Identifying unauthorized communication systems based on their memory contents
First Claim
1. A method for identifying unauthorized client software seeking to communicate with a host communication system, comprising:
- locating a memory segment within a client communication system that stores client software used to communicate with a host communication system;
determining whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
identifying the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system.
8 Assignments
0 Petitions
Accused Products
Abstract
An authorized client communication system seeking access to a host communication system may be identified by locating a memory segment within the client communication system that stores client software used to access the host computer system. The memory segment then is examined to determine whether the client software stored in the memory segment corresponds to client software for an official client communication system. Communications from the client communication system are terminated when the client software in the memory segment is determined to diverge from software for an official client communication system.
-
Citations
83 Claims
-
1. A method for identifying unauthorized client software seeking to communicate with a host communication system, comprising:
-
locating a memory segment within a client communication system that stores client software used to communicate with a host communication system;
determining whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
identifying the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer readable medium or propagated signal having embodied thereon a computer program, that when executed by a processor, identifies unauthorized client software seeking to communicate with a host communication system, the computer program comprising:
-
a locating code segment for locating a memory segment within a client communication system that stores client software used to communicate with a host communication system;
a determining code segment for determining whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
an identifying code segment for identifying the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A communication system for identifying unauthorized client software seeking to communicate with the communication system, the communication system comprising:
-
a locator structured and arranged to locate a memory segment within a client communication system that stores client software used to communicate with the communication system;
a comparing device structured and arranged to determine whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
an identifier structured and arranged to identify the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
-
76. A method for identifying an unauthorized client communication system seeking access to a host communication system, comprising:
-
locating a memory segment within a client communication system that stores client software used to communicate with a host communication system;
determining whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
identifying the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system, wherein locating the memory segment comprises locating a memory segment of the client communication system that includes client software that is user independent in memory segments of official client communication systems.
-
-
77. A method for identifying an unauthorized client communication system seeking access to a host communication system, comprising:
-
locating a memory segment within a client communication system that stores client software used to communicate with a host communication system;
determining whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
identifying the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system, wherein locating the memory segment comprises identifying the memory segment based on a random selection among several memory segments that store the client software. - View Dependent Claims (78, 79)
-
-
80. A communication system for identifying an unauthorized client communication system seeking access to a host communication system, the communication system comprising:
-
a locator structured and arranged to locate a memory segment within a client communication system that stores client software used to communicate with the communication system;
a comparing device structured and arranged to determine whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
an identifier structured and arranged to identify the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system, wherein the locator comprises a memory segment locator structured and arranged to locate a memory segment of the client communication system that includes client software that is user independent in memory segments of official client communication systems.
-
-
81. A communication system for identifying an unauthorized client communication system seeking access to a host communication system, the communication system comprising:
-
a locator structured and arranged to locate a memory segment with a client communication system that stores client software used to communicate with the communication system;
a comparing device structured and arranged to determine whether the client software stored in the memory segment located corresponds to client software for an official client communication system; and
an identifier structured and arranged to identify the client communication system as an unauthorized client communication system when the client software stored in the memory segment located does not correspond to the client software for an official client communication system, wherein the identifier comprises a memory segment identifier structured and arranged to identify the memory segment based on a random selection among several memory segments including client software that remains unchanged. - View Dependent Claims (82, 83)
-
Specification