ATE426211T1 - Verfahren und vorrichtung zur immunisierung von daten in computersystemen gegenuber verfalschung - Google Patents
Verfahren und vorrichtung zur immunisierung von daten in computersystemen gegenuber verfalschungInfo
- Publication number
- ATE426211T1 ATE426211T1 AT05825583T AT05825583T ATE426211T1 AT E426211 T1 ATE426211 T1 AT E426211T1 AT 05825583 T AT05825583 T AT 05825583T AT 05825583 T AT05825583 T AT 05825583T AT E426211 T1 ATE426211 T1 AT E426211T1
- Authority
- AT
- Austria
- Prior art keywords
- message
- immunizing
- data
- recipient
- computer systems
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/993,920 US20060112430A1 (en) | 2004-11-19 | 2004-11-19 | Method and apparatus for immunizing data in computer systems from corruption |
| US11/164,122 US8131804B2 (en) | 2004-11-19 | 2005-11-10 | Method and apparatus for immunizing data in computer systems from corruption |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE426211T1 true ATE426211T1 (de) | 2009-04-15 |
Family
ID=36144804
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT05825583T ATE426211T1 (de) | 2004-11-19 | 2005-11-14 | Verfahren und vorrichtung zur immunisierung von daten in computersystemen gegenuber verfalschung |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US8131804B2 (de) |
| EP (1) | EP1815382B9 (de) |
| AT (1) | ATE426211T1 (de) |
| DE (1) | DE602005013421D1 (de) |
| WO (1) | WO2006055479A1 (de) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6901519B1 (en) * | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
| US20090133124A1 (en) * | 2006-02-15 | 2009-05-21 | Jie Bai | A method for detecting the operation behavior of the program and a method for detecting and clearing the virus program |
| US8930527B2 (en) * | 2009-05-26 | 2015-01-06 | Oracle International Corporation | High availability enabler |
| US8688816B2 (en) * | 2009-11-19 | 2014-04-01 | Oracle International Corporation | High availability by letting application session processing occur independent of protocol servers |
| US9049222B1 (en) * | 2012-02-02 | 2015-06-02 | Trend Micro Inc. | Preventing cross-site scripting in web-based e-mail |
| US10142417B2 (en) | 2012-04-17 | 2018-11-27 | Nimbix, Inc. | System and method for managing heterogeneous data for cloud computing applications |
| US9973566B2 (en) * | 2013-11-17 | 2018-05-15 | Nimbix, Inc. | Dynamic creation and execution of containerized applications in cloud computing |
| US8775576B2 (en) | 2012-04-17 | 2014-07-08 | Nimbix, Inc. | Reconfigurable cloud computing |
| US10235207B2 (en) | 2016-09-30 | 2019-03-19 | Nimbix, Inc. | Method and system for preemptible coprocessing |
| US10462096B2 (en) * | 2016-10-20 | 2019-10-29 | Settleitsoft, Inc. | Communications and analysis system |
Family Cites Families (34)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5434562A (en) * | 1991-09-06 | 1995-07-18 | Reardon; David C. | Method for limiting computer access to peripheral devices |
| ATE183592T1 (de) * | 1994-06-01 | 1999-09-15 | Quantum Leap Innovations Inc | Computervirenfalle |
| US5600726A (en) * | 1995-04-07 | 1997-02-04 | Gemini Systems, L.L.C. | Method for creating specific purpose rule-based n-bit virtual machines |
| US6802028B1 (en) * | 1996-11-11 | 2004-10-05 | Powerquest Corporation | Computer virus detection and removal |
| US6096037A (en) * | 1997-07-29 | 2000-08-01 | Medtronic, Inc. | Tissue sealing electrosurgery device and methods of sealing tissue |
| US6357008B1 (en) * | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases |
| US6401210B1 (en) * | 1998-09-23 | 2002-06-04 | Intel Corporation | Method of managing computer virus infected files |
| GB9920834D0 (en) * | 1999-09-04 | 1999-11-10 | Hewlett Packard Co | Providing secure access through network firewalls |
| US6684257B1 (en) * | 1999-10-15 | 2004-01-27 | International Business Machines Corporation | Systems, methods and computer program products for validating web content tailored for display within pervasive computing devices |
| US6775780B1 (en) | 2000-03-16 | 2004-08-10 | Networks Associates Technology, Inc. | Detecting malicious software by analyzing patterns of system calls generated during emulation |
| US6901519B1 (en) * | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
| US6772196B1 (en) * | 2000-07-27 | 2004-08-03 | Propel Software Corp. | Electronic mail filtering system and methods |
| US6704024B2 (en) * | 2000-08-07 | 2004-03-09 | Zframe, Inc. | Visual content browsing using rasterized representations |
| US6650890B1 (en) * | 2000-09-29 | 2003-11-18 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
| GB2371125A (en) * | 2001-01-13 | 2002-07-17 | Secr Defence | Computer protection system |
| US6941478B2 (en) * | 2001-04-13 | 2005-09-06 | Nokia, Inc. | System and method for providing exploit protection with message tracking |
| US6931552B2 (en) * | 2001-05-02 | 2005-08-16 | James B. Pritchard | Apparatus and method for protecting a computer system against computer viruses and unauthorized access |
| US6922774B2 (en) * | 2001-05-14 | 2005-07-26 | The United States Of America As Represented By The National Security Agency | Device for and method of secure computing using virtual machines |
| US7640361B1 (en) * | 2001-08-24 | 2009-12-29 | Mcafee, Inc. | Systems and methods for converting infected electronic files to a safe format |
| US7458098B2 (en) * | 2002-03-08 | 2008-11-25 | Secure Computing Corporation | Systems and methods for enhancing electronic communication security |
| US6732157B1 (en) * | 2002-12-13 | 2004-05-04 | Networks Associates Technology, Inc. | Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages |
| US7373664B2 (en) * | 2002-12-16 | 2008-05-13 | Symantec Corporation | Proactive protection against e-mail worms and spam |
| US20080177994A1 (en) * | 2003-01-12 | 2008-07-24 | Yaron Mayer | System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows |
| US7543053B2 (en) * | 2003-03-03 | 2009-06-02 | Microsoft Corporation | Intelligent quarantining for spam prevention |
| US20060288414A1 (en) * | 2003-03-17 | 2006-12-21 | Seiko Epson Corporation | Method and system for preventing virus infection |
| US7051077B2 (en) * | 2003-06-30 | 2006-05-23 | Mx Logic, Inc. | Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers |
| US8055910B2 (en) * | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
| US20050076095A1 (en) * | 2003-07-11 | 2005-04-07 | Boban Mathew | Virtual contextual file system and method |
| US7257564B2 (en) * | 2003-10-03 | 2007-08-14 | Tumbleweed Communications Corp. | Dynamic message filtering |
| US7996470B2 (en) * | 2003-10-14 | 2011-08-09 | At&T Intellectual Property I, L.P. | Processing rules for digital messages |
| US7966375B2 (en) * | 2004-06-28 | 2011-06-21 | Hewlett-Packard Development Company, L.P. | System and method for restricting access to email and attachments |
| US7908653B2 (en) * | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
| US20060075099A1 (en) * | 2004-09-16 | 2006-04-06 | Pearson Malcolm E | Automatic elimination of viruses and spam |
| US8069471B2 (en) * | 2008-10-21 | 2011-11-29 | Lockheed Martin Corporation | Internet security dynamics assessment system, program product, and related methods |
-
2005
- 2005-11-10 US US11/164,122 patent/US8131804B2/en not_active Expired - Fee Related
- 2005-11-14 WO PCT/US2005/041169 patent/WO2006055479A1/en not_active Ceased
- 2005-11-14 DE DE602005013421T patent/DE602005013421D1/de not_active Expired - Lifetime
- 2005-11-14 EP EP05825583A patent/EP1815382B9/de not_active Expired - Lifetime
- 2005-11-14 AT AT05825583T patent/ATE426211T1/de not_active IP Right Cessation
-
2012
- 2012-01-25 US US13/357,772 patent/US8661086B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US20120124668A1 (en) | 2012-05-17 |
| EP1815382A1 (de) | 2007-08-08 |
| WO2006055479A1 (en) | 2006-05-26 |
| US8131804B2 (en) | 2012-03-06 |
| US8661086B2 (en) | 2014-02-25 |
| DE602005013421D1 (de) | 2009-04-30 |
| US20060168053A1 (en) | 2006-07-27 |
| EP1815382B1 (de) | 2009-03-18 |
| EP1815382B9 (de) | 2009-09-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB0501355D0 (en) | Media data usage measurement and reporting systems and methods | |
| ATE492112T1 (de) | Verfahren und vorrichtung zur datenaufzeichnung | |
| GB2453269A (en) | Remote logging operations environment | |
| ATE352967T1 (de) | Verfahren und vorrichtung zur datenprotokollierung | |
| WO2002097672A3 (en) | Method and system for remote utilizing a mobile device to share data objects | |
| WO2008022118A3 (en) | Instant messaging applications in security systems | |
| GB2451026A (en) | Detection of network environment | |
| ATE335338T1 (de) | Verfahren zur sicheren ausführung eines fernmeldebefehls | |
| WO2008052291A3 (en) | System and process for detecting anomalous network traffic | |
| WO2007139962A3 (en) | System for and method of securing a network utilizing credentials | |
| GB0714756D0 (en) | Method, apparatus and system for interfering with distribution of protected content | |
| WO2008052188A3 (en) | Find and see application for a group of devices | |
| GB2447197A (en) | System and method for remote data aquisition and distribution | |
| EP1632843A3 (de) | Datenverarbeitungssystem und Kopierverarbeitungsverfahren | |
| WO2009154947A3 (en) | Security message processing | |
| TWI268430B (en) | Common memory system shared by more than one set of computer and information processing system providing the memory system provide remote boot technique | |
| ATE540519T1 (de) | Verfahren und vorrichtung zur gemeinsamen nutzung von verbindungen von gemeinsamem interesse zwischen kommunikationsgeräten | |
| WO2007095097A3 (en) | Secure authentication facility | |
| DE602004012660D1 (de) | System und Verfahren für einen nachrichtenorientierten anpassungsfähigen Datentransport | |
| SG146667A1 (en) | Systems and methods for adaptive authentication | |
| ATE426211T1 (de) | Verfahren und vorrichtung zur immunisierung von daten in computersystemen gegenuber verfalschung | |
| WO2006020053A3 (en) | System and method for preventing transmission during message reception | |
| WO2008097780A3 (en) | System and method for adding context to prevent data leakage over a computer network | |
| TW200701694A (en) | Transmission apparatus for reducing delay variance and related method | |
| WO2007067930A3 (en) | System and/or method for bidding |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |