Systems and methods for implementing security
First Claim
1. A first computer system comprising:
- one or more processing units;
memory, coupled to at least one of the one or more processing units, wherein the memory stores an operating system, and wherein the operating system is executed by the one or more processing units; and
one or more programs that run within the operating system, wherein a first program of the one or more programs is an agent that is executed by at least one of the one or more processing units, and wherein the agent includes instructions for;
obtaining an authentication token that is uniquely associated with the agent;
collecting security information about the first computer system according to one or more commands received from a remote security system;
transmitting the collected security information to the remote security system on an encrypted communication channel between the agent and the remote security system, wherein the encrypted communication channel uses the authentication token;
receiving executable instructions from the remote security server according to a security policy assigned to the agent, wherein the instructions are received through the encrypted communication channel; and
executing, at the first computer system, the received executable instructions, thereby implementing the assigned security policy.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and method are provided in accordance with one or more processes that run within an operating system, in which a first process of the one or more processes is an agent that encodes instructions for obtaining an authentication token uniquely associated with the agent. The agent collects security information about a first computer system running the one or more processes according to one or more commands received from a remote security system. The collected information is transmitted to the remote security system on an encrypted communication channel between the agent and the remote security system using the authentication token. Executable instructions are received through the encrypted communication channel at the first computer from the remote server according to a security policy assigned to the agent. The received executable instructions are executed at the first computer system, thereby implementing the assigned security policy.
-
Citations
30 Claims
-
1. A first computer system comprising:
-
one or more processing units; memory, coupled to at least one of the one or more processing units, wherein the memory stores an operating system, and wherein the operating system is executed by the one or more processing units; and one or more programs that run within the operating system, wherein a first program of the one or more programs is an agent that is executed by at least one of the one or more processing units, and wherein the agent includes instructions for; obtaining an authentication token that is uniquely associated with the agent; collecting security information about the first computer system according to one or more commands received from a remote security system; transmitting the collected security information to the remote security system on an encrypted communication channel between the agent and the remote security system, wherein the encrypted communication channel uses the authentication token; receiving executable instructions from the remote security server according to a security policy assigned to the agent, wherein the instructions are received through the encrypted communication channel; and executing, at the first computer system, the received executable instructions, thereby implementing the assigned security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer security system comprising:
-
one or more processing units; memory; and one or more programs stored in the memory and configured for execution by the one or more processing units, the one or more programs including instructions for; receiving a request from an agent program running within an operating system on a remote computer distinct from the computer security system; generating a unique authentication token for the agent program; transmitting the unique authentication token to the agent program; transmitting a plurality of commands to the agent program, for execution by the agent program to collect information for an evaluation of the operating system; receiving information from the agent program on an encrypted communication channel between the agent and the computer security system, wherein the information is obtained by execution of the plurality of commands by the agent program, and wherein the encrypted communication channel uses the authentication token; selecting a plurality of executable instructions for the agent program according to a security policy assigned to the agent and according to the received information; and transmitting the plurality of executable instructions to the agent program through the encrypted communication channel for execution at the remote computer, thereby implementing the assigned security policy. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification