$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Control of interaction between client computer applications and network resources 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0900002 (2001-07-05)
발명자 / 주소
  • McArdle,Mark J.
  • Johnston,Brent A.
  • Nathan,Philip D. R.
  • Dool,James
출원인 / 주소
  • McAfee, Inc.
대리인 / 주소
    Zilka Kotab, PC
인용정보 피인용 횟수 : 134  인용 특허 : 8

초록

An application policy engine for a computer blocks access to network resources by applications executing on the computer that are not authorized for such access by an application policy file. The application policy engine monitors outgoing network traffic from the computer and compares an identifier

대표청구항

What is claimed is: 1. A computerized method for restricting network access by applications comprising: detecting a network access request from an application; examining an application policy file to determine if the application is authorized to access the network by comparing an identifier for th

이 특허에 인용된 특허 (8)

  1. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  2. Timothy E. Moses CA; Glenn C. Langford CA, Method and apparatus for facilitating information security policy control on a per security engine user basis.
  3. Xie, Ken; Ke, Yan; Mao, Yuming, Method, apparatus and computer program product for a network firewall.
  4. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules.
  5. Nagar, Vivek; Singh, Inderjeet, Scalable proxy servers with plug-in filters.
  6. Hericourt, Olivier, System and method to manage data to a plurality of proxy servers through a router by application level protocol and an authorized list.
  7. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  8. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.

이 특허를 인용한 특허 (134)

  1. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  2. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  8. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  9. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  10. Balasubramanian, Sembian, Application security framework.
  11. Balasubramanian, Sembian, Application security framework.
  12. Agarwal,Sachin; Lee,Michele C., Automatic configuration of attribute sets.
  13. Venkatachalam, Raja; Lopez-Barquilla, Ricardo; Xu, Zhangwei; Steeb, Curt A., BIOS based secure execution environment.
  14. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  15. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  16. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  17. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  18. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  19. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  20. Bafna, Sapna Mahendra; Bruner, John David; Liu, Xin; Jaffri, Taqi, Controlling access to resources by hosted entities.
  21. Bafna, Sapna Mahendra; Bruner, John David; Liu, Xin; Jaffri, Taqi, Controlling access to resources by hosted entities.
  22. Ben-Zvi, Nir; Perumal, Raja Pazhanivel; Samuelsson, Anders; Hamblin, Jeffrey B.; Kalach, Ran; Li, Ziquan; Wollnik, Matthias H.; Law, Clyde; Oltean, Paul Adrian, Controlling resource access based on resource properties.
  23. Sinn, Richard; Yuen, Stan; Lee, Chi-Cheng, Employing wrapper profiles.
  24. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  25. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  26. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  27. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  28. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  29. Frank, Alexander; Steeb, Curt A.; Xu, Zhangwei, Hardware-aided software code measurement.
  30. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  31. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  32. Delaney, Shawn P.; Summers, Robert, Identifying dynamic groups.
  33. Frank, Alexander, Independent computation environment and data protection.
  34. Yadav, Satyendra, Integrated network intrusion detection.
  35. Yadav, Satyendra, Integrated network intrusion detection.
  36. Yadav, Satyendra, Integrated network intrusion detection.
  37. Ray, Kenneth D.; Kamat, Pankaj M.; Kaufman, Charles W.; Leach, Paul J.; Tipton, William R.; Herron, Andrew; Karamfilov, Krassimir E.; Bryce, Duncan G.; Schwartz, Jonathan D.; Setzer, Matthew C.; McDowell, John, Licensing protected content to application sets.
  38. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Managing mobile device applications.
  39. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Managing mobile device applications in a wireless network.
  40. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Managing mobile device applications on a mobile device.
  41. Choi, Hyok-sung; Lee, Sang-kwon; Shin, Seong-kook; Han, Se-jun; Yu, Hee-seok, Method and apparatus for handling security level of device on network.
  42. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  43. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  44. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  45. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  46. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  47. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  48. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  49. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  50. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  51. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  52. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  53. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  54. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  55. Borders, Kevin R., Method, system and computer program product for detecting security threats in a computer network.
  56. Matsimanis, Peter A.; Root, Michael A.; Satpathy, Ansuman Tapan; Sood, Vishal, Methods and apparatuses for hybrid desktop environment data usage authentication.
  57. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  58. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  59. Shitano,Masaki; Oishi,Kazuomi, Network address generating system, network address generating apparatus and method, program and storage medium.
  60. Ghatare,Sanjay P., Partitioning data access requests.
  61. Diaz-Cuellar, Gerardo; Iskin, Sermet; Coronel Mendoza, Jorge P.; Graham, Scott B.; Wood, Nicholas D., Per process networking capabilities.
  62. Sheehan, John M.; Kapustein, Howard S.; Holman, Jerome Thomas; Graham, Scott B.; Iskin, Sermet, Pervasive package identifiers.
  63. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  64. Pottier, Marc Christopher; Morris, Max Glenn; Martin, Travis J.; Loholt, Michael N.; Davis, Darren R.; Dandawate, Priya Bhushan; Shipley, Kenton A.; Zia, Khurram M., Platform-enabled proximity service.
  65. Tsang,Andy; Barber,Brandon, Portal bridge.
  66. Larson, Douglas V.; Johnson, Robert, Processor acquisition of ownership of access coordinator for shared resource.
  67. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  68. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  69. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  70. Aiello, William A.; Kalmanek, Jr., Charles Robert; Leighton, III, William J.; McDaniel, Patrick; Sen, Subhabrata; Spatscheck, Oliver; Van Der Merwe, Jacobus E., Reverse firewall with self-provisioning.
  71. Aiello, William A.; Kalmanek, Jr., Charles Robert; Leighton, III, William J.; McDaniel, Patrick; Sen, Subhabrata; Spatscheck, Oliver; Van Der Merwe, Jacobus E., Reverse firewall with self-provisioning.
  72. Sinn,Richard P.; Remahl,Thomas B.; Tsang,Andy M., Rule based data management.
  73. Risney, Jr., David L; Peters, Bradley J; Graham, Scott B; Verola, Lindsay D, Runtime resolution of content references.
  74. Tamayo-Rios, Matthew Z.; Sinha, Saurav; Ovechkin, Ruslan; Kannan, Gopinathan; Bharadwaj, Vijay G.; Macaulay, Christopher R.; Fleischman, Eric; Ide, Nathan J.; Liu, Kun, Secure data synchronization.
  75. Tamayo-Rios, Matthew Z.; Sinha, Saurav; Ovechkin, Ruslan; Kannan, Gopinathan; Bharadwaj, Vijay G.; Macaulay, Christopher R.; Fleischman, Eric; Ide, Nathan J.; Liu, Kun, Secure data synchronization.
  76. Lee,Michele C.; Ahmed,Sajeed, Securely persisting network resource identifiers.
  77. Graham, Scott; Radhakrishnan, Kavitha; Iskin, Sermet; Blanch, Katrina M.; Ball, Steven; Hazen, John; Beam, Tyler Kien; Kim, Allen; Quintero, Guillermo Enrique Rueda, Selective file access for applications.
  78. Novak, Mark F.; Thom, Stefan; Tor, Yair; Efron, Alexey; Ortal, Amos, Self regulation of the subject of attestation.
  79. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  80. Sebes, E. John, Solidifying the executable software set of a computer.
  81. Agarwal,Sachin; Thiyagarajan,Lakshmi V., Support for multiple mechanisms for accessing data stores.
  82. Jain,Vikas; Lee,Michele C., Supporting multiple application program interfaces.
  83. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  84. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  85. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  86. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  87. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  88. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  89. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  90. Touboul, Shlomo, System and method for implementing content and network security inside a chip.
  91. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  92. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  93. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  94. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  95. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  96. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  97. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  98. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  99. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  100. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  101. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  102. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  103. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  104. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  105. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  106. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  107. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  108. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  109. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  110. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  111. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  112. Touboul, Shlomo, System and method for providing network security to mobile devices.
  113. Touboul, Shlomo, System and method for providing network security to mobile devices.
  114. Touboul, Shlomo, System and method for providing network security to mobile devices.
  115. Touboul, Shlomo, System and method for providing network security to mobile devices.
  116. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  117. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  118. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  119. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  120. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  121. Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application based interception SSI/VPN traffic.
  122. Mullick, Amarnath; Nanjundaswamy, Shashi; Venkatraman, Charu; He, Junxiao; Harris, James; Soni, Ajay, Systems and methods for application based interception of SSL/VPN traffic.
  123. Mullick, Amarnath; Venkatraman, Charu; He, Junxiao; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application based interception of SSL/VPN traffic.
  124. Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application-based interception of SSL/VPN traffic.
  125. Chacko, Vinoo; Agarwal, Puneet; Nanjudaswamy, Shashi; Soni, Ajay, Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic.
  126. Ely, Omar Nathaniel, Systems and methods for providing network security using a secure digital device.
  127. Ely, Omar Nathaniel, Systems and methods for providing network security using a secure digital device.
  128. Touboul, Shlomo; Ferdman, Sela; Yusim, Yonathan, Systems and methods for providing real time access monitoring of a removable media device.
  129. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  130. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  131. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  132. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  133. Touboul, Shlomo, Transaction security systems and methods.
  134. Touboul, Shlomo, Transaction security systems and methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로