Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2002-05-30
2009-12-15
Gergiso, Techane J (Department: 2437)
Information security
Monitoring or scanning of software or data including attack...
C713S164000, C707S793000
Reexamination Certificate
active
07634806
ABSTRACT:
A method and system for preventing undesired behaviors by executable code modules in a peer-to-peer computer system are provided. When a code module is received, an assembly inspection module queries a blacklist for the received code module. When the received code module is found on the blacklist, the computer system prevents execution of the received code module. Each peer includes an assembly inspection module. When the received code module is not found on the blacklist, the assembly inspection module inspects the received executable code module, prior to execution, to determine whether the code module can perform any undesired behaviors. If so, the received code module is added to the blacklist and prevented from executing.
REFERENCES:
patent: 4531023 (1985-07-01), Levine
patent: 5832208 (1998-11-01), Chen et al.
patent: 5832514 (1998-11-01), Norin et al.
patent: 5960170 (1999-09-01), Chen et al.
patent: 5974549 (1999-10-01), Golan
patent: 6006328 (1999-12-01), Drake
patent: 6009456 (1999-12-01), Frew et al.
patent: 6016393 (2000-01-01), White et al.
patent: 6055562 (2000-04-01), Devarakonda et al.
patent: 6065039 (2000-05-01), Paciorek
patent: 6065040 (2000-05-01), Mima et al.
patent: 6115736 (2000-09-01), Devarakonda et al.
patent: 6134580 (2000-10-01), Tahara et al.
patent: 6163855 (2000-12-01), Shrivastava et al.
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6282563 (2001-08-01), Yamamoto et al.
patent: 6282582 (2001-08-01), Oshima et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6334146 (2001-12-01), Parasnis et al.
patent: 6505228 (2003-01-01), Schoening et al.
patent: 6530024 (2003-03-01), Proctor
patent: 6532543 (2003-03-01), Smith et al.
patent: 6775657 (2004-08-01), Baker
patent: 6792462 (2004-09-01), Bernhardt et al.
patent: 6826698 (2004-11-01), Minkin et al.
patent: 7165239 (2007-01-01), Hejlsberg et al.
patent: 2001/0034771 (2001-10-01), Hutsch et al.
patent: 2003/0023873 (2003-01-01), Ben-Itzhak
patent: 2003/0084323 (2003-05-01), Gales
patent: 2003/0172196 (2003-09-01), Hejlsberg et al.
patent: 2004/0205772 (2004-10-01), Uszok et al.
A secure platform for peer-to-peer computing in the Internet. Wooyoung Kim; Graupner, S.; Sahai, A.; System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on Jan. 7-10, 2002 pp. 3948-3957.
Brian et al (.NET Framework Security Created on 2001 and Published on May 7, 2002 by Addison-Wesley, ISBN:0-672-32184-X; pp. 1-793).
Brian et al (.NET Framework Security Created on 2001 and Published on May 7, 2002 by Addison-Wesley, ISBN:0-672-32184-X).
United Devices, Inc.™, printed from http://www.ud.com/home.htm, Apr. 24, 2002, 1 page.
Products: MetaProcessor™ platform version 2.1, printed from http://www.ud.com/products/mp—platform.htm, Apr. 24, 2002, 2 pages.
Projects: Cancer Research , printed from http://members.ud.com/projects/cancer/, Apr. 24, 2002, 1 page.
Grid computing -printed from http://searchwebservices.techtarget.com/sDefinition/0,,sid26—gci773157,00.html, May 21, 2002, 3 pages.
B. Rostamzadeh et al., “DACAPO: A Distributed Computer Architecture for Safety-Critical Control Applications”, Intelligent Vehicles '95 Symposium, Sep. 25-26, 1995, pp. 376-381.
J. Gosling, “The Feel of Java”, IEEE Computer Society, Jun. 1997, pp. 53-57.
K. Minato et al., “Multipath Allocation Control in Communication Network Using Cooperative Distributed Multi-Agent Model”, Denishi Joho Tsushin Gakkai, Nov. 1991, vol. J 74 B-1, No. 11, pp. 909-918.
L. Goldschlager, “A Universal Interconnection Pattern for Parallel Computers”, Journal of the Association for Computing Machinery, vol. 29, No. 3, Jul. 1982, pp. 1073-1086.
E. Krieger et al.,Models@Home: distributed computing in bioinformatics using a screensaver based approach, Oxford University Press, Feb. 2002, vol. 18, No. 2, pp. 315-318.
D. Liang et al., “A fault-tolerant object service on CORBA”, The Journal of Systems and Software, vol. 48, No. 3, Nov. 1999, pp. 197-211.
W. Reisig, “Distributed Algorithms: Modeling and Analysis with Petri Nets”, IEEE International Conference on Systems, Man, And Cybernetics, vol. 1, 1998, pp. 38-43.
T. Mudge, “A Computer Architecture For Parallel Processing”, University of Michigan, p. 596.
M. Portmann et al., “The Cost of Peer Discovery and Searching in the Gnutella Peer-to-peer File Sharing Protocol”, IEEE, 2001, pp. 263-268.
N. Eng et al., “An Initial Approach of a Scalable Multicast-based Pure Peer-to-Peer System”, IEEE Proceedings of the First International Conference on Peer-to-Peer Computing, Aug. 27, 2001, pp. 97-98.
A. Loo et al., “A peer-to-peer distributed selection algorithm for the Internet”, Internet Research: Electronic Networking Applications and Policy, vol. 12, No. 1, 2002, pp. 16-30.
C. J. Anumba et al., “Collaborative design of structures using intelligent agents”, Automation in Construction, 2002, pp. 89-103.
B. Boutsinas et al., “On distributing the clustering process”, Pattern Recognition Letters, vol. 23, No. 8, 2002, pp. 999-1008.
Olson Erik B.
Zinda Eric K.
Gergiso Techane J
Microsoft Corporation
Workman Nydegger
LandOfFree
Peer assembly inspection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Peer assembly inspection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Peer assembly inspection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4139427