computer security. Token sequences selected from a training corpus are distorted according to at least one of a plurality of pre-determined sequence transformations, before being fed to a sequence analyzer. In turn, the sequence analyzer is trained to correctly guess which transformation was used to generate the respective input token sequence.
Some embodiments employ a novel procedure of training an artificial intelligence system (e.g., set of deep neural networks) for anomaly detection in applications such as natural language processing and computer security. Token sequences selected from a training corpus are distorted according to at least one of a plurality of pre-determined sequence transformations, before being fed to a sequence analyzer. In turn, the sequence analyzer is trained to correctly guess which transformation was used to generate the respective input token sequence.
Some embodiments employ a novel procedure of training an artificial intelligence system (e.g., set of deep neural networks) for anomaly detection in applications such as natural language processing and computer security. Token sequences selected from a training corpus are distorted according to at least one of a plurality of pre-determined sequence transformations, before being fed to a sequence analyzer. In turn, the sequence analyzer is trained to correctly guess which transformation was used to generate the respective input token sequence.
Described systems and methods allow protecting multiple wireless Internet-of- things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetootht Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non-downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non-downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non- downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non-downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; technical support services, namely, troubleshooting and diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of providing a website for featuring information about computer software; audit for computer software and networks in the nature of data security auditing; computer services for data recovery software, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non- downloadable software for accessing computer and software applications; rental of software applications, for ensuring the security data, privacy control, network security, computer program and systems, browsing, scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems; providing online non-downloadable anti-malware software applications; providing online non- downloadable computer software for providing network, Internet, and computer security; providing online non-downloadable computer software for providing online identity protection and parental control; providing online non-downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; providing online non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing online non-downloadable fraud protection software; providing online non- downloadable computer optimization software; providing online non-downloadable computer software to prevent, diagnose, and repair computer problems; providing online non-downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; providing online non-downloadable enterprise security software; providing online non-downloadable fire wall software; privacy control software; providing online non-downloadable content filtering software; providing online non-downloadable computer software for the creation of virtual private network; providing online non- downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; providing online non- downloadable computer software for use in updating other computer software; providing online non-downloadable computer software for use in administering networking applications; providing online non-downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; providing online non-downloadable computer software for file management and transfer; providing online non-downloadable computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; providing online non-downloadable computer software for use in file, disk and systems management; providing online non-downloadable computer software for use in data storage management and administering storage area networks; providing online non-downloadable computer software for backing up and restoring computer data; providing online non-downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing online non-downloadable computer software for generating reports from databases, computer software for scheduling automated processes; providing online non-downloadable computer software for use in the central management of computers attached to a computer network; providing online non-downloadable computer software for replicating and archiving files from one data store to another; providing online non-downloadable computer programs for operating data communications applications, and for the encryption and authentication of electronic information; providing online non- downloadable computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; providing online non-downloadable computer programs for managing the software configurations of computer systems and computer networks; providing online non-downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; providing online non-downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
G06F 16/22 - Indexing; Data structures therefor; Storage structures
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
H04L 9/16 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
67.
IMAGE DISTRIBUTION USING COMPOSITE RE-ENCRYPTED IMAGES
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
68.
Image distribution using composite re-encrypted images
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)
Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.
H04W 12/122 - Counter-measures against attacks; Protection against rogue devices
H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
H04W 12/48 - Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/55 - Detecting local intrusion or implementing counter-measures
75.
MACHINE LEARNING SYSTEMS AND METHODS FOR REDUCING THE FALSE POSITIVE MALWARE DETECTION RATE
In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/55 - Detecting local intrusion or implementing counter-measures
H04L 29/06 - Communication control; Communication processing characterised by a protocol
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; downloadable or recorded embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; providing Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development of software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; downloadable or recorded embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; providing Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development of software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
79.
Machine learning systems and methods for reducing the false positive malware detection rate
In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
Goods & Services
Electronic publications, namely, blogs featuring information in the fields of cyber-security and online privacy including but not limited to digital identity, data breaches, social media impersonations and identity theft, recorded on computer media; downloadable electronic publications, namely, blogs featuring information in the fields of cyber-security and online privacy including but not limited to digital identity, data breaches, social media impersonations and identity theft Electronic desktop publishing; providing on-line electronic publications, not downloadable, namely, blogs featuring information in the fields of cyber-security and online privacy including but not limited to digital identity, data breaches, social media impersonations and identity theft; publication of electronic books, on-line journals and web blogs; publication of electronic journals and web blogs featuring user generated and specified content; providing information regarding current event news in the field of cyber-threats, also in the form of searchable indexes and databases with information; providing non-downloadable electronic publications, namely, blogs featuring information in the fields of cyber-security and online privacy including but not limited to digital identity, data breaches, social media impersonations and identity theft
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
Goods & Services
Electronic publications, namely, newsletters, journals, blogs and books, recorded on computer media; downloadable electronic publications, namely, newsletters, journals, blogs and books; none relating to vehicles. Electronic desktop publishing; providing on-line electronic publications, not downloadable, such as newsletters, journals, blogs and books; publication of electronic books, on-line journals and web blogs; publication of electronic journals and web blogs featuring user generated and specified content; providing information regarding current event news in the field of cyber-threats, also in the form of searchable indexes and databases with information; providing non-downloadable electronic publications, namely, newsletters, journals, blogs and books; none related to vehicles.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; downloadable or recorded embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; providing Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development of software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; downloadable or recorded embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; providing Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development of software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded anti-malware software applications; downloadable or recorded computer software for providing network, Internet, and computer security; downloadable or recorded computer software for providing online identity protection and parental control; downloadable or recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable or recorded Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable or recorded fraud protection software; downloadable or recorded computer optimization software; downloadable or recorded computer software to prevent, diagnose, and repair computer problems; downloadable or recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable or recorded enterprise security software; downloadable or recorded fire wall software; downloadable or recorded privacy control software; downloadable or recorded content filtering software; downloadable or recorded computer software for the creation of virtual private network; downloadable or recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable or recorded computer software for use in updating other computer software; downloadable or recorded computer software for use in administering networking applications; downloadable or recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable or recorded computer software for file management and transfer; downloadable or recorded computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; downloadable or recorded computer software for use in file, disk and systems management; downloadable or recorded computer software for use in data storage management and administering storage area networks; downloadable or recorded computer software for backing up and restoring computer data; downloadable or recorded computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable or recorded computer software for generating reports from databases, computer software for scheduling automated processes; downloadable or recorded computer software for use in the central management of computers attached to a computer network; downloadable or recorded computer software for replicating and archiving files from one data store to another; downloadable or recorded computer programs for operating data communications applications, and for the encryption and authentication of electronic information; downloadable or recorded computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; downloadable or recorded computer programs for managing the software configurations of computer systems and computer networks; downloadable or recorded computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable or recorded computer programs for copying data from one electronic storage medium to another electronic storage medium; downloadable or recorded embedded software for network monitoring and security Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; providing Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development of software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security. Conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of Internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems.
89.
SYSTEMS AND METHODS FOR USING DNS MESSAGES TO SELECTIVELY COLLECT COMPUTER FORENSIC DATA
Described systems and methods allow a selective collection of computer security data from client devices such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device comprises a domain name service (DNS) proxy that tags outgoing DNS messages with a client ID. The DNS server selects a client for data collection by returning a DNS reply comprising a service activation flag. Some embodiments thus enable a per-DNS-message selectivity of data collection. In some embodiments, subsequent network access requests by the selected clients are re-routed to a security server for analysis.
Described systems and methods allow a selective collection of computer security data from client devices such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device comprises a domain name service (DNS) proxy that tags outgoing DNS messages with a client ID. The DNS server selects a client for data collection by returning a DNS reply comprising a service activation flag. Some embodiments thus enable a per-DNS-message selectivity of data collection. In some embodiments, subsequent network access requests by the selected clients are re-routed to a security server for analysis.
Described systems and methods allow a selective collection of computer security data from client devices such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device comprises a domain name service (DNS) proxy that tags outgoing DNS messages with a client ID. The DNS server selects a client for to data collection by returning a DNS reply comprising a service activation flag. Some embodiments thus enable a per-DNS-message selectivity of data collection. In some embodiments, subsequent network access requests by the selected clients are re-routed to a security server for analysis.
Some embodiments use text and/or image processing methods to determine whether a child is transmitting confidential information to a conversation partner via an electronic messaging service. Some embodiments detect whether an image transmitted as part of an electronic message shows a bank card, a social security card, or an identity document, among others. When detecting such a situation, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)
09 - Scientific and electric apparatus and instruments
Goods & Services
downloadable anti-malware computer software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise network, Internet, and computer security software; downloadable computer fire wall software; downloadable computer privacy control software; downloadable content filtering computer software; downloadable computer software for the creation of virtual private network; downloadable computer utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software for use in updating other computer network, Internet, and computer security software; downloadable computer software for use in administering networking applications; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; downloadable computer software for file management and transfer; downloadable computer software that provides firewalls, content filtering, intrusion alerts, virus protection, virtual private networking and other security functions and file serving storage management; downloadable computer software for use in file, disk and systems management; downloadable computer software for data storage management and administering storage area networks; downloadable computer software for backing up and restoring computer data; downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable computer software for generating reports from databases; downloadable computer software for scheduling automated processes; downloadable computer software for central management of computers attached to a computer network; downloadable computer software for replicating and archiving files from one data store to another; downloadable computer programs for encryption and authentication of electronic information for use in data communication applications; computer programs for use in the field of computer system administration, namely, downloadable computer software programs for the administration and management of computer programs and electronic data about computer systems; downloadable computer software programs for managing the software configurations of computer systems and computer networks; downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security
09 - Scientific and electric apparatus and instruments
Goods & Services
downloadable anti-malware computer software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise network, Internet, and computer security software; downloadable computer fire wall software; downloadable computer privacy control software; downloadable content filtering computer software; downloadable computer software for the creation of virtual private network; downloadable computer utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software for use in updating other computer network, Internet, and computer security software; downloadable computer software for use in administering networking applications; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; downloadable computer software for file management and transfer; downloadable computer software that provides firewalls, content filtering, intrusion alerts, virus protection, virtual private networking and other security functions and file serving storage management; downloadable computer software for use in file, disk and systems management; downloadable computer software for data storage management and administering storage area networks; downloadable computer software for backing up and restoring computer data; downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable computer software for generating reports from databases; downloadable computer software for scheduling automated processes; downloadable computer software for central management of computers attached to a computer network; downloadable computer software for replicating and archiving files from one data store to another; downloadable computer programs for encryption and authentication of electronic information for use in data communication applications; computer programs for use in the field of computer system administration, namely, downloadable computer software programs for the administration and management of computer programs and electronic data about computer systems; downloadable computer software programs for managing the software configurations of computer systems and computer networks; downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security
09 - Scientific and electric apparatus and instruments
Goods & Services
downloadable anti-malware computer software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise network, Internet, and computer security software; downloadable computer fire wall software; downloadable computer privacy control software; downloadable content filtering computer software; downloadable computer software for the creation of virtual private network; downloadable computer utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software for use in updating other computer network, Internet, and computer security software; downloadable computer software for use in administering networking applications; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; downloadable computer software for file management and transfer; downloadable computer software that provides firewalls, content filtering, intrusion alerts, virus protection, virtual private networking and other security functions and file serving storage management; downloadable computer software for use in file, disk and systems management; downloadable computer software for data storage management and administering storage area networks; downloadable computer software for backing up and restoring computer data; downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable computer software for generating reports from databases; downloadable computer software for scheduling automated processes; downloadable computer software for central management of computers attached to a computer network; downloadable computer software for replicating and archiving files from one data store to another; downloadable computer programs for encryption and authentication of electronic information for use in data communication applications; computer programs for use in the field of computer system administration, namely, downloadable computer software programs for the administration and management of computer programs and electronic data about computer systems; downloadable computer software programs for managing the software configurations of computer systems and computer networks; downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security
09 - Scientific and electric apparatus and instruments
Goods & Services
downloadable anti-malware computer software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise network, Internet, and computer security software; downloadable computer fire wall software; downloadable computer privacy control software; downloadable content filtering computer software; downloadable computer software for the creation of virtual private network; downloadable computer utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software for use in updating other computer network, Internet, and computer security software; downloadable computer software for use in administering networking applications; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; downloadable computer software for file management and transfer; downloadable computer software that provides firewalls, content filtering, intrusion alerts, virus protection, virtual private networking and other security functions and file serving storage management; downloadable computer software for use in file, disk and systems management; downloadable computer software for data storage management and administering storage area networks; downloadable computer software for backing up and restoring computer data; downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable computer software for generating reports from databases; downloadable computer software for scheduling automated processes; downloadable computer software for central management of computers attached to a computer network; downloadable computer software for replicating and archiving files from one data store to another; downloadable computer programs for encryption and authentication of electronic information for use in data communication applications; computer programs for use in the field of computer system administration, namely, downloadable computer software programs for the administration and management of computer programs and electronic data about computer systems; downloadable computer software programs for managing the software configurations of computer systems and computer networks; downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security
09 - Scientific and electric apparatus and instruments
Goods & Services
downloadable anti-malware computer software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise network, Internet, and computer security software; downloadable computer fire wall software; downloadable computer privacy control software; downloadable content filtering computer software; downloadable computer software for the creation of virtual private network; downloadable computer utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software for use in updating other computer network, Internet, and computer security software; downloadable computer software for use in administering networking applications; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; downloadable computer software for file management and transfer; downloadable computer software that provides firewalls, content filtering, intrusion alerts, virus protection, virtual private networking and other security functions and file serving storage management; downloadable computer software for use in file, disk and systems management; downloadable computer software for data storage management and administering storage area networks; downloadable computer software for backing up and restoring computer data; downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable computer software for generating reports from databases; downloadable computer software for scheduling automated processes; downloadable computer software for central management of computers attached to a computer network; downloadable computer software for replicating and archiving files from one data store to another; downloadable computer programs for encryption and authentication of electronic information for use in data communication applications; computer programs for use in the field of computer system administration, namely, downloadable computer software programs for the administration and management of computer programs and electronic data about computer systems; downloadable computer software programs for managing the software configurations of computer systems and computer networks; downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security
09 - Scientific and electric apparatus and instruments
Goods & Services
downloadable anti-malware computer software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, downloadable computer software for use in the monitoring and control of computer and online activity; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise network, Internet, and computer security software; downloadable computer fire wall software; downloadable computer privacy control software; downloadable content filtering computer software; downloadable computer software for the creation of virtual private network; downloadable computer utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software for use in updating other computer network, Internet, and computer security software; downloadable computer software for use in administering networking applications; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; downloadable computer software for file management and transfer; downloadable computer software that provides firewalls, content filtering, intrusion alerts, virus protection, virtual private networking and other security functions and file serving storage management; downloadable computer software for use in file, disk and systems management; downloadable computer software for data storage management and administering storage area networks; downloadable computer software for backing up and restoring computer data; downloadable computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; downloadable computer software for generating reports from databases; downloadable computer software for scheduling automated processes; downloadable computer software for central management of computers attached to a computer network; downloadable computer software for replicating and archiving files from one data store to another; downloadable computer programs for encryption and authentication of electronic information for use in data communication applications; computer programs for use in the field of computer system administration, namely, downloadable computer software programs for the administration and management of computer programs and electronic data about computer systems; downloadable computer software programs for managing the software configurations of computer systems and computer networks; downloadable computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; downloadable computer programs for copying data from one electronic storage medium to another electronic storage medium; computer hardware with embedded software for network monitoring and security
09 - Scientific and electric apparatus and instruments
Goods & Services
Anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security.
09 - Scientific and electric apparatus and instruments
Goods & Services
Anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, namely, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security.