BRPI0616018A2 - sistemas e métodos de segurança para redes de computador - Google Patents

sistemas e métodos de segurança para redes de computador Download PDF

Info

Publication number
BRPI0616018A2
BRPI0616018A2 BRPI0616018-2A BRPI0616018A BRPI0616018A2 BR PI0616018 A2 BRPI0616018 A2 BR PI0616018A2 BR PI0616018 A BRPI0616018 A BR PI0616018A BR PI0616018 A2 BRPI0616018 A2 BR PI0616018A2
Authority
BR
Brazil
Prior art keywords
file
server
host
hosts
guidelines
Prior art date
Application number
BRPI0616018-2A
Other languages
English (en)
Portuguese (pt)
Inventor
Todd F Brennan
Allen Hillery
John Hanratty
Original Assignee
Bit9 Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=37709277&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=BRPI0616018(A2) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US11/193,295 external-priority patent/US8272058B2/en
Priority claimed from US11/193,292 external-priority patent/US7895651B2/en
Priority claimed from US11/193,291 external-priority patent/US20070028302A1/en
Priority claimed from US11/194,078 external-priority patent/US8984636B2/en
Priority claimed from US11/194,075 external-priority patent/US20070028291A1/en
Application filed by Bit9 Inc filed Critical Bit9 Inc
Publication of BRPI0616018A2 publication Critical patent/BRPI0616018A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
BRPI0616018-2A 2005-07-29 2006-07-27 sistemas e métodos de segurança para redes de computador BRPI0616018A2 (pt)

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
US11/193,295 US8272058B2 (en) 2005-07-29 2005-07-29 Centralized timed analysis in a network security system
US11/193,292 US7895651B2 (en) 2005-07-29 2005-07-29 Content tracking in a network security system
US11/194,075 2005-07-29
US11/193,291 US20070028302A1 (en) 2005-07-29 2005-07-29 Distributed meta-information query in a network
US11/193,295 2005-07-29
US11/194,078 2005-07-29
US11/193,292 2005-07-29
US11/194,078 US8984636B2 (en) 2005-07-29 2005-07-29 Content extractor and analysis system
US11/194,075 US20070028291A1 (en) 2005-07-29 2005-07-29 Parametric content control in a network security system
US11/193,291 2005-07-29
PCT/US2006/029714 WO2007016478A2 (en) 2005-07-29 2006-07-27 Network security systems and methods

Publications (1)

Publication Number Publication Date
BRPI0616018A2 true BRPI0616018A2 (pt) 2011-06-07

Family

ID=37709277

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0616018-2A BRPI0616018A2 (pt) 2005-07-29 2006-07-27 sistemas e métodos de segurança para redes de computador

Country Status (6)

Country Link
EP (1) EP1920338B1 (https=)
JP (2) JP2009507271A (https=)
CN (1) CN103984891A (https=)
BR (1) BRPI0616018A2 (https=)
CA (1) CA2617204C (https=)
WO (1) WO2007016478A2 (https=)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006101549A2 (en) 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
US7757269B1 (en) 2006-02-02 2010-07-13 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US7895573B1 (en) 2006-03-27 2011-02-22 Mcafee, Inc. Execution environment file inventory
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
JP5126495B2 (ja) * 2007-11-01 2013-01-23 日本電気株式会社 安全度評価と連動するセキュリティの方針設定装置、そのプログラムおよびその方法
US8549625B2 (en) * 2008-12-12 2013-10-01 International Business Machines Corporation Classification of unwanted or malicious software through the identification of encrypted data communication
US8161556B2 (en) * 2008-12-17 2012-04-17 Symantec Corporation Context-aware real-time computer-protection systems and methods
US20120198553A1 (en) * 2009-09-14 2012-08-02 Junko Suginaka Secure auditing system and secure auditing method
US8572740B2 (en) 2009-10-01 2013-10-29 Kaspersky Lab, Zao Method and system for detection of previously unknown malware
WO2011089864A1 (ja) * 2010-01-21 2011-07-28 日本電気株式会社 ファイル群整合性検証システム、ファイル群整合性検証方法およびファイル群整合性検証用プログラム
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
JP5610524B2 (ja) 2010-09-22 2014-10-22 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation 文書の優先度を決定する方法、プログラム及び装置
JP5779334B2 (ja) 2010-11-09 2015-09-16 デジタルア−ツ株式会社 出力制御装置、出力制御プログラム、出力制御方法および出力制御システム
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8800024B2 (en) 2011-10-17 2014-08-05 Mcafee, Inc. System and method for host-initiated firewall discovery in a network environment
CN103975331B (zh) * 2011-12-06 2017-06-13 阿沃森特亨茨维尔有限责任公司 并入了被管理基础设施设备的安全的数据中心基础设施管理系统
WO2013141517A1 (ko) * 2012-03-18 2013-09-26 엘지전자 주식회사 제어 장치 및 그의 동작 방법, 서버 및 그의 동작 방법
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
CN105580023B (zh) 2013-10-24 2019-08-16 迈克菲股份有限公司 网络环境中的代理辅助的恶意应用阻止
CN104239797B (zh) * 2014-10-13 2017-07-07 北京奇虎科技有限公司 主动防御方法及装置
US10719608B2 (en) * 2015-02-06 2020-07-21 Honeywell International Inc. Patch monitoring and analysis
CN105320883B (zh) * 2015-11-11 2018-05-15 北京奇虎科技有限公司 文件安全加载实现方法及装置
CN107277037A (zh) * 2017-07-14 2017-10-20 北京安数云信息技术有限公司 基于插件的任意文件操作检测方法和装置
CN109472139B (zh) * 2017-12-25 2022-04-19 北京安天网络安全技术有限公司 一种防御勒索病毒对主机文档二次加密的方法及系统
CN108874416B (zh) * 2018-05-04 2022-10-28 天津猎鹰网络技术有限公司 策略处理方法、装置、存储介质、处理器
US10496842B1 (en) * 2018-07-16 2019-12-03 Didi Research America, Llc Multi-pronged file anomaly detection based on violation counts
CN109672526B (zh) * 2018-12-17 2021-11-09 福建联迪商用设备有限公司 一种管控可执行程序的方法及系统
CN110096877B (zh) * 2019-04-24 2021-06-04 厦门网宿有限公司 一种文件处理方法及装置
WO2021011114A1 (en) 2019-07-15 2021-01-21 Bonczar David Thomas Methods and systems for automatically securing endpoint device data communications
TWI734183B (zh) * 2019-08-30 2021-07-21 台中商業銀行股份有限公司 黑名單資料庫檢索系統及檢索方法
AU2021447270B2 (en) * 2021-05-28 2025-06-19 Ntt, Inc. Detection device, detection method, and detection program
CN113973019B (zh) * 2021-12-27 2022-04-01 北京安博通科技股份有限公司 一种网络病毒检测方法及网络设备
CN117708179B (zh) * 2024-02-02 2024-05-03 成都深瑞同华科技有限公司 电力综合监控系统测点数据缓存方法、装置、设备及介质
KR102705846B1 (ko) * 2024-02-05 2024-09-12 (주) 시큐에버 블록체인 기반 인공지능을 이용한 데이터 변경 추적 시스템

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2316000A (en) * 1999-02-04 2000-08-25 Apion Telecoms Limited A telecommunications gateway
US20020128935A1 (en) * 2001-03-12 2002-09-12 Smart Mediary Systems, Llc Many-to-many mediated commercial electronic publishing
US6920558B2 (en) * 2001-03-20 2005-07-19 Networks Associates Technology, Inc. Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US7203966B2 (en) * 2001-06-27 2007-04-10 Microsoft Corporation Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US8495227B2 (en) * 2003-12-11 2013-07-23 International Business Machines Corporation Method and system to distribute policies

Also Published As

Publication number Publication date
CA2617204A1 (en) 2007-02-08
CN103984891A (zh) 2014-08-13
JP2009507271A (ja) 2009-02-19
CA2617204C (en) 2016-07-05
WO2007016478A2 (en) 2007-02-08
EP1920338A2 (en) 2008-05-14
EP1920338A4 (en) 2009-11-25
JP5809084B2 (ja) 2015-11-10
WO2007016478A3 (en) 2009-04-16
JP2012146317A (ja) 2012-08-02
EP1920338B1 (en) 2013-05-15

Similar Documents

Publication Publication Date Title
US7895651B2 (en) Content tracking in a network security system
BRPI0616018A2 (pt) sistemas e métodos de segurança para redes de computador
US8984636B2 (en) Content extractor and analysis system
US8782800B2 (en) Parametric content control in a network security system
US8272058B2 (en) Centralized timed analysis in a network security system
US20070028302A1 (en) Distributed meta-information query in a network
US20240080329A1 (en) Cloud Resource Risk Scenario Assessment and Remediation
Sailer et al. Attestation-based policy enforcement for remote access
US20090271863A1 (en) Identifying unauthorized privilege escalations
US7437766B2 (en) Method and apparatus providing deception and/or altered operation in an information system operating system
US12591674B2 (en) Ransomware detection and mitigation
US12401669B1 (en) Container vulnerability management by a data platform
WO2024044053A1 (en) Cloud resource risk scenario assessment and remediation
US12464003B1 (en) Capturing and using application-level data to monitor a compute environment
US12489770B1 (en) Agent-based monitoring of a registry space of a compute asset within a compute environment
WO2023038957A1 (en) Monitoring a software development pipeline
Demissie et al. Assessing the effectiveness of the shared responsibility model for cloud databases: The case of Google’s firebase
US12470578B1 (en) Containerized agent for monitoring container activity in a compute environment
US12470577B1 (en) Kernel-based monitoring of container activity in a compute environment
US20070079364A1 (en) Directory-secured packages for authentication of software installation
US20250298905A1 (en) Vulnerability remediation recommendation mechanism
US12368746B1 (en) Modular agentless scanning of cloud workloads
EP4427153A1 (en) Agentless workload assessment by a data platform
US12587553B1 (en) Notification-based file integrity monitoring of a compute environment
Mookhey et al. Linux: Security, Audit and Control Features

Legal Events

Date Code Title Description
B07A Application suspended after technical examination (opinion) [chapter 7.1 patent gazette]
B15K Others concerning applications: alteration of classification

Ipc: G06F 12/14 (2006.01), G06F 21/52 (2013.01), G06F 1

B09B Patent application refused [chapter 9.2 patent gazette]
B09B Patent application refused [chapter 9.2 patent gazette]

Free format text: MANTIDO O INDEFERIMENTO UMA VEZ QUE NAO FOI APRESENTADO RECURSO DENTRO DO PRAZO LEGAL