×

Security infrastructure for cloud services

  • US 9,319,269 B2
  • Filed: 02/10/2015
  • Issued: 04/19/2016
  • Est. Priority Date: 09/07/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • storing, by a system comprising one or more computing devices, security rules information comprising one or more rules that govern a transfer of information between a first component and a second component in the system;

    responsive to a request to transfer information from the first component to the second component;

    determining, by the system, based upon the security rules information, a first security zone and a first security level associated with the first component and a second security zone and a second security level associated with the second component; and

    determining, by the system, based upon the first security zone and the first security level determined for the first component and the second security zone and the second security level determined for the second component, a particular transfer technique from a plurality of transfer techniques that is permitted for transferring the information from the first component to the second component;

    determining, based on the particular transfer technique, that the transfer of the information from the first component to the second component is to be performed by pushing the information from the first component to the second component if the second security level associated with the second component is same as or lower than the first security level associated with the first component; and

    enabling, by the system, the transfer of the information from the first component to the second component using the particular transfer technique.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×