WO2005116804A3 - Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features - Google Patents

Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features

Info

Publication number
WO2005116804A3
WO2005116804A3 PCT/US2005/001484 US2005001484W WO2005116804A3 WO 2005116804 A3 WO2005116804 A3 WO 2005116804A3 US 2005001484 W US2005001484 W US 2005001484W WO 2005116804 A3 WO2005116804 A3 WO 2005116804A3
Authority
WO
Grant status
Application
Patent type
Prior art keywords
processing
computing
environments
virtual
device
Prior art date
Application number
PCT/US2005/001484
Other languages
French (fr)
Other versions
WO2005116804A2 (en )
Inventor
Kenneth Largman
Anthony B More
Jeffrey Blair
Original Assignee
Self Repairing Computers Inc
Kenneth Largman
Anthony B More
Jeffrey Blair
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Abstract

Information appliance, computing device, or other processor or microprocessor based device or system provides security and anti-viral, anti-hacker, and anti-cyber terror features, and can automatically create multiple sequentially or concurrently and intermittently isolated and/or restricted computing environments to prevent viruses, malicious or other computer hacking, computer or device corruption and failure by using these computing environments in conjunction with restricted and controlled methods of moving and copying data, combined with a process that destroys malicious code located in computing environments and data stores. Time multiplexed processing streams (2956) with system, device, architecture and method for maintaining isolation of multiple processes executing in single physical processor. Virtual multi-dimensional processing space (2955) and virtual processing environments (2951-2954). Temporally multiplexed processing in a single CPU. Process isolation (2943) using address control and mapping. Selecting, configuring, switching, and/or multiplexing multiple processes in physical and/or virtual processing or computing spaces to create physical and/or virtual processing or computing environments.
PCT/US2005/001484 2001-05-17 2005-01-14 Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features WO2005116804A3 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US10760131 US7392541B2 (en) 2001-05-17 2004-01-15 Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
US10/760,131 2004-01-15
USPCT/US04/33955 2004-10-13
PCT/US2004/033955 WO2005074434A3 (en) 2004-01-15 2004-10-13 Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
US11022290 US20100005531A1 (en) 2004-12-23 2004-12-23 Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US11/022,290 2004-12-23

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP20050780007 EP1709536A2 (en) 2004-01-15 2005-01-14 Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
CA 2553780 CA2553780A1 (en) 2004-01-15 2005-01-14 Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
JP2006549677A JP2007524161A (en) 2004-01-15 2005-01-14 Virus, isolated multiplex multidimensional process in virtual processing space having spyware and hacker protection features

Publications (2)

Publication Number Publication Date
WO2005116804A2 true WO2005116804A2 (en) 2005-12-08
WO2005116804A3 true true WO2005116804A3 (en) 2006-04-20

Family

ID=35451524

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/001484 WO2005116804A3 (en) 2001-05-17 2005-01-14 Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features

Country Status (4)

Country Link
EP (1) EP1709536A2 (en)
JP (1) JP2007524161A (en)
CA (1) CA2553780A1 (en)
WO (1) WO2005116804A3 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850566B2 (en) 2004-07-13 2014-09-30 Sonicwall, Inc. Time zero detection of infectious messages
US8955136B2 (en) 2004-07-13 2015-02-10 Sonicwall, Inc. Analyzing traffic patterns to detect infectious messages
US9436822B2 (en) 2009-06-30 2016-09-06 George Mason Research Foundation, Inc. Virtual browsing environment
US9519779B2 (en) 2011-12-02 2016-12-13 Invincea, Inc. Methods and apparatus for control and detection of malicious content using a sandbox environment
US9602524B2 (en) 2008-09-12 2017-03-21 George Mason Research Foundation, Inc. Methods and apparatus for application isolation

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8024815B2 (en) 2006-09-15 2011-09-20 Microsoft Corporation Isolation environment-based information access
US8856782B2 (en) 2007-03-01 2014-10-07 George Mason Research Foundation, Inc. On-demand disposable virtual work system
US9594900B2 (en) 2008-12-09 2017-03-14 Microsoft Technology Licensing, Llc Isolating applications hosted by plug-in code
US8789170B2 (en) 2010-09-24 2014-07-22 Intel Corporation Method for enforcing resource access control in computer systems

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US20030105973A1 (en) * 2001-12-04 2003-06-05 Trend Micro Incorporated Virus epidemic outbreak command system and method using early warning monitors in a network environment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3194900B2 (en) * 1997-11-13 2001-08-06 ▲ゆい▼ 徳 呉 Memory management method of a computer with a hard disk drive
JP2002268828A (en) * 2001-03-05 2002-09-20 志勇 ▲頼▼ Device for protecting and restoring hard disk data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US20030105973A1 (en) * 2001-12-04 2003-06-05 Trend Micro Incorporated Virus epidemic outbreak command system and method using early warning monitors in a network environment

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850566B2 (en) 2004-07-13 2014-09-30 Sonicwall, Inc. Time zero detection of infectious messages
US8955136B2 (en) 2004-07-13 2015-02-10 Sonicwall, Inc. Analyzing traffic patterns to detect infectious messages
US9154511B1 (en) 2004-07-13 2015-10-06 Dell Software Inc. Time zero detection of infectious messages
US9237163B2 (en) 2004-07-13 2016-01-12 Dell Software Inc. Managing infectious forwarded messages
US9325724B2 (en) 2004-07-13 2016-04-26 Dell Software Inc. Time zero classification of messages
US9516047B2 (en) 2004-07-13 2016-12-06 Dell Software Inc. Time zero classification of messages
US9602524B2 (en) 2008-09-12 2017-03-21 George Mason Research Foundation, Inc. Methods and apparatus for application isolation
US9436822B2 (en) 2009-06-30 2016-09-06 George Mason Research Foundation, Inc. Virtual browsing environment
US9519779B2 (en) 2011-12-02 2016-12-13 Invincea, Inc. Methods and apparatus for control and detection of malicious content using a sandbox environment

Also Published As

Publication number Publication date Type
EP1709536A2 (en) 2006-10-11 application
JP2007524161A (en) 2007-08-23 application
CA2553780A1 (en) 2005-12-08 application
WO2005116804A2 (en) 2005-12-08 application

Similar Documents

Publication Publication Date Title
Garfinkel et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments.
Chen et al. Non-Control-Data Attacks Are Realistic Threats.
Chen et al. When virtual is better than real [operating system relocation to virtual machines]
Egele et al. A survey on automated dynamic malware-analysis techniques and tools
Hoglund et al. Rootkits: subverting the Windows kernel
Liang et al. HookFinder: Identifying and understanding malware hooking behaviors
Xu et al. Controlled-channel attacks: Deterministic side channels for untrusted operating systems
US7987497B1 (en) Systems and methods for data encryption using plugins within virtual systems and subsystems
US20130097355A1 (en) System and method for kernel rootkit protection in a hypervisor environment
Hicks et al. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
US20090307705A1 (en) Secure multi-purpose computing client
Kolbitsch et al. Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
McGregor et al. A processor architecture defense against buffer overflow attacks
US20150172300A1 (en) Behavioral model based malware protection system and method
US20050273631A1 (en) Cryptographic CPU architecture with random instruction masking to thwart differential power analysis
US20110202765A1 (en) Securely move virtual machines between host servers
US20030065929A1 (en) Method and program for inhibiting attack upon a computer
US20120324236A1 (en) Trusted Snapshot Generation
US20060143311A1 (en) Direct memory access (DMA) address translation between peer-to-peer input/output (I/O) devices
Lee et al. Enlisting hardware architecture to thwart malicious code injection
Seshadri et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
US20110087899A1 (en) Firewall plus storage apparatus, method and system
Tuck et al. Hardware and binary modification support for code pointer protection from buffer overflow
US20080127114A1 (en) Framework for stealth dynamic coarse and fine-grained malware analysis
Broadwell et al. Scrash: A system for generating secure crash information

Legal Events

Date Code Title Description
AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2553780

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 176874

Country of ref document: IL

WWW Wipo information: withdrawn in national office

Country of ref document: DE

NENP Non-entry into the national phase in:

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006549677

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2005248713

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2005780007

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 1020067016384

Country of ref document: KR

ENP Entry into the national phase in:

Ref document number: 2005248713

Country of ref document: AU

Date of ref document: 20050114

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2005248713

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 200580008318.3

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2005780007

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020067016384

Country of ref document: KR