BRPI0414155A - sistema de segurança de internet de computador pessoal - Google Patents

sistema de segurança de internet de computador pessoal

Info

Publication number
BRPI0414155A
BRPI0414155A BRPI0414155-5A BRPI0414155A BRPI0414155A BR PI0414155 A BRPI0414155 A BR PI0414155A BR PI0414155 A BRPI0414155 A BR PI0414155A BR PI0414155 A BRPI0414155 A BR PI0414155A
Authority
BR
Brazil
Prior art keywords
operating system
personal computer
primary
computer
security system
Prior art date
Application number
BRPI0414155-5A
Other languages
English (en)
Inventor
Scott R Copeland
Reginald A Goodman
Original Assignee
Scott R Copeland
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Scott R Copeland filed Critical Scott R Copeland
Publication of BRPI0414155A publication Critical patent/BRPI0414155A/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

"SISTEMA DE SEGURANçA DE INTERNET DE COMPUTADOR PESSOAL". Um aplicativo de software (100), que pode ser instalado em um computador pessoal (20), protege os arquivos de dados primários do computador de serem acessados por código malicioso (por exemplo, vírus, worms e trovans) , importados de uma fonte de dados externa, tal como a Internet (14). Um arquivo mestre serve como a imagem da qual todos os outros códigos de software e funções são derivados. A ativação do arquivo de imagem mestre estabelece um ambiente operacional secundário (bolha de isolamento) (120), na qual um sistema operacional secundário (126) que inclui um navegador e quaisquer outros aplicativos desejados são instalados e executados. As permissões de acesso para comunicações entre o computador, em geral, (sistema operacional primário) (20) e o sistema operacional secundário (126) para impedir qualquer acesso aos arquivos no sistema operacional primário (20) de quaisquer operações que originam do sistema operacional secundário (126). A ativação do sistema operacional secundário (126) é requerida, antes de qualquer conexão para a Internet (14) (ou outra fonte de dados externa) ser habilitada.
BRPI0414155-5A 2003-09-05 2004-01-02 sistema de segurança de internet de computador pessoal BRPI0414155A (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/656,570 US7146640B2 (en) 2002-09-05 2003-09-05 Personal computer internet security system
PCT/US2004/000028 WO2005027402A1 (en) 2003-09-05 2004-01-02 Personal computer internet security system

Publications (1)

Publication Number Publication Date
BRPI0414155A true BRPI0414155A (pt) 2006-10-31

Family

ID=34312662

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0414155-5A BRPI0414155A (pt) 2003-09-05 2004-01-02 sistema de segurança de internet de computador pessoal

Country Status (11)

Country Link
US (2) US7146640B2 (pt)
EP (1) EP1661290A4 (pt)
JP (1) JP2007534039A (pt)
CN (1) CN1846393A (pt)
AU (1) AU2004303330A1 (pt)
BR (1) BRPI0414155A (pt)
CA (1) CA2537582A1 (pt)
MX (1) MXPA06002447A (pt)
NZ (1) NZ546112A (pt)
WO (1) WO2005027402A1 (pt)
ZA (1) ZA200602534B (pt)

Families Citing this family (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT1249817B (it) * 1991-07-23 1995-03-28 Sviluppo Materiali Spa Procedimento per la produzione di polveri per materiali ceramici superconduttori
US7076633B2 (en) * 2001-03-28 2006-07-11 Swsoft Holdings, Ltd. Hosting service providing platform system and method
US7243339B2 (en) * 2001-07-03 2007-07-10 Hewlett-Packard Development Company, L.P. System and method to decrease program analysis overhead
US7302566B2 (en) * 2002-09-13 2007-11-27 Wayne Yingling Internet security system
US7788669B2 (en) * 2003-05-02 2010-08-31 Microsoft Corporation System for isolating first computing environment from second execution environment while sharing resources by copying data from first portion to second portion of memory
FI20030929L (fi) * 2003-06-19 2004-12-20 Nokia Corp Menetelmä ja järjestelyjä langattoman tiedonsiirron toteuttamiseksi kulkuvälineessä
US8856927B1 (en) 2003-07-22 2014-10-07 Acronis International Gmbh System and method for using snapshots for rootkit detection
US7739403B1 (en) 2003-10-03 2010-06-15 Juniper Networks, Inc. Synchronizing state information between control units
US7797752B1 (en) * 2003-12-17 2010-09-14 Vimal Vaidya Method and apparatus to secure a computing environment
US20050172280A1 (en) * 2004-01-29 2005-08-04 Ziegler Jeremy R. System and method for preintegration of updates to an operating system
US20050171977A1 (en) * 2004-02-02 2005-08-04 Osborne James W. Methods, systems and products for data preservation
US7877747B2 (en) * 2004-02-20 2011-01-25 Hewlett-Packard Development Company, L.P. Flexible operating system operable as either native or as virtualized
US8793787B2 (en) * 2004-04-01 2014-07-29 Fireeye, Inc. Detecting malicious network content using virtual environment components
US7509465B1 (en) * 2004-06-25 2009-03-24 Emc Corporation System and method for managing memory or session resources used for movement of data being copied in a data storage environment
US7299332B1 (en) * 2004-06-25 2007-11-20 Emc Corporation System and method for managing sessions and allocating memory resources used for replication of data in a data storage environment
US8307174B1 (en) 2004-06-25 2012-11-06 Emc Corporation System and method for managing sessions and reallocating memory resources used for replication of data in a data storage environment
US7484247B2 (en) * 2004-08-07 2009-01-27 Allen F Rozman System and method for protecting a computer system from malicious software
US20120099219A1 (en) * 2004-08-09 2012-04-26 Jasim Saleh Al-Azzawi Secure data storage device
US8112601B2 (en) * 2004-08-09 2012-02-07 Jasim Saleh Al-Azzawi Data storage device with security feature
US7690033B2 (en) * 2004-09-28 2010-03-30 Exobox Technologies Corp. Electronic computer system secured from unauthorized access to and manipulation of data
US20060137013A1 (en) * 2004-12-06 2006-06-22 Simon Lok Quarantine filesystem
AT501652A1 (de) * 2005-01-14 2006-10-15 Diaplan Elektronic Gmbh Computersicherheitssystem
US9104773B2 (en) 2005-06-21 2015-08-11 Microsoft Technology Licensing, Llc Finding and consuming web subscriptions in a web browser
US8661459B2 (en) 2005-06-21 2014-02-25 Microsoft Corporation Content syndication platform
US8074272B2 (en) 2005-07-07 2011-12-06 Microsoft Corporation Browser security notification
US7831547B2 (en) 2005-07-12 2010-11-09 Microsoft Corporation Searching and browsing URLs and URL history
US7865830B2 (en) 2005-07-12 2011-01-04 Microsoft Corporation Feed and email content
US7606241B1 (en) 2005-08-12 2009-10-20 Juniper Networks, Inc. Extending standalone router syntax to multi-chassis routers
US8407785B2 (en) 2005-08-18 2013-03-26 The Trustees Of Columbia University In The City Of New York Systems, methods, and media protecting a digital data processing device from attack
CN100403212C (zh) * 2005-08-23 2008-07-16 北京软通科技有限责任公司 一种实现操作系统隔离的系统及方法
US8112799B1 (en) 2005-08-24 2012-02-07 Symantec Corporation Method, system, and computer program product for avoiding cross-site scripting attacks
US7552262B1 (en) 2005-08-31 2009-06-23 Juniper Networks, Inc. Integration of an operative standalone router into a multi-chassis router
US8135857B1 (en) 2005-09-26 2012-03-13 Juniper Networks, Inc. Centralized configuration of a multi-chassis router
US7747999B1 (en) 2005-09-26 2010-06-29 Juniper Networks, Inc. Software installation in a multi-chassis network device
US7518986B1 (en) 2005-11-16 2009-04-14 Juniper Networks, Inc. Push-based hierarchical state propagation within a multi-chassis network device
US7804769B1 (en) * 2005-12-01 2010-09-28 Juniper Networks, Inc. Non-stop forwarding in a multi-chassis router
US20090271867A1 (en) * 2005-12-30 2009-10-29 Peng Zhang Virtual machine to detect malicious code
US7917715B2 (en) * 2006-01-28 2011-03-29 Tallman Jr Leon C Internet-safe computer
US7845005B2 (en) * 2006-02-07 2010-11-30 International Business Machines Corporation Method for preventing malicious software installation on an internet-connected computer
AU2006100099A4 (en) * 2006-02-08 2006-03-16 Pc Tools Technology Pty Limited Automated Threat Analysis System
US8270941B2 (en) 2006-02-24 2012-09-18 Qualcomm Incorporated System and method for downloading user interface components to wireless devices
US20070206546A1 (en) * 2006-03-02 2007-09-06 Alberth William P Jr Method and apparatus for preventing denial of service attacks on cellular infrastructure access channels
US8280843B2 (en) 2006-03-03 2012-10-02 Microsoft Corporation RSS data-processing object
US7979803B2 (en) 2006-03-06 2011-07-12 Microsoft Corporation RSS hostable control
US7996901B2 (en) 2006-03-31 2011-08-09 Lenovo (Singapore) Pte. Ltd. Hypervisor area for email virus testing
AU2007243254A1 (en) * 2006-04-26 2007-11-08 Exobox Technologies Corp. Secure user environment software
US8738786B2 (en) 2006-05-18 2014-05-27 Sanggyu Lee Method for protecting client and server
US8266692B2 (en) * 2006-07-05 2012-09-11 Bby Solutions, Inc. Malware automated removal system and method
US8453197B2 (en) * 2006-09-07 2013-05-28 Intel Corporation Method, apparatus and system for isolating a temporary partition on a host
US8024806B2 (en) 2006-10-17 2011-09-20 Intel Corporation Method, apparatus and system for enabling a secure location-aware platform
US20080250407A1 (en) * 2007-04-05 2008-10-09 Microsoft Corporation Network group name for virtual machines
US8166476B2 (en) * 2007-08-24 2012-04-24 Symantec Corporation On-demand access to a virtual representation of a physical computer system
US8424078B2 (en) * 2007-11-06 2013-04-16 International Business Machines Corporation Methodology for secure application partitioning enablement
US8448218B2 (en) * 2008-01-17 2013-05-21 Josep Bori Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability
WO2009113157A1 (ja) * 2008-03-11 2009-09-17 富士通株式会社 認証装置、認証方法、およびデータ利用方法
US8001237B2 (en) * 2008-03-21 2011-08-16 Young Yee Remote monitoring of user input devices
US20090254970A1 (en) * 2008-04-04 2009-10-08 Avaya Inc. Multi-tier security event correlation and mitigation
US8813066B2 (en) * 2008-05-06 2014-08-19 International Business Machines Corporation Multi-component software application installation facility
US20090319432A1 (en) * 2008-06-19 2009-12-24 Renfro Chadwick R Secure transaction personal computer
US9679135B2 (en) 2008-06-19 2017-06-13 Bank Of America Corporation Computing device for secured transactions and virtual monitoring external from the operating system
US9317851B2 (en) 2008-06-19 2016-04-19 Bank Of America Corporation Secure transaction personal computer
US7975034B1 (en) * 2008-10-31 2011-07-05 Symantec Corporation Systems and methods to secure data and hardware through virtualization
US8239667B2 (en) * 2008-11-13 2012-08-07 Intel Corporation Switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory
US8489685B2 (en) 2009-07-17 2013-07-16 Aryaka Networks, Inc. Application acceleration as a service system and method
KR20110062937A (ko) * 2009-12-04 2011-06-10 삼성전자주식회사 화상형성장치 및 클라이언트와 연결된 서버, 클라이언트 및 화상형성장치의 드라이버 원격설치방법
CN105095748B (zh) * 2010-11-19 2018-06-01 北京奇虎科技有限公司 一种浏览器隔离使用的方法
US9104514B2 (en) * 2011-01-11 2015-08-11 International Business Machines Corporation Automated deployment of applications with tenant-isolation requirements
US8650640B2 (en) * 2011-02-24 2014-02-11 International Business Machines Corporation Using a declaration of security requirements to determine whether to permit application operations
JP5697206B2 (ja) 2011-03-31 2015-04-08 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation 不正アクセスに対する防御をするシステム、方法およびプログラム
US9495541B2 (en) 2011-09-15 2016-11-15 The Trustees Of Columbia University In The City Of New York Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload
US8972966B2 (en) * 2012-01-05 2015-03-03 Lenovo (Singapore) Pte. Ltd. Updating firmware in a hybrid computing environment
CN103369456B (zh) * 2012-03-29 2016-08-17 英华达(上海)科技有限公司 手机防盗系统及其方法
CN104038469B (zh) * 2013-03-07 2017-12-29 中国银联股份有限公司 用于安全性信息交互的设备
US9170828B2 (en) 2013-05-16 2015-10-27 Microsoft Technology Licensing, Llc. Extraction of operating system-specific characteristics via a communication interface
WO2014204363A1 (en) * 2013-06-19 2014-12-24 Telefonaktiebolaget L M Ericsson (Publ) Method and an integrated circuit for executing a trusted application within a trusted runtime environment
US10171483B1 (en) 2013-08-23 2019-01-01 Symantec Corporation Utilizing endpoint asset awareness for network intrusion detection
CN103902902A (zh) * 2013-10-24 2014-07-02 哈尔滨安天科技股份有限公司 一种基于嵌入式系统的Rootkit检测方法及系统
CN103713937B (zh) * 2013-12-13 2017-08-25 广东电网公司信息中心 变电站终端系统运行方法
CN104215894B (zh) * 2014-08-28 2017-04-05 工业和信息化部电子第五研究所 集成电路硬件木马检测方法和系统
US9600682B2 (en) * 2015-06-08 2017-03-21 Accenture Global Services Limited Mapping process changes
US10546299B1 (en) * 2015-06-18 2020-01-28 Wells Fargo Bank, N.A. Fraudulent activity shell
US10375111B2 (en) * 2016-11-12 2019-08-06 Microsoft Technology Licensing, Llc Anonymous containers
MX2019006678A (es) * 2016-12-11 2019-12-16 Ensilo Ltd Sistema y procedimientos de deteccion de cryptoware.
US10061923B1 (en) * 2017-06-26 2018-08-28 Pritam Nath Safe and secure internet or network connected computing machine providing means for processing, manipulating, receiving, transmitting and storing information free from hackers, hijackers, virus, malware etc.
CN111385508B (zh) * 2018-12-28 2021-08-20 广州市百果园信息技术有限公司 一种视频处理方法、装置、设备和存储介质
US11336684B2 (en) * 2019-06-07 2022-05-17 Lookout, Inc. Mobile device security using a secure execution context
US20250080537A1 (en) * 2023-09-04 2025-03-06 Zscaler, Inc. Systems and methods for pause and resume functionality for shared Privileged Remote Access (PRA) sessions

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9605338D0 (en) * 1996-03-13 1996-05-15 Arendee Ltd Improvements in or relating to computer systems
US6167520A (en) * 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US6067618A (en) * 1998-03-26 2000-05-23 Innova Patent Trust Multiple operating system and disparate user mass storage resource separation for a computer system
US6401210B1 (en) 1998-09-23 2002-06-04 Intel Corporation Method of managing computer virus infected files
US6405318B1 (en) 1999-03-12 2002-06-11 Psionic Software, Inc. Intrusion detection system
US6564326B2 (en) 1999-07-06 2003-05-13 Walter A. Helbig, Sr. Method and apparatus for enhancing computer system security
US6473825B1 (en) 2000-01-12 2002-10-29 Trw Inc. Apparatus and method for controlling secure communications between peripheral components on computer buses connected by a bridge circuit
US6578140B1 (en) 2000-04-13 2003-06-10 Claude M Policard Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
DK1297446T3 (da) * 2000-07-05 2006-01-30 Ernst & Young Llp Fremgangsmåde og apparat for tilvejebringelse af computertjenester
CA2454828A1 (en) * 2001-07-24 2003-02-06 Theresa Eileen Phillips Network security architecture
WO2003036914A1 (en) * 2001-10-25 2003-05-01 General Dynamics Government Systems Corporation A method and system for modeling, analysis and display of network security events

Also Published As

Publication number Publication date
JP2007534039A (ja) 2007-11-22
NZ546112A (en) 2008-04-30
EP1661290A4 (en) 2008-01-16
AU2004303330A1 (en) 2005-03-24
ZA200602534B (en) 2007-05-30
CN1846393A (zh) 2006-10-11
EP1661290A1 (en) 2006-05-31
US20040111578A1 (en) 2004-06-10
US7281266B2 (en) 2007-10-09
US7146640B2 (en) 2006-12-05
MXPA06002447A (es) 2006-06-20
US20070044148A1 (en) 2007-02-22
WO2005027402A1 (en) 2005-03-24
CA2537582A1 (en) 2005-03-24

Similar Documents

Publication Publication Date Title
BRPI0414155A (pt) sistema de segurança de internet de computador pessoal
Hussain et al. A security framework for mHealth apps on Android platform
TW201346560A (zh) 硬體強制記憶體存取許可
BRPI0404095A (pt) Entrada e saìda segura para um agente confiável em um sistema com um ambiente de execução de alta segurança
BRPI0511151A (pt) sistema e método para o gerenciamento de acesso a conteúdo protegido por aplicações não-confiáveis
JP2022533359A (ja) モノリシック・カーネルのための制限された実行環境
BRPI0406385A (pt) Sistema e método para resolução de nome
Hawkins et al. A systematic approach for developing software safety arguments
Watson et al. Balancing disruption and deployability in the CHERI instruction-set architecture (ISA)
Svartvik ‘East is East, and West is West’: The Concept of Torah in Paul and Mark
CN106096429A (zh) 基于内存隔离的安全架构处理方法及处理器
Yang et al. Endoprocess: Programmable and extensible subprocess isolation
KR101708014B1 (ko) 정형 및 비정형 데이터를 포함하는 빅데이터에서의 개인정보 익명화 관리 시스템
Nawaz Khan et al. Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware
Baker et al. Building a corpus of spoken sylheti.
Gasbarri South Africa’s diplomacy of conflict resolution in the post-apartheid era: the case of the DRC
Wang et al. Intel SYSRET Privilege Escalation Vulnerability Analysis
Parker et al. Ultra-high-definition video transmission for mission-critical communication systems applications
Knowles et al. The Dark Side of Data Sharing: Considering the Ethicality of Data Brokering within the Context of Health
Prakash CAREER: Binary-Level Security via ABI-Centric Semantic Inference
Haupt Treaty-specific conferences, including review conferences
Sweeney A'credible'response to persons fleeing armed conflict
Criswell TWC: Small: Thwarting Kernel-Level Malware with Secure Virtual Architecture
Payer CRII: SaTC: Lockdown: Guarded Control-Flow and Data Privacy for Sensitive Data
BR112022024916A2 (pt) Sistema e método de controle de acesso para isolar domínios de segurança mutuamente desconfiados

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE AS 7A E 8A ANUIDADES.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2159 DE 22/05/2012.