Sign In to Follow Application
View All Documents & Correspondence

System And Method For Protecting A Computing Device From Computer Exploits Delivered Over A Networked Environment In A Secured Communication

Abstract: A network security module, interposed between a computing device and a network such that all network activities between the computing device and the network pass through the network security module, for protecting the computing device from an identified security threat on the network, the network security module comprising; a computing device connection connecting the network security module to the computing device; a network connection connecting the network security module to the network; a decoder module that temporarily decrypts a secured communication using an obtained decryption key; and a security enforcement module that controls network activities between the computing device and the network by implementing obtained security measures, thereby protecting the computing device from an identified security threat on the network

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 February 2005
Publication Number
52/2006
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
remfry-sagar@remfry.com
Parent Application

Applicants

MICROSOFT CORPORATION
BUSINESS AT ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052, U.S.A.

Inventors

1. ALEXANDER FRANK,
BUSINESS AT ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052, U.S.A.
2. THOMAS G. PHILIPS,
BUSINESS AT ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052, U.S.A.

Specification

Documents