Universal Security Agent
First Claim
1. A method comprising:
- loading, by a base agent of a universal security agent deployed on a computing endpoint, a security agent plugin module into a memory associated with the computing endpoint;
registering, by the base agent, a plugin task of the security agent plugin module;
scheduling, by the base agent, the plugin task of the security agent plugin module based on one of a policy associated with the security agent plugin module and system access information associated with the security agent plugin module;
executing, by the base agent, the plugin task based on the scheduling;
controlling, by the base agent, a request for system access generated during the execution of the plugin task based on an inspection of the policy associated with the security agent plugin module; and
monitoring and logging, by the base agent, system access information associated with the security agent plugin module, the system access information comprising data associated with the request for system access.
1 Assignment
0 Petitions
Accused Products
Abstract
A universal security agent deployed on a computing endpoint includes one or both of a base agent and a security agent plugin module. The base agent loads the security agent plugin module and, in response, receives plugin tasks from the security agent plugin module for registration. The base agent schedules the received plugin tasks based on a policy and/or a system access information associated with the security agent plugin module. Further, the base agent executes the plugin tasks based on the scheduling. The base agent controls system access requests generated during the execution of the plugin tasks based on the policy associated with the security agent plugin module. Additionally, the base agent monitors and logs system access information associated with the security agent plugin module.
32 Citations
20 Claims
-
1. A method comprising:
-
loading, by a base agent of a universal security agent deployed on a computing endpoint, a security agent plugin module into a memory associated with the computing endpoint; registering, by the base agent, a plugin task of the security agent plugin module; scheduling, by the base agent, the plugin task of the security agent plugin module based on one of a policy associated with the security agent plugin module and system access information associated with the security agent plugin module; executing, by the base agent, the plugin task based on the scheduling; controlling, by the base agent, a request for system access generated during the execution of the plugin task based on an inspection of the policy associated with the security agent plugin module; and monitoring and logging, by the base agent, system access information associated with the security agent plugin module, the system access information comprising data associated with the request for system access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A tangible computer-readable medium comprising a plurality of instructions, which, when executed by a base agent deployed in a computing endpoint, cause the base agent to perform operations comprising:
-
receiving a plugin task of a security agent plugin module deployed on the computing endpoint; scheduling the plugin task of the security agent plugin module based on one of a policy associated with the security agent plugin module and system access information associated with the security agent plugin module; executing the plugin task based on the scheduling; controlling a request for system access generated during the executing of the plugin task based on an inspection of the policy associated with the security agent plugin module; monitoring and logging system access information associated with the security agent plugin module, the system access information comprising data associated with the request for system access; multiplexing and encrypting communication data from the security agent plugin module and another security agent plugin module deployed on the computing endpoint to generate multiplexed and encrypted communication data; and transmitting the multiplexed and encrypted communication data from the security agent plugin module and the another security agent plugin module to a proxy gateway as a single communication session over a common communication channel. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A universal security agent comprising:
-
a security agent plugin module; and a base agent that is deployed on a computing endpoint, the base agent comprising; a loading module that; loads the security agent plugin module into a memory associated with the computing endpoint; a scheduling module that; registers a plugin task of the security agent plugin module; and schedules the plugin task of the security agent plugin module based on one of a policy associated with the security agent plugin module and system access information associated with the security agent plugin module; a system access module that; executes the plugin task based on the scheduling; controls a request for system access generated during the execution of the plugin task based on an inspection of the policy associated with the security agent plugin module; and a security plugin monitoring module that; monitors and logs system access information associated with the security agent plugin module, the system access information comprising data associated with the request for system access. - View Dependent Claims (19, 20)
-
Specification