×

SOFTWARE VULNERABILITY EXPLOITATION SHIELD

  • US 20070226797A1
  • Filed: 03/26/2007
  • Published: 09/27/2007
  • Est. Priority Date: 03/24/2006
  • Status: Active Grant
First Claim
Patent Images

1. At a computing system in a network computing environment, a method of minimizing the exploitation of vulnerabilities on software installed on the computing system by inspecting network traffic thereto and identifying the malicious code before it can be executed and/or installed, the method comprising:

  • monitoring, at a transport layer, incoming network traffic of a computing system using a security component installed thereon;

    receiving as part of the network traffic a message at the transport layer identified as destined for the computing system;

    comparing at least a portion of data included in the message received with exploit evidence used to identify malicious code, the exploit evidence provided to the security component by a security service that gathers information about the malicious code;

    based on the comparison with the exploit evidence, identifying one or more rules that instruct the security component to perform one or more actions on the message received.

View all claims
  • 15 Assignments
Timeline View
Assignment View
    ×
    ×