System, method, and computer program product for enabling communication between security systems
First Claim
1. A computer program product embodied on a non-transitory computer readable medium, comprising computer code for:
- identifying that a first security system is not communicating with a second security system, wherein the first security system at least partially detects data and/or activity as unwanted; and
updating the first security system and/or the second security system with a security definition for enabling a communication between the first security system and the second security system, wherein the security definition comprises a protocol for transmitting information associated with the unwanted data and/or activity between the first security system and the second security system to detect, remove, and/or verify the unwanted data and/or activity.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system.
-
Citations
20 Claims
-
1. A computer program product embodied on a non-transitory computer readable medium, comprising computer code for:
-
identifying that a first security system is not communicating with a second security system, wherein the first security system at least partially detects data and/or activity as unwanted; and updating the first security system and/or the second security system with a security definition for enabling a communication between the first security system and the second security system, wherein the security definition comprises a protocol for transmitting information associated with the unwanted data and/or activity between the first security system and the second security system to detect, remove, and/or verify the unwanted data and/or activity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
identifying, by a computer, that a first security system is not communicating with a second security system, wherein the first security system at least partially detects data and/or activity as unwanted; and updating the first security system and/or the second security system with a security definition for enabling a communication between the first security system and the second security system, wherein the security definition comprises a protocol for transmitting information associated with the unwanted data and/or activity between the first security system and the second security system to detect, remove, and/or verify the unwanted data and/or activity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system including a processor coupled to memory via a bus, comprising:
-
a first security sub-system with a first communication protocol, wherein the first security sub-system at least partially detects data and/or activity as unwanted; a second security sub-system with a second communication protocol, the second communication protocol different from the first communication protocol such that the first security sub-system and the second security sub-system are not communicating therebetween, wherein the system is operable to update the first security sub-system and/or the second security sub-system with a security definition for enabling a communication between the first sub-system system and the second security subsystem, wherein the security definition comprises a protocol for transmitting information associated with the unwanted data and/or activity between the first security system and the second security system to detect, remove, and/or verify the unwanted data and/or activity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification