Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2011-06-28
2011-06-28
Revak, Christopher A (Department: 2431)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S025000, C713S188000, C717S169000, C717S173000, C717S175000, C717S178000
Reexamination Certificate
active
07971257
ABSTRACT:
A method/system/computer program for obtaining the network origin of a downloaded entity of interest (e.g. a threat or malicious software). The method includes recording the network locations of at least some files downloaded to a processing system and recording the physical locations of the at least some files stored in one or more storage devices of the processing system. Then, identifying an entity of interest in the processing system and searching the recorded network locations and the recorded physical locations for the network location and the physical location of the entity of interest. Then, if the network location and the physical location of the entity of interest is identified, transmitting the network location and the physical location of the entity of interest to a remote processing system.
REFERENCES:
patent: 5050212 (1991-09-01), Dyson
patent: 5511163 (1996-04-01), Lerche et al.
patent: 5948104 (1999-09-01), Gluck et al.
patent: 5958051 (1999-09-01), Renaud et al.
patent: 6347398 (2002-02-01), Parthasarathy et al.
patent: 6516337 (2003-02-01), Tripp et al.
patent: 6633864 (2003-10-01), Christensen et al.
patent: 6721721 (2004-04-01), Bates et al.
patent: 6785732 (2004-08-01), Bates et al.
patent: 6892303 (2005-05-01), Le Pennec et al.
patent: 6952776 (2005-10-01), Chess
patent: 6973578 (2005-12-01), McIchionc
patent: 7089589 (2006-08-01), Chefalas et al.
patent: 7096215 (2006-08-01), Bates et al.
patent: 7117367 (2006-10-01), Carro
patent: 7152164 (2006-12-01), Loukas
patent: 7177937 (2007-02-01), Bates et al.
patent: 7287279 (2007-10-01), Bertman et al.
patent: 7418732 (2008-08-01), Campbell et al.
patent: 7418733 (2008-08-01), Connary et al.
patent: 7469419 (2008-12-01), Sobel
patent: 7475427 (2009-01-01), Palliyil et al.
patent: 7509680 (2009-03-01), Sallam
patent: 7526810 (2009-04-01), Lalonde et al.
patent: 7546353 (2009-06-01), Hesselink et al.
patent: 7548544 (2009-06-01), Quinlan et al.
patent: 7640590 (2009-12-01), McCorkendale et al.
patent: 7752669 (2010-07-01), Palliyil et al.
patent: 2005/0015626 (2005-01-01), Chasin
patent: 2005/0188272 (2005-08-01), Bodorin et al.
patent: 2007/0006304 (2007-01-01), Kramer et al.
patent: 2007/0016951 (2007-01-01), Piccard et al.
patent: 2007/0016953 (2007-01-01), Morris et al.
patent: 2007/0028110 (2007-02-01), Brennan
patent: 2007/0028303 (2007-02-01), Brennan
patent: 2007/0067842 (2007-03-01), Greene et al.
patent: 2007/0156727 (2007-07-01), Lim
patent: 2007/0156900 (2007-07-01), Chien
patent: 2007/0157315 (2007-07-01), Moran
patent: 2007/0174911 (2007-07-01), Kronenberg et al.
patent: 2007/0226797 (2007-09-01), Thompson et al.
patent: 2008/0225719 (2008-09-01), Korrapati et al.
patent: 11110211 (1999-04-01), None
Oliver Ian
Pereira Ryan
Repasi Rolf
Younusov Neil
Holland & Hart LLP
Kosowski Carolyn B
Revak Christopher A
Symantec Corporation
LandOfFree
Obtaining network origins of potential software threats does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Obtaining network origins of potential software threats, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Obtaining network origins of potential software threats will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2720322