Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-07-12
2005-07-12
Moise, Emmanuel (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C709S224000, C709S225000
Reexamination Certificate
active
06918043
ABSTRACT:
A method for selectively preventing the downloading and execution of undesired Executable Objects in a computer. The method comprises when an Executable Object is detected at a gateway, analyzing the header of the Executable Object, determining the resources of the computer that the Executable Object needs to utilize, comparing the resources of the computer that the Executable Object needs to utilize with a Security Policy and if the resources of the computer that the Executable Object needs to utilize are included in the list of the resources prohibited for use by the Security Policy, preventing the Executable Object from passing through the gateway, thereby preventing it from reaching the computer which has initiated its downloading.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5623600 (1997-04-01), Ji et al.
patent: 5960170 (1999-09-01), Chen et al.
patent: 5983348 (1999-11-01), Ji
patent: 6092194 (2000-07-01), Touboul
patent: 6098173 (2000-08-01), Elgressy et al.
patent: 6125390 (2000-09-01), Touboul
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6321334 (2001-11-01), Jerger et al.
patent: 6336140 (2002-01-01), Elgressy et al.
patent: 6345361 (2002-02-01), Jerger et al.
patent: 6449723 (2002-09-01), Elgressy et al.
patent: 2001/0049795 (2001-12-01), Elgressy et al.
patent: WO9916225 (1999-04-01), None
patent: WO9929082 (1999-06-01), None
Sharon Machlis: “Screening for Applets”, COMPUTERWORLD, vol. 31, No. 6, Feb. 10, 1997, USA, p. 51-52.
Dean, D. et al.: “Java Security: From Hot Java to Netscape and Beyond”, Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996, No. SYMP. 17, IEEE, p. 190-200.
Giuri et al, “Role-Based Access Control in Java,” May 1998, 3rdACM Workshop on Role-Based Access, p. 91-100.
Kemmerer, Richard, “Security Issues in Distributed Software,” 1997, Reliable Software Group, Department of Computer Science University of California, Santa Barbara, p. 52-59.
“Security-7 Ltd. Announces Innovative Enterprise Internet Security System,” Mar. 1997, PR Newswire, Dialog text search.
Elgressy Doron
Jospe Asher
Computer Associates Think Inc.
Cooper & Dunham LLP
Moise Emmanuel
Revak Christopher
LandOfFree
Method and system for preventing the downloading and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for preventing the downloading and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for preventing the downloading and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3369837