• All Courts
  • Federal Courts
  • Bankruptcies
  • PTAB
  • ITC
Track Search
Export
Download All
Displaying 69-83 of 102 results

1114 Exhibit: TutorialPoints Linus Managment

Document IPR2025-00092, No. 1114 Exhibit - TutorialPoints Linus Managment (P.T.A.B. Nov. 1, 2024)
The simplest way to start a background process is to add an ampersand (&) at the end of the command.
$1s ch*.doc & This displays all those files the names of which start with ch and end with .doc — ch01-1.doc ch010.doc ch02.doc ch03-2.doc ch04-1.doc ch040.doc ch05.doc ch06-2.doc ch01-2.doc ch02-1.doc Here, if the Is command wants any input (which it does not), it goes into a stop state until we move it into the foreground and give it the data from the keyboard.
Press the Enter key and you will see the following — [1] + Done is ch*.doc & $ The first line tells you that the Is command background process finishes successfully.
To be precise, a daemon is a process that runs in the background, usually waiting for something to happen that it is capable of working with.
It is an interactive diagnostic tool that updates frequently and shows information about physical and virtual memory, CPU usage, load averages, and your busy processes.
cite Cite Document

1084 Exhibit: Czarny US9749349

Document IPR2025-00092, No. 1084 Exhibit - Czarny US9749349 (P.T.A.B. Nov. 1, 2024)
( 72 ) Inventors : Benjamin Czarny , San Francisco , CA Inventors: Benjamin Czarny, San Francisco, CA Inventors: Benjamin Czarny, San Francisco, CA (72) (72) ( US ) ; Jianpeng Mo , Burlingame , CA (US); Jianpeng Mo, Burlingame, CA (US); Jianpeng Mo, Burlingame, CA ( US ) ; Ali Rezafard , Millbrae , CA ( US ) ; (US); Ali Rezafard, Millbrae, CA (US); (US); Ali Rezafard, Millbrae, CA (US); David Matthew Patt , Kansas City , MO David Matthew Patt, Kansas City, MO David Matthew Patt, Kansas City, MO
The diate response to eliminate a threat to the computer device diate response to eliminate a threat to the computer device computerized system receives product vulnerability data and computerized system receives product vulnerability data and of a potentially imminent malicious event .
In some embodiments, the order to prevent security problems , while allowing business product binary data contains strings of bits , bytes , words or order to prevent security problems, while allowing business product binary data contains strings of bits, bytes, words or operations to proceed with minimal interruption .
11 is a simplified schematic diagram of a vulner bits , bytes , words or characters that were extracted , 4 ) the bits, bytes, words or characters that were extracted, 4) the FIG. 11 is a simplified schematic diagram of a vulner- ability database system for use in the example computer complete binary level files of the software products , or 5 ) complete binary level files of the software products, or 5) ability database system for use in the example computer security vulnerability assessment system shown in FIG .
Conventional security vulnerabil- be apparent to those skilled in the art that modifications and ity assessment systems use such file identification data ( to variations can be made in the present technology without 30 30 ity assessment systems use such file identification data (to variations can be made in the present technology without departing from the spirit and scope thereof .
cite Cite Document

1074 Exhibit: VMwareInfrastructure

Document IPR2025-00092, No. 1074 Exhibit - VMwareInfrastructure (P.T.A.B. Nov. 1, 2024)
VMware Infrastructure delivers comprehensive virtualization, management, resource delivers comprehensive virtualization, management, resource optimization, application availability and operational automa- optimization, application availability and operational automa- tion capabilities in an integrated offering.
A number of similarly configured x86 servers can be grouped together with connections to the same network and grouped together with connections to the same network and storage subsystems to provide an aggregate set of resources in storage subsystems to provide an aggregate set of resources in the virtual environment, called a Cluster.
As demonstrated by the example, Resource Pools can be As demonstrated by the example, Resource Pools can be nested, organized hierarchically and dynamically reconfigured nested, organized hierarchically and dynamically reconfigured so that the IT environment matches the company organiza- so that the IT environment matches the company organiza- tion.
If a new physical server is made available, VMware DRS auto- If a new physical server is made available, VMware DRS auto- matically redistributes the virtual machines to take advantage matically redistributes the virtual machines to take advantage of it.
RDM provides a mechanism for a virtual machine to have direct access to a a mechanism for a virtual machine to have direct access to a LUN on the physical storage subsystem (Fiber Channel or iSCSI LUN on the physical storage subsystem (Fiber Channel or iSCSI only).
cite Cite Document

1016 Exhibit: Souppaya, NIST Application Container 2017

Document IPR2025-00092, No. 1016 Exhibit - Souppaya, NIST Application Container 2017 (P.T.A.B. Nov. 1, 2024)
Application Container Security Guide Application Container Security Guide Murugiah Souppaya Murugiah Souppaya John Morello John Morello Karen Scarfone Karen Scarfone This publication is available free of charge from: This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-190 https://doi.org/10.6028/NIST.SP.800-190
This publication is available free of charge from: This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-190 https://doi.org/10.6028/NIST.SP.800-190 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
Today's OS virtualization technologies are primarily focused on providing a portable, reusable, and automatable way to package and run applications (apps).
Traditional vulnerability management tools make many assumptions about host durability and Traditional vulnerability management tools make many assumptions about host durability and app update mechanisms and frequencies that are fundamentally misaligned with a containerized app update mechanisms and frequencies that are fundamentally misaligned with a containerized model.
Often, a container-specific OS uses a read- only file system design to reduce the likelihood of an attacker being able to persist data within it, only file system design to reduce the likelihood of an attacker being able to persist data within it, and it also utilizes a simplified upgrade process since there is little concern around app and it also utilizes a simplified upgrade process since there is little concern around app compatibility.
cite Cite Document

1027 Exhibit: Verizon DBIR 2019

Document IPR2025-00092, No. 1027 Exhibit - Verizon DBIR 2019 (P.T.A.B. Nov. 1, 2024)
Variety: Variety: More specific enumerations of higher level categories - e.g., More specific enumerations of higher level categories - e.g., classifying the external “bad guy” as an organized criminal group, classifying the external "bad guy" as an organized criminal group, or recording a hacking action as SQL injection or brute force.
Threat actor motives in breaches over time cn Breaches co The results found in this and subsequent sections The results found in this and subsequent sections within the report are based on a data set collected within the report are based on a data set collected from a variety of sources such as publicly-disclosed from a variety of sources such as publicly-disclosed security incidents, cases provided by the Verizon security incidents, cases provided by the Verizon Threat Research Advisory Center (VTRAC) Threat Research Advisory Center (VTRAC) investigators, and by our external collaborators.
Figure 11 shows Denial of Service attacks are again at the top shows Denial of Service attacks are again at the top of action varieties associated with security incidents, of action varieties associated with security incidents, but it is still very rare for DoS to feature in a confirmed but it is still very rare for DoS to feature in a confirmed data breach.
Social Social While hacking and malicious code may be the words While hacking and malicious code may be the words that resonate most with people when the term “data that resonate most with people when the term "data breach” is used, there are other threat action catego- breach" is used, there are other threat action catego- ries that have been around much longer and are still ries that have been around much longer and are still ubiquitous.
Users often interact with their mobile devices while walking, talking, their mobile devices while walking, talking, driving, and doing all manner of other activities driving, and doing all manner of other activities that interfere with their ability to pay careful that interfere with their ability to pay careful attention to incoming information.
cite Cite Document

1018 Exhibit: Scarfone, NIST Full Virtualization Technologies 2011

Document IPR2025-00092, No. 1018 Exhibit - Scarfone, NIST Full Virtualization Technologies 2011 (P.T.A.B. Nov. 1, 2024)
Acknowledgments Acknowledgments The authors, Karen Scarfone of G2, Inc., Murugiah Souppaya of the National Institute of Standards and The authors, Karen Scarfone of G2, Inc., Murugiah Souppaya of the National Institute of Standards and Technology (NIST), and Paul Hoffman of the VPN Consortium, wish to thank their colleagues who Technology (NIST), and Paul Hoffman of the VPN Consortium, wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content.
Introduction Introduction 1.1 Authority 1.1 Authority The National Institute of Standards and Technology (NIST) developed this document in furtherance of its The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347.
Because of the constantly changing nature of full virtualization technologies, readers are encouraged to Because of the constantly changing nature of full virtualization technologies, readers are encouraged to take advantage of other resources (including those listed in this document) for more current and detailed take advantage of other resources (including those listed in this document) for more current and detailed information.
For example, early versions of VirtualPC allowed users to run the Microsoft Windows OS on the PowerPC processor supported by the Apple MacOS platform.
A storage network is dedicated to perform these migrations or the transport channel is fully authenticated and encrypted to preserve the integrity of the VMs and prevent information leakage.
cite Cite Document

1102 Exhibit: CVE CVE 2018 1312

Document IPR2025-00092, No. 1102 Exhibit - CVE CVE 2018 1312 (P.T.A.B. Nov. 1, 2024)
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed.
_.;iimi =Illi..=, Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities.
Disclaimer: The entry creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
de Entry Created 20171207 %ACP f I canary' Assigned (20171207) --losed (Legacy)
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.
cite Cite Document

1021 Exhibit: NIST Cloud Computing 2013

Document IPR2025-00092, No. 1021 Exhibit - NIST Cloud Computing 2013 (P.T.A.B. Nov. 1, 2024)
ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer the cost-effective security and privacy of sensitive unclassified information in federal computer systems.
Departments of Agriculture, Commerce, Defense, Health & Human Services, Homeland Security, Justice, Transportation, Treasury, State, and Veterans Affairs.
This information is intended for use by federal agencies and other stakeholders to help plan their participation in voluntary consensus standards development and stakeholders to help plan their participation in voluntary consensus standards development and related conformity assessment activities, which can help to accelerate the agencies' secure adoption related conformity assessment activities, which can help to accelerate the agencies’ secure adoption of cloud computing.
At the beginning of 2011, NIST created the following public working groups in order to provide a At the beginning of 2011, NIST created the following public working groups in order to provide a technically oriented strategy and standards-based guidance for the federal cloud computing technically oriented strategy and standards-based guidance for the federal cloud computing implementation effort: implementation effort:
The Recommendations are that agencies identify and consider all PII that may be collected or otherwise exposed through a particular digital technology, analyze the privacy risks through the or otherwise exposed through a particular digital technology, analyze the privacy risks through the data life cycle by conducting and updating a PIA (as needed), and provide notice to individuals of data life cycle by conducting and updating a PIA (as needed), and provide notice to individuals of when and how their PII will be collected, used, retained, and disclosed.
cite Cite Document

1059 Exhibit: CWE359 Exposure of Private Information

Document IPR2025-00092, No. 1059 Exhibit - CWE359 Exposure of Private Information (P.T.A.B. Nov. 1, 2024)
Extended Description v• Extended Description Mishandling private information, such as customer passwords or Social Security numbers, can Mishandling private information, such as customer passwords or Social Security numbers, can compromise user privacy and is often illegal.
An exposure of private information does not necessarily prevent the software from working properly, and in fact it might be intended by necessarily prevent the software from working properly, and in fact it might be intended by the developer, but it can still be undesirable (or explicitly prohibited by law) for the people the developer, but it can still be undesirable (or explicitly prohibited by law) for the people who are associated with this private information.
Categories of private information may overlap or vary based on the intended usage or the policies and practices of a particular industry.
Depending on its location, the type of business it conducts, and the nature of any private data Depending on its location, the type of business it conducts, and the nature of any private data it handles, an organization may be required to comply with one or more of the following it handles, an organization may be required to comply with one or more of the following federal and state regulations: - Safe Harbor Privacy Framework [REF-340] - Gramm-Leach federal and state regulations: - Safe Harbor Privacy Framework [REF-340] - Gramm-Leach Bliley Act (GLBA) [REF-341] - Health Insurance Portability and Accountability Act (HIPAA) Bliley Act (GLBA) [REF-341] - Health Insurance Portability and Accountability Act (HIPAA) [REF-342] - California SB-1386 [REF-343].
These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction.
cite Cite Document

1002 Exhibit: Declaration of Dr Angelos Stavrou

Document IPR2025-00092, No. 1002 Exhibit - Declaration of Dr Angelos Stavrou (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1066 Exhibit: Zhou Always up to date scalable offline patch

Document IPR2025-00092, No. 1066 Exhibit - Zhou Always up to date scalable offline patch (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1081 Exhibit: Budko US20100169948

Document IPR2025-00092, No. 1081 Exhibit - Budko US20100169948 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1101 Exhibit: CVE CVE 2018 15687

Document IPR2025-00092, No. 1101 Exhibit - CVE CVE 2018 15687 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1039 Exhibit: Payne Simplifying VMI Using LibVMI 2012

Document IPR2025-00092, No. 1039 Exhibit - Payne Simplifying VMI Using LibVMI 2012 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1035 Exhibit: Lengyel Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Ma...

Document IPR2025-00092, No. 1035 Exhibit - Lengyel Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware (P.T.A.B. Nov. 1, 2024)

cite Cite Document
<< 1 2 3 4 5 6 7 8 >>