CA2014868A1 - Computer file protection system - Google Patents

Computer file protection system

Info

Publication number
CA2014868A1
CA2014868A1 CA2014868A CA2014868A CA2014868A1 CA 2014868 A1 CA2014868 A1 CA 2014868A1 CA 2014868 A CA2014868 A CA 2014868A CA 2014868 A CA2014868 A CA 2014868A CA 2014868 A1 CA2014868 A1 CA 2014868A1
Authority
CA
Canada
Prior art keywords
security
computer
files
memory
security system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2014868A
Other languages
French (fr)
Other versions
CA2014868C (en
Inventor
Richard Paul Jones
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2014868A1 publication Critical patent/CA2014868A1/en
Application granted granted Critical
Publication of CA2014868C publication Critical patent/CA2014868C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention is a system for protecting the security of computer files. It has hardware elements, including a programmable auxiliary memory and control unit alomg with associated software elements. The security subsystem is installed on the host computer bus so that it resides in the control logic, address, and data signal path between the computer storage device and central processing unit. The security system is accessible by the computer operating system only during installation and initialization. Thereafter it is inaccessible to or by the operating system. Supervisor determined criteria for access permission to read, write and execute files are entered into the auxiliary memory system where they are protected from alteration. The security system will deny access to users with invalid entry criteria and refuse to write data to the file storage device when unauthorized operations have been performed. When breaches of these types occur the security system can lock the computer against further activity until it is released by entry of a master password from supervisory or security personnel. The system maintains a protected area in the computer memory device where, among other data, file signatures of all valid files are retained. The protected area of memory also maintains appropriate signatures of all internal files in the security system so that they can be automatically checked for integrity.
CA002014868A 1989-04-19 1990-04-19 Computer file protection system Expired - Fee Related CA2014868C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/340,886 US5144659A (en) 1989-04-19 1989-04-19 Computer file protection system
US07/340,886 1989-04-19

Publications (2)

Publication Number Publication Date
CA2014868A1 true CA2014868A1 (en) 1990-10-19
CA2014868C CA2014868C (en) 2000-07-04

Family

ID=23335345

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002014868A Expired - Fee Related CA2014868C (en) 1989-04-19 1990-04-19 Computer file protection system

Country Status (5)

Country Link
US (2) US5144659A (en)
EP (1) EP0422184A4 (en)
AU (1) AU5448390A (en)
CA (1) CA2014868C (en)
WO (1) WO1990013084A1 (en)

Families Citing this family (194)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5144659A (en) * 1989-04-19 1992-09-01 Richard P. Jones Computer file protection system
JP2966432B2 (en) * 1989-07-07 1999-10-25 シャープ株式会社 Electronics
GB9003890D0 (en) * 1990-02-21 1990-04-18 Rodime Plc Method and apparatus for controlling access to and corruption of information in computer systems
EP0449242A3 (en) * 1990-03-28 1992-10-28 National Semiconductor Corporation Method and structure for providing computer security and virus prevention
US5319776A (en) * 1990-04-19 1994-06-07 Hilgraeve Corporation In transit detection of computer virus with safeguard
FR2671205B1 (en) * 1990-12-27 1995-01-20 Telemecanique METHOD FOR CONTROLLING THE USE OF A COMPUTER WORKSTATION BY PASSWORD AND COMPUTER WORKSTATION USING THE SAME.
US5475625A (en) * 1991-01-16 1995-12-12 Siemens Nixdorf Informationssysteme Aktiengesellschaft Method and arrangement for monitoring computer manipulations
CA2035697A1 (en) * 1991-02-05 1992-08-06 Brian James Smyth Encryption apparatus for computer device
EP0501760B1 (en) * 1991-02-27 1998-09-23 Canon Kabushiki Kaisha Method for detecting improper rewriting of stored data
DE69225828T2 (en) * 1991-02-27 1998-11-12 Canon Kk Procedure for discovering incorrect overwriting of stored data
US5367682A (en) * 1991-04-29 1994-11-22 Steven Chang Data processing virus protection circuitry including a permanent memory for storing a redundant partition table
WO1992021087A1 (en) * 1991-05-13 1992-11-26 Hill, William, Stanley Method and apparatus for preventing 'disease' damage in computer systems
JPH04364548A (en) * 1991-06-11 1992-12-16 Matsushita Electric Ind Co Ltd Password input device
US5434562A (en) * 1991-09-06 1995-07-18 Reardon; David C. Method for limiting computer access to peripheral devices
US5208853A (en) * 1991-09-09 1993-05-04 Motorola, Inc. Method and apparatus for usage protection of data files using split key and unique variable
WO1993006695A1 (en) * 1991-09-23 1993-04-01 Z-Microsystems Enhanced security system for computing devices
JPH05274269A (en) * 1991-11-18 1993-10-22 Internatl Business Mach Corp <Ibm> Method and system for verifying validity of access in computer system
JP3305737B2 (en) * 1991-11-27 2002-07-24 富士通株式会社 Confidential information management method for information processing equipment
FI90385C (en) * 1992-03-11 1994-01-25 Salon Televisiotehdas Oy Identification of secret data signals in a unidirectional multi-point network
CN1068212A (en) * 1992-03-11 1993-01-20 邵通 Read-write controller for hard disk of microcomputer
DE4208777C1 (en) * 1992-03-17 1993-05-06 Jozsef O-4252 Lutherstadt Eisleben De Bugovics
DE4210163C1 (en) * 1992-03-25 1993-04-29 Jozsef O-4600 Wittenberg Lutherstadt De Bugovics Hardware protector for external mass data memory or disc used by personal computer - comprises plug-in card and raised data control card, with connector strip along one edge
US5421006A (en) * 1992-05-07 1995-05-30 Compaq Computer Corp. Method and apparatus for assessing integrity of computer system software
US5918007A (en) * 1992-05-27 1999-06-29 International Business Machines Corporation Trusted personal computer system with limited accessibility
US5359659A (en) * 1992-06-19 1994-10-25 Doren Rosenthal Method for securing software against corruption by computer viruses
US5235642A (en) * 1992-07-21 1993-08-10 Digital Equipment Corporation Access control subsystem and method for distributed computer system using locally cached authentication credentials
US5315655A (en) * 1992-12-16 1994-05-24 Notable Technologies, Inc. Method and apparatus for encoding data objects on a computer system
JPH06236325A (en) * 1993-02-08 1994-08-23 Sansei Denshi Japan Kk Data storage device
US5860099A (en) 1993-05-12 1999-01-12 Usar Systems, Inc. Stored program system with protected memory and secure signature extraction
US5521323A (en) * 1993-05-21 1996-05-28 Coda Music Technologies, Inc. Real-time performance score matching
US5963962A (en) 1995-05-31 1999-10-05 Network Appliance, Inc. Write anywhere file-system layout
US7174352B2 (en) 1993-06-03 2007-02-06 Network Appliance, Inc. File system image transfer
US6604118B2 (en) 1998-07-31 2003-08-05 Network Appliance, Inc. File system image transfer
JPH08511368A (en) 1993-06-04 1996-11-26 ネットワーク・アプリアンス・コーポレーション Method for forming parity in RAID subsystem using non-volatile memory
CA2101123C (en) * 1993-07-22 1997-12-30 Kok-Wah Yeow Absolute static lock of files and directories on magnetic disk storage media in single machine personal microcomputers
SE501105C2 (en) * 1993-11-17 1994-11-14 Telub Teknik Ab System for reading encrypted information and a device for use in such a system
US5475826A (en) * 1993-11-19 1995-12-12 Fischer; Addison M. Method for protecting a volatile file using a single hash
US5509120A (en) * 1993-11-30 1996-04-16 International Business Machines Corporation Method and system for detecting computer viruses during power on self test
US5689700A (en) * 1993-12-29 1997-11-18 Microsoft Corporation Unification of directory service with file system services
US5510780A (en) * 1994-02-18 1996-04-23 Profit Plus Corporation Time cycled security code and activation control system
US5572590A (en) * 1994-04-12 1996-11-05 International Business Machines Corporation Discrimination of malicious changes to digital information using multiple signatures
WO1995033239A1 (en) * 1994-05-26 1995-12-07 The Commonwealth Of Australia Secure computer architecture
JP2757777B2 (en) * 1994-05-26 1998-05-25 住友金属工業株式会社 Method and system for detecting unauthorized access to memory
US5483649A (en) * 1994-07-01 1996-01-09 Ybm Technologies, Inc. Personal computer security system
US5513351A (en) * 1994-07-28 1996-04-30 International Business Machines Corporation Protecting a system during system maintenance by usage of temporary filenames in an alias table
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5537540A (en) * 1994-09-30 1996-07-16 Compaq Computer Corporation Transparent, secure computer virus detection method and apparatus
US5586301A (en) * 1994-11-09 1996-12-17 Ybm Technologies, Inc. Personal computer hard disk protection system
US5657470A (en) * 1994-11-09 1997-08-12 Ybm Technologies, Inc. Personal computer hard disk protection system
US6279128B1 (en) * 1994-12-29 2001-08-21 International Business Machines Corporation Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing
US6724554B1 (en) 1995-03-10 2004-04-20 Iomega Corporation Read/write protect scheme for a disk cartridge and drive
US5644444A (en) * 1995-03-10 1997-07-01 Iomega Corporation Read/write protect scheme for a disk cartridge and drive
DE19510626A1 (en) * 1995-03-23 1996-09-26 Giesecke & Devrient Gmbh Method for checking the integrity of stored data on a processing system for sheet material, such as. B. banknotes or securities
EP0762337A3 (en) * 1995-09-08 2000-01-19 Francotyp-Postalia Aktiengesellschaft & Co. Method and device for enhancing manipulation-proof of critical data
US6401241B1 (en) * 1995-10-06 2002-06-04 Sun Microsystems, Inc. Class archive software packages
WO1997024665A1 (en) * 1995-12-28 1997-07-10 Eyal Dotan Method for protecting executable software programs against infection by software viruses
US6219423B1 (en) 1995-12-29 2001-04-17 Intel Corporation System and method for digitally signing a digital agreement between remotely located nodes
US5835594A (en) * 1996-02-09 1998-11-10 Intel Corporation Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage
US6263442B1 (en) * 1996-05-30 2001-07-17 Sun Microsystems, Inc. System and method for securing a program's execution in a network environment
US5987123A (en) * 1996-07-03 1999-11-16 Sun Microsystems, Incorporated Secure file system
US6052780A (en) * 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US5844986A (en) * 1996-09-30 1998-12-01 Intel Corporation Secure BIOS
FI103543B1 (en) * 1996-09-30 1999-07-15 Nokia Telecommunications Oy Marking of electronic documents
US6889214B1 (en) 1996-10-02 2005-05-03 Stamps.Com Inc. Virtual security device
US5822739A (en) * 1996-10-02 1998-10-13 E-Stamp Corporation System and method for remote postage metering
US5815571A (en) * 1996-10-28 1998-09-29 Finley; Phillip Scott Computer system with secured data paths and method of protection
US6202153B1 (en) 1996-11-22 2001-03-13 Voltaire Advanced Data Security Ltd. Security switching device
US5969632A (en) 1996-11-22 1999-10-19 Diamant; Erez Information security method and apparatus
ATE308171T1 (en) * 1997-02-13 2005-11-15 Walter A Helbig Sr SECURITY COPROCESSOR FOR IMPROVING COMPUTER SYSTEM SECURITY
US5953502A (en) * 1997-02-13 1999-09-14 Helbig, Sr.; Walter A Method and apparatus for enhancing computer system security
US6557104B2 (en) * 1997-05-02 2003-04-29 Phoenix Technologies Ltd. Method and apparatus for secure processing of cryptographic keys
US6237094B1 (en) 1997-05-21 2001-05-22 At&T Corporation System and method for using a second resource to store a data element from a first resource in a first-in first-out queue
US6098170A (en) * 1997-05-21 2000-08-01 At&T Corporation System and method for using a second resource to store a data element from a first resource in a first-in first-out queue
US6175924B1 (en) * 1997-06-20 2001-01-16 International Business Machines Corp. Method and apparatus for protecting application data in secure storage areas
US6212635B1 (en) * 1997-07-18 2001-04-03 David C. Reardon Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place
US6178536B1 (en) 1997-08-14 2001-01-23 International Business Machines Corporation Coding scheme for file backup and systems based thereon
CN1095564C (en) * 1997-09-02 2002-12-04 邵通 Restarting method for computer
US6243451B1 (en) 1997-10-09 2001-06-05 Alcatel Usa Sourcing, L.P. Service management access point
US5944820A (en) * 1997-10-15 1999-08-31 Dell U.S.A., L.P. Modifiable partition boot record for a computer memory device
US6098054A (en) * 1997-11-13 2000-08-01 Hewlett-Packard Company Method of securing software configuration parameters with digital signatures
US6516351B2 (en) 1997-12-05 2003-02-04 Network Appliance, Inc. Enforcing uniform file-locking for diverse file-locking protocols
US6457130B2 (en) * 1998-03-03 2002-09-24 Network Appliance, Inc. File access control in a multi-protocol file server
US6317844B1 (en) 1998-03-10 2001-11-13 Network Appliance, Inc. File server storage arrangement
US7096358B2 (en) * 1998-05-07 2006-08-22 Maz Technologies, Inc. Encrypting file system
US6981141B1 (en) * 1998-05-07 2005-12-27 Maz Technologies, Inc Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
WO1999066383A2 (en) * 1998-06-15 1999-12-23 Dmw Worldwide, Inc. Method and apparatus for assessing the security of a computer system
GB9812836D0 (en) 1998-06-16 1998-08-12 Ncr Int Inc Data security arrangement
US6279011B1 (en) 1998-06-19 2001-08-21 Network Appliance, Inc. Backup and restore for heterogeneous file server environment
DE69911161T2 (en) * 1998-07-22 2004-04-08 Matsushita Electric Industrial Co., Ltd., Kadoma DIGITAL DATA RECORDING DEVICE AND PROCESS FOR COPYRIGHT PROTECTION AND FOR EASIER PLAYBACK OF ENCRYPTED DATA AND CALCULAR READABLE MEDIUM FOR PROGRAM RECORDING
US6574591B1 (en) 1998-07-31 2003-06-03 Network Appliance, Inc. File systems image transfer between dissimilar file systems
US6119244A (en) * 1998-08-25 2000-09-12 Network Appliance, Inc. Coordinating persistent status information with multiple file servers
US6327660B1 (en) 1998-09-18 2001-12-04 Intel Corporation Method for securing communications in a pre-boot environment
US6338141B1 (en) * 1998-09-30 2002-01-08 Cybersoft, Inc. Method and apparatus for computer virus detection, analysis, and removal in real time
US6343984B1 (en) 1998-11-30 2002-02-05 Network Appliance, Inc. Laminar flow duct cooling system
ES2211500T3 (en) * 1999-01-07 2004-07-16 Remedan Aps CONTROL DEVICE FOR A COMPUTER, USE OF A CONTROL DEVICE, COMPUTER THAT UNDERSTANDS A CONTROL DEVICE, AND METHOD FOR CONNECTING AND DISCONNECTING UNITS ON A COMPUTER.
JP4294142B2 (en) 1999-02-02 2009-07-08 株式会社日立製作所 Disk subsystem
US6615224B1 (en) * 1999-02-23 2003-09-02 Lewis B. Davis High-performance UNIX file undelete
FI990414A (en) * 1999-02-26 2000-08-27 Nokia Multimedia Network Terminals Oy Method and switching arrangement to prevent unauthorized access to a microprocessor
US6564326B2 (en) 1999-07-06 2003-05-13 Walter A. Helbig, Sr. Method and apparatus for enhancing computer system security
US7330970B1 (en) * 1999-07-13 2008-02-12 Microsoft Corporation Methods and systems for protecting information in paging operating systems
US6961749B1 (en) 1999-08-25 2005-11-01 Network Appliance, Inc. Scalable file server with highly available pairs
US7043553B2 (en) * 1999-10-07 2006-05-09 Cisco Technology, Inc. Method and apparatus for securing information access
US6883120B1 (en) 1999-12-03 2005-04-19 Network Appliance, Inc. Computer assisted automatic error detection and diagnosis of file servers
US6715034B1 (en) 1999-12-13 2004-03-30 Network Appliance, Inc. Switching file system request in a mass storage system
KR20010096814A (en) * 2000-04-14 2001-11-08 홍기융 Digital Signature Certificate Based Security Kernel Method for File System Protection
US6971018B1 (en) * 2000-04-28 2005-11-29 Microsoft Corporation File protection service for a computer system
US6751794B1 (en) 2000-05-25 2004-06-15 Everdream Corporation Intelligent patch checker
US6931549B1 (en) 2000-05-25 2005-08-16 Stamps.Com Method and apparatus for secure data storage and retrieval
US7278023B1 (en) * 2000-06-09 2007-10-02 Northrop Grumman Corporation System and method for distributed network acess and control enabling high availability, security and survivability
US20040073617A1 (en) 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US6678833B1 (en) 2000-06-30 2004-01-13 Intel Corporation Protection of boot block data and accurate reporting of boot block contents
US6681304B1 (en) * 2000-06-30 2004-01-20 Intel Corporation Method and device for providing hidden storage in non-volatile memory
US6636879B1 (en) * 2000-08-18 2003-10-21 Network Appliance, Inc. Space allocation in a write anywhere file system
US6842770B1 (en) * 2000-08-18 2005-01-11 Apple Computer, Inc. Method and system for seamlessly accessing remotely stored files
US6728922B1 (en) 2000-08-18 2004-04-27 Network Appliance, Inc. Dynamic data space
US7072916B1 (en) 2000-08-18 2006-07-04 Network Appliance, Inc. Instant snapshot
US6813682B2 (en) 2000-09-29 2004-11-02 Steven Bress Write protection for computer long-term memory devices
US7117376B2 (en) * 2000-12-28 2006-10-03 Intel Corporation Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
EP1360585A4 (en) * 2001-02-14 2008-04-30 Invicta Networks Inc Systems and methods for creating a code inspection system
US6948165B1 (en) * 2001-02-28 2005-09-20 Western Digital Ventures, Inc. Method for installing an application program, to be executed during each bootload of a computer system for presenting a user with content options prior to conventional system startup presentation, without requiring a user's participation to install the program
GB2391979B (en) * 2001-03-28 2004-08-18 David C Reardon Apparatus and method for computer and network security
US7079652B1 (en) * 2001-05-01 2006-07-18 Harris Scott C Login renewal based on device surroundings
CA2490695C (en) * 2001-06-29 2014-08-12 Michael Alfred Hearn Security system and method for computers
DE10137505B4 (en) * 2001-07-16 2005-06-23 Francotyp-Postalia Ag & Co. Kg Arrangement and method for changing the functionality of a security module
US7167987B2 (en) * 2001-08-29 2007-01-23 Hewlett-Packard Development Company, L.P. Use of biometrics to provide physical and logic access to computer devices
US7693947B2 (en) 2002-03-08 2010-04-06 Mcafee, Inc. Systems and methods for graphically displaying messaging traffic
US6941467B2 (en) 2002-03-08 2005-09-06 Ciphertrust, Inc. Systems and methods for adaptive message interrogation through multiple queues
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US7903549B2 (en) 2002-03-08 2011-03-08 Secure Computing Corporation Content-based policy compliance systems and methods
US7694128B2 (en) 2002-03-08 2010-04-06 Mcafee, Inc. Systems and methods for secure communication delivery
US8578480B2 (en) 2002-03-08 2013-11-05 Mcafee, Inc. Systems and methods for identifying potentially malicious messages
US20060015942A1 (en) 2002-03-08 2006-01-19 Ciphertrust, Inc. Systems and methods for classification of messaging entities
US20030172291A1 (en) * 2002-03-08 2003-09-11 Paul Judge Systems and methods for automated whitelisting in monitored communications
US7870203B2 (en) 2002-03-08 2011-01-11 Mcafee, Inc. Methods and systems for exposing messaging reputation to an end user
US7124438B2 (en) * 2002-03-08 2006-10-17 Ciphertrust, Inc. Systems and methods for anomaly detection in patterns of monitored communications
US8132250B2 (en) 2002-03-08 2012-03-06 Mcafee, Inc. Message profiling systems and methods
US7458098B2 (en) * 2002-03-08 2008-11-25 Secure Computing Corporation Systems and methods for enhancing electronic communication security
US6715085B2 (en) * 2002-04-18 2004-03-30 International Business Machines Corporation Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
US7089419B2 (en) 2002-04-18 2006-08-08 International Business Machines Corporation Control function with multiple security states for facilitating secure operation of an integrated system
US7266842B2 (en) * 2002-04-18 2007-09-04 International Business Machines Corporation Control function implementing selective transparent data authentication within an integrated system
US6851056B2 (en) 2002-04-18 2005-02-01 International Business Machines Corporation Control function employing a requesting master id and a data address to qualify data access within an integrated system
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US6857001B2 (en) * 2002-06-07 2005-02-15 Network Appliance, Inc. Multiple concurrent active file systems
US7024586B2 (en) * 2002-06-24 2006-04-04 Network Appliance, Inc. Using file system information in raid data reconstruction and migration
US7509683B2 (en) * 2002-08-26 2009-03-24 Hewlett-Packard Development Company, L.P. System and method for authenticating digital content
US20040064457A1 (en) * 2002-09-27 2004-04-01 Zimmer Vincent J. Mechanism for providing both a secure and attested boot
GB0229759D0 (en) * 2002-12-20 2003-01-29 Becrypt Ltd Security device
US7246156B2 (en) * 2003-06-09 2007-07-17 Industrial Defender, Inc. Method and computer program product for monitoring an industrial network
US11037151B1 (en) 2003-08-19 2021-06-15 Stamps.Com Inc. System and method for dynamically partitioning a postage evidencing system
US7228432B2 (en) * 2003-09-11 2007-06-05 Angelo Michael F Method and apparatus for providing security for a computer system
US20050071656A1 (en) * 2003-09-25 2005-03-31 Klein Dean A. Secure processor-based system and method
US7461268B2 (en) * 2004-07-15 2008-12-02 International Business Machines Corporation E-fuses for storing security version data
US7784088B2 (en) 2004-07-30 2010-08-24 Research In Motion Limited Method and system for managing delayed user authentication
CA2575288C (en) 2004-07-30 2017-10-31 Research In Motion Limited Method and system for coordinating client and host security modules
DE102005014837B4 (en) 2004-08-02 2007-08-30 Mahltig, Holger Security module and method for controlling and controlling a data traffic of a personal computer
US8635690B2 (en) 2004-11-05 2014-01-21 Mcafee, Inc. Reputation based message processing
US20060150247A1 (en) * 2004-12-30 2006-07-06 Andrew Gafken Protection of stored data
US7409310B1 (en) 2005-01-21 2008-08-05 Z Microsystems, Inc. System and method for tracking operational data in a distributed environment
US7937480B2 (en) 2005-06-02 2011-05-03 Mcafee, Inc. Aggregation of reputation data
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8775331B1 (en) 2006-12-27 2014-07-08 Stamps.Com Inc Postage metering with accumulated postage
US8612361B1 (en) 2006-12-27 2013-12-17 Stamps.Com Inc. System and method for handling payment errors with respect to delivery services
US8763114B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Detecting image spam
US7949716B2 (en) 2007-01-24 2011-05-24 Mcafee, Inc. Correlation and analysis of entity attributes
US8179798B2 (en) 2007-01-24 2012-05-15 Mcafee, Inc. Reputation based connection throttling
US8214497B2 (en) 2007-01-24 2012-07-03 Mcafee, Inc. Multi-dimensional reputation scoring
US7779156B2 (en) 2007-01-24 2010-08-17 Mcafee, Inc. Reputation based load balancing
US8185930B2 (en) 2007-11-06 2012-05-22 Mcafee, Inc. Adjusting filter or classification control settings
US8045458B2 (en) 2007-11-08 2011-10-25 Mcafee, Inc. Prioritizing network traffic
US8160975B2 (en) 2008-01-25 2012-04-17 Mcafee, Inc. Granular support vector machine with random granularity
US8090904B2 (en) * 2008-02-01 2012-01-03 Cru Acquisition Group, Llc Reduced hard-drive-capacity detection device
US10373398B1 (en) 2008-02-13 2019-08-06 Stamps.Com Inc. Systems and methods for distributed activation of postage
US8589503B2 (en) 2008-04-04 2013-11-19 Mcafee, Inc. Prioritizing network traffic
US9978185B1 (en) 2008-04-15 2018-05-22 Stamps.Com Inc. Systems and methods for activation of postage indicia at point of sale
US7530106B1 (en) 2008-07-02 2009-05-05 Kaspersky Lab, Zao System and method for security rating of computer processes
US9911246B1 (en) 2008-12-24 2018-03-06 Stamps.Com Inc. Systems and methods utilizing gravity feed for postage metering
US9842308B1 (en) 2010-02-25 2017-12-12 Stamps.Com Inc. Systems and methods for rules based shipping
US10089797B1 (en) 2010-02-25 2018-10-02 Stamps.Com Inc. Systems and methods for providing localized functionality in browser based postage transactions
US8621638B2 (en) 2010-05-14 2013-12-31 Mcafee, Inc. Systems and methods for classification of messaging entities
US9208288B2 (en) * 2010-08-23 2015-12-08 Roy C Putrino System and method for remote patient monitoring and assessment to facilitate patient treatment
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US10713634B1 (en) 2011-05-18 2020-07-14 Stamps.Com Inc. Systems and methods using mobile communication handsets for providing postage
US10846650B1 (en) 2011-11-01 2020-11-24 Stamps.Com Inc. Perpetual value bearing shipping labels
US10922641B1 (en) 2012-01-24 2021-02-16 Stamps.Com Inc. Systems and methods providing known shipper information for shipping indicia
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9721225B1 (en) 2013-10-16 2017-08-01 Stamps.Com Inc. Systems and methods facilitating shipping services rate resale
US10417728B1 (en) 2014-04-17 2019-09-17 Stamps.Com Inc. Single secure environment session generating multiple indicia
US10339328B1 (en) 2014-07-15 2019-07-02 Cru Acquisition Group, Llc Securing stored computer files from modification
US10521754B2 (en) 2016-03-08 2019-12-31 Auctane, LLC Concatenated shipping documentation processing spawning intelligent generation subprocesses
US10452859B2 (en) * 2016-06-10 2019-10-22 Apple Inc. File system metadata protection
US10606766B1 (en) * 2017-07-14 2020-03-31 STEALTHbits Technologies, Inc. Systems and methods for shadow copy access prevention
JP6783812B2 (en) * 2018-03-13 2020-11-11 株式会社東芝 Information processing equipment, information processing methods and programs

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3893084A (en) * 1973-05-01 1975-07-01 Digital Equipment Corp Memory access control system
US4184200A (en) * 1978-04-26 1980-01-15 Sperry Rand Corporation Integrating I/O element
US4493028A (en) * 1982-02-02 1985-01-08 International Business Machines Corporation Dual mode I/O
US4588991A (en) * 1983-03-07 1986-05-13 Atalla Corporation File access security method and means
US4652990A (en) * 1983-10-27 1987-03-24 Remote Systems, Inc. Protected software access control apparatus and method
EP0175487A3 (en) * 1984-08-23 1989-03-08 Btg International Limited Software protection device
US4713753A (en) * 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control
US4797928A (en) * 1987-01-07 1989-01-10 Miu Automation Encryption printed circuit board
US5144659A (en) * 1989-04-19 1992-09-01 Richard P. Jones Computer file protection system

Also Published As

Publication number Publication date
CA2014868C (en) 2000-07-04
EP0422184A4 (en) 1992-04-15
AU5448390A (en) 1990-11-16
US5144659A (en) 1992-09-01
WO1990013084A1 (en) 1990-11-01
US5289540A (en) 1994-02-22
EP0422184A1 (en) 1991-04-17

Similar Documents

Publication Publication Date Title
CA2014868A1 (en) Computer file protection system
US5144660A (en) Securing a computer against undesired write operations to or read operations from a mass storage device
US4947318A (en) Data processing security system for automatically transferring software protection data from removable store into internal memory upon mounting of stores
US5341422A (en) Trusted personal computer system with identification
US5483649A (en) Personal computer security system
US5586301A (en) Personal computer hard disk protection system
US5742758A (en) Password protecting ROM based utilities in an adapter ROM
EP0165789A2 (en) Device for protecting computer software
CA2095087A1 (en) Computer system security method and apparatus having program authorization information data structures
GB2228350A (en) Memory protection against unauthorised access
WO1993009495A1 (en) Computer memory protection
JPS6237419B2 (en)
EP0560277A1 (en) Method and apparatus for controlling read and write of microcomputer hard disk
CN1021089C (en) Protecting mechanism for stored information
JPH01263724A (en) Method for preventing unauthorized use of software
EP1141805B1 (en) System for processing a security critical activity
Banks Is Microcomputer Security Being Approached Correctly?
IE914474A1 (en) Security of stored data
JP2541287B2 (en) System shared control block control method
Herweg et al. Trustworthiness and the MS‐DOS Environment
Hurst Answer to program piracy: Hardware protection.
Zagurek Protecting the database.
Goldis MVS Integrity: The Intruder's Point of View
Lancaster Security, Copyright and the Law
TECHti COMPUTERPEI SECURITY BULLETIN

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed