Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2011-01-11
2011-01-11
Zand, Kambiz (Department: 2434)
Information security
Monitoring or scanning of software or data including attack...
C726S025000
Reexamination Certificate
active
07870609
ABSTRACT:
Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.
REFERENCES:
patent: 6704874 (2004-03-01), Porras et al.
patent: 7139798 (2006-11-01), Zircher et al.
patent: 7680891 (2010-03-01), Pongsajapan
patent: 2003/0191966 (2003-10-01), Gleichauf
patent: 2004/0205772 (2004-10-01), Uszok et al.
patent: 2004/0242321 (2004-12-01), Overton
patent: 2005/0050151 (2005-03-01), Mitchell et al.
patent: 2005/0050222 (2005-03-01), Packer
patent: 2005/0144067 (2005-06-01), Farahat et al.
patent: 2006/0069697 (2006-03-01), Shraim et al.
patent: 2006/0101021 (2006-05-01), Davis et al.
patent: 2006/0168048 (2006-07-01), Lyle et al.
patent: 2006/0253458 (2006-11-01), Dixon et al.
patent: 2007/0044152 (2007-02-01), Newman et al.
Casado, et al., Flow-Cookies: A Bandwidth Amplication Approach to Defend Against DDoS Flooding Attacks, available at least as early as Apr. 4, 2007, at <<http://www.stanford.edu/˜casado/flow—cookies.pdf>>, pp. 1-12.
Chen, et al., “Identifying MMORPG Bots: A Traffic Analysis Approach”, available at least as early as Apr. 4, 2007, at <<http://delivery.acm.org/10.1145/1180000/1178829/a4-chen.pdf?key1=1178829&key2=2141665711&coll=GUIDE&dl=GUIDE&CFID=19057790&CFTOKEN=87499215>>, ACM, 2006, pp. 1-9.
Dreger, et al., “Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection”, available at least as early as Apr. 4, 2007, at <<http://www8.in.tum.de/˜anja/feldmann/papers/usenix06.pdf>>, pp. 1-16.
Ramachandran, et al., “Revealing Botnet Membership Using DNSBL Counter-Intelligence”, available at least as early as Apr. 4, 2007, at <<http://www-static.cc.gatech.edu/˜feamster/publications/dnsbl.pdf>>, pp. 1-6.
Gillum Eliot C.
Hulten Geoffrey J.
Osipkov Ivan
Panasyuk Anatoliy
Scarrow John L.
Lee & Hayes PLLC
Microsoft Corporation
Powers William S
Zand Kambiz
LandOfFree
Detection and removal of undesirable items in a data... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detection and removal of undesirable items in a data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detection and removal of undesirable items in a data... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2738254