USRE43103E1 - System and method for protecting a computer system from malicious software - Google Patents
System and method for protecting a computer system from malicious software Download PDFInfo
- Publication number
- USRE43103E1 USRE43103E1 US12/854,149 US85414910A USRE43103E US RE43103 E1 USRE43103 E1 US RE43103E1 US 85414910 A US85414910 A US 85414910A US RE43103 E USRE43103 E US RE43103E
- Authority
- US
- United States
- Prior art keywords
- memory space
- data
- malware
- network
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Abstract
Description
U.S. Pat. No. | ||
or PUB | ||
application No. | Title | Inventor(s) |
5,826,013 | Polymorphic virus detection module. | Nachenberg |
5,978,917 | Detection and elimination of macro viruses. | Chi |
6,735,700 | Fast virus scanning using session stamping. | Flint, et al |
6,663,000 | Validating components of a malware scanner. | Muttik, |
et al. | ||
6,553,377 | System and process for maintaining a | Eschelbeck, |
plurality of remote security applications | et al. | |
using a modular framework in a distributed | ||
computing environment. | ||
6,216,112 | Method for software distribution and | Fuller, et al. |
compensation with replenishable | ||
advertisements. | ||
4,890,098 | Flexible window management on a computer | Dawes, |
display. | et al. | |
5,555,364 | Windowed computer display. | Goldstein |
5,666,030 | Multiple window generation in computer | Parson |
display. | ||
5,995,103 | Window grouping mechanism for creating, | Ashe |
manipulating and displaying windows and | ||
window groups on a display screen of a | ||
computer system. | ||
5,502,808 | Video graphics display system with adapter | Goddard, |
for display management based upon plural | et al. | |
memory sources. | ||
5,280,579 | Memory mapped interface between host | Nye |
computer and graphics system. | ||
5,918,039 | Method and apparatus for display of | Buswell, |
windowing application programs on a | et al | |
terminal. | ||
6,480,198 | Multi-function controller and method for a | Kang |
computer graphics display system. | ||
6,167,522 | Method and apparatus for providing security | Lee, et al. |
for servers executing application programs | ||
received via a network | ||
6,199,181 | Method and system for maintaining restricted | Rechef, |
operating environments for application | et al. | |
programs or operating systems. | ||
6,275,938 | Security enhancement for untrusted | Bond, et al. |
executable code. | ||
6,321,337 | Method and system for protecting operations | Reshef, |
of trusted internal networks. | et al. | |
6,351,816 | System and method for securing a program's | Mueller, |
execution in a network environment. | et al. | |
6,546,554 | Browser-independent and automatic | Schmidt, |
apparatus and method for receiving, installing | et al. | |
and launching applications from a browser on | ||
a client computer. | ||
6,658,573 | Protecting resources in a distributed | Bischof, |
computer system. | et al | |
6,507,904 | Executing isolated mode instructions in a | Ellison, |
secure system running in privilege rings. | et al. | |
6,633,963 | Controlling access to multiple memory zones | Ellison, |
in an isolated execution environment. | et al. | |
6,678,825 | Controlling access to multiple isolated | Ellison, |
memories in an isolated execution | et al. | |
environment. | ||
5,751,979 | Video hardware for protected, | McCrory |
multiprocessing systems. | ||
6,581,162 | Method for securely creating, storing and | Angelo, |
using encryption keys in a computer system. | et al. | |
6,134,661 | Computer network security device and | Topp |
method. | ||
6,578,140 | Personal computer having a master computer | Policard |
system and in internet computer system and | ||
monitoring a condition of said master and | ||
internet computer systems | ||
PUB | E-mail software and method and system for | Jacobs, |
Application # | distributing advertisements to client devices | Paul E., et |
20040054588 | that have such e-mail software installed | al. |
thereon. | ||
PUB | System and method for comprehensive | Mayer, |
Application # | general generic protection for computers | Yaron; |
20040034794 | against malicious programs that may steal | et al. |
information and/or cause damages | ||
PUB | System and method for providing security to | Skrepetos, |
Application # | a remote computer over a network browser | Nicholas C. |
20040006715 | interface. | |
PUB | Virus protection in an internet environment. | Samman, |
Application # | Ben | |
20030177397 | ||
PUB | System and method for protecting computer | Pham, |
Application # | users from web sites hosting computer | Khai; et al. |
20030097591 | viruses. | |
PUB | Malware infection suppression. | Hinchliffe, |
Application # | James; et al. | Alexander |
20030023857 | ||
PUB | Access control for computers. | Riordan, |
Application # | James | |
20020066016 | ||
PUB | Detecting malicious alteration of stored | Wolff, |
Application # | computer files. | Daniel |
20020174349 | Joseph; | |
et al. | ||
Claims (71)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/854,149 USRE43103E1 (en) | 2004-08-07 | 2010-08-10 | System and method for protecting a computer system from malicious software |
US13/015,186 USRE43987E1 (en) | 2004-08-07 | 2011-01-27 | System and method for protecting a computer system from malicious software |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/913,609 US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
US12/854,149 USRE43103E1 (en) | 2004-08-07 | 2010-08-10 | System and method for protecting a computer system from malicious software |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Reissue US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Continuation US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE43103E1 true USRE43103E1 (en) | 2012-01-10 |
Family
ID=35759063
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Active - Reinstated 2026-07-18 US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
US12/720,207 Active 2026-07-18 USRE43500E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/720,147 Active 2026-07-18 USRE43528E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/854,149 Active 2026-07-18 USRE43103E1 (en) | 2004-08-07 | 2010-08-10 | System and method for protecting a computer system from malicious software |
US12/941,067 Active 2026-07-18 USRE43529E1 (en) | 2004-08-07 | 2010-11-07 | System and method for protecting a computer system from malicious software |
US13/015,186 Active 2026-07-18 USRE43987E1 (en) | 2004-08-07 | 2011-01-27 | System and method for protecting a computer system from malicious software |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,609 Active - Reinstated 2026-07-18 US7484247B2 (en) | 2004-08-07 | 2004-08-07 | System and method for protecting a computer system from malicious software |
US12/720,207 Active 2026-07-18 USRE43500E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
US12/720,147 Active 2026-07-18 USRE43528E1 (en) | 2004-08-07 | 2010-03-09 | System and method for protecting a computer system from malicious software |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/941,067 Active 2026-07-18 USRE43529E1 (en) | 2004-08-07 | 2010-11-07 | System and method for protecting a computer system from malicious software |
US13/015,186 Active 2026-07-18 USRE43987E1 (en) | 2004-08-07 | 2011-01-27 | System and method for protecting a computer system from malicious software |
Country Status (1)
Country | Link |
---|---|
US (6) | US7484247B2 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090063869A1 (en) * | 2006-01-17 | 2009-03-05 | Ran Kohavi | Securing Data in a Networked Environment |
US20090118839A1 (en) * | 2007-11-06 | 2009-05-07 | Jos Manuel Accapadi | Methodology for secure application partitioning enablement |
US20090328033A1 (en) * | 2006-01-17 | 2009-12-31 | Kidaro (Israel) Ltd. | Seamless integration of multiple computing environments |
US20130007883A1 (en) * | 2011-06-28 | 2013-01-03 | Kaspersky Lab Zao | Portable Security Device and Methods for Detection and Treatment of Malware |
US20130179667A1 (en) * | 2010-09-29 | 2013-07-11 | Beijing Lenovo Software Ltd. | Methods and systems for state switching |
US20130347114A1 (en) * | 2012-04-30 | 2013-12-26 | Verint Systems Ltd. | System and method for malware detection |
US20140090061A1 (en) * | 2012-09-26 | 2014-03-27 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US20140096226A1 (en) * | 2012-10-02 | 2014-04-03 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
US9342695B2 (en) | 2012-10-02 | 2016-05-17 | Mordecai Barkan | Secured automated or semi-automated systems |
US20160139846A1 (en) * | 2013-06-19 | 2016-05-19 | Telefonaktiebolaget L M Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
US9672360B2 (en) | 2012-10-02 | 2017-06-06 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US9832216B2 (en) | 2014-11-21 | 2017-11-28 | Bluvector, Inc. | System and method for network data characterization |
US9870116B1 (en) | 2013-12-09 | 2018-01-16 | Google Llc | Controlling actions for browser extensions |
US9923913B2 (en) | 2013-06-04 | 2018-03-20 | Verint Systems Ltd. | System and method for malware detection learning |
US10142426B2 (en) | 2015-03-29 | 2018-11-27 | Verint Systems Ltd. | System and method for identifying communication session participants based on traffic patterns |
US10198427B2 (en) | 2013-01-29 | 2019-02-05 | Verint Systems Ltd. | System and method for keyword spotting using representative dictionary |
US10491609B2 (en) | 2016-10-10 | 2019-11-26 | Verint Systems Ltd. | System and method for generating data sets for learning to identify user actions |
US10546008B2 (en) | 2015-10-22 | 2020-01-28 | Verint Systems Ltd. | System and method for maintaining a dynamic dictionary |
US10560842B2 (en) | 2015-01-28 | 2020-02-11 | Verint Systems Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US10614107B2 (en) | 2015-10-22 | 2020-04-07 | Verint Systems Ltd. | System and method for keyword searching using both static and dynamic dictionaries |
US10630588B2 (en) | 2014-07-24 | 2020-04-21 | Verint Systems Ltd. | System and method for range matching |
US10958613B2 (en) | 2018-01-01 | 2021-03-23 | Verint Systems Ltd. | System and method for identifying pairs of related application users |
US10972558B2 (en) | 2017-04-30 | 2021-04-06 | Verint Systems Ltd. | System and method for tracking users of computer applications |
US10999295B2 (en) | 2019-03-20 | 2021-05-04 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
US11126720B2 (en) | 2012-09-26 | 2021-09-21 | Bluvector, Inc. | System and method for automated machine-learning, zero-day malware detection |
US11188652B2 (en) | 2012-10-02 | 2021-11-30 | Mordecai Barkan | Access management and credential protection |
US11381977B2 (en) | 2016-04-25 | 2022-07-05 | Cognyte Technologies Israel Ltd. | System and method for decrypting communication exchanged on a wireless local area network |
US11399016B2 (en) | 2019-11-03 | 2022-07-26 | Cognyte Technologies Israel Ltd. | System and method for identifying exchanges of encrypted communication traffic |
US11403559B2 (en) | 2018-08-05 | 2022-08-02 | Cognyte Technologies Israel Ltd. | System and method for using a user-action log to learn to classify encrypted traffic |
US11575625B2 (en) | 2017-04-30 | 2023-02-07 | Cognyte Technologies Israel Ltd. | System and method for identifying relationships between users of computer applications |
Families Citing this family (121)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7926097B2 (en) | 1996-11-29 | 2011-04-12 | Ellis Iii Frampton E | Computer or microchip protected from the internet by internal hardware |
US7506020B2 (en) | 1996-11-29 | 2009-03-17 | Frampton E Ellis | Global network computers |
US20040003081A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | System and method for providing program credentials |
US7757291B2 (en) | 2003-09-15 | 2010-07-13 | Trigence Corp. | Malware containment by application encapsulation |
US8335909B2 (en) | 2004-04-15 | 2012-12-18 | Raytheon Company | Coupling processors to each other for high performance computing (HPC) |
US9178784B2 (en) | 2004-04-15 | 2015-11-03 | Raytheon Company | System and method for cluster management based on HPC architecture |
US8336040B2 (en) | 2004-04-15 | 2012-12-18 | Raytheon Company | System and method for topology-aware job scheduling and backfilling in an HPC environment |
US8707251B2 (en) * | 2004-06-07 | 2014-04-22 | International Business Machines Corporation | Buffered viewing of electronic documents |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
JP4811271B2 (en) * | 2004-08-25 | 2011-11-09 | 日本電気株式会社 | Information communication apparatus and program execution environment control method |
US7533131B2 (en) * | 2004-10-01 | 2009-05-12 | Webroot Software, Inc. | System and method for pestware detection and removal |
KR20060061219A (en) * | 2004-12-01 | 2006-06-07 | 주식회사 비에스텍 | E n c r y p t i o n p r o c e s s o r |
US7571475B2 (en) * | 2005-04-05 | 2009-08-04 | Cisco Technology, Inc. | Method and electronic device for triggering zeroization in an electronic device |
US20060230455A1 (en) * | 2005-04-12 | 2006-10-12 | Yuan-Chang Lo | Apparatus and methods for file system with write buffer to protect against malware |
US7565695B2 (en) * | 2005-04-12 | 2009-07-21 | Webroot Software, Inc. | System and method for directly accessing data from a data storage medium |
US8452744B2 (en) * | 2005-06-06 | 2013-05-28 | Webroot Inc. | System and method for analyzing locked files |
WO2006131921A2 (en) * | 2005-06-08 | 2006-12-14 | Discretix Technologies Ltd. | Method, device, and system of maintaining a context of a secure execution environment |
US7788132B2 (en) * | 2005-06-29 | 2010-08-31 | Google, Inc. | Reviewing the suitability of Websites for participation in an advertising network |
US20090144826A2 (en) * | 2005-06-30 | 2009-06-04 | Webroot Software, Inc. | Systems and Methods for Identifying Malware Distribution |
US7712132B1 (en) | 2005-10-06 | 2010-05-04 | Ogilvie John W | Detecting surreptitious spyware |
US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
US8869270B2 (en) | 2008-03-26 | 2014-10-21 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US20080276302A1 (en) | 2005-12-13 | 2008-11-06 | Yoggie Security Systems Ltd. | System and Method for Providing Data and Device Security Between External and Host Devices |
US20070168694A1 (en) * | 2006-01-18 | 2007-07-19 | Phil Maddaloni | System and method for identifying and removing pestware using a secondary operating system |
WO2007149140A2 (en) * | 2006-03-30 | 2007-12-27 | Antlabs | System and method for providing transactional security for an end-user device |
US9112897B2 (en) * | 2006-03-30 | 2015-08-18 | Advanced Network Technology Laboratories Pte Ltd. | System and method for securing a network session |
US20070234337A1 (en) * | 2006-03-31 | 2007-10-04 | Prowess Consulting, Llc | System and method for sanitizing a computer program |
US9547485B2 (en) | 2006-03-31 | 2017-01-17 | Prowess Consulting, Llc | System and method for deploying a virtual machine |
US20070237088A1 (en) * | 2006-04-05 | 2007-10-11 | Honeywell International. Inc | Apparatus and method for providing network security |
US8117654B2 (en) * | 2006-06-30 | 2012-02-14 | The Invention Science Fund I, Llc | Implementation of malware countermeasures in a network device |
US8613095B2 (en) * | 2006-06-30 | 2013-12-17 | The Invention Science Fund I, Llc | Smart distribution of a malware countermeasure |
US7934260B2 (en) * | 2006-04-27 | 2011-04-26 | The Invention Science Fund I, Llc | Virus immunization using entity-sponsored bypass network |
US7849508B2 (en) * | 2006-04-27 | 2010-12-07 | The Invention Science Fund I, Llc | Virus immunization using entity-sponsored bypass network |
US8966630B2 (en) * | 2006-04-27 | 2015-02-24 | The Invention Science Fund I, Llc | Generating and distributing a malware countermeasure |
US8863285B2 (en) * | 2006-04-27 | 2014-10-14 | The Invention Science Fund I, Llc | Virus immunization using prioritized routing |
US8539581B2 (en) * | 2006-04-27 | 2013-09-17 | The Invention Science Fund I, Llc | Efficient distribution of a malware countermeasure |
US9258327B2 (en) | 2006-04-27 | 2016-02-09 | Invention Science Fund I, Llc | Multi-network virus immunization |
US7917956B2 (en) * | 2006-04-27 | 2011-03-29 | The Invention Science Fund I, Llc | Multi-network virus immunization |
US8151353B2 (en) | 2006-04-27 | 2012-04-03 | The Invention Science Fund I, Llc | Multi-network virus immunization with trust aspects |
US8191145B2 (en) * | 2006-04-27 | 2012-05-29 | The Invention Science Fund I, Llc | Virus immunization using prioritized routing |
US8888585B1 (en) * | 2006-05-10 | 2014-11-18 | Mcafee, Inc. | Game console system, method and computer program product with anti-malware/spyware and parental control capabilities |
US8185737B2 (en) * | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
US7996903B2 (en) | 2006-07-07 | 2011-08-09 | Webroot Software, Inc. | Method and system for detecting and removing hidden pestware files |
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
JP4895718B2 (en) * | 2006-08-14 | 2012-03-14 | 株式会社リコー | Image forming apparatus, data recovery method, and recording medium |
US8136162B2 (en) * | 2006-08-31 | 2012-03-13 | Broadcom Corporation | Intelligent network interface controller |
US8056134B1 (en) | 2006-09-10 | 2011-11-08 | Ogilvie John W | Malware detection and identification via malware spoofing |
US9639696B1 (en) * | 2006-09-29 | 2017-05-02 | Symantec Operating Corporation | Method and apparatus for analyzing end user license agreements |
US7941852B2 (en) * | 2006-10-04 | 2011-05-10 | Symantec Corporation | Detecting an audio/visual threat |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US20080182667A1 (en) * | 2007-01-25 | 2008-07-31 | Igt, Inc. | Method of securing data on a portable gaming device from tampering |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8726041B2 (en) * | 2007-05-09 | 2014-05-13 | Sony Corporation | Methods and apparatus for generating a random number in one or more isolated processors |
US8365272B2 (en) | 2007-05-30 | 2013-01-29 | Yoggie Security Systems Ltd. | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US8199965B1 (en) * | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US20130276061A1 (en) | 2007-09-05 | 2013-10-17 | Gopi Krishna Chebiyyam | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US8446607B2 (en) * | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US8918865B2 (en) * | 2008-01-22 | 2014-12-23 | Wontok, Inc. | System and method for protecting data accessed through a network connection |
WO2009094371A1 (en) * | 2008-01-22 | 2009-07-30 | Authentium, Inc. | Trusted secure desktop |
US8893285B2 (en) * | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US9524344B2 (en) * | 2008-06-03 | 2016-12-20 | Microsoft Corporation | User interface for online ads |
US20090299862A1 (en) * | 2008-06-03 | 2009-12-03 | Microsoft Corporation | Online ad serving |
US8813050B2 (en) * | 2008-06-03 | 2014-08-19 | Isight Partners, Inc. | Electronic crime detection and tracking |
US8151073B2 (en) * | 2008-06-25 | 2012-04-03 | Fac Systems Inc. | Security system for computers |
US20090327869A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Online ad serving |
US7530106B1 (en) * | 2008-07-02 | 2009-05-05 | Kaspersky Lab, Zao | System and method for security rating of computer processes |
US8631488B2 (en) | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US9077684B1 (en) | 2008-08-06 | 2015-07-07 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
KR101012669B1 (en) * | 2008-09-25 | 2011-02-11 | 주식회사 안철수연구소 | Malicious program detector for scanning a illegal memory access and method thereof |
JP4696151B2 (en) * | 2008-10-23 | 2011-06-08 | 株式会社エヌ・ティ・ティ・ドコモ | Information processing apparatus and memory management method |
US9166797B2 (en) * | 2008-10-24 | 2015-10-20 | Microsoft Technology Licensing, Llc | Secured compartment for transactions |
WO2010059864A1 (en) | 2008-11-19 | 2010-05-27 | Yoggie Security Systems Ltd. | Systems and methods for providing real time access monitoring of a removable media device |
US8607345B1 (en) | 2008-12-16 | 2013-12-10 | Trend Micro Incorporated | Method and apparatus for generic malware downloader detection and prevention |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
KR101135629B1 (en) * | 2009-10-26 | 2012-04-17 | 한국전자통신연구원 | Method and apparatus for preventing autorun of portable USB storage |
WO2011060190A1 (en) * | 2009-11-12 | 2011-05-19 | Dan Kaminsky Holdings, Llc | Apparatus and method for securing and isolating operational nodes in a computer network |
US8494974B2 (en) * | 2010-01-18 | 2013-07-23 | iSIGHT Partners Inc. | Targeted security implementation through security loss forecasting |
US8255986B2 (en) * | 2010-01-26 | 2012-08-28 | Frampton E. Ellis | Methods of securely controlling through one or more separate private networks an internet-connected computer having one or more hardware-based inner firewalls or access barriers |
US8429735B2 (en) | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
US20110213809A1 (en) * | 2010-03-01 | 2011-09-01 | Panda Security, S.L. | Method, a system and a computer program product for protecting a data-storing device |
US8495739B2 (en) | 2010-04-07 | 2013-07-23 | International Business Machines Corporation | System and method for ensuring scanning of files without caching the files to network device |
US20110273452A1 (en) * | 2010-05-10 | 2011-11-10 | Nokia Siemens Networks Oy | Data display |
US9202049B1 (en) | 2010-06-21 | 2015-12-01 | Pulse Secure, Llc | Detecting malware on mobile devices |
US8082585B1 (en) * | 2010-09-13 | 2011-12-20 | Raymond R. Givonetti | Protecting computers from malware using a hardware solution that is not alterable by any software |
US8438644B2 (en) | 2011-03-07 | 2013-05-07 | Isight Partners, Inc. | Information system security based on threat vectors |
KR20120118353A (en) * | 2011-04-18 | 2012-10-26 | 삼성전자주식회사 | Broadcast receiving apparatus and method of installing service |
US20130096980A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | User-defined countermeasures |
TWI619038B (en) * | 2011-11-07 | 2018-03-21 | Admedec Co Ltd | Safety box |
US9047456B2 (en) | 2012-03-20 | 2015-06-02 | Canon Information And Imaging Solutions, Inc. | System and method for controlling access to a resource |
US8832837B2 (en) * | 2012-06-29 | 2014-09-09 | Mcafee Inc. | Preventing attacks on devices with multiple CPUs |
RU2531565C2 (en) | 2012-09-28 | 2014-10-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for analysing file launch events for determining safety ranking thereof |
US9973501B2 (en) | 2012-10-09 | 2018-05-15 | Cupp Computing As | Transaction security systems and methods |
WO2014142810A1 (en) | 2013-03-12 | 2014-09-18 | Intel Corporation | Preventing malicious instruction execution |
US9501645B2 (en) * | 2013-03-15 | 2016-11-22 | Rudolf H. Hendel | System and method for the protection of computers and computer networks against cyber threats |
WO2014185893A1 (en) * | 2013-05-14 | 2014-11-20 | Hewlett-Packard Development Company, L.P. | Detection of a security event |
WO2015006375A1 (en) | 2013-07-08 | 2015-01-15 | Cupp Computing As | Systems and methods for providing digital content marketplace security |
US9177150B1 (en) * | 2013-12-04 | 2015-11-03 | Google Inc. | Detecting setting tampering |
US9762614B2 (en) | 2014-02-13 | 2017-09-12 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US9749343B2 (en) | 2014-04-03 | 2017-08-29 | Fireeye, Inc. | System and method of cyber threat structure mapping and application to cyber threat mitigation |
US9749344B2 (en) | 2014-04-03 | 2017-08-29 | Fireeye, Inc. | System and method of cyber threat intensity determination and application to cyber threat mitigation |
US9372996B2 (en) * | 2014-05-15 | 2016-06-21 | International Business Machines Corporation | Protecting data owned by an operating system in a multi-operating system mobile environment |
US20160006754A1 (en) * | 2014-07-01 | 2016-01-07 | Mcafee, Inc. | Secure enclave-rendered contents |
US9892261B2 (en) | 2015-04-28 | 2018-02-13 | Fireeye, Inc. | Computer imposed countermeasures driven by malware lineage |
US11461456B1 (en) * | 2015-06-19 | 2022-10-04 | Stanley Kevin Miles | Multi-transfer resource allocation using modified instances of corresponding records in memory |
US11176240B1 (en) * | 2021-04-20 | 2021-11-16 | Stanley Kevin Miles | Multi-transfer resource allocation using modified instances of corresponding records in memory |
US10715533B2 (en) * | 2016-07-26 | 2020-07-14 | Microsoft Technology Licensing, Llc. | Remediation for ransomware attacks on cloud drive folders |
US10540498B2 (en) * | 2016-08-12 | 2020-01-21 | Intel Corporation | Technologies for hardware assisted native malware detection |
US10628585B2 (en) | 2017-01-23 | 2020-04-21 | Microsoft Technology Licensing, Llc | Ransomware resilient databases |
KR101997254B1 (en) * | 2017-05-10 | 2019-07-08 | 김덕우 | Computer having isolated user computing part |
KR101920866B1 (en) * | 2017-05-18 | 2018-11-21 | 김덕우 | An auxiliary memory device having independent recovery region |
US10061923B1 (en) * | 2017-06-26 | 2018-08-28 | Pritam Nath | Safe and secure internet or network connected computing machine providing means for processing, manipulating, receiving, transmitting and storing information free from hackers, hijackers, virus, malware etc. |
US11750623B2 (en) * | 2017-09-04 | 2023-09-05 | ITsMine Ltd. | System and method for conducting a detailed computerized surveillance in a computerized environment |
US10924377B2 (en) * | 2018-09-11 | 2021-02-16 | Citrix Systems, Inc. | Systems and methods for application scripts for cross-domain applications |
CN110505283B (en) * | 2019-07-31 | 2022-10-21 | 湖南微算互联信息技术有限公司 | Automatic maintenance system and method based on cloud mobile phone |
US11625505B2 (en) * | 2019-08-19 | 2023-04-11 | Microsoft Technology Licensing, Llc | Processor with network stack domain and system domain using separate memory regions |
US11470118B2 (en) | 2019-11-01 | 2022-10-11 | Microsoft Technology Licensing, Llc | Processor with network processing stack having separate binary |
US11403403B2 (en) * | 2020-04-13 | 2022-08-02 | KameleonSec Ltd. | Secure processing engine for securing a computing system |
WO2021211091A1 (en) * | 2020-04-13 | 2021-10-21 | KameleonSec Ltd. | Secure processing engine for securing a computing system |
US11586727B2 (en) * | 2021-03-29 | 2023-02-21 | Red Hat, Inc. | Systems and methods for preventing kernel stalling attacks |
US11599636B1 (en) * | 2022-07-27 | 2023-03-07 | Aurora Security Llc | Systems and methods for managing and providing software packages which have undergone malware and/or vulnerability analysis |
Citations (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4890098A (en) | 1987-10-20 | 1989-12-26 | International Business Machines Corporation | Flexible window management on a computer display |
US5280579A (en) | 1990-09-28 | 1994-01-18 | Texas Instruments Incorporated | Memory mapped interface between host computer and graphics system |
US5502808A (en) | 1991-07-24 | 1996-03-26 | Texas Instruments Incorporated | Video graphics display system with adapter for display management based upon plural memory sources |
US5555364A (en) | 1994-08-23 | 1996-09-10 | Prosoft Corporation | Windowed computer display |
US5564051A (en) * | 1989-08-03 | 1996-10-08 | International Business Machines Corporation | Automatic update of static and dynamic files at a remote network node in response to calls issued by or for application programs |
US5666030A (en) | 1994-07-20 | 1997-09-09 | Ncr Corporation | Multiple window generation in computer display |
US5673403A (en) * | 1992-11-13 | 1997-09-30 | International Business Machines Corporation | Method and system for displaying applications of different operating systems on a single system using the user interface of the different operating systems |
US5751979A (en) * | 1995-05-31 | 1998-05-12 | Unisys Corporation | Video hardware for protected, multiprocessing systems |
US5826013A (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US5918039A (en) | 1995-12-29 | 1999-06-29 | Wyse Technology, Inc. | Method and apparatus for display of windowing application programs on a terminal |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US5978917A (en) | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses |
US5995103A (en) | 1996-05-10 | 1999-11-30 | Apple Computer, Inc. | Window grouping mechanism for creating, manipulating and displaying windows and window groups on a display screen of a computer system |
US6091412A (en) | 1997-09-30 | 2000-07-18 | The United States Of America As Represented By The Secretary Of The Navy | Universal client device permitting a computer to receive and display information from several special applications |
US6108715A (en) | 1994-12-13 | 2000-08-22 | Microsoft Corporation | Method and system for invoking remote procedure calls |
US6134661A (en) | 1998-02-11 | 2000-10-17 | Topp; William C. | Computer network security device and method |
US6167522A (en) | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
US6192477B1 (en) * | 1999-02-02 | 2001-02-20 | Dagg Llc | Methods, software, and apparatus for secure communication over a computer network |
US6199181B1 (en) * | 1997-09-09 | 2001-03-06 | Perfecto Technologies Ltd. | Method and system for maintaining restricted operating environments for application programs or operating systems |
US6216112B1 (en) | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US20020002673A1 (en) * | 2000-06-30 | 2002-01-03 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US6351816B1 (en) | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US6385721B1 (en) * | 1999-01-22 | 2002-05-07 | Hewlett-Packard Company | Computer with bootable hibernation partition |
US6397242B1 (en) | 1998-05-15 | 2002-05-28 | Vmware, Inc. | Virtualization system including a virtual machine monitor for a computer with a segmented architecture |
US20020066016A1 (en) | 2000-03-15 | 2002-05-30 | International Business Machines Corporation | Access control for computers |
US6401134B1 (en) | 1997-07-25 | 2002-06-04 | Sun Microsystems, Inc. | Detachable java applets |
US6433794B1 (en) | 1998-07-31 | 2002-08-13 | International Business Machines Corporation | Method and apparatus for selecting a java virtual machine for use with a browser |
US6438600B1 (en) | 1999-01-29 | 2002-08-20 | International Business Machines Corporation | Securely sharing log-in credentials among trusted browser-based applications |
US6480198B2 (en) | 1997-06-27 | 2002-11-12 | S3 Graphics Co., Ltd. | Multi-function controller and method for a computer graphics display system |
US20020174349A1 (en) | 2001-05-15 | 2002-11-21 | Wolff Daniel Joseph | Detecting malicious alteration of stored computer files |
US6492995B1 (en) | 1999-04-26 | 2002-12-10 | International Business Machines Corporation | Method and system for enabling localization support on web applications |
US6505300B2 (en) | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6507948B1 (en) | 1999-09-02 | 2003-01-14 | International Business Machines Corporation | Method, system, and program for generating batch files |
US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
US20030023857A1 (en) | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression |
US6546554B1 (en) | 2000-01-21 | 2003-04-08 | Sun Microsystems, Inc. | Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer |
US6553377B1 (en) | 2000-03-31 | 2003-04-22 | Network Associates, Inc. | System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment |
US20030097591A1 (en) | 2001-11-20 | 2003-05-22 | Khai Pham | System and method for protecting computer users from web sites hosting computer viruses |
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
US6581162B1 (en) | 1996-12-31 | 2003-06-17 | Compaq Information Technologies Group, L.P. | Method for securely creating, storing and using encryption keys in a computer system |
US20030131152A1 (en) | 2001-09-20 | 2003-07-10 | Ulfar Erlingsson | Altered states of software component behavior |
US20030177397A1 (en) | 2000-08-31 | 2003-09-18 | Ben Samman | Virus protection in an internet environment |
US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US20030221114A1 (en) * | 2002-03-08 | 2003-11-27 | International Business Machines Corporation | Authentication system and method |
US6658573B1 (en) | 1997-01-17 | 2003-12-02 | International Business Machines Corporation | Protecting resources in a distributed computer system |
US6663000B1 (en) | 2002-08-01 | 2003-12-16 | Networks Associates Technology, Inc. | Validating components of a malware scanner |
US20040006706A1 (en) * | 2002-06-06 | 2004-01-08 | Ulfar Erlingsson | Methods and systems for implementing a secure application execution environment using derived user accounts for internet content |
US20040006715A1 (en) | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US6678712B1 (en) * | 1996-01-19 | 2004-01-13 | International Business Machines Corporation | Method and system for executing a program under one of a plurality of mutually exclusive operating environments |
US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
US6691230B1 (en) | 1998-10-15 | 2004-02-10 | International Business Machines Corporation | Method and system for extending Java applets sand box with public client storage |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20040039944A1 (en) * | 2002-07-08 | 2004-02-26 | Teiji Karasaki | System and method for secure wall |
US20040054588A1 (en) | 1999-12-08 | 2004-03-18 | Jacobs Paul E. | E-mail software and method and system for distributing advertisements to client devices that have such e-mail software installed thereon |
US6735700B1 (en) | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping |
US6754815B1 (en) * | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US6757685B2 (en) | 2001-02-19 | 2004-06-29 | Hewlett-Packard Development Company, L.P. | Process for executing a downloadable service receiving restrictive access rights to at least one profile file |
US6772345B1 (en) | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
US6804780B1 (en) | 1996-11-08 | 2004-10-12 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
US6836885B1 (en) | 1998-09-21 | 2004-12-28 | Wyse Technology Inc. | Method and apparatus for display of windowing application programs on a terminal |
US20040267929A1 (en) * | 2003-06-27 | 2004-12-30 | Servgate Technologies, Inc | Method, system and computer program products for adaptive web-site access blocking |
US20050005153A1 (en) * | 2003-06-30 | 2005-01-06 | Kaustubh Das | Processor based system and method for virus detection |
US6871348B1 (en) * | 1999-09-15 | 2005-03-22 | Intel Corporation | Method and apparatus for integrating the user interfaces of multiple applications into one application |
US6873988B2 (en) | 2001-07-06 | 2005-03-29 | Check Point Software Technologies, Inc. | System and methods providing anti-virus cooperative enforcement |
US6880110B2 (en) | 2000-05-19 | 2005-04-12 | Self Repairing Computers, Inc. | Self-repairing computer having protected software template and isolated trusted computing environment for automated recovery from virus and hacker attack |
US20050149726A1 (en) * | 2003-10-21 | 2005-07-07 | Amit Joshi | Systems and methods for secure client applications |
US20050198692A1 (en) * | 2004-03-02 | 2005-09-08 | International Business Machines Corporation | System and method of protecting a computing system from harmful active content in documents |
US20050240810A1 (en) | 2004-04-06 | 2005-10-27 | Safford Kevin D | Off-chip lockstep checking |
US20060004667A1 (en) | 2004-06-30 | 2006-01-05 | Microsoft Corporation | Systems and methods for collecting operating system license revenue using an emulated computing environment |
US6996828B1 (en) * | 1997-09-12 | 2006-02-07 | Hitachi, Ltd. | Multi-OS configuration method |
US7013484B1 (en) * | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US7024555B2 (en) * | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7024581B1 (en) * | 2002-10-09 | 2006-04-04 | Xpoint Technologies, Inc. | Data processing recovery system and method spanning multiple operating system |
US7062672B2 (en) | 2001-06-08 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method of and computer network arrangement for restoring an impaired software image |
US7082615B1 (en) * | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
US7085928B1 (en) | 2000-03-31 | 2006-08-01 | Cigital | System and method for defending against malicious software |
US7096381B2 (en) | 2001-05-21 | 2006-08-22 | Self Repairing Computer, Inc. | On-the-fly repair of a computer |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US7146640B2 (en) * | 2002-09-05 | 2006-12-05 | Exobox Technologies Corp. | Personal computer internet security system |
US7146305B2 (en) * | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
US7181768B1 (en) | 1999-10-28 | 2007-02-20 | Cigital | Computer intrusion detection system and method based on application monitoring |
US7191469B2 (en) | 2002-05-13 | 2007-03-13 | Green Border Technologies | Methods and systems for providing a secure application environment using derived user accounts |
US7246374B1 (en) | 2000-03-13 | 2007-07-17 | Microsoft Corporation | Enhancing computer system security via multiple user desktops |
US7284274B1 (en) | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
US7373505B2 (en) | 2004-04-15 | 2008-05-13 | Microsoft Corporation | Displaying a security element with a browser window |
US7401230B2 (en) | 2004-03-31 | 2008-07-15 | Intel Corporation | Secure virtual machine monitor to tear down a secure execution environment |
US7421689B2 (en) | 2003-10-28 | 2008-09-02 | Hewlett-Packard Development Company, L.P. | Processor-architecture for facilitating a virtual machine monitor |
US7444412B2 (en) | 2001-06-08 | 2008-10-28 | Hewlett-Packard Development Company, L.P. | Data processing system and method |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US7565522B2 (en) | 2004-05-10 | 2009-07-21 | Intel Corporation | Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch |
US7596694B1 (en) | 2004-03-08 | 2009-09-29 | Hewlett-Packard Development Company, L.P. | System and method for safely executing downloaded code on a computer system |
US7657419B2 (en) * | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US7818808B1 (en) * | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US7849310B2 (en) * | 2002-11-18 | 2010-12-07 | Arm Limited | Switching between secure and non-secure processing modes |
US7854008B1 (en) * | 2007-08-10 | 2010-12-14 | Fortinet, Inc. | Software-hardware partitioning in a virus processing system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US586013A (en) * | 1897-07-06 | Cartridge-loading implement | ||
US5823879A (en) | 1996-01-19 | 1998-10-20 | Sheldon F. Goldberg | Network gaming system |
US6285987B1 (en) | 1997-01-22 | 2001-09-04 | Engage, Inc. | Internet advertising system |
EP1076871A1 (en) | 1998-05-15 | 2001-02-21 | Unicast Communications Corporation | A technique for implementing browser-initiated network-distributed advertising and for interstitially displaying an advertisement |
US6658576B1 (en) * | 1999-09-29 | 2003-12-02 | Smartpower Corporation | Energy-conserving communication apparatus selectively switching between a main processor with main operating instructions and keep-alive processor with keep-alive operating instruction |
US6456554B1 (en) * | 1999-10-19 | 2002-09-24 | Texas Instruments Incorporated | Chip identifier and method of fabrication |
DE60006969T2 (en) * | 2000-11-02 | 2004-10-28 | Orell Füssli Security Documents AG | Procedure for checking the authenticity of articles |
EP1213745A1 (en) | 2000-12-05 | 2002-06-12 | Sony International (Europe) GmbH | Method of producing a ferroelectric memory and memory device |
JP2005522800A (en) | 2002-04-13 | 2005-07-28 | コンピュータ アソシエイツ シンク,インコーポレイテッド | System and method for detecting malicious code |
US8136155B2 (en) | 2003-04-01 | 2012-03-13 | Check Point Software Technologies, Inc. | Security system with methodology for interprocess communication control |
US7788669B2 (en) * | 2003-05-02 | 2010-08-31 | Microsoft Corporation | System for isolating first computing environment from second execution environment while sharing resources by copying data from first portion to second portion of memory |
US7730318B2 (en) * | 2003-10-24 | 2010-06-01 | Microsoft Corporation | Integration of high-assurance features into an application through application factoring |
-
2004
- 2004-08-07 US US10/913,609 patent/US7484247B2/en active Active - Reinstated
-
2010
- 2010-03-09 US US12/720,207 patent/USRE43500E1/en active Active
- 2010-03-09 US US12/720,147 patent/USRE43528E1/en active Active
- 2010-08-10 US US12/854,149 patent/USRE43103E1/en active Active
- 2010-11-07 US US12/941,067 patent/USRE43529E1/en active Active
-
2011
- 2011-01-27 US US13/015,186 patent/USRE43987E1/en active Active
Patent Citations (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4890098A (en) | 1987-10-20 | 1989-12-26 | International Business Machines Corporation | Flexible window management on a computer display |
US5564051A (en) * | 1989-08-03 | 1996-10-08 | International Business Machines Corporation | Automatic update of static and dynamic files at a remote network node in response to calls issued by or for application programs |
US5280579A (en) | 1990-09-28 | 1994-01-18 | Texas Instruments Incorporated | Memory mapped interface between host computer and graphics system |
US5502808A (en) | 1991-07-24 | 1996-03-26 | Texas Instruments Incorporated | Video graphics display system with adapter for display management based upon plural memory sources |
US5673403A (en) * | 1992-11-13 | 1997-09-30 | International Business Machines Corporation | Method and system for displaying applications of different operating systems on a single system using the user interface of the different operating systems |
US5666030A (en) | 1994-07-20 | 1997-09-09 | Ncr Corporation | Multiple window generation in computer display |
US5555364A (en) | 1994-08-23 | 1996-09-10 | Prosoft Corporation | Windowed computer display |
US6108715A (en) | 1994-12-13 | 2000-08-22 | Microsoft Corporation | Method and system for invoking remote procedure calls |
US5751979A (en) * | 1995-05-31 | 1998-05-12 | Unisys Corporation | Video hardware for protected, multiprocessing systems |
US5826013A (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US5918039A (en) | 1995-12-29 | 1999-06-29 | Wyse Technology, Inc. | Method and apparatus for display of windowing application programs on a terminal |
US6678712B1 (en) * | 1996-01-19 | 2004-01-13 | International Business Machines Corporation | Method and system for executing a program under one of a plurality of mutually exclusive operating environments |
US5995103A (en) | 1996-05-10 | 1999-11-30 | Apple Computer, Inc. | Window grouping mechanism for creating, manipulating and displaying windows and window groups on a display screen of a computer system |
US6351816B1 (en) | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US6804780B1 (en) | 1996-11-08 | 2004-10-12 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
US6581162B1 (en) | 1996-12-31 | 2003-06-17 | Compaq Information Technologies Group, L.P. | Method for securely creating, storing and using encryption keys in a computer system |
US6658573B1 (en) | 1997-01-17 | 2003-12-02 | International Business Machines Corporation | Protecting resources in a distributed computer system |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6167522A (en) | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
US6480198B2 (en) | 1997-06-27 | 2002-11-12 | S3 Graphics Co., Ltd. | Multi-function controller and method for a computer graphics display system |
US6401134B1 (en) | 1997-07-25 | 2002-06-04 | Sun Microsystems, Inc. | Detachable java applets |
US5978917A (en) | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses |
US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US6199181B1 (en) * | 1997-09-09 | 2001-03-06 | Perfecto Technologies Ltd. | Method and system for maintaining restricted operating environments for application programs or operating systems |
US6321337B1 (en) | 1997-09-09 | 2001-11-20 | Sanctum Ltd. | Method and system for protecting operations of trusted internal networks |
US6996828B1 (en) * | 1997-09-12 | 2006-02-07 | Hitachi, Ltd. | Multi-OS configuration method |
US6091412A (en) | 1997-09-30 | 2000-07-18 | The United States Of America As Represented By The Secretary Of The Navy | Universal client device permitting a computer to receive and display information from several special applications |
US6134661A (en) | 1998-02-11 | 2000-10-17 | Topp; William C. | Computer network security device and method |
US6397242B1 (en) | 1998-05-15 | 2002-05-28 | Vmware, Inc. | Virtualization system including a virtual machine monitor for a computer with a segmented architecture |
US6216112B1 (en) | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6505300B2 (en) | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6433794B1 (en) | 1998-07-31 | 2002-08-13 | International Business Machines Corporation | Method and apparatus for selecting a java virtual machine for use with a browser |
US6836885B1 (en) | 1998-09-21 | 2004-12-28 | Wyse Technology Inc. | Method and apparatus for display of windowing application programs on a terminal |
US6691230B1 (en) | 1998-10-15 | 2004-02-10 | International Business Machines Corporation | Method and system for extending Java applets sand box with public client storage |
US6385721B1 (en) * | 1999-01-22 | 2002-05-07 | Hewlett-Packard Company | Computer with bootable hibernation partition |
US6438600B1 (en) | 1999-01-29 | 2002-08-20 | International Business Machines Corporation | Securely sharing log-in credentials among trusted browser-based applications |
US6192477B1 (en) * | 1999-02-02 | 2001-02-20 | Dagg Llc | Methods, software, and apparatus for secure communication over a computer network |
US6492995B1 (en) | 1999-04-26 | 2002-12-10 | International Business Machines Corporation | Method and system for enabling localization support on web applications |
US6507948B1 (en) | 1999-09-02 | 2003-01-14 | International Business Machines Corporation | Method, system, and program for generating batch files |
US6871348B1 (en) * | 1999-09-15 | 2005-03-22 | Intel Corporation | Method and apparatus for integrating the user interfaces of multiple applications into one application |
US7181768B1 (en) | 1999-10-28 | 2007-02-20 | Cigital | Computer intrusion detection system and method based on application monitoring |
US20040054588A1 (en) | 1999-12-08 | 2004-03-18 | Jacobs Paul E. | E-mail software and method and system for distributing advertisements to client devices that have such e-mail software installed thereon |
US6735700B1 (en) | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping |
US6546554B1 (en) | 2000-01-21 | 2003-04-08 | Sun Microsystems, Inc. | Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer |
US7246374B1 (en) | 2000-03-13 | 2007-07-17 | Microsoft Corporation | Enhancing computer system security via multiple user desktops |
US20020066016A1 (en) | 2000-03-15 | 2002-05-30 | International Business Machines Corporation | Access control for computers |
US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
US6553377B1 (en) | 2000-03-31 | 2003-04-22 | Network Associates, Inc. | System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment |
US7013484B1 (en) * | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US7085928B1 (en) | 2000-03-31 | 2006-08-01 | Cigital | System and method for defending against malicious software |
US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US7082615B1 (en) * | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
US6754815B1 (en) * | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
US6880110B2 (en) | 2000-05-19 | 2005-04-12 | Self Repairing Computers, Inc. | Self-repairing computer having protected software template and isolated trusted computing environment for automated recovery from virus and hacker attack |
US7577871B2 (en) | 2000-05-19 | 2009-08-18 | Vir2Us, Inc. | Computer system and method having isolatable storage for enhanced immunity to viral and malicious code infection |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20020002673A1 (en) * | 2000-06-30 | 2002-01-03 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US7039801B2 (en) * | 2000-06-30 | 2006-05-02 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US7650493B2 (en) * | 2000-06-30 | 2010-01-19 | Microsoft Corporation | System and method for integrating secure and non-secure software objects |
US20030177397A1 (en) | 2000-08-31 | 2003-09-18 | Ben Samman | Virus protection in an internet environment |
US7146305B2 (en) * | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
US7818808B1 (en) * | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US7284274B1 (en) | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
US6757685B2 (en) | 2001-02-19 | 2004-06-29 | Hewlett-Packard Development Company, L.P. | Process for executing a downloadable service receiving restrictive access rights to at least one profile file |
US20020174349A1 (en) | 2001-05-15 | 2002-11-21 | Wolff Daniel Joseph | Detecting malicious alteration of stored computer files |
US7096381B2 (en) | 2001-05-21 | 2006-08-22 | Self Repairing Computer, Inc. | On-the-fly repair of a computer |
US7444412B2 (en) | 2001-06-08 | 2008-10-28 | Hewlett-Packard Development Company, L.P. | Data processing system and method |
US7062672B2 (en) | 2001-06-08 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method of and computer network arrangement for restoring an impaired software image |
US7657419B2 (en) * | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US6873988B2 (en) | 2001-07-06 | 2005-03-29 | Check Point Software Technologies, Inc. | System and methods providing anti-virus cooperative enforcement |
US20030023857A1 (en) | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression |
US20030131152A1 (en) | 2001-09-20 | 2003-07-10 | Ulfar Erlingsson | Altered states of software component behavior |
US7024555B2 (en) * | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US20030097591A1 (en) | 2001-11-20 | 2003-05-22 | Khai Pham | System and method for protecting computer users from web sites hosting computer viruses |
US6772345B1 (en) | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
US20030221114A1 (en) * | 2002-03-08 | 2003-11-27 | International Business Machines Corporation | Authentication system and method |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US7191469B2 (en) | 2002-05-13 | 2007-03-13 | Green Border Technologies | Methods and systems for providing a secure application environment using derived user accounts |
US20040006706A1 (en) * | 2002-06-06 | 2004-01-08 | Ulfar Erlingsson | Methods and systems for implementing a secure application execution environment using derived user accounts for internet content |
US20040006715A1 (en) | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US7260839B2 (en) | 2002-07-08 | 2007-08-21 | Hitachi, Ltd. | System and method for secure wall |
US20040039944A1 (en) * | 2002-07-08 | 2004-02-26 | Teiji Karasaki | System and method for secure wall |
US6663000B1 (en) | 2002-08-01 | 2003-12-16 | Networks Associates Technology, Inc. | Validating components of a malware scanner |
US7146640B2 (en) * | 2002-09-05 | 2006-12-05 | Exobox Technologies Corp. | Personal computer internet security system |
US7024581B1 (en) * | 2002-10-09 | 2006-04-04 | Xpoint Technologies, Inc. | Data processing recovery system and method spanning multiple operating system |
US7849310B2 (en) * | 2002-11-18 | 2010-12-07 | Arm Limited | Switching between secure and non-secure processing modes |
US20040267929A1 (en) * | 2003-06-27 | 2004-12-30 | Servgate Technologies, Inc | Method, system and computer program products for adaptive web-site access blocking |
US20050005153A1 (en) * | 2003-06-30 | 2005-01-06 | Kaustubh Das | Processor based system and method for virus detection |
US7694328B2 (en) | 2003-10-21 | 2010-04-06 | Google Inc. | Systems and methods for secure client applications |
US20050149726A1 (en) * | 2003-10-21 | 2005-07-07 | Amit Joshi | Systems and methods for secure client applications |
US7421689B2 (en) | 2003-10-28 | 2008-09-02 | Hewlett-Packard Development Company, L.P. | Processor-architecture for facilitating a virtual machine monitor |
US20050198692A1 (en) * | 2004-03-02 | 2005-09-08 | International Business Machines Corporation | System and method of protecting a computing system from harmful active content in documents |
US7596694B1 (en) | 2004-03-08 | 2009-09-29 | Hewlett-Packard Development Company, L.P. | System and method for safely executing downloaded code on a computer system |
US7401230B2 (en) | 2004-03-31 | 2008-07-15 | Intel Corporation | Secure virtual machine monitor to tear down a secure execution environment |
US20050240810A1 (en) | 2004-04-06 | 2005-10-27 | Safford Kevin D | Off-chip lockstep checking |
US7373505B2 (en) | 2004-04-15 | 2008-05-13 | Microsoft Corporation | Displaying a security element with a browser window |
US7565522B2 (en) | 2004-05-10 | 2009-07-21 | Intel Corporation | Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch |
US20060004667A1 (en) | 2004-06-30 | 2006-01-05 | Microsoft Corporation | Systems and methods for collecting operating system license revenue using an emulated computing environment |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US7854008B1 (en) * | 2007-08-10 | 2010-12-14 | Fortinet, Inc. | Software-hardware partitioning in a virus processing system |
Non-Patent Citations (48)
Title |
---|
"A Flexible Containment Mechanism for Executing Untrusted Code" by David Peterson, Matt Bishop, and Raju Pandey, Department of Computer Science University of California, Davis USENIX Security Symposium San Francisco, California, USA Aug. 5-9, 2002. |
"A Sandbox Operating System Environment for Controlled Execution of Alien Code." by Asit Dan, Ajay Mohindra, Rajiv Ramaswami, and Dinkar Sitaram IBM Research Division T.J. Watson Research Center Yorktown Heights, New York RC 20742 (Feb. 20, 1997) Computer Science IBM Research Report. |
"A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker)." by Ian Goldberg, David Wagner, Randi Thomas, and Eric Brewer, Computer Science Division, University of California, Berkeley, Sixth USENIX UNIX Security Symposium San Jose, California, Jul. 1996. |
"A Virtual Machine Introspection Based Architecture for Intrusion Detection" by Tal Garfinkel and Mendel Rosenblum, Computer Science Department, Stanford University 2003. |
"Application-Controlled Physical Memory using External Page-Cache Management." by Keiran Harty and David R. Cheriton, Computer Science Department, Stanford University, 1992. |
"Architecture of Virtual Machines" by R. P. Goldberg, Honeywell Information Systems, Inc. and Harvard University Presented at the AFIPS National Computer Conference, New York, New York, Jun. 4-8, 1973. |
"Beyond Viruses: Why Anti-Virus Software is No Longer Enough" by David Stang PhD, Pest Patrol, 2002. |
"Building a Secure Web Browser" by Sotiris Ioannidis, Steven M. Bellovin, 2001 USENIX Annual Technical Conference Boston, Massachusetts, USA Jun. 25-30, 2001. |
"Building Systems that Flexibly Control Downloaded Executable Context." by Trent Jaeger and Atul Prakash, Software Systems Research Lab, University of Michigan and Aviel D. Rubin, Security Research Group, Bellcore Sixth USENIX UNIX Security Symposium San Jose, California, Jul. 1996. |
"Design of the EROS Trusted Window System" by Jonathan S. Shapiro, John Vanderburgh, Eric Northrup, Systems Research Laboratory Johns Hopkins University, and, David Chizmadia, Promia, Inc. 2004. |
"Efficient Software-Based Fault Isolation." by Robert Wahbe, Steven Lucco, Thomas Anderson, Susan Graham, Computer Science Division University of California, Berkeley, SIGOPS 1993. |
"Flexible Control of Downloaded Executable Content." by Trent Jaeger and Jochen Liedtke and Nayeem Islam, IBM Thomas J. Watson Research Center, and Atul Prakash University of Michigan, Ann Arbor ACM Transactions on Information and System Security, vol. 2, No. 2, May 1999, pp. 177-228. |
"J2ME Building Blocks for Mobile Devices: White Paper on KVM and the Connected, Limited Device Configuration." Sun Microsystems May 19, 2000. |
"Java Security: From HotJava to Netscape and Beyond." by Drew Dean, Edward W. Felten, Dan S. Wallach Department of Computer Science, Princeton University, Princeton, NJ 08544 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996. |
"ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay" by George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen, Department of Electrical Engineering and Computer Science, University of Michigan Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI). |
"Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies." by Vinod Anupam and Alain Mayer, Bell Laboratories, Lucent Technologies 7th USENIX Security Symposium San Antonio, Texas, Jan. 26-29, 1998. |
"Software Security and Privacy Risks in Mobile E-Commerce" by Anup K. Ghosh and Tara M. Swaminatha, Communications of the ACM Feb. 2001 vol. 44, No. 2. |
"Spyware, Adware, and Peer to Peer Networks; The Hidden Threat to Corporate Security" by Kevin Townsend, Pest Patrol, 2003. |
"Survey of System Virtualization Techniques." by Robert Rose Mar. 8, 2004. |
"Terra: A Virtual Machine-Based Platform for Trusted Computing" by Tal Garfinkel, Ben Pfaff, Jim Chow, Dan Boner and Mendel Rosenblum, Computer Science Department, Stanford University SOSP'03, Oct. 19-22, 2003, Bolton Landing, New York, USA. |
"The Duality of Memory and Communication in the Implementation of a Multiprocessor Operating System." by Michael Young, Avadis Tevanian, Richard Rasheed, David Golub, Jeffery Eppinger, Jonathan Crew, William Bolosky, David Black and Robert Baron, Computer Science Department Carnegie-Mellon University Proceedings of the 11th Operating Systems Principles, Nov. 1987. |
"The Web: Threat or Menace?" From "Firewalls and Internet Security: Repelling the Wiley Hacker", Second Edition, Addison-Wesley, ISBN 0-201-63466-X, 2003 ©. |
"The Web: Threat or Menace?" from "Firewalls and Internet Security: Repelling the Wiley Hacker", Second Edition, Addison-Wesley, ISBN 0-201-63466-X, 2003. |
"TRON: Process-Specific File Protection for the UNIX Operating System." by Andrew Berman, Virgil Bourassa, Erik Selberg, Department of Computer Science and Engineering, University of Washington, Jan. 23, 1995. |
"Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing" by Zishuang (Eileen) Ye and Sean Smith Department of Computer Science Dartmouth College Technical Report TR2002-418 Feb. 4, 2002. |
"User Interaction Design for Secure Systems" by Ka-Ping Yee Proceedings of the 4th International Conference on Information and Communications Security table of contents pp. 278-290, 2002, ISBN:3-540-00164-6. |
"User-level Resource-constrained Sandboxing" by Fangzhe Chang, Ayal Itzkovitz, and Vijay Karamcheti Department of Computer Science, Courant Institute of Mathematical Sciences, New York University USENIX Windows System Symposium, Aug. 2000. |
"Verifying the EROS Confinement Mechanism" by Jonathan S. Shapiro and San Weber IBM T.J. Watson Research Center 0-7695-0665-8/00 2000 IEEE. |
"Virtual Memory in Contemporary Microprocessors." by Bruce Jacob University of Maryland and Trevor Mudge University of Michigan, IEEE Micro Jul.-Aug. 1998. |
"Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor" by Jeremy Sugerman, Ganesh Venkitachalam and Beng-Hong Lim, VMware, Inc. 3145 Porter Dr, Palo Alto, CA 943042001 USENIX Annual Technical Conference Boston, Massachusetts, USA Jun. 25-30, 2001. |
"Vulnerability of Secure Web Browsers." by Flavio De Paoli, Andre Dos Santos, Richard Kemmerer Reliable Software Group Computer Science Department, University of California, Santa Barbara, 1997. |
"When Virtual Is Better Than Real" by Peter M. Chen and Brian D. Noble, Department of Electrical Engineering and Computer Science University of Michigan, 2001. |
"WindowBox: A Simple Security Model for the Connected Desktop" by Dirk Balfanz, Princeton University and Daniel R. Simon, Microsoft Research, 2000. |
"Xen and the Art of Virtualization" by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebaurey, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory 15 JJ Thomson Avenue, Cambridge, UK, CB3 0FD SOSP'03, Oct. 19-22, 2003, Bolton Landing, New York, USA. |
David A. Wagner, "Janus: an approach for confinement of untrusted applications." Master's thesis, University of California, Berkeley, 1999.. Also available, Technical Report CSD-99-1056, UC Berkeley, Computer Science Division. http://www.cs.berkeley.edu/~daw/papers/janus-masters.ps. |
David A. Wagner, "Janus: an approach for confinement of untrusted applications." Master's thesis, University of California, Berkeley, 1999.. Also available, Technical Report CSD-99-1056, UC Berkeley, Computer Science Division. http://www.cs.berkeley.edu/˜daw/papers/janus-masters.ps. |
David Stang, PhD; "Beyond Viruses: Why Anti-Virus Software is No Longer Enough", © Pest Patrol 2002. |
Kevin Townsend; "Spyware, Adware, and Peer to Peer Networks; The Hidden Threat to Corporate Security" © Pest Patrol, 2003. |
M. Schmid, F. Hill, A. Ghosh, "Protecting Data from Malicious Software." Annual Computer Security Applications Conference (ACSAC'02), Las Vegas, NV, Dec. 2002. |
Marc Stiegler and Mark Miller, Report Name: "A Capability Based Client: The Darpa Browser" Combex/Focused Research Topic 5/BAA-00-06-SNK, Nov. 18, 2002. |
Microsoft® Virtual PC 2004 Technical Overview by Jerry Honeycutt Published Nov. 2003 http://download.microsoft.com/download/c/f/b/cfb100a7-463d-4b86-ad62- 064397178b4f/Virtual-PC-Technical-Overview.doc. |
Nimisha V. Mehta, Karen R. Sollins, "Expanding and Extending the Security Features of Java." Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, Jan. 26-29, 1998. |
Richard West and Jason Gloudon, "User-Level Sandboxing: a Safe and Efficient Mechanism for Extensibility", Technical Report, 2003-014, Boston University, Jun. 2003. |
Shaya Potter, Jason Nieh, Dinesh Subhraveti, "Secure Isolation and Migration of Untrusted Legacy Applications." Columbia University Technical Report CUCS-005-04, Jan. 2004. |
Sotiris Ioannidis and Steven M. Bellovin. "Sub-Operating Systems: A New Approach to Application Security." Technical Report MS-CIS-01-06, University of Pennsylvania, Feb. 2000. |
T. Jaeger, A. D. Rubin, and A. Prakash. "Building systems that flexibly control downloaded executable content." In Proceedings of the 1996 USENIX Security Symposium, pp. 131-148, San Jose, Ca., 1996. |
Valentin Razmov "Security in Untrusted Code Environments: Missing Pieces of the Puzzle." Dept. of Computer Science and Engineering, University of Washington, Mar. 30, 2002. |
White Paper: "Smart Phone Security Issues" by Luc Delpha and Maliha Rasheed, Cyber Risk Consulting Blackhat Briefings Europe May 2004. |
Cited By (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090063869A1 (en) * | 2006-01-17 | 2009-03-05 | Ran Kohavi | Securing Data in a Networked Environment |
US20090328033A1 (en) * | 2006-01-17 | 2009-12-31 | Kidaro (Israel) Ltd. | Seamless integration of multiple computing environments |
US8341756B2 (en) * | 2006-01-17 | 2012-12-25 | Kidaro (Israel) Ltd. | Securing data in a networked environment |
US8606895B2 (en) | 2006-01-17 | 2013-12-10 | Kidaro (Israel) Ltd. | Seamless integration of multiple computing environments |
US20090118839A1 (en) * | 2007-11-06 | 2009-05-07 | Jos Manuel Accapadi | Methodology for secure application partitioning enablement |
US9122534B2 (en) | 2007-11-06 | 2015-09-01 | International Business Machines Corporation | Secure application partitioning enablement |
US8424078B2 (en) * | 2007-11-06 | 2013-04-16 | International Business Machines Corporation | Methodology for secure application partitioning enablement |
US20130179667A1 (en) * | 2010-09-29 | 2013-07-11 | Beijing Lenovo Software Ltd. | Methods and systems for state switching |
US10037206B2 (en) * | 2010-09-29 | 2018-07-31 | Lenovo (Beijing) Limited | Methods and systems for state switching |
US20140380481A1 (en) * | 2011-06-28 | 2014-12-25 | Kaspersky Lab Zao | Portable security device and methods for detection and treatment of malware |
US8863289B2 (en) * | 2011-06-28 | 2014-10-14 | Kaspersky Lab Zao | Portable security device and methods for detection and treatment of malware |
US9230107B2 (en) * | 2011-06-28 | 2016-01-05 | AO Kaspersky Lab | Security devices and methods for detection of malware by detecting data modification |
US20130007883A1 (en) * | 2011-06-28 | 2013-01-03 | Kaspersky Lab Zao | Portable Security Device and Methods for Detection and Treatment of Malware |
US10061922B2 (en) * | 2012-04-30 | 2018-08-28 | Verint Systems Ltd. | System and method for malware detection |
US11316878B2 (en) | 2012-04-30 | 2022-04-26 | Cognyte Technologies Israel Ltd. | System and method for malware detection |
US20130347114A1 (en) * | 2012-04-30 | 2013-12-26 | Verint Systems Ltd. | System and method for malware detection |
US9122633B2 (en) | 2012-09-20 | 2015-09-01 | Paul Case, SR. | Case secure computer architecture |
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
US9665713B2 (en) | 2012-09-26 | 2017-05-30 | Bluvector, Inc. | System and method for automated machine-learning, zero-day malware detection |
US9292688B2 (en) * | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US11126720B2 (en) | 2012-09-26 | 2021-09-21 | Bluvector, Inc. | System and method for automated machine-learning, zero-day malware detection |
US20140090061A1 (en) * | 2012-09-26 | 2014-03-27 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US9672360B2 (en) | 2012-10-02 | 2017-06-06 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US20140096226A1 (en) * | 2012-10-02 | 2014-04-03 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US9781141B2 (en) | 2012-10-02 | 2017-10-03 | Mordecai Barkan | Secured automated or semi-automated systems |
US9614839B2 (en) | 2012-10-02 | 2017-04-04 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US11188652B2 (en) | 2012-10-02 | 2021-11-30 | Mordecai Barkan | Access management and credential protection |
US9092628B2 (en) * | 2012-10-02 | 2015-07-28 | Mordecai Barkan | Secure computer architectures, systems, and applications |
US11223634B2 (en) | 2012-10-02 | 2022-01-11 | Mordecai Barkan | Secured automated or semi-automated systems |
US9342695B2 (en) | 2012-10-02 | 2016-05-17 | Mordecai Barkan | Secured automated or semi-automated systems |
US10198427B2 (en) | 2013-01-29 | 2019-02-05 | Verint Systems Ltd. | System and method for keyword spotting using representative dictionary |
US9923913B2 (en) | 2013-06-04 | 2018-03-20 | Verint Systems Ltd. | System and method for malware detection learning |
US11038907B2 (en) | 2013-06-04 | 2021-06-15 | Verint Systems Ltd. | System and method for malware detection learning |
US9927995B2 (en) * | 2013-06-19 | 2018-03-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
US20160139846A1 (en) * | 2013-06-19 | 2016-05-19 | Telefonaktiebolaget L M Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
US9870116B1 (en) | 2013-12-09 | 2018-01-16 | Google Llc | Controlling actions for browser extensions |
US10592063B1 (en) | 2013-12-09 | 2020-03-17 | Google Llc | Controlling actions for browser extensions |
US10630588B2 (en) | 2014-07-24 | 2020-04-21 | Verint Systems Ltd. | System and method for range matching |
US11463360B2 (en) | 2014-07-24 | 2022-10-04 | Cognyte Technologies Israel Ltd. | System and method for range matching |
US9832216B2 (en) | 2014-11-21 | 2017-11-28 | Bluvector, Inc. | System and method for network data characterization |
US11432139B2 (en) | 2015-01-28 | 2022-08-30 | Cognyte Technologies Israel Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US10560842B2 (en) | 2015-01-28 | 2020-02-11 | Verint Systems Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US10142426B2 (en) | 2015-03-29 | 2018-11-27 | Verint Systems Ltd. | System and method for identifying communication session participants based on traffic patterns |
US10623503B2 (en) | 2015-03-29 | 2020-04-14 | Verint Systems Ltd. | System and method for identifying communication session participants based on traffic patterns |
US10614107B2 (en) | 2015-10-22 | 2020-04-07 | Verint Systems Ltd. | System and method for keyword searching using both static and dynamic dictionaries |
US11386135B2 (en) | 2015-10-22 | 2022-07-12 | Cognyte Technologies Israel Ltd. | System and method for maintaining a dynamic dictionary |
US11093534B2 (en) | 2015-10-22 | 2021-08-17 | Verint Systems Ltd. | System and method for keyword searching using both static and dynamic dictionaries |
US10546008B2 (en) | 2015-10-22 | 2020-01-28 | Verint Systems Ltd. | System and method for maintaining a dynamic dictionary |
US11381977B2 (en) | 2016-04-25 | 2022-07-05 | Cognyte Technologies Israel Ltd. | System and method for decrypting communication exchanged on a wireless local area network |
US11303652B2 (en) | 2016-10-10 | 2022-04-12 | Cognyte Technologies Israel Ltd | System and method for generating data sets for learning to identify user actions |
US10491609B2 (en) | 2016-10-10 | 2019-11-26 | Verint Systems Ltd. | System and method for generating data sets for learning to identify user actions |
US10944763B2 (en) | 2016-10-10 | 2021-03-09 | Verint Systems, Ltd. | System and method for generating data sets for learning to identify user actions |
US11095736B2 (en) | 2017-04-30 | 2021-08-17 | Verint Systems Ltd. | System and method for tracking users of computer applications |
US11336738B2 (en) | 2017-04-30 | 2022-05-17 | Cognyte Technologies Israel Ltd. | System and method for tracking users of computer applications |
US10972558B2 (en) | 2017-04-30 | 2021-04-06 | Verint Systems Ltd. | System and method for tracking users of computer applications |
US11575625B2 (en) | 2017-04-30 | 2023-02-07 | Cognyte Technologies Israel Ltd. | System and method for identifying relationships between users of computer applications |
US11336609B2 (en) | 2018-01-01 | 2022-05-17 | Cognyte Technologies Israel Ltd. | System and method for identifying pairs of related application users |
US10958613B2 (en) | 2018-01-01 | 2021-03-23 | Verint Systems Ltd. | System and method for identifying pairs of related application users |
US11403559B2 (en) | 2018-08-05 | 2022-08-02 | Cognyte Technologies Israel Ltd. | System and method for using a user-action log to learn to classify encrypted traffic |
US10999295B2 (en) | 2019-03-20 | 2021-05-04 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
US11444956B2 (en) | 2019-03-20 | 2022-09-13 | Cognyte Technologies Israel Ltd. | System and method for de-anonymizing actions and messages on networks |
US11399016B2 (en) | 2019-11-03 | 2022-07-26 | Cognyte Technologies Israel Ltd. | System and method for identifying exchanges of encrypted communication traffic |
Also Published As
Publication number | Publication date |
---|---|
USRE43528E1 (en) | 2012-07-17 |
USRE43529E1 (en) | 2012-07-17 |
US20060031940A1 (en) | 2006-02-09 |
USRE43987E1 (en) | 2013-02-05 |
US7484247B2 (en) | 2009-01-27 |
USRE43500E1 (en) | 2012-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE43103E1 (en) | System and method for protecting a computer system from malicious software | |
US11604861B2 (en) | Systems and methods for providing real time security and access monitoring of a removable media device | |
EP3049984B1 (en) | Systems and methods for using a reputation indicator to facilitate malware scanning | |
US9213836B2 (en) | System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages | |
US20040034794A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
US8474032B2 (en) | Firewall+ storage apparatus, method and system | |
US8225404B2 (en) | Trusted secure desktop | |
US20030159070A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
US7665139B1 (en) | Method and apparatus to detect and prevent malicious changes to tokens | |
US20070240212A1 (en) | System and Methodology Protecting Against Key Logger Spyware | |
GB2411988A (en) | Preventing programs from accessing communication channels withut user permission | |
US8171552B1 (en) | Simultaneous execution of multiple anti-virus programs | |
US9602538B1 (en) | Network security policy enforcement integrated with DNS server | |
GB2404262A (en) | Protection for computers against malicious programs using a security system which performs automatic segregation of programs | |
Iglio | Trustedbox: a kernel-level integrity checker | |
CA2471505A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
Martsenyuk et al. | Features of multifunctional Backdoor technology in the personal space of users. | |
GB2411747A (en) | Remotely checking the functioning of computer security systems | |
CA2424144A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
WO2002084939A1 (en) | System and method for securely executing a executable to preserve the integrity of files from unauthorized access for network security | |
Kunle et al. | Current Survey of Computer Malwares Infestation and Inhibition | |
AU2007201692A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CIOFFI, ALFONSO, TEXAS Free format text: LETTERS OF TESTAMENTARY;ASSIGNOR:ROZMAN, ALLEN FRANK;REEL/FRAME:034499/0346 Effective date: 20121029 |
|
AS | Assignment |
Owner name: ROZMAN, MELANIE ANN, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIOFFI, ALFONSO;REEL/FRAME:034385/0958 Effective date: 20141114 Owner name: ROZMAN, MEGAN ELIZABETH, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIOFFI, ALFONSO;REEL/FRAME:034385/0958 Effective date: 20141114 Owner name: ROZMAN, MORGAN LEE, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIOFFI, ALFONSO;REEL/FRAME:034385/0958 Effective date: 20141114 |
|
CBM | Aia trial proceeding filed before patent trial and appeal board: covered business methods |
Free format text: TRIAL NO: CBM2017-00013 Opponent name: GOOGLE INC. Effective date: 20161104 Free format text: TRIAL NO: CBM2017-00012 Opponent name: GOOGLE INC. Effective date: 20161104 |
|
AS | Assignment |
Owner name: ROZMAN, MEGAN ELIZABETH, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA TO READ ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE) PREVIOUSLY RECORDED ON REEL 034385 FRAME 0958. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE);REEL/FRAME:052994/0740 Effective date: 20141114 Owner name: ROZMAN, MORGAN LEE, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA TO READ ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE) PREVIOUSLY RECORDED ON REEL 034385 FRAME 0958. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE);REEL/FRAME:052994/0740 Effective date: 20141114 Owner name: ROZMAN, MELANIE ANN, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA TO READ ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE) PREVIOUSLY RECORDED ON REEL 034385 FRAME 0958. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:ALLEN FRANK ROZMAN (DECEASED) REPRESENTED BY ALFONSO CIOFFI (EXECUTOR OF ESTATE);REEL/FRAME:052994/0740 Effective date: 20141114 |