Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2011-03-15
2011-03-15
Zand, Kambiz (Department: 2434)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S001000, C726S022000
Reexamination Certificate
active
07908659
ABSTRACT:
A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health reporting capabilities of the security health reporting system. An ISV security solution can register with the security health reporting system, create a schema that describes a new security class, and use the API to publish an instance of the schema for the new security class with the security health reporting system. When an instance of a schema for a new security class is published, the security health reporting system creates the new security class, and recognizes the definition for the security class within the security health reporting system. Registered ISV security solutions can then use the published schema to report their health statuses for the new security class.
REFERENCES:
patent: 5822580 (1998-10-01), Leung
patent: 6219793 (2001-04-01), Li et al.
patent: 6678835 (2004-01-01), Shah et al.
patent: 6907531 (2005-06-01), Dodd et al.
patent: 6983317 (2006-01-01), Bishop et al.
patent: 7426550 (2008-09-01), Abhishek et al.
patent: 7475431 (2009-01-01), Chao
patent: 7716727 (2010-05-01), Phillips et al.
patent: 2002/0138763 (2002-09-01), Delany et al.
patent: 2004/0059920 (2004-03-01), Godwin
patent: 2004/0111639 (2004-06-01), Schwartz et al.
patent: 2004/0250107 (2004-12-01), Guo
patent: 2005/0021733 (2005-01-01), Clinton
patent: 2005/0086337 (2005-04-01), Quittek
patent: 2005/0086502 (2005-04-01), Rayes
patent: 2005/0091227 (2005-04-01), McCollum
patent: 2005/0114502 (2005-05-01), Raden
patent: 2005/0131997 (2005-06-01), Lewis
patent: 2005/0138204 (2005-06-01), Iyer
patent: 2006/0085850 (2006-04-01), Mayfield
patent: 2006/0184714 (2006-08-01), Dang
patent: 2006/0212486 (2006-09-01), Kennis et al.
Bishop, Todd, “Microsoft Notebook: New player in security market,” Seattle Post-Intelligencer, Mar. 8, 2004, http://seattlepi.nwsource.com/business/163611—msftnotebook08.html, [last accessed Aug. 24, 2006].
Lytle, David P., Veronica Resendez and Dr. Robert August, “Security in the Residential Network,” SIGUCCS'05, Nov. 6-9, 2005, Monterey, California, USA, © 2005 ACM, pp. 197-201.
Read-Miller, Susan and Ruth A. Rosenthal, “Best Practices for Building a Security Operations Center,” White Paper, Apr. 2005, Computer Associates®.
Chatterjee Arindam
Coburn Doug
Gerhardt Barry
Jeffries Charles G.
Winjum Randall K.
Microsoft Corporation
Perkins Coie LLP
Powers William S
Zand Kambiz
LandOfFree
Extensible framework for system security state reporting and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Extensible framework for system security state reporting and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Extensible framework for system security state reporting and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2769554