发明名称 Managing security in a network
摘要 A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
申请公布号 US9032478(B2) 申请公布日期 2015.05.12
申请号 US200913146112 申请日期 2009.01.29
申请人 Hewlett-Packard Development Company, L.P. 发明人 Ballesteros Rebecca M.;Krell Sherry;Cowham Adrian;Green John M.;Yalakanti Ramachandra
分类号 G06F15/16;G06F17/30;H04L29/06;G06F21/00;H04L9/32;G06F21/55;G06F21/56 主分类号 G06F15/16
代理机构 HP Patent Department 代理人 HP Patent Department
主权项 1. A computer implemented method of managing security in a network, said method comprising: detecting a data anomaly at a first location on a network; identifying a source of said data anomaly; determining a role-based authentication of said source, wherein said determining said role-based authentication of said source comprises: determining a role associated with said source, wherein said role is a pre-defined function within said network, wherein said function corresponds to a level of access permitted to said source to various locations within said network; comparing said source with a plurality of access control policies, wherein each of said plurality of access control policies comprises at least one access restriction instruction associated with one or more sources; based on said comparing, associating said source with a corresponding one of said plurality of control policies, wherein said corresponding one of said plurality of control policies references at least said role of said source; based on said identifying said source, replacing said corresponding one of said plurality of control policies with a second access control policy wherein said second access control policy overrides said corresponding one of said plurality of control policies and other previous access control policies in place; and enabling a prevention of re-entry of said source at a second location on said network based on a network address of said source and based on said role-based authentication of said source.
地址 Houston TX US