System and method for remotely managing security and configuration of compute devices
First Claim
Patent Images
1. A system comprising:
- a server computer;
a plurality of secure computers; and
a communication channel between the server computer and the plurality of secure computers,wherein the server computer includes;
a storage for a plurality of security policies;
an administrator interface for allowing an administrator to configure a first one of the security policies for a first one of the plurality of secure computers and to configure a second one of the security policies for a second one of the plurality of secure computers, wherein the first and second security policies respectively define different first and second prohibited operations to be performed by the first and second secure computers; and
a communication channel interface for managing communications between the server computer and the plurality of secure computers over the communication channel, wherein the server computer is adapted to send the first and second ones of the security policies to the first and second secure computers, respectively, via the communication channel using the communication channel interface, andwherein the server computer is further adapted to receive alerts from the first and second secure computers via the communication channel using the communication channel interface, andwherein the alerts are related to attempts to perform the first and second prohibited operations,and wherein each of the plurality of secure computers include;
a host processor;
a device interface;
an upstream port for communicating with the host processor;
a downstream port for communicating with a device via the device interface; and
a secure subsystem interposed between the upstream port and the downstream port, such that the host processor and the device are incapable of communicating independently with each other without the secure subsystem, and such that the secure subsystem is operative thereby to enforce the sent one of the security policies, and wherein the server computer is further adapted to;
determine whether a change is needed in one of the first and second security policies, wherein the change is not in response to one of the alerts being received, and,when the change is needed, send the changed one of the first and second security policies to one of the first and second secure computers via the communication channel using the communication channel interface, andwhen the change is not needed, further determine whether one of the alerts has been received.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a system that manages security of one or more computer systems and/or one or more different types of I/O channels such as USB, Ethernet, SATA, and SAS. According to certain aspects, the management system is distributed. That is, a central management system and computer subsystems are physically distributed within one or more geographical areas, and communicate with each other by passing messages through a computer network. According to certain additional aspects, the configuration and/or security functions performed by methods and apparatuses according to the invention can be logically transparent to the upstream host and to the downstream device.
71 Citations
20 Claims
-
1. A system comprising:
-
a server computer; a plurality of secure computers; and a communication channel between the server computer and the plurality of secure computers, wherein the server computer includes; a storage for a plurality of security policies; an administrator interface for allowing an administrator to configure a first one of the security policies for a first one of the plurality of secure computers and to configure a second one of the security policies for a second one of the plurality of secure computers, wherein the first and second security policies respectively define different first and second prohibited operations to be performed by the first and second secure computers; and a communication channel interface for managing communications between the server computer and the plurality of secure computers over the communication channel, wherein the server computer is adapted to send the first and second ones of the security policies to the first and second secure computers, respectively, via the communication channel using the communication channel interface, and wherein the server computer is further adapted to receive alerts from the first and second secure computers via the communication channel using the communication channel interface, and wherein the alerts are related to attempts to perform the first and second prohibited operations, and wherein each of the plurality of secure computers include; a host processor; a device interface; an upstream port for communicating with the host processor;
a downstream port for communicating with a device via the device interface; and
a secure subsystem interposed between the upstream port and the downstream port, such that the host processor and the device are incapable of communicating independently with each other without the secure subsystem, and such that the secure subsystem is operative thereby to enforce the sent one of the security policies, and wherein the server computer is further adapted to;determine whether a change is needed in one of the first and second security policies, wherein the change is not in response to one of the alerts being received, and, when the change is needed, send the changed one of the first and second security policies to one of the first and second secure computers via the communication channel using the communication channel interface, and when the change is not needed, further determine whether one of the alerts has been received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
maintaining a plurality of security policies in a management server; allowing an administrator to configure a first one of the security policies for a first one of a plurality of secure computers and to configure a second one of the security policies for a second one of the plurality of secure computers, wherein the first and second security policies respectively define different first and second prohibited operations to be performed by the first and second secure computers; managing communications between the management server and the plurality of secure computers over a communication channel, the communications including sending the first and second ones of the security policies to the first and second secure computers, respectively, via the communication channel by the management server, and the communications further including receiving alerts from the first and second secure computers via the communication channel at the management server, wherein the alerts are related to attempts to perform the first and second prohibited operations; interposing, in each of the secure computers, a secure subsystem between an upstream port for communicating with a host processor and a downstream port for communicating with a device via a device interface, such that the host processor and the device are incapable of communicating independently with each other without the secure subsystem; enforcing, by the secure subsystems, the security policies in the secure computers; determining, by the management server, whether a change is needed in one of the first and second security policies, wherein the change is not in response to one of the alerts being received, and, when the change is needed, sending the changed one of the first and second security policies to one of the first and second secure computers via the communication channel by the management server, and when the change is not needed, further determining by the management server whether one of the alerts has been received. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification