Communications traffic segregation for security purposes
First Claim
Patent Images
1. A method for applying a communications traffic security policy, comprising:
- segregating a distinct communications traffic flow based upon a security value that indicates user-interactive communications traffic flows for a computing device; and
,applying an enforcement policy to the segregated communications traffic flow if it is determined that a user is not interacting with the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Technology for applying a communications traffic security policy in which a distinct communications traffic flow is segregated based upon a security value; whereby the communications traffic security policy include one or both of a detection and an enforcement policy. The detection policy may include determining whether the segregated communications traffic flow involves malware; and, the enforcement policy may include a malware policy.
-
Citations
20 Claims
-
1. A method for applying a communications traffic security policy, comprising:
-
segregating a distinct communications traffic flow based upon a security value that indicates user-interactive communications traffic flows for a computing device; and
,applying an enforcement policy to the segregated communications traffic flow if it is determined that a user is not interacting with the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for applying a communications traffic policy comprising:
-
segregating user interactive communications traffic flows from non-interactive communications traffic flows for a computing device; detecting whether one or more of the user interactive communications traffic flows are associated with malware; and if malware is detected, applying an enforcement policy that mitigates the user interactive communications traffic flows for the computing device. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer system comprising a computing device and a connection for connecting the computing device to a network, the computer system comprising:
a security policy component connected to or within one or both of the computing device and the connection;
the security policy component comprising a processor and adapted to be executed thereby, and configured to serve as one or both of a detection module and an enforcement module to execute one or both of a detection policy and an enforcement policy in relation to a segregated communications traffic flow, the one or both of the detection and the enforcement policies defining a category for the segregation of the segregated communications traffic flow, wherein the category comprises user-interactive communications.
Specification