Obtaining network origins of potential software threats

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S025000, C713S188000, C717S169000, C717S173000, C717S175000, C717S178000

Reexamination Certificate

active

07971257

ABSTRACT:
A method/system/computer program for obtaining the network origin of a downloaded entity of interest (e.g. a threat or malicious software). The method includes recording the network locations of at least some files downloaded to a processing system and recording the physical locations of the at least some files stored in one or more storage devices of the processing system. Then, identifying an entity of interest in the processing system and searching the recorded network locations and the recorded physical locations for the network location and the physical location of the entity of interest. Then, if the network location and the physical location of the entity of interest is identified, transmitting the network location and the physical location of the entity of interest to a remote processing system.

REFERENCES:
patent: 5050212 (1991-09-01), Dyson
patent: 5511163 (1996-04-01), Lerche et al.
patent: 5948104 (1999-09-01), Gluck et al.
patent: 5958051 (1999-09-01), Renaud et al.
patent: 6347398 (2002-02-01), Parthasarathy et al.
patent: 6516337 (2003-02-01), Tripp et al.
patent: 6633864 (2003-10-01), Christensen et al.
patent: 6721721 (2004-04-01), Bates et al.
patent: 6785732 (2004-08-01), Bates et al.
patent: 6892303 (2005-05-01), Le Pennec et al.
patent: 6952776 (2005-10-01), Chess
patent: 6973578 (2005-12-01), McIchionc
patent: 7089589 (2006-08-01), Chefalas et al.
patent: 7096215 (2006-08-01), Bates et al.
patent: 7117367 (2006-10-01), Carro
patent: 7152164 (2006-12-01), Loukas
patent: 7177937 (2007-02-01), Bates et al.
patent: 7287279 (2007-10-01), Bertman et al.
patent: 7418732 (2008-08-01), Campbell et al.
patent: 7418733 (2008-08-01), Connary et al.
patent: 7469419 (2008-12-01), Sobel
patent: 7475427 (2009-01-01), Palliyil et al.
patent: 7509680 (2009-03-01), Sallam
patent: 7526810 (2009-04-01), Lalonde et al.
patent: 7546353 (2009-06-01), Hesselink et al.
patent: 7548544 (2009-06-01), Quinlan et al.
patent: 7640590 (2009-12-01), McCorkendale et al.
patent: 7752669 (2010-07-01), Palliyil et al.
patent: 2005/0015626 (2005-01-01), Chasin
patent: 2005/0188272 (2005-08-01), Bodorin et al.
patent: 2007/0006304 (2007-01-01), Kramer et al.
patent: 2007/0016951 (2007-01-01), Piccard et al.
patent: 2007/0016953 (2007-01-01), Morris et al.
patent: 2007/0028110 (2007-02-01), Brennan
patent: 2007/0028303 (2007-02-01), Brennan
patent: 2007/0067842 (2007-03-01), Greene et al.
patent: 2007/0156727 (2007-07-01), Lim
patent: 2007/0156900 (2007-07-01), Chien
patent: 2007/0157315 (2007-07-01), Moran
patent: 2007/0174911 (2007-07-01), Kronenberg et al.
patent: 2007/0226797 (2007-09-01), Thompson et al.
patent: 2008/0225719 (2008-09-01), Korrapati et al.
patent: 11110211 (1999-04-01), None

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Obtaining network origins of potential software threats does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Obtaining network origins of potential software threats, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Obtaining network origins of potential software threats will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2720322

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.