GB0413851D0 - System and method for comprehensive general protection for computers against malicious programs that may steal information and/or cause damages - Google Patents
System and method for comprehensive general protection for computers against malicious programs that may steal information and/or cause damagesInfo
- Publication number
- GB0413851D0 GB0413851D0 GBGB0413851.7A GB0413851A GB0413851D0 GB 0413851 D0 GB0413851 D0 GB 0413851D0 GB 0413851 A GB0413851 A GB 0413851A GB 0413851 D0 GB0413851 D0 GB 0413851D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- cause damages
- malicious programs
- general protection
- against malicious
- steal information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/968,022 US9213836B2 (en) | 2000-05-28 | 2004-10-20 | System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2431681 CA2431681A1 (en) | 2002-10-07 | 2003-06-19 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US10/644,841 US20040034794A1 (en) | 2000-05-28 | 2003-08-21 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
CA 2446144 CA2446144A1 (en) | 2002-11-05 | 2003-10-20 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US55745304P | 2004-03-28 | 2004-03-28 | |
US57914804P | 2004-06-09 | 2004-06-09 |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0413851D0 true GB0413851D0 (en) | 2004-07-21 |
GB2404262A GB2404262A (en) | 2005-01-26 |
GB2404262B GB2404262B (en) | 2008-03-05 |
Family
ID=32777046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0413851A Expired - Fee Related GB2404262B (en) | 2000-05-28 | 2004-06-21 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2404262B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110663082A (en) * | 2017-05-24 | 2020-01-07 | 佩塔吉有限公司 | Data processing system and method |
CN112364395A (en) * | 2020-11-11 | 2021-02-12 | 中国信息安全测评中心 | Safety protection method and device for solid state disk |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005099340A2 (en) | 2004-04-19 | 2005-10-27 | Securewave S.A. | On-line centralized and local authorization of executable files |
US7690033B2 (en) | 2004-09-28 | 2010-03-30 | Exobox Technologies Corp. | Electronic computer system secured from unauthorized access to and manipulation of data |
US8024815B2 (en) | 2006-09-15 | 2011-09-20 | Microsoft Corporation | Isolation environment-based information access |
CN101547113B (en) * | 2008-03-27 | 2011-10-26 | 中兴通讯股份有限公司 | System, device and method for filtering warning information |
US10474811B2 (en) | 2012-03-30 | 2019-11-12 | Verisign, Inc. | Systems and methods for detecting malicious code |
CN102662144B (en) * | 2012-03-30 | 2017-07-25 | 北京大学 | A kind of hardware Trojan horse detection method based on activity-level measured |
CN105553767B (en) * | 2015-12-15 | 2018-12-25 | 北京奇虎科技有限公司 | Website backdoor file detection method and device |
US10523694B2 (en) | 2017-05-11 | 2019-12-31 | Bitdam Ltd | System and method for interception of malicious files |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001026267A1 (en) * | 1999-10-05 | 2001-04-12 | Ejasent Inc. | Virtual port multiplexing |
CA2424352A1 (en) * | 2000-05-28 | 2001-12-06 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US7506265B1 (en) * | 2000-07-17 | 2009-03-17 | Microsoft Corporation | System and method for displaying images of virtual machine environments |
US7099948B2 (en) * | 2001-02-16 | 2006-08-29 | Swsoft Holdings, Ltd. | Virtual computing environment |
JP4291964B2 (en) * | 2001-04-19 | 2009-07-08 | 株式会社日立製作所 | Virtual computer system |
GB0212315D0 (en) * | 2002-05-28 | 2002-07-10 | Symbian Ltd | Secure mobile wireless device with protected file systems |
-
2004
- 2004-06-21 GB GB0413851A patent/GB2404262B/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110663082A (en) * | 2017-05-24 | 2020-01-07 | 佩塔吉有限公司 | Data processing system and method |
CN110663082B (en) * | 2017-05-24 | 2024-02-13 | 佩塔吉有限公司 | Data processing system and method |
CN112364395A (en) * | 2020-11-11 | 2021-02-12 | 中国信息安全测评中心 | Safety protection method and device for solid state disk |
Also Published As
Publication number | Publication date |
---|---|
GB2404262A (en) | 2005-01-26 |
GB2404262B (en) | 2008-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2391650B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
GB2380303B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
GB0208892D0 (en) | Computer security system and method | |
GB2418501B (en) | Computer security system and method | |
EP1609070A4 (en) | Security system and method for computer operating systems | |
SG119237A1 (en) | An intrusion protection system and method | |
WO2003046700A8 (en) | Method and system for protecting data from unauthorized disclosure | |
TWI315628B (en) | System and method for authenticating software using protected master key | |
IL166762A0 (en) | System and method for preventing access to data ona compromised | |
GB2440697B (en) | Computer security system and method | |
EP1690363A4 (en) | Method and system for improving computer network security | |
AU2003900764A0 (en) | Bus bridge security system and method for computers | |
IL190507A0 (en) | Identity theft and fraud protection system and method | |
EP1779235A4 (en) | System and method for enabling device dependent rights protection | |
EP1529368A4 (en) | Efficient encryption and authentication for data processing systems | |
EP1685458A4 (en) | Method and system for addressing intrusion attacks on a computer system | |
EP1754157A4 (en) | Content protection ticket system and method | |
AU2002326284A1 (en) | Method and device for computer memory protection against unauthorized access | |
GB2404262B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
AU2003286458A8 (en) | System and method of protecting data | |
GB0603065D0 (en) | Systems and methods for the protection of non-encrypted biometric data | |
IL142487A0 (en) | Method and system for protecting data | |
EP1816565A4 (en) | Computer system and information processing method | |
GB2411747B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
HK1094358A1 (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20090621 |
|
S28 | Restoration of ceased patents (sect. 28/pat. act 1977) |
Free format text: APPLICATION FILED |
|
S28 | Restoration of ceased patents (sect. 28/pat. act 1977) |
Free format text: RESTORATION ALLOWED Effective date: 20110328 |
|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20190328 AND 20190402 |
|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20220621 |