Security control module
First Claim
1. A system for distributing information from a first process to one or more security service modules, said system comprising the steps of:
- a remote interface capable of accepting first information from the first process;
a provisioning service provider coupled to the remote interface and capable of obtaining the first information from the remote interface, and further capable of providing second information to a local interface, wherein the second information is based on the first information and is tailored for the one or more security service modules;
the local interface capable of providing the second information to the one or more security service modules; and
wherein the one or more security service modules are capable of accepting the second information and performing at least one of the following;
adjusting a configuration of the one or more security service modules to reflect the second information, and protecting access to at least one resource based on the second information.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for distributing information from a first process to one or more security service modules, said system comprising the steps of, a remote interface capable of accepting first information from the first process, a provisioning service provider coupled to the remote interface and capable of obtaining the first information from the remote interface, and further capable of providing second information to a local interface, wherein the second information is based on the first information and is tailored for the one or more security service modules, the local interface capable of providing the second information to the one or more security service modules and wherein the one or more security service modules are capable of accepting the second information and performing at least one of the following: adjusting a configuration of the one or more security service modules to reflect the second information, and protecting access to at least one resource based on the second information.
-
Citations
33 Claims
-
1. A system for distributing information from a first process to one or more security service modules, said system comprising the steps of:
-
a remote interface capable of accepting first information from the first process;
a provisioning service provider coupled to the remote interface and capable of obtaining the first information from the remote interface, and further capable of providing second information to a local interface, wherein the second information is based on the first information and is tailored for the one or more security service modules;
the local interface capable of providing the second information to the one or more security service modules; and
wherein the one or more security service modules are capable of accepting the second information and performing at least one of the following;
adjusting a configuration of the one or more security service modules to reflect the second information, and protecting access to at least one resource based on the second information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for distributing information from a first process to one or more security service modules, said method comprising the steps of:
-
obtaining the first information from the first process;
providing second information to the one or more security service modules, wherein second information is based on the first information and is tailored for the one or more security service modules; and
wherein the one or more security service modules are capable of accepting the second information and performing at least one of the following;
adjusting a configuration of the one or more security service modules to reflect the second information, and protecting access to at least one resource based on the second information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A machine readable medium having instructions stored thereon to cause a system to:
-
obtain first information from a first process;
provide second information to one or more security service modules, wherein second information is based on the first information and is tailored for the one or more security service modules; and
wherein the one or more security service modules are capable of accepting the second information and performing at least one of the following;
adjusting a configuration of the one or more security service modules to reflect the second information, and protecting access to at least one resource based on the second information. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer signal embodied in a transmission medium, comprising:
-
a code segment including instructions for obtaining the first information from the first process;
a code segment including instructions for providing second information to the one or more security service modules, wherein second information is based on the first information and is tailored for the one or more security service modules; and
wherein the one or more security service modules are capable of accepting the second information and performing at least one of the following;
adjusting a configuration of the one or more security service modules to reflect the second information, and protecting access to at least one resource based on the second information.
-
Specification