Claims
- 1. A universal, customizable computer security system comprising:
a set of security input signals each relating to a possible security event; and a rules engine with a universal software interface responsive to the security input signals, the rules engine configurable to perform one or more security actions in response to each security input signal, the rules engine further including a user interface program to allow a user to select one or more customized security actions for a combination of one or more chosen security input signals, and a universal software output interface responsive to the selected security actions.
- 2. The security system of claim 1 in which the security input signals correspond to motion, warning of unauthorized motion, a theft event, a motion password event, a proximity sensor signal, a zone sensor signal, a location sensor signal, an environmental security threat, detection of virus, detection of a firewall problem, connection or disconnection from a network, connection or disconnection of an A/C adapter, connection or disconnection of a docking station, connection or disconnection of a battery, connection or disconnection of a hard drive, authentication inputs including password, motion password, biometric, token, badge, and smart card, failed log-in attempt, unexpected or prohibited keyboard entries, unexpected or prohibited internet connections, user log on, user log off, unexpected user log in, user log in at unexpected times, unexpected user or administrator behavior, other hacker detection methods, unexpected file move or copy behavior, operating system suspend, operating system hibernate, or screen saver.
- 3. The security system of claim 1 in which the security actions correspond to notification of individual, group, entire network, or authority, notification via internet, modem, wired LAN, or wireless LAN, pop up warning to user, forced log off, prohibit log on, change arming state such as disarm to arm, shut down of computer and/or system, lock keyboard or mouse, turn off monitor, encrypt files, erase files, move files, destroy content of disk, sound an alarm, send location information, enable or disable boot block, change boot sequence, enable or disable hard drive lock, enable or disable operating system lock, connect or disconnect from network, prohibit access to files, applications, or servers, reset passwords, change authentication requirements, change access privileges for certain users, data, applications, or servers, deny access to encryption keys, enable or disable internet connection, or enable or disable e-mail.
- 4. The security system of claim 1 in which the rules engine is configurable to prioritize the security actions performed based on conditional relations selected.
- 5. The security system of claim 4 in which the user interface program configures the security actions based on the conditional relations selected.
- 6. The security system of claim 1 in which the user interface program is a graphical user interface.
- 7. The security system of claim 1 in which the set of available security input signals are generated by a plurality of security systems.
- 8. A universal, customizable computer security system comprising:
a set of security input signals each relating to a possible security event; and a rules engine responsive to the security input signals, the rules engine configurable to perform one or more security actions in response to each security input signal, the rules engine further including a user interface program to allow a user to select one or more customized security actions for a combination of one or more chosen security input signals.
- 9. The security system of claim 8 further including a universal software interface responsive to the set of security input signals.
- 10. The security system of claim 8 further including a universal software output software interface responsive to the security actions.
- 11. The security system of claim 8 in which the security input signals correspond to motion, warning of unauthorized motion, a theft event, a motion password event, a proximity sensor signal, a zone sensor signal, a location sensor signal, an environmental security threat, detection of virus, detection of a firewall problem, connection or disconnection from a network, connection or disconnection of an A/C adapter, connection or disconnection of a docking station, connection or disconnection of a battery, connection or disconnection of a hard drive, authentication inputs including password, motion password, biometric, token, badge, and smart card, failed log-in attempt, unexpected or prohibited keyboard entries, unexpected or prohibited internet connections, user log on, user log off, unexpected user log in, user log in at unexpected times, unexpected user or administrator behavior, other hacker detection methods, unexpected file move or copy behavior, operating system suspend, operating system hibernate, or screen saver.
- 12. The computer security system of claim 8 in which the security actions correspond to notification of individual, group, entire network, or authority, notification via internet, modem, wired LAN, or wireless LAN, pop up warning to user, forced log off, prohibit log on, change arming state such as disarm to arm, shut down of computer and/or system, lock keyboard or mouse, turn off monitor, encrypt files, erase files, move files, destroy content of disk; sound an alarm, send location information, enable or disable boot block, change boot sequence, enable or disable hard drive lock, enable or disable operating system lock, connect or disconnect from network, prohibit access to files, applications, or servers, reset passwords, change authentication requirements, change access privileges for certain users, data, applications, or servers, deny access to encryption keys, enable or disable internet connection, or enable or disable e-mail.
- 13. The security system of claim 8 in which the rules engine is configurable to prioritize the security actions performed based on conditional relations selected.
- 14. The security system of claim 13 in which the user interface program configures the security actions based on the conditional relations selected.
- 15. The security system of claim 8 in which the user interface program is a graphical user interface.
- 16. The security system of claim 8 in which the set of available security input signals are generated by a plurality of security systems.
- 17. A universal, customizable computer security system comprising:
a set of security input signals each relating to a possible security event; and a rules engine responsive to the security input signals, the rules engine configurable to perform one or more security acts in response to each security input signal, the rules engine further configurable to allow a user to select one or more security actions for a combination of one or more chosen security input signals.
- 18. The security system of claim 17 further including a universal software interface responsive to the set of security input signals.
- 19. The security system of claim 17 further including a universal software output interface responsive to the security actions.
- 20. The security system of claim 17 in which the rules engine further includes a graphical user interface program to allow a user to customize one or more security actions to be performed in response to one or more selected security input signals.
- 21. The security system of claim 17 in which the security input signals correspond to motion, warning of unauthorized motion, a theft event, a motion password event, a proximity sensor signal, a zone sensor signal, a location sensor signal, an environmental security threat, detection of virus, detection of a firewall problem, connection or disconnection from a network, connection or disconnection of an A/C adapter, connection or disconnection of a docking station, connection or disconnection of a battery, connection or disconnection of a hard drive, authentication inputs including password, motion password, biometric, token, badge, and smart card, failed log-in attempt, unexpected or prohibited keyboard entries, unexpected or prohibited internet connections, user log on, user log off, unexpected user log in, user log in at unexpected times, unexpected user or administrator behavior, other hacker detection methods, unexpected file move or copy behavior, operating system suspend, operating system hibernate, or screen saver.
- 22. The computer security system of claim 17 in which the security actions correspond to notification of individual, group, entire network, or authority, notification via internet, modem, wired LAN, or wireless LAN, pop up warning to user, forced log off, prohibit log on, change arming state such as disarm to arm, shut down of computer and/or system, lock keyboard or mouse, turn off monitor, encrypt files, erase files, move files, destroy content of disk, sound an alarm, send location information, enable or disable boot block, change boot sequence, enable or disable hard drive lock, enable or disable operating system lock, connect or disconnect from network, prohibit access to files, applications, or servers, reset passwords, change authentication requirements, change access privileges for certain users, data, applications, or servers, deny access to encryption keys, enable or disable internet connection, or enable or disable e-mail.
- 23. The security system of claim 17 in which the rules engine is configurable to prioritize the security actions performed based on conditional relations selected.
- 24. The security system of claim 23 in which the user interface program configures the security actions based on the conditional relations selected.
- 25. A universal, customizable security system comprising:
a rules engine with a universal software interface responsive to a set of security input signals each relating to a possible security event, the rules engine configurable to perform one or more security actions in response to each security input signal, the rules engine further including a user interface program to allow a user to select one or more customized security actions for a combination of one or more chosen security input signals, and a universal output interface responsive to the security actions.
- 26. A universal, customizable security system comprising:
a rules engine responsive to a set of security input signals each relating to a possible security event, the rules engine configurable to perform one or more security actions in response to each security input signal, the rules engine further including a user interface program to allow a user to select one or more customized security actions for a combination of one or more chosen security input signals, and a universal output interface responsive to the security actions.
RELATED APPLICATIONS
[0001] This application claims priority of U.S. Utility application Ser. No. 09/572,801 filed May 17, 2000; 09/773,165 filed Jan. 31, 2001; and Provisional Application No. 60/284,536 filed Apr. 18, 2001. All of these applications are incorporated by reference herein.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60284536 |
Apr 2001 |
US |