WO2006017774A3 - Method for preventing virus infection in a computer - Google Patents

Method for preventing virus infection in a computer Download PDF

Info

Publication number
WO2006017774A3
WO2006017774A3 PCT/US2005/027969 US2005027969W WO2006017774A3 WO 2006017774 A3 WO2006017774 A3 WO 2006017774A3 US 2005027969 W US2005027969 W US 2005027969W WO 2006017774 A3 WO2006017774 A3 WO 2006017774A3
Authority
WO
WIPO (PCT)
Prior art keywords
computer
key
executable file
virus infection
preventing virus
Prior art date
Application number
PCT/US2005/027969
Other languages
French (fr)
Other versions
WO2006017774A2 (en
Inventor
Ken Steinberg
Original Assignee
Ken Steinberg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ken Steinberg filed Critical Ken Steinberg
Publication of WO2006017774A2 publication Critical patent/WO2006017774A2/en
Publication of WO2006017774A3 publication Critical patent/WO2006017774A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity

Abstract

A method for preventing virus infection in a computer. The method includes the following steps. First, receiving an executable file into the computer (29,28). Next, determining whether there is a key associated with the executable file. Following, if there is a key associated with the executable file, verifying (25) validity of the key. Finally, if the key is valid, processing (22) the executable file with a computational processing unit (CPU) of the computer. In some embodiments, if the key is invalid (27), the virus can be quarantined. In some embodiments, verified files are placed into an execution queue (24).
PCT/US2005/027969 2004-08-05 2005-08-05 Method for preventing virus infection in a computer WO2006017774A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/912,611 2004-08-05
US10/912,611 US7712135B2 (en) 2004-08-05 2004-08-05 Pre-emptive anti-virus protection of computing systems

Publications (2)

Publication Number Publication Date
WO2006017774A2 WO2006017774A2 (en) 2006-02-16
WO2006017774A3 true WO2006017774A3 (en) 2006-08-17

Family

ID=35759061

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/027969 WO2006017774A2 (en) 2004-08-05 2005-08-05 Method for preventing virus infection in a computer

Country Status (2)

Country Link
US (1) US7712135B2 (en)
WO (1) WO2006017774A2 (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006047163A2 (en) * 2004-10-26 2006-05-04 Priderock, L.L.C. System and method for identifying and removing malware on a computer system
US7698744B2 (en) 2004-12-03 2010-04-13 Whitecell Software Inc. Secure system for allowing the execution of authorized computer program code
US7810158B2 (en) * 2004-12-16 2010-10-05 At&T Intellectual Property I, L.P. Methods and systems for deceptively trapping electronic worms
US8554686B2 (en) * 2005-06-30 2013-10-08 Advanced Micro Devices, Inc. Anti-hack protection to restrict installation of operating systems and other software
WO2007035623A1 (en) * 2005-09-17 2007-03-29 Technology Group Northwest Inc. System and method for foiling code-injection attacks in a computing device
US7634262B1 (en) * 2006-03-07 2009-12-15 Trend Micro, Inc. Virus pattern update for mobile device
WO2008031055A2 (en) * 2006-09-07 2008-03-13 Black Lab Security Systems, Inc. Analyzing internal hard drives and continuously authenticating program files within microsoft operating system
CN101669322B (en) * 2007-05-08 2013-07-03 汤姆森特许公司 Method and apparatus for adjusting decryption keys
AU2008202532A1 (en) * 2007-06-18 2009-01-08 Pc Tools Technology Pty Ltd Method of detecting and blocking malicious activity
US8307443B2 (en) * 2007-09-28 2012-11-06 Microsoft Corporation Securing anti-virus software with virtualization
US8245289B2 (en) * 2007-11-09 2012-08-14 International Business Machines Corporation Methods and systems for preventing security breaches
US8337931B2 (en) * 2008-06-23 2012-12-25 Virun, Inc. Compositions containing non-polar compounds
US8151073B2 (en) * 2008-06-25 2012-04-03 Fac Systems Inc. Security system for computers
US7530106B1 (en) * 2008-07-02 2009-05-05 Kaspersky Lab, Zao System and method for security rating of computer processes
US8392379B2 (en) * 2009-03-17 2013-03-05 Sophos Plc Method and system for preemptive scanning of computer files
US8955108B2 (en) * 2009-06-17 2015-02-10 Microsoft Corporation Security virtual machine for advanced auditing
US20110004770A1 (en) * 2009-07-05 2011-01-06 Dejan Petkov Encryption system that prevents activation of computer viruses
US8353037B2 (en) 2009-12-03 2013-01-08 International Business Machines Corporation Mitigating malicious file propagation with progressive identifiers
US8707339B2 (en) * 2010-07-30 2014-04-22 CSC Holdings, LLC System and method for detecting hacked modems
US20120221530A1 (en) * 2011-02-24 2012-08-30 Karen Cook Method and apparatus for verifying stored data
DE102013226171A1 (en) * 2013-12-17 2015-07-02 Siemens Aktiengesellschaft Device and method for transmitting data
US9591022B2 (en) 2014-12-17 2017-03-07 The Boeing Company Computer defenses and counterattacks
JP6576676B2 (en) * 2015-04-24 2019-09-18 クラリオン株式会社 Information processing apparatus and information processing method
US10187421B2 (en) * 2016-06-06 2019-01-22 Paypal, Inc. Cyberattack prevention system
US11210396B2 (en) * 2017-08-25 2021-12-28 Drexel University Light-weight behavioral malware detection for windows platforms
US10819586B2 (en) 2018-10-17 2020-10-27 Servicenow, Inc. Functional discovery and mapping of serverless resources

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030023865A1 (en) * 2001-07-26 2003-01-30 Cowie Neil Andrew Detecting computer programs within packed computer files
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4977455B1 (en) * 1988-07-15 1993-04-13 System and process for vcr scheduling
CA2420426C (en) * 1990-09-10 2005-09-06 Starsight Telecast, Inc. User interface for television schedule system
US5504814A (en) 1991-07-10 1996-04-02 Hughes Aircraft Company Efficient security kernel for the 80960 extended architecture
US5563946A (en) * 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
WO1996017306A2 (en) * 1994-11-21 1996-06-06 Oracle Corporation Media server
US5623613A (en) * 1994-11-29 1997-04-22 Microsoft Corporation System for displaying programming information
US6052145A (en) * 1995-01-05 2000-04-18 Gemstar Development Corporation System and method for controlling the broadcast and recording of television programs and for distributing information to be displayed on a television screen
US5727061A (en) * 1995-02-13 1998-03-10 Eta Technologies Corporation Personal access management systems
US5828945A (en) * 1995-04-17 1998-10-27 Starsight Telecast, Inc. Merging multi-source information in a television system
US5818438A (en) * 1995-04-25 1998-10-06 Bellsouth Corporation System and method for providing television services
US5805763A (en) * 1995-05-05 1998-09-08 Microsoft Corporation System and method for automatically recording programs in an interactive viewing system
US5757915A (en) * 1995-08-25 1998-05-26 Intel Corporation Parameterized hash functions for access control
US5781228A (en) * 1995-09-07 1998-07-14 Microsoft Corporation Method and system for displaying an interactive program with intervening informational segments
US5819019A (en) * 1995-12-01 1998-10-06 Silicon Graphics, Inc. System/method for recovering network resources in a distributed environment, via registered callbacks
US5802284A (en) * 1995-12-13 1998-09-01 Silicon Graphics, Inc. System and method using cover bundles to provide immediate feedback to a user in an interactive television environment
KR100420974B1 (en) * 1996-03-15 2004-07-16 이 가이드, 인코포레이티드 Combination of VCR index and EPG
US6167520A (en) 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US6208335B1 (en) * 1997-01-13 2001-03-27 Diva Systems Corporation Method and apparatus for providing a menu structure for an interactive information distribution system
US5796952A (en) * 1997-03-21 1998-08-18 Dot Com Development, Inc. Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
US5974549A (en) 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6185678B1 (en) 1997-10-02 2001-02-06 Trustees Of The University Of Pennsylvania Secure and reliable bootstrap architecture
FR2780177B1 (en) * 1998-06-17 2001-10-05 Schlumberger Ind Sa SOFTWARE PROTECTION SYSTEM
CN1867068A (en) * 1998-07-14 2006-11-22 联合视频制品公司 Client-server based interactive television program guide system with remote server recording
US6820278B1 (en) * 1998-07-23 2004-11-16 United Video Properties, Inc. Cooperative television application system having multiple user television equipment devices
US6324338B1 (en) * 1998-08-07 2001-11-27 Replaytv, Inc. Video data recorder with integrated channel guides
US6330670B1 (en) 1998-10-26 2001-12-11 Microsoft Corporation Digital rights management operating system
US6567917B1 (en) * 1999-02-01 2003-05-20 Cisco Technology, Inc. Method and system for providing tamper-resistant executable software
US6658571B1 (en) 1999-02-09 2003-12-02 Secure Computing Corporation Security framework for dynamically wrapping software applications executing in a computing system
US6735700B1 (en) * 2000-01-11 2004-05-11 Network Associates Technology, Inc. Fast virus scanning using session stamping
US6934964B1 (en) * 2000-02-08 2005-08-23 Koninklijke Philips Electronics N.V. Electronic program guide viewing history generator method and system
US6760441B1 (en) 2000-03-31 2004-07-06 Intel Corporation Generating a key hieararchy for use in an isolated execution environment
US7137117B2 (en) * 2000-06-02 2006-11-14 Microsoft Corporation Dynamically variable idle time thread scheduling
US7350204B2 (en) 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US6938157B2 (en) 2000-08-18 2005-08-30 Jonathan C. Kaplan Distributed information system and protocol for affixing electronic signatures and authenticating documents
CA2420290C (en) * 2000-08-21 2009-04-21 Igt Method and apparatus for software authentication
US7130302B2 (en) * 2000-12-28 2006-10-31 International Business Machines Corporation Self-route expandable multi-memory packet switch
US7418737B2 (en) * 2001-06-13 2008-08-26 Mcafee, Inc. Encrypted data file transmission
WO2003058451A1 (en) * 2002-01-04 2003-07-17 Internet Security Systems, Inc. System and method for the managed security control of processes on a computer system
US7392376B2 (en) * 2002-12-30 2008-06-24 International Business Machines Corporation Security module
US7570766B2 (en) * 2002-03-01 2009-08-04 Intel Corporation Transparently embedding non-compliant data in a data stream
US7350081B1 (en) * 2002-04-29 2008-03-25 Best Robert M Secure execution of downloaded software
US7797744B2 (en) 2002-06-17 2010-09-14 At&T Intellectual Property Ii, L.P. Method and device for detecting computer intrusion
US7823203B2 (en) 2002-06-17 2010-10-26 At&T Intellectual Property Ii, L.P. Method and device for detecting computer network intrusions
US7284277B2 (en) * 2002-07-15 2007-10-16 Hewlett-Packard Development Company, L.P. Secured printing
GB0223692D0 (en) * 2002-10-11 2002-11-20 Multiplex Photonics Ltd Apparatus and method of encoding and decoding information
US7165076B2 (en) * 2002-11-15 2007-01-16 Check Point Software Technologies, Inc. Security system with methodology for computing unique security signature for executable file employed across different machines
US7603704B2 (en) 2002-12-19 2009-10-13 Massachusetts Institute Of Technology Secure execution of a computer program using a code cache
US20050004873A1 (en) * 2003-02-03 2005-01-06 Robin Pou Distribution and rights management of digital content
US20050108562A1 (en) 2003-06-18 2005-05-19 Khazan Roger I. Technique for detecting executable malicious code using a combination of static and dynamic analyses
US7100205B2 (en) 2003-10-22 2006-08-29 The United States Of America As Represented By The Secretary Of The Navy Secure attention instruction central processing unit and system architecture

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software
US20030023865A1 (en) * 2001-07-26 2003-01-30 Cowie Neil Andrew Detecting computer programs within packed computer files

Also Published As

Publication number Publication date
US7712135B2 (en) 2010-05-04
US20060031937A1 (en) 2006-02-09
WO2006017774A2 (en) 2006-02-16

Similar Documents

Publication Publication Date Title
WO2006017774A3 (en) Method for preventing virus infection in a computer
US8087086B1 (en) Method for mitigating false positive generation in antivirus software
WO2003102745A3 (en) Trusted client utilizing security kernel under secure execution mode
EP2441026B1 (en) Anti-virus trusted files database
RU2005108284A (en) METHOD AND SYSTEM FOR RESTRICTING UPDATES OF SOFTWARE
WO2006024816A3 (en) Data certification methods and apparatus
EP1975836A3 (en) Server active management technology (AMT) assisted secure boot
EP1253502A3 (en) Trusted computer system
WO2003090050A3 (en) System and method for detecting malicicous code
WO2008038196A3 (en) Protecting interfaces on processor architectures
WO2007004219A3 (en) System, device and method of verifying that a code is executed by a processor
WO2002033525A3 (en) A method and system for detecting rogue software
EP1273996A3 (en) Secure bootloader for securing digital devices
NO20023964L (en) Controlling a computer program's access to a resource using a digital signature
WO2007061671A3 (en) Systems and methods for detecting and disabling malicious script code
WO2006019726A3 (en) System and method for detecting computer virus
WO2008060828A3 (en) Method and system for authenticating a widget
WO2007077362A3 (en) Method for authenticating applications of a computer system
WO2008054732A3 (en) Virus localization using cryptographic hashing
WO2008078366A1 (en) Data verifying device, data verifying method, and data verifying program
EP1435557A3 (en) Restricted access of applications to hardware resources
WO2004097602A3 (en) A method of, and system for, heuristically determining that an unknown file is harmless by using traffic heuristics
WO2004079483A3 (en) Method and apparatus for authorizing execution for applications in a data processing system
CN1329828C (en) Method and device for preventing computer virus
EP1315067A3 (en) Method and system for using a virus free file certificate

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase