CN1855110A - 用于使文件系统免于恶意程序的增强安全层的系统和方法 - Google Patents
用于使文件系统免于恶意程序的增强安全层的系统和方法 Download PDFInfo
- Publication number
- CN1855110A CN1855110A CNA2006100580888A CN200610058088A CN1855110A CN 1855110 A CN1855110 A CN 1855110A CN A2006100580888 A CNA2006100580888 A CN A2006100580888A CN 200610058088 A CN200610058088 A CN 200610058088A CN 1855110 A CN1855110 A CN 1855110A
- Authority
- CN
- China
- Prior art keywords
- document system
- program
- certificate
- authority
- document
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (13)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/109,043 US20060236100A1 (en) | 2005-04-19 | 2005-04-19 | System and method for enhanced layer of security to protect a file system from malicious programs |
US11/109,043 | 2005-04-19 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1855110A true CN1855110A (zh) | 2006-11-01 |
CN100533451C CN100533451C (zh) | 2009-08-26 |
Family
ID=37109937
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100580888A Expired - Fee Related CN100533451C (zh) | 2005-04-19 | 2006-02-28 | 用于使文件系统免于恶意程序的增强安全层的系统和方法 |
Country Status (2)
Country | Link |
---|---|
US (2) | US20060236100A1 (zh) |
CN (1) | CN100533451C (zh) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101324913B (zh) * | 2007-06-15 | 2010-09-29 | 杨湘渝 | 计算机文件保护方法和装置 |
CN101369930B (zh) * | 2008-09-01 | 2011-10-26 | 深圳市深信服电子科技有限公司 | 一种网络插件的安全检查方法、系统及安全检查设备 |
CN102831341A (zh) * | 2012-07-26 | 2012-12-19 | 深圳市赛格导航科技股份有限公司 | 一种电子交易文件的保护方法 |
CN104200163A (zh) * | 2014-08-27 | 2014-12-10 | 哈尔滨工业大学(威海) | 一种病毒检测方法及病毒检测引擎 |
CN105931042A (zh) * | 2015-09-22 | 2016-09-07 | 中国银联股份有限公司 | 一种应用权限管理方法以及智能pos终端 |
CN110647744A (zh) * | 2018-06-27 | 2020-01-03 | 国际商业机器公司 | 使用特定于对象的文件系统视图识别和提取关键危害取证指标 |
CN111382435A (zh) * | 2018-12-28 | 2020-07-07 | 卡巴斯基实验室股份制公司 | 检测计算机系统中的恶意活动的来源的系统和方法 |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458789B1 (en) * | 2006-03-09 | 2013-06-04 | Mcafee, Inc. | System, method and computer program product for identifying unwanted code associated with network communications |
EP1990724A1 (en) * | 2007-05-09 | 2008-11-12 | Telefonaktiebolaget LM Ericsson (publ) | Method for locating resource leaks during software development |
US8910240B1 (en) * | 2007-11-12 | 2014-12-09 | Google Inc. | Mapping content using uniform resource identifiers |
US8250475B2 (en) * | 2007-12-14 | 2012-08-21 | International Business Machines Corporation | Managing icon integrity |
EP2284705B1 (en) * | 2009-08-03 | 2018-04-25 | C.R.F. Società Consortile per Azioni | Microprogrammable device configured to detect corruption of the code memory based on code signature |
US9811646B2 (en) | 2010-09-16 | 2017-11-07 | International Business Machines Corporation | Method, secure device, system and computer program product for securely managing files |
DE112011103580B4 (de) | 2010-10-29 | 2020-06-25 | International Business Machines Corporation | Verfahren, sichere Einheit, System und Computerprogrammprodukt für das sichere Verwalten des Benutzerzugriffs auf ein Dateisystem |
US10445528B2 (en) * | 2011-09-07 | 2019-10-15 | Microsoft Technology Licensing, Llc | Content handling for applications |
CN102833070B (zh) * | 2012-08-08 | 2016-04-27 | 北京九恒星科技股份有限公司 | 普通用户的数字证书绑定方法、系统及数字证书认证中心 |
RU2514138C1 (ru) * | 2012-09-28 | 2014-04-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ верификации сертификата открытого ключа с целью противодействия атакам типа "человек посередине" |
WO2014078585A2 (en) * | 2012-11-14 | 2014-05-22 | University Of Virginia Patent Foundation | Methods, systems and computer readable media for detecting command injection attacks |
US9886577B2 (en) * | 2014-09-26 | 2018-02-06 | Mcafee, Llc | Detection and mitigation of malicious invocation of sensitive code |
CN104731892B (zh) * | 2015-03-17 | 2018-03-27 | 中国人民解放军信息工程大学 | 一种集中式文件服务系统的拟态防篡改方法 |
US10354081B1 (en) * | 2017-01-05 | 2019-07-16 | Trend Micro Incorporated | Protection of interprocess communications in a computer |
US20200225941A1 (en) * | 2019-01-15 | 2020-07-16 | International Business Machines Corporation | Method for creating run-time executables for data analysis functions |
US20210067554A1 (en) * | 2019-09-03 | 2021-03-04 | ITsMine Ltd. | Real-time notifications on data breach detected in a computerized environment |
US11604595B2 (en) | 2020-12-09 | 2023-03-14 | Dell Products L.P. | Data mirroring and data migration between storage volumes using system control processors |
US11853782B2 (en) | 2020-12-09 | 2023-12-26 | Dell Products L.P. | Method and system for composing systems using resource sets |
US11693703B2 (en) | 2020-12-09 | 2023-07-04 | Dell Products L.P. | Monitoring resource utilization via intercepting bare metal communications between resources |
US11928515B2 (en) | 2020-12-09 | 2024-03-12 | Dell Products L.P. | System and method for managing resource allocations in composed systems |
US11675625B2 (en) | 2020-12-09 | 2023-06-13 | Dell Products L.P. | Thin provisioning of resources using SCPS and a bidding system |
US11698821B2 (en) | 2020-12-09 | 2023-07-11 | Dell Products L.P. | Composable information handling systems in an open network using access control managers |
US11675665B2 (en) | 2020-12-09 | 2023-06-13 | Dell Products L.P. | System and method for backup generation using composed systems |
US11704159B2 (en) | 2020-12-09 | 2023-07-18 | Dell Products L.P. | System and method for unified infrastructure architecture |
US11809911B2 (en) | 2020-12-09 | 2023-11-07 | Dell Products L.P. | Resuming workload execution in composed information handling system |
US11934875B2 (en) | 2020-12-09 | 2024-03-19 | Dell Products L.P. | Method and system for maintaining composed systems |
US11809912B2 (en) | 2020-12-09 | 2023-11-07 | Dell Products L.P. | System and method for allocating resources to perform workloads |
US11797341B2 (en) | 2021-01-28 | 2023-10-24 | Dell Products L.P. | System and method for performing remediation action during operation analysis |
US11675916B2 (en) * | 2021-01-28 | 2023-06-13 | Dell Products L.P. | Method and system for limiting data accessibility in composed systems |
US11768612B2 (en) | 2021-01-28 | 2023-09-26 | Dell Products L.P. | System and method for distributed deduplication in a composed system |
US11687280B2 (en) | 2021-01-28 | 2023-06-27 | Dell Products L.P. | Method and system for efficient servicing of storage access requests |
US11947697B2 (en) | 2021-07-22 | 2024-04-02 | Dell Products L.P. | Method and system to place resources in a known state to be used in a composed information handling system |
US12013768B2 (en) | 2021-07-22 | 2024-06-18 | Dell Products L.P. | Method and system for automated healing of hardware resources in a composed information handling system |
US12026557B2 (en) | 2021-07-22 | 2024-07-02 | Dell Products L.P. | Method and system for a utilizing a proxy service to generate a composed information handling system |
US12008412B2 (en) | 2021-07-28 | 2024-06-11 | Dell Products | Resource selection for complex solutions |
US11928506B2 (en) | 2021-07-28 | 2024-03-12 | Dell Products L.P. | Managing composition service entities with complex networks |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5572590A (en) * | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
US6802061B1 (en) * | 1996-12-12 | 2004-10-05 | Microsoft Corporation | Automatic software downloading from a computer network |
US6178505B1 (en) * | 1997-03-10 | 2001-01-23 | Internet Dynamics, Inc. | Secure delivery of information in a network |
US6175924B1 (en) * | 1997-06-20 | 2001-01-16 | International Business Machines Corp. | Method and apparatus for protecting application data in secure storage areas |
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
US6470450B1 (en) * | 1998-12-23 | 2002-10-22 | Entrust Technologies Limited | Method and apparatus for controlling application access to limited access based data |
WO2001046825A1 (en) * | 1999-12-20 | 2001-06-28 | Planetid, Inc. | Information exchange engine providing a critical infrastructure layer and methods of use thereof |
US6785818B1 (en) * | 2000-01-14 | 2004-08-31 | Symantec Corporation | Thwarting malicious registry mapping modifications and map-loaded module masquerade attacks |
US20040034794A1 (en) * | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
EP2306259B1 (en) * | 2000-09-21 | 2015-05-27 | BlackBerry Limited | Software code signing system and method |
US20040102959A1 (en) * | 2001-03-28 | 2004-05-27 | Estrin Ron Shimon | Authentication methods apparatus, media and signals |
ES2218484T3 (es) * | 2002-03-26 | 2004-11-16 | Soteres Gmbh | Un metodo de proteger la integridad de un programa de ordenador. |
US7140041B2 (en) * | 2002-04-11 | 2006-11-21 | International Business Machines Corporation | Detecting dissemination of malicious programs |
US7694139B2 (en) * | 2002-10-24 | 2010-04-06 | Symantec Corporation | Securing executable content using a trusted computing platform |
JP4039277B2 (ja) * | 2003-03-06 | 2008-01-30 | ソニー株式会社 | 無線通信システム、端末、その端末における処理方法並びにその方法を端末に実行させるためのプログラム |
US7503061B2 (en) * | 2003-03-24 | 2009-03-10 | Hewlett-Packard Development Company, L.P. | Secure resource access |
US20060041942A1 (en) * | 2004-06-24 | 2006-02-23 | Mcafee, Inc. | System, method and computer program product for preventing spyware/malware from installing a registry |
-
2005
- 2005-04-19 US US11/109,043 patent/US20060236100A1/en not_active Abandoned
-
2006
- 2006-02-28 CN CNB2006100580888A patent/CN100533451C/zh not_active Expired - Fee Related
-
2008
- 2008-05-15 US US12/120,776 patent/US20080256625A1/en not_active Abandoned
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101324913B (zh) * | 2007-06-15 | 2010-09-29 | 杨湘渝 | 计算机文件保护方法和装置 |
CN101369930B (zh) * | 2008-09-01 | 2011-10-26 | 深圳市深信服电子科技有限公司 | 一种网络插件的安全检查方法、系统及安全检查设备 |
CN102831341A (zh) * | 2012-07-26 | 2012-12-19 | 深圳市赛格导航科技股份有限公司 | 一种电子交易文件的保护方法 |
CN104200163A (zh) * | 2014-08-27 | 2014-12-10 | 哈尔滨工业大学(威海) | 一种病毒检测方法及病毒检测引擎 |
CN105931042A (zh) * | 2015-09-22 | 2016-09-07 | 中国银联股份有限公司 | 一种应用权限管理方法以及智能pos终端 |
CN110647744A (zh) * | 2018-06-27 | 2020-01-03 | 国际商业机器公司 | 使用特定于对象的文件系统视图识别和提取关键危害取证指标 |
CN110647744B (zh) * | 2018-06-27 | 2023-06-06 | 国际商业机器公司 | 文件系统中的取证分析的方法、装置、介质和系统 |
CN111382435A (zh) * | 2018-12-28 | 2020-07-07 | 卡巴斯基实验室股份制公司 | 检测计算机系统中的恶意活动的来源的系统和方法 |
CN111382435B (zh) * | 2018-12-28 | 2023-06-23 | 卡巴斯基实验室股份制公司 | 检测计算机系统中的恶意活动的来源的系统和方法 |
Also Published As
Publication number | Publication date |
---|---|
US20080256625A1 (en) | 2008-10-16 |
CN100533451C (zh) | 2009-08-26 |
US20060236100A1 (en) | 2006-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100533451C (zh) | 用于使文件系统免于恶意程序的增强安全层的系统和方法 | |
US11057218B2 (en) | Trusted internet identity | |
US10652226B2 (en) | Securing communication over a network using dynamically assigned proxy servers | |
US8341747B2 (en) | Method to provide a secure virtual machine launcher | |
EP3014847B1 (en) | Secure hybrid file-sharing system | |
US8131997B2 (en) | Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel | |
EP1610201A2 (en) | System and method for secure execution of an application | |
US20050166041A1 (en) | Authentication in a distributed computing environment | |
CN1645288A (zh) | 确保软件更新仅在特定设备或设备类上安装或运行 | |
US20120291089A1 (en) | Method and system for cross-domain data security | |
CN1914881A (zh) | 通过代理证书产生在网格中进行相互授权 | |
CN1818919A (zh) | 一种电子文档的许可认证方法和系统 | |
JP4934860B2 (ja) | 情報システム構成要素解析から算出したトラストスコアに基づいて複数のネットワークエンドポイント間のアクセスを制御する方法 | |
CN1808326A (zh) | 使用部分映像散列确认可执行文件完整性的系统和方法 | |
CN1773417A (zh) | 聚集反病毒软件应用程序的知识库的系统和方法 | |
CN101297534A (zh) | 用于安全网络认证的方法和装置 | |
JP2009151751A (ja) | 承認済みファイルと信頼されたドメインのデータベースを作成及び更新する方法及びシステム | |
US7895645B2 (en) | Multiple user credentials | |
CN112118269A (zh) | 一种身份认证方法、系统、计算设备及可读存储介质 | |
US8850563B2 (en) | Portable computer accounts | |
US20050060541A1 (en) | Method and apparatus for providing security for a computer system | |
US9762591B2 (en) | Message sender authenticity validation | |
US7308578B2 (en) | Method and apparatus for authorizing execution for applications in a data processing system | |
CN101067837A (zh) | 一种信息系统数据处理的安全控制方法及装置 | |
EP4310703A1 (en) | Controlling access to a trusted computing environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: IBM (CHINA) CO., LTD. Free format text: FORMER OWNER: INTERNATIONAL BUSINESS MACHINES CORP. Effective date: 20101028 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: NEW YORK, UNITED STATES TO: 201203 7/F, BUILDING 10, ZHANGJIANG INNOVATION PARK, NO.399, KEYUAN ROAD, ZHANGJIANG HIGH-TECH PARK, PUDONG NEW DISTRICT, SHANGHAI, CHINA |
|
TR01 | Transfer of patent right |
Effective date of registration: 20101028 Address after: 201203 Chinese Shanghai Pudong New Area Zhang Jiang high tech Park Keyuan Road No. 399 Zhang Jiang Innovation Park Building No. 10 7 floor Patentee after: International Business Machines (China) Co., Ltd. Address before: American New York Patentee before: International Business Machines Corp. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090826 Termination date: 20170228 |
|
CF01 | Termination of patent right due to non-payment of annual fee |