Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2009-05-26
2011-12-13
Revak, Christopher (Department: 2431)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C713S175000, C713S176000
Reexamination Certificate
active
08079086
ABSTRACT:
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “recommunicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
REFERENCES:
patent: 5077677 (1991-12-01), Murphy et al.
patent: 5359659 (1994-10-01), Rosenthal
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5485575 (1996-01-01), Chess et al.
patent: 5572643 (1996-11-01), Judson
patent: 5579509 (1996-11-01), Furtney et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5623600 (1997-04-01), Ji et al.
patent: 5638446 (1997-06-01), Rubin
patent: 5675711 (1997-10-01), Kephart et al.
patent: 5692047 (1997-11-01), McManis
patent: 5692124 (1997-11-01), Holden et al.
patent: 5720033 (1998-02-01), Deo
patent: 5724425 (1998-03-01), Chang et al.
patent: 5740248 (1998-04-01), Fieres et al.
patent: 5740441 (1998-04-01), Yellin et al.
patent: 5761421 (1998-06-01), van Hoff et al.
patent: 5765205 (1998-06-01), Breslau et al.
patent: 5784459 (1998-07-01), Devarakonda et al.
patent: 5796952 (1998-08-01), Davis et al.
patent: 5805829 (1998-09-01), Cohen et al.
patent: 5832208 (1998-11-01), Chen et al.
patent: 5832274 (1998-11-01), Cutler et al.
patent: 5850559 (1998-12-01), Angelo et al.
patent: 5859966 (1999-01-01), Hayman et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5881151 (1999-03-01), Yamamoto
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5951698 (1999-09-01), Chen et al.
patent: 5956481 (1999-09-01), Walsh et al.
patent: 5963742 (1999-10-01), Williams
patent: 5974549 (1999-10-01), Golan
patent: 5978484 (1999-11-01), Apperson et al.
patent: 5983348 (1999-11-01), Ji
patent: 5987611 (1999-11-01), Freund
patent: 6088801 (2000-07-01), Grecsek
patent: 6088803 (2000-07-01), Tso et al.
patent: 6092194 (2000-07-01), Touboul
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6339829 (2002-01-01), Beadle et al.
patent: 6425058 (2002-07-01), Arimilli et al.
patent: 6434668 (2002-08-01), Arimilli et al.
patent: 6434669 (2002-08-01), Arimilli et al.
patent: 6480962 (2002-11-01), Touboul
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6519679 (2003-02-01), Devireddy et al.
patent: 6598033 (2003-07-01), Ross et al.
patent: 6732179 (2004-05-01), Brown et al.
patent: 6804780 (2004-10-01), Touboul
patent: 6917953 (2005-07-01), Simon et al.
patent: 7058822 (2006-06-01), Edery et al.
patent: 7143444 (2006-11-01), Porras et al.
patent: 7210041 (2007-04-01), Gryaznov et al.
patent: 7308648 (2007-12-01), Buchthal et al.
patent: 7343604 (2008-03-01), Grabarnik et al.
patent: 7418731 (2008-08-01), Touboul
patent: 7613926 (2009-11-01), Edery et al.
patent: 7647633 (2010-01-01), Edery et al.
patent: 2003/0014662 (2003-01-01), Gupta et al.
patent: 2003/0101358 (2003-05-01), Porras et al.
patent: 2004/0073811 (2004-04-01), Sanin
patent: 2004/0088425 (2004-05-01), Rubinstein et al.
patent: 2005/0050338 (2005-03-01), Liang et al.
patent: 2005/0172338 (2005-08-01), Sandu et al.
patent: 2006/0031207 (2006-02-01), Bjarnestam et al.
patent: 2006/0048224 (2006-03-01), Duncan et al.
patent: 2008/0066160 (2008-03-01), Becker et al.
patent: 2010/0195909 (2010-08-01), Wasson et al.
patent: 1091276 (2001-04-01), None
patent: 1132796 (2001-09-01), None
Zhong, et al., “Security in the Large: is Java's Sandbox Scalable?,”Seventh IEEE Symposium on Reliable Distributed Systems, pp. 1-6, Oct. 1998.
Rubin, et al., “Mobile Code Security,”IEEE Internet, pp. 30-34, Dec. 1998.
Schmid, et al. “Protecting Data From Malicious Software,”Proceeding of the 18thAnnual Computer Security Applications Conference, pp. 1-10, 2002.
Corradi, et al., “A Flexible Access Control Service for Java Mobile Code,”IEEE, pp. 356-365, 2000.
International Search Report for Application No. PCT/IB97/01626, 3 pp., May 14, 1998 (mailing date).
International Search Report for Application No. PCT/IL05/00915, 4 pp., dated Mar. 3, 2006.
Written Opinion for Application No. PCT/IL05/00915, 5 pp., dated Mar. 3, 2006 (mailing date).
International Search Report for Application No. PCT/IB01/01138, 4 pp., Sep. 20, 2002 (mailing date).
International Preliminary Examination Report for Application No. PCT/IB01/01138, 2 pp., dated Dec. 19, 2002.
Gerzic, Amer, “Write Your Own Regular Expression Parser,” Nov. 17, 2003, 18 pp.
Power, James, “Lexical Analysis,” 4 pp., May 14, 2006.
Sitaker, Kragen, “Rapid Genetic Evolution of Regular Expressions” [online],The Mial Archive, Apr. 24, 2004 (retrieved on Dec. 7, 2004), 5 pp.
“Lexical Analysis: DFA Minimization & Wrap Up” [online], Fall, 2004 [retrieved on Mar. 2, 2005], 8 pp.
“Minimization of DFA” [online], [retrieved on Dec. 7, 2004], 7 pp.
“Algorithm: NFS -> DFA” [online], Copyright 1999-2001 [retrieved on Dec. 7, 2004], 4 pp.
“CS 3813: Introduction to Formal Languages and Automata—State Minimization and Other Algorithms for Finite Automata,” 3 pp., May 11, 2003.
Watson, Bruce W., “Constructing Minimal Acyclic Deterministic Finite Automata,” [retrieved on Mar. 20, 2005], 38 pp.
Chang, Chia-Hsiang, “From Regular Expressions to DFA's Using Compressed NFA's,” Oct. 1992, 243 pp.
“Products,” Articles published on the Internet, “Revolutionary Security for a New Computing Paradigm” regarding SurfinGate™, 7 pp.
“Release Notes for the Microsoft ActiveX Development Kit,” Aug. 13, 1996, activex.adsp.or.jp/inetsdk/readme.txt, pp. 1-10.
Doyle, et al., “Microsoft Press Computer Dictionary,” Microsoft Press, 2d Edition, pp. 137-138, 1993.
Finjan Software Ltd., “Powerful PC Security for the New World of Java™ and Downloadables, Surfin Shield™,” Article published on the Internet by Finjan Software Ltd., 2 pp. 1996.
Finjan Sofrtware Ltd., “Finjan Announces a Personal Java™ Firewall for Web Browsers—the SurfinShield™ 1.6 (formerly known as SurfinBoard),” Press Release of Finjan Releases SurfinShield 1.6, 2 pp., Oct. 21, 1996.
Finjan Software Ltd., “Finjan Announces Major Power Boost and New Features for SurfinShield™ 2.0,” Las Vegas Convention Center/Pavillion 5 P5551, 3 pp., Nov. 18, 1996.
Finjan Software Ltd., “Finjan Software Releases SurfinBoard, Industry's First JAVA Security Product for the World Wide Web,” Article published on the Internet by Finjan Software Ltd., 1 p., Jul. 29, 1996.
Finjan Software Ltd., “Java Security: Issues & Solutions,” Article published on the Internet by Finjan Software Ltd., 8 pp. 1996.
Finjan Software Ltd., Company Profile, “Finjan—Safe Surfing, The Java Security Solutions Provider,” Article published o
Edery Yigal Mordechai
Kroll David R
Touboul Shlomo
Vered Nimrod Itzhak
Bey Dawn-Marie
Finjan, Inc.
King & Spalding LLP
Revak Christopher
LandOfFree
Malicious mobile code runtime monitoring system and methods does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Malicious mobile code runtime monitoring system and methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Malicious mobile code runtime monitoring system and methods will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4315295