METHOD AND SYSTEM FOR DETECTING AND ANALYZING ANOMALIES

    公开(公告)号:US20210182873A1

    公开(公告)日:2021-06-17

    申请号:US17031198

    申请日:2020-09-24

    Abstract: Method and system for automating analyzing anomalies of an item for which no golden reference item is available, by using reference information, wherein the golden reference item is a known non-abnormal instance of an analyzed assembly, includes loading from a data storage, a memory, or via a communication, or user entry, item information of an analyzed item to be analyzed to be either expected or abnormal; loading reference information about the analyzed item; preprocessing both of the item information and the reference information to facilitate analysis; analyzing the item information and the reference information to determine a result that indicates whether elements of the item are confirmed by the reference information to be expected or abnormal; generating an output data with the result; and storing the output data pertaining to the result in a memory.

    METHOD AND SYSTEM FOR POLICY MANAGEMENT, TESTING, SIMULATION, DECENTRALIZATION AND ANALYSIS

    公开(公告)号:US20180069899A1

    公开(公告)日:2018-03-08

    申请号:US15645639

    申请日:2017-07-10

    Abstract: A policy management method and system, which determines at least one functional model for the IT system; loads at least one pre-configured policy selection template that indicates at least one policy aspect applicable to the at least one IT system; generates at least one policy user interface that gathers a policy input; receives a policy input loaded from a data storage or a memory or entered by a user via a user interface; loads at least one pre-configured policy generation template that indicates at least one technical rule or configuration aspect of the policy that the policy template pertains to; generates at least one machine-enforceable rule/configuration compliant with the received input policy; transmits the at least one machine-enforceable rule and/or configuration to at least one policy implementation entity; and executes the transmitted at least one machine-enforceable rule/configuration.

    AUTOMATED AND ADAPTIVE MODEL-DRIVEN SECURITY SYSTEM AND METHOD FOR OPERATING THE SAME

    公开(公告)号:US20240022607A1

    公开(公告)日:2024-01-18

    申请号:US18093486

    申请日:2023-01-05

    Abstract: A system and method for managing implementation of policies in an information technologies system receives at least one policy function, at least one refinement template and at least one available policy function from the at least one memory, receives a policy input indicating a high-level policy for the IT system where the policy input is compliant with the at least one policy function and is received in a format that is not machine-enforceable at an enforcement entity of the IT system, based on the received policy input, automatically or semi-automatically generates a machine-enforceable rule and/or configuration by filling the at least one refinement template, where the machine-enforceable rule and/or configuration includes the at least one available policy function and being compliant with the received policy input, and distributes the machine-enforceable rule and/or configuration to the at least one memory of the IT system or another at least one memory to thereby enable implementation of the policies.

    METHOD AND SYSTEM FOR POLICY MANAGEMENT, TESTING, SIMULATION, DECENTRALIZATION AND ANALYSIS

    公开(公告)号:US20220353300A1

    公开(公告)日:2022-11-03

    申请号:US17864146

    申请日:2022-07-13

    Abstract: A method of managing supply chain risks having a supply chain risk analysis implementation, includes loading from a data storage or a memory, supply chain data for a supply chain which indicates information about the supply chain; mapping the supply chain data to a consistent input model; automatically analyzing, by an analytics module implemented on a processor, the input model to detect supply chain anomalies indicating the supply chain risks; producing an analysis results output of the analyzed input model; and outputting the analysis results output of the detected supply chain anomalies to the memory, the data storage, a display, or a message. A supply chain risk analysis system includes the processor, the data storage or the memory that stores the supply chain data for the supply chain which indicates information about the supply chain. The processor is configured to perform the processes.

    METHOD AND SYSTEM FOR POLICY MANAGEMENT, TESTING, SIMULATION, DECENTRALIZATION AND ANALYSIS

    公开(公告)号:US20200259868A1

    公开(公告)日:2020-08-13

    申请号:US16845893

    申请日:2020-04-10

    Abstract: A method of managing supply chain risks having a supply chain risk analysis implementation, includes loading from a data storage or a memory, supply chain data for a supply chain which indicates information about the supply chain; mapping the supply chain data to a consistent input model; automatically analyzing, by an analytics module implemented on a processor, the input model to detect supply chain anomalies indicating the supply chain risks; producing an analysis results output of the analyzed input model; and outputting the analysis results output of the detected supply chain anomalies to the memory, the data storage, a display, or a message. A supply chain risk analysis system includes the processor, the data storage or the memory that stores the supply chain data for the supply chain which indicates information about the supply chain. The processor is configured to perform the processes.

    METHOD AND SYSTEM FOR MANAGING SECURITY POLICIES

    公开(公告)号:US20170289198A1

    公开(公告)日:2017-10-05

    申请号:US15629170

    申请日:2017-06-21

    CPC classification number: H04L63/20 H04L63/0263 H04L63/10 H04L67/10

    Abstract: A policy management system includes a policy management device that is configured to manage a policy input and/or a template and/or a functional model, a policy enforced device that is directly or indirectly connected to the policy management device via a network and that is configured such that at least a part of the functional model managed by the policy management device reflects the functional features/behaviors of the policy enforced device, a policy enforcement device that is configured to execute policy enforcement on the policy enforced device, and a policy decision device that is configured to receive machine-enforceable rule and/or configuration from the policy management device. The policy enforcement device, when a policy relevant event occurs, instructs the policy decision device to determine the result of the condition of the transmitted machine-enforceable rule and/or configuration for implementing the policy input for the policy enforced device, thereby modifying an operation of the policy enforced device or the policy enforcement device to execute the action.

    METHOD AND SYSTEM FOR MANAGING SECURITY POLICIES
    8.
    发明申请
    METHOD AND SYSTEM FOR MANAGING SECURITY POLICIES 审中-公开
    管理安全政策的方法和系统

    公开(公告)号:US20090077621A1

    公开(公告)日:2009-03-19

    申请号:US12126711

    申请日:2008-05-23

    CPC classification number: H04L63/20 H04L63/0263 H04L63/10 H04L67/10

    Abstract: A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input indicating a high-level security policy for the IT system, the received high-level security policy relating to non-functional system attributes for the IT system and received in a format that is not machine-enforceable at an enforcement entity of the IT system. A functional model for the IT system is determined, where the functional model indicates functional system attributes of the IT system. At least one pre-configured rule template is loaded, and at least one machine-enforceable rule is generated in a manner compliant with the received high-level security policy by iteratively filling the at least one pre-configured rule template with functional system attributes indicated by the functional model. After the generating step, the at least one machine-enforceable rule can be distributed (e.g., to an enforcement entity, an Intrusion Detection System (IDS), etc.). In another example, the receiving, determining, loading, generating and distributing steps can be performed at a policy node within an IT system.

    Abstract translation: 提供了一种在信息技术(IT)系统中管理安全策略的系统和方法。 在一个示例中,该方法包括接收指示IT系统的高级安全策略的输入,接收到的与IT系统的非功能系统属性相关的高级安全策略,并以不是机器级的格式接收, 可在信息系统的执法实体上执行。 确定IT系统的功能模型,其中功能模型指示IT系统的功能系统属性。 加载至少一个预先配置的规则模板,并且以符合所接收的高级安全策略的方式生成至少一个机器可执行规则,通过迭代地填充至少一个预先配置的规则模板,所述规则模板具有指示的功能系统属性 通过功能模型。 在生成步骤之后,可以分发至少一个可执行机器的规则(例如,到执行实体,入侵检测系统(IDS)等)。 在另一示例中,可以在IT系统内的策略节点执行接收,确定,加载,生成和分发步骤。

    METHOD AND SYSTEM FOR DETERMINING POLICIES, RULES, AND AGENT CHARACTERISTICS, FOR AUTOMATING AGENTS, AND PROTECTION

    公开(公告)号:US20190258953A1

    公开(公告)日:2019-08-22

    申请号:US16255811

    申请日:2019-01-23

    Abstract: A method of automating an agent for environment includes loading an action determination model that indicates an action option, determining whether the action determination model indicates a next action option, and if so, determining an action based on the action determination model, determining whether an execution data model has been stored, and if so, obtaining data pertaining to the determined action, executing the action, determining a result of the action, storing the data pertaining to the result in an execution data model. Then, until the environment or agent reach an end state, the following are repeated: determining whether the action determination model indicates the next action option, and if so, determining the action based on the action determination model, and determining whether the execution data model has been stored, and if so, obtaining the data pertaining to the determined action.

    AUTOMATED AND ADAPTIVE MODEL-DRIVEN SECURITY SYSTEM AND METHOD FOR OPERATING THE SAME

    公开(公告)号:US20190014153A1

    公开(公告)日:2019-01-10

    申请号:US16112045

    申请日:2018-08-24

    Abstract: A system and method for managing implementation of policies in an information technologies system receives at least one policy function, at least one refinement template and at least one available policy function from the at least one memory, receives a policy input indicating a high-level policy for the IT system where the policy input is compliant with the at least one policy function and is received in a format that is not machine-enforceable at an enforcement entity of the IT system, based on the received policy input, automatically or semi-automatically generates a machine-enforceable rule and/or configuration by filling the at least one refinement template, where the machine-enforceable rule and/or configuration includes the at least one available policy function and being compliant with the received policy input, and distributes the machine-enforceable rule and/or configuration to the at least one memory of the IT system or another at least one memory to thereby enable implementation of the policies.

Patent Agency Ranking