会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Selective persistent storage of controller information
    • 选择性持久存储控制器信息
    • US08108904B1
    • 2012-01-31
    • US11537036
    • 2006-09-29
    • Roger ChickeringPaul Funk
    • Roger ChickeringPaul Funk
    • G06F7/04
    • H04L63/20H04L63/08H04L63/105H04L67/34
    • A controller may receive a request from an endpoint and determine whether the endpoint connects via a first network or a second network. The controller may download first software to the endpoint when the endpoint connects via the first network, where the first software facilitates authentication of the endpoint via another device and instructs the endpoint to not store information regarding the controller. The controller may download second software to the endpoint when the endpoint connects via the second network, where the second software facilitates authentication of the endpoint by the device and instructs the endpoint to store information regarding the controller.
    • 控制器可以从端点接收请求,并确定端点是否经由第一网络或第二网络连接。 当端点经由第一网络连接时,控制器可以将第一软件下载到端点,其中第一软件有助于经由另一设备对端点的认证,并指示端点不存储关于控制器的信息。 当端点通过第二网络连接时,控制器可以将第二软件下载到端点,其中第二软件有助于设备对端点的认证,并且指示端点存储关于控制器的信息。
    • 10. 发明授权
    • Network defense system utilizing endpoint health indicators and user identity
    • 网络防御系统利用端点健康指标和用户身份
    • US08001610B1
    • 2011-08-16
    • US11236987
    • 2005-09-28
    • Roger ChickeringSampath SrinivasTimothy Liu
    • Roger ChickeringSampath SrinivasTimothy Liu
    • G06F7/04
    • H04L67/125G06F21/00H04L29/06H04L63/105H04L63/20
    • An endpoint defense system uses endpoint health indicators and user identity information to provide fine-grain access control over network resources. For example, the endpoint defense system may include a controller, a set of protection devices, and a set of agents. The agents are software applications installed on a set of endpoints to gather the health information that represents security states of the endpoint devices. The agents send updated health information to the controller. In response to a login attempt, the controller processes the health indicators and identity information through a set of administrator-defined policies to generate a set of access rights. The controller transfers the set of access rights to the protection devices. The protection devices then control user access to network resources according to the set of access rights. The controller sends updated sets of access rights to the protection devices whenever the access rights change.
    • 端点防御系统使用端点健康指标和用户身份信息来提供对网络资源的细粒度访问控制。 例如,端点防御系统可以包括控制器,一组保护装置和一组代理。 这些代理是安装在一组端点上的软件应用程序,用于收集表示端点设备安全状态的运行状况信息。 代理将更新的健康信息发送给控制器。 响应于登录尝试,控制器通过一组管理员定义的策略处理健康指示符和身份信息,以生成一组访问权限。 控制器将一组访问权限传递给保护设备。 然后,保护设备根据一组访问权限控制用户对网络资源的访问。 只要访问权限发生变化,控制器就会向保护设备发送更新的访问权限集。