Method and system for configuring and scheduling security audits of a computer network

RD Zobel, TD Dodd, SA Millar, DG Nesfeder Jr… - US Patent …, 2008 - Google Patents
Managing the selection and scheduling of security audits run on a computing network. The
computer network is surveyed by a security audit system to determine the function and …

Differential threat detection processing

J Bennett - US Patent 7,937,761, 2011 - Google Patents
Detecting a network security threat is disclosed. Network traffic is classified with a security
risk related classification, the classification being determined at least in part by applying a …

Gigabit ethernet adapter supporting the iSCSI and IPSEC protocols

JS Minami, RY Uyeshiro, MW Johnson, S Su… - US Patent …, 2009 - Google Patents
The invention is embodied in a gigabit Ethernet adapter. A system according to the invention
provides a compact hardware solution to handling high network communication speeds. In …

Analytical virtual machine

PAJ van der Made - US Patent 7,657,419, 2010 - Google Patents
An analytical virtual machine (AVM) analyzes computer code using a software processor
including a register that stores behavior flags indicative of behaviors identified by virtually …

Vulnerability assessment and authentication of a computer by a local scanner

P Taylor, S Mewett, PC Brass, TR Doty - US Patent 7,178,166, 2007 - Google Patents
US PATENT DOCUMENTS the scanner? nds a vulnerability, the scanner can inform the
user that the machine is or may be compromised, or repair 4,223,380 A 9/1980 Amonaccio …

Method and system for managing computer security information

TP Farley, JM Hammer, BD Williams, PC Brass… - US Patent …, 2006 - Google Patents
A security management system includes a fusion engine which “fuses” or assembles
information from multiple data sources and analyzes this information in order to detect …

System and method for managing security events on a network

GN Houston, CD Kobsa, S Embar, MT Di Iorio… - US Patent …, 2011 - Google Patents
A computer-implemented system for managing security event data collected from a
computing network. The system employs an event managing software module that can …

Method and system for dynamically protecting a computer system from attack

CJ Rouland, PM Becker, CW Klaus - US Patent 7,913,303, 2011 - Google Patents
US PATENT DOCUMENTS protection system can receive policy updates to allow it to
protect the system more efficiently and effectively. In other words, the dynamic protection …

System and method for preventing network misuse

RD Graham, P Kavaler - US Patent 7,237,264, 2007 - Google Patents
(57) ABSTRACT A system and method for preventing misuse conditions on a data network
are described. Embodiments of the system and method evaluate potential network misuse …

Method and apparatus for network assessment and authentication

CE Ide, PC Brass, TR Doty - US Patent 7,634,800, 2009 - Google Patents
Providing a user with assurance that a networked computer is secure, typically before
completion of the log-in operation. This can be accomplished by extending the local log-in …