Method and system for processing events
First Claim
Patent Images
1. A method comprising:
- receiving an event from a first security engine;
identifying a second security engine configured to utilize information contained in the event; and
communicating the information contained in the event to the second security engine.
2 Assignments
0 Petitions
Accused Products
Abstract
An event, such as a security-related event, is received from a first security engine or another source. A second security engine is identified that is configured to utilize information contained in the event. The information contained in the event is then communicated to the second security engine. Additionally, other information, such as system state information, can be provided to one or more security engines.
76 Citations
32 Claims
-
1. A method comprising:
-
receiving an event from a first security engine;
identifying a second security engine configured to utilize information contained in the event; and
communicating the information contained in the event to the second security engine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving a security-related event from a first security-related application program;
identifying information contained in the security-related event;
identifying a second security-related application program associated with the information contained in the security-related event; and
communicating the information contained in the security-related event to the second security-related application program. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
a first security engine associated with a first type of security attack;
a second security engine associated with a second type of security attack; and
an event manager coupled to receive events from the first security engine and the second security engine, the event manager further to identify information contained in the events and to identify at least one security engine associated with information contained in a particular event, and further to communicate the information contained in the particular event to the at least one security engine. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. One or more computer-readable media having stored thereon a computer program that, when executed by one or more processors, causes the one or more processors to:
-
receive a first security-related event from a first service;
identify information contained in the first security-related event;
receive a second security-related event from a second service;
identify information contained in the second security-related event;
communicate information contained in the first security-related event to the second service; and
communicate information contained in the second security-related event to the first service. - View Dependent Claims (29, 30, 31, 32)
-
Specification