18536802. PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS

Organization Name

International Business Machines Corporation

Inventor(s)

ADAM Paquin of SUWANEE GA (US)

PEYTON Duncan of ORLANDO FL (US)

KEVIN Shen of BOYDS MD (US)

JONATHAN Bees of PITTSBURGH PA (US)

SRINIVAS BABU Tummalapenta of BROOMFIELD CO (US)

PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18536802 titled 'PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS

Simplified Explanation

The method described in the patent application involves protecting a computer asset by installing a particular signature on a gateway to block intrusions from reaching the computer asset.

  • The method involves identifying a specific signature, which is software designed to block intrusions.
  • The identified signature is installed on a gateway to prevent intrusions from reaching the computer asset.

Potential Applications

This technology could be applied in various industries such as cybersecurity, network security, and data protection.

Problems Solved

This technology helps prevent unauthorized access to computer assets, reducing the risk of data breaches and cyber attacks.

Benefits

- Enhanced security for computer assets - Protection against intrusions and cyber threats - Peace of mind for users knowing their data is secure

Potential Commercial Applications

"Enhancing Cybersecurity with Signature Installation on Gateways"

Possible Prior Art

There may be existing technologies or methods that involve installing signatures on gateways to block intrusions, but further research would be needed to identify specific prior art in this area.

Unanswered Questions

How does the method identify the particular signature?

The abstract does not provide details on the specific process used to identify the signature that will be installed on the gateway.

What types of intrusions are targeted by this technology?

The abstract does not specify the specific types of intrusions that the installed signature is designed to block.


Original Abstract Submitted

A method protects a computer asset by identifying a particular signature, which is software that causes a particular gateway to block an intrusion from reaching a particular computer asset, and installs the particular signature on the particular gateway, thus protecting the computer asset from the intrusion.