$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for maintaining restricted operating environments for application programs or operating systems 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0150112 (1998-09-09)
발명자 / 주소
  • Rechef Eran,ILX
  • Raanan Gil,ILX
  • Solan Eilon,ILX
출원인 / 주소
  • Perfecto Technologies Ltd., ILX
대리인 / 주소
    Brown Raysman Millstein Felder & Steiner LLP
인용정보 피인용 횟수 : 192  인용 특허 : 12

초록

A method for protecting an operating environment on a processor from a rogue program operating on the processor comprising isolating simultaneously executing programs or operating systems is disclosed. Memory space for use only by the first program while the first program is executing is allocated.

대표청구항

[What is claimed is:] [1.]allocating memory space for use only by the first program while the first program is executing;allowing communication between the first program and the operating environment through only a single link employing a single method selected from the group consisting of a shared

이 특허에 인용된 특허 (12)

  1. Curley John L. (North Andover MA) Hirsch Thomas S. (Bedford MA) Penney John C. (Chelmsford MA) Reisch Ileana S. (Carlisle MA) Staplin ; Jr. Theodore R. (Chelmsford MA) Wurz David A. (Winchester MA), Apparatus and method for a data processing system having a peer relationship among a plurality of central processing uni.
  2. Curley John L. (North Andover MA) Hirsch Thomas S. (Bedford MA) Wurz David A. (Winchester MA), Apparatus and method for alterable resource partitioning enforcement in a data processing system having central processi.
  3. O\Brien Steven M. (Norristown PA) Saunders Michael J. (Norristown PA) Nilson Arthur J. (Norristown PA), Dual operating system computer.
  4. Steely ; Jr. Simon C. ; Garvey Glenn P. ; Gillett ; Jr. Richard B., High performance recoverable communication method and apparatus for write-only networks.
  5. Van Dyke Clifford P. ; Swift Michael M. ; Logan Keith W. ; Misra Pradyumna K., Method and apparatus for Migrating from a source domain network controller to a target domain network controller.
  6. Hsieh Vincent, Method for security shield implementation in computer system's software.
  7. Dircks Charles E. ; Osmann Eric E., Network desktop management security system and method.
  8. Robinson Paul T. (Arlington MA) Mason Andrew H. (Hollis NH) Hall Judith S. (Sudbury MA), Protection ring extension for computers having distinct virtual machine monitor and virtual machine address spaces.
  9. Spilo Michael L. ; Daub Jonathan A., System and method for computer operating system protection.
  10. Pereira J. L. A., System and method for controlling access to personal computer system resources.
  11. Francisco Emmanuel C. (Covina CA) Saunders Randy (Upland CA), System for providing high security for personal computers and workstations.
  12. Draves Richard P. ; Cutshall Scott ; Odinak Gilad, Variably-sized kernel memory stacks.

이 특허를 인용한 특허 (192)

  1. Schackow, Stefan N.; Kothari, Nikhil, Accessing network resources outside a security boundary.
  2. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  3. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  4. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  5. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  6. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  7. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  8. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  9. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogenous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  10. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive processor for performing an operation with simple and complex units each comprising configurably interconnected heterogeneous elements.
  11. van der Made, Peter A. J., Analytical virtual machine.
  12. van der Made,Peter A. J., Analytical virtual machine.
  13. Master, Paul L.; Uvacek, Bohumir, Apparatus and method for adaptive multimedia reception and transmission in communication environments.
  14. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  15. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  16. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  17. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having fixed, application specific computational elements.
  18. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having heterogeneous computational elements.
  19. Ben-Itzhak, Yuval, Application layer security method and system.
  20. Ben Itzhak,Yuval, Application-layer security method and system.
  21. Kennedy, Mark; Renert, Charles, Blocking replication of e-mail worms.
  22. Brennan, Todd, Centralized timed analysis in a network security system.
  23. Nachenberg, Carey; McCorkendale, Bruce, Circumstantial blocking of incoming network traffic containing code.
  24. Heidari, Ghobad; Chang, Kuor Hsin; Master, Paul L.; Hogenauer, Eugene B.; Scheuermann, Walter James, Communications module, device, and method for implementing a system acquisition function.
  25. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  26. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  27. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  28. Morris, Terrel, Computer system and method for sharing computer memory.
  29. Master, Paul L.; Watson, John, Configurable hardware based digital imaging apparatus.
  30. Brennan, Todd, Content extractor and analysis system.
  31. Scheuermann, W. James; Hogenauer, Eugene B., Control node for multi-core system.
  32. Szor,Peter, Countering infections to communications modules.
  33. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  34. Juels,Ari; Brainard,John, Cryptographic countermeasures against connection depletion attacks.
  35. Muttik, Igor, Detecting malicious software by analyzing patterns of system calls generated during emulation.
  36. Khosravi, Hormuzd M.; Durham, David, Detection and reporting of virtualization malware in computer processor environments.
  37. Sobel,William, Detection of malicious computer code.
  38. Roesch, Martin Frederick; Novak, Judy Hollis; Sturges, Steven, Device, system and method for analysis of segments in a transmission control protocol (TCP) session.
  39. Sturges, Steven; Novak, Judy Hollis, Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session.
  40. Lemay, Michael; Durham, David M.; Anderson, Andrew V.; Neiger, Gilbert; Sahita, Ravi L., Dynamic page table edit control.
  41. Lemay, Michael; Durham, David M.; Anderson, Andrew V.; Neiger, Gilbert; Sahita, Ravi L., Dynamic page table edit control.
  42. Codrescu, Lucian; Anderson, William C.; Venkumahanti, Suresh; Giannini, Louis Achille; Pyla, Manojkumar; Chen, Xufeng, Embedded trace macrocell for enhanced digital signal processor debugging operations.
  43. Satish, Sourabh; Hernacki, Brian, Endpoint management using trust rating data.
  44. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  45. Furtek, Frederick Curtis; Master, Paul L., External memory controller.
  46. Furtek, Frederick Curtis; Master, Paul L., External memory controller node.
  47. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  48. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  49. Barde, Sumedh N.; Debique, Kirt A.; Grigorovitch, Alexandre V.; Mohammed, Sohail Baig; Nelson, Patrick N.; Virdi, Gurpratap; Rowe, Stephen C., Fault tolerant and hang resistant media processing applications.
  50. Gagner, Mark B.; Sylla, Craig J., Gaming device with a virtualization manager.
  51. Chi,Darren, Generic detection and elimination of marco viruses.
  52. Scheuermann,Walter James, Hardware implementation of the secure hash standard.
  53. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  54. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  55. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  56. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  57. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  58. Nachenberg,Carey, Heuristic detection of computer viruses.
  59. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  60. Kennedy, Mark, Heuristically detecting spyware/adware registry activity.
  61. Fresko, Nedim; Tuck, Richard D.; Long, Dean R. E., Hybrid system implementing distinct and co-existing application execution environments and methods for implementing the same.
  62. Fresko, Nedim; Tuck, Richard D.; Long, Dean R. E., Hybrid system implementing distinct and co-existing application execution environments and methods for implementing the same.
  63. Inoue, Hiroaki; Sakai, Junji; Abe, Tsuyoshi; Edahiro, Masato, Information communication device and program execution environment control method.
  64. Giannini, Louis Achille; Anderson, William; Chen, Xufeng, Inter-thread trace alignment method and system for a multi-threaded processor.
  65. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  66. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  67. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  68. Roelker,Daniel J.; Norton,Marc A., Intrusion detection strategies for hypertext transport protocol.
  69. Gustafson, Eric; Rittermann, Brian P., Intrusion event correlation with network discovery information.
  70. Ffrench, Anthony; Huang, Libra C.; Smith, Timothy J.; Su, Chih-Wen; Wang, Yi-Hong, Isolated program execution environment.
  71. Szor,Peter, Kernel mode overflow attack prevention system and method.
  72. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  73. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  74. Sambhwani,Sharad; Heidari,Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  75. Hammond, Nicolas J., Method and apparatus for auditing network security.
  76. Barnes, Brian C.; Strongin, Geoffrey S.; Schmidt, Rodney W., Method and apparatus for linear address based page level security scheme to determine current security context.
  77. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  78. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  79. Whittaker,James A.; Chaturvedi,Rahul; Wagner,John R., Method and apparatus for preemptive monitoring of software binaries by instruction interception and dynamic recompilation.
  80. Greenebaum, Kenneth, Method and apparatus for protected content data processing.
  81. Greenebaum, Kenneth, Method and apparatus for protected content data processing.
  82. Porter, Swain W., Method and apparatus for protectively operating a data/information processing device.
  83. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  84. Moyer,William C.; Fitzsimmons,Michael D.; Millar,Brian M.; Vaglica,John J., Method and apparatus for responding to access errors in a data processing system.
  85. Master, Paul L., Method and system for achieving individualized protected space in an operating system.
  86. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  87. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  88. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  89. Master, Paul L., Method and system for creating and programming an adaptive computing engine.
  90. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  91. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  92. Codrescu, Lucian; Anderson, William C.; Venkumahanti, Suresh; Giannini, Louis Achille; Pyla, Manojkumar; Chen, Xufeng, Method and system for instruction stuffing operations during non-intrusive digital signal processor debugging.
  93. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  94. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  95. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  96. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  97. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  98. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  99. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  100. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  101. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  102. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  103. Codrescu, Lucian; Anderson, William C.; Venkumahanti, Suresh; Giannini, Louis Achille; Pyla, Manojkumar; Chen, Xufeng, Method and system for trusted/untrusted digital signal processor debugging operations.
  104. White, Peter Duncan; Dailey, Conan Brian; Chen, Hua; Carmony, Pamela Tam; Amstutz, Jennifer Lynn; Hines, Keith Michael; Sydnor, Jr., Francis Gregory, Method for allocating memory to tasks without exceeding predefined memory requirements.
  105. Gomez Hernandez, Jaime Enrique; Perry Peinado, Carlos A.; Linares Montañes, Wilmer; Tovar Rueda, Ivan Dario, Method for internet transactions.
  106. Naccache,David; Rousseau,Ludovic; Girard,Pierre, Method for monitoring program flow to verify execution of proper instructions by a processor.
  107. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  108. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  109. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  110. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  111. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  112. Dotan,Eyal, Method for protecting computer programs and data from hostile code.
  113. Zimmer,Vincent J., Method for providing system integrity and legacy environment emulation.
  114. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  115. Mendoza, Alfredo V.; Peckham, Stephen Bailey; Spinac, Clifford Jay; Winman, Tiffany Lynn, Method of isolating erroneous software program components.
  116. Ning, Peng; Kim, Moo-Young; Kim, Min-Jung, Method of verifying integrity of electronic device, storage medium, and electronic device.
  117. Ekberg, Jan-Erik; Reshetova, Elena, Method, apparatus and computer program product for providing object privilege modification.
  118. Master,Paul L.; Hogenauer,Eugene; Wu,Bicheng William; Chuang,Dan MingLun; Freeman Benson,Bjorn, Method, system and program for developing and scheduling adaptive integrated circuity and corresponding control or configuration information.
  119. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  120. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  121. Sebot, Julien; Gueron, Shay, Mitigating branch prediction and other timing based side channel attacks.
  122. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  123. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  124. Codrescu, Lucian; Anderson, William C.; Venkumahanti, Suresh; Giannini, Louis Achille; Pyla, Manojkumar; Chen, Xufeng, Non-intrusive, thread-selective, debugging method and system for a multi-thread digital signal processor.
  125. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  126. Wolfe, Andrew; Conte, Thomas M., Operating system sandbox.
  127. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  128. Szor,Peter, Preventing e-mail propagation of malicious computer code.
  129. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  130. Callender, Robin L.; Ganapathy, Narayanan, Process-mode independent driver model.
  131. Master, Paul L., Profiling of software and circuit designs utilizing data operation analyses.
  132. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  133. Rittermann, Brian, Real-time user awareness for a computer network.
  134. Abu-Husein, Loay, Secure storage and execution of processor control programs by encryption and a program loader/decryption mechanism.
  135. Szor,Peter, Send blocking system and method.
  136. White, Peter Duncan; Dailey, Conan Brian; Chen, Hua; Carmony, Pamela Tam; Amstutz, Jennifer Lynn; Hines, Keith Michael; Sydnor, Jr., Francis Gregory, Separation kernel with memory allocation, remote procedure call and exception handling mechanisms.
  137. Sturges, Steven; Norton, Marc, Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing.
  138. Master,Paul L.; Watson,John, Storage and delivery of device features.
  139. Nachenberg,Carey S.; Guy,Elias E., Stream scanning through network proxy servers.
  140. Watt, Simon Charles; Dornan, Christopher Bentley; Orion, Luc; Chaussade, Nicolas; Belnet, Lionel; Brochier, Stephane Eric Sebastien, Switching between secure and non-secure processing modes.
  141. Dickey, Kent A., System and method for allowing non-trusted processors to interrupt a processor safely.
  142. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  143. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  144. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  145. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  146. Ivanov, Dmitry G.; Pavlov, Nikita A.; Shvetsov, Dmitry V.; Gorshenin, Mikhail A., System and method for controlling access of machine code to operating system resources.
  147. Sallam,Ahmed, System and method for correlating network traffic and corresponding file input/output traffic.
  148. Fisher,Joseph A; Lain,Antonio, System and method for isolating applications from each other.
  149. McKee, Bret A., System and method for monitoring execution of privileged instructions.
  150. Olney, Matthew; Mullen, Patrick; Grenier, Lurene; Houghton, Nigel; Pentney, Ryan, System and method for near-real time network attack detection, and system and method for unified detection via detection routing.
  151. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  152. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  153. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  154. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  155. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  156. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  157. Rozman,Allen F; Cioffi,Alfonso J, System and method for protecting a computer system from malicious software.
  158. Roesch, Martin Frederick, System and method for real time data awareness.
  159. Roesch, Martin Frederick, System and method for real time data awareness.
  160. Roesch, Martin Frederick, System and method for real time data awareness.
  161. Vogel, III, William Andrew; Baker, Andrew, System and method for resolving operating system or service identity conflicts.
  162. Karasaki,Teiji, System and method for secure wall.
  163. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  164. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  165. Ivanov, Dmitry G.; Pavlov, Nikita A.; Shvetsov, Dmitry V.; Gorshenin, Mikhail A., System and method of controlling access of a native image of a machine code to operating system resources.
  166. Strongin, Geoffrey S.; Barnes, Brian C.; Schmidt, Rodney, System and method providing region-granular, hardware-controlled memory encryption.
  167. Master, Paul L.; Watson, John, System for adapting device standards after manufacture.
  168. Master, Paul L.; Watson, John, System for authorizing functionality in adaptable hardware devices.
  169. Roesch, Martin; Dempster, Ronald A.; Novak, Judy, Systems and methods for determining characteristics of a network.
  170. Roesch, Martin; Vogel, III, William Andrew; Watchinski, Matt, Systems and methods for determining characteristics of a network and analyzing vulnerabilities.
  171. Roesch,Martin; Dempster,Ronald A., Systems and methods for determining characteristics of a network and assessing confidence.
  172. Roesch, Martin; Dempster, Ronald A.; Baker, Andrew; Gustafson, Eric, Systems and methods for determining characteristics of a network and enforcing policy.
  173. Roesch, Martin; Dempster, Ronald A., Systems and methods for determining characteristics of a network based on flow analysis.
  174. Dempster,Ronald A.; Houghton,Nigel, Systems and methods for identifying the client applications of a network.
  175. Roesch, Martin; Dempster, Ronald A., Systems and methods for identifying the services of a network.
  176. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  177. Vogel, III, William A.; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  178. Vogel, III, William Andrew; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  179. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  180. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  181. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  182. Katragadda, Ramana; Spoltore, Paul; Howard, Ric, Task definition for specifying resource requirements.
  183. Nachenberg,Carey S.; Sobel,William E., Temporal access control for computer virus prevention.
  184. Watson, Lynn; Stokes, DeVerl; Nalder, Gregory Tew, Transportable volume, local environment repository.
  185. Dotan, Eyal, User transparent virtualization method for protecting computer programs and data from hostile code.
  186. Dotan, Eyal, User transparent virtualization method for protecting computer programs and data from hostile code.
  187. Isenberg,Henri J., Using a benevolent worm to assess and correct computer security vulnerabilities.
  188. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  189. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  190. Sobel,William E.; McCorkendale,Bruce, Verification of desired end-state using a virtual machine environment.
  191. Banginwar, Rajesh P.; Naropanth, Sumanth; Notalapati Prabhakara, Sunil K.; Singh, Surendra K.; Mohan, Arvind; Sahita, Ravi L.; Malhotra, Rahil; Bakshi, Aman; Kamma, Vasudevarao; Nayak, Jyothi; Thakkar, Vivek; Pinto, Royston A., Virtualization-based platform protection technology.
  192. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로