Electrical computers and digital processing systems: support – Computer virus detection by cryptography
Reexamination Certificate
2011-04-26
2011-04-26
Orgad, Edan (Department: 2439)
Electrical computers and digital processing systems: support
Computer virus detection by cryptography
C726S002000, C726S003000, C726S014000, C726S022000, C726S023000, C726S024000, C726S025000, C713S164000
Reexamination Certificate
active
07934103
ABSTRACT:
A system and method for detecting and countering malicious code in an enterprise network are provided. A pattern recognition processor monitors local operations on a plurality of local machines connected through an enterprise network, to detect irregular local behavior patterns. An alert may be generated after an irregularity in behavior pattern on a local machine is detected. Irregular behavior alerts from a plurality of local machines are analyzed. If similar alerts are received from at least a threshold number of local machines over a corresponding period of time, one or more countermeasure operations are selected based on the analysis of the irregular behavior alerts. The selected countermeasure operations are communicated to the local machines and performed by the local machines.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6711615 (2004-03-01), Porras et al.
patent: 6714513 (2004-03-01), Joiner et al.
patent: 6789202 (2004-09-01), Ko et al.
patent: 6792546 (2004-09-01), Shanklin et al.
patent: 6892227 (2005-05-01), Elwell et al.
patent: 6910134 (2005-06-01), Maher et al.
patent: 7269851 (2007-09-01), Ackroyd
patent: 7389539 (2008-06-01), Kouznetsov
patent: 2003/0140253 (2003-07-01), Crosbie et al.
patent: 2003/0163729 (2003-08-01), Buchegger
patent: 2003/0188189 (2003-10-01), Desai et al.
patent: 2007/0234426 (2007-10-01), Khanolkar et al.
patent: 2010/0122317 (2010-05-01), Yadav
patent: WO 02/06928 (2002-01-01), None
patent: WO0206928 (2002-01-01), None
Savage, Locking The Doors—Denial of Service Attacks and Viruses, CRN 2000, n 913, p. 72.
Bassham Lawrence E. et al., Threat Assessment of Malicious Code and Human Computer Threats, (Japanese Polymer Science and (Japanese Polymer Science and Technology), Society of Polymer Science, No. 4939, Oct. 1992, pp. 1-2.
EPO Communication pursuant to Article 94(3) EPC; Ref. HCD/J00046984EP; Application No. 03 719 797.7-2413, Nov. 10, 2008.
Bassham L E et al: “Threat Assessment of Malicious Code and Human Computer Threats” Kobunshi Ronbunshu (Japanese Polymer Science and Technology), Society of Polymer Science. Tokyo, JP No. 4939, Oct. 1992, pp. 1-12, XP002952539 ISSN: 0386-2186.
Communication pursuant to Article 96(2) EPC, Application No. 03 719 797.7-2413, 4 pages, Feb. 6, 2007.
Baker & Botts L.L.P.
Computer Associates Think Inc.
Jackson Jenise E
Orgad Edan
LandOfFree
Detecting and countering malicious code in enterprise networks does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detecting and countering malicious code in enterprise networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting and countering malicious code in enterprise networks will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2624955