Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2003-03-18
2009-06-09
Revak, Christopher A (Department: 2431)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S022000, C713S188000
Reexamination Certificate
active
07546638
ABSTRACT:
Malicious computer code (101) is automatically cleaned-up from a target computer (103). An operating system (109) automatically boots (201) in the computer memory (105) of the target computer (103). The booted operating system (109) automatically runs (203) a malicious code processing script (113) in the computer memory (105) of the target computer (103), under control of the booted operating system (109). The malicious code processing script (113) automatically copies (205) and runs (207) at least one malicious code clean-up script (115). At least one malicious code clean-up script (115) automatically cleans-up (209) malicious code (101) from the target computer (103).
REFERENCES:
patent: 5398196 (1995-03-01), Chambers
patent: 5452442 (1995-09-01), Kephart
patent: 5495607 (1996-02-01), Pisello et al.
patent: 5572590 (1996-11-01), Chess
patent: 5675710 (1997-10-01), Lewis
patent: 5694569 (1997-12-01), Fischer
patent: 5826012 (1998-10-01), Lettvin
patent: 5826249 (1998-10-01), Skeirik
patent: 5832208 (1998-11-01), Chen et al.
patent: 5832527 (1998-11-01), Kawaguchi
patent: 5854916 (1998-12-01), Nachenberg
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5944821 (1999-08-01), Angelo
patent: 5974549 (1999-10-01), Golan
patent: 6006242 (1999-12-01), Poole et al.
patent: 6021510 (2000-02-01), Nachenberg
patent: 6023723 (2000-02-01), McCormick et al.
patent: 6052709 (2000-04-01), Paul
patent: 6072942 (2000-06-01), Stockwell et al.
patent: 6088803 (2000-07-01), Tso et al.
patent: 6092194 (2000-07-01), Touboul
patent: 6094731 (2000-07-01), Waldin et al.
patent: 6125459 (2000-09-01), Andoh et al.
patent: 6161130 (2000-12-01), Horvitz et al.
patent: 6167434 (2000-12-01), Pang
patent: 6240530 (2001-05-01), Togawa
patent: 6249807 (2001-06-01), Shaw et al.
patent: 6253169 (2001-06-01), Apte et al.
patent: 6282565 (2001-08-01), Shaw et al.
patent: 6298351 (2001-10-01), Castelli et al.
patent: 6347310 (2002-02-01), Passera
patent: 6370526 (2002-04-01), Agrawal et al.
patent: 6385721 (2002-05-01), Puckette
patent: 6397200 (2002-05-01), Lynch et al.
patent: 6397215 (2002-05-01), Kreulen et al.
patent: 6401122 (2002-06-01), Matsui et al.
patent: 6421709 (2002-07-01), McCormick et al.
patent: 6424960 (2002-07-01), Lee et al.
patent: 6442606 (2002-08-01), Subbaroyan et al.
patent: 6456991 (2002-09-01), Srinivasa et al.
patent: 6487586 (2002-11-01), Ogilvie et al.
patent: 6493007 (2002-12-01), Pang
patent: 6502082 (2002-12-01), Toyama et al.
patent: 6505167 (2003-01-01), Horvitz et al.
patent: 6546416 (2003-04-01), Kirsch
patent: 6591376 (2003-07-01), VanRooven et al.
patent: 6640301 (2003-10-01), Ng
patent: 6654787 (2003-11-01), Aronson et al.
patent: 6671812 (2003-12-01), Balasubramaniam et al.
patent: 6687740 (2004-02-01), Gough
patent: 6697942 (2004-02-01), L'Heureux
patent: 6721721 (2004-04-01), Bates et al.
patent: 6732157 (2004-05-01), Gordon et al.
patent: 6751789 (2004-06-01), Berry et al.
patent: 6763458 (2004-07-01), Watanabe et al.
patent: 6772346 (2004-08-01), Chess et al.
patent: 6792556 (2004-09-01), Dennis
patent: 6842861 (2005-01-01), Cox et al.
patent: 6886099 (2005-04-01), Smithson et al.
patent: 6944555 (2005-09-01), Blackett et al.
patent: 6952779 (2005-10-01), Cohen et al.
patent: 6973578 (2005-12-01), McIchionc
patent: 7024403 (2006-04-01), Kyler
patent: 7216366 (2007-05-01), Raz et al.
patent: 2002/0035693 (2002-03-01), Eyres et al.
patent: 2002/0038308 (2002-03-01), Cappi
patent: 2002/0046207 (2002-04-01), Chino et al.
patent: 2002/0073046 (2002-06-01), David
patent: 2002/0073330 (2002-06-01), Chandnani et al.
patent: 2002/0087649 (2002-07-01), Horvitz
patent: 2002/0138525 (2002-09-01), Karadimitriou et al.
patent: 2002/0147694 (2002-10-01), Dempsey et al.
patent: 2002/0147782 (2002-10-01), Dimitrova et al.
patent: 2002/0166059 (2002-11-01), Rickey et al.
patent: 2002/0178375 (2002-11-01), Whittaker et al.
patent: 2002/0194488 (2002-12-01), Cormack et al.
patent: 2002/0194489 (2002-12-01), Almogy et al.
patent: 2002/0199186 (2002-12-01), Ali et al.
patent: 2002/0199194 (2002-12-01), Ali
patent: 2003/0023875 (2003-01-01), Hursey et al.
patent: 2003/0033587 (2003-02-01), Ferguson et al.
patent: 2003/0061287 (2003-03-01), Yu et al.
patent: 2003/0065926 (2003-04-01), Schultz et al.
patent: 2003/0070087 (2003-04-01), Gryaznov
patent: 2003/0110280 (2003-06-01), Hinchliffe et al.
patent: 2003/0110393 (2003-06-01), Brock et al.
patent: 2003/0110395 (2003-06-01), Presotto et al.
patent: 2003/0115458 (2003-06-01), Song
patent: 2003/0115479 (2003-06-01), Edwards et al.
patent: 2003/0154394 (2003-08-01), Levin
patent: 2003/0167402 (2003-09-01), Stolfo et al.
patent: 2003/0229672 (2003-12-01), Kohn
patent: 2003/0233352 (2003-12-01), Baker
patent: 2003/0233415 (2003-12-01), Beyda
patent: 2004/0015554 (2004-01-01), Wilson
patent: 2004/0024823 (2004-02-01), Del Monte
patent: 2004/0039921 (2004-02-01), Chuang
patent: 2004/0054887 (2004-03-01), Paulsen et al.
patent: 2004/0103310 (2004-05-01), Sobel et al.
patent: 2004/0111480 (2004-06-01), Yue
patent: 2004/0117401 (2004-06-01), Miyata et al.
patent: 2004/0117641 (2004-06-01), Kennedy et al.
patent: 2004/0153724 (2004-08-01), Nicholson et al.
patent: 2004/0153840 (2004-08-01), Buchanan et al.
patent: 2004/0205411 (2004-10-01), Hong et al.
patent: 2004/0220975 (2004-11-01), Carpentier et al.
patent: 2006/0185016 (2006-08-01), Sitze
patent: 2008/0222177 (2008-09-01), Ramer
patent: 2008/0222309 (2008-09-01), Shanbhogue
patent: 2009/0038012 (2009-02-01), Bi et al.
patent: 0636977 (1995-02-01), None
patent: 1408393 (2004-04-01), None
patent: WO 93/25024 (1993-12-01), None
patent: WO 99/15966 (1999-04-01), None
patent: WO 00/28420 (2000-05-01), None
patent: WO 02/33525 (2002-04-01), None
Carey Nachenberg, Computer Virus-Coevolution, 1997, ACM, pp. 46-51.
Crescenzo et al, Cryptographic Hashing for Virus Localization, 2006, ACM, pp. 41-48.
Wang et al, Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusion, 2007, IEEE, pp. 125-129.
Qin et al, Polymorphic Algorithm of JavaScript Code Protection, 2008, IEEE, pp. 451-454.
Burchell, Jonathan, “NetShield 1.5”, Virus Bulletin, Aug. 1994, pp. 21-23, XP 000617453.
Morar, J. E. and Chess, D. M., “Can Cryptography Prevent Computer Viruses?”, Virus Bulletin Conference 2000, Sep. 2000, pp. 127-138, Virus Bulletin Ltd., Oxfordshire, England.
Wikipedia.org web pages [online], Wikipedia, [retrieved Mar. 17, 2003] Retrieved from the Internet: <ULR: http://www.wikipedia.org/w/wiki.phintl?title=machine learning and printable=yes>.
Outlook.spambully.com web pages [online] Spam Bully [retrieved Jan. 16, 2003] Copyright 2002, Retrieved from the Internet <URL: http://outlook.spambully.com/about.php>.
“Enterprise Protection Strategy” [online] Trend Micro Inc. [retrieved Dec. 3, 2002] Retrieved from the Internet: <URL: http://www.trendmicro.com/en/products/eps/features.htm>.
“How to Test Outbreak Commander”, :Trend Micro Inc., Aug. 2002, pp. 1-13, Cupertino, CA.
Choi, Yang-Seo, et al., “A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation”, Lecture Notes in Computer Science 2288, 2002, pp. 146-159, Spinger Verlog, Berlin and Heidelsberg, Germany.
Chew, Monica and Dawn Song, “Mitigating Buffer Overflows by Operating System Randomization”, Dec. 2000, pp. 1-9, U.C. Berkeley, CA USA.
Cauce.org web pages [online ] Coalition Against Unsolicited Commercial Email [retrieved Mar. 17, 2003] Retrieved from the Internet: <URL: http://www.cauce.org/about/problem.shtml>.
Bolosky, W., Corbin, S., Goebel, D., and Douceur, J., “Single Instance Storage in Windows 2000”, Microsoft Research, Balder Technology Group, Inc., [online] [retrieved Oct. 11, 2002] Retrieved from the Internet <URL: http://research.microsoft.com/sn/farsite/wss2000.pdf<.
Bontchev, Vesselin, “Possible Macro Virus Attacks and How to Prevent Them”, Computer & Security, vol. 15, No. 7, pp. 595-626, 1996.
“Technical Resp
Anderson W. Kyle
Bonhaus Daryl
Fenwick & West LLP
Moorthy Aravind K
Revak Christopher A
Symantec Corporation
LandOfFree
Automated identification and clean-up of malicious computer... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Automated identification and clean-up of malicious computer..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated identification and clean-up of malicious computer... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4126098