Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2006-06-29
2010-10-26
Moazzami, Nasser (Department: 2436)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S022000, C726S024000, C726S025000
Reexamination Certificate
active
07823205
ABSTRACT:
A computer has protected resources presenting threat vectors that malicious software can use to attack the computer. A security module has monitoring components that monitor the protected resources to detect malicious software. The security module detects if a protected resource enters a steady security state. In response to a protected resource entering a steady state, the security module selectively disables the components that monitor the protected resource, thereby conserving the computing resources utilized by the security module and freeing the computing resources for other tasks. If the resource exits the steady security state, the security module temporarily blocks access to the resource while it enables the monitoring components for that resource.
REFERENCES:
patent: 6121962 (2000-09-01), Hwang
patent: 2005/0198522 (2005-09-01), Shaw et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2006/0236398 (2006-10-01), Trakic et al.
patent: 2007/0271611 (2007-11-01), Kwan
Carney, M. et al., “A Comparison of Methods for Implementing Adaptive Security Policies,” Proceedings of the 7thUSENIX Security Symposium, Jan. 26-29, 1998,15 pages.
“F-Secure Data Sheet: F-Secure Anti-Virus Client Security,” F-Secure Corporation, 2 pages.
“How to Use Security Zones in Internet Explorer,” 2006, Microsoft Corporation, [online] [Retrieved on Dec. 26, 2006] Retrieved from the Internet<URL:http://support.microsoft.com/kb/174360>.
“Microsoft Internet Explorer: Setting Up Security Zones,” Microsoft Corporation, Sep. 7, 2001, [online] [Retrieved on May 16, 2006] Retrieved from the Internet<URL:http://www.microsoft.com/windows/ie/ie6/using/howto/security/setup.mspx>.
Yao, T. et al., “Longhorn Network Location Awareness Service (“Longhorn” Technical Articles),” Microsoft Corporation, Jul. 2004, [online] [Retrieved on Dec. 26, 2006] Retrieved from the Internet<URL:http://msdn.microsoft.com/library/en-us/dnlong/html/lhnla.asp?frame=true>.
Isenberg Henri J.
Kennedy Mark K.
Fenwick & West LLP
Lewis Lisa
Moazzami Nasser
Symantec Corporation
LandOfFree
Conserving computing resources while providing security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Conserving computing resources while providing security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Conserving computing resources while providing security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4183822