Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2006-09-14
2010-06-29
Smithers, Matthew B (Department: 2437)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S022000, C713S189000, C713S194000
Reexamination Certificate
active
07748042
ABSTRACT:
Security level of a computing system may be computed based on determining various security factor values for different operational aspects of the processing components. These security factor values are scaled to representative values or other types of identifiers. These security factor values may then be mapped on a security expectation scale, including taking into account the corresponding operational aspects. From this security factor value mapping, a computing system security determination can be calculated, which provides a vulnerability determination for the computing system providing information not only to the individual components, but also to the system as a whole.
REFERENCES:
patent: 5892903 (1999-04-01), Klaus
patent: WO 03060717 (2003-07-01), None
Ramana Rao Kompella, Sumeet Singh, George Varghese, “On scalable attack detection in the network”, Oct. 2004, IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Publisher: ACM, pp. 187-200.
Jacob Juby
Vidwans Makarand
Walia Suraj
Fields Courtney D
Genpact Limited
Kenyon & Kenyon LLP
Smithers Matthew B
LandOfFree
Security vulnerability determination in a computer system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security vulnerability determination in a computer system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security vulnerability determination in a computer system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4159379