×

Policy management system with proactive and reactive monitoring and enforcement

  • US 10,044,570 B2
  • Filed: 09/30/2014
  • Issued: 08/07/2018
  • Est. Priority Date: 08/22/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method to monitor a network to prevent violations of network policies, the method comprising:

  • simulating, by executing an instruction with a processor, application of a change to a first set of network state data in temporary memory to generate simulated network state data by determining at least one of (A) a first set of data tuples that will be added or (B) a second set of data tuples that will be removed when the change to the first set of network state data occurs in a first cloud management application, the change identified in a request received from the first cloud management application;

    analyzing, by executing an instruction with the processor, the simulated network state data stored in the temporary memory to determine if the change violates a network policy declared for the network;

    enforcing the network policy proactively by;

    issuing, by executing an instruction with the processor, a first command to the first cloud management application to permit the change in the first cloud management application when the simulated network state data does not violate the network policy;

    issuing, by executing an instruction with the processor, a second command to the first cloud management application to prevent the change in the first cloud management application when the simulated network state data violates the network policy; and

    enforcing the network policy reactively by;

    determining, by executing an instruction with the processor, that a third set of data tuples of updated network state data corresponding to a storage network match a violation condition specified by the network policy; and

    issuing, by executing an instruction with the processor, a third command to a second cloud management application to modify the network state data corresponding to the storage network into modified network state data that does not violate the network policy.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×