Configuring software agent security remotely
First Claim
Patent Images
1. A method comprising:
- receiving information from a remote agent locally; and
responding to the information from the remote agent by deciding whether to signal a change of a security configuration of the remote agent.
5 Assignments
0 Petitions
Accused Products
Abstract
A device, method, computer program product, and network subsystem are described for receiving information from a remote agent locally and responding to the information from the remote agent by deciding whether to signal a change of a security configuration of the remote agent.
-
Citations
33 Claims
-
1. A method comprising:
-
receiving information from a remote agent locally; and responding to the information from the remote agent by deciding whether to signal a change of a security configuration of the remote agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A first method comprising:
-
performing a reception of or a transmission of one or more instructions relating to a second method including; receiving information from a remote agent locally; and responding to the information from the remote agent by deciding whether to signal a change of a security configuration of the remote agent. - View Dependent Claims (14)
-
-
15. A method comprising:
-
receiving information from a remote agent locally; responding to the information from the remote agent by deciding whether to signal a change of a security configuration of the remote agent responsive to local user input, by causing the change of the security configuration of the remote agent responsive to the information from the remote agent, and by storing an indication of the change of the security configuration of the remote agent responsive to the information from the remote agent; and transmitting a response to the information from the remote agent.
-
-
16. A network subsystem comprising:
-
means for receiving information from a remote agent locally; and means for responding to the information from the remote agent by deciding whether to signal a change of a security configuration of the remote agent. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification