×

Distributive security investigation

  • US 8,839,419 B2
  • Filed: 04/05/2008
  • Issued: 09/16/2014
  • Est. Priority Date: 04/05/2008
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system, the computer system including a monitoring system and a case management system, the monitoring system configured to collect security information for one or more other devices, the case management system configured to investigate detected security state changes that occur at the one or more other devices, a method for investigating a security related issue, the method comprising:

  • receiving a security alert for a device, the device included in the one or more other devices, the security alert identifying an security related issue that occurred during operation of the device;

    determining that the security related issue is of a sufficient priority to investigate by analyzing the security alert in view of collected security information for the one or more devices;

    investigating the security related issue, including;

    opening an investigation for the security related issue;

    creating a case object for the investigation, the case object being a storage object configured to store information associated with the security related issue;

    formulating a request to send to at least one device from among the one or more devices to request additional information associated with the security related issue, including;

    identifying a plurality of assets related to the investigation;

    adding a modifier to the request to request that additional information be returned with a specified level of detail;

    sending the formulated request to the at least one device to request the additional information about the plurality of assets be returned to the computer system with the specified level of detail;

    receiving one or more responses from the at least one device, the one or more responses responsive to the formulated request, the one or more responses including the additional information about the plurality of assets, the additional information related to the investigation and having the specified level of detail;

    updating the case object by storing the additional information received in the one or more responses in the case object;

    drawing a conclusion with respect to the security related issue by analyzing the updated case object;

    automatically and iteratively refining the updated case object by;

    analyzing the updated case object;

    based on the analysis, automatically and without user intervention, issuing one or more additional requests for further information to the at least one device, the one or more additional requests changing the modifier to request that the requested further information have a different specified level of detail;

    receiving the further information from the at least one device; and

    refining the case object by consolidating the further information along with the additional information in the case object; and

    drawing a further conclusion with respect to the security related issue by analyzing the consolidated information in the refined case object.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×