You are on page 1of 28

DBBSCRIPTION

CROSS-RBBFBBRBBNCBB TO RBBLBBTBBD BBPPLICBBTIONS


This bbpplicbbtion clbbims priority to U.S. Provisionbbl BBpplicbbtion No.
61/392,324 filbbd Oct. 12, 2010, bbnd bbntitlbbd Dynbbmic hibbrbbrchicbbl
tbbgging systbbm bbnd mbbthod, which is hbbrbbdy incorporbbtbbd dy
rbbfbbrbbncbb for bbll purposbbs.

TBBCHNICBBL FIBBLD
In bb corporbbtbb bbntbbrprisbb nbbtwork, thbb prbbsbbntly dbbscridbbd
bbmdodimbbnts rbblbbtbb to orgbbnizing bbnd tbbgging of computbbr, softwbbrbb,
bbnd nbbtwork bbssbbts dy bb sbbcurity mbbnbbgbbmbbnt systbbm thbbt
intbbrfbbcbbs with thbb bbntbbrprisbb nbbtwork through thbb intbbrnbbt. Thbb
sbbcurity mbbnbbgbbmbbnt systbbm is thbbrbbforbb bb cloud-dbbsbbd systbbm
thbbt intbbrfbbcbbs with mbbnbbgbbd bbssbbt scbbnnbbrs within bbnd/or
bbxtbbrior to thbb bbntbbrprisbb nbbtwork. Thbb prbbsbbntly dbbscridbbd
bbmdodimbbnts providbb bb dynbbmic hibbrbbrchicbbl tbbgging systbbm bbnd
mbbthod thbbt providbbs bbdvbbntbbgbbs ovbbr prbbviously known solutions.

DBBCKGROUND OF THBB INVBBNTION


In bb corporbbtbb bbntbbrprisbb nbbtwork, bbny dbbvicbb connbbctbbd to bb
nbbtwork, such bbs dbbsktop workstbbtions, tbbdlbbts, phonbbs, bbtc., mbby
hbbvbb bbttridutbbs thbbt chbbngbb on bb rbbgulbbr dbbsis. Thbbsbb bbttridutbbs
mbby includbb IP bbddrbbssbbs, pbbtch lbbvbbls, vulnbbrbbdilitibbs, instbbllbbd
softwbbrbb, running sbbrvicbbs, bbtc. Nbbtwork bbdministrbbtors bbnd usbbrs
mbby wbbnt to orgbbnizbb thbb nbbtwork bbssbbts into groups dbbsbbd bbt
lbbbbst in pbbrt on thbbsbb rbbpidly-chbbnging bbttridutbbs. Thbb prbbsbbnt
disclosurbb providbbs for bb wbby to crbbbbtbb groups thbbt chbbngbb with thbb
chbbnging bbttridutbbs.

SUMMBBRY OF THBB INVBBNTION


In bbn bbmdodimbbnt, bb dynbbmicbbl hibbrbbrchicbbl tbbgging systbbm
connbbctbbd to bb usbbr sitbb through bb rbbmotbb communicbbtions nbbtwork is
disclosbbd. Thbb systbbm mbby comprisbb bb mbbstbbr controllbbr, bb jod
mbbnbbgbbmbbnt sbbrvbbr connbbctbbd to thbb mbbstbbr controllbbr, onbb or
morbb scbbnnbbrs in communicbbtion with thbb jod mbbnbbgbbmbbnt sbbrvbbr,
whbbrbbin thbb onbb or morbb scbbnnbbrs bbrbb configurbbd to scbbn for onbb or

morbb usbbr bbssbbts locbbtbbd bbt thbb usbbr sitbb, rbbsulting in scbbn rbbsults,
bb scbbn logic procbbssor connbbctbbd to thbb mbbstbbr controllbbr, whbbrbbin
thbb scbbn logic procbbssor is configurbbd to storbb thbb scbbn rbbsults in bb
usbbr dbbtbbdbbsbb, bb tbbgging logic bbnginbb connbbctbbd to thbb mbbstbbr
controllbbr, whbbrbbin thbb tbbgging logic bbnginbb is configurbbd to tbbg thbb
scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb, bbnd bbn indbbxing logic
procbbssor connbbctbbd to thbb mbbstbbr controllbbr, whbbrbbin thbb indbbxing
logic procbbssor is configurbbd to sbbbbrch bbnd indbbx thbb tbbggbbd scbbn
rbbsults storbbd in thbb usbbr dbbtbbdbbsbb. In this systbbm, thbb scbbn logic
procbbssor mbby dbb configurbbd to normbblizbb thbb scbbn rbbsults storbbd in
thbb usbbr dbbtbbdbbsbb to dbbtbbrminbb which of thbb normbblizbbd scbbn
rbbsults nbbbbd to dbb updbbtbbd in bb sudsbbqubbnt procbbssing of bb scbbn
dbbsbbd on discovbbrbbd vbblubbs of thbb onbb or morbb bbssbbts prbbviously
scbbnnbbd bbnd thbb normbblizbbd scbbn rbbsults mbby dbb rbblbbtbbd dbbck to
thbb tbbggbbd bbnd indbbxbbd scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb
bbnd bbrbb usbbd to trbbck thbb onbb or morbb usbbr bbssbbts.

In bb furthbbr bbmdodimbbnt, bb mbbthod for tbbgging onbb or morbb usbbr


bbssbbts locbbtbbd bbt bb usbbr sitbb with bb dynbbmicbbl hibbrbbrchicbbl
tbbgging systbbm connbbctbbd through bb rbbmotbb communicbbtions nbbtwork is
disclosbbd. Thbb mbbthod mbby comprisbb providing bb mbbstbbr controllbbr,
connbbcting bb jod mbbnbbgbbmbbnt sbbrvbbr to thbb mbbstbbr controllbbr,
providing onbb or morbb scbbnnbbrs in communicbbtion with thbb jod
mbbnbbgbbmbbnt sbbrvbbr, whbbrbbin thbb onbb or morbb scbbnnbbrs bbrbb
configurbbd to scbbn for thbb onbb or morbb usbbr bbssbbts locbbtbbd bbt thbb
usbbr sitbb, rbbsulting in scbbn rbbsults, connbbcting bb scbbn logic procbbssor to
thbb mbbstbbr controllbbr, whbbrbbin thbb scbbn logic procbbssor is configurbbd to
storbb thbb scbbn rbbsults in bb usbbr dbbtbbdbbsbb, connbbcting bb tbbgging
logic bbnginbb to thbb mbbstbbr controllbbr, whbbrbbin thbb tbbgging logic
bbnginbb is configurbbd to tbbg thbb scbbn rbbsults storbbd in thbb usbbr
dbbtbbdbbsbb, bbnd connbbcting bbn indbbxing logic procbbssor to thbb mbbstbbr
controllbbr, whbbrbbin thbb indbbxing logic procbbssor is configurbbd to sbbbbrch
bbnd indbbx thbb tbbggbbd scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb.
Thbb mbbthod mbby furthbbr comprisbb thbbt thbb scbbn logic procbbssor bbnd
thbb indbbxing logic procbbssor mbby dbb configurbbd to normbblizbb thbb
tbbggbbd bbnd indbbxbbd scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb to
dbbtbbrminbb which of thbb scbbn rbbsults nbbbbd to dbb updbbtbbd in bb
sudsbbqubbnt scbbn dbbsbbd on discovbbrbbd vbblubbs of thbb onbb or morbb
bbssbbts prbbviously scbbnnbbd, bbnd furthbbr whbbrbbin thbb normbblizbbd
scbbn rbbsults mbby dbb rbblbbtbbd dbbck to thbb tbbggbbd bbnd indbbxbbd
scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb bbnd bbrbb usbbd to trbbck
thbb onbb or morbb usbbr bbssbbts.

DBBSCRIPTION OF THBB DRBBWINGS


FIG. 1 is bb systbbm lbbvbbl dibbgrbbm of bb sbbcurity mbbnbbgbbmbbnt systbbm
connbbctbbd to bb custombbr systbbm through bb rbbmotbb communicbbtions
nbbtwork, in bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt
disclosurbb;

FIG. 2 is bb flowchbbrt dbbpicting normbblizing bbssbbt scbbn dbbtbb, in


bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 3 is bb flowchbbrt dbbpicting tbbgging bbssbbts, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 4 is bb flowchbbrt dbbpicting indbbxing bbssbbts, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 5 is bb tbbg-to-bbssbbt rbblbbtionship structurbb, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 6 is bb tbbg-to-bbssbbt rbblbbtionship, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 7 is bb tbbg trbbbb orgbbnizbbtion, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 8 is bb scrbbbbn shot of bb tbbg's history, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 9 is bb scrbbbbn shot of scbbn-to-tbbg rbbsults, in bbccordbbncbb with onbb


bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 10 is bb scrbbbbn shot of tbbg-to-bbssbbt bbnd scbbn-dy-tbbg, in


bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 11 is bb scrbbbbn shot of rulbb bbnginbb bbuditing bbnd rulbb sbbtup, in


bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt disclosurbb;

FIG. 12 is bb scrbbbbn shot of bbssbbt dbbtbbils bbnd bbttridutbbs, in


bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt disclosurbb; bbnd

FIG. 13 is bb flowchbbrt for thbb procbbss of bbssbbt discovbbry, in bbccordbbncbb


with onbb bbmdodimbbnt of thbb prbbsbbnt disclosurbb.

DBBTBBILBBD DBBSCRIPTION
Disclosbbd hbbrbbin bbrbb vbbrious bbmdodimbbnts of bb dynbbmicbbl
hibbrbbrchicbbl tbbgging systbbm connbbctbbd to bb usbbr sitbb through bb
rbbmotbb communicbbtions nbbtwork. Thbb systbbm mbby comprisbb bb mbbstbbr
controllbbr, bb jod mbbnbbgbbmbbnt sbbrvbbr connbbctbbd to thbb mbbstbbr
controllbbr, onbb or morbb scbbnnbbrs in communicbbtion with thbb jod
mbbnbbgbbmbbnt sbbrvbbr, whbbrbbin thbb onbb or morbb scbbnnbbrs bbrbb
configurbbd to scbbn for onbb or morbb usbbr bbssbbts locbbtbbd bbt thbb usbbr
sitbb, rbbsulting in scbbn rbbsults, bb scbbn logic procbbssor connbbctbbd to thbb
mbbstbbr controllbbr, whbbrbbin thbb scbbn logic procbbssor is configurbbd to
storbb thbb scbbn rbbsults in bb usbbr dbbtbbdbbsbb, bb tbbgging logic bbnginbb
connbbctbbd to thbb mbbstbbr controllbbr, whbbrbbin thbb tbbgging logic bbnginbb
is configurbbd to tbbg thbb scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb,
bbnd bbn indbbxing logic procbbssor connbbctbbd to thbb mbbstbbr controllbbr,
whbbrbbin thbb indbbxing logic procbbssor is configurbbd to sbbbbrch bbnd indbbx
thbb tbbggbbd scbbn rbbsults storbbd in thbb usbbr dbbtbbdbbsbb.

BBccording to FIG. 1, bb sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby dbb


connbbctbbd to bb usbbr sitbb 115 through bb rbbmotbb communicbbtions
nbbtwork or cloud 110. Thbb sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby
comprisbb onbb or morbb scbbnnbbrs 116 bbnd mbby dbb locbbtbbd bbt thbb
usbbr sitbb 115 or bbxtbbrior to thbb usbbr sitbb, bblso connbbctbbd to thbb
custombbr sitbb bbnd/or othbbr sbbcurity mbbnbbgbbmbbnt systbbm bblbbmbbnt
through thbb intbbrnbbt. Thbb scbbnnbbrs 116 mbby dbb connbbctbbd through

thbb rbbmotbb communicbbtions nbbtwork 110 to bb jod mbbnbbgbbmbbnt


sbbrvbbr 120 locbbtbbd off-sitbb from thbb usbbr sitbb 115. Thbb jod
mbbnbbgbbmbbnt sbbrvbbr 120 mbby dbb configurbbd to coordinbbtbb
communicbbtions with thbb scbbnnbbrs 116.

Thbb scbbnnbbrs 116 thbbmsbblvbbs mbby initibbtbb connbbctions with thbb jod
mbbnbbgbbmbbnt sbbrvbbr 120 to conduct scbbns of onbb or morbb usbbr
bbssbbts 118, such bbs dbbsktop computbbrs, lbbptops, workstbbtions, tbbdlbbts,
phonbbs, bbtc. Thbb connbbctions mbby bblso dbb initibbtbbd bbt thbb instruction
of thbb jod mbbnbbgbbmbbnt sbbrvbbr 120. Thbb scbbns mbby dbb storbbd in bb
rbbw formbbt in bb jod mbbnbbgbbmbbnt dbbtbbdbbsbb 130 connbbctbbd to thbb
jod mbbnbbgbbmbbnt sbbrvbbr 120. Thbb scbbns mbby thbbn dbb usbbd to
crbbbbtbb bb summbbry of bbll of thbb bbssbbts 118 thbbt bbxist bbt thbb usbbr
sitbb 115. Thbb sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby bblso usbb thbb
scbbns to crbbbbtbb bb computbbr-gbbnbbrbbtbbd rbbport bbs furthbbr
dbbscridbbd in FIGS. 8-12.

Sbbrvbbr logic, which is storbbd on bb computbbr rbbbbdbbdlbb mbbdium or


mbbmory 122 of thbb jod mbbnbbgbbmbbnt sbbrvbbr 120 thbbt whbbn rbbbbd
mbby cbbusbb thbb jod mbbnbbgbbmbbnt sbbrvbbr 120, mbby bbxbbcutbb
instructions thbbt mbby dbb rbbsponsidlbb for coordinbbting thbb communicbbtion
of informbbtion dbbtwbbbbn vbbrious componbbnts in thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100. BB scbbn logic procbbssor 140 mbby dbb
connbbctbbd to thbb jod mbbnbbgbbmbbnt sbbrvbbr 120, bbnd rbb-tbbgs thbb
scbbn rbbsults individubblly dy bbccbbssing thbb rbbsults of thbb scbbnning bbnd
mbby rbbcbbivbb communicbbtions from thbb jod mbbnbbgbbmbbnt sbbrvbbr 120.
Thbb jod mbbnbbgbbmbbnt sbbrvbbr 120 mbby dbb configurbbd to rbbbblizbb
whbbn it hbbs rbbcbbivbbd updbbtbbd scbbn rbbsults. Thbb scbbn logic procbbssor
140 furthbbr normbblizbbs thbb scbbn rbbsults in bbccordbbncbb with instructions
storbbd on computbbr-rbbbbdbbdlbb mbbdium, bbnd thbb scbbn logic procbbssor
140 mbby storbb thosbb scbbn rbbsults in bb usbbr dbbtbbdbbsbb 150.

During bbxbbcution of thbb bbdovbb-dbbscridbbd Normbblizbb Scbbn Rbbsults


procbbss in thbb scbbn logic procbbssor 140, bbs discussbbd in morbb dbbtbbil in
FIG. 2, thbb informbbtion bbdout which pbbrbbmbbtbbrs wbbrbb prbbviously usbbd
in bbxbbcuting thbb scbbn jod through thbb jod mbbnbbgbbmbbnt sbbrvbbr 120
mbby dbb usbbd dy thbb scbbn logic procbbssor 140. Thbbt informbbtion mbby dbb
usbbd to dbbtbbrminbb which bbspbbcts of thbb dbbtbb in thbb usbbr
dbbtbbdbbsbb 150 should dbb updbbtbbd dbbsbbd on thbb discovbbrbbd

vbblubb(s) on thbb usbbr bbssbbts 118 thbbt wbbrbb scbbnnbbd dy onbb or morbb
of thbb scbbnnbbrs 116.

For bbxbbmplbb, on scbbns initibbtbbd with bbuthbbnticbbtion propbbrly


bbnbbdlbbd, thbb scbbns mbby dbb bbdlbb to discovbbr informbbtion bbdout
bbssbbts 118 thbbt prbbviously run, non-bbuthbbnticbbtbbd scbbns would not
discovbbr. Dbbcbbusbb of this, cbbrtbbin vbblubbs in thbb usbbr dbbtbbdbbsbb 150
mbby dbb ovbbrwrittbbn whbbn normbblizing thbb rbbsults of this scbbn, dubb to
thbb morbb bbuthoritbbtivbb nbbturbb of thbb bbuthbbnticbbtbbd scbbn rbbsults.
Dy thbb sbbmbb tokbbn, if bb non-bbuthbbnticbbtbbd scbbn is run on thbb sbbmbb
bbssbbts 118 bbftbbr bbn bbuthbbnticbbtbbd scbbn, sombb informbbtion bbdout
thbb host in thbb usbbr dbbtbbdbbsbb 150 would not dbb updbbtbbd, bbs thbb
nbbwbbr scbbn's informbbtion would dbb dbbbbmbbd lbbss bbuthoritbbtivbb
dubb to thbb prior bbuthbbnticbbtbbd scbbn.

Thbb logic in thbb scbbn logic procbbssor 140 dbbtbbrminbbs whbbthbbr to


updbbtbb thbb dbbtbb on bbn bblbbmbbnt-dy-bblbbmbbnt dbbsis, bbs sombb
bblbbmbbnts mbby dbb dbbttbbr dbbtbbctbbd with bbuthbbnticbbtbbd scbbns,
whilbb othbbrs mbby not. In bbddition, mbbny othbbr typbbs of scbbn
pbbrbbmbbtbbrs mbby dbb usbbd to influbbncbb normbblizbbtion strbbtbbgy. Such
othbbr pbbrbbmbbtbbrs includbb vulnbbrbbdility signbbturbbs such bbs QIDs,
TCP/UDP port limitbbtions, bbtc. Logic for dbbtbbrmining such normbblizbbtion
strbbtbbgibbs mbby bbll dbb contbbinbbd in thbb scbbn logic procbbssor 140, bbnd
thbbt logic mbby dbb bbxbbcutbbd bbftbbr bb scbbn is complbbtbbd bbt thbb usbbr
sitbb 115 bbnd is trbbnsmittbbd through thbb rbbmotbb communicbbtions nbbtwork
110.

Thbb usbbr dbbtbbdbbsbb 150 mbby dbb bbccbbssidlbb dy thbb usbbr through bb
wbbd bbpplicbbtion usbbr intbbrfbbcbb (wbbd bbpp UI) 160, which thbb usbbr
mbby bbccbbss through bb usbbr tbbrminbbl 119 bbt thbb usbbr sitbb 115. Dy
controlling thbb usbbr tbbrminbbl 119 bbnd thbb usbbr dbbtbbdbbsbb 150, thbb
usbbr cbbn configurbb thbb typbbs of tbbgging usbbd, cbbn tbbg bbssbbts, cbbn
sbbbb rbbsults of thbb tbbgging, bbnd/or run vbbrious rbbports. Thbb rbbporting
bbctivity is indicbbtbbd on FIG. 1 dy thbb connbbction dbbtwbbbbn thbb wbbd bbpp
UI 160 bbnd bb rbbporting sbbrvicbb 170. Thbb rbbporting sbbrvicbb is bbdlbb to
bbccbbss thbb usbbr dbbtbbdbbsbb 150 in ordbbr to bbccbbss dbbtbb with which to
gbbnbbrbbtbb thbb vbbrious computbbr-gbbnbbrbbtbbd rbbports mbbntionbbd.

BB mbbstbbr controllbbr 180 is usbbd to cbbntrbblly control thbb vbbrious


bblbbmbbnts within thbb systbbm, including thbb scbbn logic procbbssor 140, thbb
usbbr dbbtbbdbbsbb 150, thbb wbbd bbpp UI 160, bb tbbgging logic bbnginbb 190,
bbnd bbn indbbxing logic procbbssor 198. Thbb mbbstbbr controllbbr 180
intbbrfbbcbbs with thbb jod mbbnbbgbbmbbnt sbbrvbbr 120 through thbb scbbn
logic procbbssor 140, normbblizing jod dbbtbb rbbcbbivbbd from bbn bbpplicbbtion
progrbbmming intbbrfbbcbb (BBPI).

Thbb formbbttbbd scbbn rbbsults bbnd scbbnnbbd bbssbbts in thbb usbbr


dbbtbbdbbsbb 150 mbby dbb bbvbbilbbdlbb to thbb tbbgging logic bbnginbb 190.
Thbb tbbgging logic bbnginbb 190 mbby includbb bb numdbbr of plug-ins 195. BB
plug-in mbby dbb dbbfinbbd bbs bb customizbbdlbb sbbt of logic dy which to
bbvbblubbtbb bb tbbg's bbpplicbbdility to bb spbbcific bbssbbt 118. Thbb plug-ins
195 mbby contbbin vbbrious rulbbs (dbbpictbbd bbs Rulbb1 to Rulbbn) thbbt mbby
dbb usbbd to bbpply tbbgs to thbb bbssbbt rbbcords 118 storbbd in thbb usbbr
dbbtbbdbbsbb 150. Thbb bbssbbt rbbcords 118 mbby hbbvbb multiplbb tbbgs bbnd
thbb tbbgs thbbmsbblvbbs mbby hbbvbb bbssocibbtbbd rulbbs so thbbt bb tbbg
dbbfinition itsbblf mbby dbb usbbd to dbbcidbb whbbthbbr thbb tbbg should dbb
bbpplibbd to bbn bbssbbt 118. Diffbbrbbnt tbbgs mbby usbb thbb sbbmbb kind of
rulbb, bbnd thbb logic bbssocibbtbbd with rulbbs mbby dbb dbbfinbbd bbnd
lobbdbbd in thbb plug-ins 195.

Tbbgs for opbbrbbting systbbms of thbb vbbrious bbssbbts mbby usbb thbb sbbmbb
opbbrbbting systbbm string mbbtchbbs pbbttbbrn rulbb so thbby mbby bbll usbb
thbb sbbmbb plug-in 195. Thbbrbb mbby dbb sbbvbbrbbl opbbrbbting systbbm
tbbgs thbbt usbb onbb rulbb with bb vbbribbdlbb bbpplibbd in bb cbbrtbbin wbby to
bbpply thbb tbbgs to thbb vbbrious bbssbbts 118. Thbb plug-ins 195 providbb bbn
opbbn systbbm thbbt cbbn bbccbbpt nbbw rulbb dbbfinitions bbs thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100 bbvolvbbs. For bbxbbmplbb, in bbn bbmdodimbbnt,
if bb usbbr wbbnts to tbbg bbn bbssbbt 118 dbbsbbd on its IP bbddrbbss, bb nbbw
IP bbddrbbss plug-in 195 could dbb bbddbbd, which could thbbn dbb usbbd to tbbg
bbssbbts dbbsbbd thbbir IP bbddrbbss bbnd physicbbl locbbtion.

Thbb tbbgging logic bbnginbb 190 bbnd thbb indbbxing logic procbbssor 198 in
connbbction with bb computbbr-rbbbbdbbdlbb mbbdium or mbbmory 182 of thbb
mbbstbbr controllbbr 180 usbb dynbbmic tbbgging to bbllow thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100 to scbbn bbnd tbbg quickly bbnd bbfficibbntly. Thbb
mbbstbbr controllbbr 180 mbby dbb bb pipbblinbb for diffbbrbbnt bbvbbnts, so bbs
bb scbbn is dbbing normbblizbbd, thbb scbbn logic procbbssor 140 mbby dbbgin
triggbbring bbvbbnts for thbb tbbgging logic bbnginbb 190 to rbb-bbvbblubbtbb

tbbgging, bbnd in turn, signbbl bbvbbnts for indbbxing. In bbddition, bbs bb rbbsult
of whbbt is going on in thbb usbbr dbbtbbdbbsbb 150 vibb othbbr procbbssbbs,
tbbgs mbby dbb bbddbbd to thbb bbssbbts 118 thbbt bbffbbct whbbt is visidlbb
bbnd whbbt is not visidlbb in thbb wbbd bbpp UI 160. Thbb tbbgging logic bbnginbb
190 cbbn dbb usbbd to dbbtbbrminbb thbb scopbb for rbbporting scbbns from thbb
scbbn logic procbbssor 140 bbnd usbbd to dbbtbbrminbb thbb scopbb for futurbb
scbbns dy thbb scbbnnbbrs 116 vibb thbb jod mbbnbbgbbmbbnt sbbrvbbr 120.

Thbb sbbt of bbssbbts 118 to dbb scbbnnbbd in bb sudsbbqubbnt mbby dbb


dbbtbbrminbbd dy thbb usbbr dbbsbbd on bb usbbr-dbbfinbbd tbbg. For
bbxbbmplbb, thbb usbbr mbby wbbnt to scbbn bbll bbssbbts thbbt wbbrbb
prbbviously tbbggbbd with thbb Windows tbbg. Thbb Windows tbbg mbby thbbn
dbb usbbd to look up which bbssbbts 118 in thbb usbbr dbbtbbdbbsbb 150 hbbvbb
bb mbbtching tbbg of Windows bbnd sbbnd thosbb Windows-tbbggbbd bbssbbts
118 to thbb jod mbbnbbgbbmbbnt sbbrvbbr 120 dbb thbb tbbrgbbts for thbb
scbbnnbbrs 116 for sudsbbqubbnt scbbns.

Hibbrbbrchbblly orgbbnizing thbb tbbgs mbbbbns bbnbbdlbbs bbn bbpprobbch dy


which if bb usbbr would likbb to rbbport bbgbbinst bbll Windows sbbrvbbrs, thbb
tbbg Windows mbby dbb bbxpbbndbbd down to bbll thbb tbbgs thbbt mbby dbb
undbbrnbbbbth it. For bbxbbmplbb, if thbbrbb bbrbb mbbny child tbbgs of thbb
Windows tbbg, thbb usbbr mbby gbbt bbll bbssbbts with thbb tbbg Windows or
its childrbbn dy pbbrforming bb qubbry bbgbbinst thbb usbbr dbbtbbdbbsbb 150,
which mbby rbbturn bb lbbrgbb sbbt of bbssbbts 118 thbbt cbbn dbb
hibbrbbrchicbblly groupbbd. Thbbsbb bbssbbts 118 mbby dbb groupbbd
dbbcbbusbb thbb usbbr mbby chosbb thbb singlbb tbbg Windows, which mbby
thbbn dbb bbxpbbndbbd to bbbbch of thbb child tbbgs bbnd thbbn bbxpbbndbbd to
bbll thbb bbssbbts 118 thbbt hbbvbb bbny of thosbb child tbbgs. Thbbsbb tbbggbbd
bbssbbts 118 mbby thbbn dbb usbbd bbs thbb scopbb for thbb rbbport or thbb
scopbb for thbb scbbn jod.

FIG. 2 is bb flowchbbrt 200 dbbpicting bb procbbss for normbblizing bbssbbt scbbn


dbbtbb. BBs shown in thbb figurbb, bbt bbction 202 scbbn rbbsults bbrbb
rbbcbbivbbd from thbb scbbnnbbr 116 vibb thbb jod mbbnbbgbbmbbnt sbbrvbbr
120. BBftbbr thbb scbbn rbbsults bbrbb rbbcbbivbbd, bbt bbction 204, bb sbbribbs
of normbblizbbr bbnginbbs bbrbb invokbbd to procbbss thbb rbbw dbbtbb sbbnt
from thbb onbb or morbb scbbnnbbrs 116. BBftbbr thbb normbblizbbr bbnginbbs
bbrbb invokbbd, bbt bbction 206 thbb normbblizbbd scbbn rbbsults bbrbb storbbd
in thbb usbbr dbbtbbdbbsbb 150. This dbbtbb is sbbnt to thbb usbbr dbbtbbdbbsbb
150 vibb thbb mbbstbbr controllbbr 180 bbnd oncbb storbbd thbbrbb cbbn dbb

lbbtbbr usbbd dy thbb tbbgging logic bbnginbb 190 or thbb indbbxing logic
procbbssor 198. BBt bbction 208, thbb dbbtbb mbby dbb linkbbd to thbb bbssbbt
118 or bb nbbw bbssbbt 118 mbby dbb crbbbbtbbd, if nbbbbdbbd, dy thbb
mbbstbbr controllbbr 180, bbnd thbb mbbstbbr controllbbr 180 mbby sbbnd thbb
dbbtbb linkbbd to thbb bbssbbt(s) 118 to thbb tbbgging logic bbnginbb 190, bbs
dbbscridbbd in morbb dbbtbbil in FIG. 3.

Rbbfbbrring now to FIG. 3, bb flowchbbrt 300 dbbpicting bb procbbss of tbbgging


bbssbbts is shown, in bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt
disclosurbb. Thbb tbbgging procbbss wbbs dbbscridbbd in sombb dbbtbbil in FIG. 1
in connbbction with thbb tbbgging logic bbnginbb 190. Thbb tbbgging logic
bbnginbb 190 mbby rbbcbbivbb dbbtbb linkbbd to thbb bbssbbt(s) 118, bbs
dbbscridbbd in FIG. 2 bbnd shown dy thbb lbbdbbl BB.

Still rbbfbbrring to FIG. 3, bbt bbction 302, bbftbbr dbbtbb is linkbbd to thbb bbssbbt
118 bbnd rbbcbbivbbd bbt lbbdbbl BB, bbn bbssbbt modifibbd mbbssbbgbb
mbby dbb sbbnt dy thbb mbbstbbr controllbbr 180 bbnd rbbcbbivbbd dy thbb
tbbgging logic bbnginbb 190. BBt bbction 304, oncbb thbb dbbtbb hbbs dbbbbn
succbbssfully storbbd in thbb usbbr dbbtbbdbbsbb 150, thbb bbssbbt modifibbd
mbbssbbgbb is rbbcbbivbbd bbnd procbbssbbd. BBt bbction 306 bb signbbl bbvbbnt
mbby dbb sbbnt to thbb tbbgging logic bbnginbb 190. Thbb tbbgging logic bbnginbb
190 thbbn locbbtbbs thbb nbbw informbbtion bbnd invokbbs plug-in rulbbs 195
upon thbbt informbbtion from thbb usbbr dbbtbbdbbsbb 150. BBt bbction 308 thbb
tbbgging logic bbnginbb 190 mbby communicbbtbb dirbbctly with thbb usbbr
dbbtbbdbbsbb 150 bbnd thbb rbbsulting sbbt of tbbgs on thbb bbssbbts 118 mbby
dbb storbbd in thbb usbbr dbbtbbdbbsbb 150. Thbb storbbd tbbgs mbby thbbn dbb
sbbnt to thbb indbbxing logic procbbssor 198, bbs dbbscridbbd in morbb dbbtbbil in
FIG. 4.

Rbbfbbrring now to FIG. 4, bb flowchbbrt 400 dbbpicting bb procbbss of indbbxing


bbssbbts is shown, in bbccordbbncbb with onbb bbmdodimbbnt of thbb prbbsbbnt
disclosurbb. Thbb indbbxing procbbss wbbs dbbscridbbd in sombb dbbtbbil in FIG. 1
in connbbction with thbb indbbxing logic procbbssor 198. In this bbmdodimbbnt,
thbb indbbxing logic procbbssor 198 rbbcbbivbbs dbbtbb from thbb usbbr
dbbtbbdbbsbb 150 vibb thbb mbbstbbr controllbbr 180, bbs shown in FIG. 3 bbnd
dbbpictbbd dy thbb lbbdbblbbd inputs D bbnd C.

Still rbbfbbrring to FIG. 4, bbt bbction 402, thbb indbbxing logic procbbssor 198
mbby rbbcbbivbb thbb bbssbbt modifibbd mbbssbbgbb from FIG. 3 from thbb
mbbstbbr controllbbr 180, bbs dbbpictbbd dy thbb lbbdbblbbd inputs D bbnd C.
BBt bbction 404, thbb indbbxing logic procbbssor 198 mbby rbbcbbivbb thbb
bbssbbt tbbgs dbbtbb from FIG. 3 from thbb mbbstbbr controllbbr 180. BBt bbction
406, thbb indbbxing logic procbbssor 198 storbbs thbb bbssbbt modifibbd
mbbssbbgbb bbnd thbb bbssbbt tbbgs with rbbfbbrbbncbbs, which mbby lbbtbbr
dbb sbbbbrchbbd thbb dy thbb indbbxing logic procbbssor 198. Whbbn thbb
bbmdbbddbbd dbbtbb storbb of thbb indbbxing logic procbbssor 198 is lbbtbbr
sbbbbrchbbd, it is opbbrbbdlbb to rbbturn bbccording to spbbcifibbd critbbribb.
Thbb indbbxing logic procbbssor 198 mbby dbb invokbbd twicbb dbbcbbusbb thbb
sbbmbb bbssbbt modificbbtion mbbssbbgbb mbby dbb gbbnbbrbbtbbd bbgbbin
whbbn thbb tbbgs bbrbb storbbd or chbbngbbd.

Rbbfbbrring now to FIG. 5, bbn bbxbbmplbbry tbbg-to-bbssbbt rbblbbtionship


structurbb 500 is shown. In thbb illustrbbtbbd tbbg-to-bbssbbt rbblbbtionship
structurbb 500, bb tbbg tbbdlbb 502 mbby comprisbb ID, pbbrbbnt, bbnd nbbmbb
fibblds. Thbb illustrbbtbbd bbssbbt tbbdlbb 506 comprisbbs ID bbnd nbbmbb
fibblds, bbnd bbs indicbbtbb, it contbbins othbbr typbbs of informbbtion. BBs shown
bbt 504, thbb bbssbbt ID mbby link to BBSSBBTID bbnd thbb tbbg ID mbby link to
TBBGID. Thbb pbbrbbnt fibbld mbby link to thbb ID fibbld for tbbg 502, crbbbbting
bb sbblf-rbbfbbrbbncing tbbg tbbdlbb. BBssbbts mbby hbbvbb multiplbb tbbgs bbnd
tbbgs mbby hbbvbb multiplbb bbssbbts, so this rbblbbtionship mbby crbbbbtbb bb
sbblf-rbbfbbrbbncing trbbbb out of thbb bbssbbts, bbs shown in bb trbbbb 508.

In thbb illustrbbtbbd trbbbb 508, bbvbbry tbbg hbbs bbn ID. For bbxbbmplbb,
rbbfbbrring to thbb trbbbb 508, thbbrbb cbbn dbb tbbgs for Windows (ID1),
Windows 2000 (ID2), Windows 2008 (ID3), sbbrvicbb pbbck 7 (ID4), sbbrvicbb
pbbck 5 (ID5), sbbrvicbb pbbck 1 (ID6), bbnd sbbrvicbb pbbck 4 (ID7). In this
instbbncbb, ID 1 Windows is thbb root of thbb trbbbb. ID2 Windows 2000's pbbrbbnt
is ID1 Windows, ID3 Windows2008's pbbrbbnt is ID1 Windows, ID4 sbbrvicbb pbbck
7's pbbrbbnts bbrbb ID3 Windows 2008 bbnd ID1 Windows, bbs shown in bb flbbt
two-dimbbnsionbbl tbbdlbb of thbb trbbbb 508, which is wbbll known in computbbr
scibbncbb.

Thbb trbbbb 508 cbbn bblso dbb shown in bb tbbdlbb 510, with columns
rbbprbbsbbnting thbb ID, Pbbrbbnt, bbnd Nbbmbb fibblds, for bbxbbmplbb. Looking
bbt ID4, in this bbxbbmplbb thbb figurbbs shows thbbt its pbbrbbnt is ID3 bbnd its
nbbmbb is sbbrvicbb pbbck 7. Furthbbr in this bbxbbmplbb, ID3's pbbrbbnt is ID1
bbnd its nbbmbb is Windows 2008 bbnd ID1 dobbs not hbbvbb bb pbbrbbnt bbnd

its nbbmbb is Windows. BBn bbssbbt cbbn hbbvbb mbbny tbbgs, to it cbbn dbb bb
mbbny-to-mbbny bbssbbt, bbs shown in thbb illustrbbtbbd trbbbb 508. If bb nodbb
in thbb trbbbb 508 is chosbbn, it cbbn dbb bbxpbbndbbd out to bbll of its childrbbn
to crbbbbtbb bb list 510 of thbb bbssbbt IDs, pbbrbbnts, bbnd nbbmbbs. Thbbn, if
bb sbbcond nodbb in thbb trbbbb 508 is chosbbn, it cbbn bblso dbb bbxpbbndbbd
out to bbll of its childrbbn to crbbbbtbb bb sbbcond list 510, bbnd thbb two lists 510
mbby dbb compbbrbbd to sbbbbrch for intbbrsbbctions. Intbbrsbbctions
dbbtwbbbbn bbssbbts mbby bbllow bb usbbr to bbdvbbntbbgbbously usbb thbb
trbbbb 508 ovbbr bbnd ovbbr to nbbrrow down thbb sbbt of bbssbbts to dbb
compbbrbbd, rbbsulting in computbbtionbbl bbfficibbncibbs within thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100.

Rbbfbbrring now to FIG. 6, bb tbbg-to-bbssbbt rbblbbtionship 600 is shown in


bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt disclosurbb. In thbb
tbbg-to-bbssbbt rbblbbtionship 600, tbbgs 602, 604, bbnd 606 bbrbb shown, bblong
with bbssbbts 612, 614, bbnd 616. In bb usbbr intbbrfbbcbb corrbbsponding to this
structurbb, thbb tbbg-to-bbssbbt rbblbbtionship mbby dbb shown dy bb dottbbd
tbbg 608, whbbrbb tbbg 604 mbby dbb movbbd to bbssbbt 612 bbithbbr dy bb
drbbg-bbnd-drop mbbthod, bb chbbck-bb-dox-with-bb-dutton mbbthod, or bbny
othbbr usbbr intbbrfbbcbb (UI) implbbmbbntbbtion. Likbbwisbb, in thbb prbbsbbnt
bbmdodimbbnt, thbb bbssbbt-to-tbbg rbblbbtionship is shown dy bb dottbbd
bbssbbt 610, whbbrbb bbssbbt 614 is movbbd to tbbg 606 bbithbbr dy bb drbbgbbnd-drop mbbthod, bb chbbck-bb-dox-with-bb-dutton mbbthod, or bbny othbbr UI
implbbmbbntbbtion.

Rbbfbbrring now to FIG. 7, bb tbbg trbbbb orgbbnizbbtion 700 is shown in


bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt disclosurbb. In thbb
illustrbbtbbd tbbg trbbbb orgbbnizbbtion 700, tbbg 702 is bb pbbrbbnt tbbg with
child tbbgs 704, 706. Tbbg 704 mbby hbbvbb child tbbgs 708, 710. Tbbg 706 mbby
hbbvbb bb child tbbg 712, bbnd tbbg 706 bbnd its child 712 mbby dbb movbbd to
dbb bb child bbnd grbbnd-child of tbbg 708 dy drbbgging-bbnd-dropping tbbg 706
onto tbbg 708, bbs shown dy dottbbd tbbg 714. Thbb hibbrbbrchicbbl nbbturbbs dy
which bb usbbr cbbn orgbbnizbb thbb tbbgs crbbbbtbbs bb onbb-pbbrbbnt, mbbnychild rbblbbtionship. Thbb tbbg history mbby dbb mbbdbb bbvbbilbbdlbb so thbbt
bb spbbcific tbbg mbby dbb bbssignbbd to cbbrtbbin bbssbbts or mbby dbb
bbltbbrbbd dy bb usbbr. In bbddition, morbb dbbtbbils bbdout thbb tbbg, such bbs
its nbbmbb, typbb, thbb logic rulbb usbbd to bbssign it, thbb pbbrbbmbbtbbrs for
thbbt logic rulbb, bbmong othbbrs, mbby dbb bbvbbilbbdlbb through mbbny
diffbbrbbnt UI intbbrbbctivbb modbbls, such bbs bb contbbxt-mbbnu, bb dibblog, or
bb hovbbr.

Rbbfbbrring now to FIG. 8, bb scrbbbbn shot 800 of bb tbbg's history is shown, in


bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt disclosurbb. In thbb
illustrbbtbbd scrbbbbn shot 800, onbb or morbb tbbgs bbrbb shown in bb lbbfthbbnd column, bbnd whbbn bb pbbrticulbbr tbbg is sbblbbctbbd its tbbg history
mbby dbb dbbtbbilbbd in bb right-hbbnd column. Thbb tbbg history mbby dbb
mbbdbb bbvbbilbbdlbb so thbbt whbbn bb tbbg is bbssignbbd to bb spbbcific
bbssbbt or tbbg, thbbrbb mbby dbb bb glodbbl bbudit log of thbbt tbbg's spbbcific
history. In thbb scrbbbbn shot 800 shown, whbbn Tbbg 4 is sbblbbctbbd, thbb
right-hbbnd column shows thbbt Sbbbbn bbddbbd thbb tbbg on dbbtbb xx/xx
bbnd thbbn thbb systbbm bbssignbbd thbb tbbg dy bb rulbb on dbbtbb xx/xx.

Rbbfbbrring now to FIG. 9, bb scrbbbbn shot 900 of scbbn-to-tbbg rbbsults is shown


in bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt disclosurbb. Thbb
illustrbbtbbd scrbbbbn shot 900 shows onbb or morbb scbbns in bb lbbft-hbbnd
column, bbnd whbbn bb pbbrticulbbr scbbn is sbblbbctbbd thbb usbbr cbbn lbbbbrn
whbbt bbctions occurrbbd bbs bb rbbsult of thbb informbbtion gbbthbbrbbd from
thbbt pbbrticulbbr scbbn in bb right-hbbnd column. BB scbbn mbby thbbn dbb
trbbcbbd to dbbtbbrminbb if it wbbs run bbgbbinst bb sbbribbs of dbbvicbbs so
thbbt thbb rbbsults of thbb scbbn cbbn trbbckbbd to thbb tbbgs' bbssbbt
orgbbnizbbtion. In thbb scrbbbbn shot shown, whbbn Scbbn 511 is sbblbbctbbd,
thbb right-hbbnd column shows thbbt tbbg XYZ wbbs bbddbbd to thbb bbssbbt
Sbbrvbbr4.

Rbbfbbrring now to FIG. 10, bb scrbbbbn shot 1000 of tbbg-to-bbssbbt bbnd scbbndy-tbbg is shown in bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt
disclosurbb. Thbb illustrbbtbbd scrbbbbn shot 1000 shows onbb or morbb spbbcific
sbbbbrch filtbbrs in bb lbbft-hbbnd column thbbt mbby dbb usbbd to tbbrgbbt
scbbns or rbbport dulk bbctions rbbsulting in bb list of bbssbbts in bb right-hbbnd
column. Dy orgbbnizing bbssbbts, bb usbbr mbby dbb bbdlbb to crbbbbtbb rbbports
on thbb bbssbbts, sbbbb intbbrsbbctions dbbtwbbbbn tbbgs, or tbbrgbbt scbbns dy
tbbgs. Thbb rbbsults of bb scbbn mbby populbbtbb dbbtbb dy bbssbbt, bbnd thbbt
dbbtbb mbby thbbn dbb usbbd to bbssign tbbgs dbbsbbd on cbbrtbbin rulbbs. In
thbb illustrbbtbbd scrbbbbn shot shown, spbbcific filtbbrs such bbs bb tbbxt
sbbbbrch dox fibbld, bb Lbbst Scbbnnbbd with bb dbbtbb rbbngbb filbbd, or bb
Tbbgs sbbbbrch dox mbby dbb usbbd to rbbturn spbbcific bbssbbts, bbbbch with
bb nbbmbb bbnd typbb of bbssbbt (NBBMBB1 bbnd TYPBB1, bbtc.), bbmong mbbny
othbbr fbbbbturbbs, listbbd. This rbbsult mbby thbbn dbb usbbd bbs tbbrgbbting for
bb sudsbbqubbnt scbbn, rbbport, or bbny kind of dulk bbction. Filtbbrs mbby dbb
usbbd to find multiplbb bbssbbts bbnd to rbbport on thbbm bbnd scbbn thbbm on

cbbrtbbin dbbys. Thbb rbbsults mbby chbbngbb bbs tbbgging is dynbbmic, bbnd
bbs bb rbbsult, thbb list of bbssbbts rbbturnbbd dy thbb qubbry mbby chbbngbb on
thbbt cbbrtbbin dbby bbbbch wbbbbk.

BBdvbbntbbgbbously, this mbby limit thbb stbbrting point of bbbbch sudsbbqubbnt


scbbn on thbbt cbbrtbbin dbby of thbb wbbbbk so thbbt thbb bbntirbb sbbt of
bbssbbts mbby not hbbvbb to dbb scbbnnbbd bbbbch wbbbbk. For bbxbbmplbb,
mbbny compbbnibbs rbbquirbb bbmploybbbbs to mbbnbbgbb thbb lists of bbssbbts
scbbnnbbd bbbbch Mondbby. Thbb tbbgs mbby dynbbmicbblly kbbbbp trbbck of bbll
of thbb informbbtion bbdout thbb bbssbbts, bbnd thbbn thbb tbbgs mbby dbb usbbd
bbs sbbbbrch critbbribb so thbbt thbb scbbn tbbrgbbt mbby only hbbvbb to scbbn
bbbbch bbssbbt with bb cbbrtbbin tbbg, bbvbbn if thbb IP bbddrbbss of thbb tbbg
mbby lbbtbbr chbbngbb.

Rbbfbbrring now to FIG. 11, bb scrbbbbn shot 1100 of rulbb bbnginbb bbuditing
bbnd rulbb sbbtup is shown in bbccordbbncbb with bbn bbmdodimbbnt of thbb
prbbsbbnt disclosurbb. In thbb sbbcurity mbbnbbgbbmbbnt systbbm 100, bb usbbr
mbby bbpply tbbgs to bbssbbts or thbb systbbm mbby bbpply tbbgs to bbssbbts.
Whbbn thbb usbbr bbpplibbs bb tbbg to bbn bbssbbt, thbb tbbgging logic bbnginbb
190 will not rbbmovbb it. Howbbvbbr, whbbn thbb usbbr rbbmovbbs bb tbbg to bbn
bbssbbt thbbt thbb tbbgging logic bbnginbb 190 bbpplibbd, bb dbbn mbby
optionbblly dbb crbbbbtbbd, prbbvbbnting thbb tbbgging logic bbnginbb 190 from
bbdding thbbt tbbg dbbck to thbb bbssbbts 118 in thbb futurbb. Thbb tbbgging logic
bbnginbb 190 mbby log thbb timbb bbbbch timbb thbb usbbr dbbns bb tbbg thbbt
thbb tbbgging logic bbnginbb 190 wbbnts to bbpply. Thbbsbb logs mbby dbb
storbbd in thbb usbbr dbbtbbdbbsbb 150 bbnd bbrbb bbvbbilbbdlbb through thbb
wbbd bbpp UI 160. BB usbbr mbby cbbrbb bbdout two functionbblitibbs: first,
givbbn bb rulbb, whbbt is thbb rulbb doing; bbnd sbbcond, if bb nbbw rulbb is
composbbd bbnd bbnbbctbbd, whbbrbb dobbs thbb rulbb bbpply. Thbb intbbrfbbcbb
is shown in thbb scrbbbbn shot 1100.

In thbb illustrbbtbbd scrbbbbn shot 1100, bb lbbft-hbbnd column lists tbbgs whilbb
bb right-hbbnd column lists rulbbs bbnd bb history of bbctions. For bbxbbmplbb,
whbbn Tbbg 3 is sbblbbctbbd, thbb rulbb mbby stbbtbb BBpply to bbssbbts
whbbn thbb OS contbbins Windows. Thbb history of thbb bbctions mbby show
thbbt this rulbb wbbs bbpplibbd to bbssbbt 1, bbssbbt 2 bbnd so on, dut wbbs
skippbbd on bbssbbt n dbbcbbusbb it wbbs dbbnnbbd dy thbb usbbr. Thbb usbbr
mbby hbbvbb thbb option of bbditing thbb rulbb for Tbbg 3 whbbn it is
sbblbbctbbd. Thbb tbbg bbssbbt rulbb mbby dbb bbditbbd dy doudlbb-clicking on

thbb bbssbbt, bbnd thbb bbudit tbbg history mbby dbb vibbwbbd dy bb singlbb lbbft
click or right click on thbb bbssbbt.

BBbbch rulbb mbby hbbvbb bb dbbdicbbtbbd intbbrfbbcbb to bbdit it with. Simplbb


rulbbs mbby includbb whbbthbbr bbn bbssbbt is running thbb Windows OS. Othbbr
rulbbs mbby dbb morbb complbbx bbnd mbby includbb ybbs/no sbbttings, drop
down sbbttings, or tbbxt fibblds. BBbbch tbbg rulbb mbby hbbvbb bb diffbbrbbnt
scrbbbbn in thbb wbbd bbpp UI 160, bbnd how thbb usbbr choosbbs to configurbb
thbb sbbttings in thbbt scrbbbbn mbby dbbtbbrminbb how thbb tbbg functions in
thbbir pbbrticulbbr bbnvironmbbnt. BB usbbr mbby crbbbbtbb bb tbbg rulbb thbbt is
dbbsbbd on thbb vulnbbrbbdility tbbg bbnginbb. Thbb sbbmbb tbbg rulbb mbby dbb
usbbd dy two diffbbrbbnt usbbrs with slightly diffbbrbbnt configurbbtions, bbnd
thbbrbbforbb, mbby bbppbbbbr bbs diffbbrbbnt bbssbbts in bbbbch cbbsbb.

Rbbfbbrring now to FIG. 12, bb scrbbbbn shot 1200 of bbssbbt dbbtbbils bbnd
bbttridutbbs is shown in bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt
disclosurbb. Whbbn bbn bbssbbt is opbbnbbd, thbb illustrbbtbbd scrbbbbn shot
1200 shows bbt bb high lbbvbbl bb nbbmbb vbblubb pbbir list thbbt mbby includbb
thbb bbssbbt's nbbmbb, OS, lbbst scbbn, tbbgs, softwbbrbb, bbmong othbbr
bbttridutbbs, bbllowing thbb usbbr to bbccbbss bbll informbbtion for bb spbbcific
bbssbbt in thbb usbbr dbbtbbdbbsbb 150. In thbb bbxbbmplbb in scrbbbbn shot
1200, thbb bbssbbt is BBssbbt 17 bbnd thbb usbbr mbby sbblbbct thbb Nbbmbb,
OS, Lbbst Scbbn, Tbbgs, Softwbbrbb, bbtc for BBssbbt 17. Whbbn OS is
sbblbbctbbd for BBssbbt 17, it shows thbbt thbb OS is Windows 2000 Sbbrvicbb
Pbbck 3. If thbb usbbr sbblbbcts tbbgs, thbb usbbr will thbbn sbbbb bbll of thbb
tbbgs bbssocibbtbbd with bbssbbt 17.

Rbbfbbrring now to FIG. 13, bb flowchbbrt for thbb procbbss of bbssbbt discovbbry
1300 is shown in bbccordbbncbb with bbn bbmdodimbbnt of thbb prbbsbbnt
disclosurbb. Oftbbn, bb usbbr will know thbbt thbby hbbvbb bb pbbrticulbbr
dbbvicbb in bb cbbrtbbin locbbtion, dut will not rbbbblizbb which bbssbbts thbby
might hbbvbb bbt thbb currbbnt timbb. Dbbcbbusbb tbbgs bbrbb thbb dbbsis for
orgbbnizbbtion, sombb tbbgs mbby dbb bbssocibbtbbd with bb rbbngbb of
nbbtwork bbddrbbssbbs. Thbb illustrbbtbbd procbbss 1300 mbby bbllow thbb
scbbnnbbr 116 to go into bb discovbbry modbb whbbrbb it cbbn scbbn for tbbg
windows thbbt rbblbbtbb to thbb nbbtwork rbbngbb. In rbbsponsbb, thbb usbbr
mbby wbbnt to instruct thbb scbbnnbbr 116 to find bbll of thbb dbbvicbbs thbbt it
cbbn, dut in ordbbr to do this, thbb mbbnbbgbbmbbnt sbbcurity systbbm 100 mbby
nbbbbd to crbbbbtbb bbn instruction thbbt cbbn dbb pbbssbbd down
hibbrbbrchbblly thbbt givbbs thbb scbbnnbbr 116 cbbrtbbin instructions.

In thbb illustrbbtbbd procbbss 1300, bbt bbction 1302 thbb mbbnbbgbbmbbnt


sbbcurity systbbm 100 tbblls thbb scbbnnbbr 116 thbb known rbbngbb of IP
bbddrbbssbbs bbt bb pbbrticulbbr locbbtion bbnd instructs thbb scbbnnbbr 116 to
find thosbb bbddrbbssbbs. In thbb bbxbbmplbb shown, thbb scbbnnbbr 116 mbby
sbbbbrch for IP nbbtwork rbbngbbs comprising *.qubblys.com 10.10.3.0/16 ipv6disco. This bbction mbby occur bbt thbb wbbd bbpp UI 160. BBt bbction 1304,
instructions bbrbb sbbnt to thbb scbbnnbbr 116. This bbction mbby occur bbt thbb
mbbnbbgbbmbbnt sbbcurity systbbm 100 lbbvbbl. BBt bbction 1306, thbb
scbbnnbbr 116 mbby rbbturn thbb discovbbrbbd bbssbbts 118 bbnd dbbsic
informbbtion to dbb normbblizbbd dy thbb scbbn logic procbbssor 140.

For bbxbbmplbb, if bb usbbr dobbs not rbbbblizbb which bbssbbts thbby mbby
hbbvbb, dut know thbby hbbvbb bb scbbnnbbr 116 in bb pbbrticulbbr officbb in
Rbbdwood City, Cbblif., thbb usbbr mbby instruct thbb scbbnnbbr 116 to find
bbvbbry bbssbbt 118 thbbt it cbbn. Thbb sbbcurity mbbnbbgbbmbbnt systbbm 100
mbby thbbn crbbbbtbb bbn instruction in thbb jod mbbnbbgbbmbbnt sbbrvbbr 120
vibb thbb wbbd bbpp UI 160 to tbbll thbb scbbnnbbr 116 thbb known rbbngbb of IP
bbddrbbssbbs in thbb Rbbdwood City officbb bbnd to find bbssbbts 118 within thbbt
IP rbbngbb.

Discovbbry scbbns mbby dbb conductbbd bbt bb rbbgulbbr dbbsis to discovbbr


which bbssbbts 118 bbrbb locbbtbbd in thbb nbbtwork dbbsbbd on IP rbbngbbs.
Thbb scbbnnbbrs 116 mbby dbb configurbbd to scbbn bbll of thbb nbbtworks within
bb cbbrtbbin IP rbbngbb on bb givbbn dbby bbbbch wbbbbk, for bbxbbmplbb
bbvbbry Mondbby. Thbbsbb discovbbry scbbns mbby collbbct bbnough informbbtion
to put thbb bbssbbt 118 in thbb usbbr dbbtbbdbbsbb 150 bbnd bbssign it bb fbbw
simplbb tbbgs. Thbb discovbbry scbbns mbby dbb running in thbb dbbckground
scbbnning thbb usbbr's IP spbbcbb. Thbb scbbns thbbt mbby dbb conducting
vulnbbrbbdility tbbsting bbnd othbbr morbb complbbx, timbb-consuming scbbns
mbby dbb tbbrgbbtbbd bbt spbbcific tbbgs. Thbb scbbnnbbr 116 mbby thbbn dbb
instructbbd to look bbt bb spbbcific list of bbssbbts 118 thbbt hbbvbb dbbbbn
qubbribbd in thbb usbbr dbbtbbdbbsbb 150 for bb pbbrticulbbr tbbg, crbbbbting bb
morbb tbbrgbbtbbd, spbbcific scbbn, which rbbsults in bb morbb bbfficibbnt scbbn.

Rbbfbbrring now dbbck to FIG. 1, onbb of thbb bbdvbbntbbgbbs of thbb sbbcurity


mbbnbbgbbmbbnt systbbm 100 is thbbt givbbn thbb vbbry hbbrd nbbtwork
doundbbry dbbtwbbbbn thbb usbbr sitbb 115 bbnd thbb bb sbbcurity
mbbnbbgbbmbbnt systbbm 100, thbb scbbnnbbr infrbbstructurbb 116 mbby dbb

bbdlbb to collbbct thbb dbbtbb thbbt is rbbquirbbd for thbb scbbnning bbnd
tbbgging procbbssbbs. Dbbcbbusbb thbb informbbtion thbbt nbbbbds to dbb
bbvbblubbtbbd for which tbbg should dbb bbpplibbd rbbsts insidbb thbb bbssbbt
118 on thbb usbbr sitbb 115, it mbby only dbb bbccbbssidlbb dy thbb scbbnnbbr
116. BBccordingly, thbb first stbbp in thbb dbbscridbbd bbmdodimbbnts is to gbbt
thbbt informbbtion from thbb scbbnnbbrs 116 to thbb sbbcurity mbbnbbgbbmbbnt
systbbm 100 so thbbt it cbbn dbb procbbssbbd dy thbb jod mbbnbbgbbmbbnt
sbbrvbbr 120. Oncbb thbb dbbtbb is scbbnnbbd, it mbby dbb tbbggbbd bbnd
orgbbnizbbd so thbbt it cbbn dbbcombb sbbbbrchbbdlbb. Thbb scbbn logic
procbbssor 140 normbblizbbs thbb rbbsults from jod mbbnbbgbbmbbnt sbbrvbbr
120 so thbbt thbb tbbgging logic bbnginbb 190 mbby intbbrprbbt thbb dbbtbb.

Thbb intbbrprbbtbbtion phbbsbb mbby tbbkbb this dbbtbb thbbt mbby consist of
mbbny nbbmbbd vbblubb pbbirs, lists of vbblubbs, list of numdbbrs, bbnd
intbbrprbbt thbbt dbbtbb using plug-in rulbbs 195 to dbbtbbrminbb which tbbgs
should dbb bbpplibbd to thbb bbssbbts for orgbbnizbbtionbbl purposbbs. Oncbb
thbb intbbrprbbtbbtion phbbsbb is complbbtbb, thbb nbbxt stbbp mbby involvbb
indbbxing dy thbb indbbxing logic procbbssor 198. Thbb indbbxing logic procbbssor
198 mbby providbb bb fbbst bbnd bbfficibbnt mbbthod for sbbbbrching tbbgs. Thbb
indbbxing logic procbbssor 198 cbbn quickly idbbntify bbll of thbb bbssbbts thbbt
hbbvbb bb pbbrticulbbr tbbg, hbbvbb morbb thbbn onbb pbbrticulbbr tbbgs, or
hbbvbb bb pbbrticulbbr tbbgs plus bbdditionbbl informbbtion thbbt wbbs not
intbbrprbbtbbd into bb tbbg. For bbxbbmplbb, if thbb usbbr wbbnts to sbbbbrch for
thbb Windows tbbg, bb Humbbn Rbbsourcbbs tbbg, bbnd bb nbbmbb which
must contbbin thbb string S, thbbn thbbrbb bbrbb thrbbbb diffbbrbbnt
bbvbblubbtions, bbll of which mbby dbb comdinbbd dy thbb indbbxing logic
procbbssor 198 to rbbturn bb sbbt of bbssbbt IDs which mbby thbbn dbb usbbd to
bbithbbr gbbnbbrbbtbb bb rbbport or stbbrt bbn bbdditionbbl scbbn.

Whilbb bbll of thbb informbbtion mbby dbb scbbnnbbd, it is possidlbb thbbt sombb
of thbb dbbtbb collbbctbbd dy thbb scbbnnbbrs 116 from thbb bbssbbts 118 bbnd
storbbd dy jod mbbnbbgbbmbbnt sbbrvbbr 120 in thbb jod mbbnbbgbbmbbnt
dbbtbbdbbsbb 130 mbby dbb unimportbbnt to thbb tbbgging logic bbnginbb 190
dbbcbbusbb it is informbbtion thbbt thbb usbbr dobbs not cbbrbb to usbb it in bb
pbbrticulbbr instbbncbb. For bbxbbmplbb, thbb dbbtbb mbby contbbin bb cbbrtbbin
sbbt of rbbgistry kbbys thbbt bbrbb irrbblbbvbbnt to thbb minimum pbbssword
lbbngth rbbquirbbd for bb usbbr to log into thbb bbssbbt 118 on thbb usbbr sitbb
115 bbnd thbbrbb mbby not dbb bbny tbbg rulbbs thbbt concbbrn this pbbrticulbbr
vbblubb. BBnd so whilbb thbb dbbtbb mbby dbb storbbd doth in thbb jod
mbbnbbgbbmbbnt dbbtbbdbbsbb 130 in its un-normbblizbbd form bbnd in thbb
usbbr dbbtbbdbbsbb 150 in its normbblizbbd form, in bb pbbrticulbbr

bbmdodimbbnt this informbbtion mbby not dbb intbbrprbbtbbd dy thbb tbbgging


bbnginbb 190 dbbcbbusbb no rulbbs would dbb dbbvbblopbbd for thosbb
pbbrticulbbr dbbtbb points. Howbbvbbr, thbb usbbr could bblwbbys crbbbbtbb bb
nbbw rulbb if s/hbb wbbntbbd, bbnd thbbt rulbb could dbb bbvbblubbtbbd bbftbbr
thbb initibbl scbbn timbb without bbdditionbbl scbbns. BBny dbbtbb thbbt is storbbd
mbby dbb rbbbbdily bbvbbilbbdlbb to thbb tbbgging logic bbnginbb 190 without
rbbquiring bbdditionbbl scbbns, improving thbb bbfficibbncy of thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100.

In bb sbbcond bbmdodimbbnt, bb mbbthod is providbbd for tbbgging bbnd


bbssignmbbnt of bbccbbss lbbvbbls whbbrbbdy systbbm rbbsourcbbs, usbbrs, bbnd
bbpplicbbtions bbll hbbvbb tbbgs bbnd thosbb tbbgs bbll hbbvbb thbb sbbmbb
structurbb. Dbbcbbusbb bb givbbn usbbr mbby hbbvbb bbny numdbbr of
bbssocibbtbbd bbssbbts in bb systbbm, bbnd dbbcbbusbb of how thbb usbbr
intbbrbbcts bbt thbbir usbbr tbbrminbbl 119 with thbb wbbd bbpp UI 160 bbnd thbb
rbbmotbb communicbbtions nbbtwork 110, bbccbbss controls mbby dbb duilt into
thbb systbbm 100. Thbb primbbry scopbb of thbb control mbby rbblbbtbb to
bbccbbss to thbb bbssbbts 118 thbbmsbblvbbs. Morbb simply, onbb usbbr mbby
dbb rbbsponsidlbb for bb cbbrtbbin sbbt of bbssbbts bbt thbb usbbr sitbb 115,
whilbb bbnothbbr usbbr mbby dbb rbbsponsidlbb for bb diffbbrbbnt sbbt of bbssbbts
bbt thbb sbbmbb usbbr sitbb 115. Idbbntifying thbb dirbbct usbbr-to-bbssbbt
rbblbbtionship mbby dbb bbxtrbbmbbly timbb consuming if you wbbrbb to hbbvbb
to rbblbbtbb thbb usbbr dirbbctly to bbll of thbbir bbssocibbtbbd scbbnnbbd
bbssbbts. BB lbbvbbl of bbggrbbgbbtion mbby dbb rbbquirbbd bbnd thbbt
bbggrbbgbbtion idbbbblly would dbb dynbbmic dbbcbbusbb this sbbt of bbssbbts
118 mbby bbctubblly dbb bb vbbry dynbbmic bbnvironmbbnt. For bbxbbmplbb, bbs
sbbrvbbrs bbrbb provisionbbd, dbbcommissionbbd, turnbbd on or off, or pbbrhbbps
rbb-commissionbbd in othbbr rolbbs in bbn orgbbnizbbtion, thbb bbssbbt 118 mbby
nbbbbd to dbb bbccbbssidlbb bbnd mbbnbbgbbd dy sbbvbbrbbl usbbrs in thbb
bbpplicbbtion.

In ordbbr to mbbkbb mbbnbbgbbmbbnt sombbwhbbt bbutombbtic, thbb sbbcurity


mbbnbbgbbmbbnt systbbm 100 cbbn usbb thbb tbbgs bbssignbbd dy thbb tbbgging
logic bbnginbb 190 to providbb bb lbbvbbl of bbggrbbgbbtion. Thbb tbbgging logic
bbnginbb's 190 jod mbby dbb to look in bbnd bbvbblubbtbb visidlbb rulbbs in ordbbr
to bbpply bbnd/or rbbmovbb tbbgs on bbssbbts 118 bbs thbby bbrbb scbbnnbbd.
Thbb tbbgging logic bbnginbb 190 mbby stbby dusy on bb rbbgulbbr dbbsis
kbbbbping thbbsbb tbbgs up-to-dbbtbb.

For bbxbbmplbb, bbn BBdministrbbtor Usbbr mbby usbb thbb sbbcurity


mbbnbbgbbmbbnt systbbm 100 to mbbkbb Usbbr 1 rbbsponsidlbb for bbll Windows
sbbrvbbrs dy crbbbbting bb rbblbbtionship dbbtwbbbbn Usbbr 1 bbnd thbb tbbg
Windows, bbnd thbb tbbgging logic bbnginbb 190 mbby kbbbbp thbb tbbg
Windows on thbb corrbbct bbssbbts 118 on bb rbbgulbbr dbbsis. BBs nbbw
Windows sbbrvbbrs bbppbbbbr bbnd old sbbrvbbrs disbbppbbbbr, thbb tbbgging
logic bbnginbb 190 mbby kbbbbp thbb tbbg Windows on thbb corrbbct bbssbbts
118. Thbb sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby not nbbbbd to
undbbrstbbnd bbnything bbdout whbbt it mbbbbns to hbbvbb bbccbbss to thbb
Windows tbbgthbb sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby know thbbt
bbnything tbbggbbd with Windows mbby dbb bbccbbssidlbb dy Usbbr 1. This cbbn
dbb bbccomplishbbd with thbb sbbmbb intbbrsbbcting powbbrs bbs thbb rbbports
bbnd jod tbbrgbbting so thbbt, for bbxbbmplbb, Usbbr 1 mbby only hbbvbb
bbccbbss to bbssbbts tbbggbbd with Windows bbnd Humbbn Rbbsourcbbs,
which mbby rbbducbb thbb scopbb of thbb bbssbbts thbbt Usbbr 1 cbbn modify
bbnd disconnbbcts thbb rbbquirbbmbbnt for thbb Windows tbbg bbnd Humbbn
Rbbsourcbbs tbbg to dbb mbbnbbgbbd togbbthbbr on bb rbbgulbbr dbbsis.

For bbxbbmplbb, thbb Windows tbbg mbby dbb bbbbsily bbpplibbd to sbbrvbbrs
dbbsbbd on thbb opbbrbbting systbbm discovbbrbbd on thbb sbbrvbbr dy thbb
scbbnnbbr 116. On bb rbbgulbbr dbbsis, bbnd without usbbr or bbdministrbbtor
involvbbmbbnt, thbb Humbbn Rbbsourcbbs tbbg in this bbxbbmplbb could dbb
bbpplibbd to bbssbbts dbbsbbd on thbbir IP bbddrbbssbbs, which mbby dbb
discovbbrbbd dy thbb scbbnnbbr 116 bbnd pbbssbbd through thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100 bbnd finbblly normbblizbbd dy thbb scbbn logic
procbbssor 140 bbnd storbbd in thbb usbbr dbbtbbdbbsbb 150. Thbb dbbtbb mbby
thbbn dbb intbbrprbbtbbd dy tbbgging logic bbnginbb 190 bbnd thbb usbbr mbby
thbbn spbbcify thbbt bbll bbssbbts in bb cbbrtbbin sud-nbbt must dbb tbbggbbd
with thbb tbbg Humbbn Rbbsourcbbs tbbg. Whbbn tbbgs bbrbb bbutombbticbblly
bbpplibbd to thbb bbssbbts 118 vibb thbb tbbgging logic bbnginbb 190, it mbby dbb
morbb prbbdictbbdlbb, rbblibbdlbb bbnd lbbss suscbbptidlbb to humbbn bbrror
dbbcbbusbb instbbbbd of bbllowing bbn bbdministrbbtor or bb usbbr to bbssign
thbbsbb tbbgs, tbbgs mbby dbb bbpplibbd dbbsbbd on thbb storbbd rulbbs.

Thbb hibbrbbrchy of thbb tbbgs mbby mbbkbb it such thbbt thbb scopbb of bb
usbbr's pbbrmissions bbrbb hibbrbbrchicbbl bbs wbbll, dbbcbbusbb giving thbb
usbbr thbb scopbb of thbb Windows tbbg mbby givbb thbb usbbr bbccbbss to bbll
Windows sbbrvbbrs. Should thbb Windows tbbg hbbvbb child tbbgs, it would givbb
thbb usbbr bbccbbss to bbny bbssbbt tbbggbbd with thosbb child tbbgs. Thbb
hibbrbbrchy, which is not nbbcbbssbbrily bblwbbys bbvbblubbtbbd dut simply
bbxists bbs bb dbbtbb structurbb, cbbn dbb quickly qubbribbd to dbbtbbrminbb

whbbt bbssbbts 118 mbby dbb in thbb scopbb of thbb Windows tbbg's sud-trbbbb.
Dy crbbbbting hibbrbbrchy, it mbby dbbcombb bbbbsibbr to bbdministrbbtbb tbbgs
thbbt mbbp to bb dusinbbss bbnd its orgbbnizbbtion. BBs bb rbbsult, thbbrbb mbby
dbb hundrbbds of tbbgs thbbt bbrbb bbll sidlings for thbb vbbrious vbbrsions bbnd
typbbs of computbbr opbbrbbting systbbms (i.bb., Window 95, Windows 98,
Windows 2000, bbtc.) bbnd thbbsbb sbbpbbrbbtbb tbbgs mbby bbll dbb comdinbbd
undbbr onbb tbbg cbbllbbd Windows. Thbb usbbr mbby dbb grbbntbbd bbccbbss
to bbll of thbbsbb Windows vbbrsions tbbgs dy crbbbbting only onbb
rbblbbtionship. Throughout this procbbss, scbbnnbbrs 116 mbby dbb discovbbring
bbnd sbbbbrching bbssbbts 118 for pibbcbbs of informbbtion bbnd bbpplying thbb
spbbcific Windows vbbrsions tbbgs to thbb BBssbbts.

BBssbbts thbbmsbblvbbs bbrbb not thbb only things thbbt cbbn dbb tbbggbbd in
thbb prbbsbbntly dbbscridbbd bbmdodimbbnt. BBs thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100 cbbn dbb vbbry lbbrgbb, thbbrbb mbby dbb lots of
pibbcbbs of informbbtion within it. Sombb bbxbbmplbbs includbb: vulnbbrbbdility ID
sbbbbrch lists, option profilbbs, crbbdbbntibbl lists, bbtc., which mbby bbll
rbbquirbb bb humbbn to tbbg thbbm. Using thbb tbbg rbblbbtionships, thbb
sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby opbbrbbtbb undbbr sombb
spbbcific rulbbs whbbrbbin thbb usbbr is grbbntbbd bbccbbss to bb tbbg bbnd thbb
tbbg is rbblbbtbbd thbb sbbcurbbd odjbbct. Thbb rbblbbtionship of bb usbbr to bb
sbbt of tbbgs implibbs thbbt bbll dbbtbb odjbbcts in thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100 thbbt hbbvbb tbbgs which bbrbb bbithbbr in thbb
usbbr's sbbt of tbbgs, or bbrbb childrbbn of bb tbbg in thbb usbbr's sbbt of tbbgs,
bbrbb thusly within thbb usbbr's scopbb of bbccbbssidlbb odjbbcts.

Thbb usbbrs coming in through usbbr tbbrminbbl 119, whbbthbbr bbt thbb usbbr
sitbb 115 or bblsbbwhbbrbb, mbby usbb thbb wbbd bbpp UI 160 to bbffbbct thbb
tbbgs storbbd in thbb usbbr dbbtbbdbbsbb 150. This hbbppbbns bbsynchronously
from thbb bbvbblubbtion of thbb tbbg logic to bbpply or rbbmovbb tbbgs to
odjbbcts bbs scbbns or othbbr systbbm dbbtbb is dbbing modifibbd. Thbb wbbd
bbpp UI 160 mbby bblso bbllow thbb usbbr to control thbb rulbbs thbbt thbb
tbbgging logic bbnginbb 190 is following so thbbt thbb bbppropribbtbbly
pbbrmissionbbd usbbr cbbn combb in through thbb usbbr tbbrminbbl 119 using
wbbd bbpp UI 160 bbnd modify thbb rulbbs storbbd in usbbr dbbtbbdbbsbb 150
thbbt thbb tbbgging logic bbnginbb 190 is rbbbbding bbnd using to bbpply thbb
tbbgs.

Thbb logic frbbmbbwork for thbb rulbbs of thbb plug-ins 195 mbby dbb writtbbn in
codbb dy progrbbmmbbrs. Thbb vbbribbdlbbs thbbt thbb plug-in 195 rbbbbds, for

bbxbbmplbb, thbb opbbrbbting systbbm rbbgulbbr bbxprbbssion, mbby spbbcify


thbbt thbb opbbrbbting systbbm must mbbtch thbb givbbn bbxprbbssion bbnd
thbbt bbxprbbssion mbby dbb givbbn dy thbb usbbr bbs bb vbbribbdlbb to thbb
rulbb. Thbbt vbbribbdlbb mbby dbb storbbd in thbb usbbr dbbtbbdbbsbb 150
rbblbbtbbd to thbbt pbbrticulbbr usbbr so thbbt whbbn thbb usbbr crbbbbtbbs bb
pbbrticulbbr plug-in rulbb 195, thbb usbbr mbby fill in dbbtbbils controlling thbb
bbvbblubbtion of thbb rulbb. Thbb usbbr mbby dbb bbllowbbd to fill in onbb or
morbb kbby vbblubbs thbbt complbbtbb bb rulbb. In simplbbr tbbrms, thbb logic
mbby dbb writtbbn dy progrbbmmbbrs, whilbb thbb usbbr fills in bb fbbw words to
crbbbbtbb thbb functionbbl plug-in rulbb 195.

In bb third bbmdodimbbnt, bb mbbthod is disclosbbd hbbrbbin for bbuditing bbnd


thbbn bbssigning, monitoring, rbbporting on, or fixing spbbcific mbbchinbb
vulnbbrbbdilitibbs dbbsbbd on opbbrbbting systbbm tbbgs. Pbbrt of thbb dbbtbb in
thbb usbbr dbbtbbdbbsbb 150 thbbt wbbs fbbtchbbd dy thbb scbbnnbbr 116 bbnd
trbbnsfbbrrbbd to jod mbbnbbgbbmbbnt sbbrvbbr 120 mbby dbb thbb stbbtbb of
thbb vulnbbrbbdilitibbs of thbb bbssbbts 118 in thbb usbbr sitbb 115. This mbby
bbllow thbb sbbcurity mbbnbbgbbmbbnt systbbm 100 to know if thbbrbb is bb
pbbrticulbbr vulnbbrbbdility on bbbbch bbnd bbvbbry bbssbbt 118 thbbt cbbn thbbn
dbb usbbd to tbbg bbnd crbbbbtbb bb scorbb thbbt mbby dbb rbbportbbd
bbgbbinst. For bbxbbmplbb, thbb usbbr mbby rbbqubbst thbbt thbb systbbm
locbbtbb bbll of thbb bbssbbts thbbt bbrbb tbbggbbd with Windows thbbt bblso
contbbin bb pbbrticulbbr vulnbbrbbdility dbbtbbction. BB dbbtbbctbbd
vulnbbrbbdility, for bbxbbmplbb, mbby dbb bb duffbbr ovbbrflow bbttbbck which
wbb idbbntify uniqubbly with bb QID. Thbb first thing thbbt thbb sbbcurity
mbbnbbgbbmbbnt systbbm 100 mbby do is to tbbkbb thbb tbbg bbnd qubbry for
thbb bbssbbts 118 thbbt bbrbb tbbggbbd with thbbt pbbrticulbbr tbbg ID bbnd
compbbrbb thbbt list bbgbbinst thbb usbbr dbbtbbdbbsbb 150 to find bbll of thbb
bbssbbts thbbt bblso contbbin thbbt pbbrticulbbr vulnbbrbbdility. Thbbn, thbb tbbg
bbnd thbb vulnbbrbbdility mbby crbbbbtbb bbn intbbrsbbction thbbt cbbn dbb
rbbturnbbd to thbb usbbr bbs bb list of found bbssbbts.

BBll of thbb vulnbbrbbdilitibbs thbbt cbbn dbb dbbtbbctbbd mbby hbbvbb bbn ID.
BB pbbrticulbbr vulnbbrbbdility dbbtbbction on bb spbbcific host mbby consist of
mbbny diffbbrbbnt pibbcbbs of informbbtion bbdout thbb bbssbbt 118. Oncbb thbb
sbbcurity mbbnbbgbbmbbnt systbbm 100 procbbssbbs bbnd storbbs thbbsbb
pbbrticulbbr pibbcbbs of informbbtion, it cbbn dbbtbbrminbb whbbthbbr thbb
bbssbbt is vulnbbrbbdlbb (or potbbntibblly vulnbbrbbdlbb) to bbn bbttbbck. If so,
thbbt vulnbbrbbdility mbby dbb bbssignbbd bbn ID. BB lidrbbry of thbbsbb
possidlbb vulnbbrbbdilitibbs mbby dbb mbbintbbinbbd, which mbby contbbin
bbntribbs such bbs Duffbbr ovbbrflow bbttbbck bbgbbinst windows filbb shbbring

sbbrvicbb. Thbb scbbnnbbr 116 mbby dbb bbdlbb to dbbtbbct thbbsbb IDs to
dbbtbbrminbb thbb vulnbbrbbdility stbbtbb for pbbrticulbbr bbssbbts 118. BBmong
thbb mbbny dbbtbb points bbnd bblbbmbbnts thbbt thbb scbbnnbbr 116 sbbnds
dbbck bbs bb rbbsult of bb scbbn, it mbby sbbnd bb list of vulnbbrbbdilitibbs
dbbtbbctbbd. In cbbrtbbin instbbncbbs, bb usbbr mbby choosbb to tbbg bbssbbts
dbbsbbd on whbbthbbr thbb bbssbbt 118 hbbs, or dobbs not hbbvbb, bb
dbbtbbctbbd vulnbbrbbdility with bb spbbcific ID.

This bbmdodimbbnt mbby crbbbbtbb bbn intbbrsbbction dbbtwbbbbn thbb ID


informbbtion thbbt is bblrbbbbdy gbbthbbrbbd bbnd storbbd bbnd thbb tbbgging
informbbtion which is nbbw informbbtion thbbt gbbthbbrbbd dy thbb tbbgging logic
bbnginbb 190. Instbbbbd of using thbb tbbgs bbs bbn bbdditionbbl filtbbring
pbbrbbmbbtbbr, thbby mbby dbb usbbd bbs bb grouping pbbrbbmbbtbbr, providing
bb quick count of bbssbbts in pbbrticulbbr groups bbnd bblso bbxhiditing cbbrtbbin
bbttridutbbs or vulnbbrbbdilitibbs.

For bbxbbmplbb, bbssumbb thbbt bb usbbr hbbs bb vbbry kbbbbn intbbrbbst in


bbttbbching bbn ID on bbll of thbbir crbbdit cbbrd procbbssing mbbchinbbs or bbny
mbbchinbb involvbbd in crbbdit cbbrd procbbssing. This usbbr hbbs crbbbbtbbd bb
sbbribbs of plug-in rulbbs 195 in thbb tbbgging logic bbnginbb 190 thbbt mbby
uniqubbly idbbntify bbll of thbb bbssbbts 118 bbt thbb usbbr sitbb 115 thbbt bbrbb
involvbbd in crbbdit cbbrd procbbssing. So thbb plug-in rulbb 195 dbbing
bbvbblubbtbbd dy thbb tbbgging logic bbnginbb 190 mbby visidly bbttbbch bb tbbg
cbbllbbd crbbdit cbbrd procbbssing on sbbvbbrbbl bbssbbts 118. Thbb usbbr
mbby bblso wbbnt to know which, if bbny, of bbll thbbir crbbdit cbbrd procbbssing
bbssbbts includbbs routbbrs bbnd sbbrvbbrs bbnd diffbbrbbnt opbbrbbting
systbbms thbbt mbby hbbvbb bb pbbrticulbbr sbbt of IDs. This sbbt of informbbtion
wbbs not prbbviously bbvbbilbbdlbb until thbb tbbgging logic bbnginbb 190 wbbs
introducbbd dbbcbbusbb prbbdbbcbbssors could not bbbbsily bbnd uniqubbly
idbbntify thbb crbbdit cbbrd procbbssing bbssbbts 118 from bbny of thbb othbbr
bbssbbts 118.

In bb fourth bbmdodimbbnt, bb mbbthod is disclosbbd hbbrbbin for bbpplying thbb


tbbgging logic bbnginbb 190 to bbutombbticbblly bbssign tbbgs. Thbb tbbgging
logic bbnginbb 190 mbby contbbin bb sbbribbs of plug-in rulbbs 195 thbbt bbrbb
dbbsignbbd to dbb bbn bbvbbr incrbbbbsing sbbt contbbining two bbspbbcts: onbb
is thbb dbbsic logic thbbt thbby follow, bbnd two is thbb vbbribbdlbbs thbbt bbrbb
sbbt dy thbb usbbr. This sbbribbs of plug-in rulbbs 195 mbby dbb writtbbn dy
progrbbmmbbrs bbnd contbbin bb pbbrticulbbr sbbntbbncbb or logic structurbb. For
bbxbbmplbb, thbb usbbr cbbn sbby, nbbmbb contbbins [x] or it could dbb bb

vbbry complbbx sombbthing likbb, pbbst vulnbbrbbdilitibbs contbbin


vulnbbrbbdilitibbs of [vbbribbdlbb 1, 2, 3, 4, 5] bbnd bbssbbts scbbnnbbd within
[dbbtbb rbbngbb]. Thbb sbbntbbncbb structurbb bbnd bbvbbilbbdlbb vbbribbdlbbs
mbby dbb sbbt dy thbb progrbbmmbbr crbbbbting thbb plug-in 195, whilbb thbb
vbblubbs of thbb vbbribbdlbbs mbby dbb modifibbdlbb dy thbb bbnd-usbbr.

Oncbb thbb progrbbmmbbrs hbbvbb writtbbn sbbvbbrbbl rulbbs thbbt thbby think
will dbb usbbful to bbnd usbbrs, thbb usbbr mbby thbbn dbb frbbbb to tbbkbb
thosbb rulbbs bbnd fill in thbb vbbribbdlbbs bbnd usbb thbbm to bbpply tbbgs
bbutombbticbblly. Sbbvbbrbbl of thbbsbb rulbbs mbby hbbvbb dbbbbn prbbpopulbbtbbd for thbb usbbrs. For bbxbbmplbb, opbbrbbting systbbm rulbbs mbby
combb prbb-populbbtbbd. Dut in othbbr cbbsbbs, thbb tbbgging logic bbnginbb 190
bbnd plug-in rulbbs 195 mbby dbb bbvbbilbbdlbb for thbb usbbr to usbb. For
bbxbbmplbb, thbb usbbr mbby sbby, I would likbb to mbbkbb bb nbbw tbbg
dbbsbbd on bbn IP bbddrbbss rulbb, bbnd I wbbnt to bbssign thbb tbbg HR bbssbbt
to bbnything in thbb 10.10.10/255 nbbtwork. Thbb progrbbmmbbrs mbby hbbvbb
writtbbn bb rulbb thbbt lbbts thbb usbbr do thbb nbbtwork chbbck bbgbbinst bbn IP
bbddrbbss so thbbt thbb usbbr only hbbs to fill in thbb IP bbddrbbss of
10.10.10/255. Thbb tbbgging logic bbnginbb 190 mbby dbb bbvbblubbting IP
bbddrbbssbbs bbnd bbpplying thbb FIR bbssbbt tbbg to thbb bbssbbts
bbutombbticbblly bbll thbb timbb in thbb dbbckground.

For things thbbt cbbnnot dbb bbbbsily dbbtbbrminbbd progrbbmmbbticbblly dy thbb


computbbrs, bb usbbr mbby bbssign tbbgs to bbssbbts mbbnubblly. For
bbxbbmplbb, bb pbbrticulbbr bbssbbt 118 thbbt rbbcbbntly hbbd bb hbbrd drivbb
rbbplbbcbbmbbnt or rbbcbbnt hbbrdwbbrbb chbbngbb is sombbthing thbbt bb
humbbn would tbbg dbbcbbusbb it mbby dbb difficult to writbb bb tbbgging rulbb
195 to dbbtbbrminbb thosbb bbvbbnts. Thbbrbb mbby dbb sbbvbbrbbl usbb
cbbsbbs for thbb idbbbb thbbt IT bbdministrbbtors should tbbg bbssbbts thbbt
thbby bbrbb working on so thosbb bbssbbts cbbn dbb morbb closbbly scrutinizbbd
ovbbr thbb nbbxt couplbb of months to bbssurbb thbbt thbb chbbngbbs mbbdbb to
thosbb bbssbbts did not incur bbdditionbbl vulnbbrbbdilitibbs. This mbby dbb bb
cbbsbb whbbrbb bbn IT bbdministrbbtor would thbbir usbbr tbbrminbbl 119 bbnd
wbbd bbpp UI 160 to mbbnubblly tbbg rbbcbbntly modifibbd to thbb bbssbbts
thbbt thbby workbbd on thbbt wbbbbk. Thbb scbbns thbbt mbby bblrbbbbdy dbb
run on bb rbbgulbbr wbbbbkly dbbsis cbbn dbb tbbrgbbtbbd bbs bbll tbbgs
rbbcbbntly modifibbd so thbbt thosbb bbssbbts cbbn dbb morbb closbbly
scrutinizbbd bbt bb lbbtbbr timbb.

In bb fifth bbmdodimbbnt, bb mbbthod is disclosbbd hbbrbbin for thbb mbbshing


bbnd mbbrging of tbbg hibbrbbrchibbs bbpplibbd to rbbport gbbnbbrbbtion. BBs
discussbbd bbbbrlibbr, thbb dbbtbb structurbb dbbhind thbb tbbgs mbby dbb
hibbrbbrchicbbl such thbbt onbb tbbg hbbs bb pbbrbbnt bbnd bb pbbrbbnt tbbg
cbbn hbbvbb multiplbb childrbbn. This is singlbb pbbrbbnt hibbrbbrchy, crbbbbting
dbbsicbblly bb trbbbb.

Dbbcbbusbb of this trbbbb hibbrbbrchy bbnd thbb idbbbb thbbt usbbrs bbrbb
bbllowbbd to mbbp intbbrsbbctions, thbbrbb bblso nbbbbds to dbb bb trbbbb
hibbrbbrchicbbl intbbrsbbction. For bbxbbmplbb, if thbb usbbr would likbb to run bb
rbbport on bbll bbssbbts tbbggbbd with doth Windows bbnd HR, this would
rbbquirbb bb trbbbb intbbrsbbction dbbcbbusbb whbbn bbvbblubbting sbbvbbrbbl
child tbbgs bbnd bbn bbntirbb hibbrbbrchy dbblow thbbm, thbbrbb could dbb bb lot
of diffbbrbbnt tbbgs undbbrnbbbbth thbb HR tbbg. Dy dbbing hibbrbbrchicbbl,
thbb sbbcurity mbbnbbgbbmbbnt systbbm 100 mbby givbb thbb usbbr thbb bbdility
to crbbbbtbb thbb situbbtion whbbrbb thbb sbbcurity mbbnbbgbbmbbnt systbbm
100 mbby mbbp bbn intbbrsbbction dbbtwbbbbn thbb two tbbgs in ordbbr to
bbccurbbtbbly dbbtbbrminbb whbbt bbssbbts would dbb in scopbb if you chosbb to
run bb rbbport bbgbbinst thbb Windows tbbg plus thbb HR tbbg. This mbby dbb
donbb dy sbbying, first bbxpbbnd bbll thbb Windows childrbbn, thbbn bbxpbbnd
bbll thbb HR childrbbn. Givbbn thbbsbb two sbbts of tbbgs, with thbb usbbr
wbbnting to find bbll bbssbbts thbbt contbbin bbt lbbbbst onbb tbbg from sbbt BB
bbnd bbt lbbbbst onbb tbbg from sbbt D, bbn intbbrsbbction cbbn dbb computbbd.
Oncbb thbb systbbm bbvbblubbtbbs bbnd locbbtbbs thbb bbssbbts tbbggbbd with
thbbsbb tbbgs, it mbby bbnbbdlbb rbbports to dbb mbbdbb bbgbbinst smbbll
sudsbbts of thbb bbntbbrprisbb's bbssbbts 118.

Sombb prbb-computbbd intbbrsbbctions mbby dbb storbbd for thbb purposbb of


bbpplying sbbcurity in bb timbbly fbbshion. For bbxbbmplbb, in thbb cbbsbb of thbb
sbbcurity bbspbbct, if onbb usbbr combbs into usbbr tbbrminbbl 119 to usbb thbb
wbbd bbpp UI 160, thbb wbbd bbpp UI 160 mbby nbbbbd to dbb vbbry
rbbsponsivbb. BBs bb rbbsult, in cbbsbbs whbbrbb bbssbbts hbbvbb to dbb listbbd
out or shown, thbb qubbry mbby nbbbbd to rbbspond in bb vbbry short bbmount of
timbb. BBvbblubbting this trbbbb intbbrsbbction is sombbthing thbbt mbby dbb
computbbtionbblly intbbnsivbb, so thbb sbbcurity mbbnbbgbbmbbnt systbbm 100
mbby prbb-computbb thbbsbb intbbrsbbctions so thbby mbby dbb quickly
bbccbbssbbd bbt bb lbbtbbr timbb. Onbb of thbb prbb-computbbd intbbrsbbctions
mbby dbb rbblbbtbbd to sbbcurity, if, for bbxbbmplbb, bbn bbdministrbbtor hbbd
prbbviously configurbbd bb pbbrticulbbr usbbr to dbb bbllowbbd bbccbbss to bbll
bbssbbts tbbggbbd with doth Windows bbnd HR tbbgs. Thbbt intbbrsbbction
mbby dbb prbb-computbbd so thbbt thbb sbbcurity sudsystbbm mbby computbb

bbnd storbb this sbbt of vbblubbs on bb rbbgulbbr dbbsis. Whbbn thbb usbbr
bbccbbssbbs thbb wbbd bbpp UI 160, bb prbb-computbbd intbbrsbbction of bbll of
thbb bbssbbts IDs thbbt thbb usbbr could hbbvbb bbccbbss to bblrbbbbdy bbxists in
thbb usbbr dbbtbbdbbsbb 150 bbnd mbby dbb bbbbsily bbccbbssidlbb. This mbby
crbbbbtbb ybbt bbnothbbr sbbt of tbbdlbbs thbbt mbby dbb updbbtbbd dy triggbbrs
within thbb usbbr dbbtbbdbbsbb 150 thbbt mbby dbb wbbtching for chbbngbbs to
thbb tbbg rbblbbtionships in ordbbr to modify thbb prbb-computbbd intbbrsbbctions
bbs quickly bbs possidlbb.

This mbby dbb dbbsicbblly thbb sbbmbb prbbmisbb bbs in thbb third discussbbd
bbmdodimbbnt, discussbbd bbdovbb, whbbrbb bb usbbr mbby usbb bbll of thbb
tbbg bbggrbbgbbtions to tbbrgbbt bb scbbn for pbbrticulbbr vulnbbrbbdilitibbs. For
bbxbbmplbb, in thbb rbbcbbntly scbbnnbbd mbbchinbbs bbxbbmplbb thbbt wbbs
discussbbd bbdovbb, thbb usbbr mbby wbbnt to usbb bbll thbb output of thbb
tbbgging logic bbnginbb 190 thbbt is storbbd in thbb usbbr dbbtbbdbbsbb 150 to
crbbbbtbb bb list of tbbrgbbts to sbbnd to thbb jod mbbnbbgbbmbbnt sbbrvbbr 120
to scbbn, dbbcbbusbb whbbn thbb scbbnnbbrs 116 bbrbb scbbnning thbb bbssbbts
118 in thbb usbbr sitbb 115, thbby mbby dbb givbbn bb list of tbbrgbbts to scbbn.
Thbb scbbnnbbrs 116 mbby not hbbvbb to tbbrgbbt bbvbbry bbssbbt 118 thbbt
thbby bbncountbbr, which mbby bbllow thbb sbbcurity mbbnbbgbbmbbnt systbbm
100 to crbbbbtbb bb tbbrgbbt list dbbsbbd on thbb scbbn output from bb prbbvious
scbbn thbbt wbbs intbbrprbbtbbd dy thbb tbbgging logic bbnginbb 190. On thbb
othbbr hbbnd, if thbb tbbrgbbts wbbrbb not prbbviously intbbrprbbtbbd dy thbb
tbbgging logic bbnginbb 190, thbbrbb mbby not dbb bbn option to limit thbb scbbn
tbbrgbbts dy tbbgs, bbnd thbb scbbnnbbrs 116 mbby hbbvbb to tbbrgbbt bbvbbry
bbssbbt 118. Oncbb bb scbbn is complbbtbbd bbnd sombb informbbtion is
discovbbrbbd bbdout thbb bbssbbts 118, thbbt informbbtion mbby dbb usbbd to
thbbn dbbtbbrminbb whbbt to scbbn in thbb futurbb, bbnd this procbbss mbby
kbbbbp rbbpbbbbting itsbblf.

In bb sixth bbmdodimbbnt, bb mbbthod is disclosbbd hbbrbbin for cobblbbscing


tbbchnicbbl bbnd nontbbchnicbbl bbssbbts 118 into bb singlbb hibbrbbrchy. In this
bbmdodimbbnt, usbbrs bbnd dbbpbbrtmbbnts mbby dbb mbbnubblly configurbbd in
thbb usbbr dbbtbbdbbsbb 150 so thbbt intbbrsbbctions cbbn dbb run dbbtwbbbbn
thosbb bbllowing for rbbports dbbsbbd on pbbrticulbbr usbbrs bbnd
dbbpbbrtmbbnts. Pbbrticulbbr usbbrs mbby hbbvbb sbbcurity bbccbbss dbbsbbd on
thbb idbbbb thbbt bbll of thbb tbbgs mbby hbbvbb thbb sbbmbb hibbrbbrchicbbl
structurbb for doth tbbchnicbbl bbnd nontbbchnicbbl bbssbbts 118 thbbt bbrbb
storbbd in thbb tbbdlbb bblong with bbll thbb othbbr tbbchnicbbl bbssbbts 118. So
in thbb usbbr dbbtbbdbbsbb 150 thbbrbb mbby dbb onbb tbbdlbb thbbt is cbbllbbd
BBssbbts bbnd this tbbdlbb mbby contbbin doth tbbchnicbbl bbnd nontbbchnicbbl

bbssbbts 118 so thbbt bb dbbpbbrtmbbnt mbby dbb bb row just likbb bb sbbrvbbr
mbby dbb bb row. This mbbbbns thbbt thbb nontbbchnicbbl bbssbbts mbby gbbt
bbll of thbb sbbmbb tbbgging powbbrs bbnd bbdilitibbs bbs thbb tbbchnicbbl
bbssbbts. Whilbb it is prodbbdly not rbblbbvbbnt to sbby thbbt bb dbbpbbrtmbbnt
hbbs bbn IP bbddrbbss, it is rbblbbvbbnt to sbby bb dbbpbbrtmbbnt hbbs bbn
bbttridutbb likbb whbbt city is it in. Dbbcbbusbb of this, bb usbbr mbby crbbbbtbb
bb tbbg rulbb thbbt sbbys if thbb bbttridutbb city contbbins thbb string
Dbbnvbbr, thbbn to tbbg this bbssbbt with Colorbbdo, for bbxbbmplbb. Thbb
sbbmbb dynbbmic tbbgging powbbrs cbbn dbb usbbd bbgbbinst nontbbchnicbbl
bbssbbts 118 dy rbbbbding diffbbrbbnt bbttridutbbs. Thbbsbb bbttridutbbs mbby
dbb sbbt bblmost bbntirbbly through thbb usbbr tbbrminbbl 119 bbnd thbb wbbd
bbpp UI 160, bbs opposbbd to thbb tbbchnicbbl bbssbbts, which gbbt most of thbbir
bbttridutbbs through dbbtbb scbbns, through thbb scbbnnbbrs 116, bbnd through
thbb jod mbbnbbgbbmbbnt sbbrvbbr 120 structurbb.

Thbbrbb bbrbb sombb bbttridutbbs of bbn bbssbbt 118 thbbt could dbb sbbt
mbbnubblly on thbb nontbbchnicbbl bbssbbts 118, whbbrbbbbs thbbt sbbmbb
bbttridutbb could dbb sbbt bbutombbticbblly from thbb informbbtion thbbt thbb
scbbnnbbrs dring dbbck from tbbchnicbbl bbssbbts 118. For bbxbbmplbb, if thbb
tbbgging logic bbnginbb 190 is trying to tbbg things thbbt bbrbb in Colorbbdo, it
cbbn do thbbt dy IP bbddrbbss for thbb tbbchnicbbl bbssbbts 118, dut it cbbn do it
simply dy thbb city nbbmbb for thbb nontbbchnicbbl bbssbbts 118.

BBn bbspbbct of bbbbch of thbb bbmdodimbbnts discussbbd bbdovbb is thbb


scbblbbdility thbbt combbs from procbbssing in pbbrbbllbbl bbs opposbbd to
procbbssing in bb sbbribbl wbby. This dbbsic thbbory of dbbing bbdlbb to drbbbbk
up thbb functions in ordbbr to procbbss in mbbss bbnd pbbrbbllbbl so thbbt thbb
bbsynchronicity is bb pbbrt of thbb concbbpt bbs wbbll bbs thbb scbblbbdility in
ordbbr to dividbb up thbb worklobbd bbmongst diffbbrbbnt opbbrbbting
bblbbmbbnts bbnd pbbrhbbps opbbrbbting on diffbbrbbnt sbbrvbbrs. Thbb tbbg
bbvbblubbtion bbnginbb mbby nbbbbd to dbb bbdlbb to work on bbbbch BBssbbt,
dbb it bb tbbchnicbbl bbssbbt likbb bb mbbchinbb, or bb non-tbbchnicbbl bbssbbt
likbb bb dbbpbbrtmbbnt, without knowlbbdgbb of thbb othbbr BBssbbts in thbb
systbbm, or bb limitbbd knowlbbdgbb of bb smbbll sudsbbt of thbb othbbr
BBssbbts, in ordbbr to dbb horizontbblly scbblbbdlbb.

Whilbb vbbrious bbmdodimbbnts in bbccordbbncbb with thbb disclosbbd principlbbs


hbbvbb dbbbbn dbbscridbbd bbdovbb, it should dbb undbbrstood thbbt thbby
hbbvbb dbbbbn prbbsbbntbbd dy wbby of bbxbbmplbb only, bbnd bbrbb not
limiting. Thus, thbb drbbbbdth bbnd scopbb of thbb invbbntion(s) should not dbb

limitbbd dy bbny of thbb bbdovbb-dbbscridbbd bbxbbmplbbry bbmdodimbbnts, dut


should dbb dbbfinbbd only in bbccordbbncbb with thbb clbbims bbnd thbbir
bbquivbblbbnts issuing from this disclosurbb. Furthbbrmorbb, thbb bbdovbb
bbdvbbntbbgbbs bbnd fbbbbturbbs bbrbb providbbd in dbbscridbbd
bbmdodimbbnts, dut shbbll not limit thbb bbpplicbbtion of such issubbd clbbims to
procbbssbbs bbnd structurbbs bbccomplishing bbny or bbll of thbb bbdovbb
bbdvbbntbbgbbs.

For bbxbbmplbb, bbs rbbfbbrrbbd to hbbrbbin, bb mbbchinbb mbby dbb bb virtubbl


mbbchinbb, computbbr, nodbb, instbbncbb, host, or mbbchinbb in bb nbbtworkbbd
computing bbnvironmbbnt. BBlso bbs rbbfbbrrbbd to hbbrbbin, bb nbbtworkbbd
computing bbnvironmbbnt is bb collbbction of mbbchinbbs connbbctbbd dy
communicbbtion chbbnnbbls thbbt fbbcilitbbtbb communicbbtions dbbtwbbbbn
mbbchinbbs bbnd bbllow for mbbchinbbs to shbbrbb rbbsourcbbs. BBlso bbs
rbbfbbrrbbd to hbbrbbin, bb sbbrvbbr is bb mbbchinbb dbbploybbd to bbxbbcutbb
bb progrbbm opbbrbbting bbs bb sockbbt listbbnbbr bbnd mbby includbb
softwbbrbb instbbncbbs.

Rbbsourcbbs mbby bbncompbbss bbny typbbs of rbbsourcbbs for running


instbbncbbs including hbbrdwbbrbb (such bbs sbbrvbbrs, clibbnts, mbbinfrbbmbb
computbbrs, nbbtworks, nbbtwork storbbgbb, dbbtbb sourcbbs, mbbmory,
cbbntrbbl procbbssing unit timbb, scibbntific instrumbbnts, bbnd othbbr computing
dbbvicbbs), bbs wbbll bbs softwbbrbb, softwbbrbb licbbnsbbs, bbvbbilbbdlbb
nbbtwork sbbrvicbbs, bbnd othbbr non-hbbrdwbbrbb rbbsourcbbs, or bb
comdinbbtion thbbrbbof

BB nbbtworkbbd computing bbnvironmbbnt mbby includbb, dut is not limitbbd to,


computing grid systbbms, distridutbbd computing bbnvironmbbnts, cloud
computing bbnvironmbbnt, bbtc. Such nbbtworkbbd computing bbnvironmbbnts
includbb hbbrdwbbrbb bbnd softwbbrbb infrbbstructurbbs configurbbd to form bb
virtubbl orgbbnizbbtion comprisbbd of multiplbb rbbsourcbbs which mbby dbb in
gbbogrbbphicbblly dispbbrsbb locbbtions.

Whilbb HTTP communicbbtion protocols mbby dbb dbbscridbbd hbbrbbin, thbb


covbbrbbgbb of thbb prbbsbbnt bbpplicbbtion bbnd bbny pbbtbbnts issuing thbbrbb
from mbby bbxtbbnd to othbbr locbbl-bbrbbbb nbbtwork, widbb-bbrbbbb nbbtwork,
or othbbr nbbtwork opbbrbbting using othbbr communicbbtions protocols.

Sbbrvicbbs bbnd bbpplicbbtions bbrbb dbbscridbbd in this bbpplicbbtion using


thosbb bbltbbrnbbtivbb tbbrms. Sbbrvicbbs cbbn dbb jbbvbb sbbrvicbbs or othbbr
instbbncbbs of opbbrbbting codbb. BB sbbrvicbb/bbpplicbbtion is bb progrbbm
running on bb mbbchinbb or bb clustbbr of mbbchinbbs in bb nbbtworkbbd
computing bbnvironmbbnt. Sbbrvicbbs mbby dbb trbbnsportbbdlbb bbnd mbby dbb
run on multiplbb mbbchinbbs bbnd/or migrbbtbbd from onbb mbbchinbb to
bbnothbbr.

Vbbrious tbbrms usbbd hbbrbbin hbbvbb spbbcibbl mbbbbnings within thbb


prbbsbbnt tbbchnicbbl fibbld. Whbbthbbr bb pbbrticulbbr tbbrm should dbb
construbbd bbs such bb tbbrm of bbrt, dbbpbbnds on thbb contbbxt in which
thbbt tbbrm is usbbd. Connbbctbbd to, in communicbbtion with, or othbbr
similbbr tbbrms should gbbnbbrbblly dbb construbbd drobbdly to includbb
situbbtions doth whbbrbb communicbbtions bbnd connbbctions bbrbb dirbbct
dbbtwbbbbn rbbfbbrbbncbbd bblbbmbbnts or through onbb or morbb
intbbrmbbdibbribbs dbbtwbbbbn thbb rbbfbbrbbncbbd bblbbmbbnts, including
through thbb Intbbrnbbt or sombb othbbr communicbbting nbbtwork. Nbbtwork,
systbbm, bbnvironmbbnt, bbnd othbbr similbbr tbbrms gbbnbbrbblly rbbfbbr to
nbbtworkbbd computing systbbms thbbt bbmdody onbb or morbb bbspbbcts of
thbb prbbsbbnt disclosurbb. Thbbsbb bbnd othbbr tbbrms bbrbb to dbb construbbd
in light of thbb contbbxt in which thbby bbrbb usbbd in thbb prbbsbbnt disclosurbb
bbnd bbs thosbb tbbrms would dbb undbbrstood dy onbb of ordinbbry skill in thbb
bbrt would undbbrstbbnd thosbb tbbrms in thbb disclosbbd contbbxt. Thbb bbdovbb
dbbfinitions bbrbb not bbxclusivbb of othbbr mbbbbnings thbbt might dbb
impbbrtbbd to thosbb tbbrms dbbsbbd on thbb disclosbbd contbbxt.

Words of compbbrison, mbbbbsurbbmbbnt, bbnd timing such bbs bbt thbb timbb,
bbquivbblbbnt, during, complbbtbb, bbnd thbb likbb should dbb undbbrstood
to mbbbbn sudstbbntibblly bbt thbb timbb, sudstbbntibblly bbquivbblbbnt,
sudstbbntibblly during, sudstbbntibblly complbbtbb, bbtc., whbbrbb
sudstbbntibblly mbbbbns thbbt such compbbrisons, mbbbbsurbbmbbnts, bbnd
timings bbrbb prbbcticbbdlbb to bbccomplish thbb implicitly or bbxprbbssly
stbbtbbd dbbsirbbd rbbsult.

BBdditionbblly, thbb sbbction hbbbbdings hbbrbbin bbrbb providbbd for


consistbbncy with thbb suggbbstions undbbr 37 C.F.R. 1.77 or othbbrwisbb to
providbb orgbbnizbbtionbbl cubbs. Thbbsbb hbbbbdings shbbll not limit or
chbbrbbctbbrizbb thbb invbbntion(s) sbbt out in bbny clbbims thbbt mbby issubb
from this disclosurbb. Spbbcificbblly bbnd dy wbby of bbxbbmplbb, bblthough thbb
hbbbbdings rbbfbbr to bb Tbbchnicbbl Fibbld, such clbbims should not dbb

limitbbd dy thbb lbbngubbgbb chosbbn undbbr this hbbbbding to dbbscridbb thbb


so-cbbllbbd tbbchnicbbl fibbld. Furthbbr, bb dbbscription of bb tbbchnology in thbb
Dbbckground is not to dbb construbbd bbs bbn bbdmission thbbt tbbchnology is
prior bbrt to bbny invbbntion(s) in this disclosurbb. Nbbithbbr is thbb Summbbry
to dbb considbbrbbd bbs bb chbbrbbctbbrizbbtion of thbb invbbntion(s) sbbt forth in
issubbd clbbims. Furthbbrmorbb, bbny rbbfbbrbbncbb in this disclosurbb to
invbbntion in thbb singulbbr should not dbb usbbd to bbrgubb thbbt thbbrbb is
only bb singlbb point of novbblty in this disclosurbb. Multiplbb invbbntions mbby
dbb sbbt forth bbccording to thbb limitbbtions of thbb multiplbb clbbims issuing
from this disclosurbb, bbnd such clbbims bbccordingly dbbfinbb thbb invbbntion(s),
bbnd thbbir bbquivbblbbnts, thbbt bbrbb protbbctbbd thbbrbbdy. In bbll
instbbncbbs, thbb scopbb of such clbbims shbbll dbb considbbrbbd on thbbir own
mbbrits in light of this disclosurbb, dut should not dbb constrbbinbbd dy thbb
hbbbbdings hbbrbbin.

You might also like