Movatterモバイル変換


[0]ホーム

URL:


GB2380303B - System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages - Google Patents

System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages

Info

Publication number
GB2380303B
GB2380303BGB0230154AGB0230154AGB2380303BGB 2380303 BGB2380303 BGB 2380303BGB 0230154 AGB0230154 AGB 0230154AGB 0230154 AGB0230154 AGB 0230154AGB 2380303 BGB2380303 BGB 2380303B
Authority
GB
United Kingdom
Prior art keywords
cause damages
malicious programs
against malicious
steal information
comprehensive general
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
GB0230154A
Other versions
GB2380303A (en
GB0230154D0 (en
Inventor
Yaron Mayer
Zak Dechovich
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SECUREOL
Original Assignee
SECUREOL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SECUREOLfiledCriticalSECUREOL
Priority to GB0510762ApriorityCriticalpatent/GB2411748B/en
Priority to GB0510759Aprioritypatent/GB2411747B/en
Publication of GB0230154D0publicationCriticalpatent/GB0230154D0/en
Publication of GB2380303ApublicationCriticalpatent/GB2380303A/en
Priority to GB0506281Aprioritypatent/GB2411988B/en
Application grantedgrantedCritical
Publication of GB2380303BpublicationCriticalpatent/GB2380303B/en
Anticipated expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Classifications

Landscapes

GB0230154A2000-05-282001-05-28System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damagesExpired - LifetimeGB2380303B (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
GB0510762AGB2411748B (en)2000-05-282001-05-28System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
GB0510759AGB2411747B (en)2000-05-282001-05-28System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
GB0506281AGB2411988B (en)2000-05-282005-03-29System and method for comprehensive general generic protection for computers against malicious programs that may stael information and/or cause damages

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
IL136414002000-05-28
US20959300P2000-06-062000-06-06
US28401901P2001-04-152001-04-15
PCT/IL2001/000487WO2001092981A2 (en)2000-05-282001-05-28System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages

Publications (3)

Publication NumberPublication Date
GB0230154D0 GB0230154D0 (en)2003-02-05
GB2380303A GB2380303A (en)2003-04-02
GB2380303Btrue GB2380303B (en)2005-09-14

Family

ID=27271933

Family Applications (2)

Application NumberTitlePriority DateFiling Date
GB0230154AExpired - LifetimeGB2380303B (en)2000-05-282001-05-28System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
GB0506281AExpired - LifetimeGB2411988B (en)2000-05-282005-03-29System and method for comprehensive general generic protection for computers against malicious programs that may stael information and/or cause damages

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
GB0506281AExpired - LifetimeGB2411988B (en)2000-05-282005-03-29System and method for comprehensive general generic protection for computers against malicious programs that may stael information and/or cause damages

Country Status (7)

CountryLink
EP (1)EP1305688A2 (en)
JP (1)JP2003535414A (en)
CN (1)CN1444742A (en)
AU (1)AU6263201A (en)
CA (1)CA2424352A1 (en)
GB (2)GB2380303B (en)
WO (1)WO2001092981A2 (en)

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2404262B (en)*2003-06-192008-03-05Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20030159070A1 (en)*2001-05-282003-08-21Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US7613930B2 (en)2001-01-192009-11-03Trustware International LimitedMethod for protecting computer programs and data from hostile code
EP1225513A1 (en)2001-01-192002-07-24Eyal DotanMethod for protecting computer programs and data from hostile code
US7028305B2 (en)2001-05-162006-04-11Softricity, Inc.Operating system abstraction and protection layer
JP2004126854A (en)*2002-10-012004-04-22Mitsubishi Electric Corp Attack countermeasure device
US7793346B1 (en)2003-01-172010-09-07Mcafee, Inc.System, method, and computer program product for preventing trojan communication
WO2004075060A1 (en)*2003-02-212004-09-02Tabei, HikaruComputer virus detection device
WO2004102326A2 (en)*2003-05-072004-11-25Linuxcare, Inc.Detection and alerting of viruses in a shared read-only file system
US7188127B2 (en)2003-10-072007-03-06International Business Machines CorporationMethod, system, and program for processing a file request
US7730318B2 (en)*2003-10-242010-06-01Microsoft CorporationIntegration of high-assurance features into an application through application factoring
US20050091658A1 (en)*2003-10-242005-04-28Microsoft CorporationOperating system resource protection
US8332943B2 (en)2004-02-172012-12-11Microsoft CorporationTiered object-related trust decisions
US7111246B2 (en)*2004-02-172006-09-19Microsoft CorporationUser interface accorded to tiered object-related trust decisions
KR100596135B1 (en)*2004-02-242006-07-03소프트캠프(주) Access Control System for Each Application Using Virtual Disk and Its Control Method
US7406606B2 (en)*2004-04-082008-07-29International Business Machines CorporationMethod and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
US20050259678A1 (en)*2004-05-212005-11-24Gaur Daniel RNetwork interface controller circuitry
US20060041940A1 (en)*2004-08-212006-02-23Ko-Cheng FangComputer data protecting method
JP4638494B2 (en)*2004-08-212011-02-23ファン・コ−チェン Computer data protection methods
CN100461091C (en)*2004-08-242009-02-11华盛顿大学 Method and system for content detection with reconfigurable hardware
US7587594B1 (en)2004-08-302009-09-08Microsoft CorporationDynamic out-of-process software components isolation for trustworthiness execution
US7690033B2 (en)2004-09-282010-03-30Exobox Technologies Corp.Electronic computer system secured from unauthorized access to and manipulation of data
JP4688472B2 (en)*2004-11-012011-05-25株式会社エヌ・ティ・ティ・ドコモ Terminal control apparatus and terminal control method
US7478237B2 (en)*2004-11-082009-01-13Microsoft CorporationSystem and method of allowing user mode applications with access to file data
US7712086B2 (en)*2004-12-152010-05-04Microsoft CorporationPortable applications
US7654590B2 (en)2005-01-042010-02-02Illinois Tool Works, Inc.Magnetic appliance latch
US7490352B2 (en)*2005-04-072009-02-10Microsoft CorporationSystems and methods for verifying trust of executable files
DE602005017585D1 (en)2005-04-182009-12-24Research In Motion Ltd Method and system for detecting malicious wireless applications
US7665098B2 (en)2005-04-292010-02-16Microsoft CorporationSystem and method for monitoring interactions between application programs and data stores
CN100346252C (en)*2005-09-282007-10-31珠海金山软件股份有限公司Computer software security loophole repairing apparatus and method
US7917487B2 (en)2005-12-132011-03-29Microsoft CorporationPortable application registry
CN1909453B (en)*2006-08-222011-04-20深圳市深信服电子科技有限公司Gateway/bridge based spy software invading-proof method
US7870336B2 (en)2006-11-032011-01-11Microsoft CorporationOperating system protection against side-channel attacks on secrecy
US20100071063A1 (en)*2006-11-292010-03-18Wisconsin Alumni Research FoundationSystem for automatic detection of spyware
EP2015212A1 (en)*2007-06-292009-01-14Axalto SAPortable mass storage device with hooking process
CN101370305B (en)*2008-09-232011-10-26中兴通讯股份有限公司Method and system for protecting data traffic security
US8719901B2 (en)*2008-10-242014-05-06Synopsys, Inc.Secure consultation system
US8695090B2 (en)*2008-10-312014-04-08Symantec CorporationData loss protection through application data access classification
US8850428B2 (en)2009-11-122014-09-30Trustware International LimitedUser transparent virtualization method for protecting computer programs and data from hostile code
US9311482B2 (en)*2010-11-012016-04-12CounterTack, Inc.Inoculator and antibody for computer security
US20130067578A1 (en)*2011-09-082013-03-14Mcafee, Inc.Malware Risk Scanner
US9043918B2 (en)*2011-10-132015-05-26Mcafee, Inc.System and method for profile based filtering of outgoing information in a mobile environment
RU2477520C1 (en)2012-03-142013-03-10Закрытое акционерное общество "Лаборатория Касперского"System and method for device configuration-based dynamic adaptation of antivirus application functional
US8732834B2 (en)*2012-09-052014-05-20Symantec CorporationSystems and methods for detecting illegitimate applications
CN105229652A (en)*2013-03-282016-01-06爱迪德技术有限公司Detect the utilization for software application
CN103729937A (en)*2013-12-202014-04-16广西科技大学Electric vehicle charging and billing monitor system
CN103906045B (en)*2013-12-252017-12-22武汉安天信息技术有限责任公司A kind of monitoring method and system of mobile terminal privacy taking and carring away
CN105162620B (en)*2015-08-042018-11-27南京百敖软件有限公司A method of realizing system monitoring under different framework
US10303878B2 (en)*2016-01-222019-05-28Yu-Liang WuMethods and apparatus for automatic detection and elimination of functional hardware trojans in IC designs
CN106020874A (en)*2016-05-132016-10-12北京金山安全软件有限公司Data reporting method and device and terminal equipment
CN106598866A (en)*2016-12-222017-04-26合肥国信车联网研究院有限公司smali intermediate language-based static detection system and method
CN106599708A (en)*2017-02-212017-04-26柳州桂通科技股份有限公司Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof
KR102405752B1 (en)*2017-08-232022-06-08삼성전자주식회사Method for controlling the permission of application program and electronic device
CN108217349B (en)*2017-12-062020-10-13上海新时达电气股份有限公司Elevator pre-authorization control system and debugging method
CN108345522B (en)*2017-12-152019-03-29清华大学For carrying out the methods, devices and systems of safety detection to central processor CPU
US10742483B2 (en)2018-05-162020-08-11At&T Intellectual Property I, L.P.Network fault originator identification for virtual network infrastructure
WO2020002030A1 (en)*2018-06-262020-01-02Siemens AktiengesellschaftMethod and system for determining an appropriate installation location for an application to be installed in a distributed network environment
DE102018120344B4 (en)*2018-08-212024-11-21Pilz Gmbh & Co. Kg Automation system for monitoring a safety-critical process
EP3623886A1 (en)*2018-09-172020-03-18Siemens AktiengesellschaftMethod for managing a production process, and computer program for carrying out the method and electronically readable data carrier
DE102020114199A1 (en)2020-05-272021-12-02Basler Aktiengesellschaft Protection of computer systems against manipulation and functional anomalies
CN112600757B (en)*2020-12-252023-03-10深圳深度探测科技有限公司Safety maintenance method based on asymmetric data transmission speed limiter
WO2022238990A1 (en)*2021-05-122022-11-17Red Bend Ltd.Detecting and mitigating bluetooth based attacks
CN114821314B (en)*2022-04-192024-03-08中铁建设集团有限公司Airport pavement anomaly detection method based on machine vision
CN118659935A (en)*2024-08-202024-09-17潍坊众索信息技术有限公司 A computer abnormal login detection method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5440723A (en)*1993-01-191995-08-08International Business Machines CorporationAutomatic immune system for computers and computer networks
US5684875A (en)*1994-10-211997-11-04Ellenberger; HansMethod and apparatus for detecting a computer virus on a computer
US5765030A (en)*1996-07-191998-06-09Symantec CorpProcessor emulator module having a variable pre-fetch queue size for program execution
US5832208A (en)*1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
WO2000016200A1 (en)*1998-09-102000-03-23Sanctum Ltd.Method and system for maintaining restricted operating environments for application programs or operating systems
US6105072A (en)*1993-08-102000-08-15Fischer; Addison M.Method and apparatus for validating travelling object-oriented programs with digital signatures
US6108799A (en)*1997-11-212000-08-22International Business Machines CorporationAutomated sample creation of polymorphic and non-polymorphic marcro viruses
US6256773B1 (en)*1999-08-312001-07-03Accenture LlpSystem, method and article of manufacture for configuration management in a development architecture framework

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5440723A (en)*1993-01-191995-08-08International Business Machines CorporationAutomatic immune system for computers and computer networks
US6105072A (en)*1993-08-102000-08-15Fischer; Addison M.Method and apparatus for validating travelling object-oriented programs with digital signatures
US5684875A (en)*1994-10-211997-11-04Ellenberger; HansMethod and apparatus for detecting a computer virus on a computer
US5765030A (en)*1996-07-191998-06-09Symantec CorpProcessor emulator module having a variable pre-fetch queue size for program execution
US5832208A (en)*1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US6108799A (en)*1997-11-212000-08-22International Business Machines CorporationAutomated sample creation of polymorphic and non-polymorphic marcro viruses
WO2000016200A1 (en)*1998-09-102000-03-23Sanctum Ltd.Method and system for maintaining restricted operating environments for application programs or operating systems
US6256773B1 (en)*1999-08-312001-07-03Accenture LlpSystem, method and article of manufacture for configuration management in a development architecture framework

Also Published As

Publication numberPublication date
WO2001092981A3 (en)2002-04-25
AU6263201A (en)2001-12-11
CA2424352A1 (en)2001-12-06
JP2003535414A (en)2003-11-25
GB2411988A (en)2005-09-14
WO2001092981A2 (en)2001-12-06
CN1444742A (en)2003-09-24
EP1305688A2 (en)2003-05-02
GB2411988B (en)2005-10-19
GB2380303A (en)2003-04-02
GB0230154D0 (en)2003-02-05
GB0506281D0 (en)2005-05-04
HK1084739A1 (en)2006-08-04
HK1084738A1 (en)2006-08-04

Similar Documents

PublicationPublication DateTitle
GB2380303B (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
GB2391650B (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
WO2003046700A8 (en)Method and system for protecting data from unauthorized disclosure
AU2002349217A1 (en)Secure method and system for computer protection
AU2002305649A1 (en)Biometric detection system and method preventing unauthorized use
AU2001249511A1 (en)Authentication method and schemes for data integrity protection
GB0208892D0 (en)Computer security system and method
AU1430401A (en)System and method for detecting computer intrusions
AU4794101A (en)Method and apparatus for computer memory protection and verification
AU2002239500A1 (en)Cryptographic data security system and method
AU6107600A (en)System and method for computer security
AU2001241972A1 (en)Conditional access system and method for prevention of replay attacks
EP1609070A4 (en)Security system and method for computer operating systems
GB2369205B (en)Personal data device and protection system and method for storing and protecting personal data
AU2002364005A8 (en)A system and method for preventing unauthorized use of protected software utilizing a portable security device
AU2001273437A1 (en)Method for protecting the privacy, security, and integrity of sensitive data
GB2404262B (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
EP1471405A4 (en)Method and device for protecting information against unauthorised use
GB0020499D0 (en)System and method for enhancing data security
GB2411748B (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
HK1084739B (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
HK1084738B (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
HK1094358A1 (en)System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
AU2002218644A1 (en)Enhance authorization system and method for computer security
AU2002357252A8 (en)System and method for detecting deception

Legal Events

DateCodeTitleDescription
732EAmendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)
PCNPPatent ceased through non-payment of renewal fee

Effective date:20090528

S28Restoration of ceased patents (sect. 28/pat. act 1977)

Free format text:APPLICATION FILED

S28Restoration of ceased patents (sect. 28/pat. act 1977)

Free format text:RESTORATION ALLOWED

Effective date:20110328

732EAmendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text:REGISTERED BETWEEN 20190307 AND 20190313

PE20Patent expired after termination of 20 years

Expiry date:20210527


[8]ページ先頭

©2009-2025 Movatter.jp