CN103430153B - 用于计算机安全的接种器和抗体 - Google Patents

用于计算机安全的接种器和抗体 Download PDF

Info

Publication number
CN103430153B
CN103430153B CN201180060514.0A CN201180060514A CN103430153B CN 103430153 B CN103430153 B CN 103430153B CN 201180060514 A CN201180060514 A CN 201180060514A CN 103430153 B CN103430153 B CN 103430153B
Authority
CN
China
Prior art keywords
computer
data object
computer program
program
prevent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201180060514.0A
Other languages
English (en)
Chinese (zh)
Other versions
CN103430153A (zh
Inventor
M·G·霍戈伦德
S·M·布拉肯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Countertack Inc
Original Assignee
Countertack Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Countertack Inc filed Critical Countertack Inc
Priority to CN201710956773.0A priority Critical patent/CN108038380B/zh
Publication of CN103430153A publication Critical patent/CN103430153A/zh
Application granted granted Critical
Publication of CN103430153B publication Critical patent/CN103430153B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)
CN201180060514.0A 2010-11-01 2011-10-31 用于计算机安全的接种器和抗体 Expired - Fee Related CN103430153B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710956773.0A CN108038380B (zh) 2010-11-01 2011-10-31 用于计算机安全的接种器和抗体

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US45619210P 2010-11-01 2010-11-01
US61/456,192 2010-11-01
US13/200,504 2011-09-23
US13/200,504 US9311482B2 (en) 2010-11-01 2011-09-23 Inoculator and antibody for computer security
PCT/US2011/058653 WO2012061319A1 (en) 2010-11-01 2011-10-31 Inoculator and antibody for computer security

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201710956773.0A Division CN108038380B (zh) 2010-11-01 2011-10-31 用于计算机安全的接种器和抗体

Publications (2)

Publication Number Publication Date
CN103430153A CN103430153A (zh) 2013-12-04
CN103430153B true CN103430153B (zh) 2017-11-14

Family

ID=45998165

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201180060514.0A Expired - Fee Related CN103430153B (zh) 2010-11-01 2011-10-31 用于计算机安全的接种器和抗体
CN201710956773.0A Expired - Fee Related CN108038380B (zh) 2010-11-01 2011-10-31 用于计算机安全的接种器和抗体

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710956773.0A Expired - Fee Related CN108038380B (zh) 2010-11-01 2011-10-31 用于计算机安全的接种器和抗体

Country Status (10)

Country Link
US (2) US9311482B2 (https=)
EP (1) EP2635969B1 (https=)
JP (2) JP5951621B2 (https=)
CN (2) CN103430153B (https=)
AU (3) AU2011323553B2 (https=)
CA (2) CA3130495A1 (https=)
IL (1) IL226098A (https=)
NZ (1) NZ610714A (https=)
SG (2) SG10201508939VA (https=)
WO (1) WO2012061319A1 (https=)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6929144B2 (ja) * 2017-06-27 2021-09-01 キヤノン株式会社 情報処理装置、プログラム、インストーラ及び制御方法
CN112399409A (zh) * 2019-08-16 2021-02-23 华为技术有限公司 一种安全加密的方法及装置
US11914711B2 (en) * 2020-07-30 2024-02-27 Versa Networks, Inc. Systems and methods for automatically generating malware countermeasures
JP7574668B2 (ja) * 2021-01-27 2024-10-29 セイコーエプソン株式会社 電子機器及び電子機器の制御方法
WO2023242901A1 (ja) * 2022-06-13 2023-12-21 文生 根来 ウイルス侵入されたプログラムがプログラム自身でウイルスデータを排除できるプログラム開発方法

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003535414A (ja) * 2000-05-28 2003-11-25 ヤロン メイヤー 情報を盗んだり及び/又は損害を引き起こしたりするかもしれない邪悪なプログラムに対するコンピュータの包括的一般的共通的保護のためのシステム及び方法
WO2002008870A2 (en) * 2000-07-26 2002-01-31 David Dickenson Distributive access controller
WO2004092981A2 (en) * 2003-04-07 2004-10-28 Belarc, Inc. Software update and patch audit subsystem for use in a computer information database system
US7512809B2 (en) * 2003-08-22 2009-03-31 Cyrus Peikari Attenuated computer virus vaccine
US7644441B2 (en) * 2003-09-26 2010-01-05 Cigital, Inc. Methods for identifying malicious software
US8255973B2 (en) * 2003-12-10 2012-08-28 Chris Hopen Provisioning remote computers for accessing resources
US7499929B2 (en) * 2004-03-22 2009-03-03 Microsoft Corporation Computing device with relatively limited storage space and operating/file system thereof
US20060041942A1 (en) 2004-06-24 2006-02-23 Mcafee, Inc. System, method and computer program product for preventing spyware/malware from installing a registry
US20090126022A1 (en) 2004-11-25 2009-05-14 Nec Corporation Method and System for Generating Data for Security Assessment
US7979889B2 (en) * 2005-01-07 2011-07-12 Cisco Technology, Inc. Methods and apparatus providing security to computer systems and networks
EP1684151A1 (en) 2005-01-20 2006-07-26 Grant Rothwell William Computer protection against malware affection
US8046831B2 (en) * 2005-03-02 2011-10-25 Actiance, Inc. Automating software security restrictions on system resources
GB0513375D0 (en) * 2005-06-30 2005-08-03 Retento Ltd Computer security
US7665123B1 (en) * 2005-12-01 2010-02-16 Symantec Corporation Method and apparatus for detecting hidden rootkits
US7836500B2 (en) 2005-12-16 2010-11-16 Eacceleration Corporation Computer virus and malware cleaner
DE602006008270D1 (de) * 2006-03-29 2009-09-17 St Microelectronics Srl Verfahren und Vorrichtung zur Detektion von möglicher Korruption von Sektorschutzinformationen eines in einem bordeigenen flüchtigen Speicherarray gespeicherten nichtflüchtigen Speichers beim Einschalten
CN100424652C (zh) * 2006-07-28 2008-10-08 华南理工大学 一种基于嵌入式操作系统的硬盘自恢复保护方法
US8413135B2 (en) * 2006-10-30 2013-04-02 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for controlling software application installations
US7761676B2 (en) * 2006-12-12 2010-07-20 Intel Corporation Protecting memory by containing pointer accesses
JP2008210057A (ja) 2007-02-23 2008-09-11 Hitachi Ltd 記憶システム及びその管理方法
US8321667B2 (en) * 2007-02-28 2012-11-27 Microsoft Corporation Security model for common multiplexed transactional logs
US20080244155A1 (en) * 2007-03-30 2008-10-02 Kyungwoo Lee Methods and apparatus to protect dynamic memory regions allocated to programming agents
WO2009105055A1 (en) * 2007-05-10 2009-08-27 Micron Technology, Inc. Memory area protection system and methods
US8291496B2 (en) * 2008-05-12 2012-10-16 Enpulz, L.L.C. Server based malware screening
US20100023522A1 (en) 2008-07-18 2010-01-28 George Madathilparambil George Dynamically controlling permissions
JP5313600B2 (ja) * 2008-09-16 2013-10-09 株式会社日立製作所 ストレージシステム、及びストレージシステムの運用方法
US20100095365A1 (en) * 2008-10-14 2010-04-15 Wei-Chiang Hsu Self-setting security system and method for guarding against unauthorized access to data and preventing malicious attacks
US20100100966A1 (en) 2008-10-21 2010-04-22 Memory Experts International Inc. Method and system for blocking installation of some processes
US8769685B1 (en) * 2010-02-03 2014-07-01 Symantec Corporation Systems and methods for using file paths to identify potentially malicious computer files
CN101894243A (zh) * 2010-06-24 2010-11-24 北京安天电子设备有限公司 一种针对网络浏览器的恶意插件的免疫方法
US9536089B2 (en) * 2010-09-02 2017-01-03 Mcafee, Inc. Atomic detection and repair of kernel memory

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Free USB Flash Drive Protector;Abhishek Bhatnagar;《http://www.technixupdate.com/free-usb-flash-drive-protector-create-undeletable-write-protected-dummy-autoruninf-stop-autorun-virus-infection》;20090717;1 *
usbdummyprotect;GOOGLE;《https://code.google.com/archive/p/usbdummyprotect/》;20101016;2 *

Also Published As

Publication number Publication date
IL226098A0 (en) 2013-06-27
NZ610714A (en) 2015-07-31
WO2012061319A1 (en) 2012-05-10
US9311482B2 (en) 2016-04-12
US20120110673A1 (en) 2012-05-03
AU2017204194A1 (en) 2017-07-13
AU2017204194B2 (en) 2019-04-18
AU2011323553A1 (en) 2013-06-13
US9792444B2 (en) 2017-10-17
CN108038380B (zh) 2022-03-15
EP2635969A4 (en) 2014-08-27
AU2019206085A1 (en) 2019-08-08
CN108038380A (zh) 2018-05-15
US20160292424A1 (en) 2016-10-06
EP2635969B1 (en) 2020-07-08
AU2019206085B2 (en) 2021-07-08
JP2014501002A (ja) 2014-01-16
CN103430153A (zh) 2013-12-04
CA2816764A1 (en) 2012-05-10
CA2816764C (en) 2021-11-02
CA3130495A1 (en) 2012-05-10
EP2635969A1 (en) 2013-09-11
JP5951621B2 (ja) 2016-07-13
IL226098A (en) 2017-11-30
JP6243479B2 (ja) 2017-12-06
SG10201508939VA (en) 2015-11-27
JP2016189201A (ja) 2016-11-04
AU2011323553B2 (en) 2017-03-23
SG190120A1 (en) 2013-06-28

Similar Documents

Publication Publication Date Title
US12099596B2 (en) Mobile device policy enforcement
US11343280B2 (en) System and method for identifying and controlling polymorphic malware
EP3474176B1 (en) System and method of detecting a malicious file
US10691824B2 (en) Behavioral-based control of access to encrypted content by a process
US10657277B2 (en) Behavioral-based control of access to encrypted content by a process
US10503904B1 (en) Ransomware detection and mitigation
US9846776B1 (en) System and method for detecting file altering behaviors pertaining to a malicious attack
EP3404948B1 (en) Centralized selective application approval for mobile devices
RU2646352C2 (ru) Система и способ для применения индикатора репутации для облегчения сканирования на наличие вредоносных программ
US20250365269A1 (en) Encrypted cache protection
JP2020522808A (ja) カーネルモードにおけるマルウェアおよびステガノグラフィのリアルタイム検出ならびにマルウェアおよびステガノグラフィからの保護
AU2019206085B2 (en) Inoculator and antibody for computer security
GB2551735A (en) Cloud storage scanner
AU2017234265A1 (en) System and method for process hollowing detection
CN103984891A (zh) 网络安全系统和方法
WO2022208045A1 (en) Encrypted cache protection
US20160092690A1 (en) Secure copy and paste of mobile app data
US10572663B1 (en) Systems and methods for identifying malicious file droppers
HK1254985B (zh) 用於保护多个网络端点的双重存储器内省
HK1219790B (zh) 使用声誉指示符来促进恶意软件扫描的系统和方法

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180302

Address after: American California

Patentee after: COUNTERTACK, Inc.

Address before: American California

Patentee before: COUNTERTACK, Inc.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171114

CF01 Termination of patent right due to non-payment of annual fee