Generation of application allowed lists for machines
A technology of machines and application sets, used in special data processing applications, instruments, computer security devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] A method and system are provided for automatically generating an application's permission list for a machine. As used herein, the term "machine" refers to any computing system that can be considered to execute an application, such as a server, virtual machine, user computer, tablet computer, smart phone, embedded device, special purpose computer, and the like. In some embodiments, an permission list generation ("ALG") system identifies a collection of applications executed by machines in a collection of machines (eg, an organization's machines), and identifies clusters of machines that will share the same permission list. For example, machines can be clustered based on their functionality (eg, database servers in the same cluster), machines can be clustered based on manual designation by administrators, machines can be automatically clustered based on similarity of the set of applications the machines have executed clustering, etc. After identifying the clusters, the A...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


