会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Distributed threat management
    • 分布式威胁管理
    • US07373666B2
    • 2008-05-13
    • US10185008
    • 2002-07-01
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • G06F12/00G06F7/04G06F11/30H04L9/32
    • G06F21/554
    • A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    • 提供了一种用于管理分布式系统中的安全威胁的方法和系统。 系统的分布式元素会将威胁管理代理的可疑活动检测并报告。 威胁管理代理确定攻击是否发生,并在攻击确定发生时部署对攻击的对策。 还提供另一种方法和系统来管理分布式系统中的安全威胁。 威胁管理代理审查报告了可疑活动,包括从系统的至少一个分布式元素报告的可疑活动,根据报告确定是否发生攻击的模式特征,并预测何时可能发生下一次攻击。 基于预测发生下一次攻击的时间窗口,针对预测的下一次攻击的对策部署。
    • 2. 发明授权
    • Distributed threat management
    • 分布式威胁管理
    • US07707637B2
    • 2010-04-27
    • US12058156
    • 2008-03-28
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • G06F7/04G06F11/30H04L9/00
    • G06F21/554
    • A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    • 提供了一种用于管理分布式系统中的安全威胁的方法和系统。 系统的分布式元素会将威胁管理代理的可疑活动检测并报告。 威胁管理代理确定攻击是否发生,并在攻击确定发生时部署对攻击的对策。 还提供另一种方法和系统来管理分布式系统中的安全威胁。 威胁管理代理审查报告了可疑活动,包括从系统的至少一个分布式元素报告的可疑活动,根据报告确定是否发生攻击的模式特征,并预测何时可能发生下一次攻击。 基于预测发生下一次攻击的时间窗口,针对预测的下一次攻击的对策部署。
    • 4. 发明授权
    • Secure internet-scale eventing
    • 安全的互联网规模事件
    • US08086849B2
    • 2011-12-27
    • US10210067
    • 2002-08-02
    • Christopher G. KalerJohn P. ShewchukGiovanni Moises Della-LiberaLuis Felipe Cabrera
    • Christopher G. KalerJohn P. ShewchukGiovanni Moises Della-LiberaLuis Felipe Cabrera
    • H04L9/00
    • H04L63/0428H04L63/08H04L63/126
    • A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event generation device for generating and disseminating an event message through the network to event distribution devices serving as edge event delivery devices having recipient devices connected thereto. Event messages may be encrypted at the event generation device for each of the destination recipient devices or event messages may be encrypted at each of the edge event delivery devices for delivery to respective recipient devices connected thereto. A signing key may also be included with the encrypted message such that the respective recipient devices may authenticate a sender of the encrypted message based on the signing key. Encryption keys may be established based on policies of the network of event distribution devices or based on policies of the respective recipient devices.
    • 提供了一种以安全可伸缩的方式传送事件消息的方法和系统。 网络包括作为事件发生设备的事件发布设备,用于通过网络生成和传播事件消息到用作具有连接到其的接收设备的边缘事件传递设备的事件分发设备。 事件消息可以在每个目的地接收者设备的事件生成设备处被加密,或者可以在每个边缘事件传递设备处对事件消息进行加密,以便递送到与之相连接的相应接收者设备。 签名密钥也可以包含在加密的消息中,使得相应的接收者设备可以基于签名密钥来认证加密消息的发送者。 加密密钥可以基于事件分发设备的网络的策略或基于各个接收方设备的策略来建立。
    • 6. 发明授权
    • Establishing a secure context at an electronic communications end-point
    • 在电子通信端点建立安全的环境
    • US07313687B2
    • 2007-12-25
    • US10340694
    • 2003-01-10
    • Christopher G. KalerGiovanni M. Della-LiberaJohn P. Shewchuk
    • Christopher G. KalerGiovanni M. Della-LiberaJohn P. Shewchuk
    • H04L9/00
    • H04L67/34H04L29/06H04L63/12H04L67/327H04L69/329
    • A first application layer at a first message processor identifies a first portion of context information. A second message processor receives the first portion of context information. A second application layer at the second message processor identifiers a second portion of context information. The second message processor sends the second portion of context information along with a first digital signature created from both the first and second portions of context information. The first message processor receives the second portion of context information and first digital signature. The first message processor sends a second digital signature created from the first and second portions of context information to the second message processor. If both the first and second digital signatures are authenticated, a secure context can be established between the first and second application layers.
    • 第一消息处理器处的第一应用层识别上下文信息的第一部分。 第二消息处理器接收上下文信息的第一部分。 第二消息处理器处的第二应用层识别上下文信息的第二部分。 第二消息处理器发送上下文信息的第二部分以及从上下文信息的第一和第二部分创建的第一数字签名。 第一消息处理器接收上下文信息和第一数字签名的第二部分。 第一消息处理器将从上下文信息的第一和第二部分创建的第二数字签名发送到第二消息处理器。 如果第一和第二数字签名都被认证,则可以在第一和第二应用层之间建立安全上下文。
    • 8. 发明授权
    • Message encoding/decoding using templated parameters
    • 消息编码/解码使用模板参数
    • US07746250B2
    • 2010-06-29
    • US12023998
    • 2008-01-31
    • Arun K. NandaJohn P. ShewchukChristopher G. KalerHervey O. Wilson
    • Arun K. NandaJohn P. ShewchukChristopher G. KalerHervey O. Wilson
    • H03M7/30
    • G06F15/16H03M7/30
    • Communication of a compressed message over a communication channel between message processors. The compressed message may be expressed in terms of an expressed or implicit template identification, and values of one or more parameters. Based on the template identification, the meaning of the one or more parameters may be understood, whereas the meaning of the parameter(s) may not be understood without a knowledge of the template. The template provides semantic context for the one or more parameters. The transmitting message processor may have compressed the message using the identified template. Alternatively or in addition, the receiving message processor may decompress the message using the identified template. The template itself need not be part of the compressed message as transmitted.
    • 通过消息处理器之间的通信信道通信压缩消息。 压缩消息可以用表达或隐含的模板标识和一个或多个参数的值表示。 基于模板识别,可以理解一个或多个参数的含义,而在不了解模板的情况下,参数的含义可能不被理解。 模板提供一个或多个参数的语义上下文。 发送消息处理器可以使用所标识的模板来压缩消息。 或者或另外,接收消息处理器可以使用所识别的模板解压缩消息。 模板本身不需要是传输的压缩消息的一部分。