Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-03-07
2009-11-03
Revak, Christopher A (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S175000, C713S176000, C726S024000
Reexamination Certificate
active
07613926
ABSTRACT:
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
REFERENCES:
patent: 5077677 (1991-12-01), Murphy et al.
patent: 5359659 (1994-10-01), Rosenthal
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5485575 (1996-01-01), Chess et al.
patent: 5572643 (1996-11-01), Judson
patent: 5579509 (1996-11-01), Furtney et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5623600 (1997-04-01), Ji et al.
patent: 5638446 (1997-06-01), Rubin
patent: 5675711 (1997-10-01), Kephart et al.
patent: 5692047 (1997-11-01), McManis
patent: 5692124 (1997-11-01), Holden et al.
patent: 5720033 (1998-02-01), Deo
patent: 5724425 (1998-03-01), Chang et al.
patent: 5740248 (1998-04-01), Fieres et al.
patent: 5740441 (1998-04-01), Yellin et al.
patent: 5761421 (1998-06-01), van Hoff et al.
patent: 5765205 (1998-06-01), Breslau et al.
patent: 5784459 (1998-07-01), Devarakonda et al.
patent: 5796952 (1998-08-01), Davis et al.
patent: 5805829 (1998-09-01), Cohen et al.
patent: 5832208 (1998-11-01), Chen et al.
patent: 5832274 (1998-11-01), Cutler et al.
patent: 5850559 (1998-12-01), Angelo et al.
patent: 5859966 (1999-01-01), Hayman et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5881151 (1999-03-01), Yamamoto
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5951698 (1999-09-01), Chen et al.
patent: 5956481 (1999-09-01), Walsh et al.
patent: 5963742 (1999-10-01), Williams
patent: 5974549 (1999-10-01), Golan
patent: 5978484 (1999-11-01), Apperson et al.
patent: 5983348 (1999-11-01), Ji
patent: 5987611 (1999-11-01), Freund
patent: 6088801 (2000-07-01), Grecsek
patent: 6088803 (2000-07-01), Tso et al.
patent: 6092194 (2000-07-01), Touboul
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6339829 (2002-01-01), Beadle et al.
patent: 6425058 (2002-07-01), Arimilli et al.
patent: 6434668 (2002-08-01), Arimilli et al.
patent: 6434669 (2002-08-01), Arimilli et al.
patent: 6480962 (2002-11-01), Touboul
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6519679 (2003-02-01), Devireddy et al.
patent: 6598033 (2003-07-01), Ross et al.
patent: 6732179 (2004-05-01), Brown et al.
patent: 6804780 (2004-10-01), Touboul
patent: 6901519 (2005-05-01), Stewart et al.
patent: 6917953 (2005-07-01), Simon et al.
patent: 7058822 (2006-06-01), Edery et al.
patent: 7093135 (2006-08-01), Radatti et al.
patent: 7210041 (2007-04-01), Gryaznov et al.
patent: 7343604 (2008-03-01), Grabarnik et al.
patent: 7418731 (2008-08-01), Touboul
patent: 2004/0073811 (2004-04-01), Sanin
patent: 2004/0088425 (2004-05-01), Rubinstein et al.
patent: 2005/0172338 (2005-08-01), Sandu et al.
patent: 2006/0031207 (2006-02-01), Bjarnestam et al.
patent: 1091276 (2001-04-01), None
patent: 1132796 (2001-09-01), None
Zhong, et al., “Security in the Large: is Java's Sandbox Scalable?,”Seventh IEEE Symposium on Reliable Distributed Systems, pp. 1-6, Oct. 1998.
Rubin, et al., “Mobile Code Security,”IEEE Internet, pp. 30-34, Dec. 1998.
Schmid, et al. “Protecting Data From Malicious Software,”Proceedings of the 18thAnnual Computer Security Applications Conference, pp. 1-10, 2002.
Corradi, et al., “A Flexible Access Control Service for Java Mobile Code,”IEEE, pp. 356-365, 2000.
International Search Report for Application No. PCT/IB97/01626, 3 pp., May 14, 1998 (mailing date).
International Search Report for Application No. PCT/IL05/00915, 4 pp., dated Mar. 3, 2006.
Written Opinion for Application no. PCT/IL05/00915, 5 pp., dated Mar. 3, 2006 (mailing date).
International Search Report for Application No. PCT/IB01/01138, 4 pp., Sep. 20, 2002 (mailing date).
International Preliminary Examination Report for Application No. PCT/IB01/01138, 2 pp., dated Dec. 19, 2002.
Gerzic, Amer, “Write Your Own Regular Expression Parser,” Nov. 17, 2003, 18 pp.
Power, James, “Lexical Analysis,” 4 pp., May 14, 2006.
Sitaker, Kragen, “Rapid Genetic Evolution of Regular Expressions” [online],The Mial Archive, Apr. 24, 2004 (retrieved on Dec. 7, 2004), 5 pp.
“Lexical Analysis: DFA Minimization & Wrap Up” [online], Fall, 2004 [retrieved on Mar. 2, 2005], 8 pp.
“Minimization of DFA” [online], [retrieved on Dec. 7, 2004], 7 pp.
“Algorithm: NFS -> DFA” [online], Copyright 1999-2001 [retrieved on Dec. 7, 2004], 4 pp.
“CS 3813: Introduction to Formal Languages and Automata—State Minimization and Other Algorithms for Finite Automata,” 3 pp., May 11, 2003.
Watson, Bruce W., “Constructing Minimal Acyclic Deterministic Finite Automata,” [retrieved on Mar. 20, 2005], 38 pp.
Chang, Chia-Hsiang, “From Regular Expressions to DFA's Using Compressed NFA's,” Oct. 1992, 243 pp.
“Products,” Articles published on the Internet, “Revolutionary Security for a New Computing Paradigm” regarding SurfinGate™, 7 pp.
“Release Notes for the Microsoft ActiveX Development Kit,” Aug. 13, 1996, pp. 1-10.
Doyle, et al., “Microsoft Press Computer Dictionary,” Microsoft Press, 2d Edition, pp. 137-138, 1993.
Finjan Software Ltd., “Powerful PC Security for the New World of Java™ and Downloadables, Surfin Shield™,” Article published on the Internet by Finjan Software Ltd., 2 pp. 1996.
Finjan Sofrtware Ltd., “Finjan Announces a Personal Java™ Firewall for Web Browsers—the SurfinShield™ 1.6 (formerly known as SurfinBoard),” Press Release of Finjan Releases SurfinShield 1.6, 2 pp., Oct. 21, 1996.
Finjan Software Ltd., “Finjan Announces Major Power Boost and New Features for SurfinShield™ 2.0,” Las Vegas Convention Center/Pavillion 5 P5551, 3 pp., Nov. 18, 1996.
Finjan Software Ltd., “Finjan Software Releases SurfinBoard, Industry's First JAVA Security Product for the World Wide Web,” Article published on the Internet by Finjan Software Ltd., 1 p., Jul. 29, 1996.
Finjan Software Ltd., “Java Security: Issues & Solutions,” Article published on the Internet by Finjan Software Ltd., 8 pp. 1996.
Finjan Software Ltd., Company Profile, “Finjan—Safe Surfing, The Java Security Solutions Provider,” Article published on the Internet by Finjan Software Ltd., 3 pp., Oct. 31, 1996.
“IBM AntiVirus User's Guide, Version 2.4,”, International Business Machines Corporation, pp. 6-7, Nov. 15, 1995.
Khare, R., “Microsoft Authenticode Analyzed” [online], Jul. 22, 1996 [retrieved on Jun. 25, 2003], 2 pp.
LaDue, M., Online Business Consultant: Java Security: Whose Business is It?, Article published on the
Edery Yigal Mordechai
Kroll David R.
Touboul Shlomo
Vered Nimrod Itzhak
Finjan Software, Ltd
King & Spalding LLP
Revak Christopher A
LandOfFree
Method and system for protecting a computer and a network... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for protecting a computer and a network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for protecting a computer and a network... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4090596