METHOD AND SYSTEM FOR PROTECTING COMPUTERIZED SYSTEMS FROM MALICIOUS CODE
First Claim
1. A method for providing a computerized system which is protected from malicious programs coming from an external source, the method comprises the steps of:
- a) secretly, and in a manner unknown to authors of external programs, modifying on a temporal basis at a central security authority one or more essential elements of the operating system of the protected system in a manner which causes all running programs to fail, unless they are subjected to a compatible modification which enables them to run properly; and
b) modifying also on a temporal basis at said a central security authority each program which is known to be benign in order to comply with said modification of one or more essential elements, thereby to enable proper execution of the program, and running the modified program at the computerized system
9 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for providing a computerized system which is protected from malicious programs coming from an external source, the method comprises the steps of (a) secretly, and in a manner unknown to authors of external programs, modifying one or more essential elements at the protected system in a manner which causes all running programs to fail, unless they are subjected to a compatible modification which enables them to run properly; and (b) modifying each program at the computerized system which is known to be benign in order to comply with said modification of one or more essential elements, thereby to enable it to be executed properly.
93 Citations
18 Claims
-
1. A method for providing a computerized system which is protected from malicious programs coming from an external source, the method comprises the steps of:
-
a) secretly, and in a manner unknown to authors of external programs, modifying on a temporal basis at a central security authority one or more essential elements of the operating system of the protected system in a manner which causes all running programs to fail, unless they are subjected to a compatible modification which enables them to run properly; and b) modifying also on a temporal basis at said a central security authority each program which is known to be benign in order to comply with said modification of one or more essential elements, thereby to enable proper execution of the program, and running the modified program at the computerized system - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification