Social-graph aware policy suggestion engine
First Claim
1. A non-transitory machine-readable medium on which are stored instructions, comprising instructions that when executed, cause a programmable device to:
- identify a user within a first social network;
collect properties corresponding to a social graph of the user in the first social network;
request a set of security policies from a security policy provider responsive to the collected properties;
receive a set of recommended security policies from the security policy provider; and
configure a computer security software of the programmable device responsive to the recommended set of security policies, wherein the computer security software is programmed to protect a device or a network associated with the user other than the programmable device.
10 Assignments
0 Petitions
Accused Products
Abstract
Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users on the network are monitored to determine appropriate configuration settings and preferences by utilizing a combination of internally configured information and externally gathered information for each user. For example, externally gathered information may include information obtained about a user from one or more social media Internet sites. Automatically obtained information may be used to provide or augment policy information such that a user'"'"'s preference relative to internet content (e.g., content blocking software configuration) may be achieved without requiring an administrator to individually prepare each users security profile and configuration.
18 Citations
19 Claims
-
1. A non-transitory machine-readable medium on which are stored instructions, comprising instructions that when executed, cause a programmable device to:
-
identify a user within a first social network; collect properties corresponding to a social graph of the user in the first social network; request a set of security policies from a security policy provider responsive to the collected properties; receive a set of recommended security policies from the security policy provider; and configure a computer security software of the programmable device responsive to the recommended set of security policies, wherein the computer security software is programmed to protect a device or a network associated with the user other than the programmable device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security appliance, comprising:
-
a hardware processor; a memory, coupled to the processor; and software, stored on the memory, comprising instructions that when executed cause the processor to; identify a user within a first social network; collect properties corresponding to a social graph of the user in the first social network; request a set of security policies from a security policy provider responsive to the collected properties; receive a set of recommended security policies from the security policy provider; and configure the security appliance to enforce the recommended set of security policies to protect a device or a network associated with the user other than the security appliance. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A security policy provider system, comprising:
-
a hardware processor; memory, coupled to the processor; and software, stored on the memory, comprising instructions that when executed cause the processor to; receive properties corresponding to a social graph of a user within a social network of a programmable device from a security gateway device other than the programmable device that protects the programmable device, wherein the security gateway device is separate from the programmable device; receive a request for security policies from the security gateway device; determine a recommended set of security policies response to the received properties; and send the recommended set of security policies to the security gateway device responsive to the request, wherein the recommended set of security policies comprise policies for configuring the security gateway device. - View Dependent Claims (12, 13, 19)
-
-
14. A method of configuring a security gateway appliance, comprising:
-
identifying a user within a social network; collecting properties corresponding to a social graph of the user in the social network; requesting a set of security policies from a security policy provider responsive to the collected properties; receiving a set of recommended security policies from the security policy provider; and configuring the security gateway appliance responsive to the recommended set of security policies to protect a device or a network associated with the user other than the security gateway appliance. - View Dependent Claims (15, 16, 17, 18)
-
Specification