会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • Active intrusion resistant environment of layered object and compartment key (airelock)
    • 分层物体和隔间钥匙(airelock)的主动入侵防护环境
    • US20080209560A1
    • 2008-08-28
    • US11798580
    • 2007-05-15
    • Michael C. Dapp
    • Michael C. Dapp
    • G08B23/00G06F15/173G06F11/20H04L9/00
    • H04L63/1416H04L63/20
    • A secure infrastructure system and method with user transparent signaling for communicating detection of signals at a network node having characteristics of a potential attack and for controlling communications at a node from another node in response to the user transparent signals. A processor is connected to routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchical tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchical tier. Faults or potential attacks are compartmentalized to a node or sector of the network and isolated while normal communications are continued over redundant network links.
    • 一种具有用户透明信令的安全基础设施系统和方法,用于在具有潜在攻击特征的网络节点处传送信号检测,并响应于用户透明信号控制来自另一节点的节点上的通信。 处理器通过加密引擎连接到路由器和网络,并且包括管理对象,以向本地较低分级层的节点发出控制命令,并且管理对象以响应于来自节点的信号来检测潜在的攻击和对路由器进行控制 本地较高的层级。 故障或潜在攻击分隔成网络的一个节点或扇区,并在通过冗余网络链路进行正常通信时隔离。
    • 7. 发明授权
    • Active intrusion resistant environment of layered object and compartment keys (airelock)
    • 分层物体和隔间钥匙(airelock)的主动入侵防护环境
    • US07225467B2
    • 2007-05-29
    • US09973769
    • 2001-10-11
    • Michael C. Dapp
    • Michael C. Dapp
    • G08B23/00G06F11/20G06B15/173H04L9/00
    • H04L63/1416H04L63/20
    • A high level of security and fault tolerance is provided in a digital network by use of highly secure infrastructure of user transparent signalling for communicating detection of signals at a network node having characteristics of a potential attack to another node and controlling communications at routers at the node from another node in response to the user transparent signals. A processor is connected to the routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchy tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchy tier. Identifications are provided for communications between nodes regardless of whether or not a corresponding user is identified and communications are logged. Thus any network session comprises one or more secure sessions in a plurality of security domains and any fault or potential attack can be compartmentalized to a node or sector of the network and isolated while normal communications are continued over redundant network links.
    • 通过使用用户透明信令的高度安全的基础设施来提供高水平的安全性和容错性,用于在具有对另一个节点的潜在攻击的特征的网络节点处的信号的检测进行通信,并控制该节点处的路由器的通信 从另一个节点响应用户的透明信号。 处理器通过加密引擎连接到路由器和网络,并且包括管理对象,以向本地较低层级的节点发出控制命令,并且管理对象以响应于来自节点的信号来检测潜在的攻击和对路由器进行控制 的本地较高层级。 为节点之间的通信提供标识,而不管相关用户是否被识别,并且记录通信。 因此,任何网络会话包括多个安全域中的一个或多个安全会话,并且任何故障或潜在攻击可被划分为网络的节点或扇区,并且在通过冗余网络链路继续正常通信时被隔离。
    • 10. 发明授权
    • Real time active network compartmentalization
    • 实时活动网络划分
    • US07213265B2
    • 2007-05-01
    • US09973776
    • 2001-10-11
    • Michael C. Dapp
    • Michael C. Dapp
    • G06F11/34G06F15/173H04L12/26G08B23/00
    • H04L63/0272G06F11/1482H04L63/1458
    • Security policy manager devices are leveraged by manager objects to use highly secure user transparent communications to provide detection of questionable activities at every node, automatic collection of information related to any potential attack, isolation of the offending object with arbitrary flexibility of response (e.g. flexibly determining the level of certainty of an attack for initiation of a response in accordance with the number of nodes to be partitioned that is determined by the collected data concerning the potential attack), changing trust relationships between security domains, limiting the attack and launching offensive information warfare capabilities (e.g. outbound from the compromised node while limiting or eliminating inbound communications) in log time and simultaneously and/or concurrently in different but possibly overlapping sections or segments of a digital network of arbitrary configuration.
    • 安全策略管理器设备由管理对象利用,使用高度安全的用户透明通信来提供对每个节点的可疑活动的检测,自动收集与任何潜在攻击相关的信息,以任意的响应灵活性隔离违规对象(例如灵活地确定 根据收集的有关潜在攻击的数据确定的要分区的节点数,启动响应的攻击的确定性级别),改变安全域之间的信任关系,限制攻击和发起攻击性信息战 功能(例如,在受限的节点中出站,同时限制或消除入站通信),同时和/或并发在任意配置的数字网络的不同但可能重叠的部分或多个段中。