Distributed enterprise security system
First Claim
1. A system for distributed enterprise security, comprising:
- a first process capable of providing a second set of information derived from a first set of information, wherein the first set of information includes one or more of;
a policy and configuration information;
a security control module (SCM) capable of accepting the second set of information wherein the second set of information only includes information from the first set of information that is relevant to the SCM and wherein the SCM is capable of providing a third set of information wherein the third set of information is derived from the second set of information;
a security service module (SSM) capable of accepting the third set of information from the SCM wherein the third set of information only includes information from the second set of information that is relevant to the SSM;
wherein the SSM is capable of controlling access to one or more resources based on the third set of information; and
wherein the SSM is capable of configuring the appropriate set of security services based on the third set of information.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for a distributed enterprise security, comprising, a first process capable of providing a second set of information derived from a first set of information, wherein the first set of information includes one or more of: a policy and configuration information, a security control module (SCM) capable of accepting the second set of information wherein the second set of information only includes information from the first set of information that is relevant to the SCM and wherein the SCM is capable of providing a third set of information wherein the third set of information is derived from the second set of information, a security service module (SSM) capable of accepting the third set of information from the SCM wherein the third set of information only includes information from the second set of information that is relevant to the SSM, wherein the SSM is capable of controlling access to one or more resources based on the third set of information, and wherein the SSM is capable of configuring the appropriate set of security services based on the third set of information.
108 Citations
29 Claims
-
1. A system for distributed enterprise security, comprising:
-
a first process capable of providing a second set of information derived from a first set of information, wherein the first set of information includes one or more of;
a policy and configuration information;
a security control module (SCM) capable of accepting the second set of information wherein the second set of information only includes information from the first set of information that is relevant to the SCM and wherein the SCM is capable of providing a third set of information wherein the third set of information is derived from the second set of information;
a security service module (SSM) capable of accepting the third set of information from the SCM wherein the third set of information only includes information from the second set of information that is relevant to the SSM;
wherein the SSM is capable of controlling access to one or more resources based on the third set of information; and
wherein the SSM is capable of configuring the appropriate set of security services based on the third set of information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for distributed enterprise security, comprising:
-
providing by a first process a second set of information derived from a first set of information, wherein the first set of information includes one or more of;
a policy and configuration information;
accepting by a security control module (SCM) the second set of information wherein the second set of information only includes information from the first set of information that is relevant to the SCM and wherein the SCM is capable of providing a third set of information wherein the third set of information is derived from the second set of information;
accepting by a security service module (SSM) the third set of information from the SCM wherein the third set of information only includes information from the second set of information that is relevant to the SSM;
wherein the SSM is capable of controlling access to one or more resources based on the third set of information; and
wherein the SMM is capable of configuring security services based on the third set of information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A machine readable medium having instructions stored thereon to cause a system to:
-
provide by a first process a second set of information derived from a first set of information, wherein the first set of information includes one or more of;
a policy and configuration information;
accept by a security control module (SCM) the second set of information wherein the second set of information only includes information from the first set of information that is relevant to the SCM and wherein the SCM is capable of providing a third set of information wherein the third set of information is derived from the second set of information;
accept by a security service module (SSM) the third set of information from the SCM wherein the third set of information only includes information from the second set of information that is relevant to the SSM;
wherein the SSM is capable of controlling access to one or more resources based on the third set of information; and
wherein the SSM is capable of configuring the appropriate set of security services based on the third set of information. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer signal embodied in a transmission medium, comprising:
-
a code segment including instructions for providing by a first process a second set of information derived from a first set of information, wherein the first set of information includes one or more of;
a policy and configuration information;
a code segment including instructions for accepting by a security control module (SCM) the second set of information wherein the second set of information only includes information from the first set of information that is relevant to the SCM and wherein the SCM is capable of providing a third set of information wherein the third set of information is derived from the second set of information;
a code segment including instructions for accepting by a security service module (SSM) the third set of information from the SCM wherein the third set of information only includes information from the second set of information that is relevant to the SSM;
wherein the SSM is capable of controlling access to one or more resources based on the third set of information; and
wherein the SSM is capable of configuring the appropriate set of security services based on the third set of information.
-
Specification