Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2004-12-21
2009-12-29
Shiferaw, Eleni A (Department: 2436)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C713S188000, C726S023000, C726S024000
Reexamination Certificate
active
07640590
ABSTRACT:
A risk assessment module identifies information regarding a source. The risk assessment module submits the identified information regarding the source to a server. A compilation module of the server accesses one or more services to determine one or more characteristics of the source. The compilation module provides the determined one or more characteristics of the source to the client. A presentation module of the client presents the one or more characteristics of the source to a user.
REFERENCES:
patent: 5392207 (1995-02-01), Wilson et al.
patent: 5675710 (1997-10-01), Lewis
patent: 5757916 (1998-05-01), MacDoran et al.
patent: 5778304 (1998-07-01), Grube et al.
patent: 5826249 (1998-10-01), Skeirik
patent: 5887269 (1999-03-01), Brunts et al.
patent: 5930474 (1999-07-01), Dunworth et al.
patent: 5982897 (1999-11-01), Clark
patent: 6023723 (2000-02-01), McCormick et al.
patent: 6052709 (2000-04-01), Paul
patent: 6072942 (2000-06-01), Stockwell et al.
patent: 6088803 (2000-07-01), Tso et al.
patent: 6154172 (2000-11-01), Piccionelli et al.
patent: 6161130 (2000-12-01), Horvitz et al.
patent: 6167434 (2000-12-01), Pang
patent: 6182223 (2001-01-01), Rawson
patent: 6202158 (2001-03-01), Urano et al.
patent: 6249807 (2001-06-01), Shaw et al.
patent: 6253169 (2001-06-01), Apte et al.
patent: 6282565 (2001-08-01), Shaw et al.
patent: 6282660 (2001-08-01), Anne et al.
patent: 6289416 (2001-09-01), Fukushima et al.
patent: 6298351 (2001-10-01), Castelli et al.
patent: 6314409 (2001-11-01), Schneck
patent: 6324569 (2001-11-01), Ogilvie et al.
patent: 6347310 (2002-02-01), Passera
patent: 6370526 (2002-04-01), Agrawal et al.
patent: 6370629 (2002-04-01), Hastings et al.
patent: 6397200 (2002-05-01), Lynch, Jr. et al.
patent: 6397215 (2002-05-01), Kreulen et al.
patent: 6421709 (2002-07-01), McCormick et al.
patent: 6424960 (2002-07-01), Lee et al.
patent: 6442606 (2002-08-01), Subbaroyan et al.
patent: 6453419 (2002-09-01), Flint et al.
patent: 6456991 (2002-09-01), Srinivasa et al.
patent: 6480885 (2002-11-01), Olivier
patent: 6487586 (2002-11-01), Ogilvie et al.
patent: 6493007 (2002-12-01), Pang
patent: 6493752 (2002-12-01), Lee et al.
patent: 6502082 (2002-12-01), Toyama et al.
patent: 6505167 (2003-01-01), Horvitz et al.
patent: 6546416 (2003-04-01), Kirsch
patent: 6640301 (2003-10-01), Ng
patent: 6643685 (2003-11-01), Millard
patent: 6650890 (2003-11-01), Irlam et al.
patent: 6654787 (2003-11-01), Aronson et al.
patent: 6687740 (2004-02-01), Gough
patent: 6691156 (2004-02-01), Drummond et al.
patent: 6697942 (2004-02-01), L'Heureux
patent: 6701347 (2004-03-01), Ogilvie
patent: 6711608 (2004-03-01), Ogilvie
patent: 6732157 (2004-05-01), Gordon et al.
patent: 6757713 (2004-06-01), Ogilvie et al.
patent: 6757830 (2004-06-01), Tarbotton et al.
patent: 6859791 (2005-02-01), Spagna et al.
patent: 6901346 (2005-05-01), Tracy et al.
patent: 6928553 (2005-08-01), Xiong et al.
patent: 7096368 (2006-08-01), Kouznetsov et al.
patent: 7155484 (2006-12-01), Malik
patent: 2002/0016831 (2002-02-01), Peled et al.
patent: 2002/0038308 (2002-03-01), Cappi
patent: 2002/0042687 (2002-04-01), Tracy et al.
patent: 2002/0083343 (2002-06-01), Crosbie
patent: 2002/0087641 (2002-07-01), Levosky
patent: 2002/0087649 (2002-07-01), Horvitz
patent: 2002/0087882 (2002-07-01), Schneier et al.
patent: 2002/0133523 (2002-09-01), Ambler et al.
patent: 2002/0138525 (2002-09-01), Karadimitriou et al.
patent: 2002/0138581 (2002-09-01), MacIntosh et al.
patent: 2002/0147694 (2002-10-01), Dempsey et al.
patent: 2002/0147782 (2002-10-01), Dimitrova et al.
patent: 2002/0156902 (2002-10-01), Crandall
patent: 2002/0157020 (2002-10-01), Royer
patent: 2002/0165912 (2002-11-01), Wenocur et al.
patent: 2002/0199095 (2002-12-01), Bandini et al.
patent: 2002/0199186 (2002-12-01), Ali et al.
patent: 2002/0199194 (2002-12-01), Ali
patent: 2003/0033587 (2003-02-01), Ferguson et al.
patent: 2003/0037251 (2003-02-01), Frieder
patent: 2003/0051026 (2003-03-01), Carter
patent: 2003/0105864 (2003-06-01), Mulligan et al.
patent: 2003/0149726 (2003-08-01), Spear
patent: 2003/0167311 (2003-09-01), Kirsch
patent: 2003/0191969 (2003-10-01), Katsikas
patent: 2003/0200334 (2003-10-01), Grynberg
patent: 2003/0220978 (2003-11-01), Rhodes
patent: 2003/0229672 (2003-12-01), Kohn
patent: 2003/0229801 (2003-12-01), Kouznetsov et al.
patent: 2003/0233415 (2003-12-01), Beyda
patent: 2004/0003283 (2004-01-01), Goodman et al.
patent: 2004/0024823 (2004-02-01), Del Monte
patent: 2004/0054887 (2004-03-01), Paulsen et al.
patent: 2004/0064734 (2004-04-01), Ehrlich
patent: 2004/0068534 (2004-04-01), Angermayr et al.
patent: 2004/0073617 (2004-04-01), Milliken
patent: 2004/0093383 (2004-05-01), Huang et al.
patent: 2004/0093384 (2004-05-01), Shipp
patent: 2004/0111480 (2004-06-01), Yue
patent: 2004/0148358 (2004-07-01), Singh et al.
patent: 2004/0177271 (2004-09-01), Arnold et al.
patent: 2004/0205173 (2004-10-01), Hall
patent: 2005/0015455 (2005-01-01), Liu
patent: 2005/0097179 (2005-05-01), Orme
patent: 2005/0144480 (2005-06-01), Kim et al.
AirCERT web page, last updated Sep. 18, 2000 [online]. Cert.org [retrieved Apr. 18, 2003]. Retrieved from the Internet:URL:http://www.cert.org/kb/aircert/, U.S.A.
Analysis Console for Intrusion Detection (ACID) web page [online]. Andrew.cmu.edu [retrieved Apr. 18, 2003]. Retrieved from the InternetURL:http://www.andrew.cmu.edu/˜rdanyliw/snort/snortacid.html, U.S.A.
Basis Technology's Rosette Language Identifier, 2 pages, downloaded from http://www.basistech.com/language-identification/ on Aug. 25, 2005, U.S.A.
“Caltarian Security Technology Platform,” Riptech web pages [online]. Symantec.com [retrieved Apr. 18, 2003]. Retrieved from the Internet: URL:http://enterprisesecurity.symantec.com/Content/displayPDF.cfm?SSSPDFID=35&EID=O, U.S.A. cauce.org web pages [online]. Coalition Against Unsolicited Commercial Email [retrieved Mar. 17, 2003]. Retrieved from the Internet: <URL: http://www.cauce.org/about/problem.shtml>.
Cavnar, William B. et al., “N-Gram Based Text Categorization,” Proceedings of the SDAIR-94, 3rdAnnual Symposium on Document Analysis and Information Retrieval, Las Vegas, NV, USA, Apr. 13, 1994.
Change log for Analysis Console for Intrusion Detection (Acid), indicating release date of Sep. 8, 2000 [online]. Andrew.cmu.edu [retrieved Apr. 18, 2003]. Retrieved from the Internet:URL:http://www.andrew.cmu.edu/˜rdanyliw/snort/CHANGELOG, U.S.A.
Chung, C., Gertz, M. and Levitt, K., “DEMIDS: a Misuse Detection System for Database Systems,” Department of Computer Science, University of California at Davis, Oct. 1, 1999, pp. 1-18.
Cranor, Faith L., LaMacchia Brian A., “Spam!” Communications of the ACM, vol. 41, No. 8, pp. 74-83, Aug. 1998, U.S.A.
CyberGuard Corporation, “CyberGuard and Webwasher: The Value Proposition,” A CyberGuard Corporation White Paper, May 2004, 6 pages.
e=Security, Inc., Correlation Technology for Security Event Management, Oct. 7, 2002 [online]. eSecurityins.com [retrieved Apr. 18, 2003]. Retrieved from the Internet:URL:http://www.esecurityinc.com/downloads/Correlation—WP.pdf, Vienna, VA.
How it Works: Spam Recognition, http://www.death2spam.net/docs/classifier.html, retrieved Aug. 18, 2005, U.S.A.
Karp-Rabin algorithm, 3 pages, downloaded from http://www-igm.univ-mlv.fr/˜lecrog/string
ode5.html on Sep. 1, 2005, U.S.A.
Kularski, C., “Compound Procedures for Spam Control,” Highland School of Technology, Jan. 2004.
Lee, Sin Yeung; Low, Wai Lup and Wong, Pei Yuen, “Learning Fingerprints for a Database Intrusion Detections System,” Computer Security Laboratory, DSO National Laboratories, Singapore, ESORICS Nov. 2002, LNCS 2502, pp. 264-279.
Low, Wai Lup, et al., “DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions,” ICEIS 2002, Fourth International Conference on Enterprise Information Systems, vol. 1, Apr. 3-6, 2002, pp. 121-128, Ciudad Real, Spain.
Marketing, “Digital Certificates—Best Practices—A Micro
McCorkendale Bruce
Sobel William E.
Fenwick & West LLP
Shiferaw Eleni A
Symantec Corporation
LandOfFree
Presentation of network source and executable characteristics does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Presentation of network source and executable characteristics, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Presentation of network source and executable characteristics will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4146774