WO2005114539A3 - Systems and methods for excluding user specified applications - Google Patents

Systems and methods for excluding user specified applications Download PDF

Info

Publication number
WO2005114539A3
WO2005114539A3 PCT/US2005/017447 US2005017447W WO2005114539A3 WO 2005114539 A3 WO2005114539 A3 WO 2005114539A3 US 2005017447 W US2005017447 W US 2005017447W WO 2005114539 A3 WO2005114539 A3 WO 2005114539A3
Authority
WO
WIPO (PCT)
Prior art keywords
systems
methods
user specified
executed
file
Prior art date
Application number
PCT/US2005/017447
Other languages
French (fr)
Other versions
WO2005114539A2 (en
Inventor
Paul Gassoway
Original Assignee
Computer Ass Think Inc
Paul Gassoway
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Computer Ass Think Inc, Paul Gassoway filed Critical Computer Ass Think Inc
Publication of WO2005114539A2 publication Critical patent/WO2005114539A2/en
Publication of WO2005114539A3 publication Critical patent/WO2005114539A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

A method for blocking the execution of prohibited files, includes requesting execution of a file to be executed, identifying the file to be executed, comparing the identified file to be executed to a list of files that are prohibited and executing the identified file to be executed when the identified file to be executed does not match a file listed in the list of files that are prohibited.
PCT/US2005/017447 2004-05-20 2005-05-18 Systems and methods for excluding user specified applications WO2005114539A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US57298404P 2004-05-20 2004-05-20
US60/572,984 2004-05-20

Publications (2)

Publication Number Publication Date
WO2005114539A2 WO2005114539A2 (en) 2005-12-01
WO2005114539A3 true WO2005114539A3 (en) 2006-04-27

Family

ID=34979556

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/017447 WO2005114539A2 (en) 2004-05-20 2005-05-18 Systems and methods for excluding user specified applications

Country Status (2)

Country Link
US (1) US8060867B2 (en)
WO (1) WO2005114539A2 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7882561B2 (en) 2005-01-31 2011-02-01 Microsoft Corporation System and method of caching decisions on when to scan for malware
US8838974B2 (en) * 2005-07-15 2014-09-16 The Mathworks, Inc. System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US7716739B1 (en) * 2005-07-20 2010-05-11 Symantec Corporation Subjective and statistical event tracking incident management system
US8001602B2 (en) * 2005-10-31 2011-08-16 Freescale Semiconductor, Inc. Data scan mechanism
US20080104016A1 (en) * 2006-10-30 2008-05-01 Susan Handayani Putri Atmaja Method and system for comparing data
US8590039B1 (en) 2007-11-28 2013-11-19 Mcafee, Inc. System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature
US7392544B1 (en) * 2007-12-18 2008-06-24 Kaspersky Lab, Zao Method and system for anti-malware scanning with variable scan settings
US9306796B1 (en) 2008-03-18 2016-04-05 Mcafee, Inc. System, method, and computer program product for dynamically configuring a virtual environment for identifying unwanted data
CN101299849B (en) * 2008-04-25 2010-05-12 中兴通讯股份有限公司 WiMAX terminal and starting method thereof
US20130276120A1 (en) * 2008-06-02 2013-10-17 Gregory William Dalcher System, method, and computer program product for determining whether a security status of data is known at a server
US8301904B1 (en) 2008-06-24 2012-10-30 Mcafee, Inc. System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
EP2157525B1 (en) * 2008-08-21 2018-01-10 Unify GmbH & Co. KG Method for recognising malware
US8627461B2 (en) 2009-03-04 2014-01-07 Mcafee, Inc. System, method, and computer program product for verifying an identification of program information as unwanted
CA2684225A1 (en) * 2009-10-30 2011-04-30 Ibm Canada Limited - Ibm Canada Limitee Selective delta validation of a shared artifact
US8719939B2 (en) * 2009-12-31 2014-05-06 Mcafee, Inc. Malware detection via reputation system
KR101138746B1 (en) * 2010-03-05 2012-04-24 주식회사 안철수연구소 Apparatus and method for preventing malicious codes using executive files
US20140304702A1 (en) * 2013-04-05 2014-10-09 Carefusion 303, Inc. Centralized System With Components and Features Hosting
US20150154398A1 (en) * 2013-12-03 2015-06-04 International Business Machines Corporation Optimizing virus scanning of files using file fingerprints
EP4272098A1 (en) * 2020-12-30 2023-11-08 Virsec Systems, Inc. Zero dwell time process library and script monitoring

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0697662A1 (en) * 1994-08-15 1996-02-21 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
US6092194A (en) * 1996-11-08 2000-07-18 Finjan Software, Ltd. System and method for protecting a computer and a network from hostile downloadables
WO2000072149A1 (en) * 1999-05-25 2000-11-30 Motorola Inc. Pre-verification of applications in mobile computing
US20030041198A1 (en) * 2001-08-23 2003-02-27 International Business Machines Corporation Authorization model for administration
US20040078565A1 (en) * 2002-10-21 2004-04-22 Microsoft Corporation Method for prompting a user to install and execute an unauthenticated computer application

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6092124A (en) * 1998-04-17 2000-07-18 Nvidia Corporation Method and apparatus for accelerating the rendering of images
US6694434B1 (en) * 1998-12-23 2004-02-17 Entrust Technologies Limited Method and apparatus for controlling program execution and program distribution
US20030097409A1 (en) * 2001-10-05 2003-05-22 Hungchou Tsai Systems and methods for securing computers
US7673137B2 (en) * 2002-01-04 2010-03-02 International Business Machines Corporation System and method for the managed security control of processes on a computer system
US7464270B2 (en) * 2003-07-23 2008-12-09 Microsoft Corporation Application identification and license enforcement

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0697662A1 (en) * 1994-08-15 1996-02-21 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
US6092194A (en) * 1996-11-08 2000-07-18 Finjan Software, Ltd. System and method for protecting a computer and a network from hostile downloadables
WO2000072149A1 (en) * 1999-05-25 2000-11-30 Motorola Inc. Pre-verification of applications in mobile computing
US20030041198A1 (en) * 2001-08-23 2003-02-27 International Business Machines Corporation Authorization model for administration
US20040078565A1 (en) * 2002-10-21 2004-04-22 Microsoft Corporation Method for prompting a user to install and execute an unauthenticated computer application

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
AXEL KOSSEL: "Feigenblätter fürs Web", C'T', no. 5/2003, 24 February 2003 (2003-02-24), ctrom 2003, XP002348589 *
MICHAEL MÜLLER: "Funktionsumfang", PARENTS FRIEND HOMEPAGE, 13 February 2004 (2004-02-13), Web Archive, XP002348587, Retrieved from the Internet <URL:http://web.archive.org/web/20040213195920/http://www.parents-friend.de/pf.htm> [retrieved on 20051007] *
PETER RECHENBERG / GUSTAV POMBERGER: "Informatik-Handbuch", 2002, CARL HANSER VERLAG, XP002348591 *
URS MANSMANN: "Grosse Brüder", C'T', no. 20/2003, 22 September 2003 (2003-09-22), CTROM 2003, XP002348588 *

Also Published As

Publication number Publication date
US8060867B2 (en) 2011-11-15
WO2005114539A2 (en) 2005-12-01
US20050262576A1 (en) 2005-11-24

Similar Documents

Publication Publication Date Title
WO2005114539A3 (en) Systems and methods for excluding user specified applications
WO2006083669A3 (en) Method and system for associating specific files with different applications
WO2008013634A3 (en) File system replication
WO2008008765A3 (en) Role-based access in a multi-customer computing environment
WO2006023877A3 (en) Methods, systems, and apparatuses for extended enterprise commerce
WO2006115516A3 (en) Rights elevator
WO2008068450A3 (en) Improvements in resisting the spread of unwanted code and data
WO2006012317A3 (en) Methods and systems for indexing files and adding associated metadata to index and metadata databases based upon the power state of a data processing device
WO2007065020A3 (en) Multimedia systems, methods and applications
WO2006110521A3 (en) Systems and methods for verifying trust of executable files
TW200627274A (en) Management and use of data in a computer-generated document
WO2007126996A3 (en) System and methods for enhanced metadata entry
WO2007074431A3 (en) Method and apparatus for securing access to applications
WO2007137145A3 (en) Certificate-based search
WO2006012318A3 (en) Methods and systems for indexing files and adding associated metadata to index and metadata databases
MY163577A (en) Techniques for generating and executing browser-hosted applications
WO2007103352A3 (en) Systems and methods for document annotation
WO2007130675A3 (en) Methods and systems for reporting regions of interest in content files
WO2012087824A3 (en) Techniques for electronic aggregation of information
WO2011090883A3 (en) Template-based management and organization of events and projects
BRPI0411217A (en) composition, and method for forming an article
WO2008077150A3 (en) Secure service computation
WO2005084240A3 (en) Method and system for providing links to resources related to a specified resource
WO2009072620A1 (en) Printing management system, printing management method, and program
WO2005008504A8 (en) An executing automatically method using semiconductor storage devices

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase