DATA SYSTEM FORENSICS SYSTEM AND METHOD
First Claim
Patent Images
1. A method for system security forensics in a system for allowing or denying a requester access to a protected asset comprising:
- receiving a request to access a protected asset from a requester having a reputation;
making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation;
creating access decision data related to the access decision; and
assessing the access decision data to determine why the access decision was made.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for creates, maintains and monitors individuals, organizations and artifacts relating to the same over time with respect to pedigree and reputation, security and reliability. One aspect of the present invention provides for a method and a system for collecting and maintaining historical party reputation data. Another aspect of the present invention provides for a method and a system for assessing an access decision to the historical party reputation data to a person after the person'"'"'s reputation has changed.
-
Citations
18 Claims
-
1. A method for system security forensics in a system for allowing or denying a requester access to a protected asset comprising:
-
receiving a request to access a protected asset from a requester having a reputation; making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation; creating access decision data related to the access decision; and assessing the access decision data to determine why the access decision was made. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-readable medium storing computer instructions, which, when executed, enables a computer system operating with a reputation modification and decision making system, a reputation analyzer, a protected asset analyzer, and a protected asset access decision data assessor for system security forensics in a system for allowing or denying a requester access to a protected asset in a computer environment having hardware, the computer-readable medium storing computer instructions for performing a method comprising:
-
receiving a request to access a protected asset from a requester having a reputation; making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation; creating access decision data related to the access decision; and assessing the access decision data to determine why the access decision was made. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for deploying a reputation modification and decision making system having a reputation analyzer, a protected asset analyzer, and a protected asset access decision data assessor for system security forensics in a system for allowing or denying a requester access to a protected asset in a computer environment having hardware, for collecting and maintaining historical party reputation data and for assessing an access decision to the historical party reputation data to a person after the person'"'"'s reputation has changed, the method comprising a process comprising:
-
receiving a request to access a protected asset from a requester having a reputation; making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation; creating and storing access decision data related to the access decision; and assessing the access decision data to determine why the access decision was made. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A reputation modification and decision making system comprising:
-
a reputation analyzer for determining whether the reputation of a requester to access a protected asset has changed; a protected asset analyzer for analyzing the access requirements of a requested protected asset; a risk assessor for assessing the risk of a requester to access a protected asset based upon the reputation of the requester and the access requirements of the requested protected asset; and a protected asset access decision maker for making a protected access decision based upon the risk assessment made by the risk assessor. - View Dependent Claims (17, 18)
-
Specification