Detection and Removal of Undesirable Items in a Data Processing Environment
First Claim
Patent Images
1. A method for addressing a threat to the security of a user device that utilizes a network-accessible service, comprising:
- assessing a likelihood that the user device is infected by the undesirable item;
receiving a request by the user device to access the network-accessible service; and
in response to the request, interacting with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item, wherein the user device is operated by at least one user.
2 Assignments
0 Petitions
Accused Products
Abstract
Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.
-
Citations
20 Claims
-
1. A method for addressing a threat to the security of a user device that utilizes a network-accessible service, comprising:
-
assessing a likelihood that the user device is infected by the undesirable item; receiving a request by the user device to access the network-accessible service; and in response to the request, interacting with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item, wherein the user device is operated by at least one user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An item management module for addressing a threat to the security of a user device that utilizes network-accessible service, comprising:
-
an item detection module configured to make an assessment of a likelihood that the user device is infected by the undesirable item; and a remedy module configured to; receive a request by the user device to access the network-accessible service; and in response to the request, interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item. - View Dependent Claims (18, 19)
-
-
20. An intermediary appliance module for interfacing between a user device and a network-accessible service, comprising:
-
a cooperative detection module configured to cooperate with an item management module to make an assessment of a likelihood that the user device is infected by the undesirable item; and a remedy module configured to cooperate with the item management module to interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.
-
Specification