ARCHITECTURE FOR UNIFIED THREAT MANAGEMENT
First Claim
Patent Images
1. A method of securing an asset implemented by a security system comprising:
- detecting a physical coordinate corresponding to an action relating to an attempt to access the asset;
detecting a logical coordinate corresponding to an action relating to an attempt to access the asset;
mapping the physical coordinate and the logical coordinate; and
, controlling access to the asset in response to the mapping.
1 Assignment
0 Petitions
Accused Products
Abstract
A security architecture has an event analysis engine that acquires several tangible actions. The occur in an action space of an organization, and relate to unauthorized access to assets and reproduction of information. The event analysis engine evaluates the acquired actions based on the information stored in the database and in the context of past actions which have occurred, and determines a suitable response to the acquired action based on the evaluation.
166 Citations
23 Claims
-
1. A method of securing an asset implemented by a security system comprising:
-
detecting a physical coordinate corresponding to an action relating to an attempt to access the asset;
detecting a logical coordinate corresponding to an action relating to an attempt to access the asset;
mapping the physical coordinate and the logical coordinate; and
,controlling access to the asset in response to the mapping. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security architecture comprising:
-
a database that stores information about the systems to which users have access and the privileges Of the users with respect to those systems; and
an event analysis engine, wherein the event analysis engine acquires several tangible actions occurring in an action space, wherein the actions relate to access to assets and reproduction of information, wherein the event analysis engine evaluates the acquired actions based on the information stored in the database and in context of past actions which have occurred, and wherein the event analysis engine determines a suitable response to the acquired action based on the evaluation. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of protecting the transfer of a document from a first data carrying device to a second data carrying device comprising:
-
monitoring an action of a user with respect to an attempt to transfer the document from the first data carrying device to the second data carrying device;
determining whether the user is authorized to make the transfer based credentials of the user and a usage code on the document;
permitting the transfer if the user is authorized and preventing the transfer if the user is not authorized. - View Dependent Claims (23)
-
Specification