GB2404262B - System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages - Google Patents
System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damagesInfo
- Publication number
- GB2404262B GB2404262B GB0413851A GB0413851A GB2404262B GB 2404262 B GB2404262 B GB 2404262B GB 0413851 A GB0413851 A GB 0413851A GB 0413851 A GB0413851 A GB 0413851A GB 2404262 B GB2404262 B GB 2404262B
- Authority
- GB
- United Kingdom
- Prior art keywords
- cause damages
- malicious programs
- against malicious
- steal information
- comprehensive general
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/968,022 US9213836B2 (en) | 2000-05-28 | 2004-10-20 | System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages |
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CA 2431681 CA2431681A1 (en) | 2002-10-07 | 2003-06-19 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| US10/644,841 US20040034794A1 (en) | 2000-05-28 | 2003-08-21 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| CA 2446144 CA2446144A1 (en) | 2002-11-05 | 2003-10-20 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| US55745304P | 2004-03-28 | 2004-03-28 | |
| US57914804P | 2004-06-09 | 2004-06-09 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB0413851D0 GB0413851D0 (en) | 2004-07-21 |
| GB2404262A GB2404262A (en) | 2005-01-26 |
| GB2404262B true GB2404262B (en) | 2008-03-05 |
Family
ID=32777046
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0413851A Expired - Fee Related GB2404262B (en) | 2000-05-28 | 2004-06-21 | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2404262B (en) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1745343B1 (en) | 2004-04-19 | 2017-06-07 | Lumension Security S.A. | A generic framework for runtime interception and execution control of interpreted languages |
| US7690033B2 (en) | 2004-09-28 | 2010-03-30 | Exobox Technologies Corp. | Electronic computer system secured from unauthorized access to and manipulation of data |
| US8024815B2 (en) | 2006-09-15 | 2011-09-20 | Microsoft Corporation | Isolation environment-based information access |
| CN101547113B (en) * | 2008-03-27 | 2011-10-26 | 中兴通讯股份有限公司 | System, device and method for filtering warning information |
| US10474811B2 (en) | 2012-03-30 | 2019-11-12 | Verisign, Inc. | Systems and methods for detecting malicious code |
| CN102662144B (en) * | 2012-03-30 | 2017-07-25 | 北京大学 | A hardware Trojan horse detection method based on activity measurement |
| CN105553767B (en) * | 2015-12-15 | 2018-12-25 | 北京奇虎科技有限公司 | Website backdoor file detection method and device |
| US10523694B2 (en) | 2017-05-11 | 2019-12-31 | Bitdam Ltd | System and method for interception of malicious files |
| GB201708340D0 (en) * | 2017-05-24 | 2017-07-05 | Petagene Ltd | Data processing system and method |
| CN112364395A (en) * | 2020-11-11 | 2021-02-12 | 中国信息安全测评中心 | Safety protection method and device for solid state disk |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001025926A1 (en) * | 1999-10-05 | 2001-04-12 | Ejasent Inc. | Virtual network environment |
| US20020124072A1 (en) * | 2001-02-16 | 2002-09-05 | Alexander Tormasov | Virtual computing environment |
| US20020173863A1 (en) * | 2001-04-19 | 2002-11-21 | Toyohisa Imada | Virtual machine system and virtual machine control method |
| GB2380303A (en) * | 2000-05-28 | 2003-04-02 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| GB2391650A (en) * | 2001-12-26 | 2004-02-11 | Yaron Mayer | Computer security arrangement for protection against malicious attacks |
| GB2391655A (en) * | 2002-05-28 | 2004-02-11 | Symbian Ltd | Mobile wireless device with protected file system |
| EP1399814A2 (en) * | 2000-07-17 | 2004-03-24 | Connectix Corporation | System and method for displaying current images of virtual machine environments |
-
2004
- 2004-06-21 GB GB0413851A patent/GB2404262B/en not_active Expired - Fee Related
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001025926A1 (en) * | 1999-10-05 | 2001-04-12 | Ejasent Inc. | Virtual network environment |
| GB2380303A (en) * | 2000-05-28 | 2003-04-02 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| EP1399814A2 (en) * | 2000-07-17 | 2004-03-24 | Connectix Corporation | System and method for displaying current images of virtual machine environments |
| US20020124072A1 (en) * | 2001-02-16 | 2002-09-05 | Alexander Tormasov | Virtual computing environment |
| US20020173863A1 (en) * | 2001-04-19 | 2002-11-21 | Toyohisa Imada | Virtual machine system and virtual machine control method |
| GB2391650A (en) * | 2001-12-26 | 2004-02-11 | Yaron Mayer | Computer security arrangement for protection against malicious attacks |
| GB2391655A (en) * | 2002-05-28 | 2004-02-11 | Symbian Ltd | Mobile wireless device with protected file system |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0413851D0 (en) | 2004-07-21 |
| GB2404262A (en) | 2005-01-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2391650C (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| GB2380303B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| GB2418501B (en) | Computer security system and method | |
| EP1609070A4 (en) | Security system and method for computer operating systems | |
| GB0208892D0 (en) | Computer security system and method | |
| SG119237A1 (en) | An intrusion protection system and method | |
| WO2003046700A8 (en) | Method and system for protecting data from unauthorized disclosure | |
| GB2440697B (en) | Computer security system and method | |
| EP1690363A4 (en) | Method and system for improving computer network security | |
| AU2002349217A1 (en) | Secure method and system for computer protection | |
| IL166762A0 (en) | System and method for preventing access to data ona compromised | |
| AU2003298483A1 (en) | Method and system for protecting against unauthorized modification of products | |
| EP1529368A4 (en) | Efficient encryption and authentication for data processing systems | |
| EP1685458A4 (en) | Method and system for addressing intrusion attacks on a computer system | |
| EP1614015A4 (en) | System and method for network edge data protection | |
| EP1595395A4 (en) | Method and system for copy protection | |
| TWI346898B (en) | Method and system for pupil detection for security applications | |
| AU2002326284A1 (en) | Method and device for computer memory protection against unauthorized access | |
| GB2404262B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| AU2003286458A8 (en) | System and method of protecting data | |
| AU2003280461A1 (en) | System and method for protecting data | |
| GB2402512B (en) | Security system and method | |
| GB2411748B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| WO2006053183A3 (en) | Methods and systems for securing data processing devices | |
| GB0603065D0 (en) | Systems and methods for the protection of non-encrypted biometric data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20090621 |
|
| S28 | Restoration of ceased patents (sect. 28/pat. act 1977) |
Free format text: APPLICATION FILED |
|
| S28 | Restoration of ceased patents (sect. 28/pat. act 1977) |
Free format text: RESTORATION ALLOWED Effective date: 20110328 |
|
| 732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20190328 AND 20190402 |
|
| PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20220621 |