Communications traffic segregation for security purposes
First Claim
Patent Images
1. A method for applying a communications traffic security policy including one or both of a detection policy and an enforcement policy, the method comprising:
- segregating a distinct communications traffic flow based upon characteristics of the distinct communications traffic flow which exhibits a security value; and
, applying one or both of the detection policy and the enforcement policy to the segregated communications traffic flow.
1 Assignment
0 Petitions
Accused Products
Abstract
Technology for applying a communications traffic security policy in which a distinct communications traffic flow is segregated based upon a security value; whereby the communications traffic security policy include one or both of a detection and an enforcement policy. The detection policy may include determining whether the segregated communications traffic flow involves malware; and, the enforcement policy may include a malware policy.
23 Citations
20 Claims
-
1. A method for applying a communications traffic security policy including one or both of a detection policy and an enforcement policy, the method comprising:
-
segregating a distinct communications traffic flow based upon characteristics of the distinct communications traffic flow which exhibits a security value; and
,applying one or both of the detection policy and the enforcement policy to the segregated communications traffic flow. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for applying a communications traffic policy comprising:
-
segregating communications traffic flows as one or both of user-interactive and non-interactive;
tracking one or both of the segregated communications traffic flows;
determining whether one or both of the tracked one or both communications traffic flows is associated with malware; and
one or both of enforcing a malware policy and allowing the communications traffic to flow. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer system including a computing device and a connection for connecting the computing device to a network, the computer system further including:
a security policy component connected to or within one or both of the computing device and the connection;
the security policy component having a processor and adapted to be executed therby is one or both of a detection module and an enforcement module;
the security policy component also being adapted to execute one or both of a detection module and an enforcement module in relation to a segregated communications traffic flow, the one or both of the detection and the enforcement policies defining a category for the segregation of the segregated communications traffic flow.
Specification