http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9509708-B2
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_3bdbaf37ff5ada6ec555b2d42015091d |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2101 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-145 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F16-1734 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-552 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F17-30144 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-566 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F17-30 |
filingDate | 2014-12-02-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate | 2016-11-29-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_cd19cbc3230c35c88db7556d3c0aa4ec |
publicationDate | 2016-11-29-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | US-9509708-B2 |
titleOfInvention | Security information and event management |
abstract | Systems and methods for universal interception of events. The methods involve: intercepting functions performed by an OS object manager which specify Physical Events (“PEs”) occurring therein, each PE comprising a real-time event occurring in an OS in runtime; obtaining PE information indicating which PEs are specified by the intercepted functions being performed by the OS object manager; analyzing the PE information to identify Virtual Events (“VEs”) which are associated with each PE, where each VE comprises an event occurring when one of a plurality of operations is performed by an OS subsystem which facilitates an occurrence of a respective PE; filtering VE information specifying the VEs identified as being associated with the PEs so as to generate filtered information specifying only select ones of the VEs; and placing the filtered information is a queue for subsequent processing to detect malware threats to a computing device. |
priorityDate | 2014-12-02-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 25.