×

Systems and methods for creating and modifying access control lists

  • US 9,769,174 B2
  • Filed: 08/07/2015
  • Issued: 09/19/2017
  • Est. Priority Date: 06/14/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • collecting, by a computer system, data from a plurality of different types of sources on a network;

    identifying, by the computer system based on the collected data, one or more services provided by a host network asset for use by a client network asset over the network;

    presenting to a user interface, a graphical representation that includes representations of;

    the host network asset, the client network asset, the one or more services, and a flow information graph visually indicating a security vulnerability associated with one or more of the host network asset and the client network asset;

    receiving, by the computer system via the user interface, input from a user that includes;

    a selection of a service from the one or more services; and

    a selection permitting or rejecting access to the selected service by the client network asset; and

    in response to the input from the user, modifying access to the selected service by the client network asset over the network.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×