WO2005114539A3 - Systems and methods for excluding user specified applications - Google Patents
Systems and methods for excluding user specified applications Download PDFInfo
- Publication number
- WO2005114539A3 WO2005114539A3 PCT/US2005/017447 US2005017447W WO2005114539A3 WO 2005114539 A3 WO2005114539 A3 WO 2005114539A3 US 2005017447 W US2005017447 W US 2005017447W WO 2005114539 A3 WO2005114539 A3 WO 2005114539A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- systems
- methods
- user specified
- executed
- file
- Prior art date
Links
- 230000000903 blocking effect Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US57298404P | 2004-05-20 | 2004-05-20 | |
US60/572,984 | 2004-05-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2005114539A2 WO2005114539A2 (en) | 2005-12-01 |
WO2005114539A3 true WO2005114539A3 (en) | 2006-04-27 |
Family
ID=34979556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/017447 WO2005114539A2 (en) | 2004-05-20 | 2005-05-18 | Systems and methods for excluding user specified applications |
Country Status (2)
Country | Link |
---|---|
US (1) | US8060867B2 (en) |
WO (1) | WO2005114539A2 (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7882561B2 (en) | 2005-01-31 | 2011-02-01 | Microsoft Corporation | System and method of caching decisions on when to scan for malware |
US8838974B2 (en) * | 2005-07-15 | 2014-09-16 | The Mathworks, Inc. | System and method for verifying the integrity of read-only components in deployed mixed-mode applications |
US7716739B1 (en) * | 2005-07-20 | 2010-05-11 | Symantec Corporation | Subjective and statistical event tracking incident management system |
US8001602B2 (en) * | 2005-10-31 | 2011-08-16 | Freescale Semiconductor, Inc. | Data scan mechanism |
US20080104016A1 (en) * | 2006-10-30 | 2008-05-01 | Susan Handayani Putri Atmaja | Method and system for comparing data |
US8590039B1 (en) | 2007-11-28 | 2013-11-19 | Mcafee, Inc. | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature |
US7392544B1 (en) * | 2007-12-18 | 2008-06-24 | Kaspersky Lab, Zao | Method and system for anti-malware scanning with variable scan settings |
US9306796B1 (en) | 2008-03-18 | 2016-04-05 | Mcafee, Inc. | System, method, and computer program product for dynamically configuring a virtual environment for identifying unwanted data |
CN101299849B (en) * | 2008-04-25 | 2010-05-12 | 中兴通讯股份有限公司 | WiMAX terminal and starting method thereof |
US20130276120A1 (en) * | 2008-06-02 | 2013-10-17 | Gregory William Dalcher | System, method, and computer program product for determining whether a security status of data is known at a server |
US8301904B1 (en) | 2008-06-24 | 2012-10-30 | Mcafee, Inc. | System, method, and computer program product for automatically identifying potentially unwanted data as unwanted |
EP2157525B1 (en) * | 2008-08-21 | 2018-01-10 | Unify GmbH & Co. KG | Method for recognising malware |
US8627461B2 (en) | 2009-03-04 | 2014-01-07 | Mcafee, Inc. | System, method, and computer program product for verifying an identification of program information as unwanted |
CA2684225A1 (en) * | 2009-10-30 | 2011-04-30 | Ibm Canada Limited - Ibm Canada Limitee | Selective delta validation of a shared artifact |
US8719939B2 (en) * | 2009-12-31 | 2014-05-06 | Mcafee, Inc. | Malware detection via reputation system |
KR101138746B1 (en) * | 2010-03-05 | 2012-04-24 | 주식회사 안철수연구소 | Apparatus and method for preventing malicious codes using executive files |
US20140304702A1 (en) * | 2013-04-05 | 2014-10-09 | Carefusion 303, Inc. | Centralized System With Components and Features Hosting |
US20150154398A1 (en) * | 2013-12-03 | 2015-06-04 | International Business Machines Corporation | Optimizing virus scanning of files using file fingerprints |
EP4272098A1 (en) * | 2020-12-30 | 2023-11-08 | Virsec Systems, Inc. | Zero dwell time process library and script monitoring |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0697662A1 (en) * | 1994-08-15 | 1996-02-21 | International Business Machines Corporation | Method and system for advanced role-based access control in distributed and centralized computer systems |
US6092194A (en) * | 1996-11-08 | 2000-07-18 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
WO2000072149A1 (en) * | 1999-05-25 | 2000-11-30 | Motorola Inc. | Pre-verification of applications in mobile computing |
US20030041198A1 (en) * | 2001-08-23 | 2003-02-27 | International Business Machines Corporation | Authorization model for administration |
US20040078565A1 (en) * | 2002-10-21 | 2004-04-22 | Microsoft Corporation | Method for prompting a user to install and execute an unauthenticated computer application |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092124A (en) * | 1998-04-17 | 2000-07-18 | Nvidia Corporation | Method and apparatus for accelerating the rendering of images |
US6694434B1 (en) * | 1998-12-23 | 2004-02-17 | Entrust Technologies Limited | Method and apparatus for controlling program execution and program distribution |
US20030097409A1 (en) * | 2001-10-05 | 2003-05-22 | Hungchou Tsai | Systems and methods for securing computers |
US7673137B2 (en) * | 2002-01-04 | 2010-03-02 | International Business Machines Corporation | System and method for the managed security control of processes on a computer system |
US7464270B2 (en) * | 2003-07-23 | 2008-12-09 | Microsoft Corporation | Application identification and license enforcement |
-
2005
- 2005-05-18 WO PCT/US2005/017447 patent/WO2005114539A2/en active Application Filing
- 2005-05-18 US US11/132,610 patent/US8060867B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0697662A1 (en) * | 1994-08-15 | 1996-02-21 | International Business Machines Corporation | Method and system for advanced role-based access control in distributed and centralized computer systems |
US6092194A (en) * | 1996-11-08 | 2000-07-18 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
WO2000072149A1 (en) * | 1999-05-25 | 2000-11-30 | Motorola Inc. | Pre-verification of applications in mobile computing |
US20030041198A1 (en) * | 2001-08-23 | 2003-02-27 | International Business Machines Corporation | Authorization model for administration |
US20040078565A1 (en) * | 2002-10-21 | 2004-04-22 | Microsoft Corporation | Method for prompting a user to install and execute an unauthenticated computer application |
Non-Patent Citations (4)
Title |
---|
AXEL KOSSEL: "Feigenblätter fürs Web", C'T', no. 5/2003, 24 February 2003 (2003-02-24), ctrom 2003, XP002348589 * |
MICHAEL MÜLLER: "Funktionsumfang", PARENTS FRIEND HOMEPAGE, 13 February 2004 (2004-02-13), Web Archive, XP002348587, Retrieved from the Internet <URL:http://web.archive.org/web/20040213195920/http://www.parents-friend.de/pf.htm> [retrieved on 20051007] * |
PETER RECHENBERG / GUSTAV POMBERGER: "Informatik-Handbuch", 2002, CARL HANSER VERLAG, XP002348591 * |
URS MANSMANN: "Grosse Brüder", C'T', no. 20/2003, 22 September 2003 (2003-09-22), CTROM 2003, XP002348588 * |
Also Published As
Publication number | Publication date |
---|---|
US8060867B2 (en) | 2011-11-15 |
WO2005114539A2 (en) | 2005-12-01 |
US20050262576A1 (en) | 2005-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005114539A3 (en) | Systems and methods for excluding user specified applications | |
WO2006083669A3 (en) | Method and system for associating specific files with different applications | |
WO2008013634A3 (en) | File system replication | |
WO2008008765A3 (en) | Role-based access in a multi-customer computing environment | |
WO2006023877A3 (en) | Methods, systems, and apparatuses for extended enterprise commerce | |
WO2006115516A3 (en) | Rights elevator | |
WO2008068450A3 (en) | Improvements in resisting the spread of unwanted code and data | |
WO2006012317A3 (en) | Methods and systems for indexing files and adding associated metadata to index and metadata databases based upon the power state of a data processing device | |
WO2007065020A3 (en) | Multimedia systems, methods and applications | |
WO2006110521A3 (en) | Systems and methods for verifying trust of executable files | |
TW200627274A (en) | Management and use of data in a computer-generated document | |
WO2007126996A3 (en) | System and methods for enhanced metadata entry | |
WO2007074431A3 (en) | Method and apparatus for securing access to applications | |
WO2007137145A3 (en) | Certificate-based search | |
WO2006012318A3 (en) | Methods and systems for indexing files and adding associated metadata to index and metadata databases | |
MY163577A (en) | Techniques for generating and executing browser-hosted applications | |
WO2007103352A3 (en) | Systems and methods for document annotation | |
WO2007130675A3 (en) | Methods and systems for reporting regions of interest in content files | |
WO2012087824A3 (en) | Techniques for electronic aggregation of information | |
WO2011090883A3 (en) | Template-based management and organization of events and projects | |
BRPI0411217A (en) | composition, and method for forming an article | |
WO2008077150A3 (en) | Secure service computation | |
WO2005084240A3 (en) | Method and system for providing links to resources related to a specified resource | |
WO2009072620A1 (en) | Printing management system, printing management method, and program | |
WO2005008504A8 (en) | An executing automatically method using semiconductor storage devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |