Electrical computers and digital processing systems: support – Computer virus detection by cryptography
Reexamination Certificate
2007-11-27
2007-11-27
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Computer virus detection by cryptography
C726S024000
Reexamination Certificate
active
09809073
ABSTRACT:
An anti-computer virus system is used to enforce the banning of computer programs. A user is provided with a tool for creating their own banned computer program identifying data. The user-created data is then used to control the anti-virus system to identify banned computer programs and take appropriate banned computer program actions. The banned computer program identifying data can be encrypted with an organization's private PGP key such that it will only be capable of successful decryption and use upon computer systems within that organization bearing the corresponding public PGP encryption key.
REFERENCES:
patent: 4757534 (1988-07-01), Matyas et al.
patent: 5440723 (1995-08-01), Arnold et al.
patent: 5452442 (1995-09-01), Kephart
patent: 5844986 (1998-12-01), Davis
patent: 5854916 (1998-12-01), Nachenberg
patent: 5859968 (1999-01-01), Brown et al.
patent: 6052531 (2000-04-01), Waldin et al.
patent: 6216112 (2001-04-01), Fuller et al.
patent: 6292012 (2001-09-01), Yeh et al.
patent: 6577920 (2003-06-01), Hypponen et al.
patent: 6694434 (2004-02-01), McGee et al.
patent: 2001/0020245 (2001-09-01), Golds et al.
patent: 2002/0116627 (2002-08-01), Tarbotton et al.
patent: 2004/0255144 (2004-12-01), Le-Rouzo et al.
patent: 2006/0053202 (2006-03-01), Foo et al.
patent: WO 3101037 (2003-12-01), None
Hedberg, Sara. “Combating computer viruses: IBM's new computer immune system”, 1996.
Network Associates, Inc. “How PGP Works”, <http://www.pgpi.org/doc/pgpintro/>.
Simpson, Sarah. “Cryptography in Everyday Life”, 1997, <http://www.eco.utexas.edu/faculty/Norman/BUS.FOR/course.mat/SSim/life.html>.
Symantec Corporation. “Norton AntiVirus User's Guide”, 2000.
Szor, Peter. “Bad IDEA”, Apr. 1998, Virus Bulletin, pp. 18-19.
Veldman, Frans. “Heuristic Anti-Virus Technology”, 1994, <http://www.madchat.org/vxdevl/papers/avers/heuris.txt>.
Bailey, Darragh. “Re: Creating own Virus Signatures”, May 2004, <http://citadelle.intrinsec.com/mailing/current/HTML/ml—focus—virus/2672.html>.
Lavasoft. “Ad-aware”, Feb. 2001, <http://web.archive.org/web/20010207040025/http://www.lavasoft.de/aaw/aaw1.html>.
Symantec Corporation. “Norton Internet Security User's Guide”, 1999.
Wobensmith, Matt. “Why does NAV indicate a virus alert with the Flash Player?”, Feb. 2000, <http://web.archive.org/web/20000229121614/http://www.macromedia.com/support/flash/ts/documents/pwsteal.htm>.
Bidgood Andrew John Peter
Botterill Carl Steven
Lawson Tarbotton Lee Codel
Rice Trevor Hugh
Roberts Guy William Welch
Hamaty Christopher J.
McAfee, Inc.
Simitoski Michael J
Zand Kambiz
Zilka-Kotab, PC
LandOfFree
Mechanisms for banning computer programs from use does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Mechanisms for banning computer programs from use, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mechanisms for banning computer programs from use will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3825144