Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2003-09-29
2010-11-23
Vu, Kimyen (Department: 2435)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S003000
Reexamination Certificate
active
07841007
ABSTRACT:
A unique combination of several functions achieves a system by which consumers can validate the actual security status of a website before they decide to trust it, and therefore transact with it. In one example implementation, a security system includes a scanning engine that periodically and thoroughly scans the network and connected components of an on-line service such as a website. The results are stored and perhaps reported back to the service via alerts and the like. The website includes a “bug” which visitors can click on. The visual appearance of the “bug” can be altered (e.g. made invisible) in accordance with a determined level of security for the website. By clicking on the “bug,” the visitors can also be displayed web pages showing the security status of the website. Based on their review of such web pages, visitors can then decide whether to trust the website for further transactions.
REFERENCES:
patent: 6658394 (2003-12-01), Khaishgi et al.
patent: 6721721 (2004-04-01), Bates et al.
patent: 6785732 (2004-08-01), Bates et al.
patent: 6879978 (2005-04-01), Yoshiura et al.
patent: 6895551 (2005-05-01), Huang et al.
patent: 6996845 (2006-02-01), Hurst et al.
patent: 2002/0010855 (2002-01-01), Reshef et al.
patent: 2002/0038430 (2002-03-01), Edwards et al.
patent: 2002/0104023 (2002-08-01), Hewett et al.
patent: 2002/0129161 (2002-09-01), Lloyd et al.
patent: 2003/0028803 (2003-02-01), Bunker et al.
patent: 2003/0050970 (2003-03-01), Akiyama
patent: 2003/0097591 (2003-05-01), Pham et al.
patent: 2003/0154269 (2003-08-01), Nyanchama et al.
patent: 2003/0233581 (2003-12-01), Reshef et al.
patent: 2004/0078564 (2004-04-01), Abdulhayoglu
patent: 2004/0088581 (2004-05-01), Brawn et al.
patent: 2004/0243802 (2004-12-01), Jorba
patent: WO 98/00784 (1998-01-01), None
patent: WO 03/084182 (2003-10-01), None
Guirguis, Ragi; “Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy”; GIAC Security Essentials (GSEC) Practical, Version 1.4b, Publication Data: Jun. 14th, 2003.
Tiso, John; “Automated Security Scanning”; Sys Admin, vol. 9, Issue 10, pp. 73-78, Publication: Oct. 2000.
Nessus Scan Report: retrieved from: http://web.archive.org/web/20001217231600/www.nessus.org/demo/report.txt, Publication: 2000.
Blyth, Andrew; “An XML-based architecture to perform data integration and data unification in vulnerability assessments”, Information Security Technical Report, vol. 8, Issue 4, Apr. 2003, pp. 14-25.
“Tenable Network Security,” copyright 2002-2008 Tenable Network Security, www.nessus.org
essus/.
International Search Report and Written Opinion from PCT Application No. PCT/US04/32100 mailed on Feb. 8, 2005.
Examination Report from GB Application No. GB0606095.8 mailed on Sep. 8, 2006.
Currie David
Leonard Kenneth
Tyler Benjamin
Paliwal Yogesh
ScanAlert
Vu Kimyen
Zilka-Kotab, PC
LandOfFree
Method and apparatus for real-time security verification of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for real-time security verification of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for real-time security verification of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4192777