Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
First Claim
1. A method for adapting a security system based on security-related data associated with a communication network, the method comprising steps of:
- generating, by a sensor associated with a mobile communication device, a risk variable based on location data associated with the mobile communication device;
transmitting, by the mobile communication device, the location data associated with the mobile communication device to a trust mediator over the communication network;
receiving, by the mobile communication device from the trust mediator communicatively coupled to the mobile communication device by way of the communication network, a determined time interval at which to collect security-related data for the risk variable generated by the sensor based on the location data associated with the mobile communication device;
collecting, by a trust mediator agent associated with the mobile communication device, the security-related data for the risk variable periodically at the determined time interval;
transmitting, by the mobile communication device to the trust mediator over the communication network, the collected security-related data;
receiving, by the mobile communication device, instructions corresponding to a security safeguard modification from the trust mediator over the communication network, the security safeguard modification being based on at least one of the collected security-related data and a predetermined rule; and
modifying, by the trust mediator agent, the security safeguard by executing the instructions received from the trust mediator.
1 Assignment
0 Petitions
Accused Products
Abstract
An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect changes in the security characteristics of the network and communicate the detected security characteristics to a trust mediator. Based on the security characteristics received from the trust mediator agents, the trust mediator adjusts security safeguards to maintain an acceptable level of security. Trust mediator also uses predetermined rules in determining whether to adjust security safeguards. Despite inevitable changes in security characteristics, an acceptable level of security and efficient network operation are achieved without subjecting users of the network to over burdensome security safeguards.
124 Citations
20 Claims
-
1. A method for adapting a security system based on security-related data associated with a communication network, the method comprising steps of:
-
generating, by a sensor associated with a mobile communication device, a risk variable based on location data associated with the mobile communication device; transmitting, by the mobile communication device, the location data associated with the mobile communication device to a trust mediator over the communication network; receiving, by the mobile communication device from the trust mediator communicatively coupled to the mobile communication device by way of the communication network, a determined time interval at which to collect security-related data for the risk variable generated by the sensor based on the location data associated with the mobile communication device; collecting, by a trust mediator agent associated with the mobile communication device, the security-related data for the risk variable periodically at the determined time interval; transmitting, by the mobile communication device to the trust mediator over the communication network, the collected security-related data; receiving, by the mobile communication device, instructions corresponding to a security safeguard modification from the trust mediator over the communication network, the security safeguard modification being based on at least one of the collected security-related data and a predetermined rule; and modifying, by the trust mediator agent, the security safeguard by executing the instructions received from the trust mediator. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for adapting a security system based on security-related data associated with a communication network, wherein the system comprises a mobile communication device that includes:
-
a sensor; a trust mediator agent; a processor; and a memory device accessible by the processor and storing; computer code executable by the processor, and data used by the computer code, wherein the mobile communication device is communicatively coupled to a trust mediator by way of the communication network, and wherein the computer code includes code for; generating, by the sensor, a risk variable based on location data associated with the mobile communication device; transmitting, by the mobile communication device, the location data associated with the mobile communication device to a trust mediator over the communication network; receiving, from the trust mediator, a determined time interval at which to collect security-related data for the risk variable generated by the sensor, based on the location data associated with the mobile communication device; collecting, by the trust mediator agent, the security-related data for the risk variable periodically at the determined time interval; transmitting to the trust mediator the collected security-related data; receiving instructions corresponding to a security safeguard modification from the trust mediator, the security safeguard modification being based on at least one of the collected security-related data and a predetermined rule; and modifying, by the trust mediator agent, the security safeguard by executing the instructions received from the trust mediator. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions that, when executed by a computer, cause the computer to:
-
generate, by a sensor associated with a mobile communication device, a risk variable based on location data associated with the mobile communication device; transmit, by the mobile communication device, the location data associated with the mobile communication device to a trust mediator over a communication network; receive, by the mobile communication device from the trust mediator, a determined time interval at which to collect security-related data for the risk variable generated by the sensor, based on the location data associated with the mobile communication device; collect, by a trust mediator agent associated with the mobile communication device, the security-related data for the risk variable periodically at the determined time interval; transmit, by the mobile communication device to the trust mediator over the communication network, the collected security related data; receive, by the mobile communication device, instructions corresponding to a security safeguard modification to the trust mediator agent via the communication network, the security safeguard modification being based on at least one of the collected security-related data and a predetermined rule; and modifying, by the trust mediator agent, the security safeguard by executing the instructions received from the trust mediator. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification