Critical period protection
First Claim
1. A method, comprising:
- monitoring a computing device having an first security state for one or more events indicating a time period of increased vulnerability;
adjusting one or more security policies in response to the one or more events to initiate a second security state;
identifying an end of the time of increased vulnerability; and
initiating a third security state.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for protecting a computer during a period of increased vulnerability. In one implementation, a method for protecting a computer is provided. The method includes monitoring a computing device having an first security state for one or more events indicating a time period of increased vulnerability. The method includes adjusting one or more security policies in response to the one or more events to generate a second security state. The method also includes identifying an end of the time of increased vulnerability, and restoring the computing to the first security state. In one implementation, the computer is an embedded device.
70 Citations
20 Claims
-
1. A method, comprising:
-
monitoring a computing device having an first security state for one or more events indicating a time period of increased vulnerability;
adjusting one or more security policies in response to the one or more events to initiate a second security state;
identifying an end of the time of increased vulnerability; and
initiating a third security state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security device, comprising:
-
a monitoring engine operable to monitor a computing device for events indicating a time period of increased system vulnerability;
a security engine operable to execute one or more security policies including different security policies for different states of the computing device; and
a policy module operable to store the one or more security policies. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. An embedded device, comprising:
-
a security device operable to adjust one or more security policies during a time of increased device vulnerability; and
an enhanced write filter operable to write data to an overlay.
-
-
20. A computer program product, tangibly stored on a computer-readable medium, comprising instructions operable to cause a programmable processor to:
-
monitor a computing device having an first security state for one or more events indicating a time period of increased vulnerability;
adjust one or more security policies in response to the one or more events to initiate a second security state;
identify an end of the time of increased vulnerability; and
initiate a third security state.
-
Specification