CA2668204C - Program modification and load times in computing devices - Google Patents
Program modification and load times in computing devices Download PDFInfo
- Publication number
- CA2668204C CA2668204C CA2668204A CA2668204A CA2668204C CA 2668204 C CA2668204 C CA 2668204C CA 2668204 A CA2668204 A CA 2668204A CA 2668204 A CA2668204 A CA 2668204A CA 2668204 C CA2668204 C CA 2668204C
- Authority
- CA
- Canada
- Prior art keywords
- programs
- computing
- files
- program
- last
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/362—Debugging of software
- G06F11/3644—Debugging of software by instrumenting at runtime
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Debugging And Monitoring (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
- Automatic Analysis And Handling Materials Therefor (AREA)
- Preparation Of Compounds By Using Micro-Organisms (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/566,170 US7698305B2 (en) | 2006-12-01 | 2006-12-01 | Program modification and loading times in computing devices |
| US11/566,170 | 2006-12-01 | ||
| PCT/US2007/086195 WO2008070587A1 (en) | 2006-12-01 | 2007-11-30 | System analysis and management |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CA2668204A1 CA2668204A1 (en) | 2008-06-12 |
| CA2668204C true CA2668204C (en) | 2015-06-02 |
Family
ID=39493284
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA2668204A Active CA2668204C (en) | 2006-12-01 | 2007-11-30 | Program modification and load times in computing devices |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US7698305B2 (enExample) |
| EP (2) | EP2126702A4 (enExample) |
| JP (1) | JP4903879B2 (enExample) |
| KR (1) | KR101443932B1 (enExample) |
| CN (1) | CN101542446B (enExample) |
| AU (1) | AU2007329468B8 (enExample) |
| BR (1) | BRPI0719184A2 (enExample) |
| CA (1) | CA2668204C (enExample) |
| MX (1) | MX2009004903A (enExample) |
| NO (2) | NO20092482L (enExample) |
| RU (1) | RU2451326C2 (enExample) |
| WO (1) | WO2008070587A1 (enExample) |
Families Citing this family (34)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8250657B1 (en) | 2006-12-29 | 2012-08-21 | Symantec Corporation | Web site hygiene-based computer security |
| US8312536B2 (en) | 2006-12-29 | 2012-11-13 | Symantec Corporation | Hygiene-based computer security |
| US8499063B1 (en) * | 2008-03-31 | 2013-07-30 | Symantec Corporation | Uninstall and system performance based software application reputation |
| JP5178319B2 (ja) * | 2008-05-22 | 2013-04-10 | キヤノン株式会社 | アプリケーションプラットフォーム |
| US8595282B2 (en) | 2008-06-30 | 2013-11-26 | Symantec Corporation | Simplified communication of a reputation score for an entity |
| US8413251B1 (en) | 2008-09-30 | 2013-04-02 | Symantec Corporation | Using disposable data misuse to determine reputation |
| US8904520B1 (en) | 2009-03-19 | 2014-12-02 | Symantec Corporation | Communication-based reputation system |
| US8381289B1 (en) | 2009-03-31 | 2013-02-19 | Symantec Corporation | Communication-based host reputation system |
| JP5487962B2 (ja) * | 2009-12-28 | 2014-05-14 | 株式会社リコー | 操作抑制システム、画像形成装置、操作抑制情報提供装置、及び操作抑制方法 |
| US8341745B1 (en) | 2010-02-22 | 2012-12-25 | Symantec Corporation | Inferring file and website reputations by belief propagation leveraging machine reputation |
| US8510836B1 (en) | 2010-07-06 | 2013-08-13 | Symantec Corporation | Lineage-based reputation system |
| US8869307B2 (en) * | 2010-11-19 | 2014-10-21 | Mobile Iron, Inc. | Mobile posture-based policy, remediation and access control for enterprise resources |
| JP5682467B2 (ja) * | 2011-06-14 | 2015-03-11 | 富士通株式会社 | 設定情報管理プログラム、設定情報管理方法及び情報処理装置 |
| US9059949B2 (en) * | 2011-08-23 | 2015-06-16 | Bank Of America Corporation | Monitoring of regulated associates |
| US9124472B1 (en) | 2012-07-25 | 2015-09-01 | Symantec Corporation | Providing file information to a client responsive to a file download stability prediction |
| JP6070847B2 (ja) * | 2013-08-09 | 2017-02-01 | 富士通株式会社 | 検証方法、検証装置および検証プログラム |
| US9471798B2 (en) | 2013-09-20 | 2016-10-18 | Oracle International Corporation | Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm |
| US9519513B2 (en) | 2013-12-03 | 2016-12-13 | Vmware, Inc. | Methods and apparatus to automatically configure monitoring of a virtual machine |
| US9678731B2 (en) | 2014-02-26 | 2017-06-13 | Vmware, Inc. | Methods and apparatus to generate a customized application blueprint |
| JP2015162136A (ja) * | 2014-02-28 | 2015-09-07 | 東芝テック株式会社 | 情報処理装置及び情報処理プログラム |
| US9916171B2 (en) * | 2014-07-10 | 2018-03-13 | International Business Machines Corporation | Application discovery in virtual machines using temporal clustering of installation files |
| US10171437B2 (en) * | 2015-04-24 | 2019-01-01 | Oracle International Corporation | Techniques for security artifacts management |
| US10699020B2 (en) | 2015-07-02 | 2020-06-30 | Oracle International Corporation | Monitoring and alert services and data encryption management |
| US10489352B2 (en) * | 2015-11-16 | 2019-11-26 | International Business Machines Corporation | Software discovery for software on shared file systems |
| US9965313B2 (en) * | 2016-01-05 | 2018-05-08 | Bitdefender IPR Management Ltd. | Systems and methods for auditing a virtual machine |
| CN108959951B (zh) * | 2017-05-19 | 2021-01-12 | 北京瑞星网安技术股份有限公司 | 文档安全防护的方法、装置、设备及可读存储介质 |
| US11113138B2 (en) | 2018-01-02 | 2021-09-07 | Carrier Corporation | System and method for analyzing and responding to errors within a log file |
| US10628138B2 (en) | 2018-02-09 | 2020-04-21 | International Business Machines Corporation | Automated management of undesired code use based on predicted valuation and risk analysis |
| US11163557B2 (en) * | 2019-11-08 | 2021-11-02 | International Business Machines Corporation | Automated techniques for detecting the usage of software applications in a computing environment using configuration objects |
| US20230064102A1 (en) * | 2020-02-05 | 2023-03-02 | Nec Corporation | Analysis system, method, and program |
| RU2743620C1 (ru) | 2020-06-26 | 2021-02-20 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Способ и система определения вредоносной активности по анализу поведения объектов в неизолированной среде |
| CN113992717A (zh) * | 2021-10-28 | 2022-01-28 | 傲拓科技股份有限公司 | 基于tsn技术的边缘数据采集系统及方法 |
| US12026048B2 (en) * | 2022-09-16 | 2024-07-02 | Bank Of America Corporation | Early detection and avoidance of mainframe job errors |
| CN116383165B (zh) * | 2023-06-03 | 2023-08-11 | 浙江档安科技有限公司 | 一种适应性写入的档案保存方法 |
Family Cites Families (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH06222933A (ja) * | 1993-01-26 | 1994-08-12 | Toshiba Corp | 計算機システム |
| US5694546A (en) | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
| US6282712B1 (en) * | 1995-03-10 | 2001-08-28 | Microsoft Corporation | Automatic software installation on heterogeneous networked computer systems |
| US5675510A (en) | 1995-06-07 | 1997-10-07 | Pc Meter L.P. | Computer use meter and analyzer |
| US6151643A (en) * | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
| US5797016A (en) * | 1996-10-29 | 1998-08-18 | Cheyenne Software Inc. | Regeneration agent for back-up software |
| US6041333A (en) * | 1997-11-14 | 2000-03-21 | Microsoft Corporation | Method and apparatus for automatically updating a data file from a network |
| US6047390A (en) * | 1997-12-22 | 2000-04-04 | Motorola, Inc. | Multiple context software analysis |
| JPH11232109A (ja) * | 1998-02-10 | 1999-08-27 | Hitachi Ltd | クラスオブジェクトのロード方法 |
| US6374401B1 (en) | 1999-03-29 | 2002-04-16 | International Business Machines Corporation | System, method, and program for updating registry objects with a cross-platform installation program |
| JP3444227B2 (ja) * | 1999-04-09 | 2003-09-08 | 日本電気株式会社 | ソフトウェアの不正使用防止方法 |
| US7073198B1 (en) | 1999-08-26 | 2006-07-04 | Ncircle Network Security, Inc. | Method and system for detecting a vulnerability in a network |
| US6574729B1 (en) | 1999-08-26 | 2003-06-03 | Lucent Technologies Inc. | System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server |
| US7085936B1 (en) | 1999-08-30 | 2006-08-01 | Symantec Corporation | System and method for using login correlations to detect intrusions |
| US6775657B1 (en) | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method |
| JP3578266B2 (ja) * | 2000-01-06 | 2004-10-20 | インターナショナル・ビジネス・マシーンズ・コーポレーション | アプリケーションの起動方法、アプリケーションの起動のためのソフトウエア・プロダクト |
| EP1277326A2 (en) | 2000-04-28 | 2003-01-22 | Internet Security Systems, Inc. | Method and system for managing computer security information |
| US20030023857A1 (en) | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression |
| US7032244B2 (en) | 2001-10-02 | 2006-04-18 | International Business Machines Corporation | Identifying potential intruders on a server |
| US6874001B2 (en) * | 2001-10-05 | 2005-03-29 | International Business Machines Corporation | Method of maintaining data consistency in a loose transaction model |
| US20050114285A1 (en) | 2001-11-16 | 2005-05-26 | Cincotta Frank A. | Data replication system and method |
| JP2004127253A (ja) * | 2002-07-31 | 2004-04-22 | Ricoh Co Ltd | 情報処理装置およびバージョンチェック方法 |
| JP2004164351A (ja) * | 2002-11-14 | 2004-06-10 | Hitachi Ltd | コンピュータシステムの不正プログラム修正方法およびその装置 |
| US6980927B2 (en) | 2002-11-27 | 2005-12-27 | Telos Corporation | Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment |
| US20070128899A1 (en) * | 2003-01-12 | 2007-06-07 | Yaron Mayer | System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows |
| US7024548B1 (en) | 2003-03-10 | 2006-04-04 | Cisco Technology, Inc. | Methods and apparatus for auditing and tracking changes to an existing configuration of a computerized device |
| US7124400B2 (en) * | 2003-03-12 | 2006-10-17 | Microsoft Corporation | Extensible customization framework for a software system |
| US7168064B2 (en) * | 2003-03-25 | 2007-01-23 | Electric Cloud, Inc. | System and method for supplementing program builds with file usage information |
| US20050010916A1 (en) * | 2003-05-24 | 2005-01-13 | Hagen David A. | System for providing software application updates to multiple clients on a network |
| US7478433B2 (en) * | 2003-06-19 | 2009-01-13 | Panasonic Corporation | Program execution system having authentication function |
| JP2005063259A (ja) * | 2003-08-18 | 2005-03-10 | Canon Inc | アプリケーションの共用ファイル制御方法 |
| US7840646B2 (en) * | 2003-10-08 | 2010-11-23 | Yahoo! Inc. | Learned upload time estimate module |
| JP4937902B2 (ja) * | 2004-03-17 | 2012-05-23 | アルカテル−ルーセント ユーエスエー インコーポレーテッド | オペレーティングシステム環境でのプロセス状態情報の管理 |
| US20060047713A1 (en) | 2004-08-03 | 2006-03-02 | Wisdomforce Technologies, Inc. | System and method for database replication by interception of in memory transactional change records |
| US7716530B2 (en) * | 2006-02-28 | 2010-05-11 | Microsoft Corporation | Thread interception and analysis |
-
2006
- 2006-12-01 US US11/566,170 patent/US7698305B2/en active Active
-
2007
- 2007-11-30 CN CN2007800443099A patent/CN101542446B/zh not_active Expired - Fee Related
- 2007-11-30 WO PCT/US2007/086195 patent/WO2008070587A1/en not_active Ceased
- 2007-11-30 RU RU2009120574/08A patent/RU2451326C2/ru not_active IP Right Cessation
- 2007-11-30 JP JP2009539529A patent/JP4903879B2/ja not_active Expired - Fee Related
- 2007-11-30 AU AU2007329468A patent/AU2007329468B8/en not_active Ceased
- 2007-11-30 EP EP07865063A patent/EP2126702A4/en not_active Withdrawn
- 2007-11-30 KR KR1020097013768A patent/KR101443932B1/ko active Active
- 2007-11-30 CA CA2668204A patent/CA2668204C/en active Active
- 2007-11-30 EP EP17172254.9A patent/EP3236354A1/en not_active Ceased
- 2007-11-30 BR BRPI0719184-7A2A patent/BRPI0719184A2/pt not_active IP Right Cessation
- 2007-11-30 MX MX2009004903A patent/MX2009004903A/es active IP Right Grant
-
2009
- 2009-07-01 NO NO20092482A patent/NO20092482L/no not_active Application Discontinuation
-
2017
- 2017-08-04 NO NO20171308A patent/NO343315B1/no unknown
Also Published As
| Publication number | Publication date |
|---|---|
| CN101542446A (zh) | 2009-09-23 |
| CN101542446B (zh) | 2013-02-13 |
| NO20171308A1 (no) | 2009-08-31 |
| MX2009004903A (es) | 2009-05-19 |
| US7698305B2 (en) | 2010-04-13 |
| JP2010511940A (ja) | 2010-04-15 |
| RU2451326C2 (ru) | 2012-05-20 |
| AU2007329468A1 (en) | 2008-06-12 |
| KR101443932B1 (ko) | 2014-09-23 |
| EP2126702A4 (en) | 2012-06-13 |
| EP3236354A1 (en) | 2017-10-25 |
| US20080133972A1 (en) | 2008-06-05 |
| AU2007329468B8 (en) | 2011-12-08 |
| EP2126702A1 (en) | 2009-12-02 |
| KR20090095627A (ko) | 2009-09-09 |
| JP4903879B2 (ja) | 2012-03-28 |
| NO20092482L (no) | 2009-08-31 |
| RU2009120574A (ru) | 2010-12-10 |
| AU2007329468B2 (en) | 2011-10-20 |
| WO2008070587A1 (en) | 2008-06-12 |
| BRPI0719184A2 (pt) | 2014-04-15 |
| NO343315B1 (no) | 2019-01-28 |
| CA2668204A1 (en) | 2008-06-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CA2668204C (en) | Program modification and load times in computing devices | |
| US7865777B2 (en) | Thread interception and analysis | |
| US12001543B2 (en) | System and method for container assessment using sandboxing | |
| CN1740945B (zh) | 用于识别出潜在的不需要的软件的方法和系统 | |
| US8528087B2 (en) | Methods for combating malicious software | |
| US7437764B1 (en) | Vulnerability assessment of disk images | |
| US10235520B2 (en) | System and method for analyzing patch file | |
| US8621278B2 (en) | System and method for automated solution of functionality problems in computer systems | |
| US20070233854A1 (en) | Management status summaries | |
| EP1997018B1 (en) | Thread interception and analysis | |
| Verbowski et al. | LiveOps: Systems Management as a Service. | |
| US20250284804A1 (en) | Entity Profile Signatures for Improving Malware Detection | |
| CN119249426A (zh) | 一种漏洞检测方法、装置、电子设备及可读存储介质 | |
| Hoekstra et al. | Trustworthiness of Cyber Infrastructure |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| EEER | Examination request |