• All Courts
  • Federal Courts
  • Bankruptcies
  • PTAB
  • ITC
Track Search
Export
Download All
Displaying 84-98 of 102 results

1078 Exhibit: Hufsmith US20200097662A1

Document IPR2025-00092, No. 1078 Exhibit - Hufsmith US20200097662A1 (P.T.A.B. Nov. 1, 2024)
As a result , resources are often used without despite vulnerabili result, resources are often used without despite vulnerabili- ties ( even if an administrator or developer is capable of ties (even if an administrator or developer is capable of performing a thorough analysis ) due to the computational performing a thorough analysis) due to the computational and cognitive load associated with appropriately processing and cognitive load associated with appropriately processing surfaced vulnerabilities .
3A is a flowchart of an example of a process [0015] FIG. 3A is a flowchart of an example of a process executed by a plugin of a integrated development environ executed by a plugin of a integrated development environ- ment to annotate code specifying container images with ment to annotate code specifying container images with alerts relating to potential security vulnerabilities in accor alerts relating to potential security vulnerabilities in accor- dance with some embodiments of the present techniques ; dance with some embodiments of the present techniques; [ 0016 ] FIG .
[ 0029 ] Moreover , the various scanning engines available [0029] Moreover, the various scanning engines available today do not quantify a degree to which the disparate today do not quantify a degree to which the disparate potential vulnerabilities they detect pose a threat in a given , potential vulnerabilities they detect pose a threat in a given, and often highly complex , execution environment of dis and often highly complex, execution environment of dis- tributed applications .
Further, some embodiments are extensible in virtue of a unified application program interface ( API ) , so virtue of a unified application program interface (API), so other scanning results can be engaged as they become other scanning results can be engaged as they become available without undertaking expensive and cumbersome available without undertaking expensive and cumbersome rewrites of substantial portions of the code of some embodi rewrites of substantial portions of the code of some embodi- ments .
[ 0045 ] Each of the above described distributed applica [0045] Each of the above described distributed applica- tions , services , microservices , and components thereof may tions, services, microservices, and components thereof may be instantiated by way of one or more containers , or con be instantiated by way of one or more containers, or con- tainer images , which virtualize at the operating - system - level tainer images, which virtualize at the operating-system-level and are executed to perform their respective functions .
cite Cite Document

1109 Exhibit: VMware SDK 4870 9659 2882 v1

Document IPR2025-00092, No. 1109 Exhibit - VMware SDK 4870 9659 2882 v1 (P.T.A.B. Nov. 1, 2024)
The purpose of this reference guide is to help you familiarize yourself with the logical structure of N_\ gligfj\ f] k_‘j i\]\i\eZ\ ^l‘[\ ‘j kf _\cg pfl ]Xd‘c‘Xi‘q\ pflij\c] n‘k_ k_\ cf^‘ZXc jkilZkli\ f] the VMware VirtualCenter Web Service, the datatypes present in vma .
dXeX^\ PGnXi\ gif[lZkj i\dfk\cp) Interoperability — VMware uses the SOAP and WSDL (Web Services Description Language) Cek\ifg\iXY‘c‘kp s PGnXi\ lj\j k_\ MI;J Xe[ QM>F #Q\Y M\im‘Z\j >\jZi‘gk‘fe FXe^lX^\$ standards, so developers can program in their favorite environment, such as Java or jkXe[Xi[j’ jf [\m\cfg\ij ZXe gif^iXd ‘e k_\‘i ]Xmfi‘k\ \em‘ifed\ek’ jlZ_ Xj DXmX fi Microsoft° Visual Studio° .NET.
► HostInfo HostInfo uuid uuid hostnanie hostname port port system system migrationEnabled migrationEnabled datastore[[ datastore[ ] network[ network[ ] configLimits _ configLimits userConfig[ userConfig[ ] nnigrationInfo migrationInfo ► Systeminfo SystemInfo name name type type version version build build LNetvvorkInl o NetworkInfo key key device device ♦ ConfigLimits ConfigLimits maxAudio maxAudio maxFloppy maxFloppy maxNet maxNet maxParallel maxParallel inaxSerial maxSerial maxUSBController maxUSBController ideLimits ideLimits scsiLimits scsiLimits guestOS guestOS vmLimit vmLimit ► Property Property key key va I val MigrationInf o MigrationInfo network network ip ip gateway gateway subnet subnet ► Hardware Hardware cpu[] cpu[ ] memory memory HostState HostState status status detail detail connected connected bootTime bootTime eventCollector eventCollector —0.
Virtual Machine Virtual Machine guestlnfo guestInfo state state info info hardwar hardware path path GuestNetworkAdapter GuestNetworkAdapter key key network network ipAddress ipAddress pp msgWaiting msgWaiting msg msg id id choice choice defaultChoicelndex defaultChoiceIndex VirtualMachineTools VirtualMachineTools toolsVersion toolsVersion afterPoweron afterPoweron afterResume afterResume beforeSuspend beforeSuspend beforePowerOff beforePowerOff Guestlnfo GuestInfo hostname hostname ipAddress ipAddress net net toolsStatus toolsStatus toolsMounted toolsMounted heartbeatSampleInterval heartbeatSampleInterval heartbeatsExpected heartbeatsExpected heartbeatsReceived heartbeatsReceived config config VirtualMachineState VirtualMachineState host host bootTime bootTime status status detail detail migrating migrating connected connected eventCollector eventCollector msgWaiting msgWaiting VirtualMachinelnfo VirtualMachineInfo uuid uuid name name guestOS guestOS file crgVersion cfgVersion hwVersion hwVersion redoLogLocation redoLogLocation suspendDirectory suspendDirectory disableAcceleration disableAcceleration enableLogging enableLogging autostart autostart autostartCompleteAfter autostartCompleteAfter autostartCompleteWhenToolsStarted autostartCompleteWhenToolsStarted autostop autostop autostopCompleteAfter autostopCompleteAfter tools tools customPropertyDef customPropertyDef config[ config[ ] customProperty[ }- customProperty[ ] Property -4 Property key key val val VirtualHardware VirtualHardware …..
k_Xk ile Xk [‘]]\i\ek \m\ekj #jkXk\ Z_Xe^\j$ ‘e k_\ m‘iklXc dXZ_‘e\ c‘]\ ZpZc\) VirtualCPUlnfo VirtualCPUInfo count count controls controls VirtualMemorylnfo VirtualMemoryInfo sizeMb sizeMb controls controls VirtualNetworklnfo VirtualNetworkInfo adapter[] adapter[ ] controls _ controls VirtualDisklnfo VirtualDiskInfo key key name name dataLocator dataLocator controllerType controllerType controllerld controllerId deviceNumber deviceNumber adapterType adapterType diskType diskType mode mode writethru writethru legacy legacy removable removable hostDev hostDev exclusive exclusive raw raw GenericDevicel nfo GenericDeviceInfo key key name name type type removable removable property[] property[ ] ► DiskControls_ DiskControls shares shares VirtualHardware VirtualHardware cpu cpu memory memory net net disk — disk floppy[ floppy[ ] cdll cd[ ] device[ device[ ] --o-VirtualDisk VirtualDisk diskInfoll — diskInfo[ ] controls controls CPUControls CPUControls min min max max shares shares affinity affinity htsharing htsharing MemoryControls MemoryControls min min max max shares shares affinity affinity LVirtualNetworkAdapter VirtualNetworkAdapter key key name name emulation emulation mode mode device device network network addressType addressType address address features features NetworkControls NetworkControls shapingEnabled shapingEnabled averageRate averageRate peakRate peakRate burstSize burstSize DiskType DiskType diskKind diskKind diskDevicelnfo diskDeviceInfo diskFilelnfo diskFileInfo RemovableDeviceInfo RemovableDeviceInfo startConnected startConnected allowGuestControls allowGuestControls DiskDeviceInfo DiskDeviceInfo accessType accessType start start size size partitionType partitionType DiskFilelnfo DiskFileInfo size size flat flat monolithic monolithic (-
cite Cite Document

1019 Exhibit: Rawat US9881040

Document IPR2025-00092, No. 1019 Exhibit - Rawat US9881040 (P.T.A.B. Nov. 1, 2024)
Inventors: Mayank Rawat, Sunnyvale, CA (US); Ritesh Shukla , Saratoga , CA ( US ) ; Li Ritesh Shukla, Saratoga, CA (US); Li Ding , Cupertino , CA ( US ) ; Serge Ding, Cupertino, CA (US); Serge Pashenkov , Los Altos , CA ( US ) ; Pashenkov, Los Altos, CA (US); Raveesh Ahuja , San Jose , CA ( US ) Raveesh Ahuja, San Jose, CA (US) ( 73 ) Assignee : VMware , Inc .
Although these solutions have reduced the storage server - class , hardware platform 102 , and includes one or server-class, hardware platform 102, and includes one or Although these solutions have reduced the storage requirements of snapshots , further enhancements are needed more central processing units ( CPUs ) 103 , system memory more central processing units (CPUs) 103, system memory requirements of snapshots, further enhancements are needed 104 , one or more network interface controllers ( NICs ) 105 , for effective deployment in cloud computing environments 104, one or more network interface controllers (NICs) 105, for effective deployment in cloud computing environments where the number of VMs and snapshots that are managed and one or more host bus adapters ( HBAs ) 106 .
1 is a block diagram of a virtualized host computer hardware platform for VM 112 , supports the installation of hardware platform for VM 1121 supports the installation of FIG. 1 is a block diagram of a virtualized host computer system that implements a snapshot module according to 40 a guest OS 116 which is capable of executing applications 40 a guest OS 116 which is capable of executing applications system that implements a snapshot module according to 118 within VM 112 , .
4B depicts a flow diagram of method steps that are runs as an isolated process in user space on the host FIG. 4B depicts a flow diagram of method steps that are operating system and shares the kernel with other contain carried out in connection with taking snapshots according to operating system and shares the kernel with other contain- carried out in connection with taking snapshots according to an embodiment .
By using OS-less containers, resources can be current running point in the SMDS as the root node of the isolated , services restricted , and processes provisioned to most recent prior snapshot .
cite Cite Document

1046 Exhibit: Crabtree US10783241

Document IPR2025-00092, No. 1046 Exhibit - Crabtree US10783241 (P.T.A.B. Nov. 1, 2024)
100% success in identifying vulnerabilities and exploits, and TRIBUTED COMPUTATIONAL GRAPH ” , filed on Oct. as of yet no such system is deployed for large scale or TRIBUTED COMPUTATIONAL GRAPH", filed on Oct. as of yet no such system is deployed for large scale or 28 , 2015 , the entire specifications of each of which are commercial applications in automated analysis and defense 28, 2015, the entire specifications of each of which are commercial applications in automated analysis and defense incorporated herein by reference .
6 is a method diagram illustrating the use of the case that vulnerabilities and exploits in software are only FIG. 6 is a method diagram illustrating the use of the case that vulnerabilities and exploits in software are only advanced endpoint instrumentation to collect data on end found out and then patched some time after they are taken advanced endpoint instrumentation to collect data on end- found out and then patched some time after they are taken point devices across a network , according to a preferred advantage of , falling out of view of the system developers 10 point devices across a network, according to a preferred advantage of, falling out of view of the system developers aspect .
The following non - limiting summary of the invention is 30 The following non-limiting summary of the invention is provided for clarity , and should be construed consistently The inventor has conceived , and reduced to practice , a The inventor has conceived, and reduced to practice, a provided for clarity, and should be construed consistently with embodiments described in the detailed description system and methods for sandboxed malware analysis and system and methods for sandboxed malware analysis and with embodiments described in the detailed description automated patch development , deployment and validation .
One or more transformational filters, which It is also likely that that during times of heavy reporting from a moderate to large array of sensors , the instantaneous 10 include but a not limited to : mean , median , variance , stan 10 include but a not limited to: mean, median, variance, stan- from a moderate to large array of sensors, the instantaneous dard deviation , standard linear interpolation , or Kalman load of data to be committed will exceed what can be dard deviation, standard linear interpolation, or Kalman load of data to be committed will exceed what can be reliably transferred over a single swimlane .
The embodiment uses a key-value pair data store examples of which are Riak , Redis and Berkeley DB for which is application driven through the use of the Scala / Lift which is application driven through the use of the Scala/Lift examples of which are Riak, Redis and Berkeley DB for their low overhead and speed , although the invention is not development environment and web interaction operation development environment and web interaction operation their low overhead and speed, although the invention is not specifically tied to a single data store type to the exclusion 25 mediated by AWS ELASTIC BEANSTALKTM , both used 25 mediated by AWS ELASTIC BEANSTALKTM, both used specifically tied to a single data store type to the exclusion for standards compliance and ease of development .
cite Cite Document

1032 Exhibit: Li EP3360071B1

Document IPR2025-00092, No. 1032 Exhibit - Li EP3360071B1 (P.T.A.B. Nov. 1, 2024)
[0012] Fora more complete understanding of the con- figurations of the present disclosure, needs satisfied thereby, and the objects, features, and advantages there- of, reference now is made to the following description taken in connection with the accompanying drawings.
In one embodiment, sys- tem 100 may identify that a component has a vulnerability that is of a qualitatively or quantitatively higher or lower priority based upon the degree of malicious behavior available for malware.
In one embodiment, sys- tem 100 may identify that acomponent has a vulnerability that is of a qualitatively or quantitatively higher or lower priority based upon the degree of malicious behavior available for malware.
[0038] In one embodiment, security enterprise manag- er 126 may evaluate multiple vulnerabilities resulting from the file system and provide a ranked list of the vul- nerabilities discovered during scanning.
[0038] Inone embodiment, security enterprise manag- er 126 may evaluate multiple vulnerabilities resulting from the file system and provide a ranked list of the vul- nerabilities discovered during scanning.
cite Cite Document

1072 Exhibit: Derbeko US10536471

Document IPR2025-00092, No. 1072 Exhibit - Derbeko US10536471 (P.T.A.B. Nov. 1, 2024)
Applicant: EMC IP Holding Company LLC, Hopkinton , MA ( US ) Hopkinton, MA (US) Inventors : Philip Derbeko , Modiin ( IL ) ; Shai Inventors: Philip Derbeko, Modiin (IL); Shai Kappel , Bnaya ( IL ) ; Uriya Stern , Kappel, Bnaya (IL); Uriya Stern, Lehavim ( IL ) ; Maya Bakshi , Beer Lehavim (IL); Maya Bakshi, Beer Sheva ( IL ) ; Yaniv Harel , Sheva (IL); Yaniv Harel, Neve - Monosson ( IL ) Neve-Monosson (IL) ( 73 ) Assignee : EMC IP Holding Company LLC , Assignee: EMC IP Holding Company LLC,
Agents inside a pro- tected machine affects the performance of the VM it is 55 attempting to protect though the scanning and checking of all incoming and outgoing bytes, whether it is by network, storage, or web-browsing.
In various embodiments, the current disclosure may enable a user and/or administra- tor to identify suspicious changes to resources without creating more exposure to the possibly malicious code and/or malware.
FIGS. 3A-3C are simplified illustrations of state diagrams of a data storage system protected by a malware detection module, in accordance with an embodiment of the present disclosure.
General The methods and apparatus of this invention may take the form, at least partially, of program code (i.e., instructions) embodied in tangible non-transitory media, such as floppy diskettes, CD-ROMs, hard drives, random access or read only-memory, or any other machine-readable storage medium.
cite Cite Document

1111 Exhibit: Kapoor US10498845

Document IPR2025-00092, No. 1111 Exhibit - Kapoor US10498845 (P.T.A.B. Nov. 1, 2024)
( Continued ) (Continued) Primary Examiner — Mohamed A. Wasel Primary Examiner — Mohamed A. Wasel ( 74 ) Attorney , Agent , or Firm Van Pelt , Yi & James (74) Attorney, Agent, or Firm Van Pelt, Yi & James LLP LLP ( 57 )
Alex Beutel , “ User Behavior Modeling with Large - Scale Graph Alex Beutel, "User Behavior Modeling with Large-Scale Graph Analysis ” , Computer Science Department , Carnegie Mellon Uni Analysis", Computer Science Department, Carnegie Mellon Uni- versity , May 2016 .
Danai Koutra , “ Exploring and Making Sense of Large Graphs ” , Danai Koutra, "Exploring and Making Sense of Large Graphs", Computer Science Department , Carnegie Mellon University , Aug. Computer Science Department, Carnegie Mellon University, Aug. 2015 .
Jai Sundar Balasubramaniyan , Jose Omar Garcia - Fernandez , David Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff , Eugene Spafford , and Diego Zamboni .
Wathiq Laftah Al - Yaseen , Zulaiha Ali Othman , and Mohd Zakree Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri .
cite Cite Document

1038 Exhibit: Suneja Exploring VMI Techniques and Trade Offs 2015

Document IPR2025-00092, No. 1038 Exhibit - Suneja Exploring VMI Techniques and Trade Offs 2015 (P.T.A.B. Nov. 1, 2024)
sics [13, 14, 24, 31, 63]; touchless systems monitoring-sics [13, 14, 24, 31, 63]; touchless systems monitoring- sics [13, 14, 24, 31, 63]; touchless systems monitoring- tracking resource usage, ensuring system health and policy tracking resource usage, ensuring system health and policy tracking resource usage, ensuring system health and policy compliance [32, 67]; kernel integrity and security monitoring-compliance [32, 67]; kernel integrity and security monitoring- compliance [32, 67]; kernel integrity and security monitoring- intrusion detection, anti-malware, firewall and virus scan-intrusion detection, anti-malware, firewall and virus scan- intrusion detection, anti-malware, firewall and virus scan- ning [9, 23, 26-28, 34, 36, 38, 54, 64]; cloud management ning [9, 23, 26-28, 34, 36, 38, 54, 64]; cloud management ning [9, 23, 26–28, 34, 36, 38, 54, 64]; cloud management and infrastructure operations such as VM sizing and mi-and infrastructure operations such as VM sizing and mi- and infrastructure operations such as VM sizing and mi- gration, memory checkpointing and deduplication, device gration, memory checkpointing and deduplication, device gration, memory checkpointing and deduplication, device utilization monitoring, cloud-wide information flow track-utilization monitoring, cloud-wide information flow track- utilization monitoring, cloud-wide information flow track- ing and policy enforcement, cluster patch management, and ing and policy enforcement, cluster patch management, and ing and policy enforcement, cluster patch management, and VM similarity clustering [3, 8, 10, 15, 33, 58, 76].
There are different ways in which VMI gains visibility There are different ways in which VMI gains visibility There are different ways in which VMI gains visibility into the runtime state of a VM, ranging from exposing a into the runtime state of a VM, ranging from exposing a into the runtime state of a VM, ranging from exposing a raw byte-level VM memory view and traversing kernel data raw byte-level VM memory view and traversing kernel data raw byte-level VM memory view and traversing kernel data structures in it [5, 6, 14, 25, 40, 41, 46], to implanting pro- structures in it [5, 6, 14, 25, 40, 41, 46], to implanting pro- structures in it [5, 6, 14, 25, 40, 41, 46], to implanting pro- cesses or drivers into the guest [16, 29].
Therefore, applica- tion developers have different alternatives to choose from tion developers have different alternatives to choose from tion developers have different alternatives to choose from based on their desired levels of latency, frequency, over- based on their desired levels of latency, frequency, over- based on their desired levels of latency, frequency, over- head, liveness, consistency, and intrusiveness, constrained head, liveness, consistency, and intrusiveness, constrained head, liveness, consistency, and intrusiveness, constrained by their workloads, use-cases, resource budget and deploya-by their workloads, use-cases, resource budget and deploya- by their workloads, use-cases, resource budget and deploya- bility flexibility.
Discussion: (i) We do not include live snapshotting in our Discussion: (i) We do not include live snapshotting in our Discussion: (i) We do not include live snapshotting in our quantitative evaluation because of the unavailability of a quantitative evaluation because of the unavailability of a quantitative evaluation because of the unavailability of a standalone implementation (patch or library) for our KVM standalone implementation (patch or library) for our KVM standalone implementation (patch or library) for our KVM testbed, while its qualitative performance measures are bor- testbed, while its qualitative performance measures are bor- testbed, while its qualitative performance measures are bor- rowed from [35].
Another interesting observation is the markedly high im- Another interesting observation is the markedly high im- Another interesting observation is the markedly high im- pact on the disk throughputs with memory dumping, as com- pact on the disk throughputs with memory dumping, as com- pact on the disk throughputs with memory dumping, as com- pared to the CPU intensive benchmark, which moreover pared to the CPU intensive benchmark, which moreover pared to the CPU intensive benchmark, which moreover shows no improvement even when the monitoring frequency shows no improvement even when the monitoring frequency shows no improvement even when the monitoring frequency is reduced from 0.1Hz to 0.01Hz.
cite Cite Document

1076 Exhibit: Milner US10055576 CVE matching

Document IPR2025-00092, No. 1076 Exhibit - Milner US10055576 CVE matching (P.T.A.B. Nov. 1, 2024)
, Raleigh , NC ( US ) (71) Applicant: Red Hat, Inc., Raleigh, NC (US) (71) Applicant: Red Hat, Inc., Raleigh, NC (US) ( 72 ) Inventors : Steve Bradford Milner , Tallahassee , (72) (72) Inventors: Steve Bradford Milner, Tallahassee, Inventors: Steve Bradford Milner, Tallahassee, FL ( US ) ; James Robert Bowes , FL (US); James Robert Bowes, FL (US); James Robert Bowes, Remote , OR ( US ) Remote, OR (US) Remote, OR (US) ( 73 ) Assignee : Red Hat , Inc .
Seth Kelby Vidal , “ Systems and Methods for Restoring Machine Seth Kelby Vidal, "Systems and Methods for Restoring Machine State History Related to Detected Faults in Package Update Pro State History Related to Detected Faults in Package Update Pro- cess " , U .
Seth Kelby Vidal , “ Systems and Methods for Generating Exportable Seth Kelby Vidal, "Systems and Methods for Generating Exportable Encoded Identifications of Networked Machines Based on Installed Encoded Identifications of Networked Machines Based on Installed Package Profiles ” , U .
4A illustrates a flowchart of an exemplary process not pose a danger to computing system due to malicious FIG. 4A illustrates a flowchart of an exemplary process not pose a danger to computing system due to malicious for verifying and certifying a software package is secure code , at the time of scanning .
For example, the computing system 102 can request to download and install Additionally , the black list 122 can include hashed versions Additionally, the black list 122 can include hashed versions computing system 102 can request to download and install of the components ( archival files ) .
cite Cite Document

1010 Exhibit: Waldspurger Memory Resource Management in VMware 2002

Document IPR2025-00092, No. 1010 Exhibit - Waldspurger Memory Resource Management in VMware 2002 (P.T.A.B. Nov. 1, 2024)
Virtual machines are also convenient abstractions of server workloads, since they cleanly encapsulate the entire state of a running sys- tem, including both user-level applications and kernel- mode operating system services.
The design of ESX Server dif- fers significantly from VMware Workstation, which uses a hosted virtual machine architecture [23] that takes ad- vantage of a pre-existing operating system for portable I/O device support.
(a) Ten Windows NT VMs serving users at a Fortune 50 company, running a va- riety of database (Oracle, SQL Server), web (IIS, Websphere), development (Java, VB), and other applications.
ESX Server employs a similar approach, but uses four thresholds to reflect different reclamation states: high, soft, hard, and low, which default to 6%, 4%, 2%, and 1% of system memory, respectively.
The ESX Server mechanism for working-set estima- tion is related to earlier uses of page faults to main- tain per-page reference bits in software on architectures lacking direct hardware support [2].
cite Cite Document

1023 Exhibit: NIST Security Patches 2002

Document IPR2025-00092, No. 1023 Exhibit - NIST Security Patches 2002 (P.T.A.B. Nov. 1, 2024)
To assist fed- eral agencies and industry respond to eral agencies and industry respond to vulnerabilities in a timely manner, vulnerabilities in a timely manner, ITL recently released two new publi- ITL recently released two new publi- cations dealing with vulnerabilities in cations dealing with vulnerabilities in computer systems: NIST Special Pub- computer systems: NIST Special Pub- lication (SP) 800-40, Procedures for lication (SP) 800-40, Procedures for Handling Security Patches, by Peter Handling Security Patches, by Peter Mell and Miles C. Tracy, and NIST Mell and Miles C. Tracy, and NIST SP 800-51, Use of the Common Vulner- SP 800-51, Use of the Common Vulner- abilities and Exposures (CVE) Vulnera- abilities and Exposures (CVE) Vulnera- bility Naming Scheme, by Peter Mell bility Naming Scheme, by Peter Mell and Tim Grance.
Security Patches Security Patches Failure to keep operating system and Failure to keep operating system and application software up to date is a application software up to date is a common mistake made by IT profes- common mistake made by IT profes- sionals.
For exam- ple, communications to FedCIRC ple, communications to FedCIRC or other incident response teams or other incident response teams should reference, where known, the should reference, where known, the CVE vulnerability name that newly CVE vulnerability name that newly observed exploits are targeting.
Finally, we acknowledge the leadership, Finally, we acknowledge the leadership, vision, and initiative of the MITRE vision, and initiative of the MITRE Corporation and the various contribu- Corporation and the various contribu- tors in the public and private sectors in tors in the public and private sectors in creating, maintaining, and operating creating, maintaining, and operating the CVE repository.
palsanbad aDVVIDS SSaIPPV Address Service Requested 00E$ asn D1PApd .10.4 Alieuad Penalty for Private Use $300 ssau!sna leP44O Official Business 0068-6680Z CIV\I tunqsiataeg Gaithersburg, MD 20899-8900 0068 dols 'antra neaina 001 100 Bureau Drive, Stop 8900 National Institute of Standards and Technology Abolouipai pue spJepuels jo almpsui leuoPPN 3)213/VINOD JO 11\131AllelVd3C1 .S.fl
cite Cite Document

1065 Exhibit: Thakar US9900333

Document IPR2025-00092, No. 1065 Exhibit - Thakar US9900333 (P.T.A.B. Nov. 1, 2024)
( 72 ) Inventors : Sumedh Thakar , San Jose , CA ( US ) ; Inventors: Sumedh Thakar, San Jose, CA (US); Inventors: Sumedh Thakar, San Jose, CA (US); (72) (72) Bharat Patel , Belmont , CA ( US ) ; Bharat Patel, Belmont, CA (US); Bharat Patel, Belmont, CA (US); Balaji Venkatesan , Foster City , CA Balaji Venkatesan, Foster City, CA Balaji Venkatesan, Foster City, CA ( US ) ; Tristan Burch , Denver , CO ( US ) ; (US); Tristan Burch, Denver, CO (US); (US); Tristan Burch, Denver, CO (US); Sean M .
When conflicting data is received, a may also include liquid crystal displays ( LCDs ) , touch may also include liquid crystal displays (LCDs), touch determination may be made as to which source is more determination may be made as to which source is more screen displays , keyboards , keypads , switches , dials , mice , screen displays, keyboards, keypads, switches, dials, mice, reliable , and the data from the more reliable source may be reliable, and the data from the more reliable source may be track balls , voice recognizers , card readers , paper tape track balls, voice recognizers, card readers, paper tape used for determining the vulnerability state .
Agent FIG. 2 is a data flow diagram of an embodiment of a 130 may comprise a memory 131 , a processor 132 , and / or an system for detecting vulnerability state deltas .
A hacker or views may be created based upon the number of monitored other malicious actor may gain access to internal network machines .
In other embodiments, deltas may be updated networked computing environments include hardware and periodically based on time or amount of data received or 35 software infrastructures configured to form a virtual orga periodically based on time or amount of data received or 35 software infrastructures configured to form a virtual orga- other factors that may trigger a change in vulnerabilities .
cite Cite Document

1051 Exhibit: WorkstationPro VMWare Workstation Pro 14

Document IPR2025-00092, No. 1051 Exhibit - WorkstationPro VMWare Workstation Pro 14 (P.T.A.B. Nov. 1, 2024)
If you are creating a remote virtual machine on an ESX host, you can also select a VMware Paravirtual SCSI (PVSCSI) adapter.
Drivers for a Mylex (BusLogic) compatible host bus adapter are not obvious on the LSI Logic Web site.
Search the support (BusLogic) compatible host bus adapter are not obvious on the LSI Logic Web site.
Corruption is possible if you allow the virtual machine to modify a partition that is simultaneously mounted on the host operating system.
If the installer prompts you for a product key, user name, or password, click in the virtual machine If the installer prompts you for a product key, user name, or password, click in the virtual machine window and type the required information.
cite Cite Document

1028 Exhibit: Di Pietro Virtualization Technologies and Cloud Security 2018

Document IPR2025-00092, No. 1028 Exhibit - Di Pietro Virtualization Technologies and Cloud Security 2018 (P.T.A.B. Nov. 1, 2024)
Sanctum prototype leverages a RISC-V [57] core but is quite flexible in that it adds hardware at the interfaces between generic building blocks, replacing SGX's microcode with a software security monitor that runs at a higher privilege level than the hypervisor and the OS.
Sanctum prototype leverages a RISC-V [57] core but is quite flexible in that it adds hardware at the interfaces between generic building blocks, replacing SGX’s microcode with a software security monitor that runs at a higher privilege level than the hypervisor and the OS.
In fact, software integrity attestation future perspectives are good, given that ARM CPUs increas- ingly support virtualization extensions that allow implementing hypervisors that can run and monitor trusted VMs even on mobile/handheld devices [13].
In fact, software integrity attestation future perspectives are good, given that ARM CPUs increas- ingly support virtualization extensions that allow implementing hypervisors that can run and monitor trusted VMs even on mobile/handheld devices [13].
Roberto Di Pietro would like to thank Sushil Jajodia for the guidance and support received when he was a young PhD student visiting his Center for Secure Information Systems at GMU—a pivotal experience in Roberto’s professional life—and, above all, for Sushil’s life-long example of dedication and commitment to pursue research excellence.
cite Cite Document

1085 Exhibit: HOVOR US20170048266A1

Document IPR2025-00092, No. 1085 Exhibit - HOVOR US20170048266A1 (P.T.A.B. Nov. 1, 2024)
In some implementations, a system may build a [0024] In some implementations, a system may build a cyber-risk model using current threat intelligence data and cyber-risk model using current threat intelligence data and information about assets and their interdependencies information about assets and their interdependencies through a Software defined infrastructure.
Some implementations of the factors that impact the simu Some implementations of the factors that impact the simu- lation may include an asset's degrees of separation from the lation may include an asset's degrees of separation from the edge, severity and recency of Vulnerabilities, and indicator edge, severity and recency of vulnerabilities, and indicator or observable confidence.
The system may determine potential paths of compromise that system may determine potential paths of compromise that pose the greatest risk, impact to the business, and prioritized pose the greatest risk, impact to the business, and prioritized courses of action that can be acted upon based on contex courses of action that can be acted upon based on contex- tualized, severe Vulnerabilities.
In Some implementations, the system may use Markov Chain some implementations, the system may use Markov Chain Monte Carlo methods to determine which Vulnerability of a Monte Carlo methods to determine which vulnerability of a particular asset should be compromised during an attack particular asset should be compromised during an attack simulation.
In some implementations, the system may use [0036] In some implementations, the system may use Markov Chain Monte Carlo methods to determine how to Markov Chain Monte Carlo methods to determine how to distribute a level of effort of an adversary’s device in distribute a level of effort of an adversary's device in attempting to compromise assets.
cite Cite Document
<< 1 2 3 4 5 6 7 8 >>