Systems and methods to protect against a vulnerability event
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/00
H04L-029/06
G06F-021/56
G06F-021/57
G06F-021/52
G06F-021/55
출원번호
US-0449508
(2012-04-18)
등록번호
US-9313211
(2016-04-12)
발명자
/ 주소
Lototskiy, Alexander
출원인 / 주소
Symantec Corporation
대리인 / 주소
Holland & Hart LLP
인용정보
피인용 횟수 :
1인용 특허 :
2
초록▼
A computer-implemented method to protect against a vulnerability event is described. A first set of security policies is enforced. A client device is monitored for a vulnerability event. Upon detecting a vulnerability event, a vulnerability level corresponding to a current environment is determined.
A computer-implemented method to protect against a vulnerability event is described. A first set of security policies is enforced. A client device is monitored for a vulnerability event. Upon detecting a vulnerability event, a vulnerability level corresponding to a current environment is determined. A second set of security policies is selected based on the vulnerability level. The second set of security policies is enforced.
대표청구항▼
1. A computer-implemented method to protect against a vulnerability event, comprising: enforcing, by a processor, a first set of security policies on a client device, wherein the processor is a hardware processor;subscribing, by the processor, to an update notification service to obtain notification
1. A computer-implemented method to protect against a vulnerability event, comprising: enforcing, by a processor, a first set of security policies on a client device, wherein the processor is a hardware processor;subscribing, by the processor, to an update notification service to obtain notifications regarding update events, the update events relating to operating system updates and host protection software updates;monitoring, by the processor, the updated events, wherein monitoring the update events comprises monitoring the update events relating to the operating system and host protection software in relation to termination of a malware detection service;detecting, by the processor, an update event in conjunction with subscribing to the update notification service;determining, by the processor, whether the update event is known to cause temporary disruption to the malware detection service;upon determining the update event is known to not cause temporary disruption to the malware detection service, maintaining, by the processor, the first set of security policies; andupon determining the update event is known to cause temporary disruption to the malware detection service: determining, by the processor, a vulnerability level corresponding to a first type of network connection or a second type of network connection, wherein the vulnerability level is at a first level when a current network connection is of the first type and the vulnerability level is at a second level when the current network connection is of the second type;selecting, by the processor, a second set of security policies based on the vulnerability level; andenforcing, by the processor, the second set of security policies. 2. The method of claim 1, wherein the second set of security policies is enforced upon the occurrence of the vulnerability event. 3. The method of claim 1, wherein enforcing the second set of security policies comprises switching from enforcing the first set of security policies to enforcing the second set of security policies. 4. The method of claim 1, further comprising: monitoring the client device for an end of the vulnerability event; andupon detecting the end of the vulnerability event, enforcing the first set of security policies. 5. The method of claim 4, wherein enforcing the first set of security policies comprises switching from enforcing the second set of security policies to enforcing the first set of security policies. 6. A computing device configured to protect against a vulnerability event, comprising: a processor;memory in electronic communication with the processor, wherein the memory stores computer executable instructions that, when executed by the processor, cause the processor to: enforce a first set of security policies on a client device;subscribe to an update notification service to obtain notifications regarding update events, the update events relating to operating system updates and host protection software updates;monitoring, by the processor, the updated events, wherein monitoring the update events comprises monitoring the date events relating to the operating system and host protection software in relation to termination of malware detection service;detect an update event in conjunction with subscribing to the update notification service;determine whether the update event is known to cause temporary disruption to the malware detection service;upon determining the update event is known to not cause temporary disruption to the malware detection service, maintain the first set of security policies; andupon determining the update event is known to cause temporary disruption to the malware detection service: determine a vulnerability level corresponding to a first type of network connection or a second type of network connection, wherein the vulnerability level is at a first level when a current network connection is of the first type and the vulnerability level is at a second level when the current network connection is of the second type;select a second set of security policies based on the vulnerability level; andenforce the second set of security policies. 7. The computing device of claim 6, wherein the second set of security policies is enforced upon the occurrence of the vulnerability event. 8. The computing device of claim 6, wherein enforcing the second set of security policies comprises switching from enforcing the first set of security policies to enforcing the second set of security policies. 9. The computing device of claim 6, wherein the processor is further configured to: monitor the client device for an end of the vulnerability event; andupon detecting the end of the vulnerability event, enforce the first set of security policies. 10. The computing device of claim 9, wherein enforcing the first set of security policies comprises switching from enforcing the second set of security policies to enforcing the first set of security policies. 11. A computer-program product to protect against a vulnerability event, the computer-program product comprising a non-transitory computer-readable storage medium that stores computer executable instructions that, when executed by a processor, cause the processor to: enforce a first set of security policies on a client device;subscribe to an update notification service to obtain notifications regarding update events, the update events relating to operating system updates and host protection software updates;monitoring, by the processor, the updated events, wherein monitoring the update events comprises monitoring the update events relating to the operating system and host protection software in relation to termination of a malware detection service;detect an update event in conjunction with subscribing to the update notification service;determine whether the update event is known to cause temporary disruption to the malware detection service;upon determining the update event is known to not cause temporary disruption to the malware detection service, maintain the first set of security policies; andupon determining the update event is known to cause temporary disruption to the malware detection service: determine a vulnerability level corresponding to a first type of network connection or a second type of network connection, wherein the vulnerability level is at a first level when a current network connection is of the first type and the vulnerability level is at a second level when the current network connection is of the second type;select a second set of security policies based on the vulnerability level; andenforce the second set of security policies.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (2)
Kalinichenko, Michael, Application of nested behavioral rules for anti-malware processing.
Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.