SYSTEM SELF INTEGRITY AND HEALTH VALIDATION FOR POLICY ENFORCEMENT
First Claim
1. A method of enforcing system self integrity validation policies, the method comprising:
- accessing, by a policy enforcer, a plurality of policies configured to enforce system integrity;
monitoring system performance to determine actions executed by the system;
based on at least one of the plurality of policies, comparing the system performance with system performance required by the at least one of the plurality of policies;
based on the comparison, determining that the system has performed in a manner contrary to the requirements of the at least one policy; and
in response, prohibiting access of the system to services provided by a service provider.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide methods and systems for enforcing system self integrity validation policies. The method includes accessing, by a policy enforcer, a plurality of policies configured to enforce system integrity, monitoring system performance to determine actions executed by the system, and based on at least one of the plurality of policies, comparing the system performance with system performance required by the at least one or the plurality of policies. The method further includes, based on the comparison, determining that the system has performed in a manner contrary to the requirements of the at least one policy, and in response, prohibiting access of the system to services provided by a service provider.
-
Citations
20 Claims
-
1. A method of enforcing system self integrity validation policies, the method comprising:
-
accessing, by a policy enforcer, a plurality of policies configured to enforce system integrity; monitoring system performance to determine actions executed by the system; based on at least one of the plurality of policies, comparing the system performance with system performance required by the at least one of the plurality of policies; based on the comparison, determining that the system has performed in a manner contrary to the requirements of the at least one policy; and in response, prohibiting access of the system to services provided by a service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of enforcing policies for a device, the method comprising:
-
detecting and reporting software running on the device and files stored on the device; detecting and reporting copying, distributing, or modifying of the software and/or files on the device; checking, with a policy enforcer, protection policies associated with each of the copied, distributed, or modified software and/or files; determining that the protection policy has been breached; and in response to the protection policy being breached, denying service provided by a service provider to the device. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system for enforcing system self integrity validation policies, the system comprising:
-
a customer device configured to execute programs and access files; a policy enforcer in connection with the customer device, the policy enforcer including a policy database configured to detect and report software running on the customer device and files stored on the customer device, detect and report copying, distributing, or modifying of the software and/or files on the device, access protection policies from the policy database, check the protection policies associated with each of the copied, distributed, or modified software and/or files, determine that the protection policy has been breached, and in response to the protection policy being breached, request that service be denied to the customer device; and a service provider in connection with the policy enforcer, the service provider configured to receive the denial of service request from the policy enforcer, and implement denial of service to the customer device. - View Dependent Claims (19)
-
-
20. A machine-readable medium including sets of instructions stored thereon for enforcing system self integrity validation policies which, when executed by a machine, causes the machine to:
-
access, by a policy enforcer, a plurality of policies configured to enforce system integrity; monitor system performance to determine actions executed by the system; based on at least one of the plurality of policies, compare the system performance with system performance required by the at least one or the plurality of policies; based on the comparison, determine that the system has performed in a manner contrary to the requirements of the at least one policy; and in response, prohibit access of the system to services provided by a service provider.
-
Specification