SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ADAPTING THE SECURITY MEASURES OF A COMMUNICATION NETWORK BASED ON FEEDBACK
First Claim
1. A method for adapting a security system based on security-related data associated with a communication network, the method comprising:
- collecting, by a plurality of trust mediator agents, security-related data associated with a plurality of communication network modules, the plurality of trust mediator agents being associated with the plurality of network modules, respectively,wherein at least one of the plurality of communication network modules is a mobile communication device,wherein the security-related data is collected for one or more variables selected by a trust mediator, andwherein the security-related data is collected periodically at a time interval determined by the trust mediator;
transmitting, by the plurality of trust mediator agents, the security-related data to the trust mediator over the communication network;
determining, by the trust mediator, based on at least one of the security-related data transmitted by the trust mediator agents and a predetermined rule stored in a memory, modifications to one or more security safeguards; and
transmitting, by the trust mediator, instructions corresponding to the modifications to at least one of the plurality of trust mediator agents over the communication network.
1 Assignment
0 Petitions
Accused Products
Abstract
An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect changes in the security characteristics of the network and communicate the detected security characteristics to a trust mediator. Based on the security characteristics received from the trust mediator agents, the trust mediator adjusts security safeguards to maintain an acceptable level of security. Trust mediator also uses predetermined rules in determining whether to adjust security safeguards. Despite inevitable changes in security characteristics, an acceptable level of security and efficient network operation are achieved without subjecting users of the network to over burdensome security safeguards.
-
Citations
18 Claims
-
1. A method for adapting a security system based on security-related data associated with a communication network, the method comprising:
-
collecting, by a plurality of trust mediator agents, security-related data associated with a plurality of communication network modules, the plurality of trust mediator agents being associated with the plurality of network modules, respectively, wherein at least one of the plurality of communication network modules is a mobile communication device, wherein the security-related data is collected for one or more variables selected by a trust mediator, and wherein the security-related data is collected periodically at a time interval determined by the trust mediator; transmitting, by the plurality of trust mediator agents, the security-related data to the trust mediator over the communication network; determining, by the trust mediator, based on at least one of the security-related data transmitted by the trust mediator agents and a predetermined rule stored in a memory, modifications to one or more security safeguards; and transmitting, by the trust mediator, instructions corresponding to the modifications to at least one of the plurality of trust mediator agents over the communication network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An adaptive security system for a communication network, the system comprising:
-
a plurality of communication network modules, including a mobile communication device, interconnected over the communication network; a plurality of trust mediator agents coupled to the plurality of communication network modules, respectively, the trust mediator agents being configured to collect security-related data for one or more variables at a time interval associated with the plurality of communication network modules; and a trust mediator configured to; select the one or more variables, determine the time interval, receive over the communication network, the security-related data from the plurality of trust mediator agents, determine, based on at least one of the security-related data transmitted by the trust mediator agents and a predetermined rule stored in a memory, modifications to one or more security safeguards, and transmit instructions corresponding to the modifications to at least one of the plurality of trust mediator agents over the communication network. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions which when executed by a computer system cause the computer system to perform:
-
collecting, by a plurality of trust mediator agents, security-related data associated with a plurality of communication network modules, the plurality of trust mediator agents being associated with the plurality of network modules, respectively, wherein at least one of the plurality of communication network modules is a mobile communication device, wherein the security-related data is collected for one or more variables selected by a trust mediator, and wherein the security-related data is collected periodically at a time interval determined by the trust mediator; transmitting, by the plurality of trust mediator agents, the security-related data to the trust mediator over the communication network; determining, by the trust mediator, based on at least one of the security-related data transmitted by the trust mediator agents and a predetermined rule stored in a memory, modifications to one or more security safeguards; and transmitting, by the trust mediator, instructions corresponding to the modifications to at least one of the plurality of trust mediator agents over the communication network. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification