Distributed enterprise security system
First Claim
Patent Images
1. A system for distributed enterprise security, comprising:
- a server operable to update information, wherein the information can include one or more of a policy and configuration information;
wherein a policy includes at least one of authentication policy, role policy, authorization policy, and auditing policy;
wherein configuration information includes at least one of security providers, locations of directory servers, and databases;
a plurality of security control managers (SCMs), each executing on a different computer distributed throughout an enterprise, including a first security control manager (SCM), executing on a first computer wherein the first computer includes a computer readable medium and processor operating thereon, operable to accept the information from the server and distribute the information;
a plurality of security service modules (SSMs) executing on the first computer, wherein each SSM is operable to accept the information from the first SCM and wherein each SSM is deployed to a component on the first computer and provides security services to the component based on the information; and
wherein the information accepted by the SCM is relevant to one or more of the plurality of SSMs.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for distributed enterprise security, comprising, a server operable to update information, wherein the information can include one or more of a policy and configuration information, a security control module (SCM) operable to accept the information, at least one security service module (SSM) operable to accept the information from the SCM, and herein the information accepted by the SCM is relevant to one or more of the at least one SSMs.
489 Citations
25 Claims
-
1. A system for distributed enterprise security, comprising:
-
a server operable to update information, wherein the information can include one or more of a policy and configuration information; wherein a policy includes at least one of authentication policy, role policy, authorization policy, and auditing policy; wherein configuration information includes at least one of security providers, locations of directory servers, and databases; a plurality of security control managers (SCMs), each executing on a different computer distributed throughout an enterprise, including a first security control manager (SCM), executing on a first computer wherein the first computer includes a computer readable medium and processor operating thereon, operable to accept the information from the server and distribute the information; a plurality of security service modules (SSMs) executing on the first computer, wherein each SSM is operable to accept the information from the first SCM and wherein each SSM is deployed to a component on the first computer and provides security services to the component based on the information; and wherein the information accepted by the SCM is relevant to one or more of the plurality of SSMs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing distributed enterprise security, comprising:
-
distributing information to a first security control manager (SCM) from a plurality of SCMs each executing on a different computer distributed throughout an enterprise, wherein the first SCM executes on a first computer including a computer readable medium and processor operating thereon and wherein the information can include one or more of a policy and configuration information; wherein a policy includes at least one of authentication policy, role policy, authorization policy, and auditing policy; wherein configuration information includes at least one of security providers, locations of directory servers, and databases; distributing the information from the first SCM to a plurality of security service modules (SSMs) executing on the first computer; and wherein the information distributed to the first SCM is relevant to one or more of the plurality of SSMs and wherein each of the plurality of SSMs is deployed to a component and provides security services to the component on the first computer based on the information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable medium having instructions stored thereon to cause a system to:
-
distribute information to a first security control manager (SCM) from a plurality of SCMs each executing on a different computer distributed throughout an enterprise, wherein the first SCM executes on a first computer including a computer readable medium and processor operating thereon and wherein the information can include one or more of a policy and configuration information; wherein a policy includes at least one of authentication policy, role policy, authorization policy, and auditing policy; wherein configuration information includes at least one of security providers, locations of directory servers, and databases; distribute the information from the first SCM to a plurality of security service modules (SSMs) executing on the first computer; and wherein the information distributed to the first SCM is relevant to one or more of the plurality of SSMs and wherein each of the plurality of SSMs is deployed to a component and provides security services to the component on the first computer based on the information. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification