Sign In to Follow Application
View All Documents & Correspondence

System And Method For Providing Computer Network Security

Abstract: This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security. In one embodiment, a method is provided for providing computer network security. The method comprises gathering threat information from one or more sources, deriving security intelligence based on the threat information, determining a security measure based on the security intelligence, and dynamically applying the security measure to a computer network using a set of virtual appliances and a set of virtual switches. Figure 3.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 October 2015
Publication Number
43/2015
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
ipo@knspartners.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-07-31
Renewal Date

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. RADHA KRISHNA SINGURU
Flat# 206, Daffodil, Bhanu Township, Hafeezpet, Miyapur, Hyderabad, Telengana- 500050, India

Specification

Claims:WE CLAIM:
1. A method for providing computer network security, the method comprising:
gathering, via a processor, threat information from one or more sources;
deriving, via the processor, security intelligence based on the threat information;
determining, via the processor, a security measure based on the security intelligence; and
dynamically applying, via the processor, the security measure to a computer network using a set of virtual appliances and a set of virtual switches.

2. The method of claim 1, wherein deriving the security intelligence comprises determining one or more potential security threats by applying at least one of a filter, an analytics, and a reputation based heuristic on the threat information.

3. The method of claim 2, wherein determining the security measure comprises determining a corresponding security measure for each of the one or more potential security threats.

4. The method of claim 1, further comprising triggering an alert based on the security intelligence.

5. The method of claim 1, wherein dynamically applying comprises mapping the security measure to the set of virtual appliances and the set of virtual switches.

6. The method of claim 5, wherein dynamically applying comprises dynamically deploying the set of virtual appliances based on the mapping.

7. The method of claim 5, wherein dynamically applying comprises dynamically programming the set of virtual switches using a plurality of packet filters to steer network traffic based on the mapping.
8. The method of claim 1, wherein each of the set of virtual appliances is a virtual machine for performing a pre-defined task and is implemented using network function virtualization.

9. The method of claim 1, wherein each of the set of virtual switches is programmed using software defined networking.

10. The method of claim 1, wherein each of the set of virtual appliances emulates at least one of a firewall, an intrusion prevention system (IPS), a deep packet inspection (DPI), and a network traffic shaper.

11. A system for providing computer network security, the system comprising:
at least one processor; and
a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising:
gathering threat information from one or more sources;
deriving security intelligence based on the threat information;
determining a security measure based on the security intelligence; and
dynamically applying the security measure to a computer network using a set of virtual appliances and a set of virtual switches.

12. The system of claim 11, wherein deriving the security intelligence comprises determining one or more potential security threats by applying at least one of a filter, an analytics, and a reputation based heuristic on the threat information.

13. The system of claim 12, wherein determining the security measure comprises determining a corresponding security measure for each of the one or more potential security threats.

14. The system of claim 11, wherein dynamically applying comprises mapping the security measure to the set of virtual appliances and the set of virtual switches.

15. The system of claim 14, wherein dynamically applying comprises:
dynamically deploying the set of virtual appliances based on the mapping; and
dynamically programming the set of virtual switches using a plurality of packet filters to steer network traffic based on the mapping.

16. The system of claim 11, wherein each of the set of virtual appliances is a virtual machine for performing a pre-defined task, is implemented using network function virtualization, and emulates at least one of a firewall, an intrusion prevention system (IPS), a deep packet inspection (DPI), and a network traffic shaper.

17. The system of claim 11, wherein each of the set of virtual switches is programmed using software defined networking.

18. A non-transitory computer-readable medium storing computer-executable instructions for:
gathering threat information from one or more sources;
deriving security intelligence based on the threat information;
determining a security measure based on the security intelligence; and
dynamically applying the security measure to a computer network using a set of virtual appliances and a set of virtual switches.

Dated this 5th day of October, 2015

Swetha SN
Of K&S Partners
Agent for the applicant
, Description:TECHNICAL FIELD
This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 5315-CHE-2015-IntimationOfGrant31-07-2023.pdf 2023-07-31
1 Form 9 [05-10-2015(online)].pdf 2015-10-05
2 5315-CHE-2015-PatentCertificate31-07-2023.pdf 2023-07-31
2 Form 5 [05-10-2015(online)].pdf 2015-10-05
3 Form 3 [05-10-2015(online)].pdf 2015-10-05
3 5315-CHE-2015-FORM 3 [18-05-2023(online)].pdf 2023-05-18
4 Form 18 [05-10-2015(online)].pdf 2015-10-05
4 5315-CHE-2015-Written submissions and relevant documents [18-05-2023(online)].pdf 2023-05-18
5 Drawing [05-10-2015(online)].pdf 2015-10-05
5 5315-CHE-2015-AMENDED DOCUMENTS [10-04-2023(online)].pdf 2023-04-10
6 Description(Complete) [05-10-2015(online)].pdf 2015-10-05
6 5315-CHE-2015-Correspondence to notify the Controller [10-04-2023(online)].pdf 2023-04-10
7 REQUEST FOR CERTIFIED COPY [07-10-2015(online)].pdf 2015-10-07
7 5315-CHE-2015-FORM 13 [10-04-2023(online)].pdf 2023-04-10
8 abstract 5315-CHE-2015.jpg 2015-10-14
8 5315-CHE-2015-POA [10-04-2023(online)].pdf 2023-04-10
9 5315-CHE-2015-US(14)-HearingNotice-(HearingDate-03-05-2023).pdf 2023-03-31
9 REQUEST FOR CERTIFIED COPY [02-03-2016(online)].pdf 2016-03-02
10 5315-CHE-2015-FER_SER_REPLY [08-08-2020(online)].pdf 2020-08-08
10 REQUEST FOR CERTIFIED COPY [23-03-2016(online)].pdf 2016-03-23
11 5315-CHE-2015-FORM 3 [08-08-2020(online)].pdf 2020-08-08
11 5315-CHE-2015-Power of Attorney-170316.pdf 2016-07-11
12 5315-CHE-2015-Form 1-170316.pdf 2016-07-11
12 5315-CHE-2015-PETITION UNDER RULE 137 [08-08-2020(online)].pdf 2020-08-08
13 5315-CHE-2015-Correspondence-F1-PA-170316.pdf 2016-07-11
13 5315-CHE-2015-FER.pdf 2020-02-10
14 5315-CHE-2015-Correspondence-F1-PA-170316.pdf 2016-07-11
14 5315-CHE-2015-FER.pdf 2020-02-10
15 5315-CHE-2015-Form 1-170316.pdf 2016-07-11
15 5315-CHE-2015-PETITION UNDER RULE 137 [08-08-2020(online)].pdf 2020-08-08
16 5315-CHE-2015-FORM 3 [08-08-2020(online)].pdf 2020-08-08
16 5315-CHE-2015-Power of Attorney-170316.pdf 2016-07-11
17 REQUEST FOR CERTIFIED COPY [23-03-2016(online)].pdf 2016-03-23
17 5315-CHE-2015-FER_SER_REPLY [08-08-2020(online)].pdf 2020-08-08
18 5315-CHE-2015-US(14)-HearingNotice-(HearingDate-03-05-2023).pdf 2023-03-31
18 REQUEST FOR CERTIFIED COPY [02-03-2016(online)].pdf 2016-03-02
19 5315-CHE-2015-POA [10-04-2023(online)].pdf 2023-04-10
19 abstract 5315-CHE-2015.jpg 2015-10-14
20 5315-CHE-2015-FORM 13 [10-04-2023(online)].pdf 2023-04-10
20 REQUEST FOR CERTIFIED COPY [07-10-2015(online)].pdf 2015-10-07
21 5315-CHE-2015-Correspondence to notify the Controller [10-04-2023(online)].pdf 2023-04-10
21 Description(Complete) [05-10-2015(online)].pdf 2015-10-05
22 5315-CHE-2015-AMENDED DOCUMENTS [10-04-2023(online)].pdf 2023-04-10
22 Drawing [05-10-2015(online)].pdf 2015-10-05
23 5315-CHE-2015-Written submissions and relevant documents [18-05-2023(online)].pdf 2023-05-18
23 Form 18 [05-10-2015(online)].pdf 2015-10-05
24 5315-CHE-2015-FORM 3 [18-05-2023(online)].pdf 2023-05-18
24 Form 3 [05-10-2015(online)].pdf 2015-10-05
25 Form 5 [05-10-2015(online)].pdf 2015-10-05
25 5315-CHE-2015-PatentCertificate31-07-2023.pdf 2023-07-31
26 Form 9 [05-10-2015(online)].pdf 2015-10-05
26 5315-CHE-2015-IntimationOfGrant31-07-2023.pdf 2023-07-31

Search Strategy

1 search_30-01-2020.pdf

ERegister / Renewals

3rd: 16 Oct 2023

From 05/10/2017 - To 05/10/2018

4th: 16 Oct 2023

From 05/10/2018 - To 05/10/2019

5th: 16 Oct 2023

From 05/10/2019 - To 05/10/2020

6th: 16 Oct 2023

From 05/10/2020 - To 05/10/2021

7th: 16 Oct 2023

From 05/10/2021 - To 05/10/2022

8th: 16 Oct 2023

From 05/10/2022 - To 05/10/2023

9th: 16 Oct 2023

From 05/10/2023 - To 05/10/2024

10th: 01 Oct 2024

From 05/10/2024 - To 05/10/2025

11th: 06 Oct 2025

From 05/10/2025 - To 05/10/2026