scispace - formally typeset
Search or ask a question
Author

Curtis Evan Ide

Bio: Curtis Evan Ide is an academic researcher from University of St. Gallen. The author has contributed to research in topics: Host (network) & Vulnerability assessment. The author has an hindex of 4, co-authored 4 publications receiving 418 citations.

Papers
More filters
Patent
29 May 2001
TL;DR: In this article, the authors propose a host assessment of the workstation prior to requesting the user's credentials to provide a user with assurance that a networked computer is secure, typically before completion of the log-in operation.
Abstract: Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted Optionally, a vulnerability assessment tool may be able to repair the vulnerability of the workstation, and then allow the authentication to proceed

232 citations

Patent
11 Jul 2005
TL;DR: In this paper, the authors present methods and systems for the remote monitoring and sensing of a remote deployable, stand-alone, environmentally aware surveillance sensor device or unit that is capable of self-determining its location and orientation relative to a real world, 3D environment, detect conditions or events within the sensor's range of detection within that environment, and provide event information indicative of detected conditions and events including their location relative to the 3D real world environment.
Abstract: The present invention relates to methods and systems (100) for the remote monitoring and sensing of a remote deployable, stand-alone, environmentally aware surveillance sensor device (105) or unit that is capable of self-determining its location and orientation relative to a real world, 3D environment, detect conditions or events within the sensor's range of detection within that environment, and provide event information indicative of detected conditions or events including their location relative to the 3D real world environment as well as the raw sensor data feed to an external utilization system such as a security monitoring system. The exemplary sensor unit obtains position information from a position information source, orientation information from an orientation information source and time information, thereafter the unit processes the sensor feed to detect objects and types of objects, and provides event information or information output to an external utilization system such as a security monitoring system.

133 citations

Patent
30 Jun 2000
TL;DR: In this paper, a method and system identifies, fixes, and updates security vulnerabilities in a host computer or host computers by communicating between a scanner with plug-in capability, an operating system, and an express update package.
Abstract: A method and system identifies, fixes, and updates security vulnerabilities in a host computer or host computers The present invention can communicate between a scanner with plug-in capability, an operating system, and an express update package The architectural set-up can allow exploits within the scanner and exploits in the express update package to function with no knowledge of each other The user also needs no knowledge of whether the exploits are within the scanner or the express update package Mutual authentication procedures can enable the scanner to load only legitimate express update packages, and can provide that express update packages can only be loaded into legitimate scanners

36 citations

Patent
03 Sep 2004
TL;DR: In this paper, a method and system for the classification of an object within a zone of a specified area with multiple surveillance means is presented, which performs the steps of receiving a set of objects within a predefined zone area from each of at least a first and second surveillance means.
Abstract: A method and system for the classification of an object within a zone of a specified area with multiple surveillance means. The invention performs the steps of receiving a set of objects within a predefined zone area from each of at least a first and second surveillance means. Subsequently, each received set of objects is filtered to ensure that the objects in the set are comparable to the objects in the other received set. Characteristics of the received sets of objects are compared and characteristics of the objects within a received set of objects are compared to characteristics of the objects within a different set of received objects, wherein the characteristics are based upon a set of predetermined characteristics. It is determined if each object or set identified by the first surveillance means corresponds to an object or set identified by the second surveillance means.

17 citations


Cited by
More filters
Patent
Ray Y Lai1
18 Aug 2003
TL;DR: In this paper, the authors present a system and method for designing and implementing Web Services according to a structured methodology and design patterns, which may be used in creating end-to-end solutions based on past experience and best practices.
Abstract: System and method for designing and implementing Web Services according to a structured methodology and design patterns. Embodiments may incorporate a structured methodology, best practices and design patterns that address reliability, availability and scalability of Web Services architecture. Embodiments may provide mechanisms for integrating heterogeneous technology components into Web Services. Embodiments may provide a vendor-independent Web Services architecture framework and reusable Web Services design patterns, which may be used in creating end-to-end solutions based on past experience and best practices. Embodiments may include design patterns and best practices for delivering Web Services solutions with Quality of Services. One embodiment may provide a Business-to-Business Integration (B2Bi) integration framework for Web Services. Embodiments may provide a Web Security framework and design patterns for designing end-to-end Web Services security.

793 citations

Patent
25 Aug 2011
TL;DR: In this article, a system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets) is presented.
Abstract: This disclosure is directed to a system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets). A mobile communication device uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces an assessment for the application, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats.

533 citations

Patent
23 Feb 2011
TL;DR: In this article, a system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network and adopts corrective actions, such as generating device or network configuration data.
Abstract: A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the potential to cause an adverse effect on a mobile device or a network the mobile device may connect to. A mobile device may monitor behavioral data, apply a model to the data, and transmit a disposition to the server. The server may aggregate behavioral data or disposition information from multiple devices. The server may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, the server may enact corrective actions, such as generating device or network configuration data.

511 citations

Patent
15 Mar 2013
TL;DR: In this paper, the authors present a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer.
Abstract: Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer, determining one or more items of context information related to at least one of the user, the request, and the client computer, and determining a disposition of the request based on the reply and the one or more items of context information. The reply includes a user password and may be provided by an authorizing client device coupled to the client computer over a wireless communications link.

421 citations

Patent
08 Aug 2014
TL;DR: In this article, a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory.
Abstract: The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device.

342 citations