×

Systems and methods for implementing computer security

  • US 9,497,224 B2
  • Filed: 10/10/2014
  • Issued: 11/15/2016
  • Est. Priority Date: 08/09/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computing device, comprising:

  • one or more processing units;

    memory; and

    a first security control module, wherein the first security control module is stored in the memory and executed by one or more of the processing units to monitor integrity of files and directories, the first security control module including instructions for;

    transmitting to a remote security server a policy identifier, wherein the policy identifier identifies a security policy that applies to a first operating system running on the computing device and applies to one or more applications running in the first operating system;

    receiving from the remote security server a first cryptographic key uniquely associated with the first security control module;

    retrieving from the remote security server a first command to collect information about the first security control module according to a set of self-verification factors;

    securely transmitting the collected information to the remote security server for evaluation of integrity of the first security control module;

    when the remote security server identifies an integrity failure based on the collected information;

    (i) retrieving a second command from the remote security server, wherein the second command specifies a corrective action for the first security control module; and

    (ii) executing the second command to correct the integrity failure;

    receiving from the remote security server a specification of a first set of files and directories that are being monitored according to the security policy, wherein each of the files or directories in the first set is associated with the first operating system or associated with one of the one or more applications running in the first operating system;

    periodically collecting metadata for the first set of files and directories and computing a content signature for each file in the first set; and

    using the first cryptographic key to securely transmit the collected metadata and computed content signatures to the remote security server for evaluation of integrity against baseline data for the first set of files and directories, wherein the baseline data is stored at the remote security server.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×