WO2006065882A3 - System and method for deterring rogue users from attacking protected legitimate users - Google Patents
System and method for deterring rogue users from attacking protected legitimate users Download PDFInfo
- Publication number
- WO2006065882A3 WO2006065882A3 PCT/US2005/045200 US2005045200W WO2006065882A3 WO 2006065882 A3 WO2006065882 A3 WO 2006065882A3 US 2005045200 W US2005045200 W US 2005045200W WO 2006065882 A3 WO2006065882 A3 WO 2006065882A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rogue
- rus
- users
- plu
- complying
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 4
- 230000007246 mechanism Effects 0.000 abstract 3
- 238000013515 script Methods 0.000 abstract 2
- 230000008685 targeting Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US63580204P | 2004-12-13 | 2004-12-13 | |
| US60/635,802 | 2004-12-13 | ||
| US11/302,508 US20060161989A1 (en) | 2004-12-13 | 2005-12-12 | System and method for deterring rogue users from attacking protected legitimate users |
| US11/302,508 | 2005-12-12 | ||
| US11/302,507 US7756933B2 (en) | 2004-12-13 | 2005-12-12 | System and method for deterring rogue users from attacking protected legitimate users |
| US11/302,507 | 2005-12-12 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2006065882A2 WO2006065882A2 (en) | 2006-06-22 |
| WO2006065882A3 true WO2006065882A3 (en) | 2007-11-15 |
Family
ID=36588495
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2005/045200 WO2006065882A2 (en) | 2004-12-13 | 2005-12-13 | System and method for deterring rogue users from attacking protected legitimate users |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2006065882A2 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7540021B2 (en) | 2000-04-24 | 2009-05-26 | Justin Page | System and methods for an identity theft protection bot |
| CN102722680B (en) | 2012-06-07 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and system for removing rogue programs |
| CN114089711B (en) * | 2022-01-21 | 2022-05-17 | 深圳艾灵网络有限公司 | Industrial equipment control management method, electronic equipment and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6330590B1 (en) * | 1999-01-05 | 2001-12-11 | William D. Cotten | Preventing delivery of unwanted bulk e-mail |
| US20020073338A1 (en) * | 2000-11-22 | 2002-06-13 | Compaq Information Technologies Group, L.P. | Method and system for limiting the impact of undesirable behavior of computers on a shared data network |
| US20040003283A1 (en) * | 2002-06-26 | 2004-01-01 | Goodman Joshua Theodore | Spam detector with challenges |
| US20040243844A1 (en) * | 2001-10-03 | 2004-12-02 | Reginald Adkins | Authorized email control system |
-
2005
- 2005-12-13 WO PCT/US2005/045200 patent/WO2006065882A2/en active Application Filing
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6330590B1 (en) * | 1999-01-05 | 2001-12-11 | William D. Cotten | Preventing delivery of unwanted bulk e-mail |
| US20020073338A1 (en) * | 2000-11-22 | 2002-06-13 | Compaq Information Technologies Group, L.P. | Method and system for limiting the impact of undesirable behavior of computers on a shared data network |
| US20040243844A1 (en) * | 2001-10-03 | 2004-12-02 | Reginald Adkins | Authorized email control system |
| US20040003283A1 (en) * | 2002-06-26 | 2004-01-01 | Goodman Joshua Theodore | Spam detector with challenges |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2006065882A2 (en) | 2006-06-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1708114A3 (en) | Aggregating the knowledge base of computer systems to proactively protect a computer from malware | |
| WO2007084947A3 (en) | Systems and methods for neutralizing unauthorized attempts to monitor user activity | |
| WO2006078446A3 (en) | Intrusion detection system | |
| WO2011018414A3 (en) | Physically unclonable function with tamper prevention and anti-aging system | |
| WO2004088477A3 (en) | Apparatus and method for network vulnerability detection and compliance assessment | |
| EP2198941A4 (en) | Network game system, server, unauthorized behavior prevention method, unauthorized behavior detection method, information recording medium, and program | |
| PH12015500984A1 (en) | Fire-sensor, fire detection system, fire suppression system, and combinations thereof | |
| WO2008097377A3 (en) | Systems and methods for area denial | |
| WO2004111760A3 (en) | Application layer security method and system | |
| WO2007117635A3 (en) | Malware modeling detection system and method for mobile platforms | |
| WO2007148314A3 (en) | Secure domain information protection apparatus and methods | |
| WO2008033236A3 (en) | System and methods for an identity theft protection bot | |
| EP1839046A4 (en) | ENZYMATIC ELECTROCHEMICAL DETECTION ASSAY USING PROTECTIVE MONOLAYER AND DEVICE FOR IMPLEMENTING SAID METHOD | |
| SG119237A1 (en) | An intrusion protection system and method | |
| NO20082038L (en) | Barring attacks with vehicle toys | |
| NO20052403D0 (en) | System and method for intrusion detection. | |
| WO2006065882A3 (en) | System and method for deterring rogue users from attacking protected legitimate users | |
| FR2934070B1 (en) | DEVICE AND METHOD FOR PROTECTING AN ELECTRONIC SYSTEM AGAINST UNAUTHORIZED ACCESS | |
| WO2009088823A3 (en) | Methods and systems for policy and setting administration | |
| WO2010144105A3 (en) | Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods | |
| GB2404262B (en) | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | |
| Kawanishi et al. | Using BAD for good: how best available data facilitated a precautionary policy change to improve protection of the prey of the tiger Panthera tigris in Malaysia | |
| FR2884088B1 (en) | METHOD AND CRYPTOGRAPHIC DEVICE FOR PROTECTING THE LOGIC OF PUBLIC KEYS AGAINST FAULT ATTACKS | |
| WO2008127360A3 (en) | Real time threat detection system | |
| Png | Hackers, users, information security |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 05854000 Country of ref document: EP Kind code of ref document: A2 |