×

Method for the automatic setting and updating of a security policy

  • US 7,614,085 B2
  • Filed: 05/01/2003
  • Issued: 11/03/2009
  • Est. Priority Date: 05/09/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for the automatic update of a security policy enforced by at least one security package within a computerized system, comprising the steps of:

  • a. Providing within the computerized system at least one trusted source, each capable of issuing a security report detailing at least one of;

    network protocol and its related attributes, application protocol and its related attributes application paths, application action, application action attributes, and application action flow, or security flaws within the computerized system;

    b. Periodically operating each of said at least one trusted source in order to issue a respective security report;

    c. Importing each respective security report into a security correcting unit, and forming one consolidated file comprising the details from each respective security report;

    d. Importing into said security correcting unit one or more attributes files of said at least one security package;

    e. Separately comparing the content of said consolidated file with the content of each of the imported attributes files, and updating each attributes file with security information included within said consolidated file;

    f. Separately exporting said updated attributes files and effecting each of them as the active attributes file or files of the corresponding security package;

    g. Using a predefined set of logical rules to decide which content from said consolidated file to effect and which to ignore; and

    h. Importing into said security correcting unit a second type report comprising application locations and paths that are defined by said security correcting unit as the only valid locations and paths for accessing an application, and said security correcting unit updating one or more relevant attribute files using the content of said second type report, thereby effecting an updated security policy.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×