System and method for intelligence based security
First Claim
1. A method for securing data, implemented in a computer system, the computer system including a tangible, non-transitory storage section, a user input device, an output device, and a processor, the method comprising:
- receiving, at the computer system, one or more parameters defining a security policy;
dynamically generating, by executing with the processor of the computer system instructions stored in the storage section, one or more intelligent security rules based on the security policy, each rule including at least one qualifier and at least one attribute;
maintaining the one or more intelligent security rules, by executing with the processor of the computer system instructions stored in the storage section, for use by an intelligent security filter operable to leverage the one or more intelligent security rules;
determining whether applying the one or more intelligent security rules would cause a system misconfiguration; and
responsive to the determining step, altering the one or more intelligent security rules to avoid the system misconfiguration.
19 Assignments
0 Petitions
Accused Products
Abstract
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.
18 Citations
21 Claims
-
1. A method for securing data, implemented in a computer system, the computer system including a tangible, non-transitory storage section, a user input device, an output device, and a processor, the method comprising:
-
receiving, at the computer system, one or more parameters defining a security policy; dynamically generating, by executing with the processor of the computer system instructions stored in the storage section, one or more intelligent security rules based on the security policy, each rule including at least one qualifier and at least one attribute; maintaining the one or more intelligent security rules, by executing with the processor of the computer system instructions stored in the storage section, for use by an intelligent security filter operable to leverage the one or more intelligent security rules; determining whether applying the one or more intelligent security rules would cause a system misconfiguration; and responsive to the determining step, altering the one or more intelligent security rules to avoid the system misconfiguration. - View Dependent Claims (2, 3, 4)
-
-
5. A system for securing data, comprising:
- at least one processor;
a memory operably associated with the at least one processor; anda program of instructions storable in the memory and executable by the processor, the program of instructions including; at least one instruction operable to apply one or more security measures to data identified by one or more of;
a pathname, data type, file type, file system owner, file system attributes, and running process attributes and owner, maintain the one or more security measures applicable to data while the data is not in use, and automatically remove the one or more security measures from data in response to detecting a triggering file operation requesting access to the data;at least one instruction operable to apply one or more security measures to data in response to detecting a triggering file operation, the one or more security measures being applied based on one or more intelligence based encryption rules, each intelligence based encryption rule including one or more of;
a path at which data to be protected is stored, a scope of data to be protected stored at the path, and one or more attributes of processes required to be running for data to be protected;at least one instruction operable to receive one or more parameters defining a security policy, and generate the one or more intelligence based encryption rules based on the security policy; determining whether applying the one or more intelligent security rules would cause a system misconfiguration; and responsive to the determining step, altering the one or more intelligent security rules to avoid the system misconfiguration. - View Dependent Claims (6, 7, 8, 9, 10, 11)
- at least one processor;
-
12. A method for securing data, implemented in a computer system, the computer system including a tangible, non-transitory storage section, a processor, a first set of instructions comprising an intelligent security filter, and a second set of instructions comprising a security service, the instructions being executable by the processor, the method comprising:
-
receiving, at the security service, parameters defining a security policy; generating, at the security service, one or more intelligent security rules based on the security policy; detecting, at the intelligent security filter, a triggering file operation generated by an application run by or on behalf of a user; determining, at the intelligent security, whether any of the one or more intelligent security rules requires a security measure to be applied to data in the storage section in response to the triggering file operation; responsive to determining that the triggering file operation requires a security measure, applying the security measure at the intelligent security filter; wherein the detecting, determining, generating, and applying steps are performed without user interaction; wherein the security measure is applied without direction and control from the application; determining whether applying the one or more intelligent security rules would cause a system misconfiguration; and responsive to the determining step, altering the one or more intelligent security rules to avoid the system misconfiguration. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification