US 12,278,847 B1
Systems and methods for implementing interim security policies
Viswesh Ananthakrishnan, Palo Alto, CA (US); Liang Li, Cupertino, CA (US); Shujun Zhao, San Francisco, CA (US); Ho Yu Lam, Santa Clara, CA (US); Nidhi Shah, Santa Clara, CA (US); Shu Lin, Santa Clara, CA (US); and Huijun Veronica Zhu, Santa Clara, CA (US)
Assigned to Aurascape
Filed by Aurascape, Santa Clara, CA (US)
Filed on Oct. 4, 2024, as Appl. No. 18/906,652.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/205 (2013.01) 22 Claims
OG exemplary drawing
 
1. An apparatus, comprising:
one or more servers configured to host an application;
one or more processors configured to communicatively couple to the one or more server, wherein the one or more processors are configured to:
receive, from the one or more servers, a first set of security rules applicable to at least one of a set of users or a set of files for a first period of time, the first set of security rules executable in an order of priority;
receive an interim security policy that is different from the first set of security rules, the interim security policy applicable to at least one of:
(i) a subset of the set of users for a second period of time that is less than the first period of time, or
(ii) a subset of the set of files for a second period of time that is less than the first period of time;
determine, in the first set of security rules, an insertion point among the order of priority; and
using the application, execute, at the insertion point and in the first set of security rules, the interim security policy, wherein the interim security policy is separately stored from the first set of security rules.