SYSTEM AND METHOD OF UTILIZING A DEDICATED COMPUTER SECURITY SERVICE
First Claim
1. A method for utilizing computer security services, the method comprising:
- storing, in an electronic database, a plurality of rules that indicate when to use either a private cloud service or a public cloud service for at least one of the security services, wherein the private and public cloud services share similar internal working logic in processing one or more requests from a plurality of client computers to access various computer security services;
receiving a request from a client computer to access the at least one private or public security service that analyzes an unknown object received on the client computer and generates at least one application control rule that specifies how to process the unknown object on the client computer;
determining, by a hardware processor, at least one parameter relating to the received request;
applying, by the hardware processor, the at least one parameter to the plurality of rules to determine an instruction indicating whether to transmit the request to the private cloud service or the public cloud service; and
transmitting the request to one of either the private cloud service or the public cloud service, based on the instruction, to use the at least one security service.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems and method for utilizing a dedicated computer security service. An exemplary method includes storing in an electronic database rules that indicate when to use either a first cloud service or a second cloud service for one of the security services, receiving a request from a client computer to access the security service, determining parameters relating to the received request, applying the parameters to the plurality of rules to determine an instruction indicating whether to transmit the request to the first cloud service or the second cloud service; and transmitting the request to either the first cloud service or the second cloud service, based on the instruction, to use the at least one security service.
199 Citations
20 Claims
-
1. A method for utilizing computer security services, the method comprising:
-
storing, in an electronic database, a plurality of rules that indicate when to use either a private cloud service or a public cloud service for at least one of the security services, wherein the private and public cloud services share similar internal working logic in processing one or more requests from a plurality of client computers to access various computer security services; receiving a request from a client computer to access the at least one private or public security service that analyzes an unknown object received on the client computer and generates at least one application control rule that specifies how to process the unknown object on the client computer; determining, by a hardware processor, at least one parameter relating to the received request; applying, by the hardware processor, the at least one parameter to the plurality of rules to determine an instruction indicating whether to transmit the request to the private cloud service or the public cloud service; and transmitting the request to one of either the private cloud service or the public cloud service, based on the instruction, to use the at least one security service. - View Dependent Claims (2, 4, 5, 6, 7)
-
-
3. (canceled)
-
8. A system for utilizing computer security services, the system comprising:
-
an electronic database configured to store a plurality of rules that indicate when to use either a private cloud service or a public cloud service for at least one of the security services, wherein the private and public cloud services share similar internal working logic in processing one or more requests from a plurality of client computers to access various computer security services; and a hardware processor configured to; receive a request from a client computer to access the at least one private or public security service that analyzes an unknown object received on the client computer and generates at least one application control rule that specifies how to process the unknown object on the client computer, determine at least one parameter relating to the received request, apply the at least one parameter to the plurality of rules to determine an instruction indicating whether to transmit the request to the private cloud service or the public cloud service, and transmit the request to one of either the private cloud service or the public cloud service, based on the instruction, to use the at least one security service. - View Dependent Claims (9, 11, 12, 13, 14)
-
-
10. (canceled)
-
15. A non-transitory computer readable medium storing computer executable instructions for utilizing computer security services, including instructions for:
-
storing, in an electronic database, a plurality of rules that indicate when to use either a private cloud service or a public cloud service for at least one of the security services, wherein the private and public cloud services share similar internal working logic in processing one or more requests from a plurality of client computers to access various computer security services; receiving a request from a client computer to access the at least one private or public security service that analyzes an unknown object received on the client computer and generates at least one application control rule that specifies how to process the unknown object on the client computer; determining at least one parameter relating to the received request; applying the at least one parameter to the plurality of rules to determine an instruction indicating whether to transmit the request to the private cloud service or the public cloud service; and transmitting the request to one of either the private cloud service or the public cloud service, based on the instruction, to use the at least one security service. - View Dependent Claims (17, 18, 19, 20)
-
-
16. (canceled)
Specification