×

Monitoring usage of an application to identify characteristics and trigger security control

  • US 10,607,021 B2
  • Filed: 01/26/2018
  • Issued: 03/31/2020
  • Est. Priority Date: 01/26/2018
  • Status: Active Grant
First Claim
Patent Images

1. A computing environment for monitoring usage of an application to identify characteristics and trigger security control, the computing environment comprising:

  • an originating system having a computing platform having a memory and at least one processor in communication with the memory;

    a plurality of networked communication channels each configured to communicate one or more of a plurality of instructions for interacting with one or more control systems and one or more downstream resources in response to calling of an originating application by the originating system; and

    an application system in operative communication with the originating system and the plurality of networked communication channels and for providing automatic application characteristic identification and triggering security control, and comprising a computing platform having a memory and at least one processor in communication with the memory, the memory comprising computer-executable instructions, that when executed cause the processor to;

    perform a query configured to identify any application calls performed in a predetermined period of time within the computing environment;

    for each identified application call, build a corresponding application characteristics entry in a database;

    for each identified application call, identify a plurality of characteristics of the called application including at least one downstream resource;

    associate the identified plurality of characteristics of the called application with the application characteristics entry in the database, thereby creating an application mapping;

    identify one or more security controls associated with each of the applications in the application mapping;

    associate the identified one or more security controls with the associated application characteristics entry in the application mapping; and

    automatically trigger assessment of an effectiveness of the one or more security controls in response to identifying a future application call.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×