Selection of remotely located servers for computer security operations
First Claim
1. A method of selecting a remotely located security server computer for computer security operation, the method to be performed by a client computer and comprising:
- determining an available bandwidth for network communication between the client computer and a first security server computer in a plurality of security server computers available to provide remote scanning service to the client computer, the first security server computer being selected to provide the remote scanning service to the client computer;
determining protection status of the client computer based on the available bandwidth for network communication between the client computer and the first security server computer, the protection status having one of at least four different possible levels, each of the levels being indicative of vulnerability of the client computer to malicious codes;
allowing selection of a second security server computer in the plurality of security server computers to replace the first security server computer when the protection status of the client computer is below a threshold level; and
using the second security server computer to scan a file of the client computer for malicious codes.
1 Assignment
0 Petitions
Accused Products
Abstract
A client computer may be configured to perform computer security operation services, such as malicious code scanning and protection against online threats, using one of several remotely located server computers. The client computer may be configured to determine an operational state of the server computers and determine a protection status of the client computer resulting from use of a server computer of a particular operational state. The protection status may have one of at least three levels and indicate vulnerability of the client computer. The client computer may determine the operational state of a server computer based on available bandwidth for network communication between the client computer and the server computer. The client computer may be configured to allow for automatic or manual selection of another server computer when the currently selected server computer results in the client computer having a protection status below a threshold level.
51 Citations
20 Claims
-
1. A method of selecting a remotely located security server computer for computer security operation, the method to be performed by a client computer and comprising:
-
determining an available bandwidth for network communication between the client computer and a first security server computer in a plurality of security server computers available to provide remote scanning service to the client computer, the first security server computer being selected to provide the remote scanning service to the client computer; determining protection status of the client computer based on the available bandwidth for network communication between the client computer and the first security server computer, the protection status having one of at least four different possible levels, each of the levels being indicative of vulnerability of the client computer to malicious codes; allowing selection of a second security server computer in the plurality of security server computers to replace the first security server computer when the protection status of the client computer is below a threshold level; and using the second security server computer to scan a file of the client computer for malicious codes. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A client computer comprising:
-
a computer security module comprising computer-readable program code running in memory of the client computer, the computer security module being configured to perform a computer security operation in the client computer; and an active content distribution module comprising computer-readable program code running in the memory of the client computer, the active content distribution module being configured to select one of a plurality of security server computers available for use by the computer security module to perform the computer security operation based on available bandwidth for network communication between the client computer and the plurality of security server computers, the active content distribution module being configured to allow selection of one of the plurality of security server computers when a currently selected security server computer being used by the computer security module to perform the computer security operation results in the client computer having a protection status indicating the client computer is vulnerable to malicious codes or online threats, the protection status having one of at least four possible levels. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of selecting a remotely located server for computer security operation, the method to be performed by a client computer and comprising:
-
determining an operational state of each of a plurality of server computers configured to provide a computer security operation service to the client computer; determining a protection status of the client computer for each of the plurality of server computers; and allowing selection of a second server computer in the plurality of server computers when the protection status of the client computer is below a minimum level due to use of a first server computer currently being used by the client computer to provide the computer security operation service to the client computer. - View Dependent Claims (17, 18, 19, 20)
-
Specification