Peer assembly inspection

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S164000, C707S793000

Reexamination Certificate

active

07634806

ABSTRACT:
A method and system for preventing undesired behaviors by executable code modules in a peer-to-peer computer system are provided. When a code module is received, an assembly inspection module queries a blacklist for the received code module. When the received code module is found on the blacklist, the computer system prevents execution of the received code module. Each peer includes an assembly inspection module. When the received code module is not found on the blacklist, the assembly inspection module inspects the received executable code module, prior to execution, to determine whether the code module can perform any undesired behaviors. If so, the received code module is added to the blacklist and prevented from executing.

REFERENCES:
patent: 4531023 (1985-07-01), Levine
patent: 5832208 (1998-11-01), Chen et al.
patent: 5832514 (1998-11-01), Norin et al.
patent: 5960170 (1999-09-01), Chen et al.
patent: 5974549 (1999-10-01), Golan
patent: 6006328 (1999-12-01), Drake
patent: 6009456 (1999-12-01), Frew et al.
patent: 6016393 (2000-01-01), White et al.
patent: 6055562 (2000-04-01), Devarakonda et al.
patent: 6065039 (2000-05-01), Paciorek
patent: 6065040 (2000-05-01), Mima et al.
patent: 6115736 (2000-09-01), Devarakonda et al.
patent: 6134580 (2000-10-01), Tahara et al.
patent: 6163855 (2000-12-01), Shrivastava et al.
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6282563 (2001-08-01), Yamamoto et al.
patent: 6282582 (2001-08-01), Oshima et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6334146 (2001-12-01), Parasnis et al.
patent: 6505228 (2003-01-01), Schoening et al.
patent: 6530024 (2003-03-01), Proctor
patent: 6532543 (2003-03-01), Smith et al.
patent: 6775657 (2004-08-01), Baker
patent: 6792462 (2004-09-01), Bernhardt et al.
patent: 6826698 (2004-11-01), Minkin et al.
patent: 7165239 (2007-01-01), Hejlsberg et al.
patent: 2001/0034771 (2001-10-01), Hutsch et al.
patent: 2003/0023873 (2003-01-01), Ben-Itzhak
patent: 2003/0084323 (2003-05-01), Gales
patent: 2003/0172196 (2003-09-01), Hejlsberg et al.
patent: 2004/0205772 (2004-10-01), Uszok et al.
A secure platform for peer-to-peer computing in the Internet. Wooyoung Kim; Graupner, S.; Sahai, A.; System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on Jan. 7-10, 2002 pp. 3948-3957.
Brian et al (.NET Framework Security Created on 2001 and Published on May 7, 2002 by Addison-Wesley, ISBN:0-672-32184-X; pp. 1-793).
Brian et al (.NET Framework Security Created on 2001 and Published on May 7, 2002 by Addison-Wesley, ISBN:0-672-32184-X).
United Devices, Inc.™, printed from http://www.ud.com/home.htm, Apr. 24, 2002, 1 page.
Products: MetaProcessor™ platform version 2.1, printed from http://www.ud.com/products/mp—platform.htm, Apr. 24, 2002, 2 pages.
Projects: Cancer Research , printed from http://members.ud.com/projects/cancer/, Apr. 24, 2002, 1 page.
Grid computing -printed from http://searchwebservices.techtarget.com/sDefinition/0,,sid26—gci773157,00.html, May 21, 2002, 3 pages.
B. Rostamzadeh et al., “DACAPO: A Distributed Computer Architecture for Safety-Critical Control Applications”, Intelligent Vehicles '95 Symposium, Sep. 25-26, 1995, pp. 376-381.
J. Gosling, “The Feel of Java”, IEEE Computer Society, Jun. 1997, pp. 53-57.
K. Minato et al., “Multipath Allocation Control in Communication Network Using Cooperative Distributed Multi-Agent Model”, Denishi Joho Tsushin Gakkai, Nov. 1991, vol. J 74 B-1, No. 11, pp. 909-918.
L. Goldschlager, “A Universal Interconnection Pattern for Parallel Computers”, Journal of the Association for Computing Machinery, vol. 29, No. 3, Jul. 1982, pp. 1073-1086.
E. Krieger et al.,Models@Home: distributed computing in bioinformatics using a screensaver based approach, Oxford University Press, Feb. 2002, vol. 18, No. 2, pp. 315-318.
D. Liang et al., “A fault-tolerant object service on CORBA”, The Journal of Systems and Software, vol. 48, No. 3, Nov. 1999, pp. 197-211.
W. Reisig, “Distributed Algorithms: Modeling and Analysis with Petri Nets”, IEEE International Conference on Systems, Man, And Cybernetics, vol. 1, 1998, pp. 38-43.
T. Mudge, “A Computer Architecture For Parallel Processing”, University of Michigan, p. 596.
M. Portmann et al., “The Cost of Peer Discovery and Searching in the Gnutella Peer-to-peer File Sharing Protocol”, IEEE, 2001, pp. 263-268.
N. Eng et al., “An Initial Approach of a Scalable Multicast-based Pure Peer-to-Peer System”, IEEE Proceedings of the First International Conference on Peer-to-Peer Computing, Aug. 27, 2001, pp. 97-98.
A. Loo et al., “A peer-to-peer distributed selection algorithm for the Internet”, Internet Research: Electronic Networking Applications and Policy, vol. 12, No. 1, 2002, pp. 16-30.
C. J. Anumba et al., “Collaborative design of structures using intelligent agents”, Automation in Construction, 2002, pp. 89-103.
B. Boutsinas et al., “On distributing the clustering process”, Pattern Recognition Letters, vol. 23, No. 8, 2002, pp. 999-1008.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Peer assembly inspection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Peer assembly inspection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Peer assembly inspection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4139427

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.