Selection of remotely located servers for computer security...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C726S024000, C726S025000, C726S026000

Reexamination Certificate

active

08087081

ABSTRACT:
A client computer may be configured to perform computer security operation services, such as malicious code scanning and protection against online threats, using one of several remotely located server computers. The client computer may be configured to determine an operational state of the server computers and determine a protection status of the client computer resulting from use of a server computer of a particular operational state. The protection status may have one of at least three levels and indicate vulnerability of the client computer. The client computer may determine the operational state of a server computer based on available bandwidth for network communication between the client computer and the server computer. The client computer may be configured to allow for automatic or manual selection of another server computer when the currently selected server computer results in the client computer having a protection status below a threshold level.

REFERENCES:
patent: 5623600 (1997-04-01), Ji et al.
patent: 6021510 (2000-02-01), Nachenberg
patent: 6094731 (2000-07-01), Waldin et al.
patent: 6195587 (2001-02-01), Hruska et al.
patent: 6745192 (2004-06-01), Libenzi
patent: 6748538 (2004-06-01), Chan et al.
patent: 6847995 (2005-01-01), Hubbard et al.
patent: 6938097 (2005-08-01), Vincent et al.
patent: 7010807 (2006-03-01), Yanovsky et al.
patent: 7096493 (2006-08-01), Liu
patent: 7099853 (2006-08-01), Liu et al.
patent: 7143113 (2006-11-01), Radatti
patent: 7185015 (2007-02-01), Kester et al.
patent: 7203959 (2007-04-01), Nachenberg et al.
patent: 7299277 (2007-11-01), Moran et al.
patent: 7328349 (2008-02-01), Milliken
patent: 7337471 (2008-02-01), Nachenberg et al.
patent: 7373643 (2008-05-01), Radatti
patent: 7406454 (2008-07-01), Liu et al.
patent: 2004/0193907 (2004-09-01), Patanella
patent: 2005/0273850 (2005-12-01), Freund
patent: 2007/0101146 (2007-05-01), Louch et al.
patent: 2007/0150948 (2007-06-01), De Spiegeller
patent: 2007/0162463 (2007-07-01), Kester et al.
patent: 2007/0174909 (2007-07-01), Burchett et al.
patent: 2007/0234343 (2007-10-01), Gouge et al.
patent: 2007/0240218 (2007-10-01), Tuvell et al.
patent: 2007/0244920 (2007-10-01), Palliyil et al.
patent: 2008/0022397 (2008-01-01), Cheng
patent: 2008/0033942 (2008-02-01), Kao et al.
patent: 2008/0077971 (2008-03-01), Wright et al.
patent: 2008/0092235 (2008-04-01), Comlekoglu et al.
patent: 2008/0095065 (2008-04-01), Albrecht
patent: 2009/0235359 (2009-09-01), Abdulhayoglu et al.
patent: 2009/0249489 (2009-10-01), Livshits et al.
Binary diff/patch utility, 1 sheet [retrieved on May 30, 2008]. Retrieved from the internet: http://www.daemonology.net/bsdiff/, 2003.
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, 2 sheets [retrieved on May 21, 2008]. Retrieved from the internet: http://pages.cs.wisc.edu/˜cao/papers/summary-cache/share.html.
Bloom Filters—the math, 6 sheets [retrieved on May 22, 2008]. Retrieved from the internet: http://pages.cs.wisc.edu/˜cao/papers/summary-cache
ode8.html.
Bloom Filter—Wikipedia, the free encyclopedia, 7 sheets [retrieved on May 21, 2008]. Retrieved from the internet: http://en.wikipedia.org/wiki/Bloom—filter.
John Wack, et. al., “Guide to Firewall Selection and Policy Recommendations”, Oct. 2001, 64 pages, National Institute of Standards and Technology (NIST) special publication.
Microsoft TechNet “Unsolicited Commercial E-Mail Prevention and Filtering Performance Analysis”, Jan. 1999, pp. 1-14, retrieved from the internet: http://www.microsoft.com/technet/archive/mcis/rkspmcpa.mspx?pf=true.
Martin Roesch, “Snort—Lightweight Intrusion Detection for Networks”, 1999, pp. 229-238 of the 13th LISA Conference proceedings. Retrieved from the internet: http://www.usenix.org/events/lisa99/full—papers/roesch/roesch—html/.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Selection of remotely located servers for computer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Selection of remotely located servers for computer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Selection of remotely located servers for computer security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4264101

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.