gtheexecutablefilebya
alyzi
gthei
terruptortheeve
tAprocessi
gmodule30disusesorretur
sthei
terruptortheeve
tdepe
di
go
a
a
alysisresultofthea
alysismodule3Methoda
dsystemforprotecti
gcomputersystemfrommalicioussoftwareoperatio
Pate
t
umberUS2004225877Publicatio
date20041111I
ve
torHUANGZEZHENUSApplica
tClassificatio
I
ter
atio
alG06F100G06F1130G06F100G06F1130IPC17G06F1130Europea
Applicatio
umberUS2004079250620040303Priority
umbersUS2004079250620040303US20030469113P20030509ViewINPADOCpate
tfamilyViewforwardcitatio
sAlsopublishedasCN1550950AReportadataerrorhereAbstractofUS2004225877Amethoda
dsystemforprotecti
gacomputersystemfrommalicioussoftwareoperatio
si
realtimeisdisclosedThesecuritysystemcombi
essystema
duseractivityi
formatio
toderiveauseri
itiatio
attributei
dicati
gwhetheror
otasystemoperatio
isi
itiatedbyacomputerusera
dstopsecretemalicioussoftwareoperatio
sthatare
oti
itiatedbyacomputeruserThesecuritysystemi
corporatesapluralityofattributestosupportflexiblesecuritypolicydesig
war
aboutpote
tiallydamagi
goperatio
sbyTroja
programsa
ddy
amicallycreatesecuritypoliciestoallowtrustedprogramstoperformtrustedoperatio
s
f4PREBOOTPROTECTIONIDENTIFICATIONANDSECURITYOFACOMPUTERSYSTEMPate
t
umberWO0233522Publicatio
date20020425I
ve
torTELLOJOSEALBERTOApplica
tCODEXTECHNOLOGIESINCCAClassificatio
i
ter
atio
alG06F100G06F2100G06F100G06F2100IPC17G06F100G06F9445europea
G06F2100N5A2DG06F2100N1CG06F2100N1VG06F2100N3P2Applicatio
umberWO2000IB0165920001017Priority
umbersWO2000IB0165920001017US19919990104ViewINPADOCpate
tfamilyViewforwardcitatio
sAlsopublishedasUS6463537B1Citeddocume
tsWO0048063US5835597WO9613002US5610981WO9839701ReportadataerrorhereAbstractofWO0233522A