WO2001005168A9 - System and method for preventing detection of a computer connection to an external device - Google Patents

System and method for preventing detection of a computer connection to an external device

Info

Publication number
WO2001005168A9
WO2001005168A9 PCT/US2000/019278 US0019278W WO0105168A9 WO 2001005168 A9 WO2001005168 A9 WO 2001005168A9 US 0019278 W US0019278 W US 0019278W WO 0105168 A9 WO0105168 A9 WO 0105168A9
Authority
WO
WIPO (PCT)
Prior art keywords
external device
computer
preventing detection
computer connection
packet
Prior art date
Application number
PCT/US2000/019278
Other languages
French (fr)
Other versions
WO2001005168A1 (en
Inventor
Michael Lyle
Robert F Ross
James R Maricondo
Original Assignee
Recourse Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Recourse Technologies Inc filed Critical Recourse Technologies Inc
Priority to AU62149/00A priority Critical patent/AU6214900A/en
Publication of WO2001005168A1 publication Critical patent/WO2001005168A1/en
Publication of WO2001005168A9 publication Critical patent/WO2001005168A9/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Abstract

A system and method are disclosed for preventing detection of a computer (1202) connection to an external device (1210). The external device (1210) is connected to the computer (1202) via a connectionless port. A key to be used to generate valid authorization information to be included in all valid data packets sent between the computer (1202) and the external device (1210) is provided. The external device (1210) is configured to reply to any packet in which the required valid authorization information is not present with the packet that would be sent if the connectionless port were not in use.
PCT/US2000/019278 1999-07-14 2000-07-14 System and method for preventing detection of a computer connection to an external device WO2001005168A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU62149/00A AU6214900A (en) 1999-07-14 2000-07-14 System and method for preventing detection of a computer connection to an external device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US14382199P 1999-07-14 1999-07-14
US60/143,821 1999-07-14
US15153199P 1999-08-30 1999-08-30
US60/151,531 1999-08-30

Publications (2)

Publication Number Publication Date
WO2001005168A1 WO2001005168A1 (en) 2001-01-18
WO2001005168A9 true WO2001005168A9 (en) 2002-07-18

Family

ID=26841423

Family Applications (8)

Application Number Title Priority Date Filing Date
PCT/US2000/019389 WO2001004757A1 (en) 1999-07-14 2000-07-14 System and method for preventing detection of a selected process running on a computer
PCT/US2000/019359 WO2001004733A1 (en) 1999-07-14 2000-07-14 System and method for protecting a computer network against denial of service attacks
PCT/US2000/019222 WO2001006373A1 (en) 1999-07-14 2000-07-14 System and method for generating fictitious content for a computer
PCT/US2000/019224 WO2001006386A1 (en) 1999-07-14 2000-07-14 System and method for dynamically changing a computer port or address
PCT/US2000/019487 WO2001004753A1 (en) 1999-07-14 2000-07-14 System and method for tracking the source of a computer attack
PCT/US2000/019278 WO2001005168A1 (en) 1999-07-14 2000-07-14 System and method for preventing detection of a computer connection to an external device
PCT/US2000/019488 WO2001004758A1 (en) 1999-07-14 2000-07-14 System and method for quickly authenticating messages using sequence numbers
PCT/US2000/019489 WO2001004759A1 (en) 1999-07-14 2000-07-14 System and method for computer security

Family Applications Before (5)

Application Number Title Priority Date Filing Date
PCT/US2000/019389 WO2001004757A1 (en) 1999-07-14 2000-07-14 System and method for preventing detection of a selected process running on a computer
PCT/US2000/019359 WO2001004733A1 (en) 1999-07-14 2000-07-14 System and method for protecting a computer network against denial of service attacks
PCT/US2000/019222 WO2001006373A1 (en) 1999-07-14 2000-07-14 System and method for generating fictitious content for a computer
PCT/US2000/019224 WO2001006386A1 (en) 1999-07-14 2000-07-14 System and method for dynamically changing a computer port or address
PCT/US2000/019487 WO2001004753A1 (en) 1999-07-14 2000-07-14 System and method for tracking the source of a computer attack

Family Applications After (2)

Application Number Title Priority Date Filing Date
PCT/US2000/019488 WO2001004758A1 (en) 1999-07-14 2000-07-14 System and method for quickly authenticating messages using sequence numbers
PCT/US2000/019489 WO2001004759A1 (en) 1999-07-14 2000-07-14 System and method for computer security

Country Status (4)

Country Link
US (2) US7461402B1 (en)
EP (3) EP1203280B1 (en)
AU (8) AU5935400A (en)
WO (8) WO2001004757A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109416717A (en) * 2016-02-08 2019-03-01 利弗莱姆有限公司 For the variation fingerprint identification of database table, text file and data feeding

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL140918A0 (en) 1998-07-27 2002-02-10 Genentech Inc Improved transformation efficiency in phage display through modification of a coat protein
US7117532B1 (en) * 1999-07-14 2006-10-03 Symantec Corporation System and method for generating fictitious content for a computer
AU5935400A (en) 1999-07-14 2001-01-30 Recourse Technologies, Inc. System and method for protecting a computer network against denial of service attacks
US6981155B1 (en) 1999-07-14 2005-12-27 Symantec Corporation System and method for computer security
US7203962B1 (en) 1999-08-30 2007-04-10 Symantec Corporation System and method for using timestamps to detect attacks
US6907533B2 (en) * 2000-07-14 2005-06-14 Symantec Corporation System and method for computer security using multiple cages
US20040085906A1 (en) * 2001-04-27 2004-05-06 Hisamichi Ohtani Packet tracing system
US7146642B1 (en) 2001-06-29 2006-12-05 Mcafee, Inc. System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
WO2003010922A1 (en) * 2001-07-24 2003-02-06 Worldcom, Inc. Network security architecture
US7657935B2 (en) 2001-08-16 2010-02-02 The Trustees Of Columbia University In The City Of New York System and methods for detecting malicious email transmission
US9306966B2 (en) 2001-12-14 2016-04-05 The Trustees Of Columbia University In The City Of New York Methods of unsupervised anomaly detection using a geometric framework
US7225343B1 (en) 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
TWI235580B (en) * 2002-05-03 2005-07-01 Ke-Cheng Fang Network security system and method for recording and resisting hacker
US7337470B2 (en) 2002-08-23 2008-02-26 International Business Machines Corporation Method for minimizing denial of service attacks on network servers
US7269850B2 (en) * 2002-12-31 2007-09-11 Intel Corporation Systems and methods for detecting and tracing denial of service attacks
US7363513B2 (en) * 2004-04-15 2008-04-22 International Business Machines Corporation Server denial of service shield
FI20041681A0 (en) * 2004-12-29 2004-12-29 Nokia Corp Traffic Restriction in Communication Systems
US8196205B2 (en) * 2006-01-23 2012-06-05 University Of Washington Through Its Center For Commercialization Detection of spyware threats within virtual machine
US8479288B2 (en) * 2006-07-21 2013-07-02 Research In Motion Limited Method and system for providing a honeypot mode for an electronic device
US8135994B2 (en) 2006-10-30 2012-03-13 The Trustees Of Columbia University In The City Of New York Methods, media, and systems for detecting an anomalous sequence of function calls
CN101335746A (en) * 2007-06-29 2008-12-31 国际商业机器公司 Security apparatus, method and system protecting integrity of software system
US20090300423A1 (en) * 2008-05-28 2009-12-03 James Michael Ferris Systems and methods for software test management in cloud-based network
US8413241B2 (en) * 2009-09-17 2013-04-02 Oracle America, Inc. Integrated intrusion deflection, detection and introspection
EP2438511B1 (en) 2010-03-22 2019-07-03 LRDC Systems, LLC A method of identifying and protecting the integrity of a set of source data
US9129257B2 (en) * 2010-12-20 2015-09-08 Verizon Patent And Licensing Inc. Method and system for monitoring high risk users
US8938796B2 (en) 2012-09-20 2015-01-20 Paul Case, SR. Case secure computer architecture
US9049173B2 (en) 2013-06-05 2015-06-02 Fortinet, Inc. Cloud based logging service
US10432498B1 (en) 2014-02-12 2019-10-01 Google Llc Location privacy aggregation testing
US9591022B2 (en) 2014-12-17 2017-03-07 The Boeing Company Computer defenses and counterattacks
US10637864B2 (en) 2016-05-05 2020-04-28 Ca, Inc. Creation of fictitious identities to obfuscate hacking of internal networks
US20170324774A1 (en) * 2016-05-05 2017-11-09 Javelin Networks, Inc. Adding supplemental data to a security-related query
US10515187B2 (en) 2016-06-29 2019-12-24 Symantec Corporation Artificial intelligence (AI) techniques for learning and modeling internal networks
US10609075B2 (en) 2016-05-22 2020-03-31 Guardicore Ltd. Masquerading and monitoring of shared resources in computer networks
US20170366563A1 (en) * 2016-06-21 2017-12-21 Guardicore Ltd. Agentless ransomware detection and recovery
US10769275B2 (en) * 2017-10-06 2020-09-08 Ca, Inc. Systems and methods for monitoring bait to protect users from security threats
US11050769B2 (en) * 2018-02-05 2021-06-29 Bank Of America Corporation Controlling dynamic user interface functionality using a machine learning control engine
US10601868B2 (en) * 2018-08-09 2020-03-24 Microsoft Technology Licensing, Llc Enhanced techniques for generating and deploying dynamic false user accounts
US11057428B1 (en) * 2019-03-28 2021-07-06 Rapid7, Inc. Honeytoken tracker

Family Cites Families (163)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4825406A (en) * 1981-10-05 1989-04-25 Digital Equipment Corporation Secondary storage facility employing serial communications between drive and controller
US4922408A (en) * 1985-09-27 1990-05-01 Schlumberger Technology Corporation Apparatus for multi-processor communications
US4719566A (en) * 1985-10-23 1988-01-12 International Business Machines Corporation Method for entrapping unauthorized computer access
BE905982A (en) * 1986-12-19 1987-06-19 Electronique Et Telecomm Bell PACKET SWITCHING NETWORK.
US4897874A (en) * 1988-03-31 1990-01-30 American Telephone And Telegraph Company At&T Bell Laboratories Metropolitan area network arrangement for serving virtual data networks
US5107489A (en) * 1989-10-30 1992-04-21 Brown Paul J Switch and its protocol for making dynamic connections
JP2810231B2 (en) * 1990-01-30 1998-10-15 ジヨンソン・サービス・カンパニー Method of locating data in distributed network system having nodes
US5574912A (en) 1990-05-04 1996-11-12 Digital Equipment Corporation Lattice scheduler method for reducing the impact of covert-channel countermeasures
US5301333A (en) * 1990-06-14 1994-04-05 Bell Communications Research, Inc. Tree structured variable priority arbitration implementing a round-robin scheduling policy
US5032979A (en) * 1990-06-22 1991-07-16 International Business Machines Corporation Distributed security auditing subsystem for an operating system
EP0472861B1 (en) 1990-08-31 1995-09-20 International Business Machines Corporation Method and apparatus for cross-partition control in a partitioned process environment
EP0484603B1 (en) * 1990-11-09 1995-09-13 International Business Machines Corporation Non-repudiation in computer networks
JPH04310188A (en) * 1991-03-01 1992-11-02 Internatl Business Mach Corp <Ibm> Library service method for document/image library
US5724569A (en) * 1991-03-29 1998-03-03 Bull S.A. Apparatus for evaluating database query performance having libraries containing information for modeling the various system components of multiple systems
US5408642A (en) 1991-05-24 1995-04-18 Symantec Corporation Method for recovery of a computer program infected by a computer virus
US5694590A (en) 1991-09-27 1997-12-02 The Mitre Corporation Apparatus and method for the detection of security violations in multilevel secure databases
US5537099A (en) * 1992-04-16 1996-07-16 Bay Networks, Inc. Receiving port security in a network concentrator
JPH0619771A (en) * 1992-04-20 1994-01-28 Internatl Business Mach Corp <Ibm> File management system of shared file by different kinds of clients
US5485409A (en) * 1992-04-30 1996-01-16 International Business Machines Corporation Automated penetration analysis system and method
US5278901A (en) * 1992-04-30 1994-01-11 International Business Machines Corporation Pattern-oriented intrusion-detection system and method
US5617420A (en) * 1992-06-17 1997-04-01 Texas Instrument Incorporated Hierarchical connection method, apparatus, and protocol
US5361359A (en) * 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US5471631A (en) 1992-10-19 1995-11-28 International Business Machines Corporation Using time stamps to correlate data processing event times in connected data processing units
US5390173A (en) * 1992-10-22 1995-02-14 Digital Equipment Corporation Packet format in hub for packet data communications system
US5566339A (en) 1992-10-23 1996-10-15 Fox Network Systems, Inc. System and method for monitoring computer environment and operation
US5574898A (en) 1993-01-08 1996-11-12 Atria Software, Inc. Dynamic software version auditor which monitors a process to provide a list of objects that are accessed
US5757913A (en) * 1993-04-23 1998-05-26 International Business Machines Corporation Method and apparatus for data authentication in a data communication environment
FR2706652B1 (en) * 1993-06-09 1995-08-18 Alsthom Cge Alcatel Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device.
US5613113A (en) * 1993-10-08 1997-03-18 International Business Machines Corporation Consistent recreation of events from activity logs
US5689700A (en) * 1993-12-29 1997-11-18 Microsoft Corporation Unification of directory service with file system services
US5557742A (en) 1994-03-07 1996-09-17 Haystack Labs, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US5572590A (en) 1994-04-12 1996-11-05 International Business Machines Corporation Discrimination of malicious changes to digital information using multiple signatures
CA2143874C (en) * 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
EP0684716B1 (en) * 1994-05-25 2002-02-27 International Business Machines Corporation A data communication network and method for operating said network
JPH10501354A (en) 1994-06-01 1998-02-03 クワンタム・リープ・イノヴェーションズ・インコーポレーテッド Computer virus trap device
US5638509A (en) 1994-06-10 1997-06-10 Exabyte Corporation Data storage and protection system
US5588060A (en) * 1994-06-10 1996-12-24 Sun Microsystems, Inc. Method and apparatus for a key-management scheme for internet protocols
US5533123A (en) * 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security
US5530757A (en) * 1994-06-28 1996-06-25 International Business Machines Corporation Distributed fingerprints for information integrity verification
US5483649A (en) 1994-07-01 1996-01-09 Ybm Technologies, Inc. Personal computer security system
US5623601A (en) * 1994-11-18 1997-04-22 Milkway Networks Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
JP3163918B2 (en) * 1994-11-28 2001-05-08 株式会社村田製作所 High frequency switch
US5937413A (en) * 1994-11-30 1999-08-10 Electronics And Telecommunications Research Institure Data audits based on timestamp criteria in replicated data bases within digital mobile telecommunication system
US5555543A (en) 1995-01-03 1996-09-10 International Business Machines Corporation Crossbar switch apparatus and protocol
DE69637733D1 (en) 1995-02-13 2008-12-11 Intertrust Tech Corp SYSTEMS AND METHOD FOR SAFE TRANSMISSION
US5655081A (en) * 1995-03-08 1997-08-05 Bmc Software, Inc. System for monitoring and managing computer resources and applications across a distributed computing environment using an intelligent autonomous agent architecture
TW278292B (en) 1995-03-17 1996-06-11 Advanced Micro Devices Inc Intrusion control for secure networks
US5680585A (en) 1995-03-31 1997-10-21 Bay Networks, Inc. Method and apparatus for defining data packet formats
US5619645A (en) * 1995-04-07 1997-04-08 Sun Microsystems, Inc. System isolation and fast-fail
EP0826181A4 (en) 1995-04-11 2005-02-09 Kinetech Inc Identifying data in a data processing system
JP2001517348A (en) * 1995-06-05 2001-10-02 松下寿電子工業株式会社 Flux-enhanced write transducer associated with a shared shield on a magnetoresistive read head and a process for manufacturing the same
US5790808A (en) * 1995-07-06 1998-08-04 3 Com Active topology maintenance in reconfiguring bridged local area networks with state transition with forgetting interval
US5862477A (en) * 1995-08-31 1999-01-19 Northern Telecom Limited Topology verification process for controlling a personal communication services system
US5826013A (en) 1995-09-28 1998-10-20 Symantec Corporation Polymorphic virus detection module
US6115802A (en) * 1995-10-13 2000-09-05 Sun Mircrosystems, Inc. Efficient hash table for use in multi-threaded environments
US5771291A (en) * 1995-12-11 1998-06-23 Newton; Farrell User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer
US5809230A (en) 1996-01-16 1998-09-15 Mclellan Software International, Llc System and method for controlling access to personal computer system resources
US5892924A (en) * 1996-01-31 1999-04-06 Ipsilon Networks, Inc. Method and apparatus for dynamically shifting between routing and switching packets in a transmission network
AU734747B2 (en) * 1996-01-31 2001-06-21 Ipsilon Networks, Inc. Improved method and apparatus for dynamically shifting between routing and switching packets in a transmission network
US5870550A (en) 1996-02-26 1999-02-09 Network Engineering Software Web server employing multi-homed, moldular framework
JP3165366B2 (en) * 1996-02-08 2001-05-14 株式会社日立製作所 Network security system
US5913024A (en) * 1996-02-09 1999-06-15 Secure Computing Corporation Secure server utilizing separate protocol stacks
US5740173A (en) * 1996-02-28 1998-04-14 Telefonaktiebolaget Lm Ericsson Asynchronous transfer mode (ATM) cell arrival monitoring system
US5768526A (en) * 1996-03-08 1998-06-16 Glenayre Electronics, Inc. Method and apparatus for validating data packets in a paging system
US5825750A (en) * 1996-03-29 1998-10-20 Motorola Method and apparatus for maintaining security in a packetized data communications network
US6032266A (en) * 1996-04-05 2000-02-29 Hitachi, Ltd. Network system having function of changing route upon failure
US6014645A (en) 1996-04-19 2000-01-11 Block Financial Corporation Real-time financial card application system
US5822434A (en) 1996-06-19 1998-10-13 Sun Microsystems, Inc. Scheme to allow two computers on a network to upgrade from a non-secured to a secured session
US5778070A (en) * 1996-06-28 1998-07-07 Intel Corporation Method and apparatus for protecting flash memory
US6031978A (en) * 1996-06-28 2000-02-29 International Business Machines Corporation System, method and program for enabling a client to reconnect to a same server in a network of computer systems after the server has moved to a different network address
US6041123A (en) * 1996-07-01 2000-03-21 Allsoft Distributing Incorporated Centralized secure communications system
US6115799A (en) * 1996-07-19 2000-09-05 Canon Kabushiki Kaisha Information processing apparatus and associated method for managing a memory using a next fit and for reducing a memory fragmentation problem
US6067620A (en) * 1996-07-30 2000-05-23 Holden; James M. Stand alone security device for computer networks
US5878337A (en) * 1996-08-08 1999-03-02 Joao; Raymond Anthony Transaction security apparatus and method
US6381632B1 (en) * 1996-09-10 2002-04-30 Youpowered, Inc. Method and apparatus for tracking network usage
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5958050A (en) 1996-09-24 1999-09-28 Electric Communities Trusted delegation system
US5844986A (en) 1996-09-30 1998-12-01 Intel Corporation Secure BIOS
US6049546A (en) * 1996-10-15 2000-04-11 At&T Corporation System and method for performing switching in multipoint-to-multipoint multicasting
US6253323B1 (en) * 1996-11-01 2001-06-26 Intel Corporation Object-based digital signatures
US6453345B2 (en) 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US5991881A (en) * 1996-11-08 1999-11-23 Harris Corporation Network surveillance system
US5796942A (en) * 1996-11-21 1998-08-18 Computer Associates International, Inc. Method and apparatus for automated network-wide surveillance and security breach intervention
US6021491A (en) * 1996-11-27 2000-02-01 Sun Microsystems, Inc. Digital signatures for data streams and data archives
US6665733B1 (en) 1996-12-30 2003-12-16 Hewlett-Packard Development Company, L.P. Network communication device including bonded ports for increased bandwidth
US6233686B1 (en) * 1997-01-17 2001-05-15 At & T Corp. System and method for providing peer level access control on a network
US5953502A (en) * 1997-02-13 1999-09-14 Helbig, Sr.; Walter A Method and apparatus for enhancing computer system security
US5960170A (en) 1997-03-18 1999-09-28 Trend Micro, Inc. Event triggered iterative virus detection
US5925126A (en) * 1997-03-18 1999-07-20 Memco Software, Ltd. Method for security shield implementation in computer system's software
US6226745B1 (en) * 1997-03-21 2001-05-01 Gio Wiederhold Information sharing system and method with requester dependent sharing and security rules
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6009474A (en) 1997-05-20 1999-12-28 Compaq Computer Corporation Method and apparatus for re-assigning network addresses to network servers by re-configuring a client host connected thereto
US5870350A (en) * 1997-05-21 1999-02-09 International Business Machines Corporation High performance, high bandwidth memory bus architecture utilizing SDRAMs
US6247032B1 (en) * 1997-06-19 2001-06-12 International Business Machines Corp. Automated system and method for approving web site content
US6122256A (en) 1997-08-18 2000-09-19 International Business Machines Corporation Fail-safe communications network for use in system power control
US5928363A (en) * 1997-08-27 1999-07-27 International Business Machines Corporation Method and means for preventing unauthorized resumption of suspended authenticated internet sessions using locking and trapping measures
US6009524A (en) 1997-08-29 1999-12-28 Compact Computer Corp Method for the secure remote flashing of a BIOS memory
US5961644A (en) 1997-09-19 1999-10-05 International Business Machines Corporation Method and apparatus for testing the integrity of computer security alarm systems
SE513936C2 (en) 1997-10-10 2000-11-27 Ericsson Telefon Ab L M Method and system for providing access port addressing in a generic radio access network
US6097817A (en) * 1997-12-10 2000-08-01 Omnipoint Corporation Encryption and decryption in communication system with wireless trunk
US6311274B1 (en) 1997-12-15 2001-10-30 Intel Corporation Network alert handling system and method
US6079020A (en) * 1998-01-27 2000-06-20 Vpnet Technologies, Inc. Method and apparatus for managing a virtual private network
US6070246A (en) * 1998-02-04 2000-05-30 3Com Corporation Method and system for secure cable modem initialization
US6442694B1 (en) 1998-02-27 2002-08-27 Massachusetts Institute Of Technology Fault isolation for communication networks for isolating the source of faults comprising attacks, failures, and other network propagating errors
US6055236A (en) 1998-03-05 2000-04-25 3Com Corporation Method and system for locating network services with distributed network address translation
US6170063B1 (en) * 1998-03-07 2001-01-02 Hewlett-Packard Company Method for performing atomic, concurrent read and write operations on multiple storage devices
US6141686A (en) 1998-03-13 2000-10-31 Deterministic Networks, Inc. Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control
US6453419B1 (en) 1998-03-18 2002-09-17 Secure Computing Corporation System and method for implementing a security policy
DE19812330C2 (en) * 1998-03-20 2002-08-08 Dornier Gmbh Launching device for a towed missile
USH1944H1 (en) * 1998-03-24 2001-02-06 Lucent Technologies Inc. Firewall security method and apparatus
US6058431A (en) * 1998-04-23 2000-05-02 Lucent Technologies Remote Access Business Unit System and method for network address translation as an external service in the access server of a service provider
US6408391B1 (en) * 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
US6628653B1 (en) 1998-06-04 2003-09-30 Nortel Networks Limited Programmable packet switching device
US6347374B1 (en) * 1998-06-05 2002-02-12 Intrusion.Com, Inc. Event detection
US6278966B1 (en) 1998-06-18 2001-08-21 International Business Machines Corporation Method and system for emulating web site traffic to identify web site usage patterns
US6256393B1 (en) * 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
US6134664A (en) 1998-07-06 2000-10-17 Prc Inc. Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources
US6351752B1 (en) * 1998-07-08 2002-02-26 Ncr Corporation Method and apparatus for detecting changes to a collection of objects
US6269447B1 (en) * 1998-07-21 2001-07-31 Raytheon Company Information security analysis system
US6256664B1 (en) * 1998-09-01 2001-07-03 Bigfix, Inc. Method and apparatus for computed relevance messaging
JP2002526830A (en) * 1998-09-28 2002-08-20 アーガス システムズ グループ,インク. Compartmentalized trust computer operating system
US6577920B1 (en) * 1998-10-02 2003-06-10 Data Fellows Oyj Computer virus screening
US6560611B1 (en) * 1998-10-13 2003-05-06 Netarx, Inc. Method, apparatus, and article of manufacture for a network monitoring system
US6389458B2 (en) * 1998-10-30 2002-05-14 Ideaflood, Inc. Method, apparatus and system for directing access to content on a computer network
US6367029B1 (en) * 1998-11-03 2002-04-02 Sun Microsystems, Inc. File server system tolerant to software and hardware failures
US6381646B2 (en) * 1998-11-03 2002-04-30 Cisco Technology, Inc. Multiple network connections from a single PPP link with partial network address translation
US6321338B1 (en) 1998-11-09 2001-11-20 Sri International Network surveillance
US6260016B1 (en) * 1998-11-25 2001-07-10 Matsushita Electric Industrial Co., Ltd. Speech synthesis employing prosody templates
JP2000174794A (en) 1998-12-09 2000-06-23 Canon Inc Device and method for controlling communication
US6574194B1 (en) * 1998-12-18 2003-06-03 Cypress Semiconductor Corporation Architecture of data communications switching system and associated method
US6499107B1 (en) 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US6839850B1 (en) * 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US6405318B1 (en) * 1999-03-12 2002-06-11 Psionic Software, Inc. Intrusion detection system
US6804778B1 (en) 1999-04-15 2004-10-12 Gilian Technologies, Ltd. Data quality assurance
US6351811B1 (en) * 1999-04-22 2002-02-26 Adapt Network Security, L.L.C. Systems and methods for preventing transmission of compromised data in a computer network
US6470027B1 (en) 1999-04-30 2002-10-22 At&T Corp. System and method for providing message redirection in networked environments
US6681331B1 (en) * 1999-05-11 2004-01-20 Cylant, Inc. Dynamic software system intrusion detection
US7117532B1 (en) * 1999-07-14 2006-10-03 Symantec Corporation System and method for generating fictitious content for a computer
US6981155B1 (en) * 1999-07-14 2005-12-27 Symantec Corporation System and method for computer security
US6886102B1 (en) * 1999-07-14 2005-04-26 Symantec Corporation System and method for protecting a computer network against denial of service attacks
US7152239B1 (en) * 1999-07-14 2006-12-19 Symantec Corporation System and method for preventing detection of a computer connection to an external device
AU5935400A (en) 1999-07-14 2001-01-30 Recourse Technologies, Inc. System and method for protecting a computer network against denial of service attacks
US7085936B1 (en) 1999-08-30 2006-08-01 Symantec Corporation System and method for using login correlations to detect intrusions
US7203962B1 (en) * 1999-08-30 2007-04-10 Symantec Corporation System and method for using timestamps to detect attacks
US6647400B1 (en) 1999-08-30 2003-11-11 Symantec Corporation System and method for analyzing filesystems to detect intrusions
US6971028B1 (en) 1999-08-30 2005-11-29 Symantec Corporation System and method for tracking the source of a computer attack
US7065657B1 (en) * 1999-08-30 2006-06-20 Symantec Corporation Extensible intrusion detection system
US6996843B1 (en) * 1999-08-30 2006-02-07 Symantec Corporation System and method for detecting computer intrusions
US6826697B1 (en) 1999-08-30 2004-11-30 Symantec Corporation System and method for detecting buffer overflow attacks
US6757717B1 (en) * 1999-09-16 2004-06-29 Proxyconn, Inc. System and method for data access
US6687833B1 (en) * 1999-09-24 2004-02-03 Networks Associates, Inc. System and method for providing a network host decoy using a pseudo network protocol stack implementation
US6470384B1 (en) 1999-10-28 2002-10-22 Networks Associates, Inc. Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment
US6567808B1 (en) * 2000-03-31 2003-05-20 Networks Associates, Inc. System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment
US6519703B1 (en) * 2000-04-14 2003-02-11 James B. Joyce Methods and apparatus for heuristic firewall
US7007301B2 (en) * 2000-06-12 2006-02-28 Hewlett-Packard Development Company, L.P. Computer architecture for an intrusion detection system
US6907533B2 (en) * 2000-07-14 2005-06-14 Symantec Corporation System and method for computer security using multiple cages
US7032114B1 (en) * 2000-08-30 2006-04-18 Symantec Corporation System and method for using signatures to detect computer intrusions
US20020066034A1 (en) * 2000-10-24 2002-05-30 Schlossberg Barry J. Distributed network security deception system
US20020087883A1 (en) * 2000-11-06 2002-07-04 Curt Wohlgemuth Anti-piracy system for remotely served computer applications
US7290283B2 (en) 2001-01-31 2007-10-30 Lancope, Inc. Network port profiling
US6966837B1 (en) * 2001-05-10 2005-11-22 Best Robert M Linked portable and video game systems
US6694045B2 (en) * 2002-01-23 2004-02-17 Amerasia International Technology, Inc. Generation and verification of a digitized signature
US7359962B2 (en) 2002-04-30 2008-04-15 3Com Corporation Network security system integration

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109416717A (en) * 2016-02-08 2019-03-01 利弗莱姆有限公司 For the variation fingerprint identification of database table, text file and data feeding

Also Published As

Publication number Publication date
AU6218800A (en) 2001-01-30
WO2001004733A1 (en) 2001-01-18
WO2001004759A9 (en) 2002-07-25
US20090064331A1 (en) 2009-03-05
WO2001004757A1 (en) 2001-01-18
AU6214900A (en) 2001-01-30
EP1210665A4 (en) 2008-12-03
EP1212682A4 (en) 2005-03-30
EP1203280A1 (en) 2002-05-08
WO2001006386A1 (en) 2001-01-25
EP1203280B1 (en) 2017-08-30
EP1210665A1 (en) 2002-06-05
AU5935400A (en) 2001-01-30
EP1212682B8 (en) 2016-12-28
AU6098800A (en) 2001-02-05
WO2001004753A1 (en) 2001-01-18
US7827605B2 (en) 2010-11-02
AU6107600A (en) 2001-01-30
AU6098700A (en) 2001-02-05
US7461402B1 (en) 2008-12-02
WO2001004759A1 (en) 2001-01-18
WO2001005168A1 (en) 2001-01-18
EP1212682A1 (en) 2002-06-12
AU6218700A (en) 2001-01-30
EP1212682B1 (en) 2016-08-31
WO2001004758A1 (en) 2001-01-18
WO2001006373A1 (en) 2001-01-25
AU6103900A (en) 2001-01-30
EP1203280A4 (en) 2009-04-08

Similar Documents

Publication Publication Date Title
WO2001005168A9 (en) System and method for preventing detection of a computer connection to an external device
CA2362935A1 (en) Protecting information in a system
CA2312096A1 (en) Mass storage data protection device for a gaming machine
WO2001022322A3 (en) Electronic commerce with cryptographic authentication
TW344051B (en) Optimized security fuction in an electronic system
EP1467513A3 (en) Method and apparatus for preventing unauthorised write access to a protected non-volatile storage
AU2002239500A1 (en) Cryptographic data security system and method
AU5135499A (en) Methods and systems for establishing a shared secret using an authentication token
EP1313108A3 (en) Memory and data processing units and data processing methods
MY125905A (en) Electronic access control system and method
AU2002305649A1 (en) Biometric detection system and method preventing unauthorized use
WO2002047401A3 (en) Method of receiving specific information at a mobile terminal
WO2002006930A3 (en) Identifying unauthorized communication systems based on their memory contents
AU8348901A (en) Method and system for conducting secure electronic commerce transactions with authorization request data loop-back
AU2001288309A1 (en) Distributed information system and protocol for affixing electronic signatures and authenticating documents
AU2001273525A1 (en) Methods and systems for authenticating business partners for secured electronic transactions
AU8470998A (en) Cryptographic system and protocol for establishing secure authenticated remote access
EP0945777A3 (en) Computer architecture with password-checking bus bridge
EP1331818A4 (en) Information processing device, electronic device, information processing method, and medium
EP0836131A3 (en) Security of remote computing devices
AU3908899A (en) Portable electronic device, entertainment system, and recording medium
WO1999035778A3 (en) Low level content filtering
EP0897144A3 (en) Method and apparatus for providing access protection in an integrated circuit
EP0183608A3 (en) Software security system
CA2361763A1 (en) Computer system identification

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

AK Designated states

Kind code of ref document: C2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

COP Corrected version of pamphlet

Free format text: PAGES 1/15-15/15, DRAWINGS, REPLACED BY NEW PAGES 1/15-15/15; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP