Detection and removal of undesirable items in a data...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S025000

Reexamination Certificate

active

07870609

ABSTRACT:
Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.

REFERENCES:
patent: 6704874 (2004-03-01), Porras et al.
patent: 7139798 (2006-11-01), Zircher et al.
patent: 7680891 (2010-03-01), Pongsajapan
patent: 2003/0191966 (2003-10-01), Gleichauf
patent: 2004/0205772 (2004-10-01), Uszok et al.
patent: 2004/0242321 (2004-12-01), Overton
patent: 2005/0050151 (2005-03-01), Mitchell et al.
patent: 2005/0050222 (2005-03-01), Packer
patent: 2005/0144067 (2005-06-01), Farahat et al.
patent: 2006/0069697 (2006-03-01), Shraim et al.
patent: 2006/0101021 (2006-05-01), Davis et al.
patent: 2006/0168048 (2006-07-01), Lyle et al.
patent: 2006/0253458 (2006-11-01), Dixon et al.
patent: 2007/0044152 (2007-02-01), Newman et al.
Casado, et al., Flow-Cookies: A Bandwidth Amplication Approach to Defend Against DDoS Flooding Attacks, available at least as early as Apr. 4, 2007, at <<http://www.stanford.edu/˜casado/flow—cookies.pdf>>, pp. 1-12.
Chen, et al., “Identifying MMORPG Bots: A Traffic Analysis Approach”, available at least as early as Apr. 4, 2007, at <<http://delivery.acm.org/10.1145/1180000/1178829/a4-chen.pdf?key1=1178829&key2=2141665711&coll=GUIDE&dl=GUIDE&CFID=19057790&CFTOKEN=87499215>>, ACM, 2006, pp. 1-9.
Dreger, et al., “Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection”, available at least as early as Apr. 4, 2007, at <<http://www8.in.tum.de/˜anja/feldmann/papers/usenix06.pdf>>, pp. 1-16.
Ramachandran, et al., “Revealing Botnet Membership Using DNSBL Counter-Intelligence”, available at least as early as Apr. 4, 2007, at <<http://www-static.cc.gatech.edu/˜feamster/publications/dnsbl.pdf>>, pp. 1-6.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detection and removal of undesirable items in a data... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detection and removal of undesirable items in a data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detection and removal of undesirable items in a data... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2738254

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.