• All Courts
  • Federal Courts
  • Bankruptcies
  • PTAB
  • ITC
Track Search
Export
Download All
Displaying 39-53 of 102 results

1075 Exhibit: Mohanty US9692778

Document IPR2025-00092, No. 1075 Exhibit - Mohanty US9692778 (P.T.A.B. Nov. 1, 2024)
For example, a mission critical Internet Banking web server may have multiple known vulnerabilities, but which of those present genuine risk to the organization may be unknown.
A second mechanism is to mark a virtual machine with a set of dynamic tags 202 such as VIRUS FOUND, INTRUSION DETECTED, etc., by security tech- nologies monitoring the same systems.
For example, a remediation module 326 could respond to a prioritization score 218 reaching a predetermined threshold, and produce a message, a report, an alert or a file, etc.
This action may be performed continuously, in a loop, on-demand, or respon- sive to changes to vulnerability data, threat information or 25 workload context of the asset, in various embodiments.
Accordingly, the present embodiments are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.
cite Cite Document

1022 Exhibit: Roberts , VMware Public Cloud 2018

Document IPR2025-00092, No. 1022 Exhibit - Roberts , VMware Public Cloud 2018 (P.T.A.B. Nov. 1, 2024)
In this way, service providers give existing and new VMware enterprise customers many options when they choose to build out their unified hybrid cloud strategy.
This unique combination provides complete multi-level security and a multi-tenant architecture that reduces combination provides complete multi-level security and a multi-tenant architecture that reduces complexity and supports policy implementation that can be consistent with your internal data center complexity and supports policy implementation that can be consistent with your internal data center and vCloud Air, offering a unified hybrid cloud experience to the consumers.
• VMware Powered Public Cloud — A model for enabling ubiquitous, convenient, on-demand network • VMware Powered Public Cloud – A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable resources that can be provisioned rapidly and released with access to a shared pool of configurable resources that can be provisioned rapidly and released with minimal management effort.
Helping organizations with the arduous tasks of meeting and maintaining HIPAA and the HITECH act regulatory compliance, VMware and its partners provide suites of industry- HIPAA and the HITECH act regulatory compliance, VMware and its partners provide suites of industry- leading, virtualization solutions that address the confidentiality, integrity, and availability requirements of leading, virtualization solutions that address the confidentiality, integrity, and availability requirements of
To determine the appropriate standard units of resource consumption, the VMware Powered Public Cloud To determine the appropriate standard units of resource consumption, the VMware Powered Public Cloud service provider can analyze current environment usage, user demand, trends, and business service provider can analyze current environment usage, user demand, trends, and business requirements.
cite Cite Document

1073 Exhibit: AmmonsMirage VMs as structured data Mirage Image library

Document IPR2025-00092, No. 1073 Exhibit - AmmonsMirage VMs as structured data Mirage Image library (P.T.A.B. Nov. 1, 2024)
This file-aware format is a departure from the unstructured block-based format is a departure from the unstructured block-based disk representations used in other image libraries, includ- disk representations used in other image libraries, includ- ing Moka5’s Engine [5, 11], its predecessor the Collec- ing Moka5's Engine [5, 11], its predecessor the Collec- tive [2], Microsoft’s Machine Bank [15], and the Inter- tive [2], Microsoft's Machine Bank [15], and the Inter- net Suspend/Resume system [12].
The advantage of a file-aware format is that it naturally supports useful ad- file-aware format is that it naturally supports useful ad- ministrative services such as governance (who did what ministrative services such as governance (who did what to which image when), software maintenance (offline se- to which image when), software maintenance (offline se- curity scan and certain kinds of patch operations), and an- curity scan and certain kinds of patch operations), and an- alytics (versioning, comparison, search).
This interface is tuned for high performance in several storage environments (e.g. high performance in several storage environments (e.g. SAN/iSCSI/DAS with or without a clustered file system SAN/iSCSI/DAS with or without a clustered file system like GPFS/VMFS), with overhead roughly equivalent to like GPFS/VMFS), with overhead roughly equivalent to a disk copy operation; some of our techniques for re- a disk copy operation; some of our techniques for re- ducing translation costs are described in Section 2.
For this reason, the indexer has a plugin architec- ture; Section 2 describes a technique called hybrid index- ture; Section 2 describes a technique called hybrid index- ing, that reduces the effort of developing filesystem plug- ing, that reduces the effort of developing filesystem plug- ins. ins. Another challenge is that converting a disk image to Another challenge is that converting a disk image to the Mirage format and back does not produce a bit-for- the Mirage format and back does not produce a bit-for- bit identical copy of the original.
Hybrid indexing is aimed at getting the best of both Hybrid indexing is aimed at getting the best of both worlds: access to individual files within an image with- worlds: access to individual files within an image with- out having to re-assemble or mount it, but without the out having to re-assemble or mount it, but without the complexity of dealing with the idiosyncracies of every complexity of dealing with the idiosyncracies of every filesystem we may encounter in customer environments.
cite Cite Document

1020 Exhibit: Sancheti US9116633

Document IPR2025-00092, No. 1020 Exhibit - Sancheti US9116633 (P.T.A.B. Nov. 1, 2024)
Inventors: Ashwin Gautamchand Sancheti, Ocean City, NJ (US); Rahul S. Pawar, Marlboro, NJ (US) (73) Assignee: Commvault Systems, Inc., Tinton Falls,
Cabrera et al., "ADSM: A Multi-Platform, Scalable, Backup and Archive Mass Storage System," Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Con- ference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA.
Cabrera et al., “ADSM: A Multi-Platform, Scalable, Backup and Archive Mass Storage System,” Digest of Papers, Compcon “95, Proceedings of the 40th IEEE Computer Society International Con- ference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA.
Balk Crockett et al. Dunphy et al. Huai et al. Ding et al. Squibb Kullick et al. Saxon Senator et al. Crouse et al. Whiting et al. Nielsen Johnson et al. Mortis Blumenau Ebrahim Ofek Perks Aviani, Jr. Beeler, Jr. Cannon et al. Anglin Ulrich et al. Kedem Ying Low et al. Sidwell Cannon et al. Urevig et al. Mutalik et al. Yeager Barney et al. Anglin Dunham Vahalia et al. Aoyama et al. Xu et al. Long Crighton Carteau Hubis et al. Eastridge et al. Goodman et al. Pothapragada et al. Devine et al. wee 718/1 Blumenau et al. Ofek et al. Devireddy et al. Lagueux, Jr. et al. O’Connor Ching et al. Nguyen et al. Crescenti et al.
VMware, Inc., "Vittualized iSCSI Sans: Flexible, Scalable Enter- prise Storage for Virtual Infrastructures," White Paper,
cite Cite Document

1030 Exhibit: Bairwa Vulnerability Scanners 2014

Document IPR2025-00092, No. 1030 Exhibit - Bairwa Vulnerability Scanners 2014 (P.T.A.B. Nov. 1, 2024)
Since most of the software developers are not aware of various security measures to be introduced into the system as their motive is just to make the software application measures to be introduced into the system as their motive is just to make the software application run in a desired state without taking into consideration the flaws that the programming language run in a desired state without taking into consideration the flaws that the programming language might have introduced into the system; to protect the users from the risk of being attacked by any might have introduced into the system; to protect the users from the risk of being attacked by any unauthorised access, it becomes significantly more important to devise new strategies and unauthorised access, it becomes significantly more important to devise new strategies and methodologies that will consider the security breaches to which the user is prone to.
Technique Author Clustered adjacency matrix Steven Noel Sushi N9,514 Hierarchical aggregation Steven Noel Sushi J jjRcLia Merits Automatic, parameter- free, and scales linearly with problem size Fran*work useful for both computational and cognitive scalability Demerits Need to calculate highest level of adjacency matrix for multistep reach li c, The process of interactive de- aggregation is potemiallytedious to determine low level details Minimization analysis S. Ma 0.
Wing Identifies the smallest set of countermeasures required to prevent all possible attack paths Ease and flexibility of modelling Approach is limited to Directed Acyclic Graph Difficult for security manager to make decision on actions to protect network Game theoretic K.W.
b) Site Crawling and Structure Mapping: The index file of web application is fetched b) Site Crawling and Structure Mapping: The index file of web application is fetched first, determined by the URL (e.g., http://192.168.1.128:80/ will load the main first, determined by the URL (e.g., http://192.168.1.128:80/ will load the main index.html).
Received responses are parsed to get links, forms, parameters, input fields, and client side scripts that builds a list of directories and files inside the web application.
cite Cite Document

1069 Exhibit: Vorbach US11061682

Document IPR2025-00092, No. 1069 Exhibit - Vorbach US11061682 (P.T.A.B. Nov. 1, 2024)
Fog, "The microarchitecture of Intel, AMD and VIA CPUs: An optimization guide for assembly programmers and compiler mak- ers", http://www.agner.org/optimize/microarchitecture.pdf, 1996- 2017, 233 pages.
Goulding-Hotta, et al., "The GreenDroid Mobile Application Pro- cessor: an Architecture for Silicon's Dark Future", University California, San Diego; Published by the IEEE Computer Society, Mar./Apr.
Rotenberg, et al., "Trace Cache: a Low Latency Approach to High Bandwith Instruction Fetching", Proceedings of the 29th annual ACM/IEEE international symposium on Microarchitecture.
Sima, Derso "Microarchitecture of Superscalars (3): Branch Pre- diction", Universitas Budensis , John von Neumann Faculty of Informatics, Fall 2007, 73 pages.
It will be obvious to the average skilled person however, that some if not all of the advantages of the present invention disclosed hereinafter might be obtainable, even if only to a lesser degree, if only some but not all similar elements of a group do have a particular property.
cite Cite Document

1047 Exhibit: Bourquin BinSlayer Accurate Comparison of Binary Executables

Document IPR2025-00092, No. 1047 Exhibit - Bourquin BinSlayer Accurate Comparison of Binary Executables (P.T.A.B. Nov. 1, 2024)
The system is implemented in a novel way that provides an accurate system is implemented in a novel way that provides an accurate final edit path to the analyst at the end of the diffing process, final edit path to the analyst at the end of the diffing process, and quantitative accuracy results are presented for the number and quantitative accuracy results are presented for the number of functions matched that conclusively demonstrate the value of of functions matched that conclusively demonstrate the value of this method.
BinSlayer BinDiff is able to match CG/CFG nodes with a high degree of ac- BinDiff is able to match CG/CFG nodes with a high degree of ac- curacy, however, it leaves it to the analyst to deal with unmatched curacy, however, it leaves it to the analyst to deal with unmatched sets of functions from compared executables, and it may be a long sets of functions from compared executables, and it may be a long and fastidious process to manually sort them and decide which and fastidious process to manually sort them and decide which have been deleted, inserted or modified.
A complete system called SMIT which performs automatic clas- A complete system called SMIT which performs automatic clas- sification of malware samples into families using the graph edit sification of malware samples into families using the graph edit distance metric has been realised by Hu et al [17].
The ratio- nale for building on top of Dynlnst is that when its so-called defen- nale for building on top of Dynlnst is that when its so-called defen- sive mode becomes available it will be able to deactivate defensive sive mode becomes available it will be able to deactivate defensive checks, and capture obfuscated control flow such as those based on checks, and capture obfuscated control flow such as those based on return address manipulation, exceptions, unpacking and instruction return address manipulation, exceptions, unpacking and instruction overwriting [22].
Conclusion Motivated by the problems of classifying malware, litigation Motivated by the problems of classifying malware, litigation against copyright infringement, and discovering security vulner- against copyright infringement, and discovering security vulner- abilities, we have developed a new technique for comparing the abilities, we have developed a new technique for comparing the structure of binary executables.
cite Cite Document

1070 Exhibit: Hutchins US 20130024940 A1

Document IPR2025-00092, No. 1070 Exhibit - Hutchins US 20130024940 A1 (P.T.A.B. Nov. 1, 2024)
The present invention con- fers the best of both worlds: highly efficient management of periodic spikes of computing resource demands with minimal impact on the normal operations of virtual machines.
[0030] Some interface is usually required between a VM 200 and the underlying host platform (in particular, the hard- ware CPU(s) 110 and any intermediate system-level software layers), which is responsible for actually submitting and executing VM-issued instructions and for handling I/O opera- tions, including transferring data to and from the hardware memory 130 and storage devices 140.
The host OS 420, which usually includes drivers 424 and supports applications 460 of its own, and the VMM are both able to directly access at least some of the same hardware resources, with conflicts being avoided by a context-switching mechanism.
Compared with a system in which VMMs run directly on the hardware platform (such as shown in FIG. 5), use of a kernel offers greater modularity and facilitates provision of services (for example, resource management) that extend across mul- tiple virtual machines.
These tasks can be common for databases (e.g., report gen- eration) and can be fairly resource-intensive, in terms of CPU cycles, amount of memory consumed and I/O bandwidth as well, depending on the nature of the data set and the com- plexity of the analysis performed.
cite Cite Document

1091 Exhibit: CVE 2007 0018

Document IPR2025-00092, No. 1091 Exhibit - CVE 2007 0018 (P.T.A.B. Nov. 1, 2024)
CVE-2007-0018 : Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multip… CVE-2007-0018 : Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multip... Nctsoft Products Nctaudiostudio Nctsoft Products Nctaudiostudio Nctsoft Products Nctdialogicvoice Nctsoft Products Nctdialogicvoice Nextlevel Systems Audio Editor Gold Nextlevel Systems Audio Editor Gold Nextlevel Systems Audio Studio Gold Nextlevel Systems Audio Studio Gold Quikscribe Quikscribe Player Quikscribe Quikscribe Player Quikscribe Quikscribe Recorder Quikscribe Quikscribe Recorder Recordnrip Recordnrip Recordnrip Recordnrip Rmbsoft Audioconvert Rmbsoft Aud ioconvert Rmbsoft Soundedit Pro Rmbsoft Sounded it Pro Roemer Software Easy Hi-q Converter Roemer Software Easy Hi-q Converter Roemer Software Easy Hi-q Recorder Roemer Software Easy Hi-q Recorder Roemer Software Free Hi-q Recorder Roemer Software Free Hi-q Recorder Sienzo Digital Music Mentor Sienzo Digital Music Mentor Smart Media Systems Power Audio Editor Smart Media Systems Power Audio Editor Softdiv Softare Dexster Softdiv Softare Dexster Softdiv Softare Ivideomax Softdiv Softare Ivideomax Softdiv Softare Mp3 To Wav Converter Softdiv Softare Mp3 To Way Converter Softdiv Softare Snosh Softdiv Softare Snosh Softdiv Softare Videozilla Softdiv Softare Videozilla Virtual Cd Virtual Cd Virtual Cd Virtual Cd Virtual Cd Virtual Cd File Server Virtual Cd Virtual Cd File Server Xrlly Software Arial Audio Converter Xrlly Software Arial Audio Converter Xrlly Software Arial Sound Recorder Xrlly Software Arial Sound Recorder Xrlly Software Text To Speech Maker Xrlly Software Text To Speech Maker Xwaver.com Magic Audio Editor Pro Xwaver.com Magic Audio Editor Pro Xwaver.com Magic Music Studio Pro Xwaver.com Magic Music Studio Pro - References For CVE-2007-0018 - References For CVE-2007-0018 http://secunia.com/advisories/23753 http://secunia.com/advisories/23753
com/archive/1/archive/1/457965/100/200/threaded BUGTRAQ 20070124 Re: Secunia Research: NCTsoft Products NCTAudioFile2 ActiveXControl Buffer Overflow BUGTRAQ 20070124 Re: Secunia Research: NCTsoft Products NCTAudioFile2 ActiveXControl Buffer Overflow http://www.securityfocus.com/bid/23892 http : //www.
Known limitations & technical details User agreement, disclaimer and privacy statement About & Contact Feedback How does it work?
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
cite Cite Document

1001 Exhibit: US Pat 11516231 Shua

Document IPR2025-00092, No. 1001 Exhibit - US Pat 11516231 Shua (P.T.A.B. Nov. 1, 2024)
Traditionally, traffic inspection is performed by a network device connected between a client and a server (deployed in a cloud computing platform or a data center) hosting virtual machines.
FIG. 2 is a flowchart illustrating a method detecting cyber threats, including potential vulnerabilities in virtual machines executed in a cloud computing platform according to some embodiments.
In some embodiments, the detected cyber threats (includ- ing vulnerabilities) are reported to a user console 180 and/or a security information and event management (SIEM) sys- tem (not shown).
FIG. 2 shows an example flowchart 200 illustrating a method for detecting cyber threats including potential vul- nerabilities in virtual machines executed in a cloud comput- ing platform according to some embodiments.
In an embodiment, S240 may include comparing the snapshot to some baseline, which may include, but is not limited to, a copy of the image used to create the VM, (e.g., lists of applications, previous snapshots), cryptographic hashes gathered in the previous scan, analyzing logs of the VMs, instantiating a copy of the VM and executing the instance or applications executed by the VM in a sandbox, analyzing the machine memory, as reflected in the page file, or any combination of these techniques.
cite Cite Document

1031 Exhibit: NIST IT Asset Mgmt 2018

Document IPR2025-00092, No. 1031 Exhibit - NIST IT Asset Mgmt 2018 (P.T.A.B. Nov. 1, 2024)
Michael Stone Michael Stone Leah Kauffman, Editor-in-Chief Leah Kauffman, Editor-in-Chief National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Information Technology Laboratory Information Technology Laboratory Chinedum Irrechukwu Chinedum Irrechukwu Harry Perper Harry Perper Devin Wynne Devin Wynne The MITRE Corporation The MITRE Corporation McLean, VA McLean, VA
Our example solution has the following benefits: Our example solution has the following benefits: enables faster responses to security alerts by revealing the location, configuration, and owner of ▪ enables faster responses to security alerts by revealing the location, configuration, and owner of a device a device ▪ increases cybersecurity resilience: you can focus attention on the most valuable assets increases cybersecurity resilience: you can focus attention on the most valuable assets provides detailed system information to auditors ▪ provides detailed system information to auditors determines how many software licenses are actually used in relation to how many have been ▪ determines how many software licenses are actually used in relation to how many have been paid for paid for ▪ reduces help desk response times: staff will know what is installed and the latest pertinent reduces help desk response times: staff will know what is installed and the latest pertinent errors and alerts errors and alerts ■ reduces the attack surface of each device by ensuring that software is correctly patched ▪ reduces the attack surface of each device by ensuring that software is correctly patched
Michael Stone Michael Stone Leah Kauffman, Editor-in-Chief Leah Kauffman, Editor-in-Chief National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Information Technology Laboratory Information Technology Laboratory Chinedum Irrechukwu Chinedum Irrechukwu Harry Perper Harry Perper Devin Wynne Devin Wynne The MITRE Corporation The MITRE Corporation McLean, VA McLean, VA
The example solution described in this guide has the following benefits: The example solution described in this guide has the following benefits: enables faster responses to security alerts by revealing the location, configuration, and owner of ▪ enables faster responses to security alerts by revealing the location, configuration, and owner of a device a device ▪ increases cybersecurity resilience: help security analysts focus on the most valuable or critical increases cybersecurity resilience: help security analysts focus on the most valuable or critical assets assets ▪ improves and reduces reporting time for management and auditing improves and reduces reporting time for management and auditing provides software license utilization statistics (to identify cost reduction opportunities) ▪ provides software license utilization statistics (to identify cost reduction opportunities) ▪ reduces help desk response times: staff already know what is installed and the latest pertinent reduces help desk response times: staff already know what is installed and the latest pertinent errors and alerts errors and alerts ▪ reduces the attack surface of machines by ensuring that software is correctly patched/updated reduces the attack surface of machines by ensuring that software is correctly patched/updated Other potential benefits include, but are not limited to rapid, transparent deployment and removal Other potential benefits include, but are not limited to rapid, transparent deployment and removal using consistent, efficient, and automated processes; improved situational awareness; and an improved using consistent, efficient, and automated processes; improved situational awareness; and an improved security posture gained from tracking and auditing access requests and other ITAM activity across all security posture gained from tracking and auditing access requests and other ITAM activity across all networks.
NIST SP 1800-5B: IT Asset Management NIST SP 1800-5B: IT Asset Management • instructions for implementers and security engineers, including examples of all the instructions for implementers and security engineers, including examples of all the necessary components and installation, configuration, and integration necessary components and installation, configuration, and integration ▪ is modular and uses products that are readily available and interoperable with your existing IT is modular and uses products that are readily available and interoperable with your existing IT infrastructure and investments infrastructure and investments Your organization can be confident that these results can be replicated: We performed functional Your organization can be confident that these results can be replicated: We performed functional testing and submitted the entire build to verification testing.
cite Cite Document

1014 Exhibit: Klemperer Efficient Hypervisor Based Malware Detection 2015

Document IPR2025-00092, No. 1014 Exhibit - Klemperer Efficient Hypervisor Based Malware Detection 2015 (P.T.A.B. Nov. 1, 2024)
The TIDSERV.M-based Auleron botnet also uses its kernel level privileges to steal login, password and credit card data Auleron botnet also uses its kernel level privileges to steal login, password and credit card data from the network traffic of infected systems.
Existing introspection implementations typically mask memory access performance deficiencies with limited checking or long detection latencies.
To counter memory access performance limits, introspection appli- cation designers may try to seek out opportunities to investigate only smaller, more critical parts cation designers may try to seek out opportunities to investigate only smaller, more critical parts of the guest state so that the overall impact of slow memory access is minimized.
This smaller attack surfaces reduces the threat that the virus will escape the guest and directly subvert or disable the security monitoring system in the hypervisor.
Further, polymorphic viruses, like those described by Sz¨or and Ferrie [12], encrypt themselves using self-modifying code techniques to hide described by Szor and Ferrie [12], encrypt themselves using self-modifying code techniques to hide from signature based antivirus mechanisms and only decrypt themselves while performing critical from signature based antivirus mechanisms and only decrypt themselves while performing critical (malicious) operations that might be missed if coherency were not maintained.
cite Cite Document

1057 Exhibit: CWE200 Information Exposure

Document IPR2025-00092, No. 1057 Exhibit - CWE200 Information Exposure (P.T.A.B. Nov. 1, 2024)
Many information exposures are resultant (e.g. PHP script error revealing the full path of the Many information exposures are resultant (e.g. PHP script error revealing the full path of the program), but they can also be primary (e.g. timing discrepancies in cryptography).
These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction.
In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
Scope Impact Impact Confidentiality Technical Impact: Read Application Data Confidentiality Technical Impact: Read Application Data Likelihood Likelihood Likelihood Of Exploit v" Likelihood Of Exploit High High Memberships V Memberships This MemberOf Relationships table shows additional CWE Categories and Views that reference This MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member.
Copyright © CWE is sponsored by US-CERT in the office of ybersecurity and Communications at the U.S. Department of Homeland Security.
cite Cite Document

1095 Exhibit: Burdett US20170372070A1 copy

Document IPR2025-00092, No. 1095 Exhibit - Burdett US20170372070A1 copy (P.T.A.B. Nov. 1, 2024)
AWS services span a wide range including com- pute , storage , networking , database , analytics , applications , pute, storage, networking, database, analytics, applications, deployment , management , developer tools , etc .
This may be accomplished in some implementations with an architecture that connects a scan implementations with an architecture that connects a scan- ning service directly to the cloud data storage associated ning service directly to the cloud data storage associated with a target application , in a manner that is intended to be with a target application, in a manner that is intended to be efficiently configured and managed .
In some implementations , the instructions are further executable by implementations, the instructions are further executable by the processor to take an action by setting a protection mode the processor to take an action by setting a protection mode for the file on the cloud storage service .
The threat, no matter how it is categorized, may need to be stopped at various points of a networked com need to be stopped at various points of a networked com- puting environment , such as one of an enterprise facility puting environment, such as one of an enterprise facility 102 , including at one or more laptops , desktops , servers , 102, including at one or more laptops, desktops, servers, gateways , communication ports , handheld or mobile gateways, communication ports, handheld or mobile devices , firewalls , and the like .
This approach may eliminate the inevitable overlaps and gaps in protection caused by treating viruses overlaps and gaps in protection caused by treating viruses and spyware as separate problems , while simultaneously and spyware as separate problems, while simultaneously simplifying administration and minimizing desktop load .
cite Cite Document

1056 Exhibit: Chari US20150033221

Document IPR2025-00092, No. 1056 Exhibit - Chari US20150033221 (P.T.A.B. Nov. 1, 2024)
A computer readable storage medium may be, for example, but not limited to, an elec- tronic, magnetic, optical, or semiconductor system, appara- tus, or device, or any suitable combination of the foregoing.
A virtual machine image typically emulates a physical computing environment, but requests for central processing unit (CPU), memory, hard disk drive, network interface card, and other hardware resources are managed by a virtualization layer that translates these requests to the underlying physical hardware.
[0029] Clients 110, 112, and 114 may be, for example, mobile data processing systems, such as cellular telephones, smart phones, personal digital assistants, gaming devices, or handheld computers, with wireless communication links to network 102.
For example, sanitization policies 236 may define that passwords and cryptographic keys having an attached high sensitivity level label within a virtual machine are to be deleted.
[0046] Program code 240 is located in a functional form on computer readable media 242 that is selectively removable and may be loaded onto or transferred to data processing system 200 for running by processor unit 204.
cite Cite Document
<< 1 2 3 4 5 6 7 8 >>