会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 26. 发明授权
    • Method and apparatus for host authentication in a network implementing network access control
    • 实现网络访问控制的网络中主机认证的方法和装置
    • US08190755B1
    • 2012-05-29
    • US11645958
    • 2006-12-27
    • Sourabh SatishBrian HernackiShane Pereira
    • Sourabh SatishBrian HernackiShane Pereira
    • G06F15/16
    • H04L63/102H04L61/2015
    • Method and apparatus for host authentication in a network implementing network access control is described. In an example, a network access control (NAC) server receives network address requests from hosts on a network. If a host is compliant with an established security policy, the NAC server determines a unique indicium for the host and records the unique indicium along with a network address leased to the host by a dynamic host configuration protocol (DHCP) server. When a host requests access to a resource on the network, the host is authenticated by determining whether its asserted network address is valid. If valid, a pre-computed unique indicium for that address is obtained and compared with a unique indicium for the host. If the indicia match, the host is allowed access to the resource. Otherwise, the host is blocked from access to the resource.
    • 描述了实现网络访问控制的网络中的主机认证的方法和装置。 在一个示例中,网络访问控制(NAC)服务器从网络上的主机接收网络地址请求。 如果主机符合已建立的安全策略,则NAC服务器为主机确定唯一的标记,并通过动态主机配置协议(DHCP)服务器将唯一标记与租用的主机的网络地址一起记录。 当主机请求访问网络上的资源时,通过确定其断言的网络地址是否有效来验证主机。 如果有效,则获得该地址的预先计算的唯一标记,并与主机的唯一标记进行比较。 如果标记匹配,则允许主机访问资源。 否则,主机被阻止访问资源。
    • 28. 发明授权
    • Detecting stealth network communications
    • 检测隐形网络通信
    • US08079030B1
    • 2011-12-13
    • US11685534
    • 2007-03-13
    • Sourabh SatishBrian Hernacki
    • Sourabh SatishBrian Hernacki
    • G06F9/455H04L29/06
    • H04L63/14H04L63/20
    • A computer has a hypervisor that supervises a virtual machine. The virtual machine includes a guest security module that enforces a security policy on network traffic entering and exiting the virtual machine. Malicious software (malware) uses stealth network communications to avoid the guest security module and attempts to communicate with its home base. A security module within the hypervisor has access to all network communications entering and exiting the computer. The security module communicates with the guest security module to identify communications of which the guest security module is aware. The security module analyzes the network communications for the computer to identify a stealth network communication of which the guest security module is unaware. The security module alters the stealth network communication, thereby prevent the malware from communicating with its home base.
    • 计算机具有管理虚拟机的管理程序。 该虚拟机包括客户端安全模块,该模块对进入和退出虚拟机的网络流量实施安全策略。 恶意软件(恶意软件)使用隐形网络通信来避免访客安全模块,并尝试与其家庭基地进行通信。 管理程序内的安全模块可访问进入和退出计算机的所有网络通信。 安全模块与访客安全模块进行通信,以识别客人安全模块知道哪些通信。 安全模块分析计算机的网络通信,以识别访客安全模块不知道的隐形网络通信。 安全模块改变隐形网络通信,从而防止恶意软件与其家庭基础通信。