×

Grid security intrusion detection configuration mechanism

  • US 8,863,278 B2
  • Filed: 05/28/2008
  • Issued: 10/14/2014
  • Est. Priority Date: 05/28/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer system, comprising:

  • a grid cluster comprising hardware devices in the form of at least a root computer node in communication with a non-root computer node through a network connection;

    a security agent local to the non-root node to monitor security for the non-root node and to respond to a detected security violation of the non-root node, wherein monitoring security for the non-root node by the security agent includes controlling access to resources associated with the non-root node;

    a security controller local to the root node to monitor security for the non-root node through the security agent of the non-root node and a second security agent local to the root node, wherein the security agent of the non-root node communicates the detected security violation to the security controller, the security controller to determine a response to the security violation including removal of the non-root node from the grid cluster;

    a component table local to the non-root node, the component table to identify an application and at least one characteristic of the application within the non-root node;

    an agent environment table local to the non-root node, the agent environment table to reference all executable programs for all applications registered in the component table, with each application having a security level setting and identified services; and

    a set of rules in said environment table to manage control of a security violation, the rules to dictate a first class of violations for management by a tool local to the non-root node subject to the violation and a second class of violations for management by the security controller.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×