Conserving computing resources while providing security

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S024000, C726S025000

Reexamination Certificate

active

07823205

ABSTRACT:
A computer has protected resources presenting threat vectors that malicious software can use to attack the computer. A security module has monitoring components that monitor the protected resources to detect malicious software. The security module detects if a protected resource enters a steady security state. In response to a protected resource entering a steady state, the security module selectively disables the components that monitor the protected resource, thereby conserving the computing resources utilized by the security module and freeing the computing resources for other tasks. If the resource exits the steady security state, the security module temporarily blocks access to the resource while it enables the monitoring components for that resource.

REFERENCES:
patent: 6121962 (2000-09-01), Hwang
patent: 2005/0198522 (2005-09-01), Shaw et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2006/0236398 (2006-10-01), Trakic et al.
patent: 2007/0271611 (2007-11-01), Kwan
Carney, M. et al., “A Comparison of Methods for Implementing Adaptive Security Policies,” Proceedings of the 7thUSENIX Security Symposium, Jan. 26-29, 1998,15 pages.
“F-Secure Data Sheet: F-Secure Anti-Virus Client Security,” F-Secure Corporation, 2 pages.
“How to Use Security Zones in Internet Explorer,” 2006, Microsoft Corporation, [online] [Retrieved on Dec. 26, 2006] Retrieved from the Internet<URL:http://support.microsoft.com/kb/174360>.
“Microsoft Internet Explorer: Setting Up Security Zones,” Microsoft Corporation, Sep. 7, 2001, [online] [Retrieved on May 16, 2006] Retrieved from the Internet<URL:http://www.microsoft.com/windows/ie/ie6/using/howto/security/setup.mspx>.
Yao, T. et al., “Longhorn Network Location Awareness Service (“Longhorn” Technical Articles),” Microsoft Corporation, Jul. 2004, [online] [Retrieved on Dec. 26, 2006] Retrieved from the Internet<URL:http://msdn.microsoft.com/library/en-us/dnlong/html/lhnla.asp?frame=true>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Conserving computing resources while providing security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Conserving computing resources while providing security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Conserving computing resources while providing security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4183822

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.