USRE43987E1 - System and method for protecting a computer system from malicious software - Google Patents
System and method for protecting a computer system from malicious software Download PDFInfo
- Publication number
- USRE43987E1 USRE43987E1 US13/015,186 US201113015186A USRE43987E US RE43987 E1 USRE43987 E1 US RE43987E1 US 201113015186 A US201113015186 A US 201113015186A US RE43987 E USRE43987 E US RE43987E
- Authority
- US
- United States
- Prior art keywords
- data
- memory space
- logical process
- processor
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Abstract
Description
U.S. patent | ||
or PUB | ||
Application | ||
Number | Title | Inventor(s) |
5,826,013 | Polymorphic virus detection module. | Nachenberg |
5,978,917 | Detection and elimination of macro | Chi |
viruses. | ||
6,735,700 | Fast virus scanning using session | Flint, et al |
stamping. | ||
6,663,000 | Validating components of a malware | Muttik, et al. |
scanner. | ||
6,553,377 | System and process for maintaining a | Eschelbeck, |
plurality of remote security applications | et al. | |
using a modular framework in a | ||
distributed computing environment. | ||
6,216,112 | Method for software distribution and | Fuller, et al. |
compensation with replenishable | ||
advertisements. | ||
4,890,098 | Flexible window management on a | Dawes, et al. |
computer display. | ||
5,555,364 | Windowed computer display. | Goldstein |
5,666,030 | Multiple window generation in computer | Parson |
display. | ||
5,995,103 | Window grouping mechanism for | Ashe |
creating, manipulating and displaying | ||
windows and window groups on a display | ||
screen of a computer system. | ||
5,502,808 | Video graphics display system with | Goddard, et al. |
adapter for display management based | ||
upon plural memory sources. | ||
5,280,579 | Memory mapped interface between host | Nye |
computer and graphics system. | ||
5,918,039 | Method and apparatus for display of | Buswell, et al |
windowing application programs on a | ||
terminal. | ||
6,480,198 | Multi-function controller and method for a | Kang |
computer graphics display system. | ||
6,167,522 | Method and apparatus for providing | Lee, et al. |
security for servers executing application | ||
programs received via a network | ||
6,199,181 | Method and system for maintaining | Rechef, et al. |
restricted operating environments for | ||
application programs or operating | ||
systems. | ||
6,275,938 | Security enhancement for untrusted | Bond, et al. |
executable code. | ||
6,321,337 | Method and system for protecting | Reshef, et al. |
operations of trusted internal networks. | ||
6,351,816 | System and method for securing a | Mueller, et al. |
program's execution in a network | ||
environment. | ||
6,546,554 | Browser-independent and automatic | Schmidt, et al. |
apparatus and method for receiving, | ||
installing and launching applications from | ||
a browser on a client computer. | ||
6,658,573 | Protecting resources in a distributed | Bischof, et al |
computer system. | ||
6,507,904 | Executing isolated mode instructions in a | Ellison, et al. |
secure system running in privilege rings. | ||
6,633,963 | Controlling access to multiple memory | Ellison, et al. |
zones in an isolated execution | ||
environment. | ||
6,678,825 | Controlling access to multiple isolated | Ellison, et al. |
memories in an isolated execution | ||
environment. | ||
5,751,979 | Video hardware for protected, | McCrory |
multiprocessing systems. | ||
6,581,162 | Method for securely creating, storing and | Angelo, et al. |
using encryption keys in a computer | ||
system. | ||
6,134,661 | Computer network security device and | Topp |
method. | ||
6,578,140 | Personal computer having a master | Policard |
computer system and in internet computer | ||
system and monitoring a condition of said | ||
master and internet computer systems | ||
PUB | E-mail software and method and system | Jacobs, Paul E., |
Application # | for distributing advertisements to client | et al. |
20040054588 | devices that have such e-mail software | |
installed thereon. | ||
PUB | System and method for comprehensive | Mayer, Yaron; |
Application # | general generic protection for computers | et al. |
20040034794 | against malicious programs that may steal | |
information and/or cause damages | ||
PUB | System and method for providing security | Skrepetos, |
Application # | to a remote computer over a network | Nicholas C. |
20040006715 | browser interface. | |
PUB | Virus protection in an internet | Samman, Ben |
Application # | environment. | |
20030177397 | ||
PUB | System and method for protecting | Pham, Khai; |
Application # | computer users from web sites hosting | et al. |
20030097591 | computer viruses. | |
PUB | Malware infection suppression. | Hinchliffe, |
Application # | Alexander | |
20030023857 | James; et al. | |
PUB | Access control for computers. | Riordan, James |
Application # | ||
20020066016 | ||
PUB | Detecting malicious alteration of stored | Wolff, Daniel |
Application # | computer files. | Joseph; et al. |
20020174349 | ||
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/015,186 USRE43987E1 (en) | 2004-08-07 | 2011-01-27 | System and method for protecting a computer system from malicious software |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/913,609 US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
US12/854,149 USRE43103E1 (en) | 2004-08-07 | 2010-08-10 | System and method for protecting a computer system from malicious software |
US13/015,186 USRE43987E1 (en) | 2004-08-07 | 2011-01-27 | System and method for protecting a computer system from malicious software |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Reissue US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE43987E1 true USRE43987E1 (en) | 2013-02-05 |
Family
ID=35759063
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Active - Reinstated 2026-07-18 US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
US12/720,147 Active 2026-07-18 USRE43528E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/720,207 Active 2026-07-18 USRE43500E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/854,149 Active 2026-07-18 USRE43103E1 (en) | 2004-08-07 | 2010-08-10 | System and method for protecting a computer system from malicious software |
US12/941,067 Active 2026-07-18 USRE43529E1 (en) | 2004-08-07 | 2010-11-07 | System and method for protecting a computer system from malicious software |
US13/015,186 Active 2026-07-18 USRE43987E1 (en) | 2004-08-07 | 2011-01-27 | System and method for protecting a computer system from malicious software |
Family Applications Before (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Active - Reinstated 2026-07-18 US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
US12/720,147 Active 2026-07-18 USRE43528E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/720,207 Active 2026-07-18 USRE43500E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/854,149 Active 2026-07-18 USRE43103E1 (en) | 2004-08-07 | 2010-08-10 | System and method for protecting a computer system from malicious software |
US12/941,067 Active 2026-07-18 USRE43529E1 (en) | 2004-08-07 | 2010-11-07 | System and method for protecting a computer system from malicious software |
Country Status (1)
Country | Link |
---|---|
US (6) | US7484247B2 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130347114A1 (en) * | 2012-04-30 | 2013-12-26 | Verint Systems Ltd. | System and method for malware detection |
US9923913B2 (en) | 2013-06-04 | 2018-03-20 | Verint Systems Ltd. | System and method for malware detection learning |
US10142426B2 (en) | 2015-03-29 | 2018-11-27 | Verint Systems Ltd. | System and method for identifying communication session participants based on traffic patterns |
US10198427B2 (en) | 2013-01-29 | 2019-02-05 | Verint Systems Ltd. | System and method for keyword spotting using representative dictionary |
US10491609B2 (en) | 2016-10-10 | 2019-11-26 | Verint Systems Ltd. | System and method for generating data sets for learning to identify user actions |
US10546008B2 (en) | 2015-10-22 | 2020-01-28 | Verint Systems Ltd. | System and method for maintaining a dynamic dictionary |
US10560842B2 (en) | 2015-01-28 | 2020-02-11 | Verint Systems Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US10614107B2 (en) | 2015-10-22 | 2020-04-07 | Verint Systems Ltd. | System and method for keyword searching using both static and dynamic dictionaries |
US10630588B2 (en) | 2014-07-24 | 2020-04-21 | Verint Systems Ltd. | System and method for range matching |
US10958613B2 (en) | 2018-01-01 | 2021-03-23 | Verint Systems Ltd. | System and method for identifying pairs of related application users |
US10972558B2 (en) | 2017-04-30 | 2021-04-06 | Verint Systems Ltd. | System and method for tracking users of computer applications |
US10999295B2 (en) | 2019-03-20 | 2021-05-04 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
US11381977B2 (en) | 2016-04-25 | 2022-07-05 | Cognyte Technologies Israel Ltd. | System and method for decrypting communication exchanged on a wireless local area network |
US11399016B2 (en) | 2019-11-03 | 2022-07-26 | Cognyte Technologies Israel Ltd. | System and method for identifying exchanges of encrypted communication traffic |
US11403559B2 (en) | 2018-08-05 | 2022-08-02 | Cognyte Technologies Israel Ltd. | System and method for using a user-action log to learn to classify encrypted traffic |
US11575625B2 (en) | 2017-04-30 | 2023-02-07 | Cognyte Technologies Israel Ltd. | System and method for identifying relationships between users of computer applications |
Families Citing this family (136)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7506020B2 (en) | 1996-11-29 | 2009-03-17 | Frampton E Ellis | Global network computers |
US7926097B2 (en) | 1996-11-29 | 2011-04-12 | Ellis Iii Frampton E | Computer or microchip protected from the internet by internal hardware |
US20040003081A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | System and method for providing program credentials |
US7757291B2 (en) | 2003-09-15 | 2010-07-13 | Trigence Corp. | Malware containment by application encapsulation |
US8336040B2 (en) | 2004-04-15 | 2012-12-18 | Raytheon Company | System and method for topology-aware job scheduling and backfilling in an HPC environment |
US8335909B2 (en) | 2004-04-15 | 2012-12-18 | Raytheon Company | Coupling processors to each other for high performance computing (HPC) |
US9178784B2 (en) | 2004-04-15 | 2015-11-03 | Raytheon Company | System and method for cluster management based on HPC architecture |
US8707251B2 (en) * | 2004-06-07 | 2014-04-22 | International Business Machines Corporation | Buffered viewing of electronic documents |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
EP1811387A4 (en) * | 2004-08-25 | 2016-04-13 | Nec Corp | Information communication device, and program execution environment control method |
US7533131B2 (en) * | 2004-10-01 | 2009-05-12 | Webroot Software, Inc. | System and method for pestware detection and removal |
KR20060061219A (en) * | 2004-12-01 | 2006-06-07 | 주식회사 비에스텍 | E n c r y p t i o n p r o c e s s o r |
US7571475B2 (en) * | 2005-04-05 | 2009-08-04 | Cisco Technology, Inc. | Method and electronic device for triggering zeroization in an electronic device |
US7565695B2 (en) * | 2005-04-12 | 2009-07-21 | Webroot Software, Inc. | System and method for directly accessing data from a data storage medium |
US20060230455A1 (en) * | 2005-04-12 | 2006-10-12 | Yuan-Chang Lo | Apparatus and methods for file system with write buffer to protect against malware |
US8452744B2 (en) * | 2005-06-06 | 2013-05-28 | Webroot Inc. | System and method for analyzing locked files |
WO2006131921A2 (en) * | 2005-06-08 | 2006-12-14 | Discretix Technologies Ltd. | Method, device, and system of maintaining a context of a secure execution environment |
US7788132B2 (en) * | 2005-06-29 | 2010-08-31 | Google, Inc. | Reviewing the suitability of Websites for participation in an advertising network |
US20090144826A2 (en) * | 2005-06-30 | 2009-06-04 | Webroot Software, Inc. | Systems and Methods for Identifying Malware Distribution |
US7712132B1 (en) | 2005-10-06 | 2010-05-04 | Ogilvie John W | Detecting surreptitious spyware |
US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
US8869270B2 (en) | 2008-03-26 | 2014-10-21 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US20080276302A1 (en) | 2005-12-13 | 2008-11-06 | Yoggie Security Systems Ltd. | System and Method for Providing Data and Device Security Between External and Host Devices |
EP1977364B1 (en) * | 2006-01-17 | 2020-06-03 | Microsoft Technology Licensing, LLC | Securing data in a networked environment |
WO2007083299A2 (en) * | 2006-01-17 | 2007-07-26 | Kidaro (Israel) Ltd. | Seamless integration of multiple computing environments |
US20070168694A1 (en) * | 2006-01-18 | 2007-07-19 | Phil Maddaloni | System and method for identifying and removing pestware using a secondary operating system |
US9112897B2 (en) * | 2006-03-30 | 2015-08-18 | Advanced Network Technology Laboratories Pte Ltd. | System and method for securing a network session |
US8434148B2 (en) * | 2006-03-30 | 2013-04-30 | Advanced Network Technology Laboratories Pte Ltd. | System and method for providing transactional security for an end-user device |
US9547485B2 (en) | 2006-03-31 | 2017-01-17 | Prowess Consulting, Llc | System and method for deploying a virtual machine |
US20070234337A1 (en) * | 2006-03-31 | 2007-10-04 | Prowess Consulting, Llc | System and method for sanitizing a computer program |
US20070237088A1 (en) * | 2006-04-05 | 2007-10-11 | Honeywell International. Inc | Apparatus and method for providing network security |
US8151353B2 (en) | 2006-04-27 | 2012-04-03 | The Invention Science Fund I, Llc | Multi-network virus immunization with trust aspects |
US8191145B2 (en) * | 2006-04-27 | 2012-05-29 | The Invention Science Fund I, Llc | Virus immunization using prioritized routing |
US7934260B2 (en) * | 2006-04-27 | 2011-04-26 | The Invention Science Fund I, Llc | Virus immunization using entity-sponsored bypass network |
US8863285B2 (en) * | 2006-04-27 | 2014-10-14 | The Invention Science Fund I, Llc | Virus immunization using prioritized routing |
US7849508B2 (en) * | 2006-04-27 | 2010-12-07 | The Invention Science Fund I, Llc | Virus immunization using entity-sponsored bypass network |
US8117654B2 (en) * | 2006-06-30 | 2012-02-14 | The Invention Science Fund I, Llc | Implementation of malware countermeasures in a network device |
US9258327B2 (en) | 2006-04-27 | 2016-02-09 | Invention Science Fund I, Llc | Multi-network virus immunization |
US8966630B2 (en) * | 2006-04-27 | 2015-02-24 | The Invention Science Fund I, Llc | Generating and distributing a malware countermeasure |
US7917956B2 (en) * | 2006-04-27 | 2011-03-29 | The Invention Science Fund I, Llc | Multi-network virus immunization |
US8539581B2 (en) * | 2006-04-27 | 2013-09-17 | The Invention Science Fund I, Llc | Efficient distribution of a malware countermeasure |
US8613095B2 (en) * | 2006-06-30 | 2013-12-17 | The Invention Science Fund I, Llc | Smart distribution of a malware countermeasure |
US8888585B1 (en) * | 2006-05-10 | 2014-11-18 | Mcafee, Inc. | Game console system, method and computer program product with anti-malware/spyware and parental control capabilities |
US8185737B2 (en) | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
US7996903B2 (en) | 2006-07-07 | 2011-08-09 | Webroot Software, Inc. | Method and system for detecting and removing hidden pestware files |
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
JP4895718B2 (en) * | 2006-08-14 | 2012-03-14 | 株式会社リコー | Image forming apparatus, data recovery method, and recording medium |
US8136162B2 (en) * | 2006-08-31 | 2012-03-13 | Broadcom Corporation | Intelligent network interface controller |
US8056134B1 (en) | 2006-09-10 | 2011-11-08 | Ogilvie John W | Malware detection and identification via malware spoofing |
US9639696B1 (en) * | 2006-09-29 | 2017-05-02 | Symantec Operating Corporation | Method and apparatus for analyzing end user license agreements |
US7941852B2 (en) * | 2006-10-04 | 2011-05-10 | Symantec Corporation | Detecting an audio/visual threat |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US20080182667A1 (en) * | 2007-01-25 | 2008-07-31 | Igt, Inc. | Method of securing data on a portable gaming device from tampering |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8726041B2 (en) * | 2007-05-09 | 2014-05-13 | Sony Corporation | Methods and apparatus for generating a random number in one or more isolated processors |
US8365272B2 (en) | 2007-05-30 | 2013-01-29 | Yoggie Security Systems Ltd. | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US8199965B1 (en) | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US20130276061A1 (en) | 2007-09-05 | 2013-10-17 | Gopi Krishna Chebiyyam | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US8446607B2 (en) * | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US8424078B2 (en) * | 2007-11-06 | 2013-04-16 | International Business Machines Corporation | Methodology for secure application partitioning enablement |
US8225404B2 (en) * | 2008-01-22 | 2012-07-17 | Wontok, Inc. | Trusted secure desktop |
US8918865B2 (en) * | 2008-01-22 | 2014-12-23 | Wontok, Inc. | System and method for protecting data accessed through a network connection |
US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US20090299862A1 (en) * | 2008-06-03 | 2009-12-03 | Microsoft Corporation | Online ad serving |
US8813050B2 (en) | 2008-06-03 | 2014-08-19 | Isight Partners, Inc. | Electronic crime detection and tracking |
US9524344B2 (en) * | 2008-06-03 | 2016-12-20 | Microsoft Corporation | User interface for online ads |
US8151073B2 (en) * | 2008-06-25 | 2012-04-03 | Fac Systems Inc. | Security system for computers |
US20090327869A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Online ad serving |
US7530106B1 (en) * | 2008-07-02 | 2009-05-05 | Kaspersky Lab, Zao | System and method for security rating of computer processes |
US8631488B2 (en) | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US9077684B1 (en) | 2008-08-06 | 2015-07-07 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
KR101012669B1 (en) * | 2008-09-25 | 2011-02-11 | 주식회사 안철수연구소 | Malicious program detector for scanning a illegal memory access and method thereof |
JP4696151B2 (en) * | 2008-10-23 | 2011-06-08 | 株式会社エヌ・ティ・ティ・ドコモ | Information processing apparatus and memory management method |
US9166797B2 (en) * | 2008-10-24 | 2015-10-20 | Microsoft Technology Licensing, Llc | Secured compartment for transactions |
WO2010059864A1 (en) | 2008-11-19 | 2010-05-27 | Yoggie Security Systems Ltd. | Systems and methods for providing real time access monitoring of a removable media device |
US8607345B1 (en) | 2008-12-16 | 2013-12-10 | Trend Micro Incorporated | Method and apparatus for generic malware downloader detection and prevention |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
KR101135629B1 (en) * | 2009-10-26 | 2012-04-17 | 한국전자통신연구원 | Method and apparatus for preventing autorun of portable USB storage |
US20110113231A1 (en) * | 2009-11-12 | 2011-05-12 | Daniel Kaminsky | System and method for providing secure reception and viewing of transmitted data over a network |
US8494974B2 (en) * | 2010-01-18 | 2013-07-23 | iSIGHT Partners Inc. | Targeted security implementation through security loss forecasting |
US8429735B2 (en) | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
US8255986B2 (en) * | 2010-01-26 | 2012-08-28 | Frampton E. Ellis | Methods of securely controlling through one or more separate private networks an internet-connected computer having one or more hardware-based inner firewalls or access barriers |
US20110213809A1 (en) * | 2010-03-01 | 2011-09-01 | Panda Security, S.L. | Method, a system and a computer program product for protecting a data-storing device |
US8495739B2 (en) | 2010-04-07 | 2013-07-23 | International Business Machines Corporation | System and method for ensuring scanning of files without caching the files to network device |
US20110273452A1 (en) * | 2010-05-10 | 2011-11-10 | Nokia Siemens Networks Oy | Data display |
US9202049B1 (en) | 2010-06-21 | 2015-12-01 | Pulse Secure, Llc | Detecting malware on mobile devices |
US8082585B1 (en) * | 2010-09-13 | 2011-12-20 | Raymond R. Givonetti | Protecting computers from malware using a hardware solution that is not alterable by any software |
CN102436559B (en) * | 2010-09-29 | 2016-06-01 | 联想(北京)有限公司 | A kind of state switching method and system |
US8438644B2 (en) | 2011-03-07 | 2013-05-07 | Isight Partners, Inc. | Information system security based on threat vectors |
KR20120118353A (en) * | 2011-04-18 | 2012-10-26 | 삼성전자주식회사 | Broadcast receiving apparatus and method of installing service |
RU2506638C2 (en) * | 2011-06-28 | 2014-02-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for hardware detection and cleaning of unknown malware installed on personal computer |
US20130096980A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | User-defined countermeasures |
TWI619038B (en) * | 2011-11-07 | 2018-03-21 | Admedec Co Ltd | Safety box |
US9047456B2 (en) | 2012-03-20 | 2015-06-02 | Canon Information And Imaging Solutions, Inc. | System and method for controlling access to a resource |
US8832837B2 (en) * | 2012-06-29 | 2014-09-09 | Mcafee Inc. | Preventing attacks on devices with multiple CPUs |
WO2014046974A2 (en) | 2012-09-20 | 2014-03-27 | Case Paul Sr | Case secure computer architecture |
US9292688B2 (en) * | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US11126720B2 (en) | 2012-09-26 | 2021-09-21 | Bluvector, Inc. | System and method for automated machine-learning, zero-day malware detection |
RU2531565C2 (en) | 2012-09-28 | 2014-10-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for analysing file launch events for determining safety ranking thereof |
US9342695B2 (en) | 2012-10-02 | 2016-05-17 | Mordecai Barkan | Secured automated or semi-automated systems |
US11188652B2 (en) | 2012-10-02 | 2021-11-30 | Mordecai Barkan | Access management and credential protection |
US9092628B2 (en) * | 2012-10-02 | 2015-07-28 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US9672360B2 (en) | 2012-10-02 | 2017-06-06 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US9973501B2 (en) | 2012-10-09 | 2018-05-15 | Cupp Computing As | Transaction security systems and methods |
EP2973172B1 (en) | 2013-03-12 | 2017-07-26 | Intel Corporation | Preventing malicious instruction execution |
US9501645B2 (en) * | 2013-03-15 | 2016-11-22 | Rudolf H. Hendel | System and method for the protection of computers and computer networks against cyber threats |
WO2014185893A1 (en) * | 2013-05-14 | 2014-11-20 | Hewlett-Packard Development Company, L.P. | Detection of a security event |
WO2014204363A1 (en) * | 2013-06-19 | 2014-12-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
US11157976B2 (en) | 2013-07-08 | 2021-10-26 | Cupp Computing As | Systems and methods for providing digital content marketplace security |
US9177150B1 (en) | 2013-12-04 | 2015-11-03 | Google Inc. | Detecting setting tampering |
US9870116B1 (en) | 2013-12-09 | 2018-01-16 | Google Llc | Controlling actions for browser extensions |
US9762614B2 (en) | 2014-02-13 | 2017-09-12 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US9749343B2 (en) | 2014-04-03 | 2017-08-29 | Fireeye, Inc. | System and method of cyber threat structure mapping and application to cyber threat mitigation |
US9749344B2 (en) | 2014-04-03 | 2017-08-29 | Fireeye, Inc. | System and method of cyber threat intensity determination and application to cyber threat mitigation |
US9372996B2 (en) * | 2014-05-15 | 2016-06-21 | International Business Machines Corporation | Protecting data owned by an operating system in a multi-operating system mobile environment |
US20160006754A1 (en) * | 2014-07-01 | 2016-01-07 | Mcafee, Inc. | Secure enclave-rendered contents |
EP3222024A1 (en) | 2014-11-21 | 2017-09-27 | Bluvector, Inc. | System and method for network data characterization |
US9892261B2 (en) | 2015-04-28 | 2018-02-13 | Fireeye, Inc. | Computer imposed countermeasures driven by malware lineage |
US11461456B1 (en) * | 2015-06-19 | 2022-10-04 | Stanley Kevin Miles | Multi-transfer resource allocation using modified instances of corresponding records in memory |
US11176240B1 (en) * | 2021-04-20 | 2021-11-16 | Stanley Kevin Miles | Multi-transfer resource allocation using modified instances of corresponding records in memory |
US10715533B2 (en) * | 2016-07-26 | 2020-07-14 | Microsoft Technology Licensing, Llc. | Remediation for ransomware attacks on cloud drive folders |
US10540498B2 (en) * | 2016-08-12 | 2020-01-21 | Intel Corporation | Technologies for hardware assisted native malware detection |
US10628585B2 (en) | 2017-01-23 | 2020-04-21 | Microsoft Technology Licensing, Llc | Ransomware resilient databases |
KR101997254B1 (en) * | 2017-05-10 | 2019-07-08 | 김덕우 | Computer having isolated user computing part |
KR101920866B1 (en) * | 2017-05-18 | 2018-11-21 | 김덕우 | An auxiliary memory device having independent recovery region |
US10061923B1 (en) * | 2017-06-26 | 2018-08-28 | Pritam Nath | Safe and secure internet or network connected computing machine providing means for processing, manipulating, receiving, transmitting and storing information free from hackers, hijackers, virus, malware etc. |
US11750623B2 (en) * | 2017-09-04 | 2023-09-05 | ITsMine Ltd. | System and method for conducting a detailed computerized surveillance in a computerized environment |
US10924377B2 (en) * | 2018-09-11 | 2021-02-16 | Citrix Systems, Inc. | Systems and methods for application scripts for cross-domain applications |
CN110505283B (en) * | 2019-07-31 | 2022-10-21 | 湖南微算互联信息技术有限公司 | Automatic maintenance system and method based on cloud mobile phone |
US11625505B2 (en) | 2019-08-19 | 2023-04-11 | Microsoft Technology Licensing, Llc | Processor with network stack domain and system domain using separate memory regions |
US11470118B2 (en) | 2019-11-01 | 2022-10-11 | Microsoft Technology Licensing, Llc | Processor with network processing stack having separate binary |
US11403403B2 (en) * | 2020-04-13 | 2022-08-02 | KameleonSec Ltd. | Secure processing engine for securing a computing system |
WO2021211091A1 (en) * | 2020-04-13 | 2021-10-21 | KameleonSec Ltd. | Secure processing engine for securing a computing system |
US11586727B2 (en) * | 2021-03-29 | 2023-02-21 | Red Hat, Inc. | Systems and methods for preventing kernel stalling attacks |
US11599636B1 (en) * | 2022-07-27 | 2023-03-07 | Aurora Security Llc | Systems and methods for managing and providing software packages which have undergone malware and/or vulnerability analysis |
Citations (104)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4890098A (en) | 1987-10-20 | 1989-12-26 | International Business Machines Corporation | Flexible window management on a computer display |
US5280579A (en) | 1990-09-28 | 1994-01-18 | Texas Instruments Incorporated | Memory mapped interface between host computer and graphics system |
US5502808A (en) | 1991-07-24 | 1996-03-26 | Texas Instruments Incorporated | Video graphics display system with adapter for display management based upon plural memory sources |
US5555364A (en) | 1994-08-23 | 1996-09-10 | Prosoft Corporation | Windowed computer display |
US5564051A (en) * | 1989-08-03 | 1996-10-08 | International Business Machines Corporation | Automatic update of static and dynamic files at a remote network node in response to calls issued by or for application programs |
US5666030A (en) | 1994-07-20 | 1997-09-09 | Ncr Corporation | Multiple window generation in computer display |
US5673403A (en) * | 1992-11-13 | 1997-09-30 | International Business Machines Corporation | Method and system for displaying applications of different operating systems on a single system using the user interface of the different operating systems |
US5751979A (en) * | 1995-05-31 | 1998-05-12 | Unisys Corporation | Video hardware for protected, multiprocessing systems |
US5826013A (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US5918039A (en) | 1995-12-29 | 1999-06-29 | Wyse Technology, Inc. | Method and apparatus for display of windowing application programs on a terminal |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US5978917A (en) | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses |
US5995103A (en) | 1996-05-10 | 1999-11-30 | Apple Computer, Inc. | Window grouping mechanism for creating, manipulating and displaying windows and window groups on a display screen of a computer system |
US6091412A (en) | 1997-09-30 | 2000-07-18 | The United States Of America As Represented By The Secretary Of The Navy | Universal client device permitting a computer to receive and display information from several special applications |
US6108715A (en) | 1994-12-13 | 2000-08-22 | Microsoft Corporation | Method and system for invoking remote procedure calls |
US6134661A (en) | 1998-02-11 | 2000-10-17 | Topp; William C. | Computer network security device and method |
US6167522A (en) | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
US6183366B1 (en) | 1996-01-19 | 2001-02-06 | Sheldon Goldberg | Network gaming system |
US6192477B1 (en) * | 1999-02-02 | 2001-02-20 | Dagg Llc | Methods, software, and apparatus for secure communication over a computer network |
US6199181B1 (en) * | 1997-09-09 | 2001-03-06 | Perfecto Technologies Ltd. | Method and system for maintaining restricted operating environments for application programs or operating systems |
US6216112B1 (en) | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US6285987B1 (en) | 1997-01-22 | 2001-09-04 | Engage, Inc. | Internet advertising system |
US20020002673A1 (en) * | 2000-06-30 | 2002-01-03 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US6351816B1 (en) | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US20020052809A1 (en) * | 2000-11-02 | 2002-05-02 | Orell Fussli Security Documents Ag | Method for verifying the authenticity of articles |
US6385721B1 (en) * | 1999-01-22 | 2002-05-07 | Hewlett-Packard Company | Computer with bootable hibernation partition |
US6397242B1 (en) | 1998-05-15 | 2002-05-28 | Vmware, Inc. | Virtualization system including a virtual machine monitor for a computer with a segmented architecture |
US20020066016A1 (en) | 2000-03-15 | 2002-05-30 | International Business Machines Corporation | Access control for computers |
US6401134B1 (en) | 1997-07-25 | 2002-06-04 | Sun Microsystems, Inc. | Detachable java applets |
US6433794B1 (en) | 1998-07-31 | 2002-08-13 | International Business Machines Corporation | Method and apparatus for selecting a java virtual machine for use with a browser |
US6438600B1 (en) | 1999-01-29 | 2002-08-20 | International Business Machines Corporation | Securely sharing log-in credentials among trusted browser-based applications |
US6480198B2 (en) | 1997-06-27 | 2002-11-12 | S3 Graphics Co., Ltd. | Multi-function controller and method for a computer graphics display system |
US20020174349A1 (en) | 2001-05-15 | 2002-11-21 | Wolff Daniel Joseph | Detecting malicious alteration of stored computer files |
US6492995B1 (en) | 1999-04-26 | 2002-12-10 | International Business Machines Corporation | Method and system for enabling localization support on web applications |
US6505300B2 (en) | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6507948B1 (en) | 1999-09-02 | 2003-01-14 | International Business Machines Corporation | Method, system, and program for generating batch files |
US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
US20030023857A1 (en) | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression |
US6546554B1 (en) | 2000-01-21 | 2003-04-08 | Sun Microsystems, Inc. | Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer |
US6553377B1 (en) | 2000-03-31 | 2003-04-22 | Network Associates, Inc. | System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment |
US20030097591A1 (en) | 2001-11-20 | 2003-05-22 | Khai Pham | System and method for protecting computer users from web sites hosting computer viruses |
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
US6581162B1 (en) | 1996-12-31 | 2003-06-17 | Compaq Information Technologies Group, L.P. | Method for securely creating, storing and using encryption keys in a computer system |
US20030131152A1 (en) | 2001-09-20 | 2003-07-10 | Ulfar Erlingsson | Altered states of software component behavior |
US20030177397A1 (en) | 2000-08-31 | 2003-09-18 | Ben Samman | Virus protection in an internet environment |
US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US20030221114A1 (en) * | 2002-03-08 | 2003-11-27 | International Business Machines Corporation | Authentication system and method |
US6658573B1 (en) | 1997-01-17 | 2003-12-02 | International Business Machines Corporation | Protecting resources in a distributed computer system |
US6663000B1 (en) | 2002-08-01 | 2003-12-16 | Networks Associates Technology, Inc. | Validating components of a malware scanner |
US20040006715A1 (en) | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US20040006706A1 (en) * | 2002-06-06 | 2004-01-08 | Ulfar Erlingsson | Methods and systems for implementing a secure application execution environment using derived user accounts for internet content |
US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
US6678712B1 (en) * | 1996-01-19 | 2004-01-13 | International Business Machines Corporation | Method and system for executing a program under one of a plurality of mutually exclusive operating environments |
US6691230B1 (en) | 1998-10-15 | 2004-02-10 | International Business Machines Corporation | Method and system for extending Java applets sand box with public client storage |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20040039944A1 (en) * | 2002-07-08 | 2004-02-26 | Teiji Karasaki | System and method for secure wall |
US20040054588A1 (en) | 1999-12-08 | 2004-03-18 | Jacobs Paul E. | E-mail software and method and system for distributing advertisements to client devices that have such e-mail software installed thereon |
US6735700B1 (en) | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping |
US6754815B1 (en) * | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US6756236B2 (en) | 2000-12-05 | 2004-06-29 | Sony International (Europe) Gmbh | Method of producing a ferroelectric memory and a memory device |
US6757685B2 (en) | 2001-02-19 | 2004-06-29 | Hewlett-Packard Development Company, L.P. | Process for executing a downloadable service receiving restrictive access rights to at least one profile file |
US6772345B1 (en) | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
US20040199763A1 (en) | 2003-04-01 | 2004-10-07 | Zone Labs, Inc. | Security System with Methodology for Interprocess Communication Control |
US6804780B1 (en) | 1996-11-08 | 2004-10-12 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
US6836885B1 (en) | 1998-09-21 | 2004-12-28 | Wyse Technology Inc. | Method and apparatus for display of windowing application programs on a terminal |
US20040267929A1 (en) * | 2003-06-27 | 2004-12-30 | Servgate Technologies, Inc | Method, system and computer program products for adaptive web-site access blocking |
US20050005153A1 (en) * | 2003-06-30 | 2005-01-06 | Kaustubh Das | Processor based system and method for virus detection |
US6871348B1 (en) * | 1999-09-15 | 2005-03-22 | Intel Corporation | Method and apparatus for integrating the user interfaces of multiple applications into one application |
US6873988B2 (en) | 2001-07-06 | 2005-03-29 | Check Point Software Technologies, Inc. | System and methods providing anti-virus cooperative enforcement |
US6880110B2 (en) | 2000-05-19 | 2005-04-12 | Self Repairing Computers, Inc. | Self-repairing computer having protected software template and isolated trusted computing environment for automated recovery from virus and hacker attack |
US20050149726A1 (en) * | 2003-10-21 | 2005-07-07 | Amit Joshi | Systems and methods for secure client applications |
US20050198692A1 (en) * | 2004-03-02 | 2005-09-08 | International Business Machines Corporation | System and method of protecting a computing system from harmful active content in documents |
US20050240810A1 (en) | 2004-04-06 | 2005-10-27 | Safford Kevin D | Off-chip lockstep checking |
US20060004667A1 (en) | 2004-06-30 | 2006-01-05 | Microsoft Corporation | Systems and methods for collecting operating system license revenue using an emulated computing environment |
US6990630B2 (en) | 1998-05-15 | 2006-01-24 | Unicast Communications Corporation | Technique for implementing browser-initiated user-transparent network-distributed advertising and for interstitially displaying an advertisement, so distributed, through a web browser in response to a user click-stream |
US6996828B1 (en) * | 1997-09-12 | 2006-02-07 | Hitachi, Ltd. | Multi-OS configuration method |
US7013484B1 (en) * | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US7024555B2 (en) * | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7024581B1 (en) * | 2002-10-09 | 2006-04-04 | Xpoint Technologies, Inc. | Data processing recovery system and method spanning multiple operating system |
US7062672B2 (en) | 2001-06-08 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method of and computer network arrangement for restoring an impaired software image |
US7082615B1 (en) * | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
US7085928B1 (en) | 2000-03-31 | 2006-08-01 | Cigital | System and method for defending against malicious software |
US7096381B2 (en) | 2001-05-21 | 2006-08-22 | Self Repairing Computer, Inc. | On-the-fly repair of a computer |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US7146640B2 (en) * | 2002-09-05 | 2006-12-05 | Exobox Technologies Corp. | Personal computer internet security system |
US7146305B2 (en) * | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
US7181768B1 (en) | 1999-10-28 | 2007-02-20 | Cigital | Computer intrusion detection system and method based on application monitoring |
US7191469B2 (en) | 2002-05-13 | 2007-03-13 | Green Border Technologies | Methods and systems for providing a secure application environment using derived user accounts |
US7246374B1 (en) | 2000-03-13 | 2007-07-17 | Microsoft Corporation | Enhancing computer system security via multiple user desktops |
US7284274B1 (en) | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
US7373505B2 (en) | 2004-04-15 | 2008-05-13 | Microsoft Corporation | Displaying a security element with a browser window |
US7401230B2 (en) | 2004-03-31 | 2008-07-15 | Intel Corporation | Secure virtual machine monitor to tear down a secure execution environment |
US7421689B2 (en) | 2003-10-28 | 2008-09-02 | Hewlett-Packard Development Company, L.P. | Processor-architecture for facilitating a virtual machine monitor |
US7444412B2 (en) | 2001-06-08 | 2008-10-28 | Hewlett-Packard Development Company, L.P. | Data processing system and method |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US7565522B2 (en) | 2004-05-10 | 2009-07-21 | Intel Corporation | Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch |
US7596694B1 (en) | 2004-03-08 | 2009-09-29 | Hewlett-Packard Development Company, L.P. | System and method for safely executing downloaded code on a computer system |
US7657419B2 (en) * | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US7676842B2 (en) | 2002-04-13 | 2010-03-09 | Computer Associates Think, Inc. | System and method for detecting malicious code |
US7730318B2 (en) * | 2003-10-24 | 2010-06-01 | Microsoft Corporation | Integration of high-assurance features into an application through application factoring |
US7818808B1 (en) * | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US7849310B2 (en) * | 2002-11-18 | 2010-12-07 | Arm Limited | Switching between secure and non-secure processing modes |
US7854008B1 (en) * | 2007-08-10 | 2010-12-14 | Fortinet, Inc. | Software-hardware partitioning in a virus processing system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US586013A (en) * | 1897-07-06 | Cartridge-loading implement | ||
US6658576B1 (en) * | 1999-09-29 | 2003-12-02 | Smartpower Corporation | Energy-conserving communication apparatus selectively switching between a main processor with main operating instructions and keep-alive processor with keep-alive operating instruction |
US6456554B1 (en) * | 1999-10-19 | 2002-09-24 | Texas Instruments Incorporated | Chip identifier and method of fabrication |
US7788669B2 (en) * | 2003-05-02 | 2010-08-31 | Microsoft Corporation | System for isolating first computing environment from second execution environment while sharing resources by copying data from first portion to second portion of memory |
-
2004
- 2004-08-07 US US10/913,609 patent/US7484247B2/en active Active - Reinstated
-
2010
- 2010-03-09 US US12/720,147 patent/USRE43528E1/en active Active
- 2010-03-09 US US12/720,207 patent/USRE43500E1/en active Active
- 2010-08-10 US US12/854,149 patent/USRE43103E1/en active Active
- 2010-11-07 US US12/941,067 patent/USRE43529E1/en active Active
-
2011
- 2011-01-27 US US13/015,186 patent/USRE43987E1/en active Active
Patent Citations (111)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4890098A (en) | 1987-10-20 | 1989-12-26 | International Business Machines Corporation | Flexible window management on a computer display |
US5564051A (en) * | 1989-08-03 | 1996-10-08 | International Business Machines Corporation | Automatic update of static and dynamic files at a remote network node in response to calls issued by or for application programs |
US5280579A (en) | 1990-09-28 | 1994-01-18 | Texas Instruments Incorporated | Memory mapped interface between host computer and graphics system |
US5502808A (en) | 1991-07-24 | 1996-03-26 | Texas Instruments Incorporated | Video graphics display system with adapter for display management based upon plural memory sources |
US5673403A (en) * | 1992-11-13 | 1997-09-30 | International Business Machines Corporation | Method and system for displaying applications of different operating systems on a single system using the user interface of the different operating systems |
US5666030A (en) | 1994-07-20 | 1997-09-09 | Ncr Corporation | Multiple window generation in computer display |
US5555364A (en) | 1994-08-23 | 1996-09-10 | Prosoft Corporation | Windowed computer display |
US6108715A (en) | 1994-12-13 | 2000-08-22 | Microsoft Corporation | Method and system for invoking remote procedure calls |
US5751979A (en) * | 1995-05-31 | 1998-05-12 | Unisys Corporation | Video hardware for protected, multiprocessing systems |
US5826013A (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US5918039A (en) | 1995-12-29 | 1999-06-29 | Wyse Technology, Inc. | Method and apparatus for display of windowing application programs on a terminal |
US6183366B1 (en) | 1996-01-19 | 2001-02-06 | Sheldon Goldberg | Network gaming system |
US6678712B1 (en) * | 1996-01-19 | 2004-01-13 | International Business Machines Corporation | Method and system for executing a program under one of a plurality of mutually exclusive operating environments |
US5995103A (en) | 1996-05-10 | 1999-11-30 | Apple Computer, Inc. | Window grouping mechanism for creating, manipulating and displaying windows and window groups on a display screen of a computer system |
US6351816B1 (en) | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US6804780B1 (en) | 1996-11-08 | 2004-10-12 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
US6581162B1 (en) | 1996-12-31 | 2003-06-17 | Compaq Information Technologies Group, L.P. | Method for securely creating, storing and using encryption keys in a computer system |
US6658573B1 (en) | 1997-01-17 | 2003-12-02 | International Business Machines Corporation | Protecting resources in a distributed computer system |
US6285987B1 (en) | 1997-01-22 | 2001-09-04 | Engage, Inc. | Internet advertising system |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6167522A (en) | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
US6480198B2 (en) | 1997-06-27 | 2002-11-12 | S3 Graphics Co., Ltd. | Multi-function controller and method for a computer graphics display system |
US6401134B1 (en) | 1997-07-25 | 2002-06-04 | Sun Microsystems, Inc. | Detachable java applets |
US5978917A (en) | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses |
US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US6199181B1 (en) * | 1997-09-09 | 2001-03-06 | Perfecto Technologies Ltd. | Method and system for maintaining restricted operating environments for application programs or operating systems |
US6321337B1 (en) | 1997-09-09 | 2001-11-20 | Sanctum Ltd. | Method and system for protecting operations of trusted internal networks |
US6996828B1 (en) * | 1997-09-12 | 2006-02-07 | Hitachi, Ltd. | Multi-OS configuration method |
US6091412A (en) | 1997-09-30 | 2000-07-18 | The United States Of America As Represented By The Secretary Of The Navy | Universal client device permitting a computer to receive and display information from several special applications |
US6134661A (en) | 1998-02-11 | 2000-10-17 | Topp; William C. | Computer network security device and method |
US6397242B1 (en) | 1998-05-15 | 2002-05-28 | Vmware, Inc. | Virtualization system including a virtual machine monitor for a computer with a segmented architecture |
US6990630B2 (en) | 1998-05-15 | 2006-01-24 | Unicast Communications Corporation | Technique for implementing browser-initiated user-transparent network-distributed advertising and for interstitially displaying an advertisement, so distributed, through a web browser in response to a user click-stream |
US6216112B1 (en) | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6505300B2 (en) | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6433794B1 (en) | 1998-07-31 | 2002-08-13 | International Business Machines Corporation | Method and apparatus for selecting a java virtual machine for use with a browser |
US6836885B1 (en) | 1998-09-21 | 2004-12-28 | Wyse Technology Inc. | Method and apparatus for display of windowing application programs on a terminal |
US6691230B1 (en) | 1998-10-15 | 2004-02-10 | International Business Machines Corporation | Method and system for extending Java applets sand box with public client storage |
US6385721B1 (en) * | 1999-01-22 | 2002-05-07 | Hewlett-Packard Company | Computer with bootable hibernation partition |
US6438600B1 (en) | 1999-01-29 | 2002-08-20 | International Business Machines Corporation | Securely sharing log-in credentials among trusted browser-based applications |
US6192477B1 (en) * | 1999-02-02 | 2001-02-20 | Dagg Llc | Methods, software, and apparatus for secure communication over a computer network |
US6492995B1 (en) | 1999-04-26 | 2002-12-10 | International Business Machines Corporation | Method and system for enabling localization support on web applications |
US6507948B1 (en) | 1999-09-02 | 2003-01-14 | International Business Machines Corporation | Method, system, and program for generating batch files |
US6871348B1 (en) * | 1999-09-15 | 2005-03-22 | Intel Corporation | Method and apparatus for integrating the user interfaces of multiple applications into one application |
US7181768B1 (en) | 1999-10-28 | 2007-02-20 | Cigital | Computer intrusion detection system and method based on application monitoring |
US20040054588A1 (en) | 1999-12-08 | 2004-03-18 | Jacobs Paul E. | E-mail software and method and system for distributing advertisements to client devices that have such e-mail software installed thereon |
US6735700B1 (en) | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping |
US6546554B1 (en) | 2000-01-21 | 2003-04-08 | Sun Microsystems, Inc. | Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer |
US7246374B1 (en) | 2000-03-13 | 2007-07-17 | Microsoft Corporation | Enhancing computer system security via multiple user desktops |
US20020066016A1 (en) | 2000-03-15 | 2002-05-30 | International Business Machines Corporation | Access control for computers |
US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US6754815B1 (en) * | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US7013484B1 (en) * | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US7085928B1 (en) | 2000-03-31 | 2006-08-01 | Cigital | System and method for defending against malicious software |
US6553377B1 (en) | 2000-03-31 | 2003-04-22 | Network Associates, Inc. | System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment |
US7082615B1 (en) * | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
US7577871B2 (en) | 2000-05-19 | 2009-08-18 | Vir2Us, Inc. | Computer system and method having isolatable storage for enhanced immunity to viral and malicious code infection |
US6880110B2 (en) | 2000-05-19 | 2005-04-12 | Self Repairing Computers, Inc. | Self-repairing computer having protected software template and isolated trusted computing environment for automated recovery from virus and hacker attack |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US7039801B2 (en) * | 2000-06-30 | 2006-05-02 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US7650493B2 (en) * | 2000-06-30 | 2010-01-19 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US20020002673A1 (en) * | 2000-06-30 | 2002-01-03 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US20030177397A1 (en) | 2000-08-31 | 2003-09-18 | Ben Samman | Virus protection in an internet environment |
US7146305B2 (en) * | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
US20020052809A1 (en) * | 2000-11-02 | 2002-05-02 | Orell Fussli Security Documents Ag | Method for verifying the authenticity of articles |
US6756236B2 (en) | 2000-12-05 | 2004-06-29 | Sony International (Europe) Gmbh | Method of producing a ferroelectric memory and a memory device |
US7818808B1 (en) * | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US7284274B1 (en) | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
US6757685B2 (en) | 2001-02-19 | 2004-06-29 | Hewlett-Packard Development Company, L.P. | Process for executing a downloadable service receiving restrictive access rights to at least one profile file |
US20020174349A1 (en) | 2001-05-15 | 2002-11-21 | Wolff Daniel Joseph | Detecting malicious alteration of stored computer files |
US7096381B2 (en) | 2001-05-21 | 2006-08-22 | Self Repairing Computer, Inc. | On-the-fly repair of a computer |
US7444412B2 (en) | 2001-06-08 | 2008-10-28 | Hewlett-Packard Development Company, L.P. | Data processing system and method |
US7062672B2 (en) | 2001-06-08 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method of and computer network arrangement for restoring an impaired software image |
US7657419B2 (en) * | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US6873988B2 (en) | 2001-07-06 | 2005-03-29 | Check Point Software Technologies, Inc. | System and methods providing anti-virus cooperative enforcement |
US20030023857A1 (en) | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression |
US20030131152A1 (en) | 2001-09-20 | 2003-07-10 | Ulfar Erlingsson | Altered states of software component behavior |
US7024555B2 (en) * | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US20030097591A1 (en) | 2001-11-20 | 2003-05-22 | Khai Pham | System and method for protecting computer users from web sites hosting computer viruses |
US6772345B1 (en) | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
US20030221114A1 (en) * | 2002-03-08 | 2003-11-27 | International Business Machines Corporation | Authentication system and method |
US7676842B2 (en) | 2002-04-13 | 2010-03-09 | Computer Associates Think, Inc. | System and method for detecting malicious code |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US7191469B2 (en) | 2002-05-13 | 2007-03-13 | Green Border Technologies | Methods and systems for providing a secure application environment using derived user accounts |
US20040006706A1 (en) * | 2002-06-06 | 2004-01-08 | Ulfar Erlingsson | Methods and systems for implementing a secure application execution environment using derived user accounts for internet content |
US20040006715A1 (en) | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US7260839B2 (en) * | 2002-07-08 | 2007-08-21 | Hitachi, Ltd. | System and method for secure wall |
US20040039944A1 (en) * | 2002-07-08 | 2004-02-26 | Teiji Karasaki | System and method for secure wall |
US6663000B1 (en) | 2002-08-01 | 2003-12-16 | Networks Associates Technology, Inc. | Validating components of a malware scanner |
US7146640B2 (en) * | 2002-09-05 | 2006-12-05 | Exobox Technologies Corp. | Personal computer internet security system |
US7024581B1 (en) * | 2002-10-09 | 2006-04-04 | Xpoint Technologies, Inc. | Data processing recovery system and method spanning multiple operating system |
US7849310B2 (en) * | 2002-11-18 | 2010-12-07 | Arm Limited | Switching between secure and non-secure processing modes |
US20040199763A1 (en) | 2003-04-01 | 2004-10-07 | Zone Labs, Inc. | Security System with Methodology for Interprocess Communication Control |
US20040267929A1 (en) * | 2003-06-27 | 2004-12-30 | Servgate Technologies, Inc | Method, system and computer program products for adaptive web-site access blocking |
US7367057B2 (en) * | 2003-06-30 | 2008-04-29 | Intel Corporation | Processor based system and method for virus detection |
US20050005153A1 (en) * | 2003-06-30 | 2005-01-06 | Kaustubh Das | Processor based system and method for virus detection |
US20050149726A1 (en) * | 2003-10-21 | 2005-07-07 | Amit Joshi | Systems and methods for secure client applications |
US7694328B2 (en) | 2003-10-21 | 2010-04-06 | Google Inc. | Systems and methods for secure client applications |
US7730318B2 (en) * | 2003-10-24 | 2010-06-01 | Microsoft Corporation | Integration of high-assurance features into an application through application factoring |
US7421689B2 (en) | 2003-10-28 | 2008-09-02 | Hewlett-Packard Development Company, L.P. | Processor-architecture for facilitating a virtual machine monitor |
US20050198692A1 (en) * | 2004-03-02 | 2005-09-08 | International Business Machines Corporation | System and method of protecting a computing system from harmful active content in documents |
US7596694B1 (en) | 2004-03-08 | 2009-09-29 | Hewlett-Packard Development Company, L.P. | System and method for safely executing downloaded code on a computer system |
US7401230B2 (en) | 2004-03-31 | 2008-07-15 | Intel Corporation | Secure virtual machine monitor to tear down a secure execution environment |
US20050240810A1 (en) | 2004-04-06 | 2005-10-27 | Safford Kevin D | Off-chip lockstep checking |
US7373505B2 (en) | 2004-04-15 | 2008-05-13 | Microsoft Corporation | Displaying a security element with a browser window |
US7565522B2 (en) | 2004-05-10 | 2009-07-21 | Intel Corporation | Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch |
US20060004667A1 (en) | 2004-06-30 | 2006-01-05 | Microsoft Corporation | Systems and methods for collecting operating system license revenue using an emulated computing environment |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US7854008B1 (en) * | 2007-08-10 | 2010-12-14 | Fortinet, Inc. | Software-hardware partitioning in a virus processing system |
Non-Patent Citations (45)
Title |
---|
Anupam, V., et al., "Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies." 7th Usenix Security Symposium San Antonio, Texas, Jan. 26-29, 1998. |
Balfanz, D. et al., "WindowBox: A Simple Security Model for the Connected Desktop," Microsoft Research, US-2000. |
Barham, P., et al., "Xen and the Art of Virtualization," SOSP'03, Oct. 19-22, 2003, Bolton Landing, New York, USA. |
Berman, A., et al., "TRON: Process-Specific File Protection for the Unix Operating System," Department of Computer Science and Engineering, University of Washington, Jan. 23, 1995. |
Chang, F. et al., "User-level Resource-constrained Sandboxing," Usenix Windows System Symposium, Aug. 2000. |
Chen, P.M., et al., "When Virtual Is Better Than Real," Department of Electrical Engineering and Computer Science University of Michigan, US-2001. |
Dan, A., et al., "A Sandbox Operating System Environment for Controlled Execution of Alien Code." RC 20742 (Feb. 20, 1997) Computer Science IBM Research Report. |
De Paoli, F., et al., "Vulnerability of Secure Web Browsers." Reliable Software Group Computer Science Department, University of California, Santa Barbara, 1997. |
Dean, D., et al., "Java Security: From HotJava to Netscape and Beyond," 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996. |
Delpha, L., et al., White Paper: "Smart Phone Security Issues," Cyber Risk Consulting, Blackhat Briefings Europe May 2004. |
Dunlap, G.W., et al.M "ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay," Proceedings of the the US-2002 Symposium on Operating Systems Design and Implementation (OSDI). |
Garfinkel T., et al., "A Virtual Machine Introspection Based Architecture for Intrusion Detection," Computer Science Department, Stanford University US-2003. |
Garfinkel, T., et al., "Terra: A Virtual Machine-Based Platform for Trusted Computing," SOSP'03, Oct. 19-22, 2003, Bolton Landing, New York, USA. |
Ghosh, A.K., et al, "Software Security And Privacy Risks In Mobile E-Commerce," Communications of the ACM Feb. 2001 vol. 44, No. 2. |
Goldberg, I., et al., "A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker)," Computer Science Division, University of California, Berkeley, Sixth Usenix Unix Security Symposium San Jose, California, Jul. 1996. |
Goldberg, R.P., "Architecture of Virtual Macines" Honeywell Information Systems, Inc. and Harvard University; Presented at the AFIPS National Computer Conference, New York, New York, Jun. 4-8, 1973. |
Harty, K., et al., "Application-Controlled Physical Memory using External Page-Cache Management," Computer Science Department, Stanford University, 1992. |
Honeycutt, J., Microsoft® Virtual PC US-2004 Technical Overview, Published Nov. US-2003 http://download.microsoft.com/download/c/f/b/cfb1 OOa7-463d-4b86-ad62-064397178bfNirtual-PC-Technical-Overview.doc. |
Ioannidis, S., et al., "Building a Secure Web Browser," US-2001 Usenix Annual Technical Conference Boston, Massachusetts, USA Jun. 25-30, 2001. |
Ioannidis, S., et al., "Sub-Operating Systems: A New Approach to Application Security," Technical Report MS-CIS-01-06, University of Pennsylvania, Feb. 2000. |
J2ME Building Blocks for Mobile Devices: White Paper on KVM and the Connected, Limited Device Configuration. Sun Microsystems May 19, 2000. |
Jacob, B., et al., "Virtual Memory in Contemporary Microprocessors." IEEE Micro Jul.-Aug. 1998. |
Jaeger, T., et al. "Flexible Control of Downloaded Executable Content." ACM Transactions on Information and System Security, vol. 2, No. 2, May 1999, pp. 177-228. |
Jaeger, T., et al., "Building systems that flexibly control downloaded executable content." In Proceedings of the 1996 Usenix Security Symposium, pp. 131-148, San Jose, Ca., 1996. |
Jaeger, T., et al., "Building Systems that Flexibly Control Downloaded Executable Context," Sixth Usenix Unix Security Symposium San Jose, California, Jul. 1996. |
Mehta, N.V., et al., "Expanding and Extending the Security Features of Java," Proceedings of the 7th Usenix Security Symposium, San Antonio, Texas, Jan. 26-29, 1998. |
Peterson, D., et al., "A Flexible Containment Mechanism for Executing Untrusted Code," Usenix Security Symposium San Francisco, California, USA Aug. 5-9, 2002. |
Potter, S., et al., "Secure Isolation and Migration of Untrusted Legacy Applications," Columbia University Technical Report Cucs-005-04, Jan. 2004. |
Razmov, V., "Security in Untrusted Code Environments: Missing Pieces of the Puzzle," Dept. of Computer Science and Engineering, University of Washington, Mar. 30, 2002. |
Rose, R., "Survey of System Virtualization Techniques," Mar. 8, 2004. |
Schmid, M., et al., "Protecting Data from Malicious Software," Annual Computer Security Applications Conference (ACSAC'02), Las Vegas, NV, Dec. 2002. |
Shapiro, J. et al., "Design of the EROS Trusted Window System". |
Shapiro, J., et al., "Verifying the EROS Confinement Mechanism," IBM T.J. Watson Research Center, 0-7695-0665-8/00, US-2000 IEEE. |
Stang, D. PhD, "Beyond Viruses: Why Anti-Virus Software is No Longer Enough," Pest Patrol, US-2002. |
Stiegler, M. et al., Report Name: "A Capability Based Client: The Darpa Browser", Combex/Focused Research Topic 5/BAA-00-06-SNK, Nov. 18, 2002. |
Sugerman, J., et al., "Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor,". |
The Web: Threat or Menace? from "Firewalls and Internet Security: Repelling the Wiley Hacker", Second Edition, Addison-Wesley, ISBN 0-201-63466-X, US-2003. |
Townsend, K., "Spyware, Adware, and Peer to Peer Networks; The Hidden Threat to Corporate Security". |
Usenix Annual Technical Conference Boston, Massachusetts, USA Jun. 25-30, 2001. |
Wagner, D.A., "Janus: an approach for confinement of untrusted applications," Master's thesis, University of California, Berkeley, 1999.. Also available, Technical Report CSD-99-1056, UC Berkeley, Computer Science Division. http://INVvW.cs-berkeley.edu/-daw/papers/janus-masters.ps. |
Wahabe, R., et al., "Efficient Software-Based Fault Isolation," Computer Science Division University of California, Berkeley, SIGOPS 1993. |
West, R., et al., "User-Level Sandboxing: a Safe and Efficient Mechanism for Extensibility", Technical Report, US-2003-014, Boston University, Jun. 2003. |
Ye, Z., et al., "Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing," Technical Report TRUS-2002-418 Feb. 4, 2002. |
Yee, K-P., "User Interaction Design for Secure Systems," Proceedings of the 4th International Conference on Information and Communications Security table of contents pp. 278-290, US-2002. |
Young, M., et al., "The Duality of Memory and Communication in the Implementation of a Multiprocessor Operating System," Computer Science Department Carnegie-Mellon University Proceedings of the 11th Operating Systems Principles, Nov. 1987. |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130347114A1 (en) * | 2012-04-30 | 2013-12-26 | Verint Systems Ltd. | System and method for malware detection |
US10061922B2 (en) * | 2012-04-30 | 2018-08-28 | Verint Systems Ltd. | System and method for malware detection |
US11316878B2 (en) | 2012-04-30 | 2022-04-26 | Cognyte Technologies Israel Ltd. | System and method for malware detection |
US10198427B2 (en) | 2013-01-29 | 2019-02-05 | Verint Systems Ltd. | System and method for keyword spotting using representative dictionary |
US9923913B2 (en) | 2013-06-04 | 2018-03-20 | Verint Systems Ltd. | System and method for malware detection learning |
US11038907B2 (en) | 2013-06-04 | 2021-06-15 | Verint Systems Ltd. | System and method for malware detection learning |
US10630588B2 (en) | 2014-07-24 | 2020-04-21 | Verint Systems Ltd. | System and method for range matching |
US11463360B2 (en) | 2014-07-24 | 2022-10-04 | Cognyte Technologies Israel Ltd. | System and method for range matching |
US10560842B2 (en) | 2015-01-28 | 2020-02-11 | Verint Systems Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US11432139B2 (en) | 2015-01-28 | 2022-08-30 | Cognyte Technologies Israel Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US10142426B2 (en) | 2015-03-29 | 2018-11-27 | Verint Systems Ltd. | System and method for identifying communication session participants based on traffic patterns |
US10623503B2 (en) | 2015-03-29 | 2020-04-14 | Verint Systems Ltd. | System and method for identifying communication session participants based on traffic patterns |
US10546008B2 (en) | 2015-10-22 | 2020-01-28 | Verint Systems Ltd. | System and method for maintaining a dynamic dictionary |
US11386135B2 (en) | 2015-10-22 | 2022-07-12 | Cognyte Technologies Israel Ltd. | System and method for maintaining a dynamic dictionary |
US11093534B2 (en) | 2015-10-22 | 2021-08-17 | Verint Systems Ltd. | System and method for keyword searching using both static and dynamic dictionaries |
US10614107B2 (en) | 2015-10-22 | 2020-04-07 | Verint Systems Ltd. | System and method for keyword searching using both static and dynamic dictionaries |
US11381977B2 (en) | 2016-04-25 | 2022-07-05 | Cognyte Technologies Israel Ltd. | System and method for decrypting communication exchanged on a wireless local area network |
US10944763B2 (en) | 2016-10-10 | 2021-03-09 | Verint Systems, Ltd. | System and method for generating data sets for learning to identify user actions |
US10491609B2 (en) | 2016-10-10 | 2019-11-26 | Verint Systems Ltd. | System and method for generating data sets for learning to identify user actions |
US11303652B2 (en) | 2016-10-10 | 2022-04-12 | Cognyte Technologies Israel Ltd | System and method for generating data sets for learning to identify user actions |
US11336738B2 (en) | 2017-04-30 | 2022-05-17 | Cognyte Technologies Israel Ltd. | System and method for tracking users of computer applications |
US11095736B2 (en) | 2017-04-30 | 2021-08-17 | Verint Systems Ltd. | System and method for tracking users of computer applications |
US10972558B2 (en) | 2017-04-30 | 2021-04-06 | Verint Systems Ltd. | System and method for tracking users of computer applications |
US11575625B2 (en) | 2017-04-30 | 2023-02-07 | Cognyte Technologies Israel Ltd. | System and method for identifying relationships between users of computer applications |
US11336609B2 (en) | 2018-01-01 | 2022-05-17 | Cognyte Technologies Israel Ltd. | System and method for identifying pairs of related application users |
US10958613B2 (en) | 2018-01-01 | 2021-03-23 | Verint Systems Ltd. | System and method for identifying pairs of related application users |
US11403559B2 (en) | 2018-08-05 | 2022-08-02 | Cognyte Technologies Israel Ltd. | System and method for using a user-action log to learn to classify encrypted traffic |
US10999295B2 (en) | 2019-03-20 | 2021-05-04 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
US11444956B2 (en) | 2019-03-20 | 2022-09-13 | Cognyte Technologies Israel Ltd. | System and method for de-anonymizing actions and messages on networks |
US11399016B2 (en) | 2019-11-03 | 2022-07-26 | Cognyte Technologies Israel Ltd. | System and method for identifying exchanges of encrypted communication traffic |
Also Published As
Publication number | Publication date |
---|---|
US7484247B2 (en) | 2009-01-27 |
USRE43529E1 (en) | 2012-07-17 |
US20060031940A1 (en) | 2006-02-09 |
USRE43103E1 (en) | 2012-01-10 |
USRE43528E1 (en) | 2012-07-17 |
USRE43500E1 (en) | 2012-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE43987E1 (en) | System and method for protecting a computer system from malicious software | |
US11604861B2 (en) | Systems and methods for providing real time security and access monitoring of a removable media device | |
AU2014393471B2 (en) | Systems and methods for using a reputation indicator to facilitate malware scanning | |
US9213836B2 (en) | System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages | |
US20040034794A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
US20030159070A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
US7665139B1 (en) | Method and apparatus to detect and prevent malicious changes to tokens | |
GB2411988A (en) | Preventing programs from accessing communication channels withut user permission | |
US20070240212A1 (en) | System and Methodology Protecting Against Key Logger Spyware | |
WO2019222261A1 (en) | Cloud based just in time memory analysis for malware detection | |
US8171552B1 (en) | Simultaneous execution of multiple anti-virus programs | |
US9219728B1 (en) | Systems and methods for protecting services | |
US9602538B1 (en) | Network security policy enforcement integrated with DNS server | |
GB2404262A (en) | Protection for computers against malicious programs using a security system which performs automatic segregation of programs | |
Iglio | Trustedbox: a kernel-level integrity checker | |
CA2471505A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
Martsenyuk et al. | Features of multifunctional Backdoor technology in the personal space of users. | |
GB2411747A (en) | Remotely checking the functioning of computer security systems | |
CA2424144A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
WO2002084939A1 (en) | System and method for securely executing a executable to preserve the integrity of files from unauthorized access for network security | |
Kunle et al. | Current Survey of Computer Malwares Infestation and Inhibition | |
AU2007201692A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CIOFFI, ALFONSO, TEXAS Free format text: LETTERS OF TESTAMENTARY;ASSIGNOR:ROZMAN, ALLEN FRANK;REEL/FRAME:034499/0346 Effective date: 20121029 |
|
AS | Assignment |
Owner name: ROZMAN, MEGAN ELIZABETH, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIOFFI, ALFONSO;REEL/FRAME:034385/0958 Effective date: 20141114 Owner name: ROZMAN, MORGAN LEE, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIOFFI, ALFONSO;REEL/FRAME:034385/0958 Effective date: 20141114 Owner name: ROZMAN, MELANIE ANN, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIOFFI, ALFONSO;REEL/FRAME:034385/0958 Effective date: 20141114 |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 8 |
|
SULP | Surcharge for late payment |
Year of fee payment: 7 |
|
AS | Assignment |
Owner name: ROZMAN, MEGAN ELIZABETH, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA TO READ ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE) PREVIOUSLY RECORDED ON REEL 034385 FRAME 0958. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE);REEL/FRAME:052994/0740 Effective date: 20141114 Owner name: ROZMAN, MELANIE ANN, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA TO READ ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE) PREVIOUSLY RECORDED ON REEL 034385 FRAME 0958. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE);REEL/FRAME:052994/0740 Effective date: 20141114 Owner name: ROZMAN, MORGAN LEE, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA TO READ ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE) PREVIOUSLY RECORDED ON REEL 034385 FRAME 0958. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE);REEL/FRAME:052994/0740 Effective date: 20141114 |
|
FEPP | Fee payment procedure |
Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2556); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |