Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019045862 - OFF NODE SCANNING

Publication Number WO/2019/045862
Publication Date 07.03.2019
International Application No. PCT/US2018/039632
International Filing Date 27.06.2018
IPC
G06F 21/56 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/53 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
53by executing in a restricted environment, e.g. sandbox or secure virtual machine
CPC
G06F 21/53
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity ; ; Preventing unwanted data erasure; Buffer overflow
53by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/56
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
G06F 2221/034
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
034Test or assess a computer or a system
Applicants
  • MICROSOFT TECHNOLOGY LICENSING, LLC [US]/[US]
Inventors
  • OCHS, Rebecca Jean
  • CHINTA, Ramesh
  • SATAPATHY, Amrita
  • COOPERSTEIN, Jeffrey
  • PARTHASARATHY, Harini
  • FIELD, Scott Antony
  • ROUATBI, Mohamed
  • GONZALEZ, Julian Federico
Agents
  • MINHAS, Sandip S.
  • CHEN, Wei-Chen Nicholas
  • HINOJOSA, Brianna L.
  • HOLMES, Danielle J.
  • SWAIN, Cassandra T.
  • WONG, Thomas S.
  • CHOI, Daniel
  • HWANG, William C.
  • WIGHT, Stephen A.
  • CHATTERJEE, Aaron C.
  • JARDINE, John S.
  • GOLDSMITH, Micah P.
Priority Data
15/692,39331.08.2017US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) OFF NODE SCANNING
(FR) BALAYAGE HORS NŒUD
Abstract
(EN)
Security risks associated with scanning a computer are at least mitigated by performing the scanning off node. State data of a target node, or computer, can be acquired in various ways. The acquired state data can be subsequently employed to generate a virtual replica of the target computer or portion thereof on a second computer isolated from the target computer. The virtual replica of the target computer provides a scanner access to the data needed to perform a scan on the second computer without accessing or being able to impact the target computer.
(FR)
Selon l'invention, les risques de sécurité associés au balayage d'un ordinateur sont au moins atténués en effectuant le balayage hors nœud. Les données d'état d'un nœud cible ou d'un ordinateur peuvent être acquises de diverses manières. Les données d'état acquises peuvent ensuite être utilisées pour générer une réplique virtuelle de l'ordinateur cible ou d'une partie de celui-ci sur un second ordinateur isolé de l'ordinateur cible. La réplique virtuelle de l'ordinateur cible fournit un accès par scanneur aux données nécessaires afin d'effectuer un balayage sur le second ordinateur sans accéder à l'ordinateur cible ni avoir d’impact sur l'ordinateur cible.
Also published as
Latest bibliographic data on file with the International Bureau