International Business Machines Corporation
Protecting Computer Assets From Malicious Attacks

Last updated:

Abstract:

A method protects a computer asset by identifying a particular signature, which is software that causes a particular gateway to block an intrusion from reaching a particular computer asset, and installs the particular signature on the particular gateway, thus protecting the computer asset from the intrusion.

Status:
Application
Type:

Utility

Filling date:

11 Apr 2022

Issue date:

28 Jul 2022