The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Dec. 08, 2015
Filed:
May. 07, 2008
Jeffrey S. Bardsley, Morrisville, NC (US);
Ashley A. Brock, Morrisville, NC (US);
Charles K. Davis, Iii, Mechanicsburg, PA (US);
Nathaniel W. Kim, Raleigh, NC (US);
John J. Mckenna, Cary, NC (US);
Carlos F. Villegas, Morrisville, NC (US);
Jeffrey S. Bardsley, Morrisville, NC (US);
Ashley A. Brock, Morrisville, NC (US);
Charles K. Davis, III, Mechanicsburg, PA (US);
Nathaniel W. Kim, Raleigh, NC (US);
John J. McKenna, Cary, NC (US);
Carlos F. Villegas, Morrisville, NC (US);
Trend Micro Incorporated, Tokyo, JP;
Abstract
A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat. The received TMV may be mutated to a format for processing of the countermeasure.