18070948. EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL simplified abstract (Juniper Networks, Inc.)

From WikiPatents
Jump to navigation Jump to search

EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL

Organization Name

Juniper Networks, Inc.

Inventor(s)

Chandrasekhar A of Bengaluru (IN)

Jayanthi R of Bangalore (IN)

EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL - A simplified explanation of the abstract

This abstract first appeared for US patent application 18070948 titled 'EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL

Simplified Explanation

The patent application abstract describes a system that identifies a security intent policy model associated with an initial time, generates delta snapshots indicating incremental changes to the model at subsequent times, deploys updated versions of the model to a device, and updates the low-level security intent policy model associated with the device based on the delta snapshots and previous deployment time.

  • Explanation of the patent:
 * The system identifies and tracks changes in a security intent policy model over time.
 * It deploys updated versions of the model to devices based on these changes.
 * It generates cumulative delta snapshots to update the low-level security intent policy model on the device.
 * It generates device-level security configuration information based on the updated model.

Potential Applications

The technology described in the patent application could be applied in various industries and sectors, including:

  • Cybersecurity companies for enhancing security policies on devices.
  • IoT (Internet of Things) manufacturers for ensuring secure device configurations.
  • IT departments in organizations for managing and updating security policies on company devices.

Problems Solved

The technology addresses several key issues in the field of security policy management, such as:

  • Ensuring that devices have the most up-to-date security configurations.
  • Streamlining the process of deploying and updating security policies on devices.
  • Providing a systematic approach to managing security intent policy models over time.

Benefits

The technology offers several benefits, including:

  • Improved security posture for devices through regular updates to security policies.
  • Enhanced efficiency in deploying and managing security configurations on devices.
  • Better compliance with security standards and regulations.

Potential Commercial Applications

A potential commercial application of this technology could be in the field of:

  • "Enhancing Device Security with Dynamic Policy Management"

Possible Prior Art

One possible prior art related to this technology is the concept of dynamic policy management systems that track changes in security policies over time and update device configurations accordingly.

Unanswered Questions

How does the system handle conflicts between different versions of the security intent policy model during deployment?

The patent abstract does not provide details on how the system resolves conflicts that may arise when deploying updated versions of the security intent policy model to devices.

What mechanisms are in place to ensure the accuracy and integrity of the cumulative delta snapshots generated by the system?

The abstract does not mention any specific mechanisms or processes that the system uses to verify the accuracy and integrity of the cumulative delta snapshots before updating the low-level security intent policy model on the device.


Original Abstract Submitted

A system may identify a security intent policy model associated with an initial time. The system may generate one or more delta snapshots that respectively indicate one or more incremental changes to the security intent policy model at times subsequent to the initial time. The system may determine that the system is to deploy an updated version of the security intent policy model to a device and may thereby determine a previous deployment time at which the system deployed a previous version of the security intent policy model to the device. The system may generate, based on the one or more delta snapshots and the previous deployment time, a cumulative delta snapshot, and may thereby update a low-level security intent policy model associated with the device. The system may generate, based on the low-level security intent policy model, device-level security configuration information for the device.