[go: up one dir, main page]

GB201105997D0 - Secure Computer System - Google Patents

Secure Computer System

Info

Publication number
GB201105997D0
GB201105997D0 GBGB1105997.9A GB201105997A GB201105997D0 GB 201105997 D0 GB201105997 D0 GB 201105997D0 GB 201105997 A GB201105997 A GB 201105997A GB 201105997 D0 GB201105997 D0 GB 201105997D0
Authority
GB
United Kingdom
Prior art keywords
computer system
secure computer
secure
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1105997.9A
Other versions
GB2489936A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CYBERNIS Ltd
Original Assignee
CYBERNIS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CYBERNIS Ltd filed Critical CYBERNIS Ltd
Priority to GB1105997.9A priority Critical patent/GB2489936A/en
Publication of GB201105997D0 publication Critical patent/GB201105997D0/en
Publication of GB2489936A publication Critical patent/GB2489936A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/108Transfer of content, software, digital rights or licenses
    • G06F21/1082Backup or restore
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer And Data Communications (AREA)
GB1105997.9A 2011-04-08 2011-04-08 Preventing cyber attack damage by reloading a copy of a master copy of an operating system Withdrawn GB2489936A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1105997.9A GB2489936A (en) 2011-04-08 2011-04-08 Preventing cyber attack damage by reloading a copy of a master copy of an operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1105997.9A GB2489936A (en) 2011-04-08 2011-04-08 Preventing cyber attack damage by reloading a copy of a master copy of an operating system

Publications (2)

Publication Number Publication Date
GB201105997D0 true GB201105997D0 (en) 2011-05-18
GB2489936A GB2489936A (en) 2012-10-17

Family

ID=44072190

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1105997.9A Withdrawn GB2489936A (en) 2011-04-08 2011-04-08 Preventing cyber attack damage by reloading a copy of a master copy of an operating system

Country Status (1)

Country Link
GB (1) GB2489936A (en)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007100A1 (en) * 2007-06-28 2009-01-01 Microsoft Corporation Suspending a Running Operating System to Enable Security Scanning

Also Published As

Publication number Publication date
GB2489936A (en) 2012-10-17

Similar Documents

Publication Publication Date Title
GB2506017B (en) Blade computer system
ZA201400611B (en) Shelf-monitoring system
GB2499143B (en) Computer system
EP2549388A4 (en) Computer system
GB201105902D0 (en) Location system
EP2754080A4 (en) Computer system security dashboard
EP2681696A4 (en) Project management system
EP2719500A4 (en) Workpiece-processing system
GB201111071D0 (en) Improved docking system
GB2500948B (en) Ablutionary system
ZA201401657B (en) Pimping system
GB2495002B (en) Connection system
GB201109593D0 (en) System information cachw
PL2741811T3 (en) Symptom-treatment system
EP2700820A4 (en) Motor-securing system
GB201105103D0 (en) Securing system
GB201022056D0 (en) Computer system
GB201105997D0 (en) Secure Computer System
GB201017289D0 (en) Computer system
ZA201301374B (en) An-email system
IL210749A0 (en) Improved data entry system
EP2767950A4 (en) Autobox management system
IL216045A0 (en) Improved data systems
IL214104A0 (en) Improved data systems
IL213333A0 (en) Improved data systems

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)