$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for evolving detectors to detect malign behavior in an artificial immune system

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0532855 (2006-09-18)
등록번호 US8065733 (2011-11-07)
발명자 / 주소
  • Koelle, Katharina Veronika
  • Midwinter, Wendy
출원인 / 주소
  • Google, Inc.
대리인 / 주소
    Frommer Lawrence & Haug LLP
인용정보 피인용 횟수 : 1  인용 특허 : 108

초록

A system, apparatus, and method are directed to evolving detectors in an Artificial Immune System for use in detecting unauthorized computing activities. In one embodiment, a population of detectors is generated with a matching value and expectation value of zero. The detectors are then compared to

대표청구항

What is claimed as new and desired to be protected by Letters Patent of the United States is: 1. A network device for detecting an unauthorized client software activity, comprising:a transceiver to send and receive data over the network; anda processor that is operative to perform actions, including

이 특허에 인용된 특허 (108)

  1. Horstmann Cay, Advertising-subsidized and advertising-enabled software.
  2. Cook Donald A. ; Lukas George ; Lukas Andrew V. ; Padwa David J., Agent based instruction system and method.
  3. Pinder Howard George (Atlanta GA) Palgon Michael Steven (Atlanta GA), Apparatus and method for cipher stealing when encrypting MPEG transport packets.
  4. Bigus Joseph Phillip ; Cragun Brian John ; Delp Helen Roxlo, Apparatus and method for optimizing the performance of computer tasks using multiple intelligent agents having varied degrees of domain knowledge.
  5. Nachman Jacob B. (Ramat Modiim ILX) Tsuria Yossef (Jerusalem ILX), Apparatus and method for securing communication systems.
  6. Weidong Mao ; David Chen, Apparatus and method for web-casting over digital broadcast TV network.
  7. Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
  8. Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
  9. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, Computer cleaning system, method and computer program product.
  10. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  11. Li Bobby ; Chen Eva, Controlled distribution of application programs in a computer network.
  12. Gledhill Jeff,GBX ; Anikhindi Santosh,GBX, Decoding carriers encoded using orthogonal frequency division multiplexing.
  13. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  14. Zeng, Wenjun; Lei, Shaw-Min, Digital image scrambling for image coding systems.
  15. Sesma Jimmy L., Digital product execution control.
  16. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  17. Tsuria Yossef,ILX, Digital recording protection system.
  18. Bellwood, Thomas Alexander; Lita, Christian; Rutkowski, Matthew Francis, Dynamic connection to multiple origin servers in a transcoding proxy.
  19. Kudelski, Stefan; Schlup, Jean-Claude; Rosselet, Ernest, Error prevention in a recording and reproducing device with at least one rotating head.
  20. Mark Charles Davis ; David G. Kuehr-McLaren ; Timothy Glenn Shoriak, Extending SSL to a multi-tier environment using delegation of authentication and authority.
  21. Demmers Petrus Adrianus Cornelis Maria,NLX, Filter device.
  22. Bednarek Robert A. ; Rubin Philip A., GPS TV set top box with regional restrictions.
  23. Rix, Simon Paul Ashley, Integrated circuit and smart card comprising such a circuit.
  24. Handelman Doron,ILX ; Colb Sanford T.,ILX, Integrated telephone and cable communication networks.
  25. Sered, Yishai; Dallard, Nigel Stephen, Key delivery in a secure broadcasting system.
  26. Lin Huai-An (Scotch Plains NJ), Link-by-link congestion control for packet transmission systems.
  27. Li Weijun, Merging of separate executable computer programs to form a single executable computer program.
  28. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  29. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  30. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  31. Aziz, Ashar; Baehr, Geoffrey; Caronni, Germano; Gupta, Amit; Gupta, Vipul; Scott, Glenn C., Method and apparatus for providing secure communication with a relay in a network.
  32. LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
  33. Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
  34. Davies Donald Watts,GBX, Method and apparatus for transmitting and receiving encrypted signals.
  35. Jardin, Cary A., Method and system for managing secure client-server transactions.
  36. Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
  37. Douglas Daniel G. ; Edelman Stewart J., Method for establishing a secured communication channel over the internet.
  38. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  39. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  40. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  41. Duong-van, Minh; Pavel, Tomas J.; Wen, Han C., Method for reducing packet loss and increasing internet flow by feedback control.
  42. Kudelski Andre (Crissier CHX), Method for scrambling and unscrambling a video signal.
  43. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  44. Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
  45. Moline William A. ; Putnam Frederick A., Methods and apparatus for encrypting and decrypting MIDI files.
  46. Handelman Doron (Givataim ILX), Methods and systems for non-program applications for subscriber television.
  47. Handelman Doron (Givataim ILX), Methods and systems for providing additional service applications in pay television.
  48. Horstmann Cay S., Multi-tier electronic software distribution.
  49. Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
  50. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  51. Jeong, Soo Gil; Kim, See Hyun; Kim, Kyu Seok; Kim, Chang Kyu; Oh, Jin Hong, PID/section filter in digital television system.
  52. Toshiyuki Kawagishi JP, Portable electronic device and loyalty point system.
  53. Kudelski Andre (Crissier CHX), Pre-payment television system using a memory card associated with a decoder.
  54. Brian Baker, Process and streaming server for encrypting a data stream.
  55. Horstmann Cay S., Relicensing of electronically purchased software.
  56. Katta Noboru (Itami JPX) Murakami Hiroki (Osaka JPX) Ibaraki Susumu (Toyonaka JPX) Nakamura Seiji (Toyonaka JPX), Scrambled transmission system.
  57. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
  58. Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
  59. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
  60. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  61. Meyers William J. ; Fraioli Marc J. ; Spencer Jon F., Secure computer system.
  62. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  63. Hallam Toby,GBX ; Siegel Philip I., Secure smart card and tool for removing same.
  64. Elgamal Taher ; Hickman Kipp E.B., Secure socket layer application program apparatus and method.
  65. Yarborough, William Jordan; Zhuang, Jia Jin, Secured session sequencing proxy system and method therefor.
  66. Michael R. Colligan ; Yong Ho Son ; Christopher Goode, Selective and renewable encryption for secure distribution of video on-demand.
  67. Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
  68. Yossef Tsuria IL, Smart card chaining in pay television systems.
  69. Horstmann Cay S., Software program self-modification.
  70. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  71. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  72. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  73. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  74. Gray James P. ; Onvural Raif O. ; Peyravian Mohammad, Synchronization of encryption/decryption keys in a data communication network.
  75. Kuhn Gideon Jacobus,ZAX ; Davies Donald Watts,GB3 ; Rix Simon Paul Ashley,ZAX, System and apparatus for blockwise encryption/decryption of data.
  76. Davis Derek L., System and method for copy-protecting distributed video content.
  77. Liu James C., System and method for on-line multimedia access.
  78. Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
  79. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  80. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  81. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  82. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  83. Chaney John William, System for processing a video signal via series-connected high speed signal processing smart cards.
  84. malik Sohail ; Muresan Michael, System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver.
  85. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  86. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  87. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  88. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  89. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  90. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  91. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  92. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  93. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  94. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  95. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  96. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  97. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  98. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  99. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  100. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  101. Handelman, Doron, Television system communicating individually addressed information.
  102. Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
  103. Tsuria Yossef,ILX ; Handelman Doron,ILX, Theft prevention system and method.
  104. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  105. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  106. Freeman Martin, Verification of software agents and agent activities.
  107. Snook, Daniel, Video encoding-method.
  108. Frederiksen Jeffrey E. (603 W. Haven Dr. Arlington Heights IL 60005), Video transmission system.

이 특허를 인용한 특허 (1)

  1. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트