System and method for identifying potential security risks...

Data processing: software development – installation – and managem – Software program development tool – Testing or debugging

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S102000, C717S121000, C726S024000

Reexamination Certificate

active

07577941

ABSTRACT:
Controls of interest are indentified by determining which installed software objects associated with the application of interest exhibit certain characteristics, such as being publicly creatable, being designated as safe, and providing a security-related interface. Once the controls of interest are identified from the installed software objects, information associated with each control is obtained and stored. Each time the software program of interest is modified and re-installed, the information is updated to reflect the modifications. Additional information is also stored with the information. The information and the additional information may be provided to a browser for display and may be modified by a user to describe a present state associated with the control of interest (i.e., tested, untested).

REFERENCES:
patent: 6092194 (2000-07-01), Touboul
patent: 6151643 (2000-11-01), Cheng et al.
patent: 6298478 (2001-10-01), Nally et al.
patent: 6314565 (2001-11-01), Kenner et al.
patent: 6370569 (2002-04-01), Austin
patent: 6473800 (2002-10-01), Jerger et al.
patent: 6662217 (2003-12-01), Godfrey et al.
patent: 6691176 (2004-02-01), Narin et al.
patent: 6698013 (2004-02-01), Bertero et al.
patent: 6718549 (2004-04-01), Narin et al.
patent: 6802061 (2004-10-01), Parthasarathy et al.
patent: 2002/0107809 (2002-08-01), Biddle et al.
“A Comparison between Java and ActiveX Security”, D. Hopwood, Oct. 1997, pp. 1-9. Online retrieved at <http://www.users.zetnet.co.uk/hopwood/papers/compsec97.html>.
“Data Mining Methods for Detection of New Malicious Executables”, Eskin et al., May 2001, pp. 38-49. Online retrieved at <http://ieeexplore.ieee.org/stamp
umber=924286&isnumber=19992>.
“A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents”, Sedaghat et al., Jul. 2001, pp. 330-337. Online retrieved at <http://ieeexplore.ieee.org/stamp
umber=942281&isnumber=20395>.
Slayden, April et al., “A Web Tool For Generic Design”, The Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, Nov. 27-29, 2001, pp. 85-88.
Sami, Mohammed et al., “Test Framework for Interfaces: A Pragmatic Approach”, Proceedings of the 15th International Conference and Exposition on Testing Computer Software, Jun. 8-21, 1998, pp. 43-46.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for identifying potential security risks... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for identifying potential security risks..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for identifying potential security risks... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4072650

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.