Domain controlling systems, methods and computer program...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S011000, C726S030000

Reexamination Certificate

active

07370345

ABSTRACT:
A threat management domain controller is responsive to a computer-actionable threat management vector that includes a first computer-readable field that provides identification of at least one system type that is affected by a computer security threat, a second computer-readable field that provides identification of a release level for the system type and a third computer-readable field that provides identification of a set of possible countermeasures for a system type and release level. The threat management domain controller processes a threat management vector that is received for use by a domain of target computer systems, and transmits the threat management vector that has been processed to at least one of the target computer systems in the domain of target computer systems.

REFERENCES:
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 2001/0027389 (2001-10-01), Beverina et al.
patent: 2002/0026591 (2002-02-01), Hartley et al.
patent: 2002/0099958 (2002-07-01), Hrabik et al.
patent: 2002/0166063 (2002-11-01), Lachman, III et al.
patent: 2002/0178383 (2002-11-01), Hrabik et al.
patent: 2003/0004688 (2003-01-01), Gupta et al.
patent: 2003/0004689 (2003-01-01), Gupta et al.
patent: 2003/0009699 (2003-01-01), Gupta et al.
patent: 2316005 (2002-02-01), None
patent: WO 98/06020 (1998-02-01), None
patent: WO 00/70456 (2000-11-01), None
http://www.javvin.com
etworksecurity/ThreatVector.html, year 2007.
http://www.networkworld.com
ews/2006/013106-postini.html, year 2006.
Design and Implementation of Cross-Domain Cooperative Firewall Cheng, Jerry; Yang, Hao; Wong, Starsky H.Y.; Zerfos, Petros; Lu, Songwu; Network Protocols, 2007. ICNP 2007. IEEE International Conference on Oct. 16-19, 2007 pp. 284-293.
Configuration detection as a problem of knowledge discovery in computer networks Murayama, Y.; Cooperative Information Systems, 1997. COOPIS '97., Proceedings of the Second IFCIS International Conference on Jun. 24-27, 1997 pp. 47-55.
Security policies to mitigate insider threat in the document control domain Suranjan Pramanik; Vidyaraman Sankaranarayanan; Shambhu Upadhyaya; Computer Security Applications Conference, 2004. 20th Annual Dec. 6-10, 2004 pp. 304-313.
About the VulnXML Project, The Open Web Application Security Project, http://www.owasp.org/vulnxml/, 2001-2002, 2 pp.
Carnegie Mellon Software Engineering Institute,CERT® /CC: Computer Security Incident Response Team FAQ, http://www.cert.org/csirts/csirt—faq.html, 2002-2003, 9 pp.
Citadel Hercules Automated Vulnerability Remediation Product Brochure, Citadel Security Software Inc., 2003.
CVE Common Vulnerabilities and Exposure(CVE) —MITRE Develops Valuable Resources for Sharing Vulnerability Information, http://www.mitre.org
ews/digest/archives/2000/vulnerability—info.html, 2000, 3 pp.
Enabling Enterprise Security with CVE, http://ww.mitre.org
ews/digest/archives/2001/enterprise—security.html, 2001, 5 pp.
Ghosh et al.,Inoculating Software for Survivability, Communications of the ACM, vol. 42, No. 7, Jul. 1999, pp. 38-44.
GSA Federal Technology Service,Federal Computer Incident Response Center PADC(Patch Authentication and Dissemination Capability, Smarter Solutions, Publication No. E-COTEO-03-0002.
12Biscom,Network Security, http://www.b2biscom.it/cms/Generic.jsp?IdPage=458, 2003, 1 p.
IBM,Internet Data Center Value-Add Feature: Certifiable High-Speed RAM Web Servers, Research Disclosure, #454147, Feb. 2002, p. 313.
IBM,Remote-Controlled Write-Lock in Hard Disk(HD)Controllers, Research Disclosure, #446114, Jun. 2001, p. 1001.
/CAT Metabase Documentation, http://icat.nist.gov/icat—documentation.htm, 5pp.
/CAT Metabase: A CVE Based Vulnerability Database, http://icat.nist.gov/icat.cfm, 2000-2002, 2pp.
Martin,Managing Vulnerabilities in Your Networked Systems Using an Industry Standards Effort, NDIA Federal Database Colloquium & Exposition, Oct. 25, 2001, 2 pp., Abstract at http://www.mitre.org/work/tech—papers/tech—papers—01/martin—1vulner/index.html.
Mitre, Press Release,MITRE Announces New Standard for Computer Vulnerability Assessment, http://www.mitre.org
ews/releases/02/oval12—10—02.html, 2002, 2 pp.
Myerson,Identifying Enterprise Network Vulnerabilities, International Journal of Network Management, vol. 12, 2002, pp. 135-144.
OASIS Members Collaborate to Address Security Vulnerabilities for Web Services and Web Applications, http://www.oasis-open.org
ews/oasis—news—04—14—03a.php, Apr. 14, 2003.
OWASP,Introducing the OWASP Top Ten—Top Vulnerabilities in Web Applications, The Open Web Application Security Project, http://www.owasp.org/, 2001-2002, 2 pp.
SANS Institute,About the SANS Institute, http://www.sans.org/aboutsans.php, 2002-2003, 4 pp.
Seltzer,All the Threat Information You Want, and Then Some, eWeek, Oct. 24, 2003, eweek.com/article2/0,4149,1362688,00.asp, 2 pp.
Symantec Corporation,Symantec DeepSight Alert Service, enterprisesecurity.Symantec.com/products/products.cfm?ProductID=160, 1994-2004, 2 pp.
Symantec Corporation,Symantec™ DeepSight™ Threat Management System, enterprisesecurity.Symantec.com/content/displaypdf.cfm?pdfid=301.
Tasker et al.,CVE Continues to Grow, The Edge, Feb. 2001, http://www.mitre.org
ews/the—edge/february—01/tasker.html, 2 pp.
VulnXML Proof of Concept Vision Document, Version 1, The Open Web Application Security Project, 2002, 7 pp.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Domain controlling systems, methods and computer program... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Domain controlling systems, methods and computer program..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Domain controlling systems, methods and computer program... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2770693

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.