Collaborative rules based security
    1.
    发明授权
    Collaborative rules based security 有权
    基于协作规则的安全性

    公开(公告)号:US08726348B2

    公开(公告)日:2014-05-13

    申请号:US12969323

    申请日:2010-12-15

    IPC分类号: G06F7/04

    CPC分类号: G06F21/6218 H04L63/102

    摘要: A cloud computing security system. An access manager module includes first and second client profiles. The first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and the second client profile has a second set of rules enabling access to a second set of cloud computing system resources. A security logic module is in communication with the access manager module. The security logic module is configured to receive an access request for access to one of the first and second sets of cloud computing system resources. Responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, the security logic module is configured to provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources.

    摘要翻译: 云计算安全系统。 访问管理器模块包括第一和第二客户端配置文件。 第一客户端配置文件具有允许访问第一组云计算系统资源的第一组规则,并且第二客户端配置文件具有能够访问第二组云计算系统资源的第二组规则。 安全逻辑模块与访问管理器模块通信。 安全逻辑模块被配置为接收访问第一组和第二组云计算系统资源之一的访问请求。 响应于确定所述访问请求符合所述第一组规则和所述第二组规则中的至少一个,所述安全逻辑模块被配置为提供访问许可,其授予对所述第一和第二集合中的至少一个 云计算系统资源。

    Information Security Management
    2.
    发明申请
    Information Security Management 有权
    信息安全管理

    公开(公告)号:US20130263258A1

    公开(公告)日:2013-10-03

    申请号:US13572298

    申请日:2012-08-10

    IPC分类号: G06F21/00 G06F11/00

    CPC分类号: H04L63/1408

    摘要: A system and method for information security management. An anomaly in data traffic directed to a data processing environment is identified. The anomaly indicates a threat to the data processing environment. The data processing environment comprises a number of data processing systems. A threatened data processing system is identified. The threatened data processing system is one of the number of data processing systems to which the threat is directed. The threatened data processing system is isolated. The threatened data processing system is monitored after the threatened data processing system is isolated. The threatened data processing system is replicated to form a replicated data processing system.

    摘要翻译: 一种信息安全管理系统和方法。 识别指向数据处理环境的数据流量的异常。 异常表示对数据处理环境的威胁。 数据处理环境包括多个数据处理系统。 确定了受威胁的数据处理系统。 受威胁的数据处理系统是威胁所针对的数据处理系统的数量之一。 受威胁的数据处理系统是孤立的。 受威胁的数据处理系统被隔离后,会受到威胁的数据处理系统的监控。 受威胁的数据处理系统被复制以形成复制的数据处理系统。

    Data retention management
    3.
    发明授权
    Data retention management 有权
    数据保留管理

    公开(公告)号:US08903784B2

    公开(公告)日:2014-12-02

    申请号:US13593808

    申请日:2012-08-24

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30011 G06Q10/10

    摘要: Systems, methods, and computer program products manage retention of data associated with a business record are described herein. In one embodiment, a computer-based system to manage retention of data associated with a business record comprises at least one processor and logic instructions stored in a tangible computer readable medium which, when executed by the at least one processor, configure the at least one processor to determine whether the business record has reached a record retention threshold, and in response to a determination that a business record has reached the record retention threshold to separate a business record into a plurality of data elements, wherein the data elements have at least one defined retention policy associated therewith, determine a selected storage location for each of the plurality of data elements based on the at least one defined retention policy and store each of the plurality of data elements in the selected storage location.

    摘要翻译: 本文描述了管理与业务记录相关联的数据的保留的系统,方法和计算机程序产品。 在一个实施例中,用于管理与业务记录相关联的数据的保留的基于计算机的系统包括存储在有形计算机可读介质中的至少一个处理器和逻辑指令,所述有形计算机可读介质当由所述至少一个处理器执行时,配置所述至少一个 处理器,以确定业务记录是否已经达到记录保留阈值,并且响应于确定业务记录已经达到将业务记录分离成多个数据元素的记录保留阈值,其中数据元素具有至少一个 与之相关联的定义的保留策略,基于所述至少一个定义的保留策略来确定所述多个数据元素中的每一个的所选择的存储位置,并将所述多个数据元素中的每一个存储在所选择的存储位置中。

    COLLABORATIVE RULES BASED SECURITY
    4.
    发明申请
    COLLABORATIVE RULES BASED SECURITY 有权
    基于协同规则的安全

    公开(公告)号:US20120159572A1

    公开(公告)日:2012-06-21

    申请号:US12969323

    申请日:2010-12-15

    IPC分类号: G06F21/00

    CPC分类号: G06F21/6218 H04L63/102

    摘要: A cloud computing security system. An access manager module includes first and second client profiles. The first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and the second client profile has a second set of rules enabling access to a second set of cloud computing system resources. A security logic module is in communication with the access manager module. The security logic module is configured to receive an access request for access to one of the first and second sets of cloud computing system resources. Responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, the security logic module is configured to provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources.

    摘要翻译: 云计算安全系统。 访问管理器模块包括第一和第二客户端配置文件。 第一客户端配置文件具有允许访问第一组云计算系统资源的第一组规则,并且第二客户端配置文件具有能够访问第二组云计算系统资源的第二组规则。 安全逻辑模块与访问管理器模块通信。 安全逻辑模块被配置为接收访问第一组和第二组云计算系统资源之一的访问请求。 响应于确定所述访问请求符合所述第一组规则和所述第二组规则中的至少一个,所述安全逻辑模块被配置为提供访问许可,其授予对所述第一和第二集合中的至少一个 云计算系统资源。

    Information security management
    5.
    发明授权
    Information security management 有权
    信息安全管理

    公开(公告)号:US08826429B2

    公开(公告)日:2014-09-02

    申请号:US13572298

    申请日:2012-08-10

    IPC分类号: G06F12/14

    CPC分类号: H04L63/1408

    摘要: A system and method for information security management. An anomaly in data traffic directed to a data processing environment is identified. The anomaly indicates a threat to the data processing environment. The data processing environment comprises a number of data processing systems. A threatened data processing system is identified. The threatened data processing system is one of the number of data processing systems to which the threat is directed. The threatened data processing system is isolated. The threatened data processing system is monitored after the threatened data processing system is isolated. The threatened data processing system is replicated to form a replicated data processing system.

    摘要翻译: 一种信息安全管理系统和方法。 识别指向数据处理环境的数据流量的异常。 异常表示对数据处理环境的威胁。 数据处理环境包括多个数据处理系统。 确定了受威胁的数据处理系统。 受威胁的数据处理系统是威胁所针对的数据处理系统的数量之一。 受威胁的数据处理系统是孤立的。 受威胁的数据处理系统被隔离后,会受到威胁的数据处理系统的监控。 受威胁的数据处理系统被复制以形成复制的数据处理系统。

    DATA RETENTION MANAGEMENT
    6.
    发明申请
    DATA RETENTION MANAGEMENT 有权
    数据保存管理

    公开(公告)号:US20140059023A1

    公开(公告)日:2014-02-27

    申请号:US13593808

    申请日:2012-08-24

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30011 G06Q10/10

    摘要: Systems, methods, and computer program products manage retention of data associated with a business record are described herein. In one embodiment, a computer-based system to manage retention of data associated with a business record comprises at least one processor and logic instructions stored in a tangible computer readable medium which, when executed by the at least one processor, configure the at least one processor to determine whether the business record has reached a record retention threshold, and in response to a determination that a business record has reached the record retention threshold to separate a business record into a plurality of data elements, wherein the data elements have at least one defined retention policy associated therewith, determine a selected storage location for each of the plurality of data elements based on the at least one defined retention policy and store each of the plurality of data elements in the selected storage location.

    摘要翻译: 本文描述了管理与业务记录相关联的数据的保留的系统,方法和计算机程序产品。 在一个实施例中,用于管理与业务记录相关联的数据的保留的基于计算机的系统包括存储在有形计算机可读介质中的至少一个处理器和逻辑指令,所述有形计算机可读介质当由所述至少一个处理器执行时,配置所述至少一个 处理器,以确定业务记录是否已经达到记录保留阈值,并且响应于确定业务记录已经达到将业务记录分离成多个数据元素的记录保留阈值,其中数据元素具有至少一个 与之相关联的定义的保留策略,基于所述至少一个定义的保留策略来确定所述多个数据元素中的每一个的所选择的存储位置,并将所述多个数据元素中的每一个存储在所选择的存储位置中。