Electrical computers and digital processing systems: support – Multiple computer communication using cryptography
Reexamination Certificate
2006-02-16
2009-11-03
Revak, Christopher A (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
C713S151000, C713S153000, C713S180000, C713S182000, C713S188000, C726S024000
Reexamination Certificate
active
07613918
ABSTRACT:
A method for computer security, including receiving content including potentially malicious executable code (“CODE-A”), intended for downloading at a client computer, scanning CODE-A to derive a profile thereof, determining, based on the derived profile of CODE-A, an appropriate computer account from among a plurality of computer accounts, under which CODE-A may be processed by the client computer, wherein each computer account of the plurality of computer accounts has associated therewith a security context within which an executable run under such account is processed, combining (i) information about the determined computer account name and (ii) CODE-A, with executable wrapper code (“CODE-B”) into combined code (“CODE-C”), and forwarding CODE-C to the client computer for processing. A system and a computer-readable storage medium are also described and claimed.
REFERENCES:
patent: 5959717 (1999-09-01), Chaum
patent: 5974549 (1999-10-01), Golan
patent: 5983348 (1999-11-01), Ji
patent: 6018374 (2000-01-01), Wrobleski
patent: 6092194 (2000-07-01), Touboul
patent: 6118487 (2000-09-01), Hirtz et al.
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6529600 (2003-03-01), Epstein et al.
patent: 6615342 (2003-09-01), Bopardikar et al.
patent: 7272664 (2007-09-01), Arimilli et al.
patent: 2005/0198377 (2005-09-01), Ferguson et al.
patent: 2007/0288729 (2007-12-01), Erb
patent: WO 9935583 (1999-07-01), None
Kalafut et al, A Study of Malware in Peer-to-Peer Networks, 2006, ACM, pp. 327-332.
Ye et al, Trusted Paths for Browsers, 2005, ACM, pp. 153-186.
Zhang et al, An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection, 2007, IEEE, pp. 1-8.
Park et al, Component integrity check and recovery against malicious codes, 2006, IEEE, pp. 1-5.
Written Opinion for Application No. PCT/IB07/02108, dated May 5, 2008, 6 pp.
International Search Report for Application No. PCT/IB07/02108, dated May 5, 2008, 2 pp.
Finjan Software Ltd.
King & Spalding LLP
Moorthy Aravind K
Revak Christopher A
LandOfFree
System and method for enforcing a security context on a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for enforcing a security context on a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for enforcing a security context on a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4125473