Movatterモバイル変換


[0]ホーム

URL:


US20110078795A1 - Threat protection network - Google Patents

Threat protection network
Download PDF

Info

Publication number
US20110078795A1
US20110078795A1US12/890,552US89055210AUS2011078795A1US 20110078795 A1US20110078795 A1US 20110078795A1US 89055210 AUS89055210 AUS 89055210AUS 2011078795 A1US2011078795 A1US 2011078795A1
Authority
US
United States
Prior art keywords
threat
server
suspicious
computer
definition data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/890,552
Inventor
Bing Liu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CyberDefender Corp
Original Assignee
CyberDefender Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CyberDefender CorpfiledCriticalCyberDefender Corp
Priority to US12/890,552priorityCriticalpatent/US20110078795A1/en
Publication of US20110078795A1publicationCriticalpatent/US20110078795A1/en
Assigned to GR MATCH, LLCreassignmentGR MATCH, LLCSECURITY AGREEMENTAssignors: CYBERDEFENDER CORPORATION
Assigned to GR MATCH, LLCreassignmentGR MATCH, LLCSECURITY AGREEMENTAssignors: CYBERDEFENDER CORPORATION
Assigned to GR MATCH, LLCreassignmentGR MATCH, LLCSECURITY AGREEMENTAssignors: CYBERDEFENDER CORPORATION
Assigned to CYBERDEFENDER CORPORATIONreassignmentCYBERDEFENDER CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: LIU, BING
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Threat protection networks are described. Embodiments of threat protection network in accordance with the invention use expert systems to determine the nature of potential threats to a remote computer. In several embodiments, a secure peer-to-peer network is used to rapidly distribute information concerning the nature of the potential threat through the threat protection network. One embodiment of the invention includes at least one client computer connected to a network, a server that stores threat definition data and is connected to the network, an expert system in communication with the server. In addition, the client computer is configured to refer potential threats to the server, the server is configured to refer to the expert system any potential threat forwarded by a client computer that is not identified in the threat definition data and the expert system is configured to determine whether the potential threat is an actual threat by exposing at least one test computer to the potential threat and observing the behavior of the test computer.

Description

Claims (32)

41. A threat protection network for detecting and analyzing suspicious files in real-time, comprising:
at least one client computer connected to a network;
a server that stores threat definition data and is connected to the network;
an expert system in communication with the server;
at least one test computer connected to the expert system;
wherein the client computer is configured to identify a suspicious file on the client computer;
wherein the client computer is configured to automatically notify the server of the suspicious file;
wherein the server is configured to send the suspicious file to the expert system;
wherein the expert system is configured to determine whether the suspicious file is an actual threat by exposing the at least one test computer to the suspicious file and analyzing the behavior of the suspicious file on the at least one test computer; and
wherein the expert system or the server is configured to isolate the expert system and the at least one test computer from the network prior to exposing the at least one test computer to the suspicious file.
US12/890,5522004-09-222010-09-24Threat protection networkAbandonedUS20110078795A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/890,552US20110078795A1 (en)2004-09-222010-09-24Threat protection network

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US52237404P2004-09-222004-09-22
US11/234,531US7836506B2 (en)2004-09-222005-09-22Threat protection network
US12/890,552US20110078795A1 (en)2004-09-222010-09-24Threat protection network

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US11/234,531ContinuationUS7836506B2 (en)2004-09-222005-09-22Threat protection network

Publications (1)

Publication NumberPublication Date
US20110078795A1true US20110078795A1 (en)2011-03-31

Family

ID=36119438

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US11/233,868AbandonedUS20060075083A1 (en)2004-09-222005-09-22System for distributing information using a secure peer-to-peer network
US11/234,531Expired - Fee RelatedUS7836506B2 (en)2004-09-222005-09-22Threat protection network
US12/890,552AbandonedUS20110078795A1 (en)2004-09-222010-09-24Threat protection network

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US11/233,868AbandonedUS20060075083A1 (en)2004-09-222005-09-22System for distributing information using a secure peer-to-peer network
US11/234,531Expired - Fee RelatedUS7836506B2 (en)2004-09-222005-09-22Threat protection network

Country Status (3)

CountryLink
US (3)US20060075083A1 (en)
EP (1)EP1854019A4 (en)
WO (2)WO2006039208A2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8301767B1 (en)*2005-12-212012-10-30Mcafee, Inc.System, method and computer program product for controlling network communications based on policy compliance
US20130007121A1 (en)*2011-06-292013-01-03International Business Machines CorporationPredictive collaboration management
US9246936B1 (en)2013-02-082016-01-26PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9253207B2 (en)*2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US9262629B2 (en)2014-01-212016-02-16PhishMe, Inc.Methods and systems for preventing malicious use of phishing simulation records
US20160085970A1 (en)*2014-09-222016-03-24Mcafee, Inc.Pre-launch process vulnerability assessment
US9325730B2 (en)2013-02-082016-04-26PhishMe, Inc.Collaborative phishing attack detection
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US20170250995A1 (en)*2015-03-312017-08-31Juniper Networks, Inc.Obtaining suspect objects based on detecting suspicious activity
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
CN109165506A (en)*2018-07-052019-01-08河南中烟工业有限责任公司A kind of method of industry control fault-tolerant server online checking and killing virus and antivirus protection
CN109766719A (en)*2018-12-282019-05-17微梦创科网络科技(中国)有限公司 A kind of sensitive information detection method, device and electronic equipment
US10375394B2 (en)2014-07-282019-08-06Fraunhofer Gesellschaft Zur Foerderung Der Angewandten Forschung E.V.Source coding scheme using entropy coding to code a quantized signal on a determined number of bits

Families Citing this family (78)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7739494B1 (en)2003-04-252010-06-15Symantec CorporationSSL validation and stripping using trustworthiness factors
US7571119B2 (en)*2004-09-302009-08-04Qurio Holdings, Inc.Method and system for supporting secure transactions in a peer-to-peer network
US10043008B2 (en)*2004-10-292018-08-07Microsoft Technology Licensing, LlcEfficient white listing of user-modifiable files
US8316446B1 (en)*2005-04-222012-11-20Blue Coat Systems, Inc.Methods and apparatus for blocking unwanted software downloads
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US20070089174A1 (en)*2005-10-142007-04-19David M. BaderContent management system and method for DRM enforcement in a client-server system
US20070097986A1 (en)*2005-11-022007-05-03Abu-Amara Hosame HPeer-to-peer communication architecture and terminals
US8353029B2 (en)*2005-11-102013-01-08Microsoft CorporationOn demand protection against web resources associated with undesirable activities
US7831915B2 (en)*2005-11-102010-11-09Microsoft CorporationDynamically protecting against web resources associated with undesirable activities
US8826411B2 (en)*2006-03-152014-09-02Blue Coat Systems, Inc.Client-side extensions for use in connection with HTTP proxy policy enforcement
US8332947B1 (en)*2006-06-272012-12-11Symantec CorporationSecurity threat reporting in light of local security tools
US8095967B2 (en)2006-07-272012-01-10White Sky, Inc.Secure web site authentication using web site characteristics, secure user credentials and private browser
US9860274B2 (en)2006-09-132018-01-02Sophos LimitedPolicy management
WO2008050055A2 (en)*2006-10-232008-05-02France TelecomMethod for managing access rights to a digital content in a peer network
US8756683B2 (en)*2006-12-132014-06-17Microsoft CorporationDistributed malicious software protection in file sharing environments
US8484742B2 (en)2007-01-192013-07-09Microsoft CorporationRendered image collection of potentially malicious web pages
US7908660B2 (en)*2007-02-062011-03-15Microsoft CorporationDynamic risk management
US8584240B1 (en)*2007-10-032013-11-12Trend Micro IncorporatedCommunity scan for web threat protection
US8584212B1 (en)*2007-11-152013-11-12Salesforce.Com, Inc.On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
US8875259B2 (en)2007-11-152014-10-28Salesforce.Com, Inc.On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
US8171554B2 (en)*2008-02-042012-05-01Yuval EloviciSystem that provides early detection, alert, and response to electronic threats
US8560732B2 (en)*2008-02-192013-10-15Red Hat, Inc.Peer-to-peer object distribution
US9389839B2 (en)*2008-06-262016-07-12Microsoft Technology Licensing, LlcSafe code for signature updates in an intrusion prevention system
US20100058474A1 (en)*2008-08-292010-03-04Avg Technologies Cz, S.R.O.System and method for the detection of malware
US8484726B1 (en)*2008-10-142013-07-09Zscaler, Inc.Key security indicators
KR101647633B1 (en)2008-11-242016-08-11삼성전자주식회사Method and apparatus for transmitting and receiving personal broadcasting data based on peer to peer communication
US8838683B2 (en)*2008-11-242014-09-16Samsung Electronics Co., Ltd.Method and apparatus for receiving data by using peer-to-peer portal server
US8578484B2 (en)*2008-12-312013-11-05Sonicwall, Inc.Identification of content
US8578485B2 (en)2008-12-312013-11-05Sonicwall, Inc.Identification of content by metadata
US9275231B1 (en)*2009-03-102016-03-01Symantec CorporationMethod and apparatus for securing a computer using an optimal configuration for security software based on user behavior
US20100250704A1 (en)*2009-03-262010-09-30Verizon Patent And Licensing Inc.Peer-to-peer content distribution with digital rights management
US7640589B1 (en)*2009-06-192009-12-29Kaspersky Lab, ZaoDetection and minimization of false positives in anti-malware processing
US20100332593A1 (en)*2009-06-292010-12-30Igor BarashSystems and methods for operating an anti-malware network on a cloud computing platform
US8701192B1 (en)*2009-06-302014-04-15Symantec CorporationBehavior based signatures
CN101610226A (en)*2009-07-172009-12-23阿里巴巴集团控股有限公司A kind of method and system of plug-in download
US8607340B2 (en)*2009-07-212013-12-10Sophos LimitedHost intrusion prevention system using software and user behavior analysis
US8776218B2 (en)2009-07-212014-07-08Sophos LimitedBehavioral-based host intrusion prevention system
US8443449B1 (en)*2009-11-092013-05-14Trend Micro, Inc.Silent detection of malware and feedback over a network
US8356354B2 (en)2009-11-232013-01-15Kaspersky Lab, ZaoSilent-mode signature testing in anti-malware processing
US10210162B1 (en)2010-03-292019-02-19Carbonite, Inc.Log file management
US8800044B2 (en)2011-03-232014-08-05Architelos, Inc.Storing and accessing threat information for use in predictive modeling in a network security service
US20130124633A1 (en)*2011-11-102013-05-16Bing LiuEngine, system and method of providing location-based social services
US8978137B2 (en)*2012-02-292015-03-10Cisco Technology, Inc.Method and apparatus for retroactively detecting malicious or otherwise undesirable software
US9715325B1 (en)2012-06-212017-07-25Open Text CorporationActivity stream based interaction
EP2677715A1 (en)*2012-06-222013-12-25Alcatel LucentA method and a server for evaluating a request for access to content from a server in a computer network
CN102982280B (en)*2012-11-072015-09-09北京奇虎科技有限公司Stop method and the device of computer aided design cad virus infections
CN103023999B (en)*2012-11-302015-12-02北京奇虎科技有限公司A kind of method, server and corresponding system issuing browser component
US9223971B1 (en)*2014-01-282015-12-29Exelis Inc.User reporting and automatic threat processing of suspicious email
US20150304343A1 (en)2014-04-182015-10-22Intuit Inc.Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
US9342690B2 (en)*2014-05-302016-05-17Intuit Inc.Method and apparatus for a scoring service for security threat management
US9325726B2 (en)2014-02-032016-04-26Intuit Inc.Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
US10289838B2 (en)*2014-02-212019-05-14Entit Software LlcScoring for threat observables
WO2015200211A1 (en)2014-06-222015-12-30Webroot Inc.Network threat prediction and blocking
US9768270B2 (en)*2014-06-252017-09-19Sandisk Technologies LlcMethod of selectively depositing floating gate material in a memory device
US9848005B2 (en)*2014-07-292017-12-19Aruba Networks, Inc.Client reputation driven role-based access control
US10372905B1 (en)*2014-12-122019-08-06Amazon Technologies, Inc.Preventing unauthorized software execution
US12177235B2 (en)2015-01-302024-12-24Comcast Cable Communications, LlcProcess for identifying a compromised device
KR20160095856A (en)*2015-02-042016-08-12한국전자통신연구원System and method for detecting intrusion intelligently based on automatic detection of new attack type and update of attack type
US9866576B2 (en)2015-04-172018-01-09Centripetal Networks, Inc.Rule-based network-threat detection
US10395133B1 (en)2015-05-082019-08-27Open Text CorporationImage box filtering for optical character recognition
US10599844B2 (en)2015-05-122020-03-24Webroot, Inc.Automatic threat detection of executable files based on static data analysis
US10289686B1 (en)2015-06-302019-05-14Open Text CorporationMethod and system for using dynamic content types
CA2994257C (en)*2015-07-022022-03-15Reliaquest Holdings, LlcThreat intelligence system and method
AU2016367922B2 (en)*2015-12-112019-08-08Servicenow, Inc.Computer network threat assessment
US10313405B2 (en)*2016-02-042019-06-04Cloud9 Technologies, LLCDynamically configured conferencing
US9734337B1 (en)*2017-01-242017-08-15Malwarebytes Inc.Behavior-based ransomware detection
US10320818B2 (en)*2017-02-142019-06-11Symantec CorporationSystems and methods for detecting malicious computing events
US11429717B2 (en)2017-03-282022-08-30Nec CorporationSignature generating device, signature generating method, and non-transitory computer-readable medium storing program
US10425444B2 (en)*2017-06-072019-09-24Bae Systems Applied Intelligence Us Corp.Social engineering attack prevention
US10554678B2 (en)2017-07-262020-02-04Cisco Technology, Inc.Malicious content detection with retrospective reporting
US10878110B2 (en)2017-09-122020-12-29Sophos LimitedDashboard for managing enterprise network traffic
US10944766B2 (en)*2017-09-222021-03-09Microsoft Technology Licensing, LlcConfigurable cyber-attack trackers
US10673888B1 (en)*2017-12-142020-06-02Ca, Inc.Systems and methods for managing illegitimate authentication attempts
US10728034B2 (en)2018-02-232020-07-28Webroot Inc.Security privilege escalation exploit detection and mitigation
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US11363052B2 (en)*2019-07-192022-06-14Qualys, Inc.Attack path and graph creation based on user and system profiling
TWI703851B (en)*2019-07-302020-09-01華東科技股份有限公司 Peer device connection method
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system

Citations (85)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5590199A (en)*1993-10-121996-12-31The Mitre CorporationElectronic information network user authentication and authorization system
US5590201A (en)*1994-11-101996-12-31Advanced Micro Devices Inc.Programmable source address locking mechanism for secure networks
US5621889A (en)*1993-06-091997-04-15Alcatel Alsthom Compagnie Generale D'electriciteFacility for detecting intruders and suspect callers in a computer installation and a security system including such a facility
US5848233A (en)*1996-12-091998-12-08Sun Microsystems, Inc.Method and apparatus for dynamic packet filter assignment
US5956481A (en)*1997-02-061999-09-21Microsoft CorporationMethod and apparatus for protecting data files on a computer from virus infection
US6026502A (en)*1997-01-272000-02-15Wakayama; HironoriMethod and mechanism for preventing from invading of computer virus and/or hacker
US6038848A (en)*1996-12-132000-03-21Asea Brown Boveri AgMethod for spontaneously increasing power in operation of a power station system
US6061341A (en)*1997-12-162000-05-09Telefonaktiebolaget Lm Ericsson (Publ)Use of transmission control protocol proxy within packet data service transmissions in a mobile network
US6073178A (en)*1996-12-092000-06-06Sun Microsystems, Inc.Method and apparatus for assignment of IP addresses
US6202070B1 (en)*1997-12-312001-03-13Compaq Computer CorporationComputer manufacturing system architecture with enhanced software distribution functions
US20020078381A1 (en)*2000-04-282002-06-20Internet Security Systems, Inc.Method and System for Managing Computer Security Information
US20020080964A1 (en)*2000-12-072002-06-27Stone Jonathan JamesWatermarking and transferring material
US20020131123A1 (en)*2001-03-092002-09-19Clark Gerald R.Free space optical communication network
US20020131130A1 (en)*2001-03-092002-09-19Lightpointe Communications, Inc.Multi-tenant unit optical network
US20020178373A1 (en)*2001-04-162002-11-28Randice-Lisa AltschulComputer virus rejection system and method
US20020188864A1 (en)*2001-06-062002-12-12Jackson Gary ManuelIntrusion prevention system
US20020199116A1 (en)*2001-06-252002-12-26Keith HoeneSystem and method for computer network virus exclusion
US20020199100A1 (en)*2001-06-262002-12-26Nenashev Michael A.Cryptography-based tamper-resistant software design mechanism
US20030023866A1 (en)*2001-07-262003-01-30Hinchliffe Alex JamesCentrally managed malware scanning
US20030056116A1 (en)*2001-05-182003-03-20Bunker Nelson WaldoReporter
US20030084349A1 (en)*2001-10-122003-05-01Oliver FriedrichsEarly warning system for network attacks
US20030084318A1 (en)*2001-10-312003-05-01Schertz Richard L.System and method of graphically correlating data for an intrusion protection system
US20030084331A1 (en)*2001-10-262003-05-01Microsoft CorporationMethod for providing user authentication/authorization and distributed firewall utilizing same
US20030093514A1 (en)*2001-09-132003-05-15Alfonso De Jesus ValdesPrioritizing bayes network alerts
US20030110395A1 (en)*2001-12-102003-06-12Presotto David LeoControlled network partitioning using firedoors
US20030135762A1 (en)*2002-01-092003-07-17Peel Wireless, Inc.Wireless networks security system
US20030204626A1 (en)*2002-04-242003-10-30Microsoft CorporationMethod and apparatus for efficiently matching responses to requests previously passed by a network node
US20030204728A1 (en)*2002-04-302003-10-30Tippingpoint Technologies, Inc.Steganographically authenticated packet traffic
US20030204632A1 (en)*2002-04-302003-10-30Tippingpoint Technologies, Inc.Network security system integration
US20030217039A1 (en)*2002-01-152003-11-20Kurtz George R.System and method for network vulnerability detection and reporting
US6654882B1 (en)*2002-05-242003-11-25Rackspace, LtdNetwork security system protecting against disclosure of information to unauthorized agents
US20030219019A1 (en)*2002-05-242003-11-27Wilson Tyler JamesMethod of inverse multiplexing/demultiplexing dynamically fluctuating ATM cell streams
US20030236995A1 (en)*2002-06-212003-12-25Fretwell Lyman JeffersonMethod and apparatus for facilitating detection of network intrusion
US20040003285A1 (en)*2002-06-282004-01-01Robert WhelanSystem and method for detecting unauthorized wireless access points
US20040015728A1 (en)*2002-01-152004-01-22Cole David M.System and method for network vulnerability detection and reporting
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US20040054917A1 (en)*2002-08-302004-03-18Wholesecurity, Inc.Method and apparatus for detecting malicious code in the form of a trojan horse in an information handling system
US20040064736A1 (en)*2002-08-302004-04-01Wholesecurity, Inc.Method and apparatus for detecting malicious code in an information handling system
US20040078384A1 (en)*2002-01-152004-04-22Keir Robin M.System and method for network vulnerability detection and reporting
US20040078592A1 (en)*2002-10-162004-04-22At & T Corp.System and method for deploying honeypot systems in a network
US20040090725A1 (en)*2002-11-012004-05-13Abb Research LtdProtection of an electric power transmission network
US20040093514A1 (en)*2002-11-082004-05-13International Business Machines CorporationMethod for automatically isolating worm and hacker attacks within a local area network
US20040093513A1 (en)*2002-11-072004-05-13Tippingpoint Technologies, Inc.Active network defense system and method
US20040098607A1 (en)*2002-08-302004-05-20Wholesecurity, Inc.Method, computer software, and system for providing end to end security protection of an online transaction
US6742128B1 (en)*2002-08-282004-05-25Networks Associates TechnologyThreat assessment orchestrator system and method
US6742043B1 (en)*2000-01-142004-05-25Webtv Networks, Inc.Reformatting with modular proxy server
US20040123157A1 (en)*2002-12-132004-06-24Wholesecurity, Inc.Method, system, and computer program product for security within a global computer network
US20040123117A1 (en)*2002-12-182004-06-24Symantec CorporationValidation for behavior-blocking system
US20040162066A1 (en)*2001-11-022004-08-19Ravi KuchibhotlaIsolation and remediation of a communication device
US20040168173A1 (en)*1999-11-152004-08-26Sandia National LabsMethod and apparatus providing deception and/or altered execution of logic in an information system
US20040187024A1 (en)*2003-03-172004-09-23Briscoe Robert J.Authentication of network users
US20040187023A1 (en)*2002-08-302004-09-23Wholesecurity, Inc.Method, system and computer program product for security in a global computer network transaction
US20040236547A1 (en)*2003-01-222004-11-25Rappaport Theodore S.System and method for automated placement or configuration of equipment for obtaining desired network performance objectives and for security, RF tags, and bandwidth provisioning
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US6834350B1 (en)*1999-07-062004-12-21Watchguard Technologies, Inc.Secure and differentiated delivery of network security information
US20050008004A1 (en)*2003-05-162005-01-13Telconcept Usa Holdings, Inc.System for transmitting emergency and notification messages over a phone line
US20050050353A1 (en)*2003-08-272005-03-03International Business Machines CorporationSystem, method and program product for detecting unknown computer attacks
US20050060562A1 (en)*2003-09-122005-03-17Partha BhattacharyaMethod and system for displaying network security incidents
US20050086102A1 (en)*2003-10-152005-04-21International Business Machines CorporationMethod and system for validation of service consumers
US6898715B1 (en)*2000-09-122005-05-24Networks Associates Technology, Inc.Response to a computer virus outbreak
US20050177871A1 (en)*1999-04-142005-08-11Roesch Martin F.Intrusion and misuse deterrence system employing a virtual network
US20050182967A1 (en)*2004-02-132005-08-18Microsoft CorporationNetwork security device and method for protecting a computing device in a networked environment
US20050182949A1 (en)*2004-02-132005-08-18Microsoft CorporationSystem and method for securing a computer system connected to a network from attacks
US20050183183A1 (en)*2004-02-092005-08-25Tosh OnoGlove adapted for use in firearms loading, shooting and unloading
US20050228874A1 (en)*2004-04-082005-10-13Edgett Jeff SMethod and system for verifying and updating the configuration of an access device during authentication
US20050246767A1 (en)*2004-04-262005-11-03Fazal Lookman YMethod and apparatus for network security based on device security status
US20050262208A1 (en)*2004-05-212005-11-24Eyal HavivSystem and method for managing emails in an enterprise
US20050283837A1 (en)*2004-06-162005-12-22Michael OlivierMethod and apparatus for managing computer virus outbreaks
US20060019679A1 (en)*2004-07-232006-01-26Rappaport Theodore SSystem, method, and apparatus for determining and using the position of wireless devices or infrastructure for wireless network enhancements
US20060031921A1 (en)*2004-08-062006-02-09Andrew DanforthSystem and method for affecting the behavior of a network device in a cable network
US20060041497A1 (en)*2004-08-182006-02-23Pjm Interconnection, Llc.Systems and methods for maintaining system performance
US20060062214A1 (en)*2002-10-182006-03-23Matsushita Electric Industrial Co., LtdMethod and device for roaming-connection in global network
US20060075103A1 (en)*2004-10-052006-04-06International Business Machines CorporationSystems, methods, and media for providing access to clients on a network
US20060085858A1 (en)*2004-10-192006-04-20Noel Steven EMinimum-cost network hardening
US7036146B1 (en)*2000-10-032006-04-25Sandia CorporationSystem and method for secure group transactions
US20060095965A1 (en)*2004-10-292006-05-04Microsoft CorporationNetwork security device and method for protecting a computing device in a networked environment
US20060100974A1 (en)*2004-10-222006-05-11International Business Machines CorporationVisual structuring of multivariable data
US7343624B1 (en)*2004-07-132008-03-11Sonicwall, Inc.Managing infectious messages as identified by an attachment
US7383578B2 (en)*2002-12-312008-06-03International Business Machines CorporationMethod and system for morphing honeypot
US7409712B1 (en)*2003-07-162008-08-05Cisco Technology, Inc.Methods and apparatus for network message traffic redirection
US7437760B2 (en)*2002-10-102008-10-14International Business Machines CorporationAntiviral network system
US7437761B2 (en)*2002-02-152008-10-14Kabushiki Kaisha ToshibaComputer virus generation detection apparatus and method
US7549166B2 (en)*2002-12-052009-06-16International Business Machines CorporationDefense mechanism for server farm
US7694150B1 (en)*2004-06-222010-04-06Cisco Technology, IncSystem and methods for integration of behavioral and signature based security
US7904573B1 (en)*2001-04-062011-03-08Symantec CorporationTemporal access control for computer virus prevention

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5815571A (en)*1996-10-281998-09-29Finley; Phillip ScottComputer system with secured data paths and method of protection
US7529929B2 (en)*2002-05-302009-05-05Nokia CorporationSystem and method for dynamically enforcing digital rights management rules
US7170999B1 (en)*2002-08-282007-01-30Napster, Inc.Method of and apparatus for encrypting and transferring files
US20040158741A1 (en)*2003-02-072004-08-12Peter SchneiderSystem and method for remote virus scanning in wireless networks
US7716726B2 (en)*2004-02-132010-05-11Microsoft CorporationSystem and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
US20050204405A1 (en)*2004-03-042005-09-15Brian WormingtonMethod and system for digital rights management
US7596690B2 (en)*2004-09-092009-09-29International Business Machines CorporationPeer-to-peer communications
US7930346B2 (en)*2005-08-242011-04-19Microsoft CorporationSecurity in peer to peer synchronization applications
WO2007087109A2 (en)*2005-12-212007-08-02Transip, Inc.System and method for efficient replication of and access to application specific environments and data

Patent Citations (93)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5621889A (en)*1993-06-091997-04-15Alcatel Alsthom Compagnie Generale D'electriciteFacility for detecting intruders and suspect callers in a computer installation and a security system including such a facility
US5590199A (en)*1993-10-121996-12-31The Mitre CorporationElectronic information network user authentication and authorization system
US5590201A (en)*1994-11-101996-12-31Advanced Micro Devices Inc.Programmable source address locking mechanism for secure networks
US6073178A (en)*1996-12-092000-06-06Sun Microsystems, Inc.Method and apparatus for assignment of IP addresses
US5848233A (en)*1996-12-091998-12-08Sun Microsystems, Inc.Method and apparatus for dynamic packet filter assignment
US6038848A (en)*1996-12-132000-03-21Asea Brown Boveri AgMethod for spontaneously increasing power in operation of a power station system
US6026502A (en)*1997-01-272000-02-15Wakayama; HironoriMethod and mechanism for preventing from invading of computer virus and/or hacker
US5956481A (en)*1997-02-061999-09-21Microsoft CorporationMethod and apparatus for protecting data files on a computer from virus infection
US6061341A (en)*1997-12-162000-05-09Telefonaktiebolaget Lm Ericsson (Publ)Use of transmission control protocol proxy within packet data service transmissions in a mobile network
US6202070B1 (en)*1997-12-312001-03-13Compaq Computer CorporationComputer manufacturing system architecture with enhanced software distribution functions
US20050177871A1 (en)*1999-04-142005-08-11Roesch Martin F.Intrusion and misuse deterrence system employing a virtual network
US20050132199A1 (en)*1999-07-062005-06-16Boroughs Randall C.Secure and differentiated delivery of network security information
US6834350B1 (en)*1999-07-062004-12-21Watchguard Technologies, Inc.Secure and differentiated delivery of network security information
US20040168173A1 (en)*1999-11-152004-08-26Sandia National LabsMethod and apparatus providing deception and/or altered execution of logic in an information system
US7299361B1 (en)*2000-01-062007-11-20Mcafee, Inc.Remote e-mail scanning system and method
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US6742043B1 (en)*2000-01-142004-05-25Webtv Networks, Inc.Reformatting with modular proxy server
US20020078381A1 (en)*2000-04-282002-06-20Internet Security Systems, Inc.Method and System for Managing Computer Security Information
US6898715B1 (en)*2000-09-122005-05-24Networks Associates Technology, Inc.Response to a computer virus outbreak
US7036146B1 (en)*2000-10-032006-04-25Sandia CorporationSystem and method for secure group transactions
US20020080964A1 (en)*2000-12-072002-06-27Stone Jonathan JamesWatermarking and transferring material
US6978093B2 (en)*2001-03-092005-12-20Lightpointe Communications, Inc.Free space optical communication network
US20020131130A1 (en)*2001-03-092002-09-19Lightpointe Communications, Inc.Multi-tenant unit optical network
US20020131123A1 (en)*2001-03-092002-09-19Clark Gerald R.Free space optical communication network
US7904573B1 (en)*2001-04-062011-03-08Symantec CorporationTemporal access control for computer virus prevention
US20020178373A1 (en)*2001-04-162002-11-28Randice-Lisa AltschulComputer virus rejection system and method
US20030056116A1 (en)*2001-05-182003-03-20Bunker Nelson WaldoReporter
US20020188864A1 (en)*2001-06-062002-12-12Jackson Gary ManuelIntrusion prevention system
US20020199116A1 (en)*2001-06-252002-12-26Keith HoeneSystem and method for computer network virus exclusion
US6976167B2 (en)*2001-06-262005-12-13Intel CorporationCryptography-based tamper-resistant software design mechanism
US20020199100A1 (en)*2001-06-262002-12-26Nenashev Michael A.Cryptography-based tamper-resistant software design mechanism
US20030023866A1 (en)*2001-07-262003-01-30Hinchliffe Alex JamesCentrally managed malware scanning
US20030093514A1 (en)*2001-09-132003-05-15Alfonso De Jesus ValdesPrioritizing bayes network alerts
US20030084349A1 (en)*2001-10-122003-05-01Oliver FriedrichsEarly warning system for network attacks
US20060015935A1 (en)*2001-10-262006-01-19Microsoft CorporationMethod for providing user authentication/authorization and distributed firewall utilizing same
US20030084331A1 (en)*2001-10-262003-05-01Microsoft CorporationMethod for providing user authentication/authorization and distributed firewall utilizing same
US20030084318A1 (en)*2001-10-312003-05-01Schertz Richard L.System and method of graphically correlating data for an intrusion protection system
US20040162066A1 (en)*2001-11-022004-08-19Ravi KuchibhotlaIsolation and remediation of a communication device
US20030110395A1 (en)*2001-12-102003-06-12Presotto David LeoControlled network partitioning using firedoors
US20030135762A1 (en)*2002-01-092003-07-17Peel Wireless, Inc.Wireless networks security system
US20040078384A1 (en)*2002-01-152004-04-22Keir Robin M.System and method for network vulnerability detection and reporting
US20040015728A1 (en)*2002-01-152004-01-22Cole David M.System and method for network vulnerability detection and reporting
US20030217039A1 (en)*2002-01-152003-11-20Kurtz George R.System and method for network vulnerability detection and reporting
US7437761B2 (en)*2002-02-152008-10-14Kabushiki Kaisha ToshibaComputer virus generation detection apparatus and method
US20030204626A1 (en)*2002-04-242003-10-30Microsoft CorporationMethod and apparatus for efficiently matching responses to requests previously passed by a network node
US20030204728A1 (en)*2002-04-302003-10-30Tippingpoint Technologies, Inc.Steganographically authenticated packet traffic
US20030204632A1 (en)*2002-04-302003-10-30Tippingpoint Technologies, Inc.Network security system integration
US20030219019A1 (en)*2002-05-242003-11-27Wilson Tyler JamesMethod of inverse multiplexing/demultiplexing dynamically fluctuating ATM cell streams
US6654882B1 (en)*2002-05-242003-11-25Rackspace, LtdNetwork security system protecting against disclosure of information to unauthorized agents
US20030236995A1 (en)*2002-06-212003-12-25Fretwell Lyman JeffersonMethod and apparatus for facilitating detection of network intrusion
US20040003285A1 (en)*2002-06-282004-01-01Robert WhelanSystem and method for detecting unauthorized wireless access points
US6742128B1 (en)*2002-08-282004-05-25Networks Associates TechnologyThreat assessment orchestrator system and method
US20040187023A1 (en)*2002-08-302004-09-23Wholesecurity, Inc.Method, system and computer program product for security in a global computer network transaction
US20040098607A1 (en)*2002-08-302004-05-20Wholesecurity, Inc.Method, computer software, and system for providing end to end security protection of an online transaction
US20040064736A1 (en)*2002-08-302004-04-01Wholesecurity, Inc.Method and apparatus for detecting malicious code in an information handling system
US20040054917A1 (en)*2002-08-302004-03-18Wholesecurity, Inc.Method and apparatus for detecting malicious code in the form of a trojan horse in an information handling system
US7437760B2 (en)*2002-10-102008-10-14International Business Machines CorporationAntiviral network system
US20040078592A1 (en)*2002-10-162004-04-22At & T Corp.System and method for deploying honeypot systems in a network
US20060062214A1 (en)*2002-10-182006-03-23Matsushita Electric Industrial Co., LtdMethod and device for roaming-connection in global network
US20040090725A1 (en)*2002-11-012004-05-13Abb Research LtdProtection of an electric power transmission network
US6985800B2 (en)*2002-11-012006-01-10Abb Research Ltd.Protection of an electric power transmission network
US20050044422A1 (en)*2002-11-072005-02-24Craig CantrellActive network defense system and method
US20050028013A1 (en)*2002-11-072005-02-03Craig CantrellActive network defense system and method
US20040093513A1 (en)*2002-11-072004-05-13Tippingpoint Technologies, Inc.Active network defense system and method
US20040093514A1 (en)*2002-11-082004-05-13International Business Machines CorporationMethod for automatically isolating worm and hacker attacks within a local area network
US7549166B2 (en)*2002-12-052009-06-16International Business Machines CorporationDefense mechanism for server farm
US20040123157A1 (en)*2002-12-132004-06-24Wholesecurity, Inc.Method, system, and computer program product for security within a global computer network
US20040123117A1 (en)*2002-12-182004-06-24Symantec CorporationValidation for behavior-blocking system
US7383578B2 (en)*2002-12-312008-06-03International Business Machines CorporationMethod and system for morphing honeypot
US20040236547A1 (en)*2003-01-222004-11-25Rappaport Theodore S.System and method for automated placement or configuration of equipment for obtaining desired network performance objectives and for security, RF tags, and bandwidth provisioning
US20040187024A1 (en)*2003-03-172004-09-23Briscoe Robert J.Authentication of network users
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US20050008004A1 (en)*2003-05-162005-01-13Telconcept Usa Holdings, Inc.System for transmitting emergency and notification messages over a phone line
US7409712B1 (en)*2003-07-162008-08-05Cisco Technology, Inc.Methods and apparatus for network message traffic redirection
US20050050353A1 (en)*2003-08-272005-03-03International Business Machines CorporationSystem, method and program product for detecting unknown computer attacks
US20050060562A1 (en)*2003-09-122005-03-17Partha BhattacharyaMethod and system for displaying network security incidents
US20050086102A1 (en)*2003-10-152005-04-21International Business Machines CorporationMethod and system for validation of service consumers
US20050183183A1 (en)*2004-02-092005-08-25Tosh OnoGlove adapted for use in firearms loading, shooting and unloading
US20050182949A1 (en)*2004-02-132005-08-18Microsoft CorporationSystem and method for securing a computer system connected to a network from attacks
US20050182967A1 (en)*2004-02-132005-08-18Microsoft CorporationNetwork security device and method for protecting a computing device in a networked environment
US20050228874A1 (en)*2004-04-082005-10-13Edgett Jeff SMethod and system for verifying and updating the configuration of an access device during authentication
US20050246767A1 (en)*2004-04-262005-11-03Fazal Lookman YMethod and apparatus for network security based on device security status
US20050262208A1 (en)*2004-05-212005-11-24Eyal HavivSystem and method for managing emails in an enterprise
US20050283837A1 (en)*2004-06-162005-12-22Michael OlivierMethod and apparatus for managing computer virus outbreaks
US7694150B1 (en)*2004-06-222010-04-06Cisco Technology, IncSystem and methods for integration of behavioral and signature based security
US7343624B1 (en)*2004-07-132008-03-11Sonicwall, Inc.Managing infectious messages as identified by an attachment
US20060019679A1 (en)*2004-07-232006-01-26Rappaport Theodore SSystem, method, and apparatus for determining and using the position of wireless devices or infrastructure for wireless network enhancements
US20060031921A1 (en)*2004-08-062006-02-09Andrew DanforthSystem and method for affecting the behavior of a network device in a cable network
US20060041497A1 (en)*2004-08-182006-02-23Pjm Interconnection, Llc.Systems and methods for maintaining system performance
US20060075103A1 (en)*2004-10-052006-04-06International Business Machines CorporationSystems, methods, and media for providing access to clients on a network
US20060085858A1 (en)*2004-10-192006-04-20Noel Steven EMinimum-cost network hardening
US20060100974A1 (en)*2004-10-222006-05-11International Business Machines CorporationVisual structuring of multivariable data
US20060095965A1 (en)*2004-10-292006-05-04Microsoft CorporationNetwork security device and method for protecting a computing device in a networked environment

Cited By (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8301767B1 (en)*2005-12-212012-10-30Mcafee, Inc.System, method and computer program product for controlling network communications based on policy compliance
US9166984B2 (en)2005-12-212015-10-20Mcafee, Inc.System, method and computer program product for controlling network communications based on policy compliance
US20130007121A1 (en)*2011-06-292013-01-03International Business Machines CorporationPredictive collaboration management
US8943131B2 (en)*2011-06-292015-01-27International Business Machines CorporationPredictive collaboration management
US10187407B1 (en)2013-02-082019-01-22Cofense Inc.Collaborative phishing attack detection
US9246936B1 (en)2013-02-082016-01-26PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US10819744B1 (en)2013-02-082020-10-27Cofense IncCollaborative phishing attack detection
US9325730B2 (en)2013-02-082016-04-26PhishMe, Inc.Collaborative phishing attack detection
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US9591017B1 (en)2013-02-082017-03-07PhishMe, Inc.Collaborative phishing attack detection
US9667645B1 (en)2013-02-082017-05-30PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9674221B1 (en)2013-02-082017-06-06PhishMe, Inc.Collaborative phishing attack detection
US9253207B2 (en)*2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US9262629B2 (en)2014-01-212016-02-16PhishMe, Inc.Methods and systems for preventing malicious use of phishing simulation records
US10375394B2 (en)2014-07-282019-08-06Fraunhofer Gesellschaft Zur Foerderung Der Angewandten Forschung E.V.Source coding scheme using entropy coding to code a quantized signal on a determined number of bits
US10735734B2 (en)2014-07-282020-08-04Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V.Source coding scheme using entropy coding to code a quantized signal
US12273519B2 (en)2014-07-282025-04-08Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V.Encoder, decoder, system and methods for encoding and decoding
US10445505B2 (en)*2014-09-222019-10-15Mcafee, LlcProcess vulnerability assessment
US20160085970A1 (en)*2014-09-222016-03-24Mcafee, Inc.Pre-launch process vulnerability assessment
US20170250995A1 (en)*2015-03-312017-08-31Juniper Networks, Inc.Obtaining suspect objects based on detecting suspicious activity
US9906554B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
CN109165506A (en)*2018-07-052019-01-08河南中烟工业有限责任公司A kind of method of industry control fault-tolerant server online checking and killing virus and antivirus protection
CN109766719A (en)*2018-12-282019-05-17微梦创科网络科技(中国)有限公司 A kind of sensitive information detection method, device and electronic equipment

Also Published As

Publication numberPublication date
WO2006039208A2 (en)2006-04-13
US7836506B2 (en)2010-11-16
EP1854019A2 (en)2007-11-14
WO2006036763A3 (en)2007-06-14
WO2006039208A3 (en)2007-08-02
US20060075083A1 (en)2006-04-06
WO2006036763A2 (en)2006-04-06
EP1854019A4 (en)2010-12-22
US20060075504A1 (en)2006-04-06

Similar Documents

PublicationPublication DateTitle
US7836506B2 (en)Threat protection network
US20240106797A1 (en)System and method for implementing content and network security inside a chip
US10664602B2 (en)Determining malware prevention based on retrospective content scan
US10757120B1 (en)Malicious network content detection
US8291498B1 (en)Computer virus detection and response in a wide area network
US7237008B1 (en)Detecting malware carried by an e-mail message
US20250047694A1 (en)Inline malware detection
US8239944B1 (en)Reducing malware signature set size through server-side processing
US20160373486A1 (en)Security Policy Deployment and Enforcement System for the Detection and Control of Polymorphic and Targeted Malware
US20080201722A1 (en)Method and System For Unsafe Content Tracking
US20060041942A1 (en)System, method and computer program product for preventing spyware/malware from installing a registry
US20200106791A1 (en)Intelligent system for mitigating cybersecurity risk by analyzing domain name system traffic metrics
US12430437B2 (en)Specific file detection baked into machine learning pipelines
EP3999985A1 (en)Inline malware detection
US20240414129A1 (en)Automated fuzzy hash based signature collecting system for malware detection
US12445484B2 (en)Inline ransomware detection via server message block (SMB) traffic
US20250245335A1 (en)Systems and methods to safely provide files and software updates with a cloud subscription service
US20240333759A1 (en)Inline ransomware detection via server message block (smb) traffic
GB2432687A (en)Preventing spyware/malware from installing in a registry
US20070294396A1 (en)Method and system for researching pestware spread through electronic messages

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:GR MATCH, LLC, CALIFORNIA

Free format text:SECURITY AGREEMENT;ASSIGNOR:CYBERDEFENDER CORPORATION;REEL/FRAME:026656/0370

Effective date:20101207

Owner name:GR MATCH, LLC, CALIFORNIA

Free format text:SECURITY AGREEMENT;ASSIGNOR:CYBERDEFENDER CORPORATION;REEL/FRAME:026656/0422

Effective date:20100331

Owner name:GR MATCH, LLC, CALIFORNIA

Free format text:SECURITY AGREEMENT;ASSIGNOR:CYBERDEFENDER CORPORATION;REEL/FRAME:026656/0537

Effective date:20110719

ASAssignment

Owner name:CYBERDEFENDER CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIU, BING;REEL/FRAME:026719/0700

Effective date:20051215

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp