Patent Issued for Scanning and remediating configuration settings of a device using a policy-driven approach (USPTO 11310283): VMware Inc. - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
May 11, 2022 Newswires
Share
Share
Post
Email

Patent Issued for Scanning and remediating configuration settings of a device using a policy-driven approach (USPTO 11310283): VMware Inc.

Insurance Daily News

2022 MAY 11 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Hatch, Thomas S. (Lehi, UT, US), filed on September 7, 2018, was published online on April 19, 2022, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11310283 is assigned to VMware Inc. (Palo Alto, California, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: “Recent years have seen rapid development in software products and electronic devices. For example, software products can affect functionality related to communication of data to and from electronic devices as well as operation of operating systems and/or individual applications installed on the electronic devices. As software and hardware become more complex, it becomes increasingly difficult to effectively secure information contained on electronic devices as well as information transmitted to and from electronic devices (e.g., over the Internet). Indeed, in an attempt to gather information, many individuals use viruses, spyware, malware, and other threatening tools to gather sensitive and/or valuable information.

“While many tools exist for avoiding potential threats in cybersecurity of electronic devices, conventional cybersecurity systems often fail to adequately address potential security issues. For example, conventional cybersecurity systems typically utilize dedicated diagnostic tools for identifying whether a personal computer is compliant with a known security standard. Conventional diagnostic tools, however, are limited to providing a report of settings or configurations on a device that are out of compliance with a known set of standards. The report is then generally provided to an information technology (IT) administrator who manually addresses issues identified by the report or, alternatively, utilizes a separate software tool to facilitate remediation of various issues identified by the diagnostic tool.

“In addition to failing to enable effective diagnosis and remediation of potential security issues, conventional cybersecurity systems can be inflexible and computationally prohibitive. For example, conventional cybersecurity systems are often limited to scanning a device for compliance with a specific security standard (e.g., Center for Internet Security (CIS) standards, Standard Technical Implementation Guide (STIG) standards, Payment Card Industry (PCI) standards, and Health Insurance Portability and Accountability Act (HIPAA)). As a result, conventional systems may provide an effective tool for identifying potential security threats for a select group of devices or programs uniquely tailored to a particular security standard. However, conventional cybersecurity systems may fail to effectively identify potential security threats for other devices or programs not specifically tailored to the security standard. Furthermore, while a device may simply run different security checks based on multiple security standards, running comprehensive checks based on multiple standards can be expensive and can utilize significant computing resources.

“These along with additional problems and issues exist with regard to conventional cybersecurity systems.”

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “Embodiments of the present disclosure provide benefits and/or solve one or more of the foregoing and other problems in the art with systems, methods and computer-readable media that enforce security policies on a client device (or other computing device). In particular, in one or more embodiments, the disclosed systems enforce security policies by performing operations that enable an agent on the client device to both scan and fix security issues. For example, the disclosed systems can enforce a security policy by performing an idempotent operation in which a check and a fix of a security policy are the same operation (e.g., a check operation is the fix operation). In this way, the systems described herein can effectively identify and remediate configuration settings of a client device out of compliance with security standards using a single software agent.

“In addition, in one or more embodiments the disclosed systems provide a policy-driven approach to enforcing security policies applicable to a wider range of client devices and applications. Indeed, by providing a policy-driven approach to enforcing security policies, the disclosed systems can enable a client device to comply with multiple security standards while performing a fewer number of operations than conventional systems, thereby improving performance of the client device without sacrificing substantial processing resources. In addition, by enforcing security policies using a policy-driven approach, the disclosed systems provide more effective security across a wider range of client devices and applications for which different security standards may be better suited to address potential security issues.

“Additional features and advantages of one or more embodiments of the present disclosure are outlined in the description which follows, and in part will be obvious from the description, or may be learned by the practice of such example embodiments.”

The claims supplied by the inventors are:

“1. A system comprising: at least one processor; and a computer-readable medium storing instructions thereon that, when executed by the at least one processor, cause a computing device to: maintain a plurality of security policies, the plurality of security policies including: a plurality of configuration states associated with configuration settings of a client device, the configuration settings referring to one or more settings of an application or operating system on the client device that grant or restrict access to one or more intended functionalities of the application or operating system; and mapping information associating the plurality of security policies to a plurality of security standards; receive a request to enforce a first security standard from the plurality of security standards; identify a first subset of security policies from the plurality of security policies having mapping information associated with the first security standard for enforcement on the client device, wherein enforcing the first security standard includes causing the client device to perform an operation to enforce a configuration state for a corresponding configuration setting defined by a security policy from the identified subset of security policies regardless of a current state of the configuration setting prior to receiving the request to implement the plurality of security policies on the client device; determine whether an exemption applies to at least one of the first subset of security policies; in response to determining that the exemption applies to the at least one of the first subset of security policies, bypass enforcement of the at least one of the first subset of security policies; and identify a second subset of security policies from the plurality of security policies having mapping information associated with a second security standard for enforcement on the client device.

“2. The system of claim 1, wherein the operation to enforce the configuration state includes an idempotent operation in which a check and a fix of the security policy are the same operation.

“3. The system of claim 1, wherein the instructions cause the computing device to: receive a report including information associated with enforcing at least one of the first or second subset of security policies on the client device; and generate a compliance report indicating a measure of compliance with at least one of the first or second security standard.

“4. The system of claim 3, wherein generating the compliance report further includes: based on overlap between mapping information for the first subset of security policies and the mapping information associated with the second security standard, providing, within the compliance report, an indication of a second measure of compliance with the second security standard.

“5. The system of claim 1, wherein the instructions cause the computing device to provide an option to request enforcement of the second security standard.

“6. The system of claim 1, wherein enforcing the second security standard includes causing the client device to perform one or more operations to enforce one or more configuration states for one or more corresponding configuration settings defined by the second subset of security policies.

“7. The system of claim 1, wherein the plurality of security standards includes two or more of Center for Internet Security (CIS) standards, Standard Technical Implementation Guide (STIG) standards, Payment Card Industry (PCI) standards, and Health Insurance Portability and Accountability Act (HIPAA) standards, and wherein the instructions further cause the computing device to: generate the mapping information for the plurality of security policies by mapping the plurality of configuration states associated with configuration settings of the client device to respective security standards from the plurality of security standards.

“8. A computer-implemented method comprising: maintaining a plurality of security policies, the plurality of security policies including: a plurality of configuration states associated with configuration settings of a client device, the configuration settings referring to one or more settings of an application or operating system on the client device that grant or restrict access to one or more intended functionalities of the application or operating system; and mapping information associating the plurality of security policies to a plurality of security standards; receiving a request to enforce a first security standard from the plurality of security standards; identifying a first subset of security policies from the plurality of security policies having mapping information associated with the first security standard for enforcement on the client device, wherein enforcing the first security standard includes causing the client device to perform an operation to enforce a configuration state for a corresponding configuration setting defined by a security policy from the identified subset of security policies regardless of a current state of the configuration setting prior to receiving the request to implement the plurality of security policies on the client device; determining whether an exemption applies to at least one of the first subset of security policies; in response to determining that the exemption applies to the at least one of the first subset of security policies, bypassing enforcement of the at least one of the first subset of security policies; and identifying a second subset of security policies from the plurality of security policies having mapping information associated with a second security standard for enforcement on the client device.

“9. The computer-implemented method of claim 8, further including: receiving a report including information associated with enforcing at least one of the first or second subset of security policies on the client device; and generating a compliance report indicating a measure of compliance with at least one of the first or second security standard.

“10. The computer-implemented method of claim 9, wherein generating the compliance report further includes: based on overlap between mapping information for the first subset of security policies and the mapping information associated with the second security standard, providing, within the compliance report, an indication of a second measure of compliance with the second security standard.

“11. The computer-implemented method of claim 8, wherein enforcing the second security standard includes causing the client device to perform one or more operations to enforce one or more configuration states for one or more corresponding configuration settings defined by the second subset of security policies.

“12. A non-transitory computer-readable medium storing instructions thereon that, when executed by at least one processor, cause a computing device to: maintain a plurality of security policies, the plurality of security policies including: a plurality of configuration states associated with configuration settings of a client device, the configuration settings referring to one or more settings of an application or operating system on the client device that grant or restrict access to one or more intended functionalities of the application or operating system; and mapping information associating the plurality of security policies to a plurality of security standards; receive a request to enforce a first security standard from the plurality of security standards; identify a first subset of security policies from the plurality of security policies having mapping information associated with the first security standard for enforcement on the client device, wherein enforcing the first security standard includes causing the client device to perform an operation to enforce a configuration state for a corresponding configuration setting defined by a security policy from the identified subset of security policies regardless of a current state of the configuration setting prior to receiving the request to implement the plurality of security policies on the client device; determine whether an exemption applies to at least one of the first subset of security policies; in response to determining that the exemption applies to the at least one of the first subset of security policies, bypass enforcement of the at least one of the first subset of security policies; and identify a second subset of security policies from the plurality of security policies having mapping information associated with a second security standard for enforcement on the client device.

“13. The non-transitory computer-readable medium of claim 12, further including instructions that, when executed by the at least one processor, cause the computing device to: receive a report including information associated with enforcing at least one of the first or second subset of security policies on the client device; and generate a compliance report indicating a measure of compliance with at least one of the first or second security standard.

“14. The non-transitory computer-readable medium of claim 13, wherein generating the compliance report further includes: based on overlap between mapping information for the first subset of security policies and the mapping information associated with the second security standard, providing, within the compliance report, an indication of a second measure of compliance with the second security standard.

“15. The non-transitory computer-readable medium of claim 12, wherein enforcing the second security standard includes causing the client device to perform one or more operations to enforce one or more configuration states for one or more corresponding configuration settings defined by the second subset of security policies.”

URL and more information on this patent, see: Hatch, Thomas S. Scanning and remediating configuration settings of a device using a policy-driven approach. U.S. Patent Number 11310283, filed September 7, 2018, and published online on April 19, 2022. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=11310283.PN.&OS=PN/11310283RS=PN/11310283

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for Systems and methods for identifying devices as authorized (USPTO 11308500): United Services Automobile Association

Newer

Data from University Teknologi MARA Update Knowledge in Risk Management (The Impact of Health Impairment on Optimal Annuitization for Retirees): Insurance – Risk Management

Advisor News

  • The gap between policy awareness and investor conversations
  • Younger investors turn to ‘finfluencers’
  • Using digital retirement modeling to strengthen client understanding
  • Fear of outliving money at a record high
  • Cognitive decline is a growing threat to financial security
More Advisor News

Annuity News

  • InspereX Partners with AuguStar Retirement for Strategic Expansion into Annuity Market
  • FACC and DOL enter stipulation to dismiss 2020 guidance lawsuit
  • Zinnia’s Zahara policy admin system adds FIA chassis to product library
  • The Standard and Ignite Partners Announce Launch of Thrive Plus Fixed Indexed Annuity
  • CareScout Joins Ensight™ Intelligent Quote LTC & Life Marketplace
More Annuity News

Health/Employee Benefits News

  • Slim chances of major health care legislation passing this year
  • TODAY'S HEARING: HOSPITAL SYSTEMS' CONSOLIDATION AND OPAQUE BILLING PRACTICES DRIVING THE HEALTH CARE AFFORDABILITY CRISIS
  • Pending cuts to Georgia Medicaid payments could affect children who need therapy
  • AI is coming to Medicare claims
  • Closing the Gig Gap: The Push for Specialized Insurance in the App-Based Economy | Insurify
More Health/Employee Benefits News

Life Insurance News

  • Foresters Financial revamps accelerated underwriting, raises limits to $2M
  • National Life Group Appoints Matthew Frazee as Chief Financial Officer to Support Continued Organizational Growth
  • Protective to Acquire Obsidian from Genstar Capital, Expanding into Specialty Property & Casualty Insurance
  • North Carolina court finally sets sentencing date for Greg Lindberg
  • InspereX Partners with AuguStar Retirement for Strategic Expansion into Annuity Market
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

A FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Press Releases

  • RFP #T01325
  • RFP #T01325
  • RFP #T01825
  • RFP #T01825
  • RFP #T01525
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet