Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
First Claim
1. A method for adapting a security system based on security-related data associated with a communication network, the method comprising steps of:
- selecting, by a trust mediator, a risk variable generated by a sensor associated with a mobile communication device, based on location data associated with the mobile communication device,wherein the trust mediator is communicatively coupled to the mobile communication device by way of a communication network;
determining, by the trust mediator, a time interval at which to collect security-related data for the risk variable generated by the sensor, based on the location data associated with the mobile communication device;
collecting the security-related data for the risk variable periodically at the determined time interval by way of a trust mediator agent communicatively coupled to the communication network,determining a security safeguard modification based on at least one of the collected security-related data and a predetermined rule stored in a memory; and
transmitting instructions corresponding to the security safeguard modification to the trust mediator agent via the communication network.
1 Assignment
0 Petitions
Accused Products
Abstract
An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect changes in the security characteristics of the network and communicate the detected security characteristics to a trust mediator. Based on the security characteristics received from the trust mediator agents, the trust mediator adjusts security safeguards to maintain an acceptable level of security. Trust mediator also uses predetermined rules in determining whether to adjust security safeguards. Despite inevitable changes in security characteristics, an acceptable level of security and efficient network operation are achieved without subjecting users of the network to over burdensome security safeguards.
89 Citations
20 Claims
-
1. A method for adapting a security system based on security-related data associated with a communication network, the method comprising steps of:
-
selecting, by a trust mediator, a risk variable generated by a sensor associated with a mobile communication device, based on location data associated with the mobile communication device, wherein the trust mediator is communicatively coupled to the mobile communication device by way of a communication network; determining, by the trust mediator, a time interval at which to collect security-related data for the risk variable generated by the sensor, based on the location data associated with the mobile communication device; collecting the security-related data for the risk variable periodically at the determined time interval by way of a trust mediator agent communicatively coupled to the communication network, determining a security safeguard modification based on at least one of the collected security-related data and a predetermined rule stored in a memory; and transmitting instructions corresponding to the security safeguard modification to the trust mediator agent via the communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for adapting a security system based on security-related data associated with a communication network, wherein the system comprises a trust mediator that includes:
-
a processor; a memory device accessible by the processor and storing; computer code executable by the processor, and data used by the computer code, wherein the trust mediator is communicatively coupled to a mobile communication device by way of a communication network, and wherein the computer code includes code for; selecting a risk variable generated by a sensor associated with a mobile communication device, based on location data associated with the mobile communication device, determining a time interval at which to collect security-related data for the risk variable generated by the sensor, based on the location data associated with the mobile communication device, collecting the security-related data for the risk variable periodically at the determined time interval by way of a trust mediator agent communicatively coupled to the communication network, determining a security safeguard modification based on at least one of the collected security-related data and a predetermined rule stored in a memory, and transmitting instructions corresponding to the security safeguard modification to the trust mediator agent via the communication network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions that, when executed by a computer, cause the computer to:
-
select, by a trust mediator, a risk variable generated by a sensor associated with a mobile communication device, based on location data associated with the mobile communication device, wherein the trust mediator is communicatively coupled to the mobile communication device by way of a communication network; determine, by the trust mediator, a time interval at which to collect security-related data for the risk variable generated by the sensor, based on the location data associated with the mobile communication device; collect the security-related data for the risk variable periodically at the determined time interval by way of a trust mediator agent communicatively coupled to the communication network, determine a security safeguard modification based on at least one of the collected security-related data and a predetermined rule stored in a memory; and transmit instructions corresponding to the security safeguard modification to the trust mediator agent via the communication network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification