Security compliance framework usage

    公开(公告)号:US10542047B2

    公开(公告)日:2020-01-21

    申请号:US16151901

    申请日:2018-10-04

    IPC分类号: H04L9/32 H04L29/06

    摘要: A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security compliance frame work, access to an authoritative source component of the compliance framework, and access to a data store component of the compliance framework. A functionality status of the security compliance framework and a request associated with contents of the data store are presented to a user via a dashboard interface. In response, the request is triggered and associated results are generated.

    Simulated SSO functionality by means of multiple authentication procedures and out-of-band communications

    公开(公告)号:US10333927B2

    公开(公告)日:2019-06-25

    申请号:US16011769

    申请日:2018-06-19

    IPC分类号: H04L29/06

    摘要: A system and method for using a single-use password to add SSO functionality to a service of a Service Provider belonging to an F-SSO federation that does not support F-SSO functionality for the service. In response to receiving notification from an Identity Provider that a user has requested access to the service, the Service Provider uses information provided by the Identity Provider to identify and authenticate the user, and then uses standard API calls to create and send a temporary password to the user. This password may be created as a function of the user's physical location or IP address and may be communicated out-of-band. Upon determining that the user has correctly returned the temporary password to the Service Provider, the Service Provider generates and sends the user a strong single-use password through a secure in-band communication, through which the user may access the service.

    Security compliance framework usage

    公开(公告)号:US10165010B2

    公开(公告)日:2018-12-25

    申请号:US15806954

    申请日:2017-11-08

    IPC分类号: H04L29/06 H04L9/32

    摘要: A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security compliance frame work, access to an authoritative source component of the compliance framework, and access to a data store component of the compliance framework. A functionality status of the security compliance framework and a request associated with contents of the data store are presented to a user via a dashboard interface. In response, the request is triggered and associated results are generated.

    Security compliance framework deployment

    公开(公告)号:US09843605B1

    公开(公告)日:2017-12-12

    申请号:US15609196

    申请日:2017-05-31

    CPC分类号: H04L63/20

    摘要: A method and system for improving deployment of a security compliance framework is provided. The method includes deploying a data store that includes an authoritative source of information comprising configuration and operational management requirements associated with IT devices. A component comprising an interface for an authoritative source configured to provide authentication and authorization for access to servers of the IT devices is deployed and configured to enable authentication and privilege management for access to deployed and configured authoritative source components. An API interface and compliance framework management components are deployed and configured and message transfer agent API endpoint components of the compliance framework are identified. In response, operation of the compliance framework is enabled with respect to the data store, the authoritative source components, the API interface, the compliance framework management components, and the API endpoint components.

    Managing software deployment
    8.
    发明授权
    Managing software deployment 有权
    管理软件部署

    公开(公告)号:US09411954B2

    公开(公告)日:2016-08-09

    申请号:US14988779

    申请日:2016-01-06

    IPC分类号: H04L29/06 G06F21/54 G06F21/57

    摘要: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.

    摘要翻译: 该方法包括识别安装的软件的实例。 该方法还包括确定与安装的软件的实例相对应的指纹。 该方法还包括确定与安装的软件的实例相关联的安全风险。 该方法还包括基于指纹,安全风险和计算设备的指定目的来识别软件实例的软件管理策略。 在一个实施例中,该方法还包括响应于识别软件管理策略,由一个或多个计算机处理器对安装在计算设备上的软件实例执行软件管理策略。

    Method and system for creating a protected object namespace for a WSDL resource description
    9.
    发明授权
    Method and system for creating a protected object namespace for a WSDL resource description 有权
    创建WSDL资源描述的受保护对象命名空间的方法和系统

    公开(公告)号:US08844053B2

    公开(公告)日:2014-09-23

    申请号:US13913867

    申请日:2013-06-10

    IPC分类号: G06F21/62

    摘要: A method and system is presented to parse a WSDL description and build a hierarchical protected object namespace for authorization of access to the resource, wherein the protected object namespace is based on the abstract part of a WSDL but can be used to assist in authorization decisions for multiple different concrete bindings of this WSDL, wherein the concrete binding/request is based on the WS-Addressing endpoint reference.

    摘要翻译: 提出了一种方法和系统来解析WSDL描述并构建层次化受保护对象命名空间,以授权对资源进行访问,其中受保护对象命名空间基于WSDL的抽象部分,但可用于协助授权决策 该WSDL的多个不同的具体绑定,其中具体的绑定/请求基于WS-Addressing端点引用。

    Correlating a task with a command to perform a change ticket in an it system

    公开(公告)号:US10325095B2

    公开(公告)日:2019-06-18

    申请号:US16021063

    申请日:2018-06-28

    摘要: An approach is provided for controlling a task to perform a change ticket. The task is correlated with user(s) authorized to initiate execution of command(s) to perform the task and with an authorized location. A requestor is determined to be in the authorized location by receiving verification from physical access control system(s). The requestor is determined to be logged into a first computer system at the authorized location and to have utilized the first computer system to request execution of one of the command(s). The requestor is determined to be remotely logged into a second computer system via the first computer system. The requestor is determined to be one of the authorized user(s) correlated with the task. Based in part on determining the requestor is one of the authorized user(s) subsequent to determining the requestor is remotely logged into the second computer system, the requested command is executed.