Method and apparatus for providing computer security
First Claim
Patent Images
1. A method for providing computer security, comprising:
- storing subscriber information in a repository;
sending an exploit probe to a subscriber'"'"'s computer system; and
generating a probe message based on the computer system'"'"'s response to the exploit probe.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and apparatus for providing computer security is provided. Subscriber information is stored in a repository and an exploit probe is sent to a subscriber'"'"'s computer system. A probe message based on the computer system'"'"'s response to the exploit probe is generated.
86 Citations
34 Claims
-
1. A method for providing computer security, comprising:
-
storing subscriber information in a repository;
sending an exploit probe to a subscriber'"'"'s computer system; and
generating a probe message based on the computer system'"'"'s response to the exploit probe. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for providing computer security, comprising:
-
a storing system for storing subscriber information in a repository;
a sending system for sending an exploit probe to a subscriber'"'"'s computer system; and
a generating system for generating a probe message based on the computer system'"'"'s response to the exploit probe. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer readable storage medium including computer executable code for providing computer security, comprising:
-
code for storing subscriber information in a repository;
code for sending an exploit probe to a subscriber'"'"'s computer system; and
code for generating a probe message based on the computer system'"'"'s response to the exploit probe. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. An apparatus for providing computer security, comprising:
-
a storing system for storing subscriber information in a repository;
a sending system for sending an exploit probe to a subscriber'"'"'s computer system;
a generating system for generating a probe message based on the computer system'"'"'s response to the exploit probe;
a sub-system for interacting with exploitable software(s) to maximize spoofing effectiveness when deploying the exploit probe;
a sub-system for maintaining virus security clearance status of communities of users based on their resistance to being fooled by the exploit probe;
a sub-system for sharing the virus security clearance status with other computer security systems/sub-systems. - View Dependent Claims (33, 34)
-
Specification