JP2010079901A - アプリケーションの評判に応じて段階的に制限を実施する方法およびそのコンピュータプログラム - Google Patents

アプリケーションの評判に応じて段階的に制限を実施する方法およびそのコンピュータプログラム Download PDF

Info

Publication number
JP2010079901A
JP2010079901A JP2009217767A JP2009217767A JP2010079901A JP 2010079901 A JP2010079901 A JP 2010079901A JP 2009217767 A JP2009217767 A JP 2009217767A JP 2009217767 A JP2009217767 A JP 2009217767A JP 2010079901 A JP2010079901 A JP 2010079901A
Authority
JP
Japan
Prior art keywords
application
reputation
access
policy
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2009217767A
Other languages
English (en)
Japanese (ja)
Other versions
JP2010079901A5 (enExample
Inventor
Kenneth Schneider
シュナイダー ケネス
Bruce Mccorkendale
マッコーケンデール ブルース
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gen Digital Inc
Original Assignee
Symantec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symantec Corp filed Critical Symantec Corp
Publication of JP2010079901A publication Critical patent/JP2010079901A/ja
Publication of JP2010079901A5 publication Critical patent/JP2010079901A5/ja
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
JP2009217767A 2008-09-25 2009-09-18 アプリケーションの評判に応じて段階的に制限を実施する方法およびそのコンピュータプログラム Pending JP2010079901A (ja)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/238,300 US9495538B2 (en) 2008-09-25 2008-09-25 Graduated enforcement of restrictions according to an application's reputation

Publications (2)

Publication Number Publication Date
JP2010079901A true JP2010079901A (ja) 2010-04-08
JP2010079901A5 JP2010079901A5 (enExample) 2012-11-01

Family

ID=41508158

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2009217767A Pending JP2010079901A (ja) 2008-09-25 2009-09-18 アプリケーションの評判に応じて段階的に制限を実施する方法およびそのコンピュータプログラム

Country Status (3)

Country Link
US (1) US9495538B2 (enExample)
EP (1) EP2169580A3 (enExample)
JP (1) JP2010079901A (enExample)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014178727A (ja) * 2013-03-13 2014-09-25 Kddi Corp 端末、アクセス制限方法およびプログラム
US9032481B2 (en) 2012-04-26 2015-05-12 Canon Kabushiki Kaisha Information processing apparatus and control method thereof
CN104662517A (zh) * 2013-06-28 2015-05-27 赛门铁克公司 安全漏洞检测技术
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
JP2015530678A (ja) * 2012-10-29 2015-10-15 マカフィー, インコーポレイテッド マルウェア検出の動的な検疫
US9516062B2 (en) 2012-04-10 2016-12-06 Mcafee, Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
JP2016540287A (ja) * 2013-10-18 2016-12-22 ノキア テクノロジーズ オサケユイチア 電子デバイスにおけるアプリケーションを動作させ、許可をモニタリングする方法とシステム
JP2017073152A (ja) * 2013-03-29 2017-04-13 サイトリックス システムズ,インコーポレイテッド 複数の操作モードを有するアプリケーションのデータ管理
JP2017162481A (ja) * 2017-04-04 2017-09-14 Kddi株式会社 端末、アクセス制限方法およびプログラム
US9973489B2 (en) 2012-10-15 2018-05-15 Citrix Systems, Inc. Providing virtualized private network tunnels
US9971585B2 (en) 2012-10-16 2018-05-15 Citrix Systems, Inc. Wrapping unmanaged applications on a mobile device
US9985850B2 (en) 2013-03-29 2018-05-29 Citrix Systems, Inc. Providing mobile device management functionalities
US10044757B2 (en) 2011-10-11 2018-08-07 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
US10097584B2 (en) 2013-03-29 2018-10-09 Citrix Systems, Inc. Providing a managed browser
JP2018531470A (ja) * 2015-10-26 2018-10-25 シマンテック コーポレーションSymantec Corporation 自動化されたアプリケーション分析のための技法
US10284627B2 (en) 2013-03-29 2019-05-07 Citrix Systems, Inc. Data management for an application with multiple operation modes
US10476885B2 (en) 2013-03-29 2019-11-12 Citrix Systems, Inc. Application with multiple operation modes
US10908896B2 (en) 2012-10-16 2021-02-02 Citrix Systems, Inc. Application wrapping for application management framework
JP2023536033A (ja) * 2021-04-30 2023-08-23 エムエックス・テクノロジーズ・インコーポレーテッド リスク評価に基づくデータアクセス

Families Citing this family (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8205239B1 (en) * 2007-09-29 2012-06-19 Symantec Corporation Methods and systems for adaptively setting network security policies
US8429743B2 (en) * 2008-12-23 2013-04-23 Microsoft Corporation Online risk mitigation
US8561182B2 (en) * 2009-01-29 2013-10-15 Microsoft Corporation Health-based access to network resources
US9390263B2 (en) 2010-03-31 2016-07-12 Sophos Limited Use of an application controller to monitor and control software file and application environments
US9300688B2 (en) * 2010-04-18 2016-03-29 Ca, Inc. Protected application stack and method and system of utilizing
US8805881B2 (en) 2010-05-06 2014-08-12 International Business Machines Corporation Reputation based access control
US9104837B1 (en) * 2012-06-18 2015-08-11 Bromium, Inc. Exposing subset of host file systems to restricted virtual machines based on upon performing user-initiated actions against host files
US8931048B2 (en) 2010-08-24 2015-01-06 International Business Machines Corporation Data system forensics system and method
US9984229B1 (en) * 2010-09-01 2018-05-29 Open Invention Network Llc Method and apparatus providing a multiple source evidence application trust model
US9111079B2 (en) * 2010-09-30 2015-08-18 Microsoft Technology Licensing, Llc Trustworthy device claims as a service
US8800029B2 (en) 2010-10-04 2014-08-05 International Business Machines Corporation Gathering, storing and using reputation information
US8931037B2 (en) 2010-12-27 2015-01-06 Microsoft Corporation Policy-based access to virtualized applications
CN103649965A (zh) * 2011-06-27 2014-03-19 诺基亚公司 用于促进资源安全性的系统、方法和装置
US8631244B1 (en) 2011-08-11 2014-01-14 Rockwell Collins, Inc. System and method for preventing computer malware from exfiltrating data from a user computer in a network via the internet
JP2013077297A (ja) 2011-09-15 2013-04-25 Canon Inc 情報処理装置およびその制御方法
US9043918B2 (en) 2011-10-13 2015-05-26 Mcafee, Inc. System and method for profile based filtering of outgoing information in a mobile environment
US20130097659A1 (en) * 2011-10-17 2013-04-18 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
US20130097660A1 (en) 2011-10-17 2013-04-18 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
US9059853B1 (en) 2012-02-22 2015-06-16 Rockwell Collins, Inc. System and method for preventing a computing device from obtaining unauthorized access to a secure network or trusted computing environment
US9594903B1 (en) * 2012-02-29 2017-03-14 Symantec Corporation Reputation scoring of social networking applications
US9558348B1 (en) * 2012-03-01 2017-01-31 Mcafee, Inc. Ranking software applications by combining reputation and code similarity
US8661246B1 (en) 2012-04-09 2014-02-25 Rockwell Collins, Inc. System and method for protecting certificate applications using a hardened proxy
US9152784B2 (en) 2012-04-18 2015-10-06 Mcafee, Inc. Detection and prevention of installation of malicious mobile applications
WO2014064323A1 (en) * 2012-10-23 2014-05-01 Nokia Corporation Method and apparatus for managing access rights
US9171151B2 (en) * 2012-11-16 2015-10-27 Microsoft Technology Licensing, Llc Reputation-based in-network filtering of client event information
US10834133B2 (en) 2012-12-04 2020-11-10 International Business Machines Corporation Mobile device security policy based on authorized scopes
US9274816B2 (en) 2012-12-21 2016-03-01 Mcafee, Inc. User driven emulation of applications
US9286047B1 (en) 2013-02-13 2016-03-15 Cisco Technology, Inc. Deployment and upgrade of network devices in a network environment
CN103281333B (zh) * 2013-06-17 2016-12-28 山石网科通信技术有限公司 数据流的转发方法及装置
US9307409B2 (en) 2013-12-27 2016-04-05 Intel Corporation Apparatus, system and method of protecting domains of a multimode wireless radio transceiver
US9241010B1 (en) * 2014-03-20 2016-01-19 Fireeye, Inc. System and method for network behavior detection
US9659182B1 (en) * 2014-04-30 2017-05-23 Symantec Corporation Systems and methods for protecting data files
US9118714B1 (en) * 2014-07-23 2015-08-25 Lookingglass Cyber Solutions, Inc. Apparatuses, methods and systems for a cyber threat visualization and editing user interface
US10050993B2 (en) 2014-09-24 2018-08-14 Mcafee, Llc Non-invasive whitelisting
US10726119B2 (en) * 2014-12-08 2020-07-28 Vmware, Inc. Monitoring application execution in a clone of a virtual computing instance for application whitelisting
US10834109B2 (en) * 2014-12-23 2020-11-10 Mcafee, Llc Determining a reputation for a process
US10374904B2 (en) 2015-05-15 2019-08-06 Cisco Technology, Inc. Diagnostic network visualization
US9800497B2 (en) 2015-05-27 2017-10-24 Cisco Technology, Inc. Operations, administration and management (OAM) in overlay data center environments
US10089099B2 (en) 2015-06-05 2018-10-02 Cisco Technology, Inc. Automatic software upgrade
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US9967158B2 (en) 2015-06-05 2018-05-08 Cisco Technology, Inc. Interactive hierarchical network chord diagram for application dependency mapping
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US10033766B2 (en) 2015-06-05 2018-07-24 Cisco Technology, Inc. Policy-driven compliance
US10185480B1 (en) * 2015-06-15 2019-01-22 Symantec Corporation Systems and methods for automatically making selections in user interfaces
US10025937B1 (en) * 2015-06-26 2018-07-17 Symantec Corporation Practical and dynamic approach to enterprise hardening
US9723006B2 (en) 2015-06-27 2017-08-01 Mcafee, Inc. Temporary process deprivileging
US10373140B1 (en) 2015-10-26 2019-08-06 Intuit Inc. Method and system for detecting fraudulent bill payment transactions using dynamic multi-parameter predictive modeling
US20170149828A1 (en) 2015-11-24 2017-05-25 International Business Machines Corporation Trust level modifier
US10205786B2 (en) 2016-04-22 2019-02-12 Microsoft Technology Licensing, Llc Multi-user application executing in user privilege mode
US10931629B2 (en) 2016-05-27 2021-02-23 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10171357B2 (en) 2016-05-27 2019-01-01 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10289438B2 (en) 2016-06-16 2019-05-14 Cisco Technology, Inc. Techniques for coordination of application components deployed on distributed virtual machines
US10083452B1 (en) 2016-06-21 2018-09-25 Intuit Inc. Method and system for identifying potentially fraudulent bill and invoice payments
US10404827B2 (en) * 2016-06-22 2019-09-03 Cisco Technology, Inc. Client network information service
US10708183B2 (en) 2016-07-21 2020-07-07 Cisco Technology, Inc. System and method of providing segment routing as a service
US20180033089A1 (en) * 2016-07-27 2018-02-01 Intuit Inc. Method and system for identifying and addressing potential account takeover activity in a financial system
US10484429B1 (en) * 2016-10-26 2019-11-19 Amazon Technologies, Inc. Automated sensitive information and data storage compliance verification
US10972388B2 (en) 2016-11-22 2021-04-06 Cisco Technology, Inc. Federated microburst detection
US10511632B2 (en) 2017-03-03 2019-12-17 Microsoft Technology Licensing, Llc Incremental security policy development for an enterprise network
US10419488B2 (en) 2017-03-03 2019-09-17 Microsoft Technology Licensing, Llc Delegating security policy management authority to managed accounts
US10708152B2 (en) 2017-03-23 2020-07-07 Cisco Technology, Inc. Predicting application and network performance
US10523512B2 (en) 2017-03-24 2019-12-31 Cisco Technology, Inc. Network agent for generating platform specific network policies
US10764141B2 (en) 2017-03-27 2020-09-01 Cisco Technology, Inc. Network agent for reporting to a network policy system
US10250446B2 (en) 2017-03-27 2019-04-02 Cisco Technology, Inc. Distributed policy store
US10594560B2 (en) 2017-03-27 2020-03-17 Cisco Technology, Inc. Intent driven network policy platform
US10873794B2 (en) 2017-03-28 2020-12-22 Cisco Technology, Inc. Flowlet resolution for application performance monitoring and management
US11087334B1 (en) 2017-04-04 2021-08-10 Intuit Inc. Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content
US10680887B2 (en) 2017-07-21 2020-06-09 Cisco Technology, Inc. Remote device status audit and recovery
US10554501B2 (en) 2017-10-23 2020-02-04 Cisco Technology, Inc. Network migration assistant
US10523541B2 (en) 2017-10-25 2019-12-31 Cisco Technology, Inc. Federated network and application data analytics platform
US10594542B2 (en) 2017-10-27 2020-03-17 Cisco Technology, Inc. System and method for network root cause analysis
US11829866B1 (en) 2017-12-27 2023-11-28 Intuit Inc. System and method for hierarchical deep semi-supervised embeddings for dynamic targeted anomaly detection
US11233821B2 (en) 2018-01-04 2022-01-25 Cisco Technology, Inc. Network intrusion counter-intelligence
US11765046B1 (en) 2018-01-11 2023-09-19 Cisco Technology, Inc. Endpoint cluster assignment and query generation
US10574575B2 (en) 2018-01-25 2020-02-25 Cisco Technology, Inc. Network flow stitching using middle box flow stitching
US10999149B2 (en) 2018-01-25 2021-05-04 Cisco Technology, Inc. Automatic configuration discovery based on traffic flow data
US10798015B2 (en) 2018-01-25 2020-10-06 Cisco Technology, Inc. Discovery of middleboxes using traffic flow stitching
US10873593B2 (en) 2018-01-25 2020-12-22 Cisco Technology, Inc. Mechanism for identifying differences between network snapshots
US10826803B2 (en) 2018-01-25 2020-11-03 Cisco Technology, Inc. Mechanism for facilitating efficient policy updates
US10917438B2 (en) 2018-01-25 2021-02-09 Cisco Technology, Inc. Secure publishing for policy updates
US11128700B2 (en) 2018-01-26 2021-09-21 Cisco Technology, Inc. Load balancing configuration based on traffic flow telemetry
US11392467B2 (en) 2019-04-17 2022-07-19 Microsoft Technology Licensing, Llc Failover between decentralized identity stores
US11190512B2 (en) 2019-04-17 2021-11-30 Microsoft Technology Licensing, Llc Integrity attestation of attestation component
US11381567B2 (en) 2019-04-29 2022-07-05 Microsoft Technology Licensing, Llc Execution of an application within a scope of user-granted permission
US11429743B2 (en) 2019-04-29 2022-08-30 Microsoft Technology Licensing, Llc Localization of DID-related claims and data
US11222137B2 (en) 2019-05-03 2022-01-11 Microsoft Technology Licensing, Llc Storing and executing an application in a user's personal storage with user granted permission
US11411959B2 (en) * 2019-05-03 2022-08-09 Microsoft Technology Licensing, Llc Execution of application in a container within a scope of user-granted permission
US11321481B1 (en) * 2019-06-26 2022-05-03 Norton LifeLock, Inc. Method for determining to grant or deny a permission request based on empirical data aggregation
GB2626375A (en) * 2023-01-23 2024-07-24 Withsecure Corp An arrangement and a method of threat detection in a computing device or a computer network
CN117201195B (zh) * 2023-11-06 2024-01-26 联通(广东)产业互联网有限公司 进程网络策略限制方法及装置、设备、存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006134691A1 (ja) * 2005-06-17 2006-12-21 Nec Corporation 情報処理装置、復旧装置、プログラム及び復旧方法
US20070094260A1 (en) * 2005-10-21 2007-04-26 Microsoft Corporation Authenticating third party products via a secure extensibility model
JP2007220007A (ja) * 2006-02-20 2007-08-30 Fujitsu Ltd セキュリティ管理プログラム、ジョブ投入管理プログラム、およびセキュリティ管理方法
US20080072049A1 (en) * 2006-08-31 2008-03-20 Microsoft Corporation Software authorization utilizing software reputation
US20080229422A1 (en) * 2007-03-14 2008-09-18 Microsoft Corporation Enterprise security assessment sharing

Family Cites Families (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7284124B1 (en) 2000-06-05 2007-10-16 Microsoft Corporation Trust level based platform access regulation application
US20020046041A1 (en) 2000-06-23 2002-04-18 Ken Lang Automated reputation/trust service
US20020099586A1 (en) 2000-11-22 2002-07-25 National Britannia Group Ltd. Method, system, and computer program product for risk assessment and risk management
WO2002065285A1 (en) * 2001-02-14 2002-08-22 Invicta Networks, Inc. Systems and methods for creating a code inspection system
US7546338B2 (en) 2002-02-25 2009-06-09 Ascentive Llc Method and system for screening remote site connections and filtering data based on a community trust assessment
US7340770B2 (en) 2002-05-15 2008-03-04 Check Point Software Technologies, Inc. System and methodology for providing community-based security policies
US7788700B1 (en) * 2002-05-15 2010-08-31 Gerard A. Gagliano Enterprise security system
US20040123117A1 (en) * 2002-12-18 2004-06-24 Symantec Corporation Validation for behavior-blocking system
US7607021B2 (en) 2004-03-09 2009-10-20 Cisco Technology, Inc. Isolation approach for network users associated with elevated risk
US7617519B2 (en) 2004-03-18 2009-11-10 Microsoft Corporation System and method for intelligent recommendation with experts for user trust decisions
US7908663B2 (en) * 2004-04-20 2011-03-15 Microsoft Corporation Abstractions and automation for enhanced sharing and collaboration
US7490356B2 (en) 2004-07-20 2009-02-10 Reflectent Software, Inc. End user risk management
US20070067844A1 (en) 2005-09-16 2007-03-22 Sana Security Method and apparatus for removing harmful software
US7822620B2 (en) 2005-05-03 2010-10-26 Mcafee, Inc. Determining website reputations using automatic testing
US8566726B2 (en) 2005-05-03 2013-10-22 Mcafee, Inc. Indicating website reputations based on website handling of personal information
US7571482B2 (en) 2005-06-28 2009-08-04 Microsoft Corporation Automated rootkit detector
US7647634B2 (en) 2005-06-30 2010-01-12 Microsoft Corporation Managing access to a network
JP5124455B2 (ja) 2005-07-28 2013-01-23 エムフォメーション・テクノロジーズ・インコーポレイテッド 装置の機能性を遠隔的に制御するためのシステムおよび方法
US7774822B2 (en) 2005-08-03 2010-08-10 Novell, Inc. Autonomous policy discovery
US9467462B2 (en) 2005-09-15 2016-10-11 Hewlett Packard Enterprise Development Lp Traffic anomaly analysis for the detection of aberrant network code
US7917481B1 (en) 2005-10-31 2011-03-29 Symantec Operating Corporation File-system-independent malicious content detection
US7461036B2 (en) * 2006-01-18 2008-12-02 International Business Machines Corporation Method for controlling risk in a computer security artificial neural network expert system
US8015484B2 (en) 2006-02-09 2011-09-06 Alejandro Backer Reputation system for web pages and online entities
US20070261116A1 (en) 2006-04-13 2007-11-08 Verisign, Inc. Method and apparatus to provide a user profile for use with a secure content service
US7849507B1 (en) 2006-04-29 2010-12-07 Ironport Systems, Inc. Apparatus for filtering server responses
US7761912B2 (en) 2006-06-06 2010-07-20 Microsoft Corporation Reputation driven firewall
US8775402B2 (en) 2006-08-15 2014-07-08 Georgia State University Research Foundation, Inc. Trusted query network systems and methods
US8533822B2 (en) 2006-08-23 2013-09-10 Threatstop, Inc. Method and system for propagating network policy
US7831522B1 (en) 2006-09-28 2010-11-09 Symantec Corporation Evaluating relying parties
US7809955B2 (en) 2006-10-17 2010-10-05 Blue Ridge Networks, Inc. Trustable communities for a computer system
US20080115213A1 (en) 2006-11-14 2008-05-15 Fmr Corp. Detecting Fraudulent Activity on a Network Using Stored Information
US20080120699A1 (en) 2006-11-17 2008-05-22 Mcafee, Inc. Method and system for assessing and mitigating access control to a managed network
US7991902B2 (en) 2006-12-08 2011-08-02 Microsoft Corporation Reputation-based authorization decisions
US8312536B2 (en) 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8250657B1 (en) 2006-12-29 2012-08-21 Symantec Corporation Web site hygiene-based computer security
US7908660B2 (en) 2007-02-06 2011-03-15 Microsoft Corporation Dynamic risk management
US8955122B2 (en) 2007-04-04 2015-02-10 Sri International Method and apparatus for detecting malware infection
US20080255928A1 (en) 2007-04-10 2008-10-16 Thomas Joseph Tomeny Trusted networks of unique identified natural persons
EP2156315A4 (en) 2007-05-14 2011-04-13 Sailpoint Technologies Inc SYSTEM AND METHOD FOR USER RISK ASSESSMENT
US7870609B2 (en) 2007-06-29 2011-01-11 Microsoft Corporation Detection and removal of undesirable items in a data processing environment
US20090024425A1 (en) * 2007-07-17 2009-01-22 Robert Calvert Methods, Systems, and Computer-Readable Media for Determining an Application Risk Rating
US8621610B2 (en) 2007-08-06 2013-12-31 The Regents Of The University Of Michigan Network service for the detection, analysis and quarantine of malicious and unwanted files
US8296244B1 (en) 2007-08-23 2012-10-23 CSRSI, Inc. Method and system for standards guidance
US10318730B2 (en) 2007-12-20 2019-06-11 Bank Of America Corporation Detection and prevention of malicious code execution using risk scoring
GB2458568B (en) 2008-03-27 2012-09-19 Covertix Ltd System and method for dynamically enforcing security policies on electronic files
US8266284B2 (en) 2008-05-16 2012-09-11 Microsoft Corporation System from reputation shaping a peer-to-peer network
US8359632B2 (en) 2008-05-30 2013-01-22 Microsoft Corporation Centralized account reputation
US8595282B2 (en) 2008-06-30 2013-11-26 Symantec Corporation Simplified communication of a reputation score for an entity
US9130962B2 (en) 2008-06-30 2015-09-08 Symantec Corporation Calculating domain registrar reputation by analysis of hosted domains
US8935789B2 (en) 2008-07-21 2015-01-13 Jayant Shukla Fixing computer files infected by virus and other malware
US8095112B2 (en) * 2008-08-21 2012-01-10 Palo Alto Research Center Incorporated Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
US20100125911A1 (en) 2008-11-17 2010-05-20 Prakash Bhaskaran Risk Scoring Based On Endpoint User Activities
US8612454B2 (en) 2008-11-19 2013-12-17 Dianne Charles Method and system for personalized health management based on user-specific criteria
US8145562B2 (en) 2009-03-09 2012-03-27 Moshe Wasserblat Apparatus and method for fraud prevention
US8225406B1 (en) 2009-03-31 2012-07-17 Symantec Corporation Systems and methods for using reputation data to detect shared-object-based security threats
US9111089B1 (en) * 2011-02-08 2015-08-18 Symantec Corporation Systems and methods for safely executing programs
RU2587423C2 (ru) * 2013-09-26 2016-06-20 Закрытое акционерное общество "Лаборатория Касперского" Система и способ обеспечения безопасности онлайн-транзакций
EP3210364B8 (en) * 2014-10-21 2021-03-10 Proofpoint, Inc. Systems and methods for application security analysis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006134691A1 (ja) * 2005-06-17 2006-12-21 Nec Corporation 情報処理装置、復旧装置、プログラム及び復旧方法
US20070094260A1 (en) * 2005-10-21 2007-04-26 Microsoft Corporation Authenticating third party products via a secure extensibility model
JP2007220007A (ja) * 2006-02-20 2007-08-30 Fujitsu Ltd セキュリティ管理プログラム、ジョブ投入管理プログラム、およびセキュリティ管理方法
US20080072049A1 (en) * 2006-08-31 2008-03-20 Microsoft Corporation Software authorization utilizing software reputation
US20080229422A1 (en) * 2007-03-14 2008-09-18 Microsoft Corporation Enterprise security assessment sharing

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9661017B2 (en) 2011-03-21 2017-05-23 Mcafee, Inc. System and method for malware and network reputation correlation
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
KR101554809B1 (ko) * 2011-06-27 2015-09-21 맥아피 인코퍼레이티드 프로토콜 핑거프린팅 및 평판 상관을 위한 시스템 및 방법
US11134104B2 (en) 2011-10-11 2021-09-28 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
US10469534B2 (en) 2011-10-11 2019-11-05 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
US10402546B1 (en) 2011-10-11 2019-09-03 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
US10063595B1 (en) 2011-10-11 2018-08-28 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
US10044757B2 (en) 2011-10-11 2018-08-07 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
US9516062B2 (en) 2012-04-10 2016-12-06 Mcafee, Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9032481B2 (en) 2012-04-26 2015-05-12 Canon Kabushiki Kaisha Information processing apparatus and control method thereof
US9973489B2 (en) 2012-10-15 2018-05-15 Citrix Systems, Inc. Providing virtualized private network tunnels
US10908896B2 (en) 2012-10-16 2021-02-02 Citrix Systems, Inc. Application wrapping for application management framework
US9971585B2 (en) 2012-10-16 2018-05-15 Citrix Systems, Inc. Wrapping unmanaged applications on a mobile device
US10545748B2 (en) 2012-10-16 2020-01-28 Citrix Systems, Inc. Wrapping unmanaged applications on a mobile device
JP2015530678A (ja) * 2012-10-29 2015-10-15 マカフィー, インコーポレイテッド マルウェア検出の動的な検疫
JP2014178727A (ja) * 2013-03-13 2014-09-25 Kddi Corp 端末、アクセス制限方法およびプログラム
US9985850B2 (en) 2013-03-29 2018-05-29 Citrix Systems, Inc. Providing mobile device management functionalities
US10476885B2 (en) 2013-03-29 2019-11-12 Citrix Systems, Inc. Application with multiple operation modes
US10965734B2 (en) 2013-03-29 2021-03-30 Citrix Systems, Inc. Data management for an application with multiple operation modes
US10701082B2 (en) 2013-03-29 2020-06-30 Citrix Systems, Inc. Application with multiple operation modes
US10284627B2 (en) 2013-03-29 2019-05-07 Citrix Systems, Inc. Data management for an application with multiple operation modes
JP2017073152A (ja) * 2013-03-29 2017-04-13 サイトリックス システムズ,インコーポレイテッド 複数の操作モードを有するアプリケーションのデータ管理
US10097584B2 (en) 2013-03-29 2018-10-09 Citrix Systems, Inc. Providing a managed browser
CN104662517A (zh) * 2013-06-28 2015-05-27 赛门铁克公司 安全漏洞检测技术
JP2015531951A (ja) * 2013-06-28 2015-11-05 シマンテック コーポレーションSymantec Corporation セキュリティ脆弱性を検出するための技術
CN104662517B (zh) * 2013-06-28 2019-02-15 赛门铁克公司 安全漏洞检测技术
JP2016540287A (ja) * 2013-10-18 2016-12-22 ノキア テクノロジーズ オサケユイチア 電子デバイスにおけるアプリケーションを動作させ、許可をモニタリングする方法とシステム
US11218507B2 (en) 2013-10-18 2022-01-04 Nokia Technologies Oy Method and system for operating and monitoring permissions for applications in a electronic device
JP2018531470A (ja) * 2015-10-26 2018-10-25 シマンテック コーポレーションSymantec Corporation 自動化されたアプリケーション分析のための技法
JP2017162481A (ja) * 2017-04-04 2017-09-14 Kddi株式会社 端末、アクセス制限方法およびプログラム
JP2023536033A (ja) * 2021-04-30 2023-08-23 エムエックス・テクノロジーズ・インコーポレーテッド リスク評価に基づくデータアクセス

Also Published As

Publication number Publication date
US20100077445A1 (en) 2010-03-25
US9495538B2 (en) 2016-11-15
EP2169580A2 (en) 2010-03-31
EP2169580A3 (en) 2010-11-24

Similar Documents

Publication Publication Date Title
US9495538B2 (en) Graduated enforcement of restrictions according to an application's reputation
US11343280B2 (en) System and method for identifying and controlling polymorphic malware
US12432225B2 (en) Inline malware detection
US11636208B2 (en) Generating models for performing inline malware detection
EP2410452B1 (en) Protection against malware on web resources
US8561182B2 (en) Health-based access to network resources
US8763071B2 (en) Systems and methods for mobile application security classification and enforcement
US8316446B1 (en) Methods and apparatus for blocking unwanted software downloads
JP6001781B2 (ja) 不正アクセス検知システム及び不正アクセス検知方法
US12430437B2 (en) Specific file detection baked into machine learning pipelines
US9275231B1 (en) Method and apparatus for securing a computer using an optimal configuration for security software based on user behavior
US20250365311A1 (en) Inline ransomware detection via server message block (smb) traffic
EP3999985A1 (en) Inline malware detection
EP1902384B1 (en) Securing network services using network action control lists
Jamuradovich SEARCHING FOR WAYS TO IMPROVE THE EFFECTIVENESS OF TOOLS FOR DETECTING INFECTED FILES OF COMPUTER SYSTEMS
Cangea Protection Methods Specific to Information Technology Threats. Case Study.

Legal Events

Date Code Title Description
RD03 Notification of appointment of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7423

Effective date: 20101007

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20101117

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20120914

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20120914

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20131120

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20140107

A524 Written submission of copy of amendment under section 19 (pct)

Free format text: JAPANESE INTERMEDIATE CODE: A524

Effective date: 20140407

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20140826