Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique
Reexamination Certificate
2007-09-20
2010-02-16
Bragdon, Reginald G (Department: 2189)
Electrical computers and digital processing systems: memory
Storage accessing and control
Control technique
C711SE12091, C711SE12093, C711SE12096
Reexamination Certificate
active
07664924
ABSTRACT:
A system and method to securing a computer system from software viruses and other malicious code by intercepting attempts by the malicious code to write data to a storage medium. The invention intercepts the write access requests made by programs and verifies that the program is authorized to write before letting the write proceed. Authorization is determined by using the identity of the program as a query element into a database where permission values are stored. Depending on the presence or value of the permission value, write access is permitted or denied. Permission values can be set by the user, downloaded from a central server, or loaded into the central server by a group of users in order to collectively determine a permission value. The interception code can operate in kernel mode.
REFERENCES:
patent: 5410700 (1995-04-01), Fecteau et al.
patent: 5778432 (1998-07-01), Rubin et al.
patent: 5825877 (1998-10-01), Dan et al.
patent: 5974549 (1999-10-01), Golan
patent: 5991777 (1999-11-01), Momoh et al.
patent: 6308274 (2001-10-01), Swift
patent: 6370614 (2002-04-01), Teoman et al.
patent: 6434639 (2002-08-01), Haghighi
patent: 6941470 (2005-09-01), Jooste
patent: 6944772 (2005-09-01), Dozortsev
patent: 7003616 (2006-02-01), Shimura
patent: 7188215 (2007-03-01), Hooker
patent: 2002/0073072 (2002-06-01), Fukumoto
patent: 2003/0061504 (2003-03-01), Sprigg et al.
patent: 2003/0093643 (2003-05-01), Britt, Jr.
patent: 2003/0195887 (2003-10-01), Vishlitzky et al.
patent: 2005/0022011 (2005-01-01), Swander et al.
patent: 2402515 (2004-12-01), None
patent: WO 93/09498 (1993-05-01), None
Norton Internet Security 2000. Manual [online]. Symantec Corporation, 1999 [retrieved on Jan. 29, 2008]. Retrieved from the Internet: <URL:http://webpages.charter.net/cwind
is.pdf>.
FileMon. [online]. SysInternals, Aug. 27, 2005 [retrieved on Jun. 3, 2008]. Retrieved from the Internet: <URL:http://court.shrock.org/sysinternals/>.
Mamutu. [online]. EMSI software, Jun. 3, 2008 [retrieved on Jun. 3, 2008]. Retrieved from the Internet: <URL:http://www.mamutu.com/en/software/mamutu/>.
Peter Szor, The Art of Computer Virus Research and Defense, Section 11.12, Addison Wesley Professional, Feb. 3, 2005, New York, ISBN 0-321-30454-3.
Bragdon Reginald G
Drive Sentry, Inc.
Mackall Larry T
Sabety Ted
Sabety +associates, PLLC
LandOfFree
System and method to secure a computer system by selective... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method to secure a computer system by selective..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method to secure a computer system by selective... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4178680