Dynamic security shielding through a network resource
First Claim
1. A computer-implemented services system, comprising:
- a detection component of a host device for detecting a risk beacon indicative of a risk of intrusion;
a remote component for providing an intrusion protection service to the host device;
a redirection component for dynamically redirecting host traffic to the remote component to obtain the intrusion protection service until intrusion protection software is installed on the host device, thereafter the host device disconnects from the remote component; and
a processor operable to execute computer-executable instructions associated with at least one of the detection component, the remote component, or the redirection component.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for facilitating access of remote system software functionality by a host machine for the redirection of incoming and/or outgoing host traffic through the remote system for protection services to the host machine. The host machine can gain the benefits of effective protection software such as firewall, intrusion protection software, and anti-malware services, of the remote machine. The host machine can choose to exercise traffic redirection when there is a risk of being compromised, and then revert back to direct communications when the risk has been averted. The host machine takes advantage of the resources available on the remote machine in substantially realtime with minimal disruption to the host and/or the remote machine operations. This facilitates widespread and temporary protection of network systems for a more secure working environment and improved customer experience.
20 Citations
20 Claims
-
1. A computer-implemented services system, comprising:
-
a detection component of a host device for detecting a risk beacon indicative of a risk of intrusion; a remote component for providing an intrusion protection service to the host device; a redirection component for dynamically redirecting host traffic to the remote component to obtain the intrusion protection service until intrusion protection software is installed on the host device, thereafter the host device disconnects from the remote component; and a processor operable to execute computer-executable instructions associated with at least one of the detection component, the remote component, or the redirection component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method of providing services, comprising acts of:
-
receiving a risk beacon at a client associated with a need for a protection service; detecting available remote resources of a wireless network for the service; selecting a first resource of the available remote resources; redirecting client traffic to the first resource over the wireless network; processing the client traffic through the service to protect the client; disconnecting the client from the first resource when the protection service is no longer needed; and utilizing a processor to execute instructions stored in memory to perform at least one of the acts of receiving, detecting, selecting, redirecting, processing, or disconnecting. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-implemented system, comprising:
-
a host component operating without intrusion protection software; a detection component of the host component for detecting a risk beacon associated with a risk of an intrusion threat; a proxy component, operating with intrusion protection software, for redirecting traffic to the host component, thereby providing intrusion protection to the host component until protection provided by the proxy component is no longer needed, thereafter the host component disconnects from the proxy component; and a processor operable to execute computer-executable instructions associated with at least one of the host component, the detection component, or the proxy component.
-
Specification