Dynamic security shielding through a network resource
First Claim
1. A computer-implemented services system, comprising:
- a detection component of a host device for detecting a need for a service; and
a routing component for dynamically routing host traffic to a remote component to obtain the service based on the need or host policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for facilitating access of remote system software functionality by a host machine for the redirection of incoming and/or outgoing host traffic through the remote system for protection services to the host machine. The host machine can gain the benefits of effective protection software such as firewall, intrusion protection software, and anti-malware services, of the remote machine. The host machine can choose to exercise traffic redirection when there is a risk of being compromised, and then revert back to direct communications when the risk has been averted. The host machine takes advantage of the resources available on the remote machine in substantially realtime with minimal disruption to the host and/or the remote machine operations. This facilitates widespread and temporary protection of network systems for a more secure working environment and improved customer experience.
52 Citations
20 Claims
-
1. A computer-implemented services system, comprising:
-
a detection component of a host device for detecting a need for a service; and a routing component for dynamically routing host traffic to a remote component to obtain the service based on the need or host policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method of providing services, comprising acts of:
-
receiving a signal at a client associated with a need for a protection service; detecting available remote resources of a wireless network for the service; selecting a first resource of the available remote resources; routing client traffic to the first resource over the wireless network; and processing the client traffic through the service to protect the client. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-implemented system, comprising:
-
computer-implemented means for receiving a signal at a client associated with a need for a protection service; computer-implemented means for detecting available remote resources for the service; computer-implemented means for selecting a first resource of the available remote resources; computer-implemented means for routing client traffic to the first resource; and computer-implemented means for processing the client traffic through the service to protect the client.
-
Specification