会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
    • 用于检测通过网络的敏感数据的未经批准转发的方法和装置
    • US08938511B2
    • 2015-01-20
    • US13494101
    • 2012-06-12
    • Mihai ChristodorescuJosyula R. RaoReiner SailerDouglas Lee Schales
    • Mihai ChristodorescuJosyula R. RaoReiner SailerDouglas Lee Schales
    • G06F15/16H04L12/58
    • H04L51/32G06Q10/107H04L51/12
    • Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.
    • 提供了用于检测通过网络的敏感数据的未授权批量转发的方法和装置。 通过确定从第一网络环境中接收的内部电子邮件的到达率到一个或多个用户帐户,自动检测来自第一网络环境的电子邮件的批量转发; 确定从所述一个或多个用户帐户发送到第二网络环境的外部电子邮件的发送速率; 并通过比较内部电子邮件的到达率和外部电子邮件的发送速率来检测来自给定用户帐户的电子邮件的批量转发。 通过确定内部电子邮件到达率的统计模型和外部电子邮件的发送速率是否及时相关,可以检测到来自给定用户帐户的电子邮件的批量转发。
    • 9. 发明申请
    • Risk Adaptive Information Flow Based Access Control
    • 风险自适应信息流访问控制
    • US20110173084A1
    • 2011-07-14
    • US11623838
    • 2007-01-17
    • Pau-Chen ChengPankaj RohatgiClaudia KeserJosyula R. Rao
    • Pau-Chen ChengPankaj RohatgiClaudia KeserJosyula R. Rao
    • G06Q30/00G06F21/00
    • G06F21/604G06F21/62G06Q10/06G06Q30/0601
    • Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.
    • 提供系统和方法来管理与给定组织内的信息访问相关的风险。 确定组织的整体风险承受能力,并在组织内的多个主体之间分配。 分配是使用集中式,请求/响应或自由市场机制完成的。 根据组织内用于访问对象(即信息和数据)的主体的要求,量化与每个请求相关联的风险或风险级别的数量。 可以使用例如模糊多级安全性来实现风险量化。 与访问请求相关的量化风险与对象的身份和主体的身份相结合,用于确定请求是否应被授予,拒绝或授予适当的缓解措施。