WO2003021402A3 - Network security - Google Patents

Network security Download PDF

Info

Publication number
WO2003021402A3
WO2003021402A3 PCT/GB2002/004059 GB0204059W WO03021402A3 WO 2003021402 A3 WO2003021402 A3 WO 2003021402A3 GB 0204059 W GB0204059 W GB 0204059W WO 03021402 A3 WO03021402 A3 WO 03021402A3
Authority
WO
WIPO (PCT)
Prior art keywords
files
peripherals
computer
local
server computer
Prior art date
Application number
PCT/GB2002/004059
Other languages
French (fr)
Other versions
WO2003021402A2 (en
Inventor
David John Duke
Original Assignee
Cryptic Software Ltd
David John Duke
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryptic Software Ltd, David John Duke filed Critical Cryptic Software Ltd
Publication of WO2003021402A2 publication Critical patent/WO2003021402A2/en
Publication of WO2003021402A3 publication Critical patent/WO2003021402A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Abstract

A computer network comprises a server computer and a plurality of local computer. Each local computer is provided with an engine program which monitors all file and peripherals and detects changes in the files or configuration. The results f the monitoring are used to create compressed information relating to the files and peripherals which is communicated to the server computer which stores previous s information relating to the files and peripherals of the local computers. The server computer compares the received information with the stored information in order to detect the presence of altered and unwanted files or changes in configuration. In this way both known and unknown viruses can be detected as can un-authorised use of the local computers.
PCT/GB2002/004059 2001-09-05 2002-09-05 Network security WO2003021402A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0121497.2 2001-09-05
GB0121497A GB0121497D0 (en) 2001-09-05 2001-09-05 Network security

Publications (2)

Publication Number Publication Date
WO2003021402A2 WO2003021402A2 (en) 2003-03-13
WO2003021402A3 true WO2003021402A3 (en) 2004-08-19

Family

ID=9921565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2002/004059 WO2003021402A2 (en) 2001-09-05 2002-09-05 Network security

Country Status (2)

Country Link
GB (1) GB0121497D0 (en)
WO (1) WO2003021402A2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1652033A1 (en) 2003-07-08 2006-05-03 Seventh Knight Automatic regeneration of computer files description
US7634813B2 (en) 2004-07-21 2009-12-15 Microsoft Corporation Self-certifying alert
US7634812B2 (en) 2004-07-21 2009-12-15 Microsoft Corporation Filter generation
US7603715B2 (en) 2004-07-21 2009-10-13 Microsoft Corporation Containment of worms
GB0513375D0 (en) 2005-06-30 2005-08-03 Retento Ltd Computer security
US8479174B2 (en) 2006-04-05 2013-07-02 Prevx Limited Method, computer program and computer for analyzing an executable computer file
US8091127B2 (en) 2006-12-11 2012-01-03 International Business Machines Corporation Heuristic malware detection
US20120260304A1 (en) 2011-02-15 2012-10-11 Webroot Inc. Methods and apparatus for agent-based malware management
US8874579B2 (en) 2011-08-18 2014-10-28 Verisign, Inc. Systems and methods for identifying associations between malware samples
US9754117B2 (en) 2014-02-24 2017-09-05 Northcross Group Security management system
US9917811B2 (en) 2015-10-09 2018-03-13 International Business Machines Corporation Security threat identification, isolation, and repairing in a network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475625A (en) * 1991-01-16 1995-12-12 Siemens Nixdorf Informationssysteme Aktiengesellschaft Method and arrangement for monitoring computer manipulations
EP0899662A1 (en) * 1997-08-29 1999-03-03 Hewlett-Packard Company Backup and restore system for a computer network
EP0952521A2 (en) * 1998-04-23 1999-10-27 Hewlett-Packard Company Method for tracking configuration changes in networks of computer systems through historical monitoring of configuration status of devices on the network
US6094731A (en) * 1997-11-24 2000-07-25 Symantec Corporation Antivirus accelerator for computer networks
GB2350704A (en) * 1999-06-02 2000-12-06 Nicholas Peter Carter Security system
WO2002033525A2 (en) * 2000-10-17 2002-04-25 Chuang Shyne Song A method and system for detecting rogue software

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475625A (en) * 1991-01-16 1995-12-12 Siemens Nixdorf Informationssysteme Aktiengesellschaft Method and arrangement for monitoring computer manipulations
EP0899662A1 (en) * 1997-08-29 1999-03-03 Hewlett-Packard Company Backup and restore system for a computer network
US6094731A (en) * 1997-11-24 2000-07-25 Symantec Corporation Antivirus accelerator for computer networks
EP0952521A2 (en) * 1998-04-23 1999-10-27 Hewlett-Packard Company Method for tracking configuration changes in networks of computer systems through historical monitoring of configuration status of devices on the network
GB2350704A (en) * 1999-06-02 2000-12-06 Nicholas Peter Carter Security system
WO2002033525A2 (en) * 2000-10-17 2002-04-25 Chuang Shyne Song A method and system for detecting rogue software

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MCKOSKY R A ET AL: "A FILE INTEGRITY CHECKING SYSTEM TO DETECT AND RECOVER FROM PROGRAMMODIFICATION ATTACKS IN MULTI-USER COMPUTER SYSTEMS", COMPUTERS & SECURITY. INTERNATIONAL JOURNAL DEVOTED TO THE STUDY OF TECHNICAL AND FINANCIAL ASPECTS OF COMPUTER SECURITY, ELSEVIER SCIENCE PUBLISHERS. AMSTERDAM, NL, vol. 9, no. 5, 1 August 1990 (1990-08-01), pages 431 - 446, XP000147838, ISSN: 0167-4048 *
WILLIAMS R N: "DATA INTEGRITY WITH VERACITY", INTERNET, 12 September 1994 (1994-09-12), XP002096828, Retrieved from the Internet <URL:ftp://ftp.rocksoft.com/clients/rocksoft/papers/vercty10.ps> [retrieved on 19990316] *

Also Published As

Publication number Publication date
WO2003021402A2 (en) 2003-03-13
GB0121497D0 (en) 2001-10-24

Similar Documents

Publication Publication Date Title
BR0017306A (en) Method and system for managing electronic information and computer device
WO2003021402A3 (en) Network security
EP1253502A3 (en) Trusted computer system
WO2000007094A3 (en) Method and apparatus for digitally shredding similar documents within large document sets in a data processing environment
CA2604742C (en) Method for distributing computing between server and client
WO2003038673A3 (en) Information archiving software
MY147118A (en) High performance computing system and method
DE69831708D1 (en) Efficient detection of computer viruses and other data properties
WO2004051437A3 (en) System and method for providing an enterprise-based computer security policy
WO2003019412A3 (en) File backup system and method
AU2003293531A1 (en) Trusted system clock
WO2005015441A3 (en) Dynamic meta data
WO2003096225A3 (en) Information management system for context based retrieval
WO2005060389A3 (en) System and method for updating installation components in a networked environment
EP1394699A3 (en) Profiling document files
WO2004104792A3 (en) System and method for electronic document security
NO20075114L (en) Presence monitoring in a peer-to-peer system without a server
WO2003034634A3 (en) Extensible computer file format
CN103714269A (en) Virus identification method and device
Plunkett et al. Women and domestic violence: Standards for counselling practice
WO2004114528A3 (en) Method and system for operating system anti-tampering
WO2000060496A3 (en) Protocol for defining data exchange rules and formats for universal intellectual asset documents
Venema Strangers In the Night.
Amuro et al. Method of Non-Intrusively Sensing Status in a Computer Peripheral.
Roush An Alternative To Windows: The Linux Revolution. Part II

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EE ES FI GB GD GE GH GM HU ID IL IN IS JP KE KG KP KR KZ LK LR LS LT LU LV MA MD MG MK MW MX MZ NO NZ PL PT RO RU SD SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 69(1) EPC (EPO FORM 1205A DATED 21-06-2004)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP