×

Systems and methods for automating security controls between computer networks

  • US 10,673,831 B2
  • Filed: 08/11/2017
  • Issued: 06/02/2020
  • Est. Priority Date: 08/11/2017
  • Status: Active Grant
First Claim
Patent Images

1. A security control (SC) system comprising one or more security control (SC) computing devices for automating security controls between computer networks, the one or more SC computing devices comprising at least one processor and a memory, the SC system configured to:

  • generate, using a declared dependency graph, a network topology based on service metadata identifying zones of the computer networks;

    identify one or more computer systems included in the computer networks based on the network topology, wherein the identified one or more computer systems are one or more non-privileged access computer systems that do not require privileged access to a service controlled by the one or more SC computing devices;

    receive a request to access the service including a system identifier, the system identifier identifies a candidate computer system requesting access to the service;

    perform a lookup in the network topology for the candidate computer system;

    determine that the candidate computer system is not one of the one or more non-privileged access computer systems based on results from the lookup;

    in response to the determination, build a token request based on the received request;

    download, from a policy administration point (PAP), at least one security policy and at least one public key, the at least one security policy and the at least one public key associated with the system identifier;

    correlate the token request to the at least one security policy and the at least one public key;

    generate an access token in response to the token request, wherein the access token is included in an authorization request;

    invoke the service using the authorization request;

    validate the access token using the at least one security policy and the at least one public key; and

    authorize access to the service in response to the validation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×