$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and structure for securing access to a computer system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0341302 (1994-11-16)
발명자 / 주소
  • Watson Bruce W. (Norcross GA) Lee R. Jeff (Lawrenceville GA)
출원인 / 주소
  • National Semiconductor Corporation (Santa Clara CA 02)
인용정보 피인용 횟수 : 162  인용 특허 : 0

초록

Tests are performed prior to or during the boot operation to determine whether files are corrupted. This may indicate the presence of a virus. If a potential error is detected, boot is halted, allowing the user to boot from uncorrupted files. In another embodiment, an uniquely formatted floppy diske

대표청구항

A method for controlling access to computer system during a boot operation comprising the steps of: receiving user authorization information from a prospective user; determining if said user authorization information is valid; if said user authorization information is valid, allowing said prospectiv

이 특허를 인용한 특허 (162)

  1. van der Made, Peter A. J., Analytical virtual machine.
  2. van der Made,Peter A. J., Analytical virtual machine.
  3. James Richard Reinert ; Gary Scott Stevens ; Michael William Rogers, Apparatus and method for remote virus diagnosis and repair.
  4. Choi,Chun Geun, Apparatus and method for setting an ID code using a microcomputer in a display device.
  5. Killian, Thomas; Kormann, David; Rice, Christopher; Schryer, Norm, Apparatus for blocking malware originating inside and outside an operating system.
  6. Larvoire Jean-Fran.cedilla.ois,FRX ; Ribollet Thierry,FRX ; Hays Bertrand,FRX, Appratus for preventing changes of computer configuration data by unauthorized users.
  7. Komai, Hiroyuki, Authentication information processing method.
  8. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Authentication mechanisms to enable sharing personal information via a networked computer system.
  9. McCoy, Donald; Parsons, Donald; Edwards, Judith; Block, James, Automated banking machine bootable media authentication.
  10. Harding, Matthew C.; Hawkins, Peter A., Automatic replacement of corrupted BIOS image.
  11. Arnold William Carlisle ; Bruck Jehoshua ; Kephart Jeffrey Owen ; Sorkin Gregory Bret ; White Steve Richard ; Chess David Michael ; Cox Charles Edwin ; Flickner Myron Dale, Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing.
  12. McCoy, Donald; Parsons, Donald; Edwards, Judith; Block, James, Banking system controlled responsive to data bearing records.
  13. Rozenberg Roman ; Rozenberg Tatyana, Biometric scanning aperture for a computer input device.
  14. Jurij Jakovlevich Kharon RU; Roman Rozenberg, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  15. Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  16. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Cloud-based application whitelisting.
  17. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  18. Fang, Ko-Cheng, Computer data protecting method.
  19. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  20. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  21. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  22. Ryu Chang-Hyun,KRX, Computer security system having a password recovery function which displays a password upon the input of an identification number.
  23. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Computer system lock-down.
  24. Stivers,Daniel E.; Masters,Timothy S., Computer system with monitor on/off functionality.
  25. Welborn, Kimberly Joyce; Welborn, Christopher Michael, Computer virus avoidance system and mechanism.
  26. Ruff, Eric J.; Raymond, Robert S., Computer virus detection and removal.
  27. Hypponen, Mikko; Hypponen, Ari; Kuisha, Mikko; Rahu, Urmas; Siilasmaa, Risto, Computer virus screening.
  28. Morgan, Jeffrey A.; Jennings, C. Thomas; Olson, Larold L.; Pires, Luiz S.; Stubbs, Daniel P., Computing environment having secure storage device.
  29. Platt, David C., Cryptographically signed filesystem.
  30. Platt,David C., Cryptographically signed filesystem.
  31. Goren Ofer A. ; Ruival Juan C., Data and access protection system for computers.
  32. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Data quality assurance.
  33. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  34. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  35. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  36. Swamy N. Deepak ; McMahan Robert L., Detachable I/O device for computer data security.
  37. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Detecting corrupted data before transmission to a client.
  38. Uchida,Morihiko; Suzuki,Tetsuya; Kagawa,Yoshikazu; Handa,Hiroto, Disk drive device.
  39. Robert G. Atkinson ; James W. Kelly, Jr. ; Bryan W. Tuttle ; Robert M. Price ; Robert P. Reichel, Embedding certifications in executable files for network transmission.
  40. Harrison Colin George, Enhanced data privacy for portable computers.
  41. McLaughlin Charles Andrew ; Kitamorn Alongkorn ; Nulu Sayileela, Error collection coordination for software-readable and non-software readable fault isolation registers in a computer system.
  42. Cousins, William R.; Badias, Franz; Means, William S., Event occurrence detection method and apparatus.
  43. Morrow, James W.; McAllister, Larence; Dubner, Robert; Carman, David, Gaming device verification system and method using a file allocation structure.
  44. Dolgunov, Boris; Elhamias, Reuven; Cohen, Ehud, Host device and method for securely booting the host device with operating system code loaded from a storage device.
  45. Le, Franck; Faccin, Stefano M, IPv6 address ownership solution based on zero-knowledge identification protocols or based on one time password.
  46. Okamoto, Akira; Oshima, Akihide; Shimoichi, Eiji; Inakawa, Yuriko; Nishi, Eiji; Tatsuma, Noriyuki; Ishimura, Takanari; Yoda, Yoshiyuki; Kurokawa, Masaki; Itoh, Atsuhiro; Harada, Fumio, Image forming device, image forming system and computer readable medium with state of security level notification.
  47. Rozenberg Roman, Index finger biometric aperture for a mouse.
  48. Diamant Erez,ILX ; Prescher Amir,ILX, Information security method and apparatus.
  49. Diamant Erez,ILX ; Prescher Amir,ILX, Information security method and apparatus.
  50. William N. Rallis ; Yaacov Behar, Infrared type security system for a computer.
  51. Rothman,Michael A.; Zimmer,Vincent J., Input/output scanning.
  52. Barkelew, Jonathan Bret, Invalid setup recovery.
  53. Grecsek Matthew T., Managing the risk of executing a software process using a capabilities assessment and a policy.
  54. Helbig ; Sr. Walter A., Method and apparatus enhancing computer system security.
  55. Hammond, Nicolas J., Method and apparatus for auditing network security.
  56. Ellenberger Hans (Beundenweg 33 ; CH-3360 Herzogenbuchsee CHX), Method and apparatus for detecting a computer virus on a computer.
  57. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  58. Helbig ; Sr. Walter A. ; Ackerman ; III William H., Method and apparatus for enhancing computer system security.
  59. Helbig, Sr., Walter A., Method and apparatus for enhancing computer system security.
  60. Sidie Robert J., Method and apparatus for identifying a computer through BIOS scanning.
  61. Sidie, Robert J., Method and apparatus for identifying a computer through bios scanning.
  62. Caccavale, Frank S, Method and apparatus for load balancing of distributed processing units based on performance metrics.
  63. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  64. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  65. Shakkarwar,Rajesh G., Method and apparatus for protection of computer assets from unauthorized access.
  66. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  67. Lum,Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  68. Heredia Rafael, Method and apparatus for reporting unauthorized attempt to release a portable computer from a docking station.
  69. Marcelais, Michael R.; Hill, Brian T.; LeVine, Eric; Greenberg, Steven Miles, Method and computer system for detecting and correcting a failure in a computer application program during startup.
  70. Deinhart Klaus,DEX ; Gligor Virgil ; Lingenfelder Christoph,DEX ; Lorenz Sven,DEX, Method and system for advanced role-based access control in distributed and centralized computer systems.
  71. Charles Andrew McLaughlin ; Alongkorn Kitamorn, Method and system for check stop error handling.
  72. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  73. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  74. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  75. McLaughlin, Charles Andrew; Kitamorn, Alongkorn, Method and system for fault isolation for PCI bus errors.
  76. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  77. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  78. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  79. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  80. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for online document collaboration.
  81. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  82. Bhogal, Kulvir Singh; Boss, Gregory Jensen; Hamilton, II, Rick Allen; Polozoff, Alexandre, Method and system for protecting the security of an open file in a computing environment.
  83. McLaughlin Charles Andrew ; Kitamorn Alongkorn ; Mehta Chet ; Langford John Steven, Method and system for reboot recovery.
  84. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for recording and using a traveler's travel preferences.
  85. Mehta Chet ; Clark Ronald Sterling ; Thorson Donald LeRoy, Method and system for surveillance of computer system operations.
  86. Dias Daniel Manuel ; King Richard Pervin ; Leff Avraham, Method for monitoring and recovery of subsystems in a distributed/clustered system.
  87. Halpin, John D.; Russell, Joseph P.; Sobieski, Scott M., Method to deter softwear tampering using interlinked sub-processes.
  88. Jones-McFadden, Alicia C., Mobile device data security system.
  89. Hoffberg, Steven M., Multifactorial optimization system and method.
  90. Dirie Herzi, Network controlled computer system security.
  91. Kondo Mariko (Yokohama JPX) Mori Yumiko (Yokohama JPX) Tsutsumi Toshiyuki (Yokohama JPX), Network management system for detecting and displaying a security hole.
  92. Terada Masato,JPX ; Yoshida Kenichi,JPX ; Kayashima Makoto,JPX, Network system having external/internal audit system for computer security.
  93. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  94. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  95. William N. Rallis ; Yaacov Behar, Notebook security system using infrared key.
  96. Van Brabant, Luc, On-access and on-demand distributed virus scanning.
  97. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online electronic health record.
  98. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  99. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  100. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online personal library.
  101. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  102. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information and access of information stored therein.
  103. Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
  104. Zimmer, Vincent J.; Rothman, Michael A., Pre-boot firmware based virus scanner.
  105. Zimmer, Vincent J.; Rothman, Michael A., Pre-boot firmware based virus scanner.
  106. Zimmer, Vincent J.; Rothman, Michael A., Pre-boot firmware based virus scanner.
  107. Zimmer, Vincent J.; Rothman, Michael A., Pre-boot firmware based virus scanner.
  108. Braithwaite David G. ; Bruderer Clark C. ; Allen Gregory M. ; Thompson David A., Read/write protect scheme for a disk cartridge and drive.
  109. Braithwaite David G. ; Bruderer Clark C. ; Allen Gregory M. ; Thompson David A., Read/write protect scheme for a disk cartridge and drive.
  110. Braithwaite, David G.; Bruderer, Clark C.; Allen, Gregory M.; Thompson, David A., Read/write protect scheme for a disk cartridge and drive.
  111. Toomey, Christopher, Restricting the volume of outbound electronic messages originated by a single entity.
  112. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Restricting use of a digital item stored in a client computer by sending an instruction from a server computer via a network.
  113. Sonobe Masayuki,JPX, Secret information protection system.
  114. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  115. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  116. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  117. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  118. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  119. Angelo Michael F. ; Miller Craig A. ; Wooten David R., Secure updating of non-volatile memory.
  120. Angelo Michael F. ; Miller Craig A. ; Wooten David R., Secure updating of non-volatile memory.
  121. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  122. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  123. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  124. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  125. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  126. Sekiguchi, Minoru, Security monitoring apparatus based on access log and method thereof.
  127. Diamant Erez,ILX ; Prescher Amir,ILX ; Brachel Nir,ILX ; Netzer Lior,ILX, Security switching device.
  128. Hearn, Michael Alfred; Kabzinski, Richard, Security system and method for computers.
  129. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  130. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  131. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  132. Yavatkar, Raj; Crouch, Alan; Durham, David M., Self-isolating and self-healing networked devices.
  133. Dover, Lance Walker, Self-measuring nonvolatile memory device systems and methods.
  134. Dover, Lance Walker, Self-measuring nonvolatile memory device systems and methods.
  135. Fiveash William Alton ; Wang Xinya ; Wenzel Christiaan Blake ; Wilson Jacqueline Hegedus ; Wisham Opral Vanan, Simplified method of configuring internet protocol security tunnels.
  136. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  137. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  138. Hoffberg, Steven M., System and method for determining contingent relevance.
  139. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  140. Chen,Jian An; Huang,Chih Yuan, System and method for loading a valid image from one of a plurality of images into a memory of a network device.
  141. Cheston,Richard Wayne; Dayan,Richard Alan, System and method for migration of a version of a bootable program.
  142. Sathe, Satish; Peresse, Perrine; Rudra, Anjan; Chudgar, Keyur, System and method for partitioning resources in a system-on-chip (SoC).
  143. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  144. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  145. Terry, Robert F., System and method for real time monitoring and control of networked computers.
  146. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  147. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  148. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  149. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  150. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  151. Halpin, John D.; Russell, Joseph P.; Sobieski, Scott M., System and method to deter software tampering using interlinked sub-processes.
  152. Jones-McFadden, Alicia C.; Johansen, Joseph Neil, System for assessing network authentication requirements based on situational instance.
  153. Jones-McFadden, Alicia C.; Johansen, Joseph Neil, System for escalating security protocol requirements.
  154. Rigstad, Peter M.; Yoon, John Y.; Farahar, Mark; Subbiah, Barani; Thomsen, Brant D.; Richmond, David E.; Semel, Vered Maor; Bryner, Earl, System for providing firewall capabilities to a communication device.
  155. Jones-McFadden, Alicia C., System for remotely controlling access to a mobile device.
  156. Durham,David M.; Sahita,Ravi; Rajagopal,Priya; Kardach,James; Hahn,Scott; Yavatkar,Raj, Techniques for self-isolation of networked devices.
  157. Barrett, Joseph G.; Muehl, Mark J.; Palino, Todd M., Throttling electronic communications from one or more senders.
  158. Wasmund, Michael, User authentication for detecting and controlling fraudulent login behavior.
  159. Odom, Gary, User selectable signature.
  160. Caccavale,Frank S., Using a virus checker in one file server to check for viruses in another file server.
  161. Cowlard James,GB3, Virus protection in computer systems.
  162. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로