$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for protecting data files on a computer from virus infection

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/16
출원번호 US-0797485 (1997-02-06)
발명자 / 주소
  • Walsh James E.
  • Altberg Ebbe H. A.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Jones & Askew
인용정보 피인용 횟수 : 267  인용 특허 : 3

초록

Protection of data files on a computer system from infection or damage by a computer virus. A virus protection system can detect either an external or internal open file event for a file maintained on a local or remote computer. Typically, the protection system is implemented as an internal componen

대표청구항

[ What is claimed is:] [1.] A computer-implemented method for protecting files on a computer from infection by a virus, the files compatible with a program module running on the computer, comprising the steps of:detecting one of an external and internal open file event for a selected one of the file

이 특허에 인용된 특허 (3)

  1. Ellenberger Hans (Beundenweg 33 ; CH-3360 Herzogenbuchsee CHX), Method and apparatus for detecting a computer virus on a computer.
  2. Chambers David A. (3655 Eastwood Cir. Santa Clara CA 95054), Method and apparatus for detection of computer viruses.
  3. Cook Colin (Orem UT), Method of intercepting a global function of a network operating system and calling a monitoring function.

이 특허를 인용한 특허 (267)

  1. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  2. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  3. Krueger,Jonathan P., Apparatus, methods, and computer program products for filtering information.
  4. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  5. Goyal,Pawan; Gylfason,Snorri; Huang,Xun Wilson; Keshav,Srinivasan; Sharma,Rosen, Associating identifiers with virtual processes.
  6. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  7. Kennedy, Mark; Renert, Charles, Blocking replication of e-mail worms.
  8. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  9. Szor, Peter, Cache scanning system and method.
  10. Brennan, Todd, Centralized timed analysis in a network security system.
  11. Nachenberg, Carey; McCorkendale, Bruce, Circumstantial blocking of incoming network traffic containing code.
  12. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Cloud-based application whitelisting.
  13. Gordon, Bryson P.; Schneider, Ryan L., Combined multiple-application alert system and method.
  14. Fries, Robert M.; Somji, Shiraz M., Combining virus checking and replication filtration.
  15. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, Computer cleaning system, method and computer program product.
  16. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Computer system lock-down.
  17. Welborn, Kimberly Joyce; Welborn, Christopher Michael, Computer virus avoidance system and mechanism.
  18. Smithson, Robert Hugh; Woodruff, Andrew Arlin; Rothwell, Anton Christian; Green, Jeffrey Martin; Bolin, Christopher Scott, Computer virus detection.
  19. Smithson,Robert Hugh; Woodruff,Andrew Arlin; Rothwell,Anton Christian; Green,Jeffrey Martin; Bolin,Christopher Scott, Computer virus detection.
  20. Stewart, Walter Mason; Carrera, Marcelo; Hook, Robert G., Computer virus protection.
  21. Stewart, Walter Mason; Carrera, Marcelo; Hook, Robert G., Computer virus protection.
  22. Stewart, Walter Mason; Carrera, Marcelo; Hook, Robert G., Computer virus protection.
  23. Hypponen, Mikko; Hypponen, Ari; Kuisha, Mikko; Rahu, Urmas; Siilasmaa, Risto, Computer virus screening.
  24. Brennan, Todd, Content extractor and analysis system.
  25. Smith, Spencer; Mesropian, Haik, Context-aware real-time computer-protection systems and methods.
  26. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  27. McCall, Colin David; Knox, Richard Ian, Cooling-off period for destructive software.
  28. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  29. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  30. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  31. Szor,Peter, Countering infections to communications modules.
  32. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  33. Barr, Paul C.; Hughes, Aidan T.; Jennings, John P; Morrison, Shane A, Customizing a software application through a patch file.
  34. Akelbein, Jens-Peter; Dietz, Mathias; Haustein, Nils; Schaefer, Rolf; Straus, Ruben, Data management of potentially malicious content.
  35. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Data quality assurance.
  36. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  37. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  38. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  39. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Detecting corrupted data before transmission to a client.
  40. Sobel,William, Detection of malicious computer code.
  41. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  42. Leonard, Arthur C.; Cheung, Daniel M.; Smith, Patrick J.; Poozhiyil, Suraj T., Digital signatures for embedded code.
  43. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  44. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  45. Gylfason, Snorri; Huang, Xun Wilson; Sharma, Rosen, Disambiguating file descriptors.
  46. Goyal, Pawan, Dynamic scheduling of task streams in a multiple-resource system to ensure task stream quality of service.
  47. Keshav, Srinivasan; Sharma, Rosen; Chuang, Shaw, Dynamically modifying the resources of a virtual server.
  48. Keshav, Srinivasan; Sharma, Rosen; Chuang, Shaw, Dynamically modifying the resources of a virtual server.
  49. Keshav,Srinivasan; Sharma,Rosen; Chuang,Shaw, Dynamically modifying the resources of a virtual server.
  50. Costea, Mihai; Field, Scott; Ulagaratchagan, Damodharan, Efficient white listing of user-modifiable files.
  51. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  52. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  53. Newman, Peter; Goyal, Pawan, Enabling a service provider to provide intranet services.
  54. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  55. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  56. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  57. Satish, Sourabh; Hernacki, Brian, Endpoint management using trust rating data.
  58. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  59. Shay, A. David; Berger, Joubert; Leima, Patricia Joy; Alexander, Jonathan; Xuan, Chaoting, Establishing secure TCP/IP communications using embedded IDs.
  60. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  61. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  62. Goyal, Pawan; Keshav, Srinivasan, Fairly partitioning resources while limiting the maximum fair share.
  63. Flint, Barney; Hughes, Michael, Fast virus scanning using session stamping.
  64. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  65. Sasaki,Takaoki; Hatano,Takeshi; Akiyama,Ryota; Kotani,Seigo; Hasebe,Takayuki, File processing unit.
  66. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  67. Beechey, Mostyn J.; Gartside, Paul N.; Stern, Henry C., Game console system, method and computer program product with anti-malware/spyware and parental control capabilities.
  68. Beechey, Mostyn J.; Gartside, Paul N.; Stern, Henry C., Game console system, method and computer program product with anti-malware/spyware and parental control capabilities.
  69. Chi,Darren, Generic detection and elimination of marco viruses.
  70. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  71. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  72. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  73. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  74. Nachenberg,Carey, Heuristic detection of computer viruses.
  75. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  76. Kennedy, Mark, Heuristically detecting spyware/adware registry activity.
  77. Paoli, Jean D.; Mollicone, Laurent; Friend, Ned B.; Kotler, Matthew J.; Lawrence, Thomas R.; Lai, Shuk-Yan; Hendel, Sharma K.; Whitmarsh, Jason, Incrementally designing electronic forms and hierarchical schemas.
  78. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Information processing apparatus, and system having preview control, and method thereof, and storage medium storing program for implementing the method.
  79. Cummins, Charles; Guzak, Chris J.; Tee, Cynthia C.; Kong, Dave; Boyer, Gloria F.; Samji, Mohammed A.; Deutsch, Rebecca J.; Scallen, Stephen J., Initiating software responses based on a hardware action.
  80. Barr, Paul C.; Jennings, John P.; Hughes, Aidan T., Integrated setup for generating customization XML.
  81. Goyal, Pawan; Gylfason, Snorri; Huang, Xun Wilson; Keshav, Srinivasan; Sharma, Rosen, Intercepting I/O multiplexing operations involving cross-domain file descriptor sets.
  82. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  83. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  84. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  85. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  86. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  87. Edery,Yigal Mordechai; Vered,Nimrod Itzhak; Kroll,David R., Malicious mobile code runtime monitoring system and methods.
  88. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  89. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  90. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  91. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  92. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  93. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  94. Rihn,Jennifer; Oliver,Jonathan J., Managing infectious messages as identified by an attachment.
  95. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  96. Ko, Cheuk W., Method and apparatus for detecting a macro computer virus using static analysis.
  97. Obrecht, Mark Eric; Alagna, Michael Anthony; Payne, Charles Andrew, Method and apparatus for detecting malicious code in an information handling system.
  98. Obrecht, Mark; Alagna, Michael Tony; Payne, Andy, Method and apparatus for detecting malicious code in an information handling system.
  99. Williams, Emrys J., Method and apparatus for limiting security attacks via data copied into computer memory.
  100. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  101. Drew, Jeffrey M., Method and apparatus for minimizing file scanning by anti-virus programs.
  102. Shakkarwar,Rajesh G., Method and apparatus for protection of computer assets from unauthorized access.
  103. Swimmer,Morton Gregory; Whalley,Ian Nicholas, Method and apparatus for repairing damage to a computer system using a system rollback mechanism.
  104. Kano, Yoshiki, Method and apparatus for validation of application data on a storage system.
  105. Easttom, William Charles, Method and apparatus of performing data executable integrity verification.
  106. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners.
  107. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners for desktop computers.
  108. Pavlyushchik, Mikhail A., Method and system for antimalware scanning with variable scan settings.
  109. Touboul,Shlomo, Method and system for caching at secure gateways.
  110. Edwards, Jonathan; Turner, Shawna, Method and system for delayed write scanning for detecting computer malwares.
  111. Edwards,Jonathan; Turner,Shawna, Method and system for delayed write scanning for detecting computer malwares.
  112. Gassoway, Paul A., Method and system for detecting malware using a secure operating system mode.
  113. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Method and system for detecting viruses on handheld computers.
  114. Shaath, Kamel; Yaqun, Fu; Parthasarathy, Vinay; Jelvis, Alexei; Liyansky, Abel, Method and system for electronic file lifecycle management.
  115. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Method and system for protecting a computer and a network from hostile downloadables.
  116. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  117. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  118. Krueger, Scott; Goodman, Daniel, Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program.
  119. Berman Eric Robert ; Marl Coyle Brett, Method for controlling an electronic mail preview pane to avoid system disruption.
  120. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  121. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  122. Alagna,Michael Tony; Obrecht,Mark; Payne,Andy; Norwood,Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  123. Alagna,Michael Anthony; Obrecht,Mark Eric; Payne,Charles Andrew; Norwood,Peter, Method, system and computer program product for security in a global computer network transaction.
  124. Alagna, Michael Anthony; Payne, Charles Andrew; Loiodice, Luca; Smith, Todd Allen, Method, system, and computer program product for security within a global computer network.
  125. Penikis, Gunar Mark, Methods and systems for an action-based interface for files and other assets.
  126. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  127. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  128. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  129. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  130. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  131. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  132. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  133. Cooper, Gerald M., Modems that block data transfers during safe mode of operation and related methods.
  134. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  135. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  136. Butt, Alan B., Monitoring function.
  137. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  138. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  139. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  140. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  141. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  142. Touboul, Shlomo, Policy-based caching.
  143. Szor,Peter, Preventing e-mail propagation of malicious computer code.
  144. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  145. Melchione,Daniel Joseph, Process-based selection of virus detection actions system, method and computer program product.
  146. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  147. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  148. Modave, Jean-Louis; Huque, Thierry, Protection of a program against a trap.
  149. Goyal, Pawan; Huang, Xun Wilson; Keshav, Srinivasan; Sharma, Rosen, Providing quality of service guarantees to virtual hosts.
  150. Lymer, Brent J.; Karchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  151. Lymer, Brent J.; Katchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  152. Lymer, Brent J.; Katchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  153. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  154. Keshav, Srinivasan; Sharma, Rosen, Regulating file access rates according to file type.
  155. Keshav, Srinivasan; Sharma, Rosen, Regulating file access rates according to file type.
  156. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  157. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  158. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  159. Goyal, Pawan, Restricting communication of selected processes to a set of specific network addresses.
  160. Goyal,Pawan, Restricting communication of selected processes to a set of specific network addresses.
  161. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  162. Lowe, Joseph C.; Edwards, Jonathan L.; Woodruff, Andrew A.; Spurlock, Joel R., Rule set-based system and method for advanced virus protection.
  163. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  164. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  165. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  166. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  167. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  168. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  169. Bartleson, Todd; Haagensen, Brandt; Cox, Brian R., Security system and method for handheld computers.
  170. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  171. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  172. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  173. Deianov, Borislav D.; Huang, Xun Wilson; Sharma, Rosen, Selective interception of system calls.
  174. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  175. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  176. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  177. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  178. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  179. Radatti,Peter V.; Wells,Joseph W., Software virus detection methods and apparatus.
  180. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  181. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  182. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  183. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  184. Nachenberg,Carey S.; Guy,Elias E., Stream scanning through network proxy servers.
  185. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  186. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  187. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  188. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  189. Sallam,Ahmed, System and method for correlating network traffic and corresponding file input/output traffic.
  190. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  191. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  192. Easttom, II, William Charles, System and method for document tracking.
  193. Bruno, Mark; Cowings, David; Jensen, Sanford; Morss, Dylan; Schneider, Ken, System and method for filtering fraudulent email messages.
  194. Cowings, David; Hoogstrate, David; Jensen, Sandy; Medlar, Art; Schneider, Ken, System and method for filtering spam messages utilizing URL filtering module.
  195. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  196. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  197. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  198. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  199. Parekh,Pankaj; Gupta,Sandeep; Mamtani,Vijay; Sarpal,Saurabh, System and method for network quality of service protection on security breach detection.
  200. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  201. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  202. Shlomo Touboul IL, System and method for protecting a client during runtime from hostile downloadables.
  203. Touboul Shlomo,ILX, System and method for protecting a client during runtime from hostile downloadables.
  204. Touboul, Shlomo, System and method for protecting a computer and a network from hostile downloadables.
  205. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  206. Costea, Mihai; Marinescu, Adrian M.; Thomas, Anil Francis, System and method of caching decisions on when to scan for malware.
  207. Costea, Mihai; Marinescu, Adrian M.; Thomas, Anil Francis, System and method of caching decisions on when to scan for malware.
  208. Shay, A. David, System and methods for identification and tracking of user and/or source initiating communication in a computer network.
  209. Shay, A. David, System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection.
  210. Shay, A. David, System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto.
  211. Spurlock, Joel Robert; Schmugar, Craig D.; Howard, Fraser Peter, System, method and computer program product for context-driven behavioral heuristics.
  212. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  213. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  214. McIchionc, Daniel Joseph, System, method and computer program product for process-based selection of virus detection actions.
  215. Lymer, Brent J.; Kingsbury, Brad; Ritter, Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  216. Lymer, Brent J.; Kingsbury, Brad; Ritter, Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  217. Gordon, Bryson P.; Schneider, Ryan L., System, method, and computer program product for interfacing a plurality of related applications.
  218. Gordon, Bryson P.; Schneider, Ryan L., System, method, and computer program product for interfacing a plurality of related applications.
  219. Lymer, Brent J.; Chatterjee, Atri, System, method, and computer program product for managing a plurality of applications via a single interface.
  220. Lymer, Brent J.; Chatterjee, Atri, System, method, and computer program product for managing a plurality of applications via a single interface.
  221. Lymer, Brent J.; Chatterjee, Atri, System, method, and computer program product for managing a plurality of applications via a single interface.
  222. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method, and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  223. Lowe,Joseph C.; Edwards,Jonathan L.; Kumar,Srin N., System, method, and computer program product for tailoring security responses for local and remote file open requests.
  224. Powell, Brian; Cooley, Shaun, Systems and methods for circumventing malicious attempts to block the installation of security software.
  225. Green, Jeffrey; Gartside, Paul N; Bolin, Chris, Systems and methods for converting infected electronic files to a safe format.
  226. Magar, Sujit, Systems and methods for determining reputations of files.
  227. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  228. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  229. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  230. Green,Jeffrey; Gartside,Paul N; Bolin,Chris, Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient.
  231. Kramer,Michael; Ray,Kenneth D.; England,Paul; Field,Scott A.; Schwartz,Jonathan D., Systems and methods for verifying trust of executable files.
  232. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  233. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  234. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  235. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  236. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  237. Lytle, Andrew T.; Reich, Bryan J.; Gupta, Gitika; Pohle, Matthew C.; Tikunova, Mariya, Techniques for digital signature formation and verification.
  238. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  239. Menage, Paul, Template-based creation and archival of file systems.
  240. Nachenberg,Carey S.; Sobel,William E., Temporal access control for computer virus prevention.
  241. Dufeutrelle, Laurent, Terminal with means of protection against malfunctions of certain java applications.
  242. Lee, Wei-Chung, Thin client for computer security applications.
  243. Lee, Wei-Chung, Thin client for computer security applications.
  244. Liu, Bing, Threat protection network.
  245. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  246. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  247. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  248. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  249. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  250. Gupta, Gitika; Lytle, Andrew T.; Reich, Bryan J.; Pohle, Matthew C., Tool for digitally signing multiple documents.
  251. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  252. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  253. Brackett,Charles Cameron, Ultrasound imaging system having computer virus protection.
  254. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  255. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  256. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  257. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  258. Isenberg,Henri J., Using a benevolent worm to assess and correct computer security vulnerabilities.
  259. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  260. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  261. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
  262. Sobel,William E.; McCorkendale,Bruce, Verification of desired end-state using a virtual machine environment.
  263. Challener, David Carroll; Dayan, Richard Alan; Kern, Eric Richard, Verifying physical universal serial bus keystrokes.
  264. Huang, Xun Wilson; Estan, Jr., Cristian; Keshav, Srinivasan, Virtualizing super-user privileges for multiple virtual processes.
  265. Huang,Xun Wilson; Estan,Cristian; Keshav,Srinivasan, Virtualizing super-user privileges for multiple virtual processes.
  266. Zhao,Guangyu; Liu,Meyer; Badrinath,Subramaniam, Virus detection and removal system and method for network-based systems.
  267. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Virus detection system, method and computer program product for handheld computers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트