Dynamic security policy through use of empirical security events
First Claim
Patent Images
1. A method comprising:
- logging risk factors occurring on a first computer system over time, said risk factors including activity of a user using said first computer system;
dynamically generating a risk profile based on at least one of said risk factors, said risk profile associated with said user;
dynamically updating said risk profile based on said logging;
dynamically setting a security policy of said first computer system based on at least a portion of said risk profile;
storing said risk profile at a memory location accessible by said first computer system and a second computer system;
dynamically accessing said risk policy from said second computer system upon assignment of said user to said second computer system; and
dynamically setting a security policy of said second computer system based on at least a portion of said risk profile.
2 Assignments
0 Petitions
Accused Products
Abstract
Risk events occurring on a computer system are logged over time and a risk profile is dynamically generated and updated based on the logged risk events. In one embodiment, a security policy is dynamically set and updated based on the risk profile.
-
Citations
17 Claims
-
1. A method comprising:
-
logging risk factors occurring on a first computer system over time, said risk factors including activity of a user using said first computer system; dynamically generating a risk profile based on at least one of said risk factors, said risk profile associated with said user; dynamically updating said risk profile based on said logging; dynamically setting a security policy of said first computer system based on at least a portion of said risk profile; storing said risk profile at a memory location accessible by said first computer system and a second computer system; dynamically accessing said risk policy from said second computer system upon assignment of said user to said second computer system; and dynamically setting a security policy of said second computer system based on at least a portion of said risk profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-program product comprising a computer readable storage medium containing computer program code for implementing a method comprising:
-
logging risk factors occurring on a first computer system over time, said risk factors including activity of a user using said first computer system; dynamically generating a risk profile based on at least one of said risk factors, said risk profile associated with said user; dynamically updating said risk profile based on said logging; dynamically setting a security policy of said first computer system based on at least a portion of said risk profile; storing said risk profile at a memory location accessible by said first computer system and a second computer system; dynamically accessing said risk policy from said second computer system upon assignment of said user to said second computer system; and dynamically setting a security policy of said second computer system based on at least a portion of said risk profile. - View Dependent Claims (15)
-
-
16. A security product comprising:
-
a memory; a processor coupled to said memory; a dynamic security policy application for logging risk factors occurring on a first computer system over time, said risk factors including activity of a user using said first computer system; said dynamic security policy application further for dynamically generating a risk profile based on at least one of said risk factors, said risk profile associated with said user; said dynamic security policy application further for dynamically updating said risk profile based on said logging; said dynamic security policy application further for dynamically setting a security policy of said first computer system based on at least a portion of said risk profile; said dynamic security policy application further for storing said risk profile at a memory location accessible by said first computer system and a second computer system; said dynamic security policy application further for dynamically accessing said risk policy from said second computer system upon assignment of said user to said second computer system; and said dynamic security policy application further for dynamically setting a security policy of said second computer system based on at least a portion of said risk profile.
-
-
17. A method comprising:
-
logging risk factors occurring on a computer system over time, said risk factors including activity of a first user and a second user using said computer system; dynamically generating a first risk profile associated with said first user and a second risk profile associated with said second user based on said risk factors; dynamically accessing said first risk profile upon assignment of said first user to said computer system; dynamically setting a first security policy for said computer system based on said first risk profile; dynamically accessing said second risk profile upon assignment of said second user to said computer system; and dynamically setting a second security policy for said computer system based on said second risk profile.
-
Specification