Social-graph aware policy suggestion engine
First Claim
1. A machine-readable storage device or storage disk comprising instructions that, when executed, cause a security appliance to at least:
- identify a first user within a first social network corresponding to a first social media environment;
collect first user properties corresponding to the first user, the first user properties based on a first user profile for the first user associated with the first social media environment;
collect device information about at least one of devices or networks to be protected by the security appliance;
request a set of recommended security policies from a security policy provider responsive to the first user properties and the device information, the set of recommended security policies based on modifications by a second user to previous security policy recommendations, the second user associated with second user properties, the second user properties based on a second user profile for the second user associated with at least one of the first social media environment or a different social media environment, the second user properties having similarities with the first user properties; and
in response to receiving the set of recommended security policies from the security policy provider, implement the set of recommended security policies.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users on the network are monitored to determine appropriate configuration settings and preferences by utilizing a combination of internally configured information and externally gathered information for each user. For example, externally gathered information may include information obtained about a user from one or more social media Internet sites. Automatically obtained information may be used to provide or augment policy information such that a user'"'"'s preference relative to internet content (e.g., content blocking software configuration) may be achieved without requiring an administrator to individually prepare each users security profile and configuration.
-
Citations
20 Claims
-
1. A machine-readable storage device or storage disk comprising instructions that, when executed, cause a security appliance to at least:
-
identify a first user within a first social network corresponding to a first social media environment; collect first user properties corresponding to the first user, the first user properties based on a first user profile for the first user associated with the first social media environment; collect device information about at least one of devices or networks to be protected by the security appliance; request a set of recommended security policies from a security policy provider responsive to the first user properties and the device information, the set of recommended security policies based on modifications by a second user to previous security policy recommendations, the second user associated with second user properties, the second user properties based on a second user profile for the second user associated with at least one of the first social media environment or a different social media environment, the second user properties having similarities with the first user properties; and in response to receiving the set of recommended security policies from the security policy provider, implement the set of recommended security policies. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A security appliance, comprising:
-
a processor; and memory including instructions that, when executed, cause the processor to; identify a first user within a first social network corresponding to a first social media environment; collect first user properties corresponding to the first user in the first social network, the first user properties based on a first user profile for the first user associated with the first social media environment; collect device information about at least one of devices or networks to be protected by the security appliance; request a set of recommended security policies from a security policy provider responsive to the collected first user properties and the device information, the set of recommended security policies based on modifications by a second user to previous security policy recommendations, the second user associated with second user properties, the second user properties based on a second user profile for the second user associated with at least one of the first social media environment or a different social media environment, the second user properties having commonalities with the first user properties; and implement the set of recommended security policies from the security policy provider. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of configuring a security gateway appliance, the method comprising:
-
identifying a first user within a first social network corresponding to a first social media environment; collecting first user properties corresponding to the first user in the first social network, the first user properties based on a first user profile for the first user associated with the first social media environment; collecting hardware information about at least one of devices or networks to be protected by the security gateway appliance; requesting a set of recommended security policies from a security policy provider responsive to the collected first user properties and hardware information, the set of recommended security policies based on modifications by a second user to previous security policy recommendations, the second user associated with second user properties, the second user properties based on a second user profile for the second user associated with at least one of the first social media environment or a different social media environment, the second user properties associated with the first user properties; and implementing the set of recommended security policies from the security policy provider on the security gateway appliance. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification