ATE465463T1 - Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation - Google Patents
Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikationInfo
- Publication number
- ATE465463T1 ATE465463T1 AT05108251T AT05108251T ATE465463T1 AT E465463 T1 ATE465463 T1 AT E465463T1 AT 05108251 T AT05108251 T AT 05108251T AT 05108251 T AT05108251 T AT 05108251T AT E465463 T1 ATE465463 T1 AT E465463T1
- Authority
- AT
- Austria
- Prior art keywords
- network
- maliful
- isolating
- communications
- external
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4416—Network booting; Remote initial program loading [RIPL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/953,020 US7437721B2 (en) | 2004-09-29 | 2004-09-29 | Isolating software deployment over a network from external malicious intrusion |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE465463T1 true ATE465463T1 (de) | 2010-05-15 |
Family
ID=35466538
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT05108251T ATE465463T1 (de) | 2004-09-29 | 2005-09-08 | Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US7437721B2 (enExample) |
| EP (1) | EP1643408B1 (enExample) |
| JP (1) | JP4746393B2 (enExample) |
| KR (1) | KR101153073B1 (enExample) |
| CN (1) | CN1783811B (enExample) |
| AT (1) | ATE465463T1 (enExample) |
| DE (1) | DE602005020727D1 (enExample) |
Families Citing this family (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1869932A (zh) * | 2005-05-24 | 2006-11-29 | 中国银联股份有限公司 | 实现数据升级的计算机处理系统以及数据升级方法 |
| US7814480B2 (en) * | 2005-09-05 | 2010-10-12 | Seiko Epson Corporation | Control software updating technique for a network apparatus |
| US8291409B2 (en) * | 2006-05-22 | 2012-10-16 | Microsoft Corporation | Updating virtual machine with patch on host that does not have network access |
| US8266026B2 (en) * | 2006-09-29 | 2012-09-11 | Chicago Mercantile Exchange, Inc. | Derivative products |
| CN100426755C (zh) * | 2006-11-06 | 2008-10-15 | 吉林大学 | 可信网络核心设备 |
| CN101227314A (zh) * | 2007-01-18 | 2008-07-23 | 国际商业机器公司 | 用于通过网络安全地更新脆弱系统的装置和方法 |
| US8358703B2 (en) * | 2007-03-23 | 2013-01-22 | Thomson Licensing | Modifying a coded bitstream |
| US8588459B2 (en) * | 2007-06-14 | 2013-11-19 | Thomson Licensing | Modifying a coded bitstream |
| US8205217B2 (en) * | 2007-09-29 | 2012-06-19 | Symantec Corporation | Methods and systems for configuring a specific-use computing system limited to executing predetermined and pre-approved application programs |
| US20110078797A1 (en) * | 2008-07-29 | 2011-03-31 | Novell, Inc. | Endpoint security threat mitigation with virtual machine imaging |
| US9594900B2 (en) | 2008-12-09 | 2017-03-14 | Microsoft Technology Licensing, Llc | Isolating applications hosted by plug-in code |
| JP5675372B2 (ja) * | 2011-01-04 | 2015-02-25 | 株式会社日立メディコ | ウィルス監視システムとウィルス監視方法 |
| CN102541674B (zh) * | 2011-12-26 | 2014-04-23 | 运软网络科技(上海)有限公司 | 自主元素模型控制系统、方法及服务器受侵保护检测系统 |
| US8955092B2 (en) * | 2012-11-27 | 2015-02-10 | Symantec Corporation | Systems and methods for eliminating redundant security analyses on network data packets |
| JP6079218B2 (ja) * | 2012-12-26 | 2017-02-15 | 日本電気株式会社 | 通信制御システム、通信制御方法および通信制御プログラム |
| JP6400954B2 (ja) * | 2014-06-25 | 2018-10-03 | メタウォーター株式会社 | ウィルス感染防止システム |
| CN105992188B (zh) * | 2015-02-12 | 2019-07-19 | Oppo广东移动通信有限公司 | 一种应用更新方法及装置 |
| CN107924340A (zh) * | 2015-08-18 | 2018-04-17 | 日本电信电话株式会社 | 资源配置系统、资源配置方法以及资源配置程序 |
| IL275160B2 (en) | 2017-12-08 | 2025-05-01 | Net Thunder Llc | Automatically deployed information technology (it) system and method |
| US20200272757A1 (en) * | 2019-02-26 | 2020-08-27 | Lokawallet, Inc. | Securing a Computer Processing Environment from Receiving Undesired Content |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6009274A (en) * | 1996-12-13 | 1999-12-28 | 3Com Corporation | Method and apparatus for automatically updating software components on end systems over a network |
| JP2000339170A (ja) * | 1999-05-31 | 2000-12-08 | Yokohama Rubber Co Ltd:The | シン・クライアント導入システム |
| CN1281190A (zh) * | 2000-08-23 | 2001-01-24 | 深圳市宏网实业有限公司 | 单主板型网络安全电脑 |
| US6854112B2 (en) * | 2001-08-29 | 2005-02-08 | International Business Machines Corporation | System and method for the automatic installation and configuration of an operating system |
| JP3894758B2 (ja) * | 2001-09-07 | 2007-03-22 | 信佳 酒谷 | インターネット接続サーバ、初期設定サーバ、ホストサーバ、およびインターネット接続サーバの遠隔管理システム |
| US20030079216A1 (en) | 2001-10-18 | 2003-04-24 | International Business Machines Corporation | Apparatus and method of using a hybrid of fixed media data and network-based data to provide software changes |
| EP1333387A1 (en) | 2002-02-05 | 2003-08-06 | Siemens Aktiengesellschaft | A method of data refreshing of a mark-up language document |
| US7284062B2 (en) * | 2002-12-06 | 2007-10-16 | Microsoft Corporation | Increasing the level of automation when provisioning a computer system to access a network |
| US7290258B2 (en) * | 2003-06-25 | 2007-10-30 | Microsoft Corporation | Managing multiple devices on which operating systems can be automatically deployed |
| US7350201B2 (en) * | 2003-10-23 | 2008-03-25 | International Business Machines Corporation | Software distribution application supporting operating system installations |
| US7350072B2 (en) * | 2004-03-30 | 2008-03-25 | Intel Corporation | Remote management and provisioning of a system across a network based connection |
| US7540013B2 (en) * | 2004-06-07 | 2009-05-26 | Check Point Software Technologies, Inc. | System and methodology for protecting new computers by applying a preconfigured security update policy |
| JP2006018608A (ja) * | 2004-07-01 | 2006-01-19 | Japan Communication Inc | 端末装置、通信制御方法、及び、プログラム |
-
2004
- 2004-09-29 US US10/953,020 patent/US7437721B2/en not_active Expired - Fee Related
-
2005
- 2005-08-30 KR KR1020050079871A patent/KR101153073B1/ko not_active Expired - Fee Related
- 2005-09-08 DE DE602005020727T patent/DE602005020727D1/de not_active Expired - Lifetime
- 2005-09-08 AT AT05108251T patent/ATE465463T1/de not_active IP Right Cessation
- 2005-09-08 EP EP05108251A patent/EP1643408B1/en not_active Ceased
- 2005-09-29 CN CN2005101088858A patent/CN1783811B/zh not_active Expired - Fee Related
- 2005-09-29 JP JP2005284424A patent/JP4746393B2/ja not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| CN1783811B (zh) | 2010-10-06 |
| JP2006099780A (ja) | 2006-04-13 |
| CN1783811A (zh) | 2006-06-07 |
| EP1643408A3 (en) | 2006-04-26 |
| JP4746393B2 (ja) | 2011-08-10 |
| US7437721B2 (en) | 2008-10-14 |
| KR20060050799A (ko) | 2006-05-19 |
| US20060070056A1 (en) | 2006-03-30 |
| KR101153073B1 (ko) | 2012-06-04 |
| EP1643408A2 (en) | 2006-04-05 |
| DE602005020727D1 (de) | 2010-06-02 |
| EP1643408B1 (en) | 2010-04-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE465463T1 (de) | Das isolieren des einsetzens der software über ein netzwerk von externer böswilliger kommunikation | |
| Karnouskos | Stuxnet worm impact on industrial cyber-physical system security | |
| DE602005011542D1 (de) | Einsetzen und Empfangen von Software über ein Netzwerk anfällig für böswillige Kommunikation | |
| EP3314860B1 (en) | Enterprise reputations for uniform resource locators | |
| CN111737696A (zh) | 一种恶意文件检测的方法、系统、设备及可读存储介质 | |
| US11416606B2 (en) | Agent presence for self-healing | |
| GB2429381A (en) | AAA support for DHCP | |
| WO2016105936A1 (en) | Real-time mobile security posture | |
| EA200970201A1 (ru) | Способ и система для обеспечения специфических для доступа ключей | |
| BR0211883A (pt) | sistema para atualização de software em um dispositivo sem fio | |
| WO2016105940A1 (en) | Outbreak pathology inference | |
| RU2016125281A (ru) | Способ формирования списка агентов обновлений | |
| Hadar et al. | A lightweight vulnerability mitigation framework for IoT devices | |
| DE60316019D1 (de) | Verfahren, systeme und computerprogrammprodukte für nichtinvasive verwaltung einer mobilfunkstation | |
| FR2842056B1 (fr) | Procede, terminal et serveur de telecommunications | |
| DE602005013871D1 (de) | Netzwerkterminal, Lieferserver und Client/Server System zum Liefern von Betriebssystemdaten und Anwendungsdaten | |
| US11055075B2 (en) | User terminal device, server, and application execution method thereof | |
| CN110169100A (zh) | 配置文件管理的方法、嵌入式通用集成电路卡和终端 | |
| DE60313231D1 (de) | System zur Netzwerkverwaltung mit Regelüberprüfung | |
| CN110266501B (zh) | 区块链节点设备及区块链网络系统 | |
| WO2005026868A3 (en) | Method and system for wirelessly providing an update to a network appliance | |
| TW200705887A (en) | Apparatus, method for monitoring network, network system, network monitoring method and network communication method | |
| JP5963690B2 (ja) | 接続管理システム、接続管理方法、携帯端末及びサーバ | |
| CN104853145B (zh) | 设备组件自适应升级系统 | |
| CN103457934A (zh) | 基于网关设备的病毒防御方法、网关设备和服务器 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |