Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for containment of networked application client software by explicit human input

a networked application and client software technology, applied in the field of computer systems, can solve the problems of difficult automation of user responses by software, and much more difficult to reliably automate user responses for multiple arbitrary dialogues, so as to prevent the spread of malicious service usage attempts, reduce or eliminate the spread of malicious software

Active Publication Date: 2013-09-19
MCAFEE LLC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]The present invention provides a method and system to reduce or eliminate the spread of malicious software via means such as electronic mail or internet messaging that include data attachments. The present invention prevents the spread of such malicious service usage attempts by intercepting a service request, notifying the user of the service request, and subsequently dropping the request if the user denies the request or does not confirm the notification.
[0010]The present invention may also be used to prevent unauthorized service usage wherein the service request comes from a non-legitimate user masquerading as a legitimate user. Moreover, the system of the present invention may be used to implement service on user demand in order to contain a workstation to a specific set of services where each channel through which the workstation communicates with a host in order to access a service has been explicitly authorized by a human user. Alternatively, the present invention may be used to implement access on demand to contain a server's usage of other services to only the services that the server needs.

Problems solved by technology

The dialogues are performed with one of several techniques for gathering human input, wherein the techniques are designed so it is extremely difficult for software to automate the user's responses to a dialogue, and much more difficult to automate the user's responses reliably for multiple arbitrary dialogues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for containment of networked application client software by explicit human input
  • Method and system for containment of networked application client software by explicit human input
  • Method and system for containment of networked application client software by explicit human input

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0019]FIG. 1 illustrates a block diagram 100 in accordance to the present invention. Block diagram 100 comprises: a server host denoted 1, a data network denoted 7, a workstation host denoted 9, and a user denoted 21. The server host 1 further comprises server application software denoted 3 and a confirmation interceptor denoted 5. The workstation host 9 further comprises: user / client software denoted 13, automated client software denoted 17, and a confirmation agent denoted 19. The user / client software 13 and the automated client software 17 each in turn comprise a network programming interface denoted 15.

[0020]Furthermore, the server host 1 is herein defined as a computer that is running a service that may be used directly or indirectly by the user 21 via user / client software 13. The data network 7 is herein defined as an electronic medium used for communication between two or more computers, including communication between the server host 1 and the workstation host 9. The worksta...

second embodiment

[0033]FIG. 3 is a block diagram 300 in accordance to the present invention. Block diagram 300 comprises: a server host denoted 1, a data network denoted 7, a first workstation host denoted 9, a second workstation host denoted 11, and a user denoted 21. The server host 1 further comprises server application software denoted 3 and a confirmation interceptor denoted 5. The first workstation host 9 further comprises: user / client software denoted 13, and automated client software denoted 17. The second workstation host 11 further comprises a confirmation agent 23. The user / client software 13 and the automated client software 17 each in turn comprise a network programming interface denoted 15.

[0034]As shown in FIG. 3, the server host 1, the server application software 3, the confirmation interceptor 5, the user / client software 13, the automated client software 17, the network programming interface 15, and the user 21 are substantially the same as they are illustrated and described in FIG....

third embodiment

[0035]FIG. 4 is a block diagram 400 in accordance to the present invention. Block diagram 400 comprises: a server host denoted 1, a data network denoted 7, a workstation host denoted 9, a communication device denoted 27 comprising a confirmation agent, and a user denoted 21. The server host 1 further comprises server application software denoted 3 and a confirmation interceptor denoted 5. The workstation host 9 further comprises: user / client software denoted 13, and automated client software denoted 17. The user / client software 13 and the automated client software 17 each in turn comprise a network programming interface denoted 15.

[0036]As shown in FIG. 4, the server host 1, the server application software 3, the confirmation interceptor 5, the user / client software 13, the automated client software 17, the network programming interface 15, and the user 21 are substantially the same as they are illustrated and described in FIG. 1. However, whereas the confirmation interceptor 5 is sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method and system for containing networked application client software in order to perform specified transactions only given explicit consent of a legitimate user. In one embodiment, a confirmation interceptor intercepts a service request message, queries the user of the request for a confirmation, and then either passes the service request message onto server application software or drops the request, depending on the user's confirmation response. In soliciting and processing the confirmation response, query is formulated so that the required response cannot be automatically generated by software that attempts to automate and simulate the user's actions.

Description

BACKGROUND OF INVENTION[0001]1. Field of Invention[0002]The present invention relates generally to computer systems. More particularly, the present invention relates to explicit human input or confirmation for containing networked application client software.[0003]2. Related Art[0004]In a typical computer system, any software running on the system has full network access to, and the service usage of, any networked service or application that is needed directly or indirectly by users of the computer system. Furthermore, networked application client software is herein defined as software that makes use of network-accessible services by using network communication from the client host to the host(s) providing the service(s), and implementing the correct protocol for using such service(s).[0005]Today, there exist numerous techniques for automating and simulating a user in order so networked application client software would specify, request, and use the aforementioned network-accessible...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L65/403H04L67/2833H04L67/22H04L67/535H04L67/566
Inventor SHARMA, ROSENSHAH, BAKULSEBES, E. JOHN
Owner MCAFEE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products