$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Uniform resource locator (URL)-based secure download system and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • H04L-009/00
출원번호 US-0265030 (2002-10-04)
발명자 / 주소
  • Balasubramaniam,Chandrasekar
  • Kannan,Ravi
  • Revashetti,Siddaraya Basappa
  • Sampath,Srivats
  • Katchapalayam,Babu
출원인 / 주소
  • McAfee, Inc.
대리인 / 주소
    Zilka Kotab, PC
인용정보 피인용 횟수 : 60  인용 특허 : 20

초록

A method and computer executable program code are disclosed to verify the source of software downloaded from a remote site to a client computer over a computer network before the software can be executed on the client computer.

대표청구항

What is claimed is: 1. A method for securely downloading software from a server computer to a client computer over a computer network, comprising: identifying a Universal Resource Locator (URL) pertaining to a server computer to which a browser program running on a client computer is pointed for in

이 특허에 인용된 특허 (20)

  1. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  2. Ruben Gary D. ; Goldwater Mark H., Apparatuses, methods, and media for authoring, distributing, and using software resources with purposely restricted use.
  3. Wang Edward Yan-Bing ; Dean Dawson F. ; Chen Ling Tony ; Klemets Anders Edgar ; Chaddha Navin, Authentication systems, methods, and computer program products.
  4. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  5. Urano Akihiro,JPX ; Hirata Toshiaki,JPX ; Fujino Shuji,JPX ; Morita Shinji ; Yamada Mitsugu,JPX ; Niimura Miki,JPX ; Morikawa Kazuyoshi,JPX ; Miyazaki Satoshi,JPX, Detection method of illegal access to computer system.
  6. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Directional set operations for permission based security in a computer system.
  7. Chen Eva ; Lau Steven Yuen-Lam ; Liang Yung-Chang, Event triggered iterative virus detection.
  8. Baker Brenda Sue, Filtering for public databases with naming ambiguities.
  9. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  10. Chandrasekar Balasubramaniam ; Ravi Kannan ; Siddaraya Basappa Revashetti IN; Srivats Sampath ; Babu Katchapalayam, Method and apparatus for securing software distributed over a network.
  11. Sampath Srivats ; Balasubramaniam Chandrasekar ; Lingarkar Ravi ; Katchapalayam Babu ; Kannan Ravi, Method and system for securing, managing or optimizing a personal computer.
  12. Laursen Andrew L. ; Martin ; Jr. Bruce K. ; Rossmann Alain S., Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices.
  13. Rhoads Geoffrey B., Network linking method using steganographically embedded data objects.
  14. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Protected storage of core data secrets.
  15. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  16. Walker James D. ; Webb Alexander F., System and method for authorizing access to data on content servers in a distributed network.
  17. Touboul Shlomo,ILX, System and method for protecting a computer and a network from hostile downloadables.
  18. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  19. Himmel Maria Azua ; Rodriguez Herman, Web browser download of bookmark set.
  20. Paul Haverstock ; Miguel Estrada ; Julio Estrada, Web server providing role-based multi-level security.

이 특허를 인용한 특허 (60)

  1. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  2. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Ben-Itzhak, Yuval, Application layer security method and system.
  8. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  9. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  10. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  11. Kay, James, Method and apparatus for electronic mail filtering.
  12. Kay, James, Method and apparatus for electronic mail filtering.
  13. Kay, James, Method and apparatus for electronic mail filtering.
  14. Daniela, Ramon; Ostrer, Mark; Stoler, Michael, Method and apparatus for maintaining network communication during email data transfer.
  15. Daniela, Ramon; Ostrer, Mark; Stoler, Michael, Method and apparatus for managing the transfer of sensitive information to mobile devices.
  16. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  17. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  18. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  19. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  20. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  21. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  22. Howard, Fraser; Baccas, Paul; Svajcer, Vanja; Godwood, Benjamin John; McCourt, William James, Method and system for detecting restricted content associated with retrieved content.
  23. Kay, James, Method and system for filtering electronic messages.
  24. Troyansky, Lidror, Method and system for protection against information stealing software.
  25. Troyansky, Lidror, Method and system for protection against information stealing software.
  26. Troyansky, Lidror, Method and system for protection against information stealing software.
  27. Troyansky, Lidror, Method and system for protection against information stealing software.
  28. Troyansky, Lidror; Bruckner, Sharon; Hubbard, Daniel Lyle, Method and system for protection against information stealing software.
  29. Troyansky, Lidror; Bruckner, Sharon; Hubbard, Daniel Lyle, Method and system for protection against information stealing software.
  30. Kay, James, Method and systems for collecting addresses for remotely accessible information sources.
  31. Hamalainen, Antti, Method for secure downloading of applications.
  32. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  33. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  34. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  35. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  36. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  37. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  38. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  39. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  40. Hubbard, Daniel Lyle, System and method for adding context to prevent data leakage over a computer network.
  41. Hubbard, Daniel Lyle, System and method for adding context to prevent data leakage over a computer network.
  42. Troyansky, Lidror, System and method for analysis of electronic information dissemination events.
  43. Herz, William Samuel; Fear, Andrew C., System and method for determining risk of search engine results.
  44. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  45. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  46. Hubbard, Dan, System and method of controlling access to the internet.
  47. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  48. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  49. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  50. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  51. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  52. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  53. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  54. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  55. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  56. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method, and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  57. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  58. Kislyuk, Oleg; Gubin, Maxim; Vinnik, Alex, Systems and methods for detecting suspicious web pages.
  59. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  60. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로