WO2002006930A3 - Identifying unauthorized communication systems based on their memory contents - Google Patents

Identifying unauthorized communication systems based on their memory contents Download PDF

Info

Publication number
WO2002006930A3
WO2002006930A3 PCT/US2001/022206 US0122206W WO0206930A3 WO 2002006930 A3 WO2002006930 A3 WO 2002006930A3 US 0122206 W US0122206 W US 0122206W WO 0206930 A3 WO0206930 A3 WO 0206930A3
Authority
WO
WIPO (PCT)
Prior art keywords
communication system
client
communication systems
memory segment
systems based
Prior art date
Application number
PCT/US2001/022206
Other languages
French (fr)
Other versions
WO2002006930A2 (en
Inventor
Robert G Watkins
Andrew L Wick
Original Assignee
America Online Inc
Robert G Watkins
Andrew L Wick
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by America Online Inc, Robert G Watkins, Andrew L Wick filed Critical America Online Inc
Priority to AU2001280550A priority Critical patent/AU2001280550A1/en
Priority to EP01958945A priority patent/EP1303969A2/en
Publication of WO2002006930A2 publication Critical patent/WO2002006930A2/en
Publication of WO2002006930A3 publication Critical patent/WO2002006930A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

An authorized client communication system seeking access to a host communication system may be identified by locating a memory segment within the client communication system that stores client software used to access the host computer system. The memory segment then is examined to determine whether the client software stored in the memory segment corresponds to client software for an official client communication system. Communications from the client communication system are terminated when the client software in the memory segment is determined to diverge from software for an official client communication system.
PCT/US2001/022206 2000-07-14 2001-07-13 Identifying unauthorized communication systems based on their memory contents WO2002006930A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2001280550A AU2001280550A1 (en) 2000-07-14 2001-07-13 Identifying unauthorized communication systems based on their memory contents
EP01958945A EP1303969A2 (en) 2000-07-14 2001-07-13 Identifying unauthorized communication systems based on their memory contents

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US21824300P 2000-07-14 2000-07-14
US60/218,243 2000-07-14
US74963800A 2000-12-28 2000-12-28
US09/749,638 2000-12-28
US09/851,121 US6954861B2 (en) 2000-07-14 2001-05-09 Identifying unauthorized communication systems based on their memory contents
US09/851,121 2001-05-09

Publications (2)

Publication Number Publication Date
WO2002006930A2 WO2002006930A2 (en) 2002-01-24
WO2002006930A3 true WO2002006930A3 (en) 2002-09-06

Family

ID=27396516

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/022206 WO2002006930A2 (en) 2000-07-14 2001-07-13 Identifying unauthorized communication systems based on their memory contents

Country Status (4)

Country Link
US (2) US6954861B2 (en)
EP (1) EP1303969A2 (en)
AU (1) AU2001280550A1 (en)
WO (1) WO2002006930A2 (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1266507B1 (en) * 2000-03-17 2004-06-02 America Online, Inc. Home-networking
US7546337B1 (en) * 2000-05-18 2009-06-09 Aol Llc, A Delaware Limited Liability Company Transferring files
US7237123B2 (en) 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
EP1395890A2 (en) 2001-05-09 2004-03-10 ECD Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
GB0129596D0 (en) * 2001-12-11 2002-01-30 Nokia Corp Risk detection
US7325065B1 (en) * 2001-12-21 2008-01-29 Aol Llc, A Delaware Limited Liability Company Identifying unauthorized communication systems using a system-specific identifier
US7383339B1 (en) 2002-07-31 2008-06-03 Aol Llc, A Delaware Limited Liability Company Local proxy server for establishing device controls
US20040093401A1 (en) * 2002-11-13 2004-05-13 International Business Machines Corporation Client-server text messaging monitoring for remote computer management
US8343235B2 (en) * 2002-12-11 2013-01-01 Broadcom Corporation Theft prevention of media peripherals in a media exchange network
ATE419706T1 (en) * 2002-12-30 2009-01-15 Koninkl Philips Electronics Nv USER ACCESS CONTROL TO SERVER CONTENT FROM AN INFORMATION CARRIER PLAYER
US20040249897A1 (en) * 2003-06-09 2004-12-09 Espinosa Claudia Leticia Method, system and apparatus for rejecting unauthorized or SPAM e-mail messages
US9286445B2 (en) * 2003-12-18 2016-03-15 Red Hat, Inc. Rights management system
US7648948B2 (en) 2005-04-08 2010-01-19 Exxonmobil Chemical Patents Inc. Additive system for lubricants
US7571476B2 (en) * 2005-04-14 2009-08-04 Webroot Software, Inc. System and method for scanning memory for pestware
US7349931B2 (en) * 2005-04-14 2008-03-25 Webroot Software, Inc. System and method for scanning obfuscated files for pestware
US7591016B2 (en) * 2005-04-14 2009-09-15 Webroot Software, Inc. System and method for scanning memory for pestware offset signatures
US7803332B2 (en) 2005-05-31 2010-09-28 Exxonmobil Chemical Patents Inc. Reactor temperature control
US7953980B2 (en) * 2005-06-30 2011-05-31 Intel Corporation Signed manifest for run-time verification of software program identity and integrity
US8839450B2 (en) 2007-08-02 2014-09-16 Intel Corporation Secure vault service for software components within an execution environment
US7669242B2 (en) * 2005-06-30 2010-02-23 Intel Corporation Agent presence monitor configured to execute in a secure environment
US8112798B2 (en) * 2005-11-09 2012-02-07 Microsoft Corporation Hardware-aided software code measurement
WO2008001322A2 (en) * 2006-06-30 2008-01-03 International Business Machines Corporation Message handling at a mobile device
JP2009545817A (en) * 2006-07-31 2009-12-24 キュー・エス・アイ・コーポレーション Pressure-sensitive input device with raised contact surface
US8190868B2 (en) 2006-08-07 2012-05-29 Webroot Inc. Malware management through kernel detection
DE102007034525B4 (en) * 2007-07-24 2010-02-11 Siemens Ag Method and system for checking the integrity of data stored in a predetermined memory area of a memory
US20090064314A1 (en) * 2007-08-31 2009-03-05 Lee Michael M Method and Apparatus for Implementing Parental Controls for a Portable Media Device
US8099718B2 (en) * 2007-11-13 2012-01-17 Intel Corporation Method and system for whitelisting software components
JP5222662B2 (en) * 2008-08-22 2013-06-26 株式会社日立製作所 Content control system
US8364601B2 (en) * 2008-12-31 2013-01-29 Intel Corporation Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain
US11489857B2 (en) 2009-04-21 2022-11-01 Webroot Inc. System and method for developing a risk profile for an internet resource
US10409984B1 (en) 2012-06-15 2019-09-10 Square, Inc. Hierarchical data security measures for a mobile device
CN104318138B (en) * 2014-09-30 2018-05-08 杭州同盾科技有限公司 A kind of method and apparatus for verifying user identity
US10733594B1 (en) 2015-05-11 2020-08-04 Square, Inc. Data security measures for mobile devices
US10546302B2 (en) 2016-06-30 2020-01-28 Square, Inc. Logical validation of devices against fraud and tampering
US10373167B2 (en) 2016-06-30 2019-08-06 Square, Inc. Logical validation of devices against fraud
US10496993B1 (en) 2017-02-15 2019-12-03 Square, Inc. DNS-based device geolocation
US10484350B2 (en) * 2017-04-26 2019-11-19 At&T Intellectual Property I, L.P. Privacy-preserving location corroborations
US10552308B1 (en) 2017-06-23 2020-02-04 Square, Inc. Analyzing attributes of memory mappings to identify processes running on a device
US11392718B1 (en) * 2018-12-03 2022-07-19 Proof of Concept, LLC Method and system for determining transfer of asynchronous correlation of data entries in spatial instances of heterogeneous databases
US10715536B2 (en) 2017-12-29 2020-07-14 Square, Inc. Logical validation of devices against fraud and tampering
US11500948B1 (en) 2018-06-01 2022-11-15 Proof of Concept, LLC Method and system for asynchronous correlation of data entries in spatially separated instances of heterogeneous databases
US11507958B1 (en) 2018-09-26 2022-11-22 Block, Inc. Trust-based security for transaction payments
US11494762B1 (en) 2018-09-26 2022-11-08 Block, Inc. Device driver for contactless payments

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999066422A1 (en) * 1995-06-07 1999-12-23 Ascom Hasler Mailing Systems, Inc. Technique for securing a system configuration of a postage franking system
US6073123A (en) * 1997-02-26 2000-06-06 Staley; Clinton A. Method and apparatus for detecting unauthorized copies of software

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
JP3666700B2 (en) * 1996-08-08 2005-06-29 マツダ株式会社 Vehicle antitheft device and its code registration method
US6134659A (en) * 1998-01-07 2000-10-17 Sprong; Katherine A. Controlled usage software
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US6889212B1 (en) * 2000-07-11 2005-05-03 Motorola, Inc. Method for enforcing a time limited software license in a mobile communication device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999066422A1 (en) * 1995-06-07 1999-12-23 Ascom Hasler Mailing Systems, Inc. Technique for securing a system configuration of a postage franking system
US6073123A (en) * 1997-02-26 2000-06-06 Staley; Clinton A. Method and apparatus for detecting unauthorized copies of software

Also Published As

Publication number Publication date
US20060053489A1 (en) 2006-03-09
WO2002006930A2 (en) 2002-01-24
US7516496B2 (en) 2009-04-07
EP1303969A2 (en) 2003-04-23
US6954861B2 (en) 2005-10-11
AU2001280550A1 (en) 2002-01-30
US20020120871A1 (en) 2002-08-29

Similar Documents

Publication Publication Date Title
WO2002006930A3 (en) Identifying unauthorized communication systems based on their memory contents
CN100464313C (en) Mobile memory device and method for accessing encrypted data in mobile memory device
WO2004046934A3 (en) Secure memory for protecting against malicious programs
AU2003287947A1 (en) Methods and systems for moving data objects using locks
CA2312096A1 (en) Mass storage data protection device for a gaming machine
EP1500206A4 (en) System and method for managing wireless devices in an enterprise
WO2004006536A3 (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
GB0111188D0 (en) Electronic settlement system, settlement management device, store device, client, data storage device, computer program, and storage medium
WO2001077775A3 (en) Network content access control
WO2005119962A3 (en) System and method for presenting copy protected content to a user
WO2004015515A3 (en) System and method for authentication
WO2007124206A3 (en) System and method for securing information in a virtual computing environment
CA2418758A1 (en) Interactive and/or secure activation of a tool
WO2001048582A3 (en) Method and device for presenting data to a user
WO2002052809A3 (en) Method and apparatus for preventing unauthorized access by a network device
WO2005050381A3 (en) Systems and methods for performing storage operations using network attached storage
WO2001016705A3 (en) System, method, and article of manufacture for piecemeal retrieval in an information services patterns environment
CA2369108A1 (en) Handling a request for information provided by a network site
AU2001249583A1 (en) Device interfaces networking a computer and an embedded device
WO2001091479A3 (en) Location-based data access control
WO2005099035A3 (en) Discovery of occurrence-data
EP1271277A3 (en) Security system and software to prevent unauthorized use of a computing device
EP1717661A3 (en) Security system for game devices connected with a server
WO2003021457A1 (en) Individual authentication method
WO2001095160A3 (en) Accessing state information in a hardware/software co-simulation

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US US US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 2001958945

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2001958945

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP