$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method of enforcing executable code identity verification over the network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/32
출원번호 US-0329873 (2002-12-26)
발명자 / 주소
  • Dozortsev, D'mitri
대리인 / 주소
    Gifford, Krass, Groh, Sprinkle, Anderson &
인용정보 피인용 횟수 : 81  인용 특허 : 14

초록

A method and system for identity verification of executable code includes a central computer that is in communication with a computer network. The central computer includes a database that is adapted to store and analyze a plurality of executable code signatures, including signatures of malicious, l

대표청구항

1. A process for monitoring and analyzing executable computer code comprising the steps of:providing a client computer having an event monitoring application in a working session, said client computer accessing a central computer through a computer network, said central computer having a database co

이 특허에 인용된 특허 (14)

  1. Arnold William C. (Mahopac NY) Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) White Steven R. (New York NY), Automatic immune system for computers and computer networks.
  2. Susaki Seiichi,JPX ; Umeki Hisashi,JPX ; Umezawa Katsuyuki,JPX ; Miyazaki Seiji,JPX ; Matsunaga Kazuo,JPX ; Kitagawa Makoto,JPX, Client-server system for controlling access rights to certain services by a user of a client terminal.
  3. Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
  4. Gilgen David Blair, Dynamic program suspension.
  5. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  6. Cheswick William Roberts ; Whitten Edward G., Firewall security method and apparatus.
  7. Summers Monty, Method and computer program for operating an interactive themed attraction accessible by computer users.
  8. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  9. Wagner Richard H., Method and system for responding to hidden data and programs in a datastream.
  10. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  11. Thomas Christopher N. ; Jackowski Steven J. ; Brock Keven J., Ordering of multiple plugin applications using extensible layered service provider with network traffic filtering.
  12. Chess, David Michael; Kephart, Jeffrey Owen; Morar, John Frederick; Pring, Edward John; White, Steve Richard, System and method for managing files in a distributed system using filtering.
  13. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  14. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.

이 특허를 인용한 특허 (81)

  1. Byrnes, Sean N.; Vanrenen, Gabriel; Harris, Karl, Adaptive deployment of applications for mobile devices.
  2. Codreanu, Dumitru; Neagu, Mihai; Chiriac, Mihai, Collaborative malware scanning.
  3. Byrnes, Sean N.; Vanrenen, Gabriel; Scholnick, Dan, Delivering a customized service to a mobile device by parsing metadata to create a device signature.
  4. Byrnes, Sean N.; Vanrenen, Gabriel; Scholnick, Dan, Delivering a customized service to a mobile device using a link.
  5. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Diminishing false positive classifications of unsolicited electronic-mail.
  6. Sen,Yafen, Electronic mail program.
  7. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  8. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  9. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  10. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  11. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  12. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  13. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  14. Black, Robert Barth, Method and aparatus for presence based resource management.
  15. Bori, Josep, Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability.
  16. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Method and apparatus for classifying electronic messages.
  17. Williamson, Matthew; Gorelik, Vladimir, Method and apparatus for detecting harmful software.
  18. Obrecht, Mark Eric; Alagna, Michael Anthony; Payne, Charles Andrew, Method and apparatus for detecting malicious code in an information handling system.
  19. Obrecht, Mark; Alagna, Michael Tony; Payne, Andy, Method and apparatus for detecting malicious code in an information handling system.
  20. Kay, James, Method and apparatus for electronic mail filtering.
  21. Kay, James, Method and apparatus for electronic mail filtering.
  22. Barile, Ian M.; Satish, Sourabh, Method and apparatus for peer-to-peer compliancy validation in secure managed networks.
  23. Black, Robert Barth, Method and apparatus for presence based resource management.
  24. Williamson, Matthew; Gorelik, Vladimir, Method and apparatus for removing harmful software.
  25. Williamson, Matthew; Gorelik, Vladimir, Method and apparatus for removing harmful software.
  26. Pavlyushchik, Mikhail A., Method and system for detection of previously unknown malware components.
  27. Pavlyushchik,Mikhail A., Method and system for detection of previously unknown malware components.
  28. Nataraj, Pruthvi Panyam; Tomar, Bipin; Anbalagan, Arun Prasath; Reyes, Eduardo Lazaro, Method and system for software installation.
  29. Brown, Sanford, Method of securing network access radio systems.
  30. Brown, Sanford, Method of securing network access radio systems.
  31. Brown, Sanford, Method of securing network access radio systems.
  32. Brown, Sanford, Method of securing network access radio systems.
  33. Giraud, Nicolas; Rainsard, Stéphane, Method to secure the execution of a program against attacks by radiation or other.
  34. Chiriac, Mihai, Method, computer program and computer for analyzing an executable computer file.
  35. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  36. Morris, Melvyn; Stubbs, Paul; Hartwig, Markus; Harter, Darren, Methods and apparatus for dealing with malware.
  37. Morris, Melvyn; Stubbs, Paul; Hartwig, Markus; Harter, Darren, Methods and apparatus for dealing with malware.
  38. Morris, Melvyn; Stubbs, Paul; Hartwig, Markus; Harter, Darren, Methods and apparatus for dealing with malware.
  39. Gassoway, Paul A., Methods and systems for computer security.
  40. Headley, Paul, Methods for identifying the guarantor of an application.
  41. Headley, Paul, Methods for the secure use of one-time passwords.
  42. Ma, Karen, Methods of authenticating users to a site.
  43. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  44. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  45. Headley, Paul, Multi-channel multi-factor authentication.
  46. Headley, Paul, Multi-channel multi-factor authentication.
  47. Amundsen, Lance C., On demand virus scan.
  48. Barton,Christopher Andrew; Reed,Simon Neil; Brown,Martin Alan, Pre-approval of computer files during a malware detection.
  49. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  50. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  51. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  52. Dutta, Tanmoy; Garcia, Raul; Gott, Steven Richard; Ovechkin, Ruslan Pavlovich; Wolter, Roger Lynn, Schema signing.
  53. Dutta, Tanmoy; Garcia, Raul; Gott, Steven Richard; Ovechkin, Ruslan Pavlovich; Wolter, Roger Lynn, Schema signing.
  54. Meenakshisundaram, Sethu, Secured database system with built-in antivirus protection.
  55. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  56. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  57. Cross, David B.; Kurien, Thekkthalackal Varugis; Field, Scott A., Software authorization utilizing software reputation.
  58. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  59. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  60. Polyakov, Alexey A.; Martynenko, Vladislav V.; Slobodyanuk, Yuri G.; Nazarov, Denis A.; Pavlyushchik, Mikhail A., System and method for detection of complex malware.
  61. Kramer, Michael; Seinfeld, Marc E; Waite, Ryan W J; Lantz, Eric L A, System and method for protecting a limited resource computer from malware.
  62. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  63. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  64. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  65. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  66. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  67. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  68. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  69. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  70. Safa, John, System and method to secure a computer system by selective control of write access to a data storage medium.
  71. Konanka, Dzmitry; Liahuski, Andrei, System and methodology providing secure workspace environment.
  72. Headley, Paul, Systems and methods for controlling access to encrypted data stored on a mobile device.
  73. Headley, Paul, User authentication for social networks.
  74. Headley, Paul, User authentication for social networks.
  75. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  76. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  77. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  78. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  79. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  80. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  81. Klucher, Michael; Bleisch, Paul L.; Brown, Joerg Raymound; Unoki, Robert S., Verification of un-trusted code for consumption on an insecure device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로