Systems and methods for detecting a security breach in a...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000, C709S225000, C726S026000

Reexamination Certificate

active

08032936

ABSTRACT:
The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected.

REFERENCES:
patent: 5345587 (1994-09-01), Fehskens et al.
patent: 5469571 (1995-11-01), Bunnell
patent: 5504814 (1996-04-01), Miyahara
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5721922 (1998-02-01), Dingwall
patent: 5903752 (1999-05-01), Dingwall et al.
patent: 5958010 (1999-09-01), Agarwal et al.
patent: 5987621 (1999-11-01), Duso et al.
patent: 5995745 (1999-11-01), Yodaiken
patent: 6061709 (2000-05-01), Bronte
patent: 6125390 (2000-09-01), Touboul
patent: 6137862 (2000-10-01), Atkinson et al.
patent: 6144739 (2000-11-01), Witt et al.
patent: 6157959 (2000-12-01), Bonham et al.
patent: 6243753 (2001-06-01), Machin et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6377994 (2002-04-01), Ault et al.
patent: 6385643 (2002-05-01), Jacobs et al.
patent: 6640242 (2003-10-01), O'Neal et al.
patent: 6658465 (2003-12-01), Touboul
patent: 7152242 (2006-12-01), Douglas
patent: 2001/0044904 (2001-11-01), Berg et al.
patent: 2002/0026505 (2002-02-01), Terry
patent: 2003/0120935 (2003-06-01), Teal et al.
patent: 2004/0025015 (2004-02-01), Satterlee et al.
patent: 2004/0078651 (2004-04-01), Safford et al.
patent: 1055990 (2000-11-01), None
patent: 9804967 (1998-02-01), None
patent: 0217048 (2002-02-01), None
Bollella, Gregory, et al., “Support for Real-time Computing Within General Purpose Operating Systems”, Proceedings of the IEEE Real-Time Technology and Applications Symposium, May 1995, pp. 4-14.
REDSonic, Inc. www.redsonic.com/en/products/RealTime.htm., pp. 1-4, Copyright 2002.
Karger, Paul A., et al., “A Retrospective on the VAX VMM Security Kernel”, IEEE Transactions on Software Engineering, Nov. 1991, pp. 1147-1165, vol. 17, No. 11.
eSecurity Planet.com “An Online Security Spotlight: Tripwire Tutorial”, www.esecurityplanet.com/prodser/article.php/3105481, Nov. 6, 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for detecting a security breach in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for detecting a security breach in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for detecting a security breach in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4262088

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.