Method and system for processing events
First Claim
Patent Images
1. A method comprising:
- receiving an event from a first security engine;
identifying a second security engine configured to utilize information contained in the event, wherein the second security engine is unaware of the first security engine; and
communicating the information contained in the event to the second security engine via an event manager, wherein the event corresponds to identifying a password that does not comply with predetermined criteria; and
with the first security engine, the second security engine, and the event manager being included and executed in a single host computer.
2 Assignments
0 Petitions
Accused Products
Abstract
An event, such as a security-related event, is received from a first security engine or another source. A second security engine is identified that is configured to utilize information contained in the event. The information contained in the event is then communicated to the second security engine. Additionally, other information, such as system state information, can be provided to one or more security engines.
-
Citations
29 Claims
-
1. A method comprising:
-
receiving an event from a first security engine; identifying a second security engine configured to utilize information contained in the event, wherein the second security engine is unaware of the first security engine; and communicating the information contained in the event to the second security engine via an event manager, wherein the event corresponds to identifying a password that does not comply with predetermined criteria; and with the first security engine, the second security engine, and the event manager being included and executed in a single host computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving a security-related event from a first security-related application program, the security-related event being associated with a system state; identifying information contained in the security-related event; identifying a second security-related application program associated with the information contained in the security-related event, wherein the second security-related application program is unaware of the first security-related application program; communicating the information contained in the security-related event to the second security-related application program via an event manager; and with the first security-related application program, the second security-related application program, and the event manager being included and executed in a single host computer. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. One or more tangible computer-readable media having stored thereon a computer program executed by one or more processors, comprising:
-
a first security engine associated with a first type of security attack, the first security engine including configuration to detect a password that does not comply with predetermined criteria; a second security engine associated with a second type of security attack, wherein the second security engine is unaware of the first security engine; an event manager coupled to receive events from the first security engine and the second security engine, the event manager further to identify information contained in the events and to identify at least one security engine associated with information contained in a particular event, and further to communicate the information contained in the particular event to the at least one security engine and with the first security engine, the second security engine, and the event manager being included and executed in a single host computer. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. One or more tangible computer-readable media having stored thereon a computer program that, when executed by one or more processors, causes the one or more processors to:
-
receive a first security-related event from a first service, the first security-related event corresponding to a network-related aspect of a system state; identify information contained in the first security-related event; receive a second security-related event from a second service, wherein the second service is unaware of the first service; identify information contained in the second security-related event; communicate information contained in the first security-related event to the second service via an event manager; communicate information contained in the second security-related event to the first service via the event manager; and with the first service, the second service, and the event manager being included and executed in a single host computer. - View Dependent Claims (26, 27, 28, 29)
-
Specification