Data system forensics system and method
First Claim
Patent Images
1. A method for system security forensics in a system for allowing or denying a requester access to a protected asset comprising:
- receiving a request to access a protected asset from a requester having a reputation;
making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation;
creating access decision data related to the access decision;
assessing the access decision data to determine why the access decision was made;
determining that the requester'"'"'s reputation has changed, and if the decision is to deny the requester to access the protected asset based on the change in reputation, identifying other protected assets previously accessed by the requester;
identifying potential risks associated with the other protected assets previously accessed by the requester; and
determining whether there would be a violation of system security for the requester to access the other protected assets after the reputation change.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for creates, maintains and monitors individuals, organizations and artifacts relating to the same over time with respect to pedigree and reputation, security and reliability. One aspect of the present invention provides for a method and a system for collecting and maintaining historical party reputation data. Another aspect of the present invention provides for a method and a system for assessing an access decision to the historical party reputation data to a person after the person'"'"'s reputation has changed.
-
Citations
15 Claims
-
1. A method for system security forensics in a system for allowing or denying a requester access to a protected asset comprising:
-
receiving a request to access a protected asset from a requester having a reputation; making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation; creating access decision data related to the access decision; assessing the access decision data to determine why the access decision was made; determining that the requester'"'"'s reputation has changed, and if the decision is to deny the requester to access the protected asset based on the change in reputation, identifying other protected assets previously accessed by the requester; identifying potential risks associated with the other protected assets previously accessed by the requester; and determining whether there would be a violation of system security for the requester to access the other protected assets after the reputation change. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable storage medium storing computer instructions, which, when executed, enables a computer system operating with a reputation modification and decision making system, a reputation analyzer, a protected asset analyzer, and a protected asset access decision data assessor for system security forensics in a system for to allow or deny a requester access to a protected asset in a computer environment having hardware, the computer-readable medium storing computer instructions for performing a method comprising:
-
receiving a request to access a protected asset from a requester having a reputation; making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation; creating access decision data related to the access decision; assessing the access decision data to determine why the access decision was made; determining that the requester'"'"'s reputation has changed, and if the decision is to deny the requester to access the protected asset based on the change in reputation, identifying other protected assets previously accessed by the requester; identifying potential risks associated with the other protected assets previously accessed by the requester; and determining whether there would be a violation of system security for the requester to access the other protected assets after the reputation change. - View Dependent Claims (6, 7, 8)
-
-
9. A method for deploying a reputation modification and decision making system having a reputation analyzer, a protected asset analyzer, and a protected asset access decision data assessor for system security forensics in a system for allowing or denying a requester access to a protected asset in a computer environment having hardware, for collecting and maintaining historical party reputation data and for assessing an access decision to the historical party reputation data to a person after the person'"'"'s reputation has changed, the method comprising a process comprising:
-
receiving a request to access a protected asset from a requester having a reputation; making a decision whether to allow or to deny the requester access to the protected asset based upon the requester'"'"'s reputation; creating and storing access decision data related to the access decision; assessing the access decision data to determine why the access decision was made; determining that the requester'"'"'s reputation has changed, and if the decision is to deny the requester to access the protected asset based on the change in reputation, identifying other protected assets previously accessed by the requester; identifying potential risks associated with the other protected assets previously accessed by the requester; and determining whether there would be a violation of system security for the requester to access the other protected assets after the reputation change. - View Dependent Claims (10, 11, 12)
-
-
13. A reputation modification and decision making system comprising:
-
at least one processing unit; a memory operably associated with the at least one processing unit; a reputation analyzer storable in the memory and executable by the at least one processing unit, the reputation analyzer configured to determine whether the reputation of a requester to access a protected asset has changed and to identify other protected assets previously accessed by the requester; a protected asset analyzer storable in the memory and executable by the at least one processing unit, the protected asset analyzer configured to analyze the access requirements of a requested protected asset; a risk assessor storable in the memory and executable by the at least one processing unit, the risk assessor configured to assess the risk of a requester to access a protected asset based upon the reputation of the requester and the access requirements of the requested protected asset; a protected asset access decision maker storable in the memory and executable by the at least one processing unit, the protected asset access decision maker configured to make a protected access decision based upon the risk assessment made by the risk assessor; a protected asset data creator storable in the memory and executable by the at least one processing unit, the protected asset data creator configured to, in response to the making of the protected access decision by the asset access decision maker, create access decision data related to the protected access decision; and a protected asset access decision data assessor storable in the memory and executable by the at least one processing unit, the protected asset access decision data assessor configured to assess the access decision data to determine why the protected access decision was made; wherein the risk assessor is further configured to identify potential risks associated with the other protected assets previously accessed by the requester, and determine whether there would be a violation of system security for the requester to access the other protected assets after the reputation change. - View Dependent Claims (14, 15)
-
Specification