Method and apparatus for real-time security verification of...

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000

Reexamination Certificate

active

07841007

ABSTRACT:
A unique combination of several functions achieves a system by which consumers can validate the actual security status of a website before they decide to trust it, and therefore transact with it. In one example implementation, a security system includes a scanning engine that periodically and thoroughly scans the network and connected components of an on-line service such as a website. The results are stored and perhaps reported back to the service via alerts and the like. The website includes a “bug” which visitors can click on. The visual appearance of the “bug” can be altered (e.g. made invisible) in accordance with a determined level of security for the website. By clicking on the “bug,” the visitors can also be displayed web pages showing the security status of the website. Based on their review of such web pages, visitors can then decide whether to trust the website for further transactions.

REFERENCES:
patent: 6658394 (2003-12-01), Khaishgi et al.
patent: 6721721 (2004-04-01), Bates et al.
patent: 6785732 (2004-08-01), Bates et al.
patent: 6879978 (2005-04-01), Yoshiura et al.
patent: 6895551 (2005-05-01), Huang et al.
patent: 6996845 (2006-02-01), Hurst et al.
patent: 2002/0010855 (2002-01-01), Reshef et al.
patent: 2002/0038430 (2002-03-01), Edwards et al.
patent: 2002/0104023 (2002-08-01), Hewett et al.
patent: 2002/0129161 (2002-09-01), Lloyd et al.
patent: 2003/0028803 (2003-02-01), Bunker et al.
patent: 2003/0050970 (2003-03-01), Akiyama
patent: 2003/0097591 (2003-05-01), Pham et al.
patent: 2003/0154269 (2003-08-01), Nyanchama et al.
patent: 2003/0233581 (2003-12-01), Reshef et al.
patent: 2004/0078564 (2004-04-01), Abdulhayoglu
patent: 2004/0088581 (2004-05-01), Brawn et al.
patent: 2004/0243802 (2004-12-01), Jorba
patent: WO 98/00784 (1998-01-01), None
patent: WO 03/084182 (2003-10-01), None
Guirguis, Ragi; “Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy”; GIAC Security Essentials (GSEC) Practical, Version 1.4b, Publication Data: Jun. 14th, 2003.
Tiso, John; “Automated Security Scanning”; Sys Admin, vol. 9, Issue 10, pp. 73-78, Publication: Oct. 2000.
Nessus Scan Report: retrieved from: http://web.archive.org/web/20001217231600/www.nessus.org/demo/report.txt, Publication: 2000.
Blyth, Andrew; “An XML-based architecture to perform data integration and data unification in vulnerability assessments”, Information Security Technical Report, vol. 8, Issue 4, Apr. 2003, pp. 14-25.
“Tenable Network Security,” copyright 2002-2008 Tenable Network Security, www.nessus.org
essus/.
International Search Report and Written Opinion from PCT Application No. PCT/US04/32100 mailed on Feb. 8, 2005.
Examination Report from GB Application No. GB0606095.8 mailed on Sep. 8, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for real-time security verification of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for real-time security verification of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for real-time security verification of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4192777

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.