会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Web-based security proxy for computing system environment scanning
    • 用于计算系统环境扫描的基于Web的安全代理
    • US08984598B2
    • 2015-03-17
    • US13534065
    • 2012-06-27
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • G06F21/00H04L12/24
    • H04L41/0853H04L41/0213H04L41/0843H04L41/28H04L63/0884H04L63/101H04L63/168
    • Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
    • 提供了用于从受管计算系统环境的组件收集配置数据的机制。 在数据处理系统中,从没有安全凭证的数据收集系统获得代码的一部分,以允许数据收集系统直接访问受管计算系统环境。 代码的部分由数据处理系统使用在数据处理系统中维护的安全凭证执行。 执行代码部分导致数据处理系统访问受管计算系统环境,并从受管计算系统环境收集配置数据。 数据处理系统通过代码部分,将从被管理计算系统收集的配置数据提供给将收集的配置数据存储在数据存储器中的数据收集系统。
    • 2. 发明申请
    • Detecting Transparent Network Communication Interception Appliances
    • 检测透明网络通信拦截设备
    • US20130246606A1
    • 2013-09-19
    • US13418761
    • 2012-03-13
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • G06F15/173
    • H04L41/0853H04L41/12H04L43/12
    • Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value.
    • 提供了用于识别网络拓扑中的透明网络通信拦截设备的机制。 这些机制从网络拓扑中的多个设备收集网络配置数据,并使用一个或多个启发式分析收集的网络配置数据,以识别收集的网络配置数据中指示透明网络通信拦截设备的存在的模式。 这些机制基于收集的网络配置数据的分析结果计算置信度量值。 所述机构响应于所计算的置信度量值满足或超过至少一个阈值,将检测到的透明网络通信拦截设备的存在的通知发送到计算设备。
    • 3. 发明授权
    • Detecting transparent network communication interception appliances
    • 检测透明网络通信拦截设备
    • US09094309B2
    • 2015-07-28
    • US13418761
    • 2012-03-13
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • H04L12/24H04L12/751H04L12/733H04L12/26
    • H04L41/0853H04L41/12H04L43/12
    • Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value.
    • 提供了用于识别网络拓扑中的透明网络通信拦截设备的机制。 这些机制从网络拓扑中的多个设备收集网络配置数据,并使用一个或多个启发式分析收集的网络配置数据,以识别收集的网络配置数据中指示透明网络通信拦截设备的存在的模式。 这些机制基于收集的网络配置数据的分析结果计算置信度量值。 所述机构响应于所计算的置信度量值满足或超过至少一个阈值,将检测到的透明网络通信拦截设备的存在的通知发送到计算设备。
    • 5. 发明申请
    • Web-Based Security Proxy for Computing System Environment Scanning
    • 用于计算系统环境扫描的基于Web的安全代理
    • US20140007204A1
    • 2014-01-02
    • US13537865
    • 2012-06-29
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • Joel W. BranchMichael E. NiddRuediger Rissmann
    • G06F21/00
    • H04L41/0853H04L41/0213H04L41/0843H04L41/28H04L63/0884H04L63/101H04L63/168
    • Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
    • 提供了用于从受管计算系统环境的组件收集配置数据的机制。 在数据处理系统中,从没有安全凭证的数据收集系统获得代码的一部分,以允许数据收集系统直接访问受管计算系统环境。 代码的部分由数据处理系统使用在数据处理系统中维护的安全凭证执行。 执行代码部分导致数据处理系统访问受管计算系统环境,并从受管计算系统环境收集配置数据。 数据处理系统通过代码部分,将从管理计算系统收集的配置数据提供给将收集的配置数据存储在数据存储器中的数据收集系统。