CO5600216A1 - Deteccion y parcheo automatico de archivos vulnerables - Google Patents
Deteccion y parcheo automatico de archivos vulnerablesInfo
- Publication number
- CO5600216A1 CO5600216A1 CO04067547A CO04067547A CO5600216A1 CO 5600216 A1 CO5600216 A1 CO 5600216A1 CO 04067547 A CO04067547 A CO 04067547A CO 04067547 A CO04067547 A CO 04067547A CO 5600216 A1 CO5600216 A1 CO 5600216A1
- Authority
- CO
- Colombia
- Prior art keywords
- computer
- vulnerable
- binary
- cited
- processor
- Prior art date
Links
- 238000001514 detection method Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/658—Incremental updates; Differential updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Electrotherapy Devices (AREA)
- Television Systems (AREA)
- Indexing, Searching, Synchronizing, And The Amount Of Synchronization Travel Of Record Carriers (AREA)
Abstract
Un medio leíble por procesador que comprende instrucciones ejecutables por procesador configuradas para:recibir una firma binaria;recibir un parche de seguridad;identificar un archivo binario vulnerable en un computador basado en firma binaria; yactualizar el archivo binario vulnerable en el computador con el parche de seguridad. Un medio leíble por procesador como se cita en la reivindicación 1, en donde el identificar un archivo binario vulnerable en un computador incluye comparar un patrón de bit de las firma binaria contra los archivos binarios localizados en el computador, el patrón de bit asociado conuna vulnerabilidad de seguridad. Un medio leíble por procesador como se cita en la reivindicación 1, en donde la actualización del archivo binario vulnerable es en el computador incluye instalar el parche de seguridad en el computador. Un medio leíble por procesador como se cita en la reivindicación 1, en donde el identificar un archivo binario vulnerable en un computador incluye enviar la firma binaria al computador. El medio leíble por procesador como se cita en la reivindicación 4, en donde la actualización del archivo binario vulnerable en el computador incluye:Recibir una solicitud de un computador para enviar el parche de seguridad; y enviar el parche de seguridad al computador. Un medio leíble por procesador como se cita en la reivindicación 1, en donde el computador es un computador de cliente y el recibir incluye recibir la firma binaria y el parche de seguridad desde un servidor de distribución configurado para distribuir al computador del cliente, firmas binarias que identifican archivos vulnerables y parches de seguridad configurados para fijar los archivos vulnerables. Un servidor que comprende un medio leíble por procesador como se cita en la reivindicación 1.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/621,148 US7424706B2 (en) | 2003-07-16 | 2003-07-16 | Automatic detection and patching of vulnerable files |
Publications (1)
Publication Number | Publication Date |
---|---|
CO5600216A1 true CO5600216A1 (es) | 2006-01-31 |
Family
ID=33552851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CO04067547A CO5600216A1 (es) | 2003-07-16 | 2004-07-15 | Deteccion y parcheo automatico de archivos vulnerables |
Country Status (18)
Country | Link |
---|---|
US (1) | US7424706B2 (es) |
EP (1) | EP1505499A1 (es) |
JP (1) | JP4652736B2 (es) |
KR (1) | KR101231410B1 (es) |
CN (1) | CN1577272B (es) |
AU (1) | AU2004202974B2 (es) |
BR (1) | BRPI0402767A (es) |
CA (1) | CA2471998A1 (es) |
CO (1) | CO5600216A1 (es) |
IL (1) | IL162642A (es) |
MX (1) | MXPA04006784A (es) |
MY (1) | MY150114A (es) |
NO (1) | NO337222B1 (es) |
NZ (1) | NZ533661A (es) |
RU (1) | RU2358313C2 (es) |
SG (1) | SG139545A1 (es) |
TW (1) | TWI354887B (es) |
ZA (1) | ZA200405076B (es) |
Families Citing this family (94)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US8266699B2 (en) * | 2003-07-01 | 2012-09-11 | SecurityProfiling Inc. | Multiple-path remediation |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US7424706B2 (en) | 2003-07-16 | 2008-09-09 | Microsoft Corporation | Automatic detection and patching of vulnerable files |
US7386883B2 (en) * | 2003-07-22 | 2008-06-10 | International Business Machines Corporation | Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system |
US20050097199A1 (en) | 2003-10-10 | 2005-05-05 | Keith Woodard | Method and system for scanning network devices |
US8990366B2 (en) * | 2003-12-23 | 2015-03-24 | Intel Corporation | Method and apparatus for remote modification of system configuration |
US20050223292A1 (en) * | 2004-02-17 | 2005-10-06 | Lee Chee S | Single instruction type based hardware patch controller |
US8051483B2 (en) | 2004-03-12 | 2011-11-01 | Fortinet, Inc. | Systems and methods for updating content detection devices and systems |
US7761920B2 (en) * | 2004-09-03 | 2010-07-20 | Fortinet, Inc. | Data structure for policy-based remediation selection |
US8171555B2 (en) | 2004-07-23 | 2012-05-01 | Fortinet, Inc. | Determining technology-appropriate remediation for vulnerability |
US7665119B2 (en) | 2004-09-03 | 2010-02-16 | Secure Elements, Inc. | Policy-based selection of remediation |
US7774848B2 (en) * | 2004-07-23 | 2010-08-10 | Fortinet, Inc. | Mapping remediation to plurality of vulnerabilities |
US7672948B2 (en) * | 2004-09-03 | 2010-03-02 | Fortinet, Inc. | Centralized data transformation |
US7703137B2 (en) * | 2004-09-03 | 2010-04-20 | Fortinet, Inc. | Centralized data transformation |
US7707586B2 (en) * | 2004-09-08 | 2010-04-27 | Intel Corporation | Operating system independent agent |
US7343599B2 (en) * | 2005-01-03 | 2008-03-11 | Blue Lane Technologies Inc. | Network-based patching machine |
US20060185018A1 (en) * | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
DE102005030590B4 (de) * | 2005-06-30 | 2011-03-24 | Advanced Micro Devices, Inc., Sunnyvale | Sicheres Patchsystem |
JP4770306B2 (ja) * | 2005-07-12 | 2011-09-14 | 日本電気株式会社 | 端末セキュリティチェックサービス提供方法及びそのシステム |
US8984636B2 (en) * | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US8272058B2 (en) * | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US20070028291A1 (en) * | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Parametric content control in a network security system |
US7895651B2 (en) * | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8132164B1 (en) * | 2005-08-01 | 2012-03-06 | Mcafee, Inc. | System, method and computer program product for virtual patching |
US8245216B2 (en) * | 2005-10-11 | 2012-08-14 | Oracle International Corporation | Patch management system |
US8484725B1 (en) * | 2005-10-26 | 2013-07-09 | Mcafee, Inc. | System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing |
US7784034B1 (en) | 2005-12-21 | 2010-08-24 | Mcafee, Inc. | System, method and computer program product for hooking a COM interface |
US8739288B2 (en) * | 2007-07-31 | 2014-05-27 | Hewlett-Packard Development Company, L.P. | Automatic detection of vulnerability exploits |
US8347277B2 (en) * | 2007-08-17 | 2013-01-01 | International Business Machines Corporation | Verifying that binary object file has been generated from source files |
US8181173B2 (en) * | 2007-10-12 | 2012-05-15 | International Business Machines Corporation | Determining priority for installing a patch into multiple patch recipients of a network |
US20090144828A1 (en) * | 2007-12-04 | 2009-06-04 | Microsoft Corporation | Rapid signatures for protecting vulnerable browser configurations |
US8689203B2 (en) * | 2008-02-19 | 2014-04-01 | Microsoft Corporation | Software update techniques based on ascertained identities |
US8990360B2 (en) * | 2008-02-22 | 2015-03-24 | Sonos, Inc. | System, method, and computer program for remotely managing a digital device |
US20090248397A1 (en) * | 2008-03-25 | 2009-10-01 | Microsoft Corporation | Service Initiation Techniques |
US20100007489A1 (en) * | 2008-07-10 | 2010-01-14 | Janardan Misra | Adaptive learning for enterprise threat managment |
US20100153942A1 (en) * | 2008-12-12 | 2010-06-17 | Lazar Borissov | Method and a system for delivering latest hotfixes with a support package stack |
KR101052734B1 (ko) * | 2009-02-03 | 2011-07-29 | 주식회사 안철수연구소 | 응용 프로그램 패치 장치 및 방법 |
CN101551773B (zh) * | 2009-03-12 | 2012-04-25 | 南京大学 | 符号错误和赋值截断的二进制漏洞检测定位装置 |
CN101526984B (zh) * | 2009-03-16 | 2012-05-30 | 腾讯科技(北京)有限公司 | 一种修复漏洞的方法及装置 |
RU2422877C1 (ru) * | 2009-11-16 | 2011-06-27 | Виталий Евгеньевич Пилкин | Способ обозначения инфицированных электронных файлов |
US8484753B2 (en) * | 2009-12-02 | 2013-07-09 | Mcafee, Inc. | Hooking nonexported functions by the offset of the function |
EP2362314A1 (en) * | 2010-02-18 | 2011-08-31 | Thomson Licensing | Method and apparatus for verifying the integrity of software code during execution and apparatus for generating such software code |
US8458798B2 (en) * | 2010-03-19 | 2013-06-04 | Aspect Security Inc. | Detection of vulnerabilities in computer systems |
US9268945B2 (en) | 2010-03-19 | 2016-02-23 | Contrast Security, Llc | Detection of vulnerabilities in computer systems |
US8479188B2 (en) | 2010-07-08 | 2013-07-02 | Microsoft Corporation | Binary code change vulnerability prioritization |
EP2413257B1 (en) * | 2010-07-26 | 2017-04-26 | Sony DADC Austria AG | Method for replacing an illegitimate copy of a software program with legitimate copy and corresponding system |
US8726388B2 (en) * | 2011-05-16 | 2014-05-13 | F-Secure Corporation | Look ahead malware scanning |
US8931102B2 (en) * | 2011-06-01 | 2015-01-06 | International Business Machines Corporation | Testing web applications for file upload vulnerabilities |
US20130104119A1 (en) * | 2011-10-24 | 2013-04-25 | Brian Matsuo | Streaming packetized binary patching system and method |
BR112014011612B1 (pt) * | 2011-11-15 | 2021-08-31 | Japan Science And Technology Agency | Sistema de provisão de serviço de análise/verificação de dados, método de controlar o mesmo e meio de armazenamento legível por computador |
JPWO2013111532A1 (ja) * | 2012-01-25 | 2015-05-11 | 日本電気株式会社 | 管理システム、管理方法およびプログラム |
US9088606B2 (en) * | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
CN103049701A (zh) * | 2012-11-30 | 2013-04-17 | 南京翰海源信息技术有限公司 | 基于内存搜索的shellcode的检测系统及方法 |
US8997082B1 (en) * | 2013-07-16 | 2015-03-31 | Amazon Technologies, Inc. | Differential patch of content |
RU2568295C2 (ru) * | 2013-08-07 | 2015-11-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ временной защиты операционной системы программно-аппаратных устройств от приложений, содержащих уязвимости |
EP3049988B1 (en) * | 2013-09-25 | 2019-04-03 | Veracode, Inc. | A system and method for automated remedying of security vulnerabilities |
US10296884B2 (en) | 2013-09-30 | 2019-05-21 | Sonos, Inc. | Personalized media playback at a discovered point-of-sale display |
US9241355B2 (en) | 2013-09-30 | 2016-01-19 | Sonos, Inc. | Media system access via cellular network |
US8954583B1 (en) | 2014-01-20 | 2015-02-10 | Shape Security, Inc. | Intercepting and supervising calls to transformed operations and objects |
US9075990B1 (en) * | 2014-07-01 | 2015-07-07 | Shape Security, Inc. | Reliable selection of security countermeasures |
KR101695639B1 (ko) * | 2014-08-13 | 2017-01-16 | (주)잉카엔트웍스 | 클라우드 기반의 애플리케이션 보안 서비스 제공 방법 및 시스템 |
US9602543B2 (en) | 2014-09-09 | 2017-03-21 | Shape Security, Inc. | Client/server polymorphism using polymorphic hooks |
US9767290B2 (en) * | 2015-03-05 | 2017-09-19 | Fujitsu Limited | Autonomous reasoning system for vulnerability analysis |
US11522901B2 (en) | 2016-09-23 | 2022-12-06 | OPSWAT, Inc. | Computer security vulnerability assessment |
US9749349B1 (en) * | 2016-09-23 | 2017-08-29 | OPSWAT, Inc. | Computer security vulnerability assessment |
TWI622894B (zh) | 2016-12-13 | 2018-05-01 | 宏碁股份有限公司 | 電子裝置及偵測惡意檔案的方法 |
GB2563618B (en) * | 2017-06-20 | 2020-09-16 | Arm Ip Ltd | Electronic system vulnerability assessment |
US10540496B2 (en) | 2017-09-29 | 2020-01-21 | International Business Machines Corporation | Dynamic re-composition of patch groups using stream clustering |
KR102424357B1 (ko) | 2017-10-24 | 2022-07-25 | 삼성전자주식회사 | 부채널 공격으로부터 정보를 보호하는 방법 및 디바이스 |
US20190138293A1 (en) * | 2017-11-09 | 2019-05-09 | Venuetize LLC | Pattern recognition platform |
KR101955356B1 (ko) | 2017-12-08 | 2019-03-07 | 한국인터넷진흥원 | 취약 함수 사용에 의한 취약점을 보완하기 위한 바이너리 패치 장치 및 그 방법 |
US10984110B2 (en) | 2018-03-20 | 2021-04-20 | ReFirm Labs, Inc. | Evaluation of security of firmware |
US10943015B2 (en) * | 2018-03-22 | 2021-03-09 | ReFirm Labs, Inc. | Continuous monitoring for detecting firmware threats |
WO2019216926A1 (en) | 2018-05-07 | 2019-11-14 | Google Llc | System for adjusting application performance based on platform level benchmarking |
US10846080B2 (en) | 2018-09-06 | 2020-11-24 | International Business Machines Corporation | Cooperative updating of software |
KR101995285B1 (ko) | 2018-10-31 | 2019-07-02 | 한국인터넷진흥원 | 취약점이 존재하는 바이너리 패치 방법 및 그 장치 |
CN109828772B (zh) * | 2019-02-19 | 2022-03-11 | 百度在线网络技术(北京)有限公司 | 热更新方法、操作系统、终端设备和存储介质 |
KR102070010B1 (ko) | 2019-02-28 | 2020-01-29 | 한국인터넷진흥원 | 취약 함수 사용에 의한 취약점을 보완하기 위한 바이너리 패치 장치 및 그 방법 |
EP4386604A3 (en) | 2019-05-29 | 2024-08-21 | F. Hoffmann-La Roche AG | Interface proxy device for cyber security |
US11914721B2 (en) * | 2019-06-12 | 2024-02-27 | Nec Corporation | Method and contract rewriting framework system for supporting smart contracts in a blockchain network |
US11100233B2 (en) | 2019-06-26 | 2021-08-24 | International Business Machines Corporation | Optimizing operating system vulnerability analysis |
CN113672929A (zh) * | 2020-05-14 | 2021-11-19 | 阿波罗智联(北京)科技有限公司 | 漏洞特征获取方法、装置及电子设备 |
CN113836536A (zh) * | 2020-06-08 | 2021-12-24 | 网神信息技术(北京)股份有限公司 | 配置漏洞补丁包的方法、服务器、终端设备及介质 |
US11777984B1 (en) * | 2020-09-04 | 2023-10-03 | Wells Fargo Bank, N.A. | Automatic threat detection and remediation |
US11556330B2 (en) | 2020-11-24 | 2023-01-17 | Kyndryl, Inc. | Analysis and implementation of security updates |
CN113852602B (zh) * | 2021-08-11 | 2023-12-08 | 奇安信科技集团股份有限公司 | 文件重建方法、装置,传输设备,电子设备及介质 |
US20230315438A1 (en) * | 2022-03-30 | 2023-10-05 | Kyndryl, Inc. | Contextually cognitive edge server manager |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5231668A (en) * | 1991-07-26 | 1993-07-27 | The United States Of America, As Represented By The Secretary Of Commerce | Digital signature algorithm |
US5675711A (en) * | 1994-05-13 | 1997-10-07 | International Business Machines Corporation | Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses |
US5930504A (en) * | 1996-07-22 | 1999-07-27 | Intel Corporation | Dynamic nonvolatile memory update in a computer system |
US6016546A (en) * | 1997-07-10 | 2000-01-18 | International Business Machines Corporation | Efficient detection of computer viruses and other data traits |
GB2333864B (en) * | 1998-01-28 | 2003-05-07 | Ibm | Distribution of software updates via a computer network |
AU3781399A (en) | 1998-04-30 | 1999-11-16 | Bindview Development Corporation | Computer security |
US6425126B1 (en) * | 1999-05-19 | 2002-07-23 | International Business Machines Corporation | Apparatus and method for synchronizing software between computers |
US6493871B1 (en) * | 1999-09-16 | 2002-12-10 | Microsoft Corporation | Method and system for downloading updates for software installation |
US6842861B1 (en) * | 2000-03-24 | 2005-01-11 | Networks Associates Technology, Inc. | Method and system for detecting viruses on handheld computers |
EP1337917A4 (en) * | 2000-11-17 | 2009-04-08 | Hewlett Packard Development Co | SYSTEM AND METHOD FOR UPDATING AND DISTRIBUTING INFORMATION |
KR20030035142A (ko) * | 2001-10-30 | 2003-05-09 | 주식회사 이글루시큐리티 | 통합보안관리 서비스 방법 |
GB2381721B (en) | 2001-10-31 | 2005-02-23 | Hewlett Packard Co | System and method of defining unauthorized intrusions on a computer system |
EP1461707A1 (en) * | 2001-12-31 | 2004-09-29 | Citadel Security Software Inc. | Automated computer vulnerability resolution system |
US7424706B2 (en) | 2003-07-16 | 2008-09-09 | Microsoft Corporation | Automatic detection and patching of vulnerable files |
-
2003
- 2003-07-16 US US10/621,148 patent/US7424706B2/en active Active
-
2004
- 2004-06-21 TW TW093117997A patent/TWI354887B/zh not_active IP Right Cessation
- 2004-06-21 IL IL162642A patent/IL162642A/en active IP Right Grant
- 2004-06-21 NZ NZ533661A patent/NZ533661A/en not_active IP Right Cessation
- 2004-06-22 RU RU2004118827/09A patent/RU2358313C2/ru not_active IP Right Cessation
- 2004-06-23 EP EP04014752A patent/EP1505499A1/en not_active Ceased
- 2004-06-23 CA CA002471998A patent/CA2471998A1/en not_active Abandoned
- 2004-06-24 MY MYPI20042495A patent/MY150114A/en unknown
- 2004-06-25 ZA ZA200405076A patent/ZA200405076B/xx unknown
- 2004-06-30 AU AU2004202974A patent/AU2004202974B2/en not_active Expired
- 2004-06-30 SG SG200404141-4A patent/SG139545A1/en unknown
- 2004-07-13 MX MXPA04006784A patent/MXPA04006784A/es active IP Right Grant
- 2004-07-13 BR BR0402767-1A patent/BRPI0402767A/pt not_active IP Right Cessation
- 2004-07-14 NO NO20042970A patent/NO337222B1/no not_active IP Right Cessation
- 2004-07-14 JP JP2004207744A patent/JP4652736B2/ja not_active Expired - Fee Related
- 2004-07-15 CN CN2004100699525A patent/CN1577272B/zh not_active Expired - Lifetime
- 2004-07-15 CO CO04067547A patent/CO5600216A1/es not_active Application Discontinuation
- 2004-07-15 KR KR1020040055038A patent/KR101231410B1/ko active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
JP4652736B2 (ja) | 2011-03-16 |
SG139545A1 (en) | 2008-02-29 |
CA2471998A1 (en) | 2005-01-16 |
AU2004202974B2 (en) | 2009-12-03 |
NZ533661A (en) | 2005-05-27 |
CN1577272B (zh) | 2011-01-12 |
IL162642A0 (en) | 2005-11-20 |
MY150114A (en) | 2013-11-29 |
KR101231410B1 (ko) | 2013-02-07 |
IL162642A (en) | 2010-12-30 |
RU2004118827A (ru) | 2006-01-10 |
BRPI0402767A (pt) | 2005-03-08 |
US7424706B2 (en) | 2008-09-09 |
MXPA04006784A (es) | 2005-03-23 |
TW200508849A (en) | 2005-03-01 |
KR20050009198A (ko) | 2005-01-24 |
TWI354887B (en) | 2011-12-21 |
NO20042970L (no) | 2005-01-17 |
EP1505499A1 (en) | 2005-02-09 |
AU2004202974A1 (en) | 2005-02-03 |
ZA200405076B (en) | 2005-06-03 |
CN1577272A (zh) | 2005-02-09 |
NO337222B1 (no) | 2016-02-15 |
JP2005038428A (ja) | 2005-02-10 |
US20050015760A1 (en) | 2005-01-20 |
RU2358313C2 (ru) | 2009-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CO5600216A1 (es) | Deteccion y parcheo automatico de archivos vulnerables | |
US10348756B2 (en) | System and method for assessing vulnerability of a mobile device | |
Fahl et al. | Hey, nsa: Stay away from my market! future proofing app markets against powerful attackers | |
Vu et al. | Typosquatting and combosquatting attacks on the python ecosystem | |
US8621233B1 (en) | Malware detection using file names | |
JP2005038428A5 (es) | ||
MX2018013618A (es) | Un metodo y sistema para verificar la propiedad de un activo digital mediante el uso de una tabla hash distribuida y un libro mayor distribuido punto a punto. | |
US8769702B2 (en) | Application reputation service | |
PH12019500871A1 (en) | A domain name management scheme for cross-chain interactions in blockchain systems | |
Taylor et al. | Defending against package typosquatting | |
CN107944232A (zh) | 一种基于白名单技术的主动防御系统的设计方法及系统 | |
JP2014063490A (ja) | 危険度計算を通じたリパッケージアプリケーションの分析システム及び分析方法 | |
RU2015136264A (ru) | Способ ведения базы данных и соответствующий сервер | |
BRPI0710257A8 (pt) | Método para autenticar uma aplicação com uma aplicação de servidor e terminal móvel para autenticação de uma aplicação | |
MX2007011685A (es) | Proteccion de una computadora que proporciona un servicio web de programa maligno. | |
GB2463467A (en) | Selective malware scanning of electronic files based on whether an associated digital signature belongs to a trusted source | |
TR201902688T4 (tr) | İndirme kontrol cihazı. | |
GB2477682A (en) | Multi-level secure information retrieval system | |
GB201306126D0 (en) | Method, secure device, system and computer program product for security managing access to a file system | |
CY1113816T1 (el) | Μορια ταυτοποιησης τα οποια ρυθμιζουν τις αλληλεπιδρασεις πρωτεϊνης-πρωτεϊνης με τη χρηση ανταποκριτων που ενεργοποιουνται με μια πρωτεαση | |
US20050154899A1 (en) | Mobile software authentication and validation | |
CN109634615A (zh) | 应用安装包的发布方法、验证方法和装置 | |
CY1113389T1 (el) | Εγγραφο ασφαλειας με εναν οπτικο κυματαγωγο | |
GB2495648A (en) | Maintaining a database of trusted public keys in a plurality of computer devices | |
BR0318016A (pt) | Escuta (interceptação) de grupos de usuários |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FC | Application refused |