Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for utilizing dedicated computer security services

A computer security, computer technology, applied in the field of computer security, can solve problems such as unusable, ineffective, etc.

Active Publication Date: 2020-03-27
AO KASPERSKY LAB
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Analysis of existing solutions shows that these techniques are often ineffective and in some cases unusable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for utilizing dedicated computer security services
  • Systems and methods for utilizing dedicated computer security services
  • Systems and methods for utilizing dedicated computer security services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Example aspects are described herein in the context of systems, methods, and computer program products for specialized computer security services. Those skilled in the art will appreciate that the following description is illustrative only and is not intended to be limiting in any way. Those of ordinary skill in the art having the benefit of this disclosure will readily appreciate the teachings from others themselves. Reference will now be made in detail to exemplary method implementations as illustrated in the accompanying drawings. The same reference designators will be used throughout the drawings and the following description, to the extent possible, to refer to the same or like items.

[0027] Companies that provide computer security services can be thought of as antivirus companies that provide access to their cloud security services (such as AO Kaspersky Lab and Kaspersky Security Network service). Also, the client company may be a company that uses cloud secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods for utilizing specialized computer security services are disclosed. An exemplary method includes storing a rule in an electronic database indicating when to use the first cloud service or the second cloud service for one of the security services, receiving a request from a client computer to access the security service, determining a relationship with the received request Regarding parameters, applying the parameters to a plurality of rules to determine an instruction indicating whether to transmit the request to the first cloud service or the second cloud service; and transmitting the request to the first cloud service or the second cloud service based on the instruction to use at least one security Serve.

Description

technical field [0001] The present disclosure relates generally to the field of computer security, and more particularly, to systems and methods for utilizing specialized computer security services. Background technique [0002] Currently, so-called "cloud" technologies are becoming more and more popular. Cloud technology provides remote access to computer computing resources or data without requiring companies to spend a lot of money on computer infrastructure (ie, clients of cloud technology services). Typically, clients only need to have a fixed Internet connection to gain access to cloud services. In general, there are several types of cloud services—private cloud services, public cloud services, and their hybrids. Private cloud services are designed for a specific company or group of people, mainly using resources to form a private network, while public cloud services provide access to their resources to all connected customers. Hybrid cloud services combine these tw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/20H04L67/60H04L67/1008G06F21/56H04L63/205H04L67/1097G06F16/22H04L67/10
Inventor A·A·埃福里莫夫A·S·拉普什金
Owner AO KASPERSKY LAB