METHOD AND SYSTEM FOR POLICY MANAGEMENT, TESTING, SIMULATION, DECENTRALIZATION AND ANALYSIS

    公开(公告)号:US20180069899A1

    公开(公告)日:2018-03-08

    申请号:US15645639

    申请日:2017-07-10

    Abstract: A policy management method and system, which determines at least one functional model for the IT system; loads at least one pre-configured policy selection template that indicates at least one policy aspect applicable to the at least one IT system; generates at least one policy user interface that gathers a policy input; receives a policy input loaded from a data storage or a memory or entered by a user via a user interface; loads at least one pre-configured policy generation template that indicates at least one technical rule or configuration aspect of the policy that the policy template pertains to; generates at least one machine-enforceable rule/configuration compliant with the received input policy; transmits the at least one machine-enforceable rule and/or configuration to at least one policy implementation entity; and executes the transmitted at least one machine-enforceable rule/configuration.

    Method and system for managing security policies
    4.
    发明授权
    Method and system for managing security policies 有权
    管理安全策略的方法和系统

    公开(公告)号:US09043861B2

    公开(公告)日:2015-05-26

    申请号:US12126711

    申请日:2008-05-23

    CPC classification number: H04L63/20 H04L63/0263 H04L63/10 H04L67/10

    Abstract: A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input indicating a high-level security policy for the IT system, the received high-level security policy relating to non-functional system attributes for the IT system and received in a format that is not machine-enforceable at an enforcement entity of the IT system. A functional model for the IT system is determined, where the functional model indicates functional system attributes of the IT system. At least one pre-configured rule template is loaded, and at least one machine-enforceable rule is generated in a manner compliant with the received high-level security policy by iteratively filling the at least one pre-configured rule template with functional system attributes indicated by the functional model. After the generating step, the at least one machine-enforceable rule can be distributed (e.g., to an enforcement entity, an Intrusion Detection System (IDS), etc.). In another example, the receiving, determining, loading, generating and distributing steps can be performed at a policy node within an IT system.

    Abstract translation: 提供了一种在信息技术(IT)系统中管理安全策略的系统和方法。 在一个示例中,该方法包括接收指示IT系统的高级安全策略的输入,接收到的与IT系统的非功能系统属性相关的高级安全策略,并以不是机器级的格式接收, 可在信息系统的执法实体上执行。 确定IT系统的功能模型,其中功能模型指示IT系统的功能系统属性。 加载至少一个预先配置的规则模板,并且以符合所接收的高级安全策略的方式生成至少一个机器可执行规则,通过迭代地填充至少一个预先配置的规则模板,所述规则模板具有指示的功能系统属性 通过功能模型。 在生成步骤之后,可以分发至少一个可执行机器的规则(例如,到执行实体,入侵检测系统(IDS)等)。 在另一示例中,可以在IT系统内的策略节点执行接收,确定,加载,生成和分发步骤。

    Method and system for rapid accreditation/re-accreditation of agile IT environments, for example service oriented architecture (SOA)
    6.
    发明授权
    Method and system for rapid accreditation/re-accreditation of agile IT environments, for example service oriented architecture (SOA) 有权
    快速认证/重新认证敏捷IT环境的方法和系统,例如面向服务架构(SOA)

    公开(公告)号:US08856863B2

    公开(公告)日:2014-10-07

    申请号:US12997462

    申请日:2009-06-10

    Abstract: A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model, and meta models of the models are read by a reader. A correspondence between the functional model, security implementation model, and the requirements model is analyzed, whereby the correspondence indicates that compliance/security/accreditation requirements defined in the requirement model match with security objectives implemented by controls defined by the security implementation model. Next, it is determined whether correspondence is or is not given based on the analysis of the correspondence and then evidence is generated based on the analysis of the correspondence and the determination and the impact of changes is analyzed.

    Abstract translation: 一种用于管理和分析可重用模型中的安全需求的系统和方法。 阅读器读取至少一个功能模型,至少一个安全实施模型,至少一个需求模型和模型的元模型。 分析功能模型,安全实施模型和需求模型之间的对应关系,对应关系表明,需求模型中定义的合规/安全/认证要求与安全实施模型定义的控制实现的安全目标相匹配。 接下来,基于对应关系的分析确定是否给出对应关系,然后基于对应关系的分析和确定来生成证据,分析变化的影响。

    MONITORING APPARATUS AND METHOD FOR MONITORING A JOINING PROCESS AND FOR RETRACING QUALITY
    7.
    发明申请
    MONITORING APPARATUS AND METHOD FOR MONITORING A JOINING PROCESS AND FOR RETRACING QUALITY 审中-公开
    监测装置和监测接合过程和回收质量的方法

    公开(公告)号:US20100132873A1

    公开(公告)日:2010-06-03

    申请号:US12067703

    申请日:2006-09-14

    Applicant: Ulrich Lang

    Inventor: Ulrich Lang

    CPC classification number: B23K31/12

    Abstract: Disclosed are an apparatus for monitoring a process of joining components and for retracing quality, at least sections of an image which has been recorded by a camera and has been reproduced by a screen being able to be stored together with an identity number in a memory device, and a method for using such an apparatus.

    Abstract translation: 公开了一种用于监视连接部件的过程和用于回溯质量的装置,至少已经由相机记录的图像的部分,并且已被屏幕再现,能够与身份号一起存储在存储装置中 ,以及使用这种装置的方法。

    METHOD AND SYSTEM FOR DETERMINING POLICIES, RULES, AND AGENT CHARACTERISTICS, FOR AUTOMATING AGENTS, AND PROTECTION

    公开(公告)号:US20190258953A1

    公开(公告)日:2019-08-22

    申请号:US16255811

    申请日:2019-01-23

    Abstract: A method of automating an agent for environment includes loading an action determination model that indicates an action option, determining whether the action determination model indicates a next action option, and if so, determining an action based on the action determination model, determining whether an execution data model has been stored, and if so, obtaining data pertaining to the determined action, executing the action, determining a result of the action, storing the data pertaining to the result in an execution data model. Then, until the environment or agent reach an end state, the following are repeated: determining whether the action determination model indicates the next action option, and if so, determining the action based on the action determination model, and determining whether the execution data model has been stored, and if so, obtaining the data pertaining to the determined action.

Patent Agency Ranking