| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| GB0510762AGB2411748B (en) | 2000-05-28 | 2001-05-28 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| GB0510759AGB2411747B (en) | 2000-05-28 | 2001-05-28 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| GB0506281AGB2411988B (en) | 2000-05-28 | 2005-03-29 | System and method for comprehensive general generic protection for computers against malicious programs that may stael information and/or cause damages | 
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| IL13641400 | 2000-05-28 | ||
| US20959300P | 2000-06-06 | 2000-06-06 | |
| US28401901P | 2001-04-15 | 2001-04-15 | |
| PCT/IL2001/000487WO2001092981A2 (en) | 2000-05-28 | 2001-05-28 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| Publication Number | Publication Date | 
|---|---|
| GB0230154D0 GB0230154D0 (en) | 2003-02-05 | 
| GB2380303A GB2380303A (en) | 2003-04-02 | 
| GB2380303Btrue GB2380303B (en) | 2005-09-14 | 
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| GB0230154AExpired - LifetimeGB2380303B (en) | 2000-05-28 | 2001-05-28 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| GB0506281AExpired - LifetimeGB2411988B (en) | 2000-05-28 | 2005-03-29 | System and method for comprehensive general generic protection for computers against malicious programs that may stael information and/or cause damages | 
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| GB0506281AExpired - LifetimeGB2411988B (en) | 2000-05-28 | 2005-03-29 | System and method for comprehensive general generic protection for computers against malicious programs that may stael information and/or cause damages | 
| Country | Link | 
|---|---|
| EP (1) | EP1305688A2 (en) | 
| JP (1) | JP2003535414A (en) | 
| CN (1) | CN1444742A (en) | 
| AU (1) | AU6263201A (en) | 
| CA (1) | CA2424352A1 (en) | 
| GB (2) | GB2380303B (en) | 
| WO (1) | WO2001092981A2 (en) | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| GB2404262B (en)* | 2003-06-19 | 2008-03-05 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| US20030159070A1 (en)* | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| US7613930B2 (en) | 2001-01-19 | 2009-11-03 | Trustware International Limited | Method for protecting computer programs and data from hostile code | 
| EP1225513A1 (en) | 2001-01-19 | 2002-07-24 | Eyal Dotan | Method for protecting computer programs and data from hostile code | 
| US7028305B2 (en) | 2001-05-16 | 2006-04-11 | Softricity, Inc. | Operating system abstraction and protection layer | 
| JP2004126854A (en)* | 2002-10-01 | 2004-04-22 | Mitsubishi Electric Corp | Attack countermeasure device | 
| US7793346B1 (en) | 2003-01-17 | 2010-09-07 | Mcafee, Inc. | System, method, and computer program product for preventing trojan communication | 
| WO2004075060A1 (en)* | 2003-02-21 | 2004-09-02 | Tabei, Hikaru | Computer virus detection device | 
| WO2004102326A2 (en)* | 2003-05-07 | 2004-11-25 | Linuxcare, Inc. | Detection and alerting of viruses in a shared read-only file system | 
| US7188127B2 (en) | 2003-10-07 | 2007-03-06 | International Business Machines Corporation | Method, system, and program for processing a file request | 
| US7730318B2 (en)* | 2003-10-24 | 2010-06-01 | Microsoft Corporation | Integration of high-assurance features into an application through application factoring | 
| US20050091658A1 (en)* | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Operating system resource protection | 
| US8332943B2 (en) | 2004-02-17 | 2012-12-11 | Microsoft Corporation | Tiered object-related trust decisions | 
| US7111246B2 (en)* | 2004-02-17 | 2006-09-19 | Microsoft Corporation | User interface accorded to tiered object-related trust decisions | 
| KR100596135B1 (en)* | 2004-02-24 | 2006-07-03 | 소프트캠프(주) | Access Control System for Each Application Using Virtual Disk and Its Control Method | 
| US7406606B2 (en)* | 2004-04-08 | 2008-07-29 | International Business Machines Corporation | Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis | 
| US20050259678A1 (en)* | 2004-05-21 | 2005-11-24 | Gaur Daniel R | Network interface controller circuitry | 
| US20060041940A1 (en)* | 2004-08-21 | 2006-02-23 | Ko-Cheng Fang | Computer data protecting method | 
| JP4638494B2 (en)* | 2004-08-21 | 2011-02-23 | ファン・コ−チェン | Computer data protection methods | 
| CN100461091C (en)* | 2004-08-24 | 2009-02-11 | 华盛顿大学 | Method and system for content detection with reconfigurable hardware | 
| US7587594B1 (en) | 2004-08-30 | 2009-09-08 | Microsoft Corporation | Dynamic out-of-process software components isolation for trustworthiness execution | 
| US7690033B2 (en) | 2004-09-28 | 2010-03-30 | Exobox Technologies Corp. | Electronic computer system secured from unauthorized access to and manipulation of data | 
| JP4688472B2 (en)* | 2004-11-01 | 2011-05-25 | 株式会社エヌ・ティ・ティ・ドコモ | Terminal control apparatus and terminal control method | 
| US7478237B2 (en)* | 2004-11-08 | 2009-01-13 | Microsoft Corporation | System and method of allowing user mode applications with access to file data | 
| US7712086B2 (en)* | 2004-12-15 | 2010-05-04 | Microsoft Corporation | Portable applications | 
| US7654590B2 (en) | 2005-01-04 | 2010-02-02 | Illinois Tool Works, Inc. | Magnetic appliance latch | 
| US7490352B2 (en)* | 2005-04-07 | 2009-02-10 | Microsoft Corporation | Systems and methods for verifying trust of executable files | 
| DE602005017585D1 (en) | 2005-04-18 | 2009-12-24 | Research In Motion Ltd | Method and system for detecting malicious wireless applications | 
| US7665098B2 (en) | 2005-04-29 | 2010-02-16 | Microsoft Corporation | System and method for monitoring interactions between application programs and data stores | 
| CN100346252C (en)* | 2005-09-28 | 2007-10-31 | 珠海金山软件股份有限公司 | Computer software security loophole repairing apparatus and method | 
| US7917487B2 (en) | 2005-12-13 | 2011-03-29 | Microsoft Corporation | Portable application registry | 
| CN1909453B (en)* | 2006-08-22 | 2011-04-20 | 深圳市深信服电子科技有限公司 | Gateway/bridge based spy software invading-proof method | 
| US7870336B2 (en) | 2006-11-03 | 2011-01-11 | Microsoft Corporation | Operating system protection against side-channel attacks on secrecy | 
| US20100071063A1 (en)* | 2006-11-29 | 2010-03-18 | Wisconsin Alumni Research Foundation | System for automatic detection of spyware | 
| EP2015212A1 (en)* | 2007-06-29 | 2009-01-14 | Axalto SA | Portable mass storage device with hooking process | 
| CN101370305B (en)* | 2008-09-23 | 2011-10-26 | 中兴通讯股份有限公司 | Method and system for protecting data traffic security | 
| US8719901B2 (en)* | 2008-10-24 | 2014-05-06 | Synopsys, Inc. | Secure consultation system | 
| US8695090B2 (en)* | 2008-10-31 | 2014-04-08 | Symantec Corporation | Data loss protection through application data access classification | 
| US8850428B2 (en) | 2009-11-12 | 2014-09-30 | Trustware International Limited | User transparent virtualization method for protecting computer programs and data from hostile code | 
| US9311482B2 (en)* | 2010-11-01 | 2016-04-12 | CounterTack, Inc. | Inoculator and antibody for computer security | 
| US20130067578A1 (en)* | 2011-09-08 | 2013-03-14 | Mcafee, Inc. | Malware Risk Scanner | 
| US9043918B2 (en)* | 2011-10-13 | 2015-05-26 | Mcafee, Inc. | System and method for profile based filtering of outgoing information in a mobile environment | 
| RU2477520C1 (en) | 2012-03-14 | 2013-03-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for device configuration-based dynamic adaptation of antivirus application functional | 
| US8732834B2 (en)* | 2012-09-05 | 2014-05-20 | Symantec Corporation | Systems and methods for detecting illegitimate applications | 
| CN105229652A (en)* | 2013-03-28 | 2016-01-06 | 爱迪德技术有限公司 | Detect the utilization for software application | 
| CN103729937A (en)* | 2013-12-20 | 2014-04-16 | 广西科技大学 | Electric vehicle charging and billing monitor system | 
| CN103906045B (en)* | 2013-12-25 | 2017-12-22 | 武汉安天信息技术有限责任公司 | A kind of monitoring method and system of mobile terminal privacy taking and carring away | 
| CN105162620B (en)* | 2015-08-04 | 2018-11-27 | 南京百敖软件有限公司 | A method of realizing system monitoring under different framework | 
| US10303878B2 (en)* | 2016-01-22 | 2019-05-28 | Yu-Liang Wu | Methods and apparatus for automatic detection and elimination of functional hardware trojans in IC designs | 
| CN106020874A (en)* | 2016-05-13 | 2016-10-12 | 北京金山安全软件有限公司 | Data reporting method and device and terminal equipment | 
| CN106598866A (en)* | 2016-12-22 | 2017-04-26 | 合肥国信车联网研究院有限公司 | smali intermediate language-based static detection system and method | 
| CN106599708A (en)* | 2017-02-21 | 2017-04-26 | 柳州桂通科技股份有限公司 | Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof | 
| KR102405752B1 (en)* | 2017-08-23 | 2022-06-08 | 삼성전자주식회사 | Method for controlling the permission of application program and electronic device | 
| CN108217349B (en)* | 2017-12-06 | 2020-10-13 | 上海新时达电气股份有限公司 | Elevator pre-authorization control system and debugging method | 
| CN108345522B (en)* | 2017-12-15 | 2019-03-29 | 清华大学 | For carrying out the methods, devices and systems of safety detection to central processor CPU | 
| US10742483B2 (en) | 2018-05-16 | 2020-08-11 | At&T Intellectual Property I, L.P. | Network fault originator identification for virtual network infrastructure | 
| WO2020002030A1 (en)* | 2018-06-26 | 2020-01-02 | Siemens Aktiengesellschaft | Method and system for determining an appropriate installation location for an application to be installed in a distributed network environment | 
| DE102018120344B4 (en)* | 2018-08-21 | 2024-11-21 | Pilz Gmbh & Co. Kg | Automation system for monitoring a safety-critical process | 
| EP3623886A1 (en)* | 2018-09-17 | 2020-03-18 | Siemens Aktiengesellschaft | Method for managing a production process, and computer program for carrying out the method and electronically readable data carrier | 
| DE102020114199A1 (en) | 2020-05-27 | 2021-12-02 | Basler Aktiengesellschaft | Protection of computer systems against manipulation and functional anomalies | 
| CN112600757B (en)* | 2020-12-25 | 2023-03-10 | 深圳深度探测科技有限公司 | Safety maintenance method based on asymmetric data transmission speed limiter | 
| WO2022238990A1 (en)* | 2021-05-12 | 2022-11-17 | Red Bend Ltd. | Detecting and mitigating bluetooth based attacks | 
| CN114821314B (en)* | 2022-04-19 | 2024-03-08 | 中铁建设集团有限公司 | Airport pavement anomaly detection method based on machine vision | 
| CN118659935A (en)* | 2024-08-20 | 2024-09-17 | 潍坊众索信息技术有限公司 | A computer abnormal login detection method and system | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US5440723A (en)* | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks | 
| US5684875A (en)* | 1994-10-21 | 1997-11-04 | Ellenberger; Hans | Method and apparatus for detecting a computer virus on a computer | 
| US5765030A (en)* | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution | 
| US5832208A (en)* | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers | 
| WO2000016200A1 (en)* | 1998-09-10 | 2000-03-23 | Sanctum Ltd. | Method and system for maintaining restricted operating environments for application programs or operating systems | 
| US6105072A (en)* | 1993-08-10 | 2000-08-15 | Fischer; Addison M. | Method and apparatus for validating travelling object-oriented programs with digital signatures | 
| US6108799A (en)* | 1997-11-21 | 2000-08-22 | International Business Machines Corporation | Automated sample creation of polymorphic and non-polymorphic marcro viruses | 
| US6256773B1 (en)* | 1999-08-31 | 2001-07-03 | Accenture Llp | System, method and article of manufacture for configuration management in a development architecture framework | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US5440723A (en)* | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks | 
| US6105072A (en)* | 1993-08-10 | 2000-08-15 | Fischer; Addison M. | Method and apparatus for validating travelling object-oriented programs with digital signatures | 
| US5684875A (en)* | 1994-10-21 | 1997-11-04 | Ellenberger; Hans | Method and apparatus for detecting a computer virus on a computer | 
| US5765030A (en)* | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution | 
| US5832208A (en)* | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers | 
| US6108799A (en)* | 1997-11-21 | 2000-08-22 | International Business Machines Corporation | Automated sample creation of polymorphic and non-polymorphic marcro viruses | 
| WO2000016200A1 (en)* | 1998-09-10 | 2000-03-23 | Sanctum Ltd. | Method and system for maintaining restricted operating environments for application programs or operating systems | 
| US6256773B1 (en)* | 1999-08-31 | 2001-07-03 | Accenture Llp | System, method and article of manufacture for configuration management in a development architecture framework | 
| Publication number | Publication date | 
|---|---|
| WO2001092981A3 (en) | 2002-04-25 | 
| AU6263201A (en) | 2001-12-11 | 
| CA2424352A1 (en) | 2001-12-06 | 
| JP2003535414A (en) | 2003-11-25 | 
| GB2411988A (en) | 2005-09-14 | 
| WO2001092981A2 (en) | 2001-12-06 | 
| CN1444742A (en) | 2003-09-24 | 
| EP1305688A2 (en) | 2003-05-02 | 
| GB2411988B (en) | 2005-10-19 | 
| GB2380303A (en) | 2003-04-02 | 
| GB0230154D0 (en) | 2003-02-05 | 
| GB0506281D0 (en) | 2005-05-04 | 
| HK1084739A1 (en) | 2006-08-04 | 
| HK1084738A1 (en) | 2006-08-04 | 
| Publication | Publication Date | Title | 
|---|---|---|
| GB2380303B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| GB2391650B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| WO2003046700A8 (en) | Method and system for protecting data from unauthorized disclosure | |
| AU2002349217A1 (en) | Secure method and system for computer protection | |
| AU2002305649A1 (en) | Biometric detection system and method preventing unauthorized use | |
| AU2001249511A1 (en) | Authentication method and schemes for data integrity protection | |
| GB0208892D0 (en) | Computer security system and method | |
| AU1430401A (en) | System and method for detecting computer intrusions | |
| AU4794101A (en) | Method and apparatus for computer memory protection and verification | |
| AU2002239500A1 (en) | Cryptographic data security system and method | |
| AU6107600A (en) | System and method for computer security | |
| AU2001241972A1 (en) | Conditional access system and method for prevention of replay attacks | |
| EP1609070A4 (en) | Security system and method for computer operating systems | |
| GB2369205B (en) | Personal data device and protection system and method for storing and protecting personal data | |
| AU2002364005A8 (en) | A system and method for preventing unauthorized use of protected software utilizing a portable security device | |
| AU2001273437A1 (en) | Method for protecting the privacy, security, and integrity of sensitive data | |
| GB2404262B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| EP1471405A4 (en) | Method and device for protecting information against unauthorised use | |
| GB0020499D0 (en) | System and method for enhancing data security | |
| GB2411748B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| HK1084739B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| HK1084738B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| HK1094358A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| AU2002218644A1 (en) | Enhance authorization system and method for computer security | |
| AU2002357252A8 (en) | System and method for detecting deception | 
| Date | Code | Title | Description | 
|---|---|---|---|
| 732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) | ||
| PCNP | Patent ceased through non-payment of renewal fee | Effective date:20090528 | |
| S28 | Restoration of ceased patents (sect. 28/pat. act 1977) | Free format text:APPLICATION FILED | |
| S28 | Restoration of ceased patents (sect. 28/pat. act 1977) | Free format text:RESTORATION ALLOWED Effective date:20110328 | |
| 732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) | Free format text:REGISTERED BETWEEN 20190307 AND 20190313 | |
| PE20 | Patent expired after termination of 20 years | Expiry date:20210527 |