Electrical computers and digital processing systems: support – Computer virus detection by cryptography
Reexamination Certificate
2011-02-22
2011-02-22
Smithers, Matthew B (Department: 2437)
Electrical computers and digital processing systems: support
Computer virus detection by cryptography
C713S187000, C726S024000, C726S025000, C726S026000
Reexamination Certificate
active
07895448
ABSTRACT:
A technique for providing computer security is provided. Providing computer security comprises providing an executable associated with a static state, determining whether the executable meets a predetermined criterion, and associating a risk level with the criterion if it is determined that the executable meets the predetermined criterion. Determining whether the executable meets a predetermined criterion does not compare the executable with a virus signature.
REFERENCES:
patent: 5278901 (1994-01-01), Shieh et al.
patent: 6357008 (2002-03-01), Nachenberg
patent: 6405318 (2002-06-01), Rowland
patent: 6711615 (2004-03-01), Porras et al.
patent: 6757685 (2004-06-01), Raffaele et al.
patent: 7003561 (2006-02-01), Magdych et al.
patent: 7017186 (2006-03-01), Day
patent: 7028338 (2006-04-01), Norris et al.
patent: 7043757 (2006-05-01), Hoefelmeyer et al.
patent: 7058978 (2006-06-01), Feuerstein et al.
patent: 7065789 (2006-06-01), Neyman et al.
patent: 7073198 (2006-07-01), Flowers et al.
patent: 7076802 (2006-07-01), Poisner
patent: 7079028 (2006-07-01), Herrmann et al.
patent: 7093288 (2006-08-01), Hydrie et al.
patent: 7096503 (2006-08-01), Magdych et al.
patent: 7117531 (2006-10-01), Fukasawa
patent: 7120934 (2006-10-01), Ishikawa
patent: 7124438 (2006-10-01), Judge et al.
patent: 7134142 (2006-11-01), Smith
patent: 7134143 (2006-11-01), Stellenberg et al.
patent: 7143442 (2006-11-01), Scarfe et al.
patent: 7146305 (2006-12-01), van der Made
patent: 7155741 (2006-12-01), Sobel et al.
patent: 7155742 (2006-12-01), Szor
patent: 7158024 (2007-01-01), Chung et al.
patent: 7162741 (2007-01-01), Eskin et al.
patent: 7162742 (2007-01-01), Flowers et al.
patent: 7171689 (2007-01-01), Beavers
patent: 7174566 (2007-02-01), Yadav
patent: 7181769 (2007-02-01), Keanini et al.
patent: 7185368 (2007-02-01), Copeland, III
patent: 7210040 (2007-04-01), Jordan
patent: 2002/0083343 (2002-06-01), Crosbie et al.
patent: 2002/0188864 (2002-12-01), Jackson
patent: 2003/0065926 (2003-04-01), Schultz et al.
patent: 2003/0105976 (2003-06-01), Copeland, III
patent: 2003/0172291 (2003-09-01), Judge et al.
patent: 2003/0172294 (2003-09-01), Judge
patent: 2003/0188189 (2003-10-01), Desai et al.
patent: 2003/0212910 (2003-11-01), Rowland et al.
patent: 2004/0139353 (2004-07-01), Forcade
patent: 2004/0143749 (2004-07-01), Tajalli et al.
patent: 2005/0071813 (2005-03-01), Reimer et al.
patent: 2005/0108562 (2005-05-01), Khazan et al.
patent: 2007/0043957 (2007-02-01), Benoit et al.
Ko et al., “Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring”, Proceedings of the 10th Annual Computer Security Applications Conference, Orlando, Florida, 1994 pp. 134-144.
Callahan Paul
Hunton & Williams LLP
Smithers Matthew B
Symantec Corporation
LandOfFree
Risk profiling does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Risk profiling, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Risk profiling will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2641738