WO2002093334A3 - Temporal access control for computer virus outbreaks - Google Patents
Temporal access control for computer virus outbreaks Download PDFInfo
- Publication number
- WO2002093334A3 WO2002093334A3 PCT/US2002/010867 US0210867W WO02093334A3 WO 2002093334 A3 WO2002093334 A3 WO 2002093334A3 US 0210867 W US0210867 W US 0210867W WO 02093334 A3 WO02093334 A3 WO 02093334A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access control
- network
- computers
- control time
- computer
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Abstract
An access control system (200) enables a computer network (1) to prevent execution of computer code that may contain computer viruses. An access control console (201) generates an access control message (202) including control parameters such as an access control time (211). Said access control time (211) is disseminates to computers (2, 3) on the network (1). Said computers (2, 3) use the access control time (211) to determine the executability of computer code. Access control system (200) also enables blocking data communications with suspicious or susceptible programs in network (1) during virus outbreaks. Access control time (211) is used to decide whether a program currently operating in the network (1) should be allowed to continue its communication with computers outside the network (1).
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US28220301P | 2001-04-06 | 2001-04-06 | |
US60/282,203 | 2001-04-06 | ||
US4649601A | 2001-10-29 | 2001-10-29 | |
US10/046,496 | 2001-10-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002093334A2 WO2002093334A2 (en) | 2002-11-21 |
WO2002093334A3 true WO2002093334A3 (en) | 2003-11-13 |
Family
ID=26723992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/010867 WO2002093334A2 (en) | 2001-04-06 | 2002-04-05 | Temporal access control for computer virus outbreaks |
Country Status (2)
Country | Link |
---|---|
US (2) | US7483993B2 (en) |
WO (1) | WO2002093334A2 (en) |
Families Citing this family (82)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US6901519B1 (en) * | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
US7117533B1 (en) * | 2001-08-03 | 2006-10-03 | Mcafee, Inc. | System and method for providing dynamic screening of transient messages in a distributed computing environment |
US7640361B1 (en) * | 2001-08-24 | 2009-12-29 | Mcafee, Inc. | Systems and methods for converting infected electronic files to a safe format |
GB2384659B (en) * | 2002-01-25 | 2004-01-14 | F Secure Oyj | Anti-virus protection at a network gateway |
US8090816B1 (en) * | 2002-02-07 | 2012-01-03 | Mcafee, Inc. | System and method for real-time triggered event upload |
MY141160A (en) * | 2003-01-13 | 2010-03-31 | Multimedia Glory Sdn Bhd | System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network |
IL154346A (en) * | 2003-02-06 | 2010-06-16 | Eyal Cohen | Method and system for protecting against illegal copy and/or use of digital content stored on optical or other media |
US7529754B2 (en) | 2003-03-14 | 2009-05-05 | Websense, Inc. | System and method of monitoring and controlling application files |
US7185015B2 (en) | 2003-03-14 | 2007-02-27 | Websense, Inc. | System and method of monitoring and controlling application files |
US7818447B1 (en) * | 2003-03-28 | 2010-10-19 | Emc Corporation | End-to-end broadcast based flow control in a switch fabric |
US20040250115A1 (en) * | 2003-04-21 | 2004-12-09 | Trend Micro Incorporated. | Self-contained mechanism for deploying and controlling data security services via a web browser platform |
EP1619586A4 (en) * | 2003-04-25 | 2008-10-15 | Fujitsu Ltd | Messaging virus countermeasure program and so on |
US8271774B1 (en) * | 2003-08-11 | 2012-09-18 | Symantec Corporation | Circumstantial blocking of incoming network traffic containing code |
US8543710B2 (en) * | 2004-03-10 | 2013-09-24 | Rpx Corporation | Method and system for controlling network access |
US8239946B2 (en) * | 2004-04-22 | 2012-08-07 | Ca, Inc. | Methods and systems for computer security |
EP1757063B1 (en) | 2004-05-19 | 2017-02-15 | CA, Inc. | Methods and systems for computer security |
US7632265B2 (en) * | 2004-05-28 | 2009-12-15 | St. Jude Medical, Atrial Fibrillation Division, Inc. | Radio frequency ablation servo catheter and method |
US7748038B2 (en) * | 2004-06-16 | 2010-06-29 | Ironport Systems, Inc. | Method and apparatus for managing computer virus outbreaks |
US20060010495A1 (en) * | 2004-07-06 | 2006-01-12 | Oded Cohen | Method for protecting a computer from suspicious objects |
US7581253B2 (en) | 2004-07-20 | 2009-08-25 | Lenovo (Singapore) Pte. Ltd. | Secure storage tracking for anti-virus speed-up |
US7634812B2 (en) * | 2004-07-21 | 2009-12-15 | Microsoft Corporation | Filter generation |
US20060053308A1 (en) * | 2004-09-08 | 2006-03-09 | Raidy 2 Go Ltd. | Secured redundant memory subsystem |
US20060075083A1 (en) * | 2004-09-22 | 2006-04-06 | Bing Liu | System for distributing information using a secure peer-to-peer network |
KR100713128B1 (en) * | 2004-11-08 | 2007-05-02 | 주식회사 비젯 | Device and System for preventing virus |
US20060206855A1 (en) * | 2005-03-09 | 2006-09-14 | Biju Nair | System and method for conflict identification and resolution |
US8060860B2 (en) * | 2005-04-22 | 2011-11-15 | Apple Inc. | Security methods and systems |
US7562293B2 (en) * | 2005-05-27 | 2009-07-14 | International Business Machines Corporation | Method and apparatus for processing a parseable document |
US7895651B2 (en) * | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8272058B2 (en) * | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US8984636B2 (en) * | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US8549646B2 (en) * | 2005-10-20 | 2013-10-01 | The Trustees Of Columbia University In The City Of New York | Methods, media and systems for responding to a denial of service attack |
US20070245334A1 (en) * | 2005-10-20 | 2007-10-18 | The Trustees Of Columbia University In The City Of New York | Methods, media and systems for maintaining execution of a software process |
US20070233880A1 (en) * | 2005-10-20 | 2007-10-04 | The Trustees Of Columbia University In The City Of New York | Methods, media and systems for enabling a consistent web browsing session on different digital processing devices |
US8280944B2 (en) * | 2005-10-20 | 2012-10-02 | The Trustees Of Columbia University In The City Of New York | Methods, media and systems for managing a distributed application running in a plurality of digital processing devices |
US7971137B2 (en) * | 2005-12-14 | 2011-06-28 | Google Inc. | Detecting and rejecting annoying documents |
US8453243B2 (en) * | 2005-12-28 | 2013-05-28 | Websense, Inc. | Real time lockdown |
US7757269B1 (en) | 2006-02-02 | 2010-07-13 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US7895573B1 (en) * | 2006-03-27 | 2011-02-22 | Mcafee, Inc. | Execution environment file inventory |
US8214482B2 (en) * | 2006-06-27 | 2012-07-03 | Nosadia Pass Nv, Limited Liability Company | Remote log repository with access policy |
US8301753B1 (en) | 2006-06-27 | 2012-10-30 | Nosadia Pass Nv, Limited Liability Company | Endpoint activity logging |
US7668954B1 (en) | 2006-06-27 | 2010-02-23 | Stephen Waller Melvin | Unique identifier validation |
US8056133B1 (en) * | 2006-07-26 | 2011-11-08 | Trend Micro Incorporated | Protecting computers from viruses in peer-to-peer data transfers |
US9654495B2 (en) * | 2006-12-01 | 2017-05-16 | Websense, Llc | System and method of analyzing web addresses |
JP2008172457A (en) * | 2007-01-10 | 2008-07-24 | Fujitsu Ltd | Terminal specification program, terminal specification device and mail system |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US8332929B1 (en) | 2007-01-10 | 2012-12-11 | Mcafee, Inc. | Method and apparatus for process enforced configuration management |
US7797742B2 (en) * | 2007-02-26 | 2010-09-14 | Microsoft Corporation | File blocking mitigation |
US7797743B2 (en) | 2007-02-26 | 2010-09-14 | Microsoft Corporation | File conversion in restricted process |
US7953969B2 (en) * | 2007-04-16 | 2011-05-31 | Microsoft Corporation | Reduction of false positive reputations through collection of overrides from customer deployments |
US8677479B2 (en) | 2007-04-16 | 2014-03-18 | Microsoft Corporation | Detection of adversaries through collection and correlation of assessments |
US8631235B2 (en) * | 2007-08-08 | 2014-01-14 | Oracle America, Inc. | System and method for storing data using a virtual worm file system |
US7853248B2 (en) * | 2007-09-21 | 2010-12-14 | Yahoo! Inc. | SMS spam control |
WO2009061320A2 (en) * | 2007-11-08 | 2009-05-14 | Comodo Ca, Inc. | Method and system for protecting a computer against malicious software |
US8104083B1 (en) | 2008-03-31 | 2012-01-24 | Symantec Corporation | Virtual machine file system content protection system and method |
US8353041B2 (en) * | 2008-05-16 | 2013-01-08 | Symantec Corporation | Secure application streaming |
US8302193B1 (en) * | 2008-05-30 | 2012-10-30 | Symantec Corporation | Methods and systems for scanning files for malware |
CA2729158A1 (en) | 2008-06-30 | 2010-01-07 | Websense, Inc. | System and method for dynamic and real-time categorization of webpages |
US7530106B1 (en) * | 2008-07-02 | 2009-05-05 | Kaspersky Lab, Zao | System and method for security rating of computer processes |
US10262136B1 (en) * | 2008-08-04 | 2019-04-16 | Zscaler, Inc. | Cloud-based malware detection |
US9450960B1 (en) | 2008-11-05 | 2016-09-20 | Symantec Corporation | Virtual machine file system restriction system and method |
US8607345B1 (en) * | 2008-12-16 | 2013-12-10 | Trend Micro Incorporated | Method and apparatus for generic malware downloader detection and prevention |
US8621632B1 (en) * | 2009-05-21 | 2013-12-31 | Symantec Corporation | Systems and methods for locating malware |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8938800B2 (en) * | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US8413244B1 (en) * | 2010-11-11 | 2013-04-02 | Symantec Corporation | Using temporal attributes to detect malware |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9442881B1 (en) | 2011-08-31 | 2016-09-13 | Yahoo! Inc. | Anti-spam transient entity classification |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US8713668B2 (en) | 2011-10-17 | 2014-04-29 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US8739272B1 (en) | 2012-04-02 | 2014-05-27 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9135440B2 (en) * | 2012-08-01 | 2015-09-15 | Ut-Battelle, Llc | Statistical fingerprinting for malware detection and classification |
CN102968592A (en) * | 2012-11-22 | 2013-03-13 | 华为技术有限公司 | Computer-virus detecting method and device |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
EP3061030A4 (en) | 2013-10-24 | 2017-04-19 | McAfee, Inc. | Agent assisted malicious application blocking in a network environment |
US9398034B2 (en) * | 2013-12-19 | 2016-07-19 | Microsoft Technology Licensing, Llc | Matrix factorization for automated malware detection |
US10200374B1 (en) * | 2016-02-29 | 2019-02-05 | Symantec Corporation | Techniques for detecting malicious files |
US10721246B2 (en) | 2017-10-30 | 2020-07-21 | Bank Of America Corporation | System for across rail silo system integration and logic repository |
US10621341B2 (en) | 2017-10-30 | 2020-04-14 | Bank Of America Corporation | Cross platform user event record aggregation system |
US10728256B2 (en) | 2017-10-30 | 2020-07-28 | Bank Of America Corporation | Cross channel authentication elevation via logic repository |
JP7028065B2 (en) * | 2018-05-30 | 2022-03-02 | コニカミノルタ株式会社 | Image processing equipment, its control method, and programs |
US11689567B2 (en) * | 2020-03-06 | 2023-06-27 | Honeywell International Inc. | Mapping an attack tree and attack prediction in industrial control and IIoT environment using hash data analytics |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987610A (en) * | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
Family Cites Families (123)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA1314101C (en) * | 1988-02-17 | 1993-03-02 | Henry Shao-Lin Teng | Expert system for security inspection of a digital computer system in a network environment |
US5212765A (en) | 1990-08-03 | 1993-05-18 | E. I. Du Pont De Nemours & Co., Inc. | On-line training neural network system for process control |
US5473769A (en) | 1992-03-30 | 1995-12-05 | Cozza; Paul D. | Method and apparatus for increasing the speed of the detecting of computer viruses |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
JP2501771B2 (en) * | 1993-01-19 | 1996-05-29 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Method and apparatus for obtaining multiple valid signatures of an unwanted software entity |
US5398196A (en) * | 1993-07-29 | 1995-03-14 | Chambers; David A. | Method and apparatus for detection of computer viruses |
US5572590A (en) | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
US5715174A (en) * | 1994-11-15 | 1998-02-03 | Absolute Software Corporation | Security apparatus and method |
US5675710A (en) * | 1995-06-07 | 1997-10-07 | Lucent Technologies, Inc. | Method and apparatus for training a text classifier |
US5715464A (en) * | 1995-06-07 | 1998-02-03 | International Business Machines Corporation | Computer system having suspend once resume many sessions |
US5889943A (en) * | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5854916A (en) | 1995-09-28 | 1998-12-29 | Symantec Corporation | State-based cache for antivirus software |
US5826013A (en) * | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US5696822A (en) | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module |
JP3434105B2 (en) * | 1995-11-28 | 2003-08-04 | 富士通株式会社 | Macro program management device |
US6072830A (en) * | 1996-08-09 | 2000-06-06 | U.S. Robotics Access Corp. | Method for generating a compressed video signal |
US5832208A (en) | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US6072942A (en) * | 1996-09-18 | 2000-06-06 | Secure Computing Corporation | System and method of electronic mail filtering using interconnected nodes |
US5951698A (en) * | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros |
US5758359A (en) * | 1996-10-24 | 1998-05-26 | Digital Equipment Corporation | Method and apparatus for performing retroactive backups in a computer system |
US6167520A (en) * | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
US5956481A (en) * | 1997-02-06 | 1999-09-21 | Microsoft Corporation | Method and apparatus for protecting data files on a computer from virus infection |
US5960170A (en) * | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
US5974549A (en) | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6298351B1 (en) | 1997-04-11 | 2001-10-02 | International Business Machines Corporation | Modifying an unreliable training set for supervised classification |
GB9713719D0 (en) * | 1997-06-27 | 1997-09-03 | British Telecomm | Data model compiler |
US5949973A (en) * | 1997-07-25 | 1999-09-07 | Memco Software, Ltd. | Method of relocating the stack in a computer system for preventing overrate by an exploit program |
US5978917A (en) | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses |
US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
IL126148A (en) * | 1997-09-09 | 2004-02-19 | Sanctum Ltd | Method and system for maintaining restricted operating environments for application programs or operating systems |
US6357008B1 (en) * | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases |
JP3952558B2 (en) * | 1997-11-05 | 2007-08-01 | ブラザー工業株式会社 | Printing system, printer and printing method |
US6070244A (en) * | 1997-11-10 | 2000-05-30 | The Chase Manhattan Bank | Computer network security management system |
US6108799A (en) * | 1997-11-21 | 2000-08-22 | International Business Machines Corporation | Automated sample creation of polymorphic and non-polymorphic marcro viruses |
US6094731A (en) * | 1997-11-24 | 2000-07-25 | Symantec Corporation | Antivirus accelerator for computer networks |
US6021510A (en) * | 1997-11-24 | 2000-02-01 | Symantec Corporation | Antivirus accelerator |
AU1907899A (en) * | 1997-12-22 | 1999-07-12 | Accepted Marketing, Inc. | E-mail filter and method thereof |
US6023723A (en) * | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms |
US6052709A (en) * | 1997-12-23 | 2000-04-18 | Bright Light Technologies, Inc. | Apparatus and method for controlling delivery of unsolicited electronic mail |
US6088803A (en) | 1997-12-30 | 2000-07-11 | Intel Corporation | System for virus-checking network data during download to a client device |
US6324649B1 (en) * | 1998-03-02 | 2001-11-27 | Compaq Computer Corporation | Modified license key entry for pre-installation of software |
US6130924A (en) * | 1998-04-20 | 2000-10-10 | Sun Microsystems, Inc. | Method and apparatus for administrative control over data transmission using dynamic filtering in a multicast network |
US6347310B1 (en) * | 1998-05-11 | 2002-02-12 | Torrent Systems, Inc. | Computer system and process for training of analytical models using large data sets |
US6253169B1 (en) * | 1998-05-28 | 2001-06-26 | International Business Machines Corporation | Method for improvement accuracy of decision tree based text categorization |
US6161130A (en) | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
US6167434A (en) | 1998-07-15 | 2000-12-26 | Pang; Stephen Y. | Computer code for removing junk e-mail messages |
US6493007B1 (en) | 1998-07-15 | 2002-12-10 | Stephen Y. Pang | Method and device for removing junk e-mail messages |
US6338141B1 (en) * | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time |
US6370648B1 (en) * | 1998-12-08 | 2002-04-09 | Visa International Service Association | Computer network intrusion detection |
US6397200B1 (en) * | 1999-03-18 | 2002-05-28 | The United States Of America As Represented By The Secretary Of The Navy | Data reduction system for improving classifier performance |
US6505167B1 (en) * | 1999-04-20 | 2003-01-07 | Microsoft Corp. | Systems and methods for directing automated services for messaging and scheduling |
US6370526B1 (en) * | 1999-05-18 | 2002-04-09 | International Business Machines Corporation | Self-adaptive method and system for providing a user-preferred ranking order of object sets |
GB2350449A (en) | 1999-05-27 | 2000-11-29 | Ibm | Detecting replication of a computer virus using a counter virus |
US20020038308A1 (en) * | 1999-05-27 | 2002-03-28 | Michael Cappi | System and method for creating a virtual data warehouse |
US6502082B1 (en) | 1999-06-01 | 2002-12-31 | Microsoft Corp | Modality fusion for object tracking with training system and method |
US7366702B2 (en) * | 1999-07-30 | 2008-04-29 | Ipass Inc. | System and method for secure network purchasing |
US6442606B1 (en) * | 1999-08-12 | 2002-08-27 | Inktomi Corporation | Method and apparatus for identifying spoof documents |
US6456991B1 (en) * | 1999-09-01 | 2002-09-24 | Hrl Laboratories, Llc | Classification method and apparatus based on boosting and pruning of multiple classifiers |
US6763462B1 (en) * | 1999-10-05 | 2004-07-13 | Micron Technology, Inc. | E-mail virus detection utility |
US6424960B1 (en) * | 1999-10-14 | 2002-07-23 | The Salk Institute For Biological Studies | Unsupervised adaptation and classification of multiple classes and sources in blind signal separation |
US6397215B1 (en) * | 1999-10-29 | 2002-05-28 | International Business Machines Corporation | Method and system for automatic comparison of text classifications |
US6678734B1 (en) * | 1999-11-13 | 2004-01-13 | Ssh Communications Security Ltd. | Method for intercepting network packets in a computing device |
US6851057B1 (en) * | 1999-11-30 | 2005-02-01 | Symantec Corporation | Data driven detection of viruses |
US8079046B2 (en) | 1999-12-21 | 2011-12-13 | Tivo Inc. | Intelligent system and methods of recommending media content items based on user preferences |
US6697950B1 (en) * | 1999-12-22 | 2004-02-24 | Networks Associates Technology, Inc. | Method and apparatus for detecting a macro computer virus using static analysis |
US6892303B2 (en) * | 2000-01-06 | 2005-05-10 | International Business Machines Corporation | Method and system for caching virus-free file certificates |
US7099916B1 (en) * | 2000-01-06 | 2006-08-29 | International Business Machines Corporation | System and method for downloading a virus-free file certificate from a file server |
US6735700B1 (en) * | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping |
US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
US20020087649A1 (en) * | 2000-03-16 | 2002-07-04 | Horvitz Eric J. | Bounded-deferral policies for reducing the disruptiveness of notifications |
US6748534B1 (en) * | 2000-03-31 | 2004-06-08 | Networks Associates, Inc. | System and method for partitioned distributed scanning of a large dataset for viruses and other malware |
US20020035696A1 (en) * | 2000-06-09 | 2002-03-21 | Will Thacker | System and method for protecting a networked computer from viruses |
US7007301B2 (en) * | 2000-06-12 | 2006-02-28 | Hewlett-Packard Development Company, L.P. | Computer architecture for an intrusion detection system |
US7134141B2 (en) * | 2000-06-12 | 2006-11-07 | Hewlett-Packard Development Company, L.P. | System and method for host and network based intrusion detection and response |
US6611925B1 (en) * | 2000-06-13 | 2003-08-26 | Networks Associates Technology, Inc. | Single point of entry/origination item scanning within an enterprise or workgroup |
US6721721B1 (en) * | 2000-06-15 | 2004-04-13 | International Business Machines Corporation | Virus checking and reporting for computer database search results |
US7328349B2 (en) * | 2001-12-14 | 2008-02-05 | Bbn Technologies Corp. | Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses |
US7017187B1 (en) * | 2000-06-20 | 2006-03-21 | Citigroup Global Markets, Inc. | Method and system for file blocking in an electronic messaging system |
GB2357939B (en) * | 2000-07-05 | 2002-05-15 | Gfi Fax & Voice Ltd | Electronic mail message anti-virus system and method |
US7093239B1 (en) * | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
US6778986B1 (en) * | 2000-07-31 | 2004-08-17 | Eliyon Technologies Corporation | Computer method and apparatus for determining site type of a web site |
US6910134B1 (en) * | 2000-08-29 | 2005-06-21 | Netrake Corporation | Method and device for innoculating email infected with a virus |
US6898715B1 (en) * | 2000-09-12 | 2005-05-24 | Networks Associates Technology, Inc. | Response to a computer virus outbreak |
US6886099B1 (en) * | 2000-09-12 | 2005-04-26 | Networks Associates Technology, Inc. | Computer virus detection |
US6535891B1 (en) * | 2000-09-26 | 2003-03-18 | Emc Corporation | Method and apparatus for indentifying accesses to a repository of logical objects stored on a storage system based upon information identifying accesses to physical storage locations |
US20040039921A1 (en) * | 2000-10-17 | 2004-02-26 | Shyne-Song Chuang | Method and system for detecting rogue software |
US7707305B2 (en) * | 2000-10-17 | 2010-04-27 | Cisco Technology, Inc. | Methods and apparatus for protecting against overload conditions on nodes of a distributed network |
WO2002037393A2 (en) * | 2000-11-06 | 2002-05-10 | Envoy Worlwide, Inc. | System and method for service specific notification |
US6622150B1 (en) * | 2000-12-18 | 2003-09-16 | Networks Associates Technology, Inc. | System and method for efficiently managing computer virus definitions using a structured virus database |
US20020091940A1 (en) * | 2001-01-05 | 2002-07-11 | Welborn Christopher Michael | E-mail user behavior modification system and mechanism for computer virus avoidance |
US20030051026A1 (en) * | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
US20020178375A1 (en) | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
US20020147694A1 (en) | 2001-01-31 | 2002-10-10 | Dempsey Derek M. | Retraining trainable data classifiers |
US20030018903A1 (en) * | 2001-03-19 | 2003-01-23 | Greca Damon G. Della | Method of containing spread of computer viruses |
US8949878B2 (en) | 2001-03-30 | 2015-02-03 | Funai Electric Co., Ltd. | System for parental control in video programs based on multimedia content information |
US7010696B1 (en) * | 2001-03-30 | 2006-03-07 | Mcafee, Inc. | Method and apparatus for predicting the incidence of a virus |
US7188367B1 (en) * | 2001-03-30 | 2007-03-06 | Moafee, Inc. | Virus scanning prioritization using pre-processor checking |
US7502939B2 (en) | 2001-04-19 | 2009-03-10 | Cybersoft, Inc. | Software virus detection methods and apparatus |
CN1147795C (en) | 2001-04-29 | 2004-04-28 | 北京瑞星科技股份有限公司 | Method, system and medium for detecting and clearing known and anknown computer virus |
US7188368B2 (en) | 2001-05-25 | 2007-03-06 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for repairing damage to a computer system using a system rollback mechanism |
US7194625B2 (en) | 2001-06-19 | 2007-03-20 | Intel Corporation | Method and apparatus for authenticating registry information |
US7421587B2 (en) * | 2001-07-26 | 2008-09-02 | Mcafee, Inc. | Detecting computer programs within packed computer files |
US7487544B2 (en) * | 2001-07-30 | 2009-02-03 | The Trustees Of Columbia University In The City Of New York | System and methods for detection of new malicious executables |
US8438241B2 (en) * | 2001-08-14 | 2013-05-07 | Cisco Technology, Inc. | Detecting and protecting against worm traffic on a network |
US6662198B2 (en) | 2001-08-30 | 2003-12-09 | Zoteca Inc. | Method and system for asynchronous transmission, backup, distribution of data and file sharing |
US20030033587A1 (en) * | 2001-09-05 | 2003-02-13 | Bruce Ferguson | System and method for on-line training of a non-linear model for use in electronic commerce |
US20030105973A1 (en) * | 2001-12-04 | 2003-06-05 | Trend Micro Incorporated | Virus epidemic outbreak command system and method using early warning monitors in a network environment |
US20030115479A1 (en) * | 2001-12-14 | 2003-06-19 | Jonathan Edwards | Method and system for detecting computer malwares by scan of process memory after process initialization |
US20030115458A1 (en) * | 2001-12-19 | 2003-06-19 | Dongho Song | Invisable file technology for recovering or protecting a computer file system |
US7401359B2 (en) * | 2001-12-21 | 2008-07-15 | Mcafee, Inc. | Generating malware definition data for mobile computing devices |
US7143113B2 (en) * | 2001-12-21 | 2006-11-28 | Cybersoft, Inc. | Apparatus, methods and articles of manufacture for securing and maintaining computer systems and storage media |
US7415726B2 (en) * | 2001-12-28 | 2008-08-19 | Mcafee, Inc. | Controlling access to suspicious files |
AU2003223379A1 (en) * | 2002-03-29 | 2003-10-13 | Global Dataguard, Inc. | Adaptive behavioral intrusion detection systems and methods |
US7418729B2 (en) * | 2002-07-19 | 2008-08-26 | Symantec Corporation | Heuristic detection of malicious computer code by page tracking |
US7380277B2 (en) * | 2002-07-22 | 2008-05-27 | Symantec Corporation | Preventing e-mail propagation of malicious computer code |
US7526809B2 (en) * | 2002-08-08 | 2009-04-28 | Trend Micro Incorporated | System and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same |
US20040158730A1 (en) * | 2003-02-11 | 2004-08-12 | International Business Machines Corporation | Running anti-virus software on a network attached storage device |
US7203959B2 (en) * | 2003-03-14 | 2007-04-10 | Symantec Corporation | Stream scanning through network proxy servers |
US7512809B2 (en) * | 2003-08-22 | 2009-03-31 | Cyrus Peikari | Attenuated computer virus vaccine |
US20050132205A1 (en) * | 2003-12-12 | 2005-06-16 | International Business Machines Corporation | Apparatus, methods and computer programs for identifying matching resources within a data processing network |
US7370361B2 (en) * | 2004-02-06 | 2008-05-06 | Trend Micro Incorporated | System and method for securing computers against computer virus |
US7685640B2 (en) * | 2004-09-21 | 2010-03-23 | Agere Systems Inc. | Methods and apparatus for interface adapter integrated virus protection |
US20060161979A1 (en) * | 2005-01-18 | 2006-07-20 | Microsoft Corporation | Scriptable emergency threat communication and mitigating actions |
-
2002
- 2002-04-05 WO PCT/US2002/010867 patent/WO2002093334A2/en active Application Filing
- 2002-10-04 US US10/264,721 patent/US7483993B2/en not_active Expired - Fee Related
-
2008
- 2008-10-10 US US12/249,737 patent/US7904573B1/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987610A (en) * | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
Non-Patent Citations (1)
Title |
---|
VON BABO M: "ZEHN MYTHEN UM COMPUTERVIREN. ÖDICHTUNG UND WAHRHEIT UEBER DEN SCHRECKEN DES INFORMATIKZEITALTERS", TECHNISCHE RUNDSCHAU, HALLWAG VERLAG. BERN, CH, vol. 84, no. 36, 4 September 1992 (1992-09-04), pages 44 - 47, XP000316555, ISSN: 1023-0823 * |
Also Published As
Publication number | Publication date |
---|---|
WO2002093334A2 (en) | 2002-11-21 |
US20030088680A1 (en) | 2003-05-08 |
US7904573B1 (en) | 2011-03-08 |
US7483993B2 (en) | 2009-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002093334A3 (en) | Temporal access control for computer virus outbreaks | |
US7886353B2 (en) | Accessing a USB host controller security extension using a HCD proxy | |
HK1055827A1 (en) | Evidence-based security policy manager | |
AU2008203454A1 (en) | Systems & Methods for Preventing Unauthorized Use of Digital Content | |
US20080127114A1 (en) | Framework for stealth dynamic coarse and fine-grained malware analysis | |
US10867049B2 (en) | Dynamic security module terminal device and method of operating same | |
WO2006101549A3 (en) | Secure system for allowing the execution of authorized computer program code | |
MXPA04001386A (en) | Using permissions to allocate device resources to an application. | |
WO2004036350A3 (en) | Secure file system server architecture and methods | |
EP0325776A3 (en) | A trusted path mechanism for an operating system | |
RU2004131023A (en) | PROVISION OF PROTECTED ENTRANCE TO THE SYSTEM WITH A HIGH-RELIABLE ENVIRONMENT FOR PROGRAM PERFORMANCE | |
EP2181394B1 (en) | Method of protecting input/output packet of usb device and apparatus thereof | |
JP7113887B2 (en) | Trusted kernel-based attack resistant data processor | |
WO2017033180A1 (en) | System and method for monitoring and protecting an untrusted operating system by means of a trusted operating system | |
WO2018090934A1 (en) | Event reporting method and apparatus | |
CA2432317A1 (en) | Method and apparatus for tracking status of resource in a system for managing use of the resources | |
WO2005110565A3 (en) | Protecting a gaming machine from rogue code | |
GB2413880A (en) | A method and system of securely enforcing a computer policy | |
CN100495284C (en) | Software modem with privileged mode driver authentication | |
GB2423392B (en) | Methods and system for replicating and securing process control data | |
CN109783207A (en) | Protect the method and system of dual system shared drive data safety | |
JP6623656B2 (en) | Communication control device, communication control method, and communication control program | |
WO2001088673A3 (en) | Malicious mobile code runtime monitoring system and methods | |
WO2000034856A3 (en) | System and method for controlling the usage of digital objects | |
CN105975851B (en) | A kind of process handling method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): CA |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |