×

System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages

  • US 20050120242A1
  • Filed: 10/20/2004
  • Published: 06/02/2005
  • Est. Priority Date: 05/28/2000
  • Status: Active Grant
First Claim
Patent Images

1. A security system for computers that does not depend on information about the specific identities of malicious programs, wherein said computers are at least one of a personal computer, a network server, a cellular phone, a palm pilot, a car computer, and/or other computerized gadget, comprising at least one of:

  • a. A system for automatic segregation between programs that is applied to at least one of the hard disks and other non-volatile storage devices;

    b. An independent device that is adapted to notice and intercept whenever the amount of data actually sent out from a computer does not fit the amount reported by at last one of;

    the Security System installed on the computer, and the communications software of the computer;

    c. A system for preventing malicious software from falsifying the user'"'"'s input;

    d. A security system wherein in an organization the Security System of the central authority and/or of the system administrator and/or a gateway computer through which the other computers access the web—

    automatically checks at least once in a while if the Security System is functioning properly on the other computers;

    e. A security system and/or firewall that prevents applications and/or drivers from accessing directly at all or at least without user permission the hardware ports of and/or the actual device drivers that physically access at least one of the communication channels and the storage devices;

    f. A security system and/or fireball that prevents applications and/or drivers from accessing without user permission also USB devices;

    g. A security system and/or firewall that prevents applications and/or drivers from accessing without user permission also at least one of Bluetooth communication devices, infra-red, and other wireless communication channels;

    h. A security system and/or firewall that prevents applications and/or drivers from accessing without user permission at least one of Fax sending functions and other TAPI functions;

    i. A security system wherein at least one general trusted area and at least one non-trusted area are enforced by creating at least two Virtual Environments (VEs), one for the trusted area and one for the non-trusted area, and enforcing the virtual sharing of resources between them, so that each VE sees only itself and the OS;

    i. A security system wherein separate VEs with virtual sharing are used to enforce better segregation between users, so that each user has at least one VE of his/her own, and/or to enforce different profiles or configurations for the same users.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×