$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for managing files in a distributed system using filtering 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
출원번호 US-0356770 (1999-07-16)
발명자 / 주소
  • Chess, David Michael
  • Kephart, Jeffrey Owen
  • Morar, John Frederick
  • Pring, Edward John
  • White, Steve Richard
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Zarick Gail H.
인용정보 피인용 횟수 : 53  인용 특허 : 8

초록

In a network-connected distributed system including nodes through which digital data flow, one or more of the nodes adapted to process the digital data, a method for efficiently managing the transmission of units of digital data from node to node, includes the steps of receiving, at one of the one o

대표청구항

1. In a network-connected distributed system comprising a plurality of nodes through which digital data flow, at least one of the nodes adapted to process the digital data,a method to efficiently manage the transmission of units of digital data from an originating node towards an analysis center nod

이 특허에 인용된 특허 (8)

  1. Wei Edward,TWX ; Huang Gary C.,TWX, Inter-network bridge connector provided for dynamically prioritizing frame transmission adaptive to current network transmission-state.
  2. Sami Shaio, Method and apparatus for accepting and rejecting files according to a manifest.
  3. Cozza Paul D. (HC 61 ; Box 023A Damariscotta ME 04543), Method and apparatus for increasing the speed at which computer viruses are detected.
  4. Maria Arturo ; Owens Leslie Dale, Method and apparatus for updating address lists for a packet filter processor.
  5. Hodges Vernon ; O'Donnell Shawn, Method and system for providing automated updating and upgrading of antivirus applications using a computer network.
  6. Mannings Robin Thomas,GBX ; Wall Nigel David Charles,GBX, Navigation information system.
  7. Batchelder Edward Marcus (Brookline MA) Salas R. Pito (Arlington MA), Text abstraction method and apparatus.
  8. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.

이 특허를 인용한 특허 (53)

  1. Sobel,William; McCorkendale,Bruce, Antivirus scanning in a hard-linked environment.
  2. Anderson, W. Kyle; Bonhaus, Daryl, Automated identification and clean-up of malicious computer code.
  3. Tahan, Thomas E., Community separation control in a closed multi-community node.
  4. Muttik, Igor; Wolff, Daniel Joseph; Tarbotton, Lee Codel Lawson, Data scanning for updatable predefined properties.
  5. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  6. Cheng, Yi-Hung, Detection of file modifications performed by malicious codes.
  7. Szor,Peter, Dynamic detection of computer worms.
  8. Millard, John, Efficient file scanning using input-output hints.
  9. Kissel,Timo S., Efficient scanning of stream based data.
  10. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  11. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  12. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  13. Hursey,Neil John; McEwan,William Alexander, Malware scanning as a low priority task.
  14. Tarbotton,Lee Codel Lawson; Vignoles,James Malcolm; Barton,Christopher Andrew, Malware scanning to create clean storage locations.
  15. Obrecht, Mark Eric; Alagna, Michael Anthony; Payne, Charles Andrew, Method and apparatus for detecting malicious code in an information handling system.
  16. Obrecht, Mark; Alagna, Michael Tony; Payne, Andy, Method and apparatus for detecting malicious code in an information handling system.
  17. Cambridge,Rodney D., Method and system for bi-directional updating of antivirus database.
  18. Heath, Chester, Method and system for regulating entry of data into a protected system.
  19. McGregor, Jr., John Patrick; White, Matthew N., Method for accelerating security and management operations on data segments.
  20. Goldstein, Leonid, Method, a system, and an apparatus for content security in computer networks.
  21. Chiriac, Mihai, Method, computer program and computer for analyzing an executable computer file.
  22. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  23. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  24. Alagna,Michael Tony; Obrecht,Mark; Payne,Andy; Norwood,Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  25. Alagna,Michael Anthony; Obrecht,Mark Eric; Payne,Charles Andrew; Norwood,Peter, Method, system and computer program product for security in a global computer network transaction.
  26. Morris, Melvyn; Stubbs, Paul; Hartwig, Markus; Harter, Darren, Methods and apparatus for dealing with malware.
  27. Morris, Melvyn; Stubbs, Paul; Hartwig, Markus; Harter, Darren, Methods and apparatus for dealing with malware.
  28. Morris, Melvyn; Stubbs, Paul; Hartwig, Markus; Harter, Darren, Methods and apparatus for dealing with malware.
  29. Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  30. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  31. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  32. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  33. Nachenberg, Carey; Weinstein, Alex, Pattern matching using embedded functions.
  34. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  35. Kissel,Timo S., Proactive protection against e-mail worms and spam.
  36. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  37. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  38. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  39. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  40. Nachenberg,Carey; Szor,Peter, Selective detection of malicious computer code.
  41. Nachenberg,Carey, Signature driven cache extension for stream based scanning.
  42. Ludwig, Adrian L.; Condra, IV, Curtis Gerald; Kralevich, IV, Nicholas Neil, Software exploit detection.
  43. Dozortsev, D'mitri, System and method of enforcing executable code identity verification over the network.
  44. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  45. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  46. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  47. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  48. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  49. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  50. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  51. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  52. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  53. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., Systems and methods for adaptive model generation for detecting intrusions in computer systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로