×

Systems and methods for implementing intrusion prevention

  • US 10,367,834 B2
  • Filed: 05/12/2016
  • Issued: 07/30/2019
  • Est. Priority Date: 05/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer system comprising:

  • one or more processing units;

    memory storing one or more programs for execution by the one or more processors, the one more programs comprising;

    instructions for receiving data collected at one or more remote computing assets;

    instructions for obtaining a plurality of workflow templates, wherein each respective workflow template in the plurality of workflow templates corresponds to a different threat vector in a plurality of threat vectors and wherein each respective workflow template in the plurality of workflow templates comprises;

    (i) a trigger definition, (ii) an authorization token, and (iii) an enumerated countermeasure responsive to the corresponding threat vector; and

    instructions for identifying an active threat by comparing the data collected at the one or more remote computing assets against the trigger definition of respective workflow templates in the plurality of workflow templates, wherein, when a match between the data collected at the one or more remote computing assets and a specific trigger definition of a corresponding specific workflow template is identified, an active threat is deemed to be identified, and the instructions for identifying further comprise;

    (A) enacting the authorization token of the corresponding workflow template, wherein the enacting comprises;

    (a) obtaining authorization from a first authorization contact associated with the corresponding workflow template, the obtaining (a) comprising (i) pushing an alert regarding the corresponding workflow template through a first established trust channel to a first remote device associated with the first authorization contact without user intervention by the first authorization contact, wherein the first remote device is other than the one or more remote computing assets, and (ii) receiving a first indication to proceed from the first authorization contact, and(b) obtaining authorization from a second authorization contact associated with the corresponding workflow template, by a method comprising (i) pushing the alert regarding the corresponding workflow template through a second established trust channel to a second remote device associated with the second authorization contact without user intervention by the second authorization contact, wherein the second remote device is other than the one or more remote computing assets and wherein the second remote device is other than the first remote device, and (ii) receiving a second indication to proceed from the second authorization contact,(c) pushing the alert to a plurality of authorization contacts, wherein the plurality of authorization contacts consists of three of more authorization contacts and includes the first and the second authorization contacts,(B) responsive to satisfactory completion of authorization protocol, wherein satisfaction of the authorization protocol requires receiving an indication to proceed from more than a predetermined number of authorization contacts in the plurality of authorization contacts, including the first and the second indication to proceed, wherein the predetermined number of authorization contacts is less than the number of authorization contacts in the plurality of authorization contacts, executing the enumerated countermeasure of the corresponding workflow template, and(C) originating or maintaining the established first trust channel by;

    receiving a request from a security control module running within an operating system on the first remote device, wherein the request includes a policy identifier that identifies a security policy,generating a unique agent identity token, which includes a cryptographic key,transmitting the unique agent identity token to the security control module,selecting a set of commands according to the identified security policy, based on (i) a current state of the operating system, (ii) a current state of the security control module, and, optionally (iii) a current state of one or more applications running in the operating system on the first remote device,placing the set of commands in a command queue for retrieval and execution by the first remote device,receiving data from the first remote device responsive to execution of the set of commands on the first remote device, andusing the data to originate or maintain the first established trust channel with the first remote device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×