×

Security management system

  • US 9,754,117 B2
  • Filed: 02/23/2015
  • Issued: 09/05/2017
  • Est. Priority Date: 02/24/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing a tailored security management framework for a business entity based on the business entity'"'"'s operations, infrastructure, and user-based processes, as well as industry-specific rules and regulations associated with the business entity, the system comprising:

  • a network-based computing system configured to communicate and exchange data with one or more network access computing devices via a communications network, the network-based computing system comprises;

    a first memory for receiving and storing a first set of data associated with the business entity, the first set of data comprises information related to at least one of the business entity'"'"'s operations, the business entity'"'"'s infrastructure, the business entity'"'"'s procedures and policies, and one or more users authorized to have access to the system and exchange data associated with the business entity;

    a second memory for receiving and storing a second set of data associated with an industry to which the business entity is related, the second set of data comprises industry-specific rules, regulations, and known security threats;

    a processor that correlates the first and second sets of data with one another and generates a plurality of security schemes for use in the security management framework to assess and address potential security threats, wherein the correlation of the first and second sets of data comprises factoring the first and second sets of data in accordance with at least the formula;




    biprog=(progcomp

    RGap×

    RA
    wherein a domain of a security program (prog) is defined on an interval of the industry (i), the business entity (b) belonging to the specific business entity composition (comp), including a program components relationship group (RG) driven by applicability (a), priority (p), and risk assessment (RA); and

    an interface for receiving a request for access to data associated with the business entity;

    wherein the processor compares request data with the plurality of security schemes and identifies a corresponding security scheme based on the comparison, the processor outputs informational data associated with the identified security scheme to a user associated with the one or more network access computing devices, the informational data comprises protocols or recommendations to facilitate actions to be taken by the user to address the received request for access to the business entity data, wherein the actions to be taken by the user, as facilitated by the protocols or recommendations, are in accordance with the business entity'"'"'s security procedures and policies and industry-specific rules and regulations associated with the business entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×