System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check
First Claim
Patent Images
1. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
- identifying an object at a client coupled to a network;
extracting environmental information indicative of a previous location of the object;
determining a first security niche associated with the object;
determining if the object is migrating from the first security niche to a second security niche using the environmental information;
evaluating a white-list associated with a plurality of security niches; and
initiating a network based security check at a network cloud location based on the object migrating from the first security niche to the second security niche, wherein the second security niche is a higher security niche than the first security niche and the second security niche is not provided in the white-list, and wherein the second security niche is associated with a particular program that auto-executes.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for tracking the migration of objects to determine whether to perform a network based check. In operation, an object is identified. Furthermore, a first security niche associated with the object is determined. Additionally, it is determined if the object is migrating from the first security niche to a second security niche. Still yet, a network based security check is conditionally performed if it is determined the object is migrating from the first security niche to the second security niche.
14 Citations
15 Claims
-
1. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
identifying an object at a client coupled to a network; extracting environmental information indicative of a previous location of the object; determining a first security niche associated with the object; determining if the object is migrating from the first security niche to a second security niche using the environmental information; evaluating a white-list associated with a plurality of security niches; and initiating a network based security check at a network cloud location based on the object migrating from the first security niche to the second security niche, wherein the second security niche is a higher security niche than the first security niche and the second security niche is not provided in the white-list, and wherein the second security niche is associated with a particular program that auto-executes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
identifying an object at a client coupled to a network, wherein the client includes a processor and a memory; extracting environmental information indicative of a previous location of the object; determining a first security niche associated with the object; determining if the object is migrating from the first security niche to a second security niche using the environmental information; evaluating a white-list associated with a plurality of security niches; and initiating a network based security check at a network cloud location based on the object migrating from the first security niche to the second security niche, wherein the second security niche is a higher security niche than the first security niche and the second security niche is not provided in the white-list, and wherein the second security niche is associated with a particular program that auto-executes.
-
-
15. A wireless device, comprising:
a processor coupled to a memory, wherein the wireless device is configured for; identifying an object at a wireless device coupled to a network; extracting environmental information indicative of a previous location of the object; determining a first security niche associated with the object; determining if the object is migrating from the first security niche to a second security niche using the environmental information; evaluating a white-list associated with a plurality of security niches; and initiating a network based security check at a network cloud location based on the object migrating from the first security niche to the second security niche, wherein the second security niche is a higher security niche than the first security niche and the second security niche is not provided in the white-list, and wherein the second security niche is associated with a particular program that auto-executes.
Specification