WO1999029066A1 - Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data - Google Patents

Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data Download PDF

Info

Publication number
WO1999029066A1
WO1999029066A1 PCT/US1998/025579 US9825579W WO9929066A1 WO 1999029066 A1 WO1999029066 A1 WO 1999029066A1 US 9825579 W US9825579 W US 9825579W WO 9929066 A1 WO9929066 A1 WO 9929066A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data channel
channel
virus
received
Prior art date
Application number
PCT/US1998/025579
Other languages
French (fr)
Inventor
Steven D. Mann
Original Assignee
Rvt Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rvt Technologies, Inc. filed Critical Rvt Technologies, Inc.
Priority to AU17084/99A priority Critical patent/AU1708499A/en
Publication of WO1999029066A1 publication Critical patent/WO1999029066A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/004Error avoidance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Definitions

  • This invention relates to computer systems. More particularly, this invention relates to a method and apparatus for isolating a computer system upon detection of a virus and similar data.
  • Computer virus scanners are common and can be used to detect a virus once it is downloaded. However, such scanners cannot prevent the virus from being downloaded. They can only aid in the identification of a virus once it has already infected the user's computer. Data security involving data networks is also an important concern. Many systems encrypt data sent over a network. However, no existing systems provide both data encryption/decryption and virus detection, thereby ensuring complete data security for transmitted and received data.
  • a first data channel is coupled to the data sending entity and a second data channel is coupled to the data receiving entity.
  • a circuit facilitates encryption and decryption of the data being recieved from and transmitted to the data sending entity.
  • a processor is operationally coupled to the first data channel and detects a data virus received from the first data channel.
  • An isolation circuit that is responsive to the processor couples the first data channel to the second data channel when the processor does not detect a data virus and isolates the first data channel from the second data channel when the processor detects a data virus.
  • the invention in another aspect, includes a first data channel coupled to the data sending entity and a second data channel coupled to the data receiving entity.
  • a data encryption chip is operationally coupled to the first data channel.
  • a processor operationally coupled to the data encryption chip and that is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus asserts a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus.
  • a memory that is operationally coupled to the processor, stores at least one data word characteristic of a data virus. The memory presents to the processor at least one data word characteristic of a data virus and an input buffer stores data received by the processor from the first data channel.
  • An optical isolator coupled to the first data channel and the second data channel and having an enable signal input, is capable of isolating the first data channel from the second data channel when the enable signal input is not asserted and is also capable of placing the first data channel and the second data channel in optical communication with each other when the enable signal input is asserted.
  • a controllable power supply that is responsive to the control signal from the processor is coupled to the enable signal input of the optical isolator. The power supply asserts the enable signal when the control signal is not asserted and does not assert the enable signal when the control signal is asserted, thereby causing the optical isolator to isolate the first data channel from the second data channel.
  • the invention is a method for isolating data receiving entity from a data sending entity.
  • the data sending entity is isolated from the data receiving entity.
  • An advantage of the invention is that it prevents a data receiving entity, such as a computer, from receiving a virus from a data sending entity, such as a computer network.
  • a further advantage of the invention is that it isolates the data sending entity from the data receiving entity without disrupting normal operation of either entity.
  • a further advantage of the invention is that it allows for encryption and decryption of communicated data.
  • FIG. 1 is a simplified schematic diagram of the invention.
  • FIG. 2 is a detailed schematic diagram of the invention.
  • FIG. 3 is a detailed schematic diagram of an embodiment of the invention that includes data encryption.
  • the apparatus 10 of the invention evaluates data received from a data sending entity 20, such as the Internet, by a data receiving entity 30, such as a personal computer or even a local area network.
  • the data is received via a first data channel 22 coupled to the data sending entity 20 and a second data channel 32 coupled to the data receiving entity.
  • a data comparitor 40 is operationally coupled to the first data channel 22 and is used to detect data viruses received from the first data channel 22.
  • a data isolator 60 that is responsive to a control signal 42 from the data comparator 40, isolates the first data channel 22 from the second data channel 32.
  • viruses are detected and prevented from being received by the data receiving entity 30.
  • the apparatus 10 of one preferred embodiment of the invention interfaces with a peripheral control interface (PCI) 12 of a data receiving entity 30, such as a personal computer, to provide isolation from a data sending entity 20, such as the Internet.
  • the data sending entity 20 is connected to an input interface 24, such as a standard PBX interface, via a first data channel 22.
  • the data stream received by the input interface 24 is demodulated using a demodulator circuit 26 so as to conform to the data format of the data receiving entity 30.
  • a UART chip 46 formats the incoming serial data into parallel data words and a processor 44, such as a PCI host controller, using an asynchronous transfer mode segmentation and reassembly, compares the parallel data with known virus signatures stored in a memory 48, such as an EEPROM.
  • the processor 44 which is controlled by a control memory 50, buffers data from the UART chip 46 in a memory chip 52 as it awaits virus scanning analysis.
  • the data isolator 60 comprises an optical isolator 62 that is driven by a power enable signal 66 received from a power supply conditioning ISO drive 64.
  • the power supply conditioning ISO drive 64 receives power from a power up control logic circuit 54 which receives power from a power line 74 in the PCI bus 12.
  • the data stream is transferred through the optical isolator 62 to a modulation level shifting circuit 68, that conditions the data for receipt by the data receiving entity 30, to a modem interface 34.
  • the modem interface 34 provides protocol matching to the input interface 24 and sends the data to the data receiving entity 30.
  • a control line 42 from the processor 44 causes the power up control logic circuit 54 to cause the power supply conditioning ISO drive 64 to cut off power to the optical isolator 62, thereby causing the optical isolator 62 to prevent passage of data therethrough.
  • a modem standby circuit 36 then takes over and simulates protocol exchanges with the input interface 24, thereby preventing an abnormal disconnect.
  • the processor 40 runs the system through a self checking routine. If any system abnormalities are detected, an interrupt line 70 is asserted. The interrupt line 70 passes through an optical isolator 14 to ensure unidirectional data transmission to the PCI bus 12.
  • the power up control logic circuit 54 also performs a self check, a battery reference 56 is compared to the value on the incoming power line 74 from the PCI bus 12, and if the system is improperly powered, an interrupt line 72 is asserted.
  • the interrupt line 72 is also passed through an optical isolator 16 that ensures that the interrupt line 72 is unidirectional to the PCI bus 12.
  • an embodiment of the invention 100 that encludes data encryption/decryption includes a data cipher processor 180 to encrypt/decrypt communicated data.
  • the cipher processor 180 could be a TUNDRA CA95C68, or other encryption chip.
  • data is received from the network by a network interface 122, which would be a standard RJ45 connection, or similar network interface.
  • a data format chip
  • the 146 formats the data for the cipher processor 180, which provides decrypted data to the screening environment processor 144.
  • the screening environment processor 144 which provides virus detection, could comprise a digital signal processing (DSP) chip, such as an ADSP-2181 and is serviced by a memory 150.
  • DSP digital signal processing
  • a micro-controller 134 is provided to control the data processing elements in the invention 100, sends control information to the host computer's PCI bus 112 and initiates communication handshaking.
  • the screening environment processor 144 provides a control signal to an opto- isolator bank 162, which isolates the host personal computer 130 from the network interface 122 upon detection of a virus.
  • Data from the opto-isolator bank 162 is conditioned by a network interface card 132 to make it suitable for the personal computer 130.
  • An opto drive 164 conditions power to the opto-isolator bank 162.
  • a power-up conditioner 154 taps power from the PCI bus 112 and provides power to the opto-drive 164. The power-up conditioner 154 also sends status signals to the PCI bus 112 though a pair of opto-isolators 114, 116 used to maintain unidirectional data transfer.
  • a battery reference 156 provides the power-up conditioner 154 with a voltage reference, to facilitate self checking functions.

Abstract

A method and apparatus for isolating a data receiving entity (30) from a data sending entity (20) include a first data channel (22), coupled to the data sending entity (20), and a second data channel (32), coupled to the data receiving entity. A data encryption chip decrypts data received from the data sending entity (20) and encrypts data sent to the data sending entity (20). A processor is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus (40) and to assert a control signal (42) when a data word received from the first data channel corresponds to a data word characteristic of a data virus. An optical isolator (60) is capable of isolating the first data channel from the second data channel when the processor detects a data virus.

Description

METHOD AND APPARATUS FOR ISOLATING AN ENCRYPTED COMPUTER SYSTEM UPON DETECTION OF VIRUSES AND SIMILAR
DATA
CROSS-REFERENCE TO RELATED APPLICATION
This is a continuation-in-part of my copending applications filed October 22, 1997, Serial No.: 08/955,912, the disclosure for which is incorporated herein by reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention:
This invention relates to computer systems. More particularly, this invention relates to a method and apparatus for isolating a computer system upon detection of a virus and similar data.
2. The Prior Art:
Recently, transmission of data viruses over the Internet has become a serious concern for Internet users. To reduce the concern, several methods are used to isolate computers from the Internet while the users are in local mode. However, when users of such methods are in a connected mode, they become prey to any virus that they may unwittingly download.
Computer virus scanners are common and can be used to detect a virus once it is downloaded. However, such scanners cannot prevent the virus from being downloaded. They can only aid in the identification of a virus once it has already infected the user's computer. Data security involving data networks is also an important concern. Many systems encrypt data sent over a network. However, no existing systems provide both data encryption/decryption and virus detection, thereby ensuring complete data security for transmitted and received data.
Nowhere does the prior art disclose a method or apparatus for detecting a virus as it is being received from a network and isolating the user's computer from the Internet when an incoming virus is detected.
SUMMARY OF THE INVENTION
The above-noted disadvantages of the prior art are overcome by the present invention, which in one aspect is an apparatus for isolating a data receiving entity from a data sending entity. A first data channel is coupled to the data sending entity and a second data channel is coupled to the data receiving entity. A circuit facilitates encryption and decryption of the data being recieved from and transmitted to the data sending entity. A processor is operationally coupled to the first data channel and detects a data virus received from the first data channel. An isolation circuit that is responsive to the processor couples the first data channel to the second data channel when the processor does not detect a data virus and isolates the first data channel from the second data channel when the processor detects a data virus.
In another aspect, the invention includes a first data channel coupled to the data sending entity and a second data channel coupled to the data receiving entity. A data encryption chip is operationally coupled to the first data channel. A processor, operationally coupled to the data encryption chip and that is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus asserts a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus. A memory, that is operationally coupled to the processor, stores at least one data word characteristic of a data virus. The memory presents to the processor at least one data word characteristic of a data virus and an input buffer stores data received by the processor from the first data channel. An optical isolator, coupled to the first data channel and the second data channel and having an enable signal input, is capable of isolating the first data channel from the second data channel when the enable signal input is not asserted and is also capable of placing the first data channel and the second data channel in optical communication with each other when the enable signal input is asserted. A controllable power supply that is responsive to the control signal from the processor is coupled to the enable signal input of the optical isolator. The power supply asserts the enable signal when the control signal is not asserted and does not assert the enable signal when the control signal is asserted, thereby causing the optical isolator to isolate the first data channel from the second data channel.
In yet another aspect, the invention is a method for isolating data receiving entity from a data sending entity. When a data virus received from the data sending entity is detected, the data sending entity is isolated from the data receiving entity.
An advantage of the invention is that it prevents a data receiving entity, such as a computer, from receiving a virus from a data sending entity, such as a computer network. A further advantage of the invention is that it isolates the data sending entity from the data receiving entity without disrupting normal operation of either entity.
A further advantage of the invention is that it allows for encryption and decryption of communicated data.
These and other advantages will become apparent from the following description of the preferred embodiment taken in conjunction with the following drawings, although variations and modifications may be effected without departing from the spirit and scope of the novel concepts of the disclosure.
BRIEF DESCRIPTION OF THE FIGURES OF THE DRAWINGS
FIG. 1 is a simplified schematic diagram of the invention.
FIG. 2 is a detailed schematic diagram of the invention.
FIG. 3 is a detailed schematic diagram of an embodiment of the invention that includes data encryption.
DETAILED DESCRIPTION OF THE INVENTION
A preferred embodiment of the invention is now described in detail.
Referring to the drawings, like numbers indicate like parts throughout the views. As used in the description herein and throughout the claims that follow, "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein and throughout the claims that follow, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.
As shown in FIG. 1, the apparatus 10 of the invention evaluates data received from a data sending entity 20, such as the Internet, by a data receiving entity 30, such as a personal computer or even a local area network. The data is received via a first data channel 22 coupled to the data sending entity 20 and a second data channel 32 coupled to the data receiving entity. A data comparitor 40 is operationally coupled to the first data channel 22 and is used to detect data viruses received from the first data channel 22. When a virus is detected, a data isolator 60, that is responsive to a control signal 42 from the data comparator 40, isolates the first data channel 22 from the second data channel 32. Thus, viruses are detected and prevented from being received by the data receiving entity 30.
As shown in FIG. 2, the apparatus 10 of one preferred embodiment of the invention interfaces with a peripheral control interface (PCI) 12 of a data receiving entity 30, such as a personal computer, to provide isolation from a data sending entity 20, such as the Internet. The data sending entity 20 is connected to an input interface 24, such as a standard PBX interface, via a first data channel 22. The data stream received by the input interface 24 is demodulated using a demodulator circuit 26 so as to conform to the data format of the data receiving entity 30.
The data stream is then fed into the data comparator 40. In the comparitor circuit 40, a UART chip 46 formats the incoming serial data into parallel data words and a processor 44, such as a PCI host controller, using an asynchronous transfer mode segmentation and reassembly, compares the parallel data with known virus signatures stored in a memory 48, such as an EEPROM. The processor 44, which is controlled by a control memory 50, buffers data from the UART chip 46 in a memory chip 52 as it awaits virus scanning analysis.
After the processor 44 has analyzed an incoming word, it is then sent to the data isolator 60 for eventual transfer to the data receiving entity 30. The data isolator 60 comprises an optical isolator 62 that is driven by a power enable signal 66 received from a power supply conditioning ISO drive 64. The power supply conditioning ISO drive 64 receives power from a power up control logic circuit 54 which receives power from a power line 74 in the PCI bus 12.
If no virus is found, the data stream is transferred through the optical isolator 62 to a modulation level shifting circuit 68, that conditions the data for receipt by the data receiving entity 30, to a modem interface 34. The modem interface 34 provides protocol matching to the input interface 24 and sends the data to the data receiving entity 30.
When a virus is detected in the incoming data stream, a control line 42 from the processor 44 causes the power up control logic circuit 54 to cause the power supply conditioning ISO drive 64 to cut off power to the optical isolator 62, thereby causing the optical isolator 62 to prevent passage of data therethrough. A modem standby circuit 36 then takes over and simulates protocol exchanges with the input interface 24, thereby preventing an abnormal disconnect.
During power-up, the processor 40 runs the system through a self checking routine. If any system abnormalities are detected, an interrupt line 70 is asserted. The interrupt line 70 passes through an optical isolator 14 to ensure unidirectional data transmission to the PCI bus 12.
The power up control logic circuit 54 also performs a self check, a battery reference 56 is compared to the value on the incoming power line 74 from the PCI bus 12, and if the system is improperly powered, an interrupt line 72 is asserted. The interrupt line 72 is also passed through an optical isolator 16 that ensures that the interrupt line 72 is unidirectional to the PCI bus 12.
As shown in FIG. 3, an embodiment of the invention 100 that encludes data encryption/decryption includes a data cipher processor 180 to encrypt/decrypt communicated data. The cipher processor 180 could be a TUNDRA CA95C68, or other encryption chip. In this embodiment, data is received from the network by a network interface 122, which would be a standard RJ45 connection, or similar network interface. A data format chip
146 formats the data for the cipher processor 180, which provides decrypted data to the screening environment processor 144. The screening environment processor 144, which provides virus detection, could comprise a digital signal processing (DSP) chip, such as an ADSP-2181 and is serviced by a memory 150. A micro-controller 134 is provided to control the data processing elements in the invention 100, sends control information to the host computer's PCI bus 112 and initiates communication handshaking. The screening environment processor 144 provides a control signal to an opto- isolator bank 162, which isolates the host personal computer 130 from the network interface 122 upon detection of a virus.
Data from the opto-isolator bank 162 is conditioned by a network interface card 132 to make it suitable for the personal computer 130. An opto drive 164 conditions power to the opto-isolator bank 162. A power-up conditioner 154 taps power from the PCI bus 112 and provides power to the opto-drive 164. The power-up conditioner 154 also sends status signals to the PCI bus 112 though a pair of opto-isolators 114, 116 used to maintain unidirectional data transfer. A battery reference 156 provides the power-up conditioner 154 with a voltage reference, to facilitate self checking functions.
The above described embodiment is given as an illustrative example only. It will be readily appreciated that many deviations may be made from the specific embodiment disclosed in this specification without departing from the invention. Accordingly, the scope of the invention is to be determined by the claims below rather than being limited to the specifically described embodiment above.

Claims

CLAIMSWhat is claimed is:
1. An apparatus for isolating data receiving entity from a data sending entity, comprising: a. a first data channel, coupled to the data sending entity; b. a second data channel, coupled to the data receiving entity; c. means, operationally coupled to the first data channel, for detecting a data virus received from the first data channel; d. means, responsive to the detecting means, for coupling the first data channel to the second data channel when the detecting means does not detect a data virus and for isolating the first data channel from the second data channel when the detecting means detects a data virus; and e. means for decrypting data received from the first data channel and for encrypting data transmitted to first data channel.
2. An apparatus for isolating data receiving entity from a data sending entity, comprising: a. a first data channel, coupled to the data sending entity; b. a second data channel, coupled to the data receiving entity; c. means, operatively coupled to the first data channel and to the second data channel, for decrypting data received from the first data channel and for encrypting data transmitted to first data channel; d. means for comparing a plurality of data words received from the first data channel to at least one data word characteristic of a data virus and for asserting a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus; and e. means, coupled to the first data channel and the second data channel and operationally coupled to the control signal, for isolating the first data channel from the second data channel when the control signal is asserted and for placing the first data channel and the second data channel in optical communication when the control signal is not asserted.
3. The apparatus of Claim 2, wherein the comparing means comprises: a. a processor; and b. means for presenting to the processor at least one data word characteristic of a data virus.
4. The apparatus of Claim 2, wherein the decrypting and encrypting means comprises a data encryption chip.
5. The apparatus of Claim 3, wherein the processor comprises a screening enviornment processor.
6. The apparatus of Claim 3, wherein the presenting means comprises a memory, operationally coupled to the processor, that stores at least one data word characteristic of a data virus.
7. The apparatus of Claim 3, further comprising an input buffer that stores data received by the processor
8. The apparatus of Claim 2, wherein data on the first data channel is transmitted in a serial format and wherein the apparatus further comprises means for converting segments of serial data received from the first data channel to data in a parallel format.
9. The apparatus of Claim 2, wherein the isolating means comprises an optical isolator.
10. The apparatus of Claim 8, further comprising a controllable power supply responsive to the control signal from the comparing means, the power supply generating an enable signal when the control signal is not asserted, wherein the optical isolator is powered by the enable signal so that when the optical isolator receives power from the enable signal, the first data channel and the second data channel are in optical communication with each other.
11. An apparatus for isolating data receiving entity from a data sending entity, comprising: a. a first data channel, coupled to the data sending entity; b. a second data channel, coupled to the data receiving entity; c. a data encryption chip, operatively coupled to the first data channel and to the second data channel, for decrypting data received from the first data channel and for encrypting data transmitted to first data channel; d. a processor that is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus and to assert a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus; e. a memory, operationally coupled to the processor, that stores at least one data word characteristic of a data virus that presents to the processor at least one data word characteristic of a data virus; f. an input buffer that stores data received by the processor from the first data channel; g. an optical isolator, coupled to the first data channel and the second data channel and having an enable signal input, that is capable of isolating the first data channel from the second data channel when the enable signal input is not asserted and is capable of placing the first data channel and the second data channel in optical communication with each other when the enable signal input is asserted; and h. a controllable power supply responsive to the control signal from the processor and coupled to the enable signal input of the optical isolator, the power supply asserting the enable signal when the control signal is not asserted and the power supply not asserting the enable signal when the control signal is asserted, thereby causing the optical isolator to isolate the first data channel from the second data channel.
12. The apparatus of Claim 10, wherein the processor comprises a PCI host controller.
13. The apparatus of Claim 10, wherein data on the first data channel is transmitted in a serial format and wherein the apparatus further comprises means for converting segments of serial data received from the first data channel to data in a parallel format.
14. A method for isolating data receiving entity from a data sending entity, comprising: a detecting a data virus received from the data sending entity; b. isolating the data sending entity from the data receiving entity upon detecting a data virus received from the data sending entity; c. decrypting data received from the data sending entity by the data receiving entity; and d. encrypting data sent from the data receiving entity to the data sending entity.
PCT/US1998/025579 1997-12-03 1998-12-03 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data WO1999029066A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU17084/99A AU1708499A (en) 1997-12-03 1998-12-03 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/984,608 1997-12-03
US08/984,608 US6081894A (en) 1997-10-22 1997-12-03 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data

Publications (1)

Publication Number Publication Date
WO1999029066A1 true WO1999029066A1 (en) 1999-06-10

Family

ID=25530700

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/025579 WO1999029066A1 (en) 1997-12-03 1998-12-03 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data

Country Status (3)

Country Link
US (1) US6081894A (en)
AU (1) AU1708499A (en)
WO (1) WO1999029066A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005031499A2 (en) * 2003-08-04 2005-04-07 Sbc Knowledge Ventures, L.P. Host intrusion detection and isolation
EP1724701A2 (en) * 2005-05-20 2006-11-22 AT&T Corp. Solution to the malware problems of the internet

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000034867A1 (en) 1998-12-09 2000-06-15 Network Ice Corporation A method and apparatus for providing network and computer system security
EP1056010A1 (en) 1999-05-28 2000-11-29 Hewlett-Packard Company Data integrity monitoring in trusted computing entity
EP1055990A1 (en) 1999-05-28 2000-11-29 Hewlett-Packard Company Event logging in a computing platform
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
EP1085396A1 (en) 1999-09-17 2001-03-21 Hewlett-Packard Company Operation of trusted state in computing platform
US8006243B2 (en) 1999-12-07 2011-08-23 International Business Machines Corporation Method and apparatus for remote installation of network drivers and software
US7921459B2 (en) * 2000-04-28 2011-04-05 International Business Machines Corporation System and method for managing security events on a network
AU2001262958A1 (en) * 2000-04-28 2001-11-12 Internet Security Systems, Inc. Method and system for managing computer security information
US7093239B1 (en) * 2000-07-14 2006-08-15 Internet Security Systems, Inc. Computer immune system and method for detecting unwanted code in a computer system
GB0020441D0 (en) 2000-08-18 2000-10-04 Hewlett Packard Co Performance of a service on a computing platform
US9027121B2 (en) 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US7146305B2 (en) * 2000-10-24 2006-12-05 Vcis, Inc. Analytical virtual machine
GB2376763B (en) * 2001-06-19 2004-12-15 Hewlett Packard Co Demonstrating integrity of a compartment of a compartmented operating system
GB0102516D0 (en) * 2001-01-31 2001-03-21 Hewlett Packard Co Trusted gateway system
US20020147803A1 (en) 2001-01-31 2002-10-10 Dodd Timothy David Method and system for calculating risk in association with a security audit of a computer network
GB2372594B (en) 2001-02-23 2004-10-06 Hewlett Packard Co Trusted computing environment
GB2372595A (en) * 2001-02-23 2002-08-28 Hewlett Packard Co Method of and apparatus for ascertaining the status of a data processing environment.
GB2372591A (en) * 2001-02-23 2002-08-28 Hewlett Packard Co Method of investigating transactions in a data processing environment
GB2372592B (en) * 2001-02-23 2005-03-30 Hewlett Packard Co Information system
US6748542B2 (en) * 2001-03-12 2004-06-08 Pathlock Corporation Timed disconnect switch for data and telephone circuits
GB2376762A (en) * 2001-06-19 2002-12-24 Hewlett Packard Co Renting a computing environment on a trusted computing platform
GB2376764B (en) * 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments
GB2376765B (en) 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments with verifiable environment identities
US7657419B2 (en) * 2001-06-19 2010-02-02 International Business Machines Corporation Analytical virtual machine
GB0114898D0 (en) * 2001-06-19 2001-08-08 Hewlett Packard Co Interaction with electronic services and markets
GB2376761A (en) * 2001-06-19 2002-12-24 Hewlett Packard Co An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
GB2378013A (en) * 2001-07-27 2003-01-29 Hewlett Packard Co Trusted computer platform audit system
EP1282023A1 (en) * 2001-07-30 2003-02-05 Hewlett-Packard Company Trusted platform evaluation
GB2378272A (en) * 2001-07-31 2003-02-05 Hewlett Packard Co Method and apparatus for locking an application within a trusted environment
DE60232803D1 (en) * 2001-09-14 2009-08-13 Computer Ass Think Inc VIRUS DETECTION SYSTEM
GB2382419B (en) * 2001-11-22 2005-12-14 Hewlett Packard Co Apparatus and method for creating a trusted environment
WO2003058451A1 (en) 2002-01-04 2003-07-17 Internet Security Systems, Inc. System and method for the managed security control of processes on a computer system
JP4088082B2 (en) * 2002-02-15 2008-05-21 株式会社東芝 Apparatus and program for preventing infection by unknown computer virus
US20030229810A1 (en) * 2002-06-05 2003-12-11 Bango Joseph J. Optical antivirus firewall for internet, LAN, and WAN computer applications
US7913303B1 (en) 2003-01-21 2011-03-22 International Business Machines Corporation Method and system for dynamically protecting a computer system from attack
KR100500589B1 (en) * 2003-09-03 2005-07-12 엘지엔시스(주) An apparatus and method for worm protection using pattern matching method based on a hardware system
US7657938B2 (en) 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
RU2462750C9 (en) * 2004-06-21 2019-10-18 Анатолий Владимирович Копытко Method to protect computer equipment against viral codes
US7386708B2 (en) * 2005-01-13 2008-06-10 Lenovo (Singapore) Pte Ltd. Secure hardware personalization service
US8539587B2 (en) 2005-03-22 2013-09-17 Hewlett-Packard Development Company, L.P. Methods, devices and data structures for trusted data
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US7934260B2 (en) * 2006-04-27 2011-04-26 The Invention Science Fund I, Llc Virus immunization using entity-sponsored bypass network
US7917956B2 (en) * 2006-04-27 2011-03-29 The Invention Science Fund I, Llc Multi-network virus immunization
US7849508B2 (en) * 2006-04-27 2010-12-07 The Invention Science Fund I, Llc Virus immunization using entity-sponsored bypass network
US8863285B2 (en) * 2006-04-27 2014-10-14 The Invention Science Fund I, Llc Virus immunization using prioritized routing
US8966630B2 (en) * 2006-04-27 2015-02-24 The Invention Science Fund I, Llc Generating and distributing a malware countermeasure
US8191145B2 (en) * 2006-04-27 2012-05-29 The Invention Science Fund I, Llc Virus immunization using prioritized routing
US8539581B2 (en) * 2006-04-27 2013-09-17 The Invention Science Fund I, Llc Efficient distribution of a malware countermeasure
US9258327B2 (en) 2006-04-27 2016-02-09 Invention Science Fund I, Llc Multi-network virus immunization
US8151353B2 (en) * 2006-04-27 2012-04-03 The Invention Science Fund I, Llc Multi-network virus immunization with trust aspects
US8510846B1 (en) 2006-06-29 2013-08-13 Google Inc. Data encryption and isolation
US8239668B1 (en) 2009-04-15 2012-08-07 Trend Micro Incorporated Computer security threat data collection and aggregation with user privacy protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5126728A (en) * 1989-06-07 1992-06-30 Hall Donald R ADP security device for labeled data
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5434562A (en) * 1991-09-06 1995-07-18 Reardon; David C. Method for limiting computer access to peripheral devices
US5550818A (en) * 1994-09-19 1996-08-27 Bell Communications Research, Inc. System for wavelength division multiplexing/asynchronous transfer mode switching for network communication

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US5909493A (en) * 1996-10-16 1999-06-01 Ricoh Company, Ltd. Method and system for diagnosis and control of machines using connectionless modes of communication
US5319776A (en) * 1990-04-19 1994-06-07 Hilgraeve Corporation In transit detection of computer virus with safeguard
JPH10501354A (en) * 1994-06-01 1998-02-03 クワンタム・リープ・イノヴェーションズ・インコーポレーテッド Computer virus trap device
US5606474A (en) * 1995-01-17 1997-02-25 Latsu, Inc. High density disk drive with accelerated disk access
US5826013A (en) * 1995-09-28 1998-10-20 Symantec Corporation Polymorphic virus detection module
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers
US5815571A (en) * 1996-10-28 1998-09-29 Finley; Phillip Scott Computer system with secured data paths and method of protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5126728A (en) * 1989-06-07 1992-06-30 Hall Donald R ADP security device for labeled data
US5434562A (en) * 1991-09-06 1995-07-18 Reardon; David C. Method for limiting computer access to peripheral devices
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5550818A (en) * 1994-09-19 1996-08-27 Bell Communications Research, Inc. System for wavelength division multiplexing/asynchronous transfer mode switching for network communication

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005031499A2 (en) * 2003-08-04 2005-04-07 Sbc Knowledge Ventures, L.P. Host intrusion detection and isolation
WO2005031499A3 (en) * 2003-08-04 2005-06-02 Sbc Knowledge Ventures Lp Host intrusion detection and isolation
US7565690B2 (en) 2003-08-04 2009-07-21 At&T Intellectual Property I, L.P. Intrusion detection
EP1724701A2 (en) * 2005-05-20 2006-11-22 AT&T Corp. Solution to the malware problems of the internet
EP1724701A3 (en) * 2005-05-20 2007-06-27 AT&T Corp. Solution to the malware problems of the internet
US8667106B2 (en) 2005-05-20 2014-03-04 At&T Intellectual Property Ii, L.P. Apparatus for blocking malware originating inside and outside an operating system

Also Published As

Publication number Publication date
US6081894A (en) 2000-06-27
AU1708499A (en) 1999-06-16

Similar Documents

Publication Publication Date Title
US6081894A (en) Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
US6003132A (en) Method and apparatus for isolating a computer system upon detection of viruses and similar data
US5978481A (en) Modem compatible method and apparatus for encrypting data that is transparent to software applications
US5878142A (en) Pocket encrypting and authenticating communications device
US6708272B1 (en) Information encryption system and method
US6721424B1 (en) Hostage system and method for intercepting encryted hostile data
CN1889419B (en) Method and apparatus for realizing encrypting
EP1121781A1 (en) Adapter having secure function and computer secure system using it
NO316150B1 (en) Method, apparatus and device for encrypting message between interconnected networks
WO1998007255A1 (en) Pocket encrypting and authenticating communications device
US20040170274A1 (en) Image forming apparatus and method for inputting encryption key setting
US20020129237A1 (en) Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer
JP2001203761A (en) Repeater and network system provided with the same
JPH10164049A (en) Data transmission method, data transmitter, program recording transmission medium, data reception method, data receiver, data transmission/reception method and data transmitter-receiver
US7225331B1 (en) System and method for securing data on private networks
AU758189B2 (en) Method and apparatus for isolating a computer system upon detection of viruses and similar data
EP1286242A1 (en) System and method for protected data input of security data
JP2002026896A (en) High-speed copy preventing method
JPS6363232A (en) Ciphered communication system
JPS60102038A (en) Cipher communication system
US20040158635A1 (en) Secure terminal transmission system and method
JPH10294756A (en) Electronic mail terminal equipment
Quantin et al. Security aspects of medical file regrouping for the epidemiological follow-up
CN206728116U (en) The image processing system to ensure information security
KR100198960B1 (en) Apparatus for guarding data

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase