JP2010511940A5 - - Google Patents

Download PDF

Info

Publication number
JP2010511940A5
JP2010511940A5 JP2009539529A JP2009539529A JP2010511940A5 JP 2010511940 A5 JP2010511940 A5 JP 2010511940A5 JP 2009539529 A JP2009539529 A JP 2009539529A JP 2009539529 A JP2009539529 A JP 2009539529A JP 2010511940 A5 JP2010511940 A5 JP 2010511940A5
Authority
JP
Japan
Prior art keywords
program
last
computing device
registered
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2009539529A
Other languages
English (en)
Japanese (ja)
Other versions
JP2010511940A (ja
JP4903879B2 (ja
Filing date
Publication date
Priority claimed from US11/566,170 external-priority patent/US7698305B2/en
Application filed filed Critical
Publication of JP2010511940A publication Critical patent/JP2010511940A/ja
Publication of JP2010511940A5 publication Critical patent/JP2010511940A5/ja
Application granted granted Critical
Publication of JP4903879B2 publication Critical patent/JP4903879B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2009539529A 2006-12-01 2007-11-30 システム解析および管理 Expired - Fee Related JP4903879B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/566,170 US7698305B2 (en) 2006-12-01 2006-12-01 Program modification and loading times in computing devices
US11/566,170 2006-12-01
PCT/US2007/086195 WO2008070587A1 (en) 2006-12-01 2007-11-30 System analysis and management

Publications (3)

Publication Number Publication Date
JP2010511940A JP2010511940A (ja) 2010-04-15
JP2010511940A5 true JP2010511940A5 (enExample) 2010-11-25
JP4903879B2 JP4903879B2 (ja) 2012-03-28

Family

ID=39493284

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2009539529A Expired - Fee Related JP4903879B2 (ja) 2006-12-01 2007-11-30 システム解析および管理

Country Status (12)

Country Link
US (1) US7698305B2 (enExample)
EP (2) EP2126702A4 (enExample)
JP (1) JP4903879B2 (enExample)
KR (1) KR101443932B1 (enExample)
CN (1) CN101542446B (enExample)
AU (1) AU2007329468B8 (enExample)
BR (1) BRPI0719184A2 (enExample)
CA (1) CA2668204C (enExample)
MX (1) MX2009004903A (enExample)
NO (2) NO20092482L (enExample)
RU (1) RU2451326C2 (enExample)
WO (1) WO2008070587A1 (enExample)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8250657B1 (en) 2006-12-29 2012-08-21 Symantec Corporation Web site hygiene-based computer security
US8312536B2 (en) 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8499063B1 (en) * 2008-03-31 2013-07-30 Symantec Corporation Uninstall and system performance based software application reputation
JP5178319B2 (ja) * 2008-05-22 2013-04-10 キヤノン株式会社 アプリケーションプラットフォーム
US8595282B2 (en) 2008-06-30 2013-11-26 Symantec Corporation Simplified communication of a reputation score for an entity
US8413251B1 (en) 2008-09-30 2013-04-02 Symantec Corporation Using disposable data misuse to determine reputation
US8904520B1 (en) 2009-03-19 2014-12-02 Symantec Corporation Communication-based reputation system
US8381289B1 (en) 2009-03-31 2013-02-19 Symantec Corporation Communication-based host reputation system
JP5487962B2 (ja) * 2009-12-28 2014-05-14 株式会社リコー 操作抑制システム、画像形成装置、操作抑制情報提供装置、及び操作抑制方法
US8341745B1 (en) 2010-02-22 2012-12-25 Symantec Corporation Inferring file and website reputations by belief propagation leveraging machine reputation
US8510836B1 (en) 2010-07-06 2013-08-13 Symantec Corporation Lineage-based reputation system
US8869307B2 (en) * 2010-11-19 2014-10-21 Mobile Iron, Inc. Mobile posture-based policy, remediation and access control for enterprise resources
JP5682467B2 (ja) * 2011-06-14 2015-03-11 富士通株式会社 設定情報管理プログラム、設定情報管理方法及び情報処理装置
US9059949B2 (en) * 2011-08-23 2015-06-16 Bank Of America Corporation Monitoring of regulated associates
US9124472B1 (en) 2012-07-25 2015-09-01 Symantec Corporation Providing file information to a client responsive to a file download stability prediction
JP6070847B2 (ja) * 2013-08-09 2017-02-01 富士通株式会社 検証方法、検証装置および検証プログラム
US9471798B2 (en) 2013-09-20 2016-10-18 Oracle International Corporation Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
US9519513B2 (en) 2013-12-03 2016-12-13 Vmware, Inc. Methods and apparatus to automatically configure monitoring of a virtual machine
US9678731B2 (en) 2014-02-26 2017-06-13 Vmware, Inc. Methods and apparatus to generate a customized application blueprint
JP2015162136A (ja) * 2014-02-28 2015-09-07 東芝テック株式会社 情報処理装置及び情報処理プログラム
US9916171B2 (en) * 2014-07-10 2018-03-13 International Business Machines Corporation Application discovery in virtual machines using temporal clustering of installation files
US10171437B2 (en) * 2015-04-24 2019-01-01 Oracle International Corporation Techniques for security artifacts management
US10699020B2 (en) 2015-07-02 2020-06-30 Oracle International Corporation Monitoring and alert services and data encryption management
US10489352B2 (en) * 2015-11-16 2019-11-26 International Business Machines Corporation Software discovery for software on shared file systems
US9965313B2 (en) * 2016-01-05 2018-05-08 Bitdefender IPR Management Ltd. Systems and methods for auditing a virtual machine
CN108959951B (zh) * 2017-05-19 2021-01-12 北京瑞星网安技术股份有限公司 文档安全防护的方法、装置、设备及可读存储介质
US11113138B2 (en) 2018-01-02 2021-09-07 Carrier Corporation System and method for analyzing and responding to errors within a log file
US10628138B2 (en) 2018-02-09 2020-04-21 International Business Machines Corporation Automated management of undesired code use based on predicted valuation and risk analysis
US11163557B2 (en) * 2019-11-08 2021-11-02 International Business Machines Corporation Automated techniques for detecting the usage of software applications in a computing environment using configuration objects
US20230064102A1 (en) * 2020-02-05 2023-03-02 Nec Corporation Analysis system, method, and program
RU2743620C1 (ru) 2020-06-26 2021-02-20 Общество с ограниченной ответственностью "Группа АйБи ТДС" Способ и система определения вредоносной активности по анализу поведения объектов в неизолированной среде
CN113992717A (zh) * 2021-10-28 2022-01-28 傲拓科技股份有限公司 基于tsn技术的边缘数据采集系统及方法
US12026048B2 (en) * 2022-09-16 2024-07-02 Bank Of America Corporation Early detection and avoidance of mainframe job errors
CN116383165B (zh) * 2023-06-03 2023-08-11 浙江档安科技有限公司 一种适应性写入的档案保存方法

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06222933A (ja) * 1993-01-26 1994-08-12 Toshiba Corp 計算機システム
US5694546A (en) 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
US6282712B1 (en) * 1995-03-10 2001-08-28 Microsoft Corporation Automatic software installation on heterogeneous networked computer systems
US5675510A (en) 1995-06-07 1997-10-07 Pc Meter L.P. Computer use meter and analyzer
US6151643A (en) * 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US5797016A (en) * 1996-10-29 1998-08-18 Cheyenne Software Inc. Regeneration agent for back-up software
US6041333A (en) * 1997-11-14 2000-03-21 Microsoft Corporation Method and apparatus for automatically updating a data file from a network
US6047390A (en) * 1997-12-22 2000-04-04 Motorola, Inc. Multiple context software analysis
JPH11232109A (ja) * 1998-02-10 1999-08-27 Hitachi Ltd クラスオブジェクトのロード方法
US6374401B1 (en) 1999-03-29 2002-04-16 International Business Machines Corporation System, method, and program for updating registry objects with a cross-platform installation program
JP3444227B2 (ja) * 1999-04-09 2003-09-08 日本電気株式会社 ソフトウェアの不正使用防止方法
US7073198B1 (en) 1999-08-26 2006-07-04 Ncircle Network Security, Inc. Method and system for detecting a vulnerability in a network
US6574729B1 (en) 1999-08-26 2003-06-03 Lucent Technologies Inc. System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server
US7085936B1 (en) 1999-08-30 2006-08-01 Symantec Corporation System and method for using login correlations to detect intrusions
US6775657B1 (en) 1999-12-22 2004-08-10 Cisco Technology, Inc. Multilayered intrusion detection system and method
JP3578266B2 (ja) * 2000-01-06 2004-10-20 インターナショナル・ビジネス・マシーンズ・コーポレーション アプリケーションの起動方法、アプリケーションの起動のためのソフトウエア・プロダクト
EP1277326A2 (en) 2000-04-28 2003-01-22 Internet Security Systems, Inc. Method and system for managing computer security information
US20030023857A1 (en) 2001-07-26 2003-01-30 Hinchliffe Alexander James Malware infection suppression
US7032244B2 (en) 2001-10-02 2006-04-18 International Business Machines Corporation Identifying potential intruders on a server
US6874001B2 (en) * 2001-10-05 2005-03-29 International Business Machines Corporation Method of maintaining data consistency in a loose transaction model
US20050114285A1 (en) 2001-11-16 2005-05-26 Cincotta Frank A. Data replication system and method
JP2004127253A (ja) * 2002-07-31 2004-04-22 Ricoh Co Ltd 情報処理装置およびバージョンチェック方法
JP2004164351A (ja) * 2002-11-14 2004-06-10 Hitachi Ltd コンピュータシステムの不正プログラム修正方法およびその装置
US6980927B2 (en) 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US20070128899A1 (en) * 2003-01-12 2007-06-07 Yaron Mayer System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows
US7024548B1 (en) 2003-03-10 2006-04-04 Cisco Technology, Inc. Methods and apparatus for auditing and tracking changes to an existing configuration of a computerized device
US7124400B2 (en) * 2003-03-12 2006-10-17 Microsoft Corporation Extensible customization framework for a software system
US7168064B2 (en) * 2003-03-25 2007-01-23 Electric Cloud, Inc. System and method for supplementing program builds with file usage information
US20050010916A1 (en) * 2003-05-24 2005-01-13 Hagen David A. System for providing software application updates to multiple clients on a network
US7478433B2 (en) * 2003-06-19 2009-01-13 Panasonic Corporation Program execution system having authentication function
JP2005063259A (ja) * 2003-08-18 2005-03-10 Canon Inc アプリケーションの共用ファイル制御方法
US7840646B2 (en) * 2003-10-08 2010-11-23 Yahoo! Inc. Learned upload time estimate module
JP4937902B2 (ja) * 2004-03-17 2012-05-23 アルカテル−ルーセント ユーエスエー インコーポレーテッド オペレーティングシステム環境でのプロセス状態情報の管理
US20060047713A1 (en) 2004-08-03 2006-03-02 Wisdomforce Technologies, Inc. System and method for database replication by interception of in memory transactional change records
US7716530B2 (en) * 2006-02-28 2010-05-11 Microsoft Corporation Thread interception and analysis

Similar Documents

Publication Publication Date Title
JP2010511940A5 (enExample)
US9727436B2 (en) Adding a profiling agent to a virtual machine to permit performance and memory consumption analysis within unit tests
US7984088B2 (en) Method for supporting multiple filesystem implementations
CN110321275B (zh) 程序监控方法、装置、计算设备以及存储介质
Llanos TPCC-UVa: an open-source TPC-C implementation for global performance measurement of computer systems
CN103345411A (zh) 卸载应用程序的方法及装置
JP2009505278A5 (enExample)
CN101000552A (zh) Java类加载方法及加载器
US8667035B2 (en) Method of converting a filesystem while the filesystem remains in an active state
JP2007172102A5 (enExample)
WO2022156277A1 (zh) 一种应用程序安装方法、装置、计算设备及可读存储介质
Slaughter et al. The little SAS book for enterprise guide 4.2
US9519470B2 (en) Information processing system, information processing apparatus, device, software installation method, and storage medium for executing software installation
CN112464236A (zh) 一种恶意程序检测方法、系统及相关装置
Wieman Anti-pattern Scanner: an approach to detect anti-patterns and design violations
TWI401603B (zh) 驅動程式的安裝方法、系統及編譯裝置
GB2583884A (en) A chronologically ordered log-structured key-value store from failures during garbage collection
CN201218946Y (zh) 免拆机数据复制系统
JP4410754B2 (ja) ファイルバックアップシステム及び方法
Bacon Fast and effective optimization of statically typed object-oriented
Palmer Java Event Handling with Cdrom
Geneves Logics for XML
Baquiran et al. Document: Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
Aoki et al. A method for detecting unusual defects in enterprise system using model checking techniques
D'Alberto The X-Legion Compiler: A Compiler Approach to Write and to Optimize Divide-And-Conquer Algorithms