METHOD AND SYSTEM FOR PROVIDING SECURITY AWARE APPLICATIONS
First Claim
1. A system for providing security aware applications comprising:
- at least one processor; and
at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including;
defining one or more trigger events that when detected in an asset used to implement an application require at least one responsive action;
defining at least one responsive action to be associated with each of the one or more trigger events;
generating data representing instructions for monitoring and detecting the one or more trigger events in an asset used to implement the application;
generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events;
providing at least part of the data representing instructions for monitoring and detecting the one or more trigger events in an asset to at least one asset used to implement the application;
using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events in an asset to detect a trigger event involving the at least one asset; and
using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events to automatically implement the at least one responsive action associated with the detected trigger event.
1 Assignment
0 Petitions
Accused Products
Abstract
Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action associated with each of the one or more trigger events is generated. At least part of instructions for monitoring and detecting the one or more trigger events is provided to an asset used to implement the application. The at least part of the instructions for monitoring and detecting the one or more trigger events are used by the asset to detect a trigger event. The instructions for implementing the at least one responsive action associated with each of the one or more trigger events is then used to automatically implement the at least one responsive action associated with the detected trigger event.
-
Citations
38 Claims
-
1. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; defining one or more trigger events that when detected in an asset used to implement an application require at least one responsive action; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events in an asset used to implement the application; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing at least part of the data representing instructions for monitoring and detecting the one or more trigger events in an asset to at least one asset used to implement the application; using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events in an asset to detect a trigger event involving the at least one asset; and using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events to automatically implement the at least one responsive action associated with the detected trigger event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing security aware applications comprising:
-
an application; a production environment for implementing the application; one or more assets used to implement the application in the production environment; data for monitoring and detecting one or more trigger events in one of more of the assets used to implement the application in the production environment; data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events upon detection of the one or more trigger events in one of more of the assets used to implement the application in the production environment; at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; providing at least part of the data for monitoring and detecting the one or more trigger events to at least one asset used to implement the application in the production environment; using the at least part of the data for monitoring and detecting the one or more trigger events to detect a trigger event involving the at least one asset; and using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events to automatically implement the at least one responsive action associated with the detected trigger event. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; defining one or more operational parameters associated with assets used to implement an application; obtaining baseline values for the one or more operational parameters associated with assets used to implement the application; defining a trigger deviation value for each of the one or more operational parameters associated with assets used to implement the application; defining one or more trigger events that when detected in an asset used to implement the application require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters associated with assets used to implement the application; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events in assets used to implement the application; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing at least part of the data representing instructions for monitoring and detecting the one or more trigger events to at least one asset used to implement the application; using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events to detect a trigger event involving the at least one asset; and using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events to automatically implement the at least one responsive action associated with the detected trigger event. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for providing security aware applications comprising:
-
defining one or more operational parameters associated with assets used to implement an application; obtaining baseline values for the one or more operational parameters associated with assets used to implement the application; defining a trigger deviation value for each of the one or more operational parameters associated with assets used to implement the application; defining one or more trigger events that when detected in an asset used to implement the application require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters associated with assets used to implement the application; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events in assets used to implement the application; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing at least part of the data representing instructions for monitoring and detecting the one or more trigger events to at least one asset used to implement the application; using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events to detect a trigger event involving the at least one asset; and using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events to automatically implement the at least one responsive action associated with the detected trigger event. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification