Secure and differentiated delivery of network security information
The present invention is directed to a facility for distributing network security information. The facility receives network security information and recipient selection information specifying a characteristic of perspective recipients to be used in selecting recipients for the security information. The facility then compares the received recipient selection information to each of a plurality of perspective recipient profiles. Each perspective recipient profile corresponds to one or more perspective recipients and indicates one or more characteristics of the perspective recipients relating to the receipt of network security information. Based upon this comparison, the facility selects at least a portion of the plurality of perspective recipients as recipients of the network security information, and addresses the network security information to each of the selected recipients.
The present invention is directed to the field of computer networking, and more particularly, to the fields of network security and information delivery.
BACKGROUND OF THE INVENTIONAs computer systems become more ubiquitous, it becomes increasingly common for computer systems to be connected together in computer networks, such as the Internet. Such increased connectivity between computer systems provides significant benefits by enabling the exchange of useful information between users of connected computer systems.
Unfortunately, increased connectivity between computer systems also creates significant hazards. Malicious or careless users can often negatively affect target computer systems to which their computer systems are connected by, for example: misappropriating, deleting, or modifying important and/or valuable data; misappropriating valuable services; or temporarily or permanently impairing the operation of the computer system. While the hardware and software comprising a computer system is generally designed to prevent these sorts of “attacks,” it is nonetheless often possible for outsiders to discover and exploit vulnerabilities in particular hardware, software, or both.
In order to secure their computer systems against such hazards, users and system administrators often seek one-on-one assistance from network security experts. Unfortunately, the scarcity of such experts and the significant costs of retaining them make them inaccessible to many users and system administrators. This is exacerbated by the ongoing discovery of new target computer system vulnerabilities and the development of increasingly sophisticated forms of attacks.
In view of the need by many users and system administrators for prompt and ongoing assistance in securing their computer systems, an automated system for securely distributing security-related information from network security experts to a substantial number of recipients automatically selected from a list of subscribers based upon their security characteristics would have significant utility.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention provides a software facility for the secure and differentiated delivery of network security information (“the facility”) to support a network security information service. In a preferred embodiment, the facility selects addressees for a particular instance of network security information (a network security information “distribution”) based on security characteristics of subscribers to which the distribution relates, securely and reliably delivers the distribution to each selected addressee, and enables a user at the subscriber to promptly and conveniently review and act on the distribution.
Distributions are preferably prepared by a team of network security experts. A distribution may contain information, such as textual information, for review by a network security administrator. For example, the distribution could contain information describing a newly-discovered form of network attack, and explain how network security equipment or software already being used by the subscriber protects the subscriber from such attacks. A distribution may also contain software. Such software can include both software designed to execute once to ensure that the subscriber's network is protected from a certain type of attack, or new or updated network security software that executes continuously to ensure the security of the subscriber's network. A distribution may also contain data used for network security purposes. For example, where a subscriber uses a particular network security device that operates based upon a set of security rules, a distribution to the subscriber may contain additional rules to be added to the set used by the network security device.
Because some distributions are only useful to subscribers having certain security characteristics, such as those having a particular network security device, the facility preferably selects addressees for each distribution from the subscribers registered with the network security information service. In this regard, the facility preferably uses a subscriber information database that stores information about each subscriber registered with the network security information service. For example, the subscriber database may contain, for each subscriber, an indication of the types of network security equipment, network security software, and applications used by the subscriber. When the facility receives a new distribution, it preferably receives with it an addressing query designed to select addressees for the distribution. The facility performs the addressing query against the subscriber information database to select addressees of the distribution. By selecting addressees for a distribution (or “addressing” the distribution), the facility maximizes the extent to which each registered subscriber receives the distributions that relate to it, and minimizes the extent to which each registered subscriber receives distributions that do not relate to it. Also, by directly controlling the set of addressees, the facility ensures that distributions are not delivered to parties other than subscribers.
After the distribution is addressed to addressees among the registered subscribers, the facility attempts to deliver the distribution to each of the addressees to which the distribution is addressed. The facility may preferably deliver distributions either by secure email sent from the network security information service to the addressees, or using a client polling procedure in which a client program at each subscriber periodically polls a server maintained by the network security information service for new distributions addressed to its subscriber. In order to implement the client polling procedure, in certain embodiments, the facility utilizes BackWeb Foundation software, available from BackWeb Technologies of San Jose, Calif. For emailed distributions, a verified email address for the subscriber is preferably used. For distributions delivered by the client polling procedure, polling requests from the client preferably include a secret unique identifier issued to the subscriber, encrypted using public key encryption. These measures help ensure that the distribution is delivered only to the subscribers to which it is addressed.
During delivery, each distribution is preferably encrypted to prevent anyone intercepting the distribution from discerning its content. Each distribution is preferably also signed in way that reliably indicates both (1) the source of the distribution, and (2) the contents of the distribution when the distribution left its source. This signature is preferably used by a component of the facility executing at each subscriber to ascertain whether each distribution (1) is from the network security information service or another trusted source and (2) has not been altered since it left that source. The subscriber component of the facility preferably only allows the subscriber to make use of distributions meeting both of these conditions.
The client program of the facility preferably also alerts a user at the subscriber as soon as a distribution is received, displays information about the distribution, and facilitates the application of the distribution to enhance the level of security of the subscriber's network.
While the facility is preferably implemented on computer systems configured as described above in conjunction with
Returning to
Returning to
While the addressed distribution database is shown in this form in order to facilitate an appreciation for its contents, those skilled in the art will recognize that the addressed distribution database may be organized in other, more efficient ways. For example, rather than directly containing the distribution contents, the addressed distribution database may contain references to the distribution contents stored in another location. Further, the addressed distribution database may be indexed by subscriber identifier to facilitate reference into the addressed distribution database for a particular subscriber. Additionally, the addressed distribution database could be organized in accordance with each subscriber identifier rather than in accordance with each distribution.
Returning to
In steps 1706-1718, the facility loops through each received response. If no response is received, the facility continues in step 1719. In step 1707, the facility decrypts the response using the session key generated in step 1702. In step 1708, the facility uses the public key of the network security information service to decrypt the one-way function result contained in the response. In step 1709, the facility recomputes the one-way function on the distribution contents contained in the response. In step 1710, if the one-way function result generated in step 1709 matches the one-way function result contained in the response, then the facility continues in step 1711 to process the distribution, else the facility continues in step 1718. In step 1711, the facility alerts the user to the arrival of the distribution. In step 1711, the facility may display a visual alert, output an audible alert, or both.
Returning to
Returning to
While this invention has been shown and described with reference to preferred embodiments, it will be understood by those skilled in the art that various changes or modifications in form and detail may be made without departing from the scope of the invention. For example, the facility may be implemented across arrangements of computer systems different than those discussed, and may use other types of encryption and certification than those discussed. Also, the facility could be used to distribute other types of related information.
Claims
1. A method in a computer system for distributing network security information, comprising:
- attaching to the network security information a signature that both reliably identifies the origin of the network security information and characterizes the contents of the network security information, the attached signature enabling recipients of the network security information to identify the origin of the network security information and determine whether the network security information has been altered since the signature was attached;
- receiving a query identifying characteristics of potential network security information recipients that should receive the network security information;
- from among the multiplicity of potential recipients, selecting a plurality of recipients for the network security information by performing the query against a recipient profiling data store containing information relating to characteristics of each of a multiplicity of potential network security information recipients; and
- transmitting the signed network security information to each of the plurality of selected recipients.
2. The method of claim 1 wherein the network security information is transmitted to a recipient computer system, further comprising, in the recipient computer system:
- receiving the signed network security information;
- using the signature to identify the origin of the network security information;
- using the signature to determine whether the network security information has been altered since the signature was attached; and
- only if the origin of the network security information is an acceptable origin and it is determined that the network security information has not been altered since the signature was attached, utilizing the network security information.
3. The method of claim 2 wherein the network security information is utilized by displaying the network security information.
4. The method of claim 2 wherein the network security information contains a computer program, and wherein the network security information is utilized by executing the computer program contained by the network security information.
5. The method of claim 2 wherein the network security information contains data, and wherein the network security information is utilized by storing the data contained by the network security information in a local data structure.
6. The method of claim 2, further comprising, when the network security information is received, displaying an indication that the network security information has been received.
7. A computer-readable medium whose contents cause a computer system to distribute network security information by:
- attaching to the network security information a signature that both reliably identifies the origin of the network security information and characterizes the contents of the network security information, the attached signature enabling recipients of the network security information to identify the origin of the network security information and determine whether the network security information has been altered since the signature was attached;
- receiving a query identifying characteristics of potential network security information recipients that should receive the network security information;
- from among the multiplicity of potential recipients, selecting a plurality of recipients for the network security information by performing the query against a recipient profiling data store containing information relating to characteristics of each of a multiplicity of potential network security information recipients; and p1 transmitting the signed network security information to each of the plurality of selected recipients.
8. A method in one or more computer systems for distributing network security information, comprising:
- receiving network security information;
- receiving recipient selection information specifying a characteristic of prospective recipients to be used in selecting recipients for the received network security information;
- comparing the received recipient selection information to each of a plurality of prospective recipient profiles, each prospective recipient profile corresponding to one or more prospective recipients and indicating one or more characteristics of the prospective recipients relating to the receipt of network security information;
- based upon the comparison, selecting at least a portion of the plurality of prospective recipients as recipients of the network security information; and
- addressing the received network security information to each of the selected recipients.
9. The method of claim 8, further comprising delivering the network security information to one of the selected recipients to which it is addressed.
10. The method of claim 9 wherein the delivery is performed directly in response to addressing the network security information to the selected recipient.
11. The method of claim 9 wherein the delivery is performed directly in response to an inquiry from the selected recipient occurring at a time after the network security information is addressed to the selected recipient.
12. The method of claim 11 wherein the inquiry from the selected recipient includes information reliably identifying the selected recipient, and wherein the delivery is only performed if the selected recipient is determined to be among the selected recipients.
13. The method of claim 11 wherein the inquiry is one of a plurality of inquiries issued by the selected recipient at regular intervals.
14. The method of claim 9, further comprising, before the delivery of the network security information, attaching to the network security information a reliable indication of the origin of the network security information.
15. The method of claim 9, further comprising, before the delivery of the network security information, encrypting the network security information.
16. The method of claim 8 wherein the network security information and recipient selection information are received from one or more specialists engaged in analyzing network security threats.
17. The method of claim 8 wherein the network security information is addressed for delivery to a management computer system associated with each selected recipient.
18. The method of claim 8 wherein the network security information is addressed for delivery to a network security device associated with each selected recipient.
19. The method of claim 8 wherein the network security information contains a reference to related network security information on a secure web server.
20. The method of claim 8 wherein the network security information is a notification of a new network security issue.
21. The method of claim 8 wherein the network security information is usable by at least one of the selected recipients to modify the behavior of a network security device associated with the selected recipient.
22. The method of claim 21 wherein the network security information specifies the modification of software executing on the network security device associated with each selected recipient to provide network security services.
23. The method of claim 21 wherein the network security information specifies the modification of data used by the network security device associated with each selected recipient to provide network security services.
24. The method of claim 8 wherein the network security information is usable by at least one of the selected recipients to modify the behavior of a network security device associated with the selected recipient to better protect the selected recipients against a newly identified network security threat.
25-27. (canceled)
28. The method of claim 8, further comprising, in a recipient computer system:
- receiving the network security information; and
- directly in response to receiving the network security information, notifying a user of the recipient computer system of the receipt of the network security information.
29. The method of claim 28 wherein the user is notified by displaying a visual indication that network security information has been received.
30. The method of claim 28 wherein the user is notified by outputting an audible indication that network security information has been received.
31. A computer-readable medium whose contents cause one or more computer systems to distribute network security information by:
- receiving network security information;
- receiving recipient selection information specifying a characteristic of prospective recipients to be used in selecting recipients for the received network security information;
- comparing the received recipient selection information to each of a plurality of prospective recipient profiles, each prospective recipient profile corresponding to one or more prospective recipients and indicating one or more characteristics of the prospective recipients relating to the receipt of network security information;
- based upon the comparison, selecting at least a portion of the plurality of prospective recipients as recipients of the network security information; and
- addressing the received network security information to each of the selected recipients.
32. The computer-readable medium of claim 31 wherein the contents of the computer-readable medium further cause the computer systems to deliver the network security information to one of the selected recipients to which it is addressed.
33. The computer-readable medium of claim 32 wherein the delivery is performed directly in response to addressing the network security information to the selected recipient.
34. The computer-readable medium of claim 32 wherein the delivery is performed directly in response to an inquiry from the selected recipient occurring at a time after the network security information is addressed to the selected recipient.
35. The computer-readable medium of claim 34 wherein the inquiry from the selected recipient includes information reliably identifying the selected recipient, and wherein the delivery is only performed if the selected recipient is determined to be among the selected recipients.
36. The computer-readable medium of claim 32 wherein the contents of the computer-readable medium further cause the computer systems to, before the delivery of the network security information, attach to the network security information a reliable indication of the origin of the network security information.
37. The computer-readable medium of claim 32 wherein the contents of the computer-readable medium further cause the computer systems to, before the delivery of the network security information, encrypt the network security information.
38. The computer-readable medium of claim 31 wherein the network security information contains a reference to related network security information on a secure web server.
39. The computer-readable medium of claim 31 wherein the network security information is a notification of a new network security issue.
40. The computer-readable medium of claim 31 wherein the network security information is usable by at least one of the selected recipients to modify the behavior of a network security device associated with the selected recipient.
41. The computer-readable medium of claim 40 wherein the network security information specifies the modification of software executing on the network security device associated with each selected recipient to provide network security services.
42. The computer-readable medium of claim 40 wherein the network security information specifies the modification of data used by the network security device associated with each selected recipient to provide network security services.
43. The computer-readable medium of claim 31 wherein the network security information is usable by at least one of the selected recipients to modify the behavior of a network security device associated with the selected recipient to better protect the selected recipients against a newly identified network security threat.
44. An apparatus for distributing network security information, comprising:
- a receiver component adapted to receive network security information and recipient selection information specifying a characteristic of prospective recipients to be used in selecting recipients for the received network security information;
- a recipient selection component adapted to compare the recipient selection information received by the receiver component to each of a plurality of prospective recipient profiles, each prospective recipient profile corresponding to one or more prospective recipients and indicating one or more characteristics of the prospective recipients relating to the receipt of network security information, and, based upon the comparison, select at least a portion of the plurality of prospective recipients as recipients of the network security information received by the receiver component; and
- an addressing component adapted to address the received network security information to each of the recipients selected by the recipient selection component.
45. A method in a computer system for receiving network security information, comprising:
- periodically transmitting a request to a network security information provider computer system for new network security information, the request containing a reliable identification of the computer system;
- receiving from a network security information provider computer system a response to a transmitted request, the response containing network security information, the response further having a signature that both reliably identifies the source of the network security information and characterizes the contents of the network security information when the network security information left the source of the network security information;
- using the signature to determine whether the source of the network security information is a trusted source;
- using the signature to determine whether the network security information has been altered since the network security information left the source of the network security information; and
- only if it is determined both (1) that the source of the network security information is a trusted source and (2) that the network security information has not been altered since the network security information left the source of the network security information, using the network security information in the computer system.
46. A computer-readable medium whose contents cause a computer system to receive network security information by:
- periodically transmitting a request to a network security information provider computer system for new network security information, the request containing a reliable identification of the computer system;
- receiving from a network security information provider computer system a response to a transmitted request, the response containing network security information, the response further having a signature that both reliably identifies the source of the network security information and characterizes the contents of the network security information when the network security information left the source of the network security information;
- using the signature to determine whether the source of the network security information is a trusted source;
- using the signature to determine whether the network security information has been altered since the network security information left the source of the network security information; and
- only if it is determined both (1) that the source of the network security information is a trusted source and (2that the network security information has not been altered since the network security information left the source of the network security information, using the network security information in the computer system.
47. A computer system for receiving network security information, comprising:
- a request transmitter adapted to periodically transmit a request to a network security information provider computer system for new network security information, the request containing a reliable identification of the computer system;
- a receiver adapted to receive from a network security information provider computer system a response to a request transmitted by the request transmitter, the response containing network security information, the response further having a signature that both reliably identifies the source of the network security information and characterizes the contents of the network security information when the network security information left the source of the network security information;
- an analyzer adapted to use the signature contained in the response received by the receiver to determine both (1) whether the source of the network security information is a trusted source and (2) whether the network security information has been altered since the network security information left the source of the network security information; and
- a network security subsystem adapted to use the network security information in the computer system only if it is determined by the analyzer both (1) that the source of the network security information is a trusted source and (2) that the network security information has not been altered since the network security information left the source of the network security information.
48. A computer memory containing a network security information addressing data structure, comprising:
- for each of a plurality of addressee candidates, a unique identification of the addressee candidate; and information about the addressee candidate relating to criteria for distributing network security information, such that, for an instance of network security information specifying distribution criteria, the information about the addressee candidates relating to criteria for distributing network security information contained by the data structure may be used to identify addressee candidates having the distribution criteria specified for the instance of network security information, and such that the unique identifications of the addressee candidates contained by the data structure may be used to indicate the identification of each of the identified addressee candidates.
49. A computer memory containing a network security information data structure, comprising:
- network security information usable to automatically modify the behavior of a network security device, the network security information having a source; and
- a signature reliably indicating both the source of the network security information and the contents of the network security information when the network security information left the source,
- such that the signature contained by the data structure may be used to determine whether to use the network security information contained by the data structure to automatically modify the behavior of a network security device.
50. A generated data signal conveying a network security information data structure, comprising:
- network security information usable to modify the behavior of a network security device, the network security information having a source; and
- a signature reliably indicating both the source of the network security information and the contents of the network security information when the network security information left the source,
- such that the signature contained by the data structure may be used to determine whether to use the network security information contained by the data structure to modify the behavior of a network security device.
Type: Application
Filed: Jun 23, 2004
Publication Date: Jun 16, 2005
Inventors: Randall Boroughs (Woodinville, WA), David Bonn (Everett, WA)
Application Number: 10/876,257