近期评论

分类目录

Methods and systems for analyzing data after initial analyses by known good and known bad security components

The present application is a continuation of U.S. patent application Ser. No. 16/443,697, entitled “METHODS AND SYSTEMS FOR CONDITIONALLY GRANTING ACCESS TO SERVICES BASED ON THE SECURITY STATE OF THE DEVICE REQUESTING ACCESS,” filed on Jun. 17, 2019 and this present application is a continuation of U.S. patent application Ser. No. 16/443,682, entitled “METHODS AND SYSTEMS FOR GRANTING ACCESS TO SERVICES BASED ON A SECURITY STATE THAT VARIES WITH THE SEVERITY OF SECURITY EVENTS,” also filed on Jun. 17, 2019, which are both continuations of U.S. patent application Ser. No. 16/000,712, entitled “METHODS AND SYSTEMS FOR BLOCKING POTENTIALLY HARMFUL COMMUNICATIONS TO IMPROVE THE FUNCTIONING OF AN ELECTRONIC DEVICE,” filed on Jun. 5, 2018, now U.S. Pat. No. 10,417,432, which is a continuation of U.S. patent application Ser. No. 15/687,395, entitled “METHODS AND SYSTEMS FOR BLOCKING THE INSTALLATION OF AN APPLICATION TO IMPROVE THE FUNCTIONING OF A MOBILE COMMUNICATIONS DEVICE,” filed on Aug…



Go To Top

无觅相关文章插件,快速提升流量