Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-06-06
2006-06-06
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
Reexamination Certificate
active
07058822
ABSTRACT:
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
REFERENCES:
patent: 5077677 (1991-12-01), Murphy et al.
patent: 5359659 (1994-10-01), Rosenthal
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5485575 (1996-01-01), Chess et al.
patent: 5572643 (1996-11-01), Judson
patent: 5606668 (1997-02-01), Shwed
patent: 5623600 (1997-04-01), Ji et al.
patent: 5638446 (1997-06-01), Rubin
patent: 5692047 (1997-11-01), McManis
patent: 5692124 (1997-11-01), Holden et al.
patent: 5720033 (1998-02-01), Deo
patent: 5724425 (1998-03-01), Chang et al.
patent: 5740248 (1998-04-01), Fieres et al.
patent: 5761421 (1998-06-01), van Hoff et al.
patent: 5765205 (1998-06-01), Breslau et al.
patent: 5784459 (1998-07-01), Devarakonda et al.
patent: 5796952 (1998-08-01), Davis et al.
patent: 5805829 (1998-09-01), Cohen et al.
patent: 5832208 (1998-11-01), Chen et al.
patent: 5850559 (1998-12-01), Angelo et al.
patent: 5859966 (1999-01-01), Hayman et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5951698 (1999-09-01), Chen et al.
patent: 5956481 (1999-09-01), Walsh et al.
patent: 5974549 (1999-10-01), Golan
patent: 5978484 (1999-11-01), Apperson et al.
patent: 5983348 (1999-11-01), Ji
patent: 6092194 (2000-07-01), Touboul
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6425058 (2002-07-01), Arimilli et al.
patent: 6434668 (2002-08-01), Arimilli et al.
patent: 6434669 (2002-08-01), Arimilli et al.
patent: 6480962 (2002-11-01), Touboul
patent: 6519679 (2003-02-01), Devireddy et al.
patent: 6732179 (2004-05-01), Brown et al.
Zhong et al, “Security in the large: is Java's sandbox scalable?”, Oct. 1998, Seventh IEEE Symposium on Reliable Distributed Systems, pp 1-6.
Rubin et al, “Mobile code security” Dec. 1998, IEEE Internet, pp 30-34.
Schmid et al, “Protecting data from malicious software”, 2002, Proceeding of the 18th Annual Computer Security Applications Conference, pp 1-10.
Corradi et al, “A flexible access control service for Java mobile code”, 2000, IEEE, pp 356-365.
Jim K. Omura, “Novel Applications of Cryptography in Digital Communications”, IEEE Communications Magazine, May, 1990; pp. 21-29.
Okamoto, E. et al., “ID-Based Authentication System For Computer Virus Detection”, IEEE/IEE Electronic Library online, Electronics Letters, vol. 26, Issue 15, ISSN 0013-5194, Jul. 19, 1990, Abstract and pp. 1169-1170. URL:http://iel.ihs.com:80/cgi-bin/iel—cgl?se...2ehts%26ViewTemplate%3ddocview%5fb%2ehts.
IBM AntiVirus User's Guide Version 2.4, International Business Machines Corporation, Nov. 15, 1995, p. 6-7.
Norvin Leach et al, “IE 3.0 Applets Will Earn Certification”, PC Week vol. 13, No. 29, Jul. 22, 1996, 2 pages.
“Finjan Software Releases SurfinBoard, Industry's First JAVA Security Product For the World Wide Web”, Article published on the Internet by Finjan Software Ltd., Jul. 29, 1996, 1 page.
“Powerful PC Security for the New World of Java™ and Downloadables, Surfin Shield™” Article published on the Internet by Finjan Software Ltd., 1996, 2 Pages.
Microsoft® Authenticode Technology, “Ensuring Accountability and Authenticity for Software Components on the Internet”, Microsoft Corporation, Oct. 1996, including Abstract, Contents, Introduction and pp. 1-10.
“Finjan Announces a Personal Java™ Firewall For Web Browsers—the SunfinShield™ 1.6 (formerly known as SurfinBoard)”, Press Release of Finjan Releases SurfinShield 1.6, Oct. 21, 1996, 2 pages.
Company Profile “Finjan—Safe Surfing, The Java Security Solutions Provider” Article published on the Internet by Finjan Software Ltd., Oct. 31, 1996, 3 pages.
“Finjan Announces Major Power Boost and New Features for SurfinShield™ 2.0” Las Vegas Convention Center/Pavilion 5 P5551, Nov. 18, 1996, 3 pages.
“Java Security: Issues & Solutions” Articles published on the Internet by Finjan Software Ltd., 1996, 8 pages.
“Products” Articles published on the Internet, 7 pages.
Mark LaDue, “Online Business Consultant: Java Security: Whose Business Is It?” Article published on the Internet, Home Page Press, Inc. 1996, 4 pages.
Ron Moritz, “Why We Shouldn't Fear Java.” Java Report, Feb., 1997, pp. 51-56.
Web Page Article “Frequently Asked Questions About Authenticode”, Microsoft Corporation, last updated Feb. 17, 1997, Printed Dec. 23, 1998. URL: http://www.microsoft.com/workshop/security/authcode/signfag.asp#9, pp. 1-13.
Zhang, X.N., “Secure Code Distrubtion”, IEEE/IEE Electronic Library online, Computer, vol. 30, Issue 6, Jun., 1997, pp.: 76-79.
Khare, Rohit, “Microsoft Authenticode Analyzed”, Jul. 22, 1996, 2 pages. URL: http://www.xent.com/FoRK-archive/summer96/0338.html.
“Release Notes for the Microsoft ActiveX Development Kit”, Aug. 13, 1996, 11 pages URL: http://activex.adsp.or.jp/inetsdk/readme.txt.
“Microsoft ActiveX Software Development Kit”, Aug. 12, 1996, 6 pages. URL: http://activex.adsp.or.jp/inetsdk/help.overview.htm.
Edery Yigal Mordechai
Kroll David R.
Vered Nimrod Itzhak
Finjan Software Ltd.
Squire Sanders & Dempsey L.L.P.
LandOfFree
Malicious mobile code runtime monitoring system and methods does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Malicious mobile code runtime monitoring system and methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Malicious mobile code runtime monitoring system and methods will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3710551