International Business Machines Corporation
PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS

Last updated:

Abstract:

A method selectively installs a particular signature on a particular gateway based on the type of signature and the type of computer asset that is protected by that particular gateway. A system and/or analyst receives multiple signatures, where different signatures from the multiple signatures are specific for different types of computer assets. The system and/or analyst identifies and extracts a particular signature, from the multiple signatures, that will protect, if implemented on the appropriate gateway, a particular computer asset. The system and/or analyst identifies the appropriate gateway that protects the particular computer asset, and installs only the extracted particular signature from the multiple signatures on that appropriate gateway.

Status:
Application
Type:

Utility

Filling date:

15 May 2020

Issue date:

18 Nov 2021