International Business Machines Corporation
Protecting Computer Assets From Malicious Attacks
Last updated:
Abstract:
A method protects a computer asset by identifying a particular signature, which is software that causes a particular gateway to block an intrusion from reaching a particular computer asset, and installs the particular signature on the particular gateway, thus protecting the computer asset from the intrusion.
Status:
Application
Type:
Utility
Filling date:
11 Apr 2022
Issue date:
28 Jul 2022