ATE465463T1 - Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation - Google Patents

Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation

Info

Publication number
ATE465463T1
ATE465463T1 AT05108251T AT05108251T ATE465463T1 AT E465463 T1 ATE465463 T1 AT E465463T1 AT 05108251 T AT05108251 T AT 05108251T AT 05108251 T AT05108251 T AT 05108251T AT E465463 T1 ATE465463 T1 AT E465463T1
Authority
AT
Austria
Prior art keywords
network
maliful
isolating
communications
external
Prior art date
Application number
AT05108251T
Other languages
English (en)
Inventor
Colin Watson
Martin L Holladay
Mukesh Karki
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Application granted granted Critical
Publication of ATE465463T1 publication Critical patent/ATE465463T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4416Network booting; Remote initial program loading [RIPL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
AT05108251T 2004-09-29 2005-09-08 Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation ATE465463T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/953,020 US7437721B2 (en) 2004-09-29 2004-09-29 Isolating software deployment over a network from external malicious intrusion

Publications (1)

Publication Number Publication Date
ATE465463T1 true ATE465463T1 (de) 2010-05-15

Family

ID=35466538

Family Applications (1)

Application Number Title Priority Date Filing Date
AT05108251T ATE465463T1 (de) 2004-09-29 2005-09-08 Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation

Country Status (7)

Country Link
US (1) US7437721B2 (de)
EP (1) EP1643408B1 (de)
JP (1) JP4746393B2 (de)
KR (1) KR101153073B1 (de)
CN (1) CN1783811B (de)
AT (1) ATE465463T1 (de)
DE (1) DE602005020727D1 (de)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1869932A (zh) * 2005-05-24 2006-11-29 中国银联股份有限公司 实现数据升级的计算机处理系统以及数据升级方法
US7814480B2 (en) * 2005-09-05 2010-10-12 Seiko Epson Corporation Control software updating technique for a network apparatus
US8291409B2 (en) * 2006-05-22 2012-10-16 Microsoft Corporation Updating virtual machine with patch on host that does not have network access
US8266026B2 (en) * 2006-09-29 2012-09-11 Chicago Mercantile Exchange, Inc. Derivative products
CN100426755C (zh) * 2006-11-06 2008-10-15 吉林大学 可信网络核心设备
CN101227314A (zh) * 2007-01-18 2008-07-23 国际商业机器公司 用于通过网络安全地更新脆弱系统的装置和方法
WO2008118146A1 (en) * 2007-03-23 2008-10-02 Thomson Licensing Modifying a coded bitstream
CN101681499B (zh) * 2007-06-14 2013-04-24 汤姆逊许可证公司 修改经编码的比特流
US8205217B2 (en) * 2007-09-29 2012-06-19 Symantec Corporation Methods and systems for configuring a specific-use computing system limited to executing predetermined and pre-approved application programs
US20110078797A1 (en) * 2008-07-29 2011-03-31 Novell, Inc. Endpoint security threat mitigation with virtual machine imaging
US9594900B2 (en) * 2008-12-09 2017-03-14 Microsoft Technology Licensing, Llc Isolating applications hosted by plug-in code
JP5675372B2 (ja) * 2011-01-04 2015-02-25 株式会社日立メディコ ウィルス監視システムとウィルス監視方法
CN102541674B (zh) * 2011-12-26 2014-04-23 运软网络科技(上海)有限公司 自主元素模型控制系统、方法及服务器受侵保护检测系统
US8955092B2 (en) * 2012-11-27 2015-02-10 Symantec Corporation Systems and methods for eliminating redundant security analyses on network data packets
JP6079218B2 (ja) * 2012-12-26 2017-02-15 日本電気株式会社 通信制御システム、通信制御方法および通信制御プログラム
JP6400954B2 (ja) * 2014-06-25 2018-10-03 メタウォーター株式会社 ウィルス感染防止システム
CN105992188B (zh) * 2015-02-12 2019-07-19 Oppo广东移动通信有限公司 一种应用更新方法及装置
JP6438144B2 (ja) * 2015-08-18 2018-12-12 日本電信電話株式会社 リソース構成システム、リソース構成方法及びリソース構成プログラム
EP3721350A4 (de) 2017-12-08 2021-12-29 Net-Thunder, LLC Automatisch eingesetztes system der informationstechnologie (it) und verfahren
US20200272757A1 (en) * 2019-02-26 2020-08-27 Lokawallet, Inc. Securing a Computer Processing Environment from Receiving Undesired Content

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6009274A (en) * 1996-12-13 1999-12-28 3Com Corporation Method and apparatus for automatically updating software components on end systems over a network
JP2000339170A (ja) * 1999-05-31 2000-12-08 Yokohama Rubber Co Ltd:The シン・クライアント導入システム
CN1281190A (zh) * 2000-08-23 2001-01-24 深圳市宏网实业有限公司 单主板型网络安全电脑
US6854112B2 (en) * 2001-08-29 2005-02-08 International Business Machines Corporation System and method for the automatic installation and configuration of an operating system
JP3894758B2 (ja) * 2001-09-07 2007-03-22 信佳 酒谷 インターネット接続サーバ、初期設定サーバ、ホストサーバ、およびインターネット接続サーバの遠隔管理システム
US20030079216A1 (en) 2001-10-18 2003-04-24 International Business Machines Corporation Apparatus and method of using a hybrid of fixed media data and network-based data to provide software changes
EP1333387A1 (de) 2002-02-05 2003-08-06 Siemens Aktiengesellschaft Eine Methode des Auffrischens von Daten in einem Dokument in einer Beschreibungssprache
US7284062B2 (en) * 2002-12-06 2007-10-16 Microsoft Corporation Increasing the level of automation when provisioning a computer system to access a network
US7290258B2 (en) * 2003-06-25 2007-10-30 Microsoft Corporation Managing multiple devices on which operating systems can be automatically deployed
US7350201B2 (en) * 2003-10-23 2008-03-25 International Business Machines Corporation Software distribution application supporting operating system installations
US7350072B2 (en) * 2004-03-30 2008-03-25 Intel Corporation Remote management and provisioning of a system across a network based connection
US7540013B2 (en) * 2004-06-07 2009-05-26 Check Point Software Technologies, Inc. System and methodology for protecting new computers by applying a preconfigured security update policy
JP2006018608A (ja) * 2004-07-01 2006-01-19 Japan Communication Inc 端末装置、通信制御方法、及び、プログラム

Also Published As

Publication number Publication date
DE602005020727D1 (de) 2010-06-02
KR20060050799A (ko) 2006-05-19
EP1643408A2 (de) 2006-04-05
CN1783811B (zh) 2010-10-06
EP1643408A3 (de) 2006-04-26
KR101153073B1 (ko) 2012-06-04
JP4746393B2 (ja) 2011-08-10
US7437721B2 (en) 2008-10-14
US20060070056A1 (en) 2006-03-30
CN1783811A (zh) 2006-06-07
EP1643408B1 (de) 2010-04-21
JP2006099780A (ja) 2006-04-13

Similar Documents

Publication Publication Date Title
ATE465463T1 (de) Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation
EP3238414B1 (de) Echtzeitmobilsicherheitslage
Karnouskos Stuxnet worm impact on industrial cyber-physical system security
US20220309157A1 (en) Agent presence for self-healing
DE602005011542D1 (de) Einsetzen und Empfangen von Software über ein Netzwerk anfällig für böswillige Kommunikation
EP3314860B1 (de) Unternehmensreputationen für gleichförmige ressourcenlokalisierer
CN111737696A (zh) 一种恶意文件检测的方法、系统、设备及可读存储介质
WO2007001679A3 (en) Secure and stable hosting of third-party extensions to web services
EA200970201A1 (ru) Способ и система для обеспечения специфических для доступа ключей
BRPI0517261A (pt) sistema e método para fornercer um protocolo de autenticação multicredencial
AU2003287251A8 (en) Methods, systems and computer program products for non-intrusive subsequent provisioning of a mobile terminal
SG113603A1 (en) System and method for adaptable provisioning of generic application content
FR2842056B1 (fr) Procede, terminal et serveur de telecommunications
EA200501377A1 (ru) Сетевое оконечное устройство, сервер доставки и система клиент/сервер
JP2005251204A (ja) 共存ドライバ
DE60313231D1 (de) System zur Netzwerkverwaltung mit Regelüberprüfung
CN109067809B (zh) 安全组件的权限配置方法、装置、设备及存储介质
TW200705887A (en) Apparatus, method for monitoring network, network system, network monitoring method and network communication method
Maroof et al. iRECOVer: Patch your IoT on-the-fly
Zheng et al. IoTAegis: A scalable framework to secure the Internet of Things
CN110266501B (zh) 区块链节点设备及区块链网络系统
FR2892837B1 (fr) Telechargement de donnees dans des objets communicants portables presents dans un reseau de radiocommunications pendant une campagne
Scholz et al. Security analysis of Devolo HomePlug devices
MX2021011860A (es) Sistema y metodo para configurar y gestionar dispositivos de campo de un edificio.
JP2007272717A (ja) 情報管理装置およびその方法

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties