Secure and differentiated delivery of network security information
First Claim
1. A method in a computer system for distributing network security information, comprising:
- attaching to the network security information a signature that both reliably identifies the origin of the network security information and characterizes the contents of the network security information, the attached signature enabling recipients of the network security information to identify the origin of the network security information and determine whether the network security information has been altered since the signature was attached;
receiving a query identifying characteristics of potential network security information recipients that should receive the network security information;
from among the multiplicity of potential recipients, selecting a plurality of recipients for the network security information by performing the query against a recipient profiling data store containing information relating to characteristics of each of a multiplicity of potential network security information recipients; and
transmitting the signed network security information to each of the plurality of selected recipients.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a facility for distributing network security information. The facility receives network security information and recipient selection information specifying a characteristic of perspective recipients to be used in selecting recipients for the security information. The facility then compares the received recipient selection information to each of a plurality of perspective recipient profiles. Each perspective recipient profile corresponds to one or more perspective recipients and indicates one or more characteristics of the perspective recipients relating to the receipt of network security information. Based upon this comparison, the facility selects at least a portion of the plurality of perspective recipients as recipients of the network security information, and addresses the network security information to each of the selected recipients.
11 Citations
50 Claims
-
1. A method in a computer system for distributing network security information, comprising:
-
attaching to the network security information a signature that both reliably identifies the origin of the network security information and characterizes the contents of the network security information, the attached signature enabling recipients of the network security information to identify the origin of the network security information and determine whether the network security information has been altered since the signature was attached;
receiving a query identifying characteristics of potential network security information recipients that should receive the network security information;
from among the multiplicity of potential recipients, selecting a plurality of recipients for the network security information by performing the query against a recipient profiling data store containing information relating to characteristics of each of a multiplicity of potential network security information recipients; and
transmitting the signed network security information to each of the plurality of selected recipients. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-readable medium whose contents cause a computer system to distribute network security information by:
-
attaching to the network security information a signature that both reliably identifies the origin of the network security information and characterizes the contents of the network security information, the attached signature enabling recipients of the network security information to identify the origin of the network security information and determine whether the network security information has been altered since the signature was attached;
receiving a query identifying characteristics of potential network security information recipients that should receive the network security information;
from among the multiplicity of potential recipients, selecting a plurality of recipients for the network security information by performing the query against a recipient profiling data store containing information relating to characteristics of each of a multiplicity of potential network security information recipients; and
p1 transmitting the signed network security information to each of the plurality of selected recipients.
-
-
8. A method in one or more computer systems for distributing network security information, comprising:
-
receiving network security information;
receiving recipient selection information specifying a characteristic of prospective recipients to be used in selecting recipients for the received network security information;
comparing the received recipient selection information to each of a plurality of prospective recipient profiles, each prospective recipient profile corresponding to one or more prospective recipients and indicating one or more characteristics of the prospective recipients relating to the receipt of network security information;
based upon the comparison, selecting at least a portion of the plurality of prospective recipients as recipients of the network security information; and
addressing the received network security information to each of the selected recipients. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 28, 29, 30)
-
-
25-27. -27. (canceled)
-
31. A computer-readable medium whose contents cause one or more computer systems to distribute network security information by:
-
receiving network security information;
receiving recipient selection information specifying a characteristic of prospective recipients to be used in selecting recipients for the received network security information;
comparing the received recipient selection information to each of a plurality of prospective recipient profiles, each prospective recipient profile corresponding to one or more prospective recipients and indicating one or more characteristics of the prospective recipients relating to the receipt of network security information;
based upon the comparison, selecting at least a portion of the plurality of prospective recipients as recipients of the network security information; and
addressing the received network security information to each of the selected recipients. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. An apparatus for distributing network security information, comprising:
-
a receiver component adapted to receive network security information and recipient selection information specifying a characteristic of prospective recipients to be used in selecting recipients for the received network security information;
a recipient selection component adapted to compare the recipient selection information received by the receiver component to each of a plurality of prospective recipient profiles, each prospective recipient profile corresponding to one or more prospective recipients and indicating one or more characteristics of the prospective recipients relating to the receipt of network security information, and, based upon the comparison, select at least a portion of the plurality of prospective recipients as recipients of the network security information received by the receiver component; and
an addressing component adapted to address the received network security information to each of the recipients selected by the recipient selection component.
-
-
45. A method in a computer system for receiving network security information, comprising:
-
periodically transmitting a request to a network security information provider computer system for new network security information, the request containing a reliable identification of the computer system;
receiving from a network security information provider computer system a response to a transmitted request, the response containing network security information, the response further having a signature that both reliably identifies the source of the network security information and characterizes the contents of the network security information when the network security information left the source of the network security information;
using the signature to determine whether the source of the network security information is a trusted source;
using the signature to determine whether the network security information has been altered since the network security information left the source of the network security information; and
only if it is determined both (1) that the source of the network security information is a trusted source and (2) that the network security information has not been altered since the network security information left the source of the network security information, using the network security information in the computer system.
-
-
46. A computer-readable medium whose contents cause a computer system to receive network security information by:
-
periodically transmitting a request to a network security information provider computer system for new network security information, the request containing a reliable identification of the computer system;
receiving from a network security information provider computer system a response to a transmitted request, the response containing network security information, the response further having a signature that both reliably identifies the source of the network security information and characterizes the contents of the network security information when the network security information left the source of the network security information;
using the signature to determine whether the source of the network security information is a trusted source;
using the signature to determine whether the network security information has been altered since the network security information left the source of the network security information; and
only if it is determined both (1) that the source of the network security information is a trusted source and (2that the network security information has not been altered since the network security information left the source of the network security information, using the network security information in the computer system.
-
-
47. A computer system for receiving network security information, comprising:
-
a request transmitter adapted to periodically transmit a request to a network security information provider computer system for new network security information, the request containing a reliable identification of the computer system;
a receiver adapted to receive from a network security information provider computer system a response to a request transmitted by the request transmitter, the response containing network security information, the response further having a signature that both reliably identifies the source of the network security information and characterizes the contents of the network security information when the network security information left the source of the network security information;
an analyzer adapted to use the signature contained in the response received by the receiver to determine both (1) whether the source of the network security information is a trusted source and (2) whether the network security information has been altered since the network security information left the source of the network security information; and
a network security subsystem adapted to use the network security information in the computer system only if it is determined by the analyzer both (1) that the source of the network security information is a trusted source and (2) that the network security information has not been altered since the network security information left the source of the network security information.
-
-
48. A computer memory containing a network security information addressing data structure, comprising:
for each of a plurality of addressee candidates, a unique identification of the addressee candidate; and
information about the addressee candidate relating to criteria for distributing network security information, such that, for an instance of network security information specifying distribution criteria, the information about the addressee candidates relating to criteria for distributing network security information contained by the data structure may be used to identify addressee candidates having the distribution criteria specified for the instance of network security information, and such that the unique identifications of the addressee candidates contained by the data structure may be used to indicate the identification of each of the identified addressee candidates.
-
49. A computer memory containing a network security information data structure, comprising:
-
network security information usable to automatically modify the behavior of a network security device, the network security information having a source; and
a signature reliably indicating both the source of the network security information and the contents of the network security information when the network security information left the source, such that the signature contained by the data structure may be used to determine whether to use the network security information contained by the data structure to automatically modify the behavior of a network security device.
-
-
50. A generated data signal conveying a network security information data structure, comprising:
-
network security information usable to modify the behavior of a network security device, the network security information having a source; and
a signature reliably indicating both the source of the network security information and the contents of the network security information when the network security information left the source, such that the signature contained by the data structure may be used to determine whether to use the network security information contained by the data structure to modify the behavior of a network security device.
-
Specification