IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0433532
(2003-05-01)
|
등록번호 |
US-7614085
(2009-11-16)
|
우선권정보 |
IL-149583(2002-05-09) |
국제출원번호 |
PCT/IL03/000352
(2003-05-01)
|
§371/§102 date |
20031120
(20031120)
|
국제공개번호 |
WO03/096168
(2003-11-20)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
Paul, Hastings, Janofsky & Walker LLP
|
인용정보 |
피인용 횟수 :
18 인용 특허 :
64 |
초록
▼
The invention relates to a method for creating and/or updating a security policy within a computerized system protected by at least one security package, comprising: (a) Providing at least one trusted source within the system, capable of issuing a report detailing the structure and/or attributes of
The invention relates to a method for creating and/or updating a security policy within a computerized system protected by at least one security package, comprising: (a) Providing at least one trusted source within the system, capable of issuing a report detailing the structure and/or attributes of the system and/or security flaws within the system; (b) Periodically operating said at least one trusted source in order to periodically issue said report; (c) Importing each trusted source report into a security correcting unit, and forming one consolidated file containing the details from all said reports; (d) Importing into said security correcting unit the attributes files of all the security packages; (e) Separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, information which is missing from the said attributes file, and is relevant to said attributes file; and (f) Separately exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy.
대표청구항
▼
The invention claimed is: 1. A method for the automatic update of a security policy enforced by at least one security package within a computerized system, comprising the steps of: a. Providing within the computerized system at least one trusted source, each capable of issuing a security report det
The invention claimed is: 1. A method for the automatic update of a security policy enforced by at least one security package within a computerized system, comprising the steps of: a. Providing within the computerized system at least one trusted source, each capable of issuing a security report detailing at least one of: network protocol and its related attributes, application protocol and its related attributes application paths, application action, application action attributes, and application action flow, or security flaws within the computerized system; b. Periodically operating each of said at least one trusted source in order to issue a respective security report; c. Importing each respective security report into a security correcting unit, and forming one consolidated file comprising the details from each respective security report; d. Importing into said security correcting unit one or more attributes files of said at least one security package; e. Separately comparing the content of said consolidated file with the content of each of the imported attributes files, and updating each attributes file with security information included within said consolidated file; f. Separately exporting said updated attributes files and effecting each of them as the active attributes file or files of the corresponding security package; g. Using a predefined set of logical rules to decide which content from said consolidated file to effect and which to ignore; and h. Importing into said security correcting unit a second type report comprising application locations and paths that are defined by said security correcting unit as the only valid locations and paths for accessing an application, and said security correcting unit updating one or more relevant attribute files using the content of said second type report, thereby effecting an updated security policy. 2. A method according to claim 1, wherein: a. The step of importing each respective security source report further comprises the step of transforming each respective security report into a common format, and forming said consolidated file in said common format; b. The step of importing into said security correcting unit one or more attributes files of said at least one security package further comprises the step of transforming each attributes file into said common format; and c. The step of separately exporting each of said updated attributes files and effecting the same as the active attributes file or files of the corresponding security package further comprises the step of transforming said attributes file from a common format into a package specific format, prior to said exporting. 3. A method according to claim 1, wherein each respective security report comprises at least one attribute component. 4. A method according to claim 2 wherein each respective security report is arranged in the corresponding trusted source specific format. 5. A method according to claim 2 wherein each of said attributes files is arranged in the corresponding security package specific format. 6. A method according to claim 1, wherein each security package effects a security policy within its predefined range of responsibility, according to the content of its attributes file. 7. A method according to claim 1, wherein one of said at least one trusted source comprises a security scanner. 8. A method according to claim 3, wherein said attribute component is intended to eliminate a known flaw. 9. A method according to claim 3, wherein said attribute component is related to the current structure of the system, which when recorded within an updated attributes file enforces a security policy bounded to said structure, thereby rejecting activity deviated from said structure. 10. A computerized system for the automatic update of a security policy, the computerized system comprising one or more computers collectively comprising the following components: a. At least one security package enforcing a security policy within a predefined range of responsibility, said policy being defined by a specific, attributes file associated with each of said at least one security package; b. At least one trusted source capable of issuing a security report detailing at least one of: network protocol and its related attributes, application protocol and its related attributes, application paths, application action, application action attributes, and application action flow or security flaws within the system; c. A security correcting unit for: importing said report from each of said at least one trusted source, and producing a consolidated file including information from each said report; importing a second type report comprising application locations and paths that are defined by said security correcting unit as the only valid locations and paths for accessing an application, and updating one or more relevant attribute files using the content of said second type report, and importing the attributes file from each of said at least one security package, separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with security information included within said consolidated file, using a predefined set of logical rules to decide which content from said consolidated file to effect and which to ignore, and exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy. 11. A system according to claim 10 wherein the security correcting unit further comprises: At least one first importing modules for importing reports from each of said at least one trusted source; A consolidation module for receiving each of said reports and forming one consolidated file containing information included in said reports; At least one second importing modules for importing into the correcting unit from each security package its corresponding attributes file; A security policy creation module comprising a set of predefined logical decision rules for use while updating the attributes files, for comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, information which is missing from the said attributes file, and is relevant to said attributes file; and At least one exporting module for exporting each updated attributes file into its corresponding security package, thereby effecting an updated security policy. 12. A system according to claim 11, further comprising at least one first transform modules for transforming each report from its trusted source specific format into a common format, at least one second transform modules for transforming each imported attributes security package from its package specific format into a common format, and at least one third transform modules for transforming each updated attributes file from a common format into its package specific format before its exportation into the corresponding package, and wherein the consolidated file is also arranged in said common format. 13. System according to claim 10, wherein one of the security packages comprises an Intrusion Detection System, whose set of signatures is stored within a file, said file being treated as the attributes file of a security package, and is therefore updated accordingly. 14. System according to claim 10, wherein one of the security packages comprises an application switch, whose set of attributes that is used for direction being stored within a file, said file being treated by the system as an attributes file of a security package, and is therefore updated accordingly. 15. System according to claim 10, wherein one of the security packages comprises an Application Layer Firewall, whose set of attributes that is used for denying actions or accesses within the application or allowing legal actions or accesses within the application is stored within a file, said file being treated by the system as an attributes file of a security package, and is therefore updated accordingly.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.