$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Networked workstation intrusion detection system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0907523 (1997-08-08)
발명자 / 주소
  • Trostle Jonathan
출원인 / 주소
  • Novell, Inc.
대리인 / 주소
    Cesari & McKenna, LLP
인용정보 피인용 횟수 : 380  인용 특허 : 19

초록

During pre-boot (i.e., the period of time prior to initiating operation of the workstation operating system), a networked workstation performs an intrusion detection hashing function on selected workstation executable program(s). A computed hash value calculated by the hashing operation is compared

대표청구항

[ What is claimed is:] [8.] A network computer workstation which checks for illicit changes to executable programs in the workstation prior to execution of an operating system by the workstation, the workstation comprising:means for receiving a trusted hash value and for receiving a list of selected

이 특허에 인용된 특허 (19)

  1. Bealkowski Richard (Delray Beach FL) Blackledge ; Jr. John W. (Boca Raton FL) Cronk Doyle S. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Kinnear Scott G. (Boca Raton FL) Kovach George D. (Boca R, Bios load for a personal computer system having a removable processor card.
  2. Kozaki Mitsuyoshi,JPX ; Yoshida Kiyohiko,JPX, Computer network having os-versions management table to initiate network boot process via master computer.
  3. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  4. Arato G. Peter (Etobicoke CAX), Device for controlling access to computer peripherals.
  5. Aiello William A. (Madison NJ) Venkatesan Ramarathnam (Morristown NJ), Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random funct.
  6. Dayan Richard A. (Boca Raton FL) Le Kimthanh D. (Boynton Beach FL) Mittelstedt Matthew T. (Lantana FL) Newman Palmer E. (Boca Raton FL) Randall Dave L. (Pompano Beach FL) Ruotolo Lisa A. (Lake Worth , LAN station personal computer system with controlled data access for normal and unauthorized users and method.
  7. Wallis Graham Derek,GBX, Load balancing of connections to parallel servers.
  8. Boccon-Gibod Philippe (Eybens FRX), Method and a device for booting a computer at a programmed time.
  9. Bealkowski Richard (Delray Beach FL) Geisler Douglas R. (Boca Raton FL) Turner Michael R. (Boca Raton FL), Method and apparatus for an automated dynamic load of an ABIOS device support layer in a computer system.
  10. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  11. Chang Steve M. (Rancho Palos Verdes CA), Method and apparatus for controlling network and workstation access prior to workstation boot.
  12. Rose David K. (800 E. Ocean Blvd. Apt. #1410 Long Beach CA 90802), Method and apparatus for validating authorization to access information in an information processing system.
  13. Sjooquist Peter Bertil Tom,SEX, Method and device for preventing unauthorized access to a computer system.
  14. Dunn John C. (Redmond WA) Foltz Forrest C. (Woodinville WA), Method and system for transitioning the network mode of a workstation.
  15. Malcolm Peter Bryan (Lewdown GBX), Method of replacing the identity of a file with another as part of a file open request in a computer system.
  16. Leith Victor S. (Stanley NC) Stevens James V. (Huntersville NC), Secure communications system for remotely located computers.
  17. Lipner Steven B. (Wellesley MA) Gasser Morrie (Saugus MA) Lampson Butler W. (Cambridge MA), Secure user authentication from personal computer.
  18. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  19. Blackledge ; Jr. John W. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Moeller Dennis L. (Boca Raton FL) Newman Palmer E. (Boca Raton FL) Zubay Kenneth J. P. (Boca Raton FL), Trusted personal computer system with identification.

이 특허를 인용한 특허 (380)

  1. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  2. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  3. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  4. Dapp,Michael C., Active intrusion resistant environment of layered object and compartment keys (airelock).
  5. Epstein, Michael A., Administration and utilization of private keys in a networked environment.
  6. van der Made, Peter A. J., Analytical virtual machine.
  7. van der Made,Peter A. J., Analytical virtual machine.
  8. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  9. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  10. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  11. Das Purkayastha,Arindam; Pearson,Siani Lynne; Chen,Liqun, Apparatus and method for establishing trust.
  12. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  13. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  14. Abhay K. Gupta, Application computing environment.
  15. Grawrock,David W., Attestation using both fixed token and portable token.
  16. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  17. Carter, Earl T., Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system.
  18. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  19. Neuhaus, Scott E.; Swessel, Scott D.; Senkevitch, Alexander A., Business to business network management event detection and response system and method.
  20. Neuhaus, Scott E.; Swessel, Scott D.; Senkevitch, Alexander A., Business to business network management event detection and response system and method.
  21. Brennan, Todd, Centralized timed analysis in a network security system.
  22. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  23. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  24. England, Paul, Client-side boot domains and boot rules.
  25. England, Paul, Client-side boot domains and boot rules.
  26. England,Paul, Client-side boot domains and boot rules.
  27. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  28. Grawrock,David W., Connecting a virtual token to a physical token.
  29. Brennan, Todd, Content extractor and analysis system.
  30. Smith, Ned M.; Cahill, Conor, Continuous multi-factor authentication.
  31. Smith, Ned M.; Cahill, Conor, Continuous multi-factor authentication.
  32. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  33. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  34. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  35. Grawrock,David W., Creation and distribution of a secret value between two devices.
  36. Platt, David C., Cryptographically signed filesystem.
  37. Platt,David C., Cryptographically signed filesystem.
  38. Smeets,Ben, Data integrity mechanisms for static and dynamic data.
  39. Ishii,Makoto, Data receiving method and data receiving unit therefor.
  40. Hori, Yoshihiro; Tada, Kenichiro; Hirai, Tatsuya; Tsuru, Masafumi; Hasebe, Takayuki, Data storage device capable of storing multiple sets of history information on input/output processing of security data without duplication.
  41. Hori, Yoshihiro; Ohno, Ryoji; Ohishi, Takeo; Tozaki, Akihiro; Tada, Kenichiro; Hirai, Tatsuya; Tsuru, Masafumi; Hasebe, Takayuki, Data storing device for classified data.
  42. Satish, Sourabh; Hernacki, Brian, Detecting reboot events to enable NAC reassessment.
  43. Grawrock,David W., Device and method for disabling an override hardware pin assertion.
  44. Roesch, Martin Frederick; Novak, Judy Hollis; Sturges, Steven, Device, system and method for analysis of segments in a transmission control protocol (TCP) session.
  45. Sturges, Steven; Novak, Judy Hollis, Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session.
  46. Hannah, Eric C., Digital content protection using a secure booting method and apparatus.
  47. Robert E. Gleichauf ; Gerald S Lathem ; Scott V. Waddell, Domain mapping method and system.
  48. Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Dynamic intrusion detection for computer systems.
  49. Waldspurger, Carl A.; Agesen, Ole; Chen, Xiaoxin; Zedlewski, John R.; Garfinkel, Tal, Dynamic verification of validity of executable code.
  50. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  51. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  52. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  53. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  54. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  55. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  56. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  57. Dapp,Michael C.; Lett,Eric C.; Ng,Sai Lun, Hardware accelerated validating parser.
  58. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  59. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  60. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  61. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Hierarchy-based method and apparatus for detecting attacks on a computer system.
  62. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  63. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  64. Yadav, Satyendra, Integrated network intrusion detection.
  65. Yadav, Satyendra, Integrated network intrusion detection.
  66. Yadav,Satyendra, Integrated network intrusion detection.
  67. Carbajal, John M.; Dittert, Eric R.; Drews, Paul C., Interface for ensuring system boot image integrity and authenticity.
  68. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  69. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  70. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  71. Doherty, James M.; Adams, Thomas Lee; Mueller, Stephen Mark, Intrusion detection.
  72. Dapp,Michael C.; Lett,Eric C., Intrusion detection accelerator.
  73. Shanklin, Steven D.; Bernhard, Thomas E.; Lathem, Gerald S., Intrusion detection signature analysis using regular expressions and logical operators.
  74. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  75. Daniel M. Teal, Intrusion detection system and method having dynamically loaded signatures.
  76. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  77. Gustafson, Eric; Rittermann, Brian P., Intrusion event correlation with network discovery information.
  78. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  79. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  80. Kitariev, Dimitri; Shippee, Geoffrey; Varadarajan, Srinivas, Lockstep mechanism to ensure security in hardware at power-up.
  81. Kim,Young Il, MAC address-based communication restricting method.
  82. Foster, David; Bonsall, Russ; Caddel, Jeff; Dormann, William; Perryman, Laura; Peeke-Vout, John, Maintaining a secure computing device in a test taking environment.
  83. Foster, David; Bonsall, Russ; Caddell, Jeff; Dorman, William; Perryman, Laura; Peeke-Vout, John, Maintaining a secure computing device in a test taking environment.
  84. Tuvell, George; Venugopal, Deepak, Malware detection system and method for compressed data on mobile platforms.
  85. Tuvell, George; Lee, Charles, Malware detection system and method for limited access mobile platforms.
  86. Tuvell, George; Venugopal, Deepak, Malware detection system and method for mobile platforms.
  87. Tuvell, George; Venugopal, Deepak; Hu, Guoning, Malware modeling detection system and method for mobile platforms.
  88. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  89. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  90. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  91. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  92. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  93. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  94. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  95. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  96. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  97. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  98. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  99. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  100. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  101. Wu,Shyhtsun Felix; Fei,Aiguo; Gong,Fengmin, Method and apparatus for adaptively classifying network traffic.
  102. Hammond, Nicolas J., Method and apparatus for auditing network security.
  103. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  104. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  105. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  106. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  107. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  108. McGee, William G.; Langford, Glenn C.; Van Oorschot, Paul C., Method and apparatus for controlling program execution and program distribution.
  109. Palaniswamy, Avinash C.; Geiger, Robert L.; Van Peursem, James E., Method and apparatus for designating administrative responsibilities in a mobile communications device.
  110. Fei, Aiguo; Sun, Kai; Gong, Fengmin, Method and apparatus for detecting a distributed denial of service attack.
  111. Gupta, Ramesh M.; Jain, Parveen K.; Amidon, Keith E.; Gong, Fengmin; Vissamsetti, Srikant; Haeffele, Steve M.; Raman, Ananth, Method and apparatus for detecting intrusions on a computer system.
  112. Obrecht, Mark Eric; Alagna, Michael Anthony; Payne, Charles Andrew, Method and apparatus for detecting malicious code in an information handling system.
  113. Obrecht, Mark; Alagna, Michael Tony; Payne, Andy, Method and apparatus for detecting malicious code in an information handling system.
  114. Bu, Zheng; Gong, Fengmin, Method and apparatus for detecting shellcode.
  115. Brannock,Kirk D., Method and apparatus for distributing computer platform firmware across a network.
  116. Kay, James, Method and apparatus for electronic mail filtering.
  117. Kay, James, Method and apparatus for electronic mail filtering.
  118. Kay, James, Method and apparatus for electronic mail filtering.
  119. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  120. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  121. Forrester, Ronald James; Starnes, William Wyatt; Tycksen, Jr., Frank A., Method and apparatus for lifecycle integrity verification of virtual machines.
  122. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  123. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  124. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  125. Murphy,Robert; Woodward,Andrew, Method and apparatus for maintaining a computer system.
  126. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  127. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  128. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  129. Samar, Vipin, Method and apparatus for protecting private information within a database.
  130. Jain,Hemant Kumar, Method and apparatus for rate based denial of service attack detection and prevention.
  131. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  132. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  133. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  134. Cheng, Christine; Won, Brenda; Mohnia, Dheeraj; Nguyen, Ha; Maltzman, Reed; Strack, Isaac; Morin, Noel, Method and apparatus to detect fraudulent activities within a network-based auction facility.
  135. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain.
  136. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain.
  137. Wakayama Hironori,JPX, Method and mechanism for preventing from invading of computer virus and/or hacker.
  138. Gleichauf, Robert E.; Teal, Daniel M.; Wiley, Kevin L., Method and system for adaptive network security using intelligent packet analysis.
  139. Robert E. Gleichauf ; Daniel M. Teal ; Kevin L. Wiley, Method and system for adaptive network security using intelligent packet analysis.
  140. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  141. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  142. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  143. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  144. Chong, Chee-Yee; Gong, Lester J.; Smythe, Erich J., Method and system for assessing attacks on computer networks using Bayesian networks.
  145. Cromer, Daryl C.; Dayan, Richard A., Method and system for authenticated boot operations in a computer system of a networked computing environment.
  146. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  147. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  148. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  149. Rosenan, Avner, Method and system for defending security application in a user's computer.
  150. Charbonneau, Marc, Method and system for detecting a secure state of a computer system.
  151. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  152. Cromer, Daryl Carvis; Dayan, Richard Alan; Kern, Eric Richard; Springfield, Randall Scott; Freeman, Joseph Wayne; Johnson, Robert Duane; Ellison, Brandon Jon, Method and system for disguising a computer system's identity on a network by disguising the system's MAC address.
  153. Kevin J. Ziese, Method and system for dynamically distributing updates in a network.
  154. Ziese,Kevin J., Method and system for dynamically distributing updates in a network.
  155. Shaath, Kamel; Yaqun, Fu; Parthasarathy, Vinay; Jelvis, Alexei; Liyansky, Abel, Method and system for electronic file lifecycle management.
  156. Smith, Ned M.; Goel, Purushottam, Method and system for enterprise network single-sign-on by a manageability engine.
  157. Smith, Ned; Goel, Purushottam, Method and system for enterprise network single-sign-on by a manageability engine.
  158. Alexander, Marc D., Method and system for executing BIOS code in secure multitasking operating environment.
  159. Kay, James, Method and system for filtering electronic messages.
  160. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  161. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  162. Dawson, Jr.,Frank Robertson; Huang,Yen Min; Miller,Brent A.; Singhal,Sandeep K., Method and system for protecting pervasive devices and servers from exchanging viruses.
  163. Troyansky, Lidror, Method and system for protection against information stealing software.
  164. Troyansky, Lidror, Method and system for protection against information stealing software.
  165. Troyansky, Lidror, Method and system for protection against information stealing software.
  166. Troyansky, Lidror, Method and system for protection against information stealing software.
  167. Troyansky, Lidror; Bruckner, Sharon; Hubbard, Daniel Lyle, Method and system for protection against information stealing software.
  168. Troyansky, Lidror; Bruckner, Sharon; Hubbard, Daniel Lyle, Method and system for protection against information stealing software.
  169. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  170. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  171. Ziese, Kevin J., Method and system for providing tamper-resistant executable software.
  172. Rowland, Craig H., Method and system for reducing the false alarm rate of network intrusion detection systems.
  173. Rowland, Craig H.; Rhodes, Aaron L., Method and system for reducing the false alarm rate of network intrusion detection systems.
  174. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and system to issue trust score certificates for networked devices using a trust scoring service.
  175. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  176. Kay, James, Method and systems for collecting addresses for remotely accessible information sources.
  177. Swiler,Laura Painton; Phillips,Cynthia A., Method and tool for network vulnerability analysis.
  178. Derek L. Davis ; Pranav Mehta, Method for BIOS authentication prior to BIOS execution.
  179. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  180. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  181. Sormunen,Toni; Ronkka,Risto; Kiiveri,Antti, Method for securing an electronic device, a security system and an electronic device.
  182. Brickell,Ernie F., Method of confirming a secure key exchange.
  183. Raghunandan, Hulikunta Prahlad, Method to check e-mail count at boot time in personal computer systems.
  184. Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method to control access between network endpoints based on trust scores calculated from information system component analysis.
  185. Bleckmann,David Maurits; Starnes,William Wyatt; Andersen,Bradley Douglas, Method to control access between network endpoints based on trust scores calculated from information system component analysis.
  186. Bleckmann,David Maurits; Starnes,William Wyatt; Andersen,Bradley Douglas, Method to control access between network endpoints based on trust scores calculated from information system component analysis.
  187. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method to verify the integrity of components on a trusted platform using integrity database services.
  188. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  189. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  190. Alagna,Michael Tony; Obrecht,Mark; Payne,Andy; Norwood,Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  191. Alagna,Michael Anthony; Obrecht,Mark Eric; Payne,Charles Andrew; Norwood,Peter, Method, system and computer program product for security in a global computer network transaction.
  192. Alagna, Michael Anthony; Payne, Charles Andrew; Loiodice, Luca; Smith, Todd Allen, Method, system, and computer program product for security within a global computer network.
  193. Albrecht, Mark; Wildgrube, Frank, Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage.
  194. Smith, Ned M.; Ben-Shalom, Omer; Nayshtut, Alex, Methods and apparatus to securely share data.
  195. Smith, Ned M.; Ben-Shalom, Omer; Nayshtut, Alex, Methods and apparatus to securely share data.
  196. Sierra, Giampiero M.; Evans, Christopher A., Methods and arrangements for providing a mark-up language based graphical user interface for user identification to an operating system.
  197. Sierra, Giampiero M.; Evans, Christopher A., Methods and arrangements for providing a mark-up language based graphical user interface for user identification to an operating system.
  198. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  199. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  200. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  201. Radatti, Peter V., Methods, apparatus and articles of manufacture for computer file integrity and baseline maintenance.
  202. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  203. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  204. Grawrock,David W., Multi-token seal and unseal.
  205. Baker, Stephen M., Multilayered intrusion detection system and method.
  206. Wu,Handong; Freedman,Jerome; Ivory,Christopher J., Network intrusion detection and analysis system and method.
  207. Bernhard, Thomas E.; Shanklin, Steven D.; Lathem, Gerald S., Network intrusion detection signature analysis using decision graphs.
  208. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  209. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  210. Crisan Adrian ; Jones Brant W., Networked computer security system.
  211. Tuvell, George; Venugopal, Deepak; Pfefferle, Matthew, Non-signature malware detection system and method for mobile platforms.
  212. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  213. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  214. Perryman, Laura; Walton, Eric; Logan, David; Collins, Michael, Optimized data stream upload.
  215. Perryman, Laura; Walton, Eric; Logan, David; Collins, Michael, Optimized data stream upload.
  216. Perryman, Laura; Walton, Eric; Logan, David; Collins, Michael, Optimized data stream upload.
  217. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, III, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  218. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kägi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  219. Cromer, Daryl Carvis; Davis, Mark Charles; Locker, Howard Jeffrey; Springfield, Randall Scott, Packet filtering in a NIC to control antidote loading.
  220. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  221. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  222. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  223. Trostle, Jonathan T., Password based protocol for secure communications.
  224. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  225. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  226. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  227. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  228. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  229. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  230. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  231. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  232. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  233. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  234. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  235. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  236. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  237. Kameyama,Shin; Tarui,Toshiaki; Yoshimura,Yutaka, Processing takeover method in multiple computer system.
  238. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  239. Dorman, William, Proctored performance analysis.
  240. Laczko, Sr., Frank L.; Ferguson, Edward, Program debugging system for secure computing device having secure and non-secure modes.
  241. Khoruzhenko, Eugene; Mortensen, James Leonard, Promoting a secure operating environment through oversight and provisioning of BIOS activity.
  242. Smith, Ned M.; Moore, Victoria C.; Grobman, Steven L., Protected device management.
  243. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  244. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Protocol-parsing state machine and method of using same.
  245. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  246. Dapp,Michael C., Real time active network compartmentalization.
  247. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  248. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  249. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  250. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  251. Rittermann, Brian, Real-time user awareness for a computer network.
  252. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  253. Feigen, Ronald Glen; Perona, Richard Allen; Lynn, James T.; Comer, Erwin Perry, Remote system integrity verification.
  254. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  255. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  256. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  257. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  258. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  259. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  260. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  261. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  262. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  263. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  264. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  265. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  266. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  267. Jain, Hemant Kumar, Scalable inline behavioral DDOS attack mitigation.
  268. Jain, Hemant Kumar, Scalable inline behavioral DDoS attack mitigation.
  269. Raziel, Michael; Bhargav-Spantzel, Abhilasha; Khosravi, Hormuzd M., Secure authentication protocol systems and methods.
  270. Raziel, Michael; Bhargav-Spantzel, Abhilasha; Khosravi, Hormuzd M., Secure authentication protocol systems and methods.
  271. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  272. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  273. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  274. McEwan,William Alexander, Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server.
  275. Hay, Andrew Charles David; Pearson, Siani Lynne, Security apparatus.
  276. Chisholm, Gordon; Horgan, Kevin; Benn, Campbell, Self-service terminal (SST) secure boot.
  277. Thomas, Andrew J.; Ray, Kenneth D.; Harris, Mark D., Server drift monitoring.
  278. Grawrock,David W.; Poisner,David I., Sleep protection.
  279. Sturges, Steven; Norton, Marc, Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing.
  280. Hori, Yoshihiro; Hirai, Tatsuya, Storage apparatus that can properly recommence input and output of classified data.
  281. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  282. Hubbard, Daniel Lyle, System and method for adding context to prevent data leakage over a computer network.
  283. Hubbard, Daniel Lyle, System and method for adding context to prevent data leakage over a computer network.
  284. Troyansky, Lidror, System and method for analysis of electronic information dissemination events.
  285. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  286. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  287. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  288. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  289. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  290. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  291. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  292. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  293. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  294. Beakley, Jonathan G., System and method for consolidating and sorting event data.
  295. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  296. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  297. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  298. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  299. Bleichenbacher,Daniel; Jakobsson,Bjorn M., System and method for exacting a system resource access cost.
  300. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  301. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  302. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  303. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  304. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  305. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  306. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  307. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  308. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  309. Bruno, Mark; Cowings, David; Jensen, Sanford; Morss, Dylan; Schneider, Ken, System and method for filtering fraudulent email messages.
  310. Cowings, David; Hoogstrate, David; Jensen, Sandy; Medlar, Art; Schneider, Ken, System and method for filtering spam messages utilizing URL filtering module.
  311. Smith, Christopher T.; Bleckmann, David M., System and method for identifying software changes.
  312. Olney, Matthew; Mullen, Patrick; Grenier, Lurene; Houghton, Nigel; Pentney, Ryan, System and method for near-real time network attack detection, and system and method for unified detection via detection routing.
  313. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  314. Roesch, Martin Frederick, System and method for real time data awareness.
  315. Roesch, Martin Frederick, System and method for real time data awareness.
  316. Roesch, Martin Frederick, System and method for real time data awareness.
  317. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  318. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  319. Vogel, III, William Andrew; Baker, Andrew, System and method for resolving operating system or service identity conflicts.
  320. Gleichauf Robert ; Shanklin Steven ; Waddell Scott ; Ziese Kevin, System and method for rules-driven multi-phase network vulnerability assessment.
  321. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  322. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  323. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  324. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  325. Paul C. Drews, System and method for verifying the integrity and authorization of software before execution in a local platform.
  326. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  327. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  328. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  329. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  330. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  331. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  332. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  333. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  334. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  335. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  336. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  337. Zimmer, Vincent; Kumar, Mohan; Natu, Mahesh; Yao, Jiewen; Long, Qin; Cui, Liang, System and method to secure boot both UEFI and legacy option ROM's with common policy engine.
  338. Raghavan,Kartik N.; Dadzie,Joseph G., System and related methods for automatically configuring a computing system.
  339. Kashyap, Rahul Chander, System, method and computer program product for detecting encoded shellcode in network traffic.
  340. Stolfo, Salvatore J.; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael E.; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  341. Stolfo, Salvatore J.; Malkin, Tal; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  342. Stolfo, Salvatore J.; Malkin, Tal; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  343. Stolfo, Salvatore J; Malkin, Tal; Keromytis, Angelos D; Misra, Vishal; Locasto, Michael; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  344. Stolfo, Salvatore J; Malkin, Tal; Keromytis, Angelos D; Misra, Vishal; Locasto, Michael; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  345. Fang, Michael Yu, Systems and methods for detecting undesirable network traffic content.
  346. Fang, Michael Yu, Systems and methods for detecting undesirable network traffic content.
  347. Roesch, Martin; Dempster, Ronald A.; Novak, Judy, Systems and methods for determining characteristics of a network.
  348. Roesch, Martin; Vogel, III, William Andrew; Watchinski, Matt, Systems and methods for determining characteristics of a network and analyzing vulnerabilities.
  349. Roesch, Martin; Dempster, Ronald A.; Baker, Andrew; Gustafson, Eric, Systems and methods for determining characteristics of a network and enforcing policy.
  350. Roesch, Martin; Dempster, Ronald A., Systems and methods for determining characteristics of a network based on flow analysis.
  351. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  352. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  353. Roesch, Martin; Dempster, Ronald A., Systems and methods for identifying the services of a network.
  354. Vogel, III, William A.; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  355. Vogel, III, William Andrew; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  356. Sibert, W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  357. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  358. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  359. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  360. Eldar, Avigdor; Sharoni, Itamar; Mendelson, Tsippy; Blumenthal, Uri, Techniques for password attack mitigation.
  361. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  362. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  363. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  364. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  365. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  366. Wiseman,Willard M.; Grawrock,David W., Trusted platform apparatus, system, and method.
  367. Grawrock, David, Trusted platform module for generating sealed data.
  368. Poisner,David I., Trusted system clock.
  369. Schell Roger R. ; Hale Douglas Lavell ; Wiseman Willard Monten ; Anderson James P., Trusted workstation in a networked client/server computing system.
  370. Jain, Hemant Kumar, Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution.
  371. Morais, Dinarte; Lange, Jon; Simon, Daniel R.; Chen, Ling Tony; Benaloh, Josh D., Use of hashing in a secure boot loader.
  372. Morais, Dinarte; Lange, Jon; Simon, Daniel R.; Chen, Ling Tony; Benaloh, Josh D., Use of hashing in a secure boot loader.
  373. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  374. Levin Stuart Z. ; Bluestein Leo I., Use of two-way cable transmissions to augment the security of the secure electronic transaction protocol.
  375. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  376. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  377. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Virtual intrusion detection system and method of using same.
  378. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  379. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  380. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로