Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2008-11-05
2011-12-27
Lim, Krisna (Department: 2453)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000, C726S025000, C726S026000
Reexamination Certificate
active
08087081
ABSTRACT:
A client computer may be configured to perform computer security operation services, such as malicious code scanning and protection against online threats, using one of several remotely located server computers. The client computer may be configured to determine an operational state of the server computers and determine a protection status of the client computer resulting from use of a server computer of a particular operational state. The protection status may have one of at least three levels and indicate vulnerability of the client computer. The client computer may determine the operational state of a server computer based on available bandwidth for network communication between the client computer and the server computer. The client computer may be configured to allow for automatic or manual selection of another server computer when the currently selected server computer results in the client computer having a protection status below a threshold level.
REFERENCES:
patent: 5623600 (1997-04-01), Ji et al.
patent: 6021510 (2000-02-01), Nachenberg
patent: 6094731 (2000-07-01), Waldin et al.
patent: 6195587 (2001-02-01), Hruska et al.
patent: 6745192 (2004-06-01), Libenzi
patent: 6748538 (2004-06-01), Chan et al.
patent: 6847995 (2005-01-01), Hubbard et al.
patent: 6938097 (2005-08-01), Vincent et al.
patent: 7010807 (2006-03-01), Yanovsky et al.
patent: 7096493 (2006-08-01), Liu
patent: 7099853 (2006-08-01), Liu et al.
patent: 7143113 (2006-11-01), Radatti
patent: 7185015 (2007-02-01), Kester et al.
patent: 7203959 (2007-04-01), Nachenberg et al.
patent: 7299277 (2007-11-01), Moran et al.
patent: 7328349 (2008-02-01), Milliken
patent: 7337471 (2008-02-01), Nachenberg et al.
patent: 7373643 (2008-05-01), Radatti
patent: 7406454 (2008-07-01), Liu et al.
patent: 2004/0193907 (2004-09-01), Patanella
patent: 2005/0273850 (2005-12-01), Freund
patent: 2007/0101146 (2007-05-01), Louch et al.
patent: 2007/0150948 (2007-06-01), De Spiegeller
patent: 2007/0162463 (2007-07-01), Kester et al.
patent: 2007/0174909 (2007-07-01), Burchett et al.
patent: 2007/0234343 (2007-10-01), Gouge et al.
patent: 2007/0240218 (2007-10-01), Tuvell et al.
patent: 2007/0244920 (2007-10-01), Palliyil et al.
patent: 2008/0022397 (2008-01-01), Cheng
patent: 2008/0033942 (2008-02-01), Kao et al.
patent: 2008/0077971 (2008-03-01), Wright et al.
patent: 2008/0092235 (2008-04-01), Comlekoglu et al.
patent: 2008/0095065 (2008-04-01), Albrecht
patent: 2009/0235359 (2009-09-01), Abdulhayoglu et al.
patent: 2009/0249489 (2009-10-01), Livshits et al.
Binary diff/patch utility, 1 sheet [retrieved on May 30, 2008]. Retrieved from the internet: http://www.daemonology.net/bsdiff/, 2003.
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, 2 sheets [retrieved on May 21, 2008]. Retrieved from the internet: http://pages.cs.wisc.edu/˜cao/papers/summary-cache/share.html.
Bloom Filters—the math, 6 sheets [retrieved on May 22, 2008]. Retrieved from the internet: http://pages.cs.wisc.edu/˜cao/papers/summary-cache
ode8.html.
Bloom Filter—Wikipedia, the free encyclopedia, 7 sheets [retrieved on May 21, 2008]. Retrieved from the internet: http://en.wikipedia.org/wiki/Bloom—filter.
John Wack, et. al., “Guide to Firewall Selection and Policy Recommendations”, Oct. 2001, 64 pages, National Institute of Standards and Technology (NIST) special publication.
Microsoft TechNet “Unsolicited Commercial E-Mail Prevention and Filtering Performance Analysis”, Jan. 1999, pp. 1-14, retrieved from the internet: http://www.microsoft.com/technet/archive/mcis/rkspmcpa.mspx?pf=true.
Martin Roesch, “Snort—Lightweight Intrusion Detection for Networks”, 1999, pp. 229-238 of the 13th LISA Conference proceedings. Retrieved from the internet: http://www.usenix.org/events/lisa99/full—papers/roesch/roesch—html/.
Chan Chia-Wen
Chun Lou Ju
Lin Sam
Lu Chih-Kang
Wang Jay
Lim Krisna
Okamoto & Benedicto LLP
Trend Micro Incorporated
LandOfFree
Selection of remotely located servers for computer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Selection of remotely located servers for computer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Selection of remotely located servers for computer security... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4264101