Systems and methods for implementing security
First Claim
1. A first computer system comprising:
- one or more processing units;
memory, coupled to at least one of the one or more processing units, wherein the memory stores an operating system, and wherein the operating system is executed by the one or more processing units; and
one or more programs that run within the operating system, wherein a first program of the one or more programs is an agent that is executed by at least one of the one or more processing units, and wherein the agent includes instructions for;
initiating a communication with a remote security system in order to obtain an authentication token that is uniquely associated with the agent;
receiving a plurality of executable instructions from the remote security server according to a security policy assigned to the agent, wherein the instructions are received through an encrypted communication channel between the agent and the remote security system, and wherein the encrypted communication channel uses the authentication token; and
executing, at the first computer system, the plurality of received executable instructions, thereby implementing a security policy of the assigned security policy, wherein the agent initiates all communication with the remote computer system, the remote computer system cannot initiate communication with the agent, and the remote computer system identifies the executable instructions for the agent by placing them in a command queue associated with the agent.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and method are provided in accordance with one or more processes that run within an operating system, in which a first process of the one or more processes is an agent that encodes instructions for obtaining an authentication token uniquely associated with the agent. The agent collects security information about a first computer system running the one or more processes according to one or more commands received from a remote security system. The collected information is transmitted to the remote security system on an encrypted communication channel between the agent and the remote security system using the authentication token. Executable instructions are received through the encrypted communication channel at the first computer from the remote server according to a security policy assigned to the agent. The received executable instructions are executed at the first computer system, thereby implementing the assigned security policy.
-
Citations
27 Claims
-
1. A first computer system comprising:
-
one or more processing units; memory, coupled to at least one of the one or more processing units, wherein the memory stores an operating system, and wherein the operating system is executed by the one or more processing units; and one or more programs that run within the operating system, wherein a first program of the one or more programs is an agent that is executed by at least one of the one or more processing units, and wherein the agent includes instructions for; initiating a communication with a remote security system in order to obtain an authentication token that is uniquely associated with the agent; receiving a plurality of executable instructions from the remote security server according to a security policy assigned to the agent, wherein the instructions are received through an encrypted communication channel between the agent and the remote security system, and wherein the encrypted communication channel uses the authentication token; and executing, at the first computer system, the plurality of received executable instructions, thereby implementing a security policy of the assigned security policy, wherein the agent initiates all communication with the remote computer system, the remote computer system cannot initiate communication with the agent, and the remote computer system identifies the executable instructions for the agent by placing them in a command queue associated with the agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification