会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明专利
    • An isolation unit
    • GB2608662A
    • 2023-01-11
    • GB202200936
    • 2022-01-25
    • CIRCUITS AND SOFTWARE LTD
    • STUART PENNYSIMON GRAVE
    • H04L9/40G06F21/56
    • An isolation unit 100 for preventing access to one or more computer devices or network segments 102 by malicious software (e.g. ransomware). The isolation unit has first 104 and second 108 connection interfaces, at least one of which is configured to connect the isolation unit to a data carrying input 106, and the other being at least for outputting data to the computer devices/network segments. Connection circuitry 110 connects the first and second interfaces, and has at least one switchable connection path 112 with a layer 1 switch 114 (i.e. a switch operable at the OSI physical layer). A controller 116 is configured to switch the switch between a closed state, in which the first and second interfaces are connected by the switchable connection path, and an open state, in which the switchable connection path is disconnected between the first and second interfaces. The isolation unit may be used to isolate a data storage back-up device.
    • 3. 发明专利
    • Network security
    • GB2608592A
    • 2023-01-11
    • GB202109365
    • 2021-06-29
    • BRITISH TELECOMM
    • DANIEL BASTOSFADI EL-MOUSSA
    • H04L9/40
    • A processor-controlled device 104 and remote system 114 for identifying malicious behaviour in a network. The processor-controlled device (e.g. a gateway, router or home hub) identifies (e.g. using a machine learning system) a first portion of a data transmission 107 indicative of an anomaly and a second portion of the data transmission comprising personal data. The processor-controlled device generates a modified data transmission 112, the modification of the data transmission comprising anonymising at least the second portion of the data transmission, and sends the modified data transmission to the remote system for identification of whether the first portion of the data is indicative of malicious behaviour. If the first portion is indicative of malicious behaviour, then the remote system may send a response (118, Figure 2) indicative of this to the processor-controlled device. The response may include a policy to be implemented by the processor-controlled device. The modification of the data transmission may include encrypting the first portion and the encryption may be attribute-based. By providing anonymised data to the remote system the privacy of users is ensured.
    • 7. 发明专利
    • System and method for active detection of malicious network resources
    • NL2031466A
    • 2022-12-19
    • NL2031466
    • 2022-03-31
    • GROUP IB TDS LTD
    • DMITRY VOLKOVNIKOLAY PRUDKOVSKIY
    • H04L9/40
    • The technique relates to the field of information security. A computer-implementable method for active detection of malicious network resources, the method being executable by a distributed computer system, the method comprising receiving an outbound infrastructure traffic, detecting at least one suspicious external IP address in the outbound traffic, scanning at least one suspicious device located on detected at least one suspicious IP address, and obtaining a list of services running on the suspicious device, sending detected at least one suspicious IP address and the obtained list of services to an external computing device, comparing the obtained list of services with a data on known malicious services, and in response to a coincidence of at least one service from the obtained service list with the data on known malicious services considering the suspicious device, located on at least one suspicious IP address, to be malicious and generating at least one report on detection of malicious activity in the infrastructure. In response to absence of coincidences of services from the obtained service list with the data on known malicious services, computing an interval of ownership of at least one suspicious IP address, and in response to the fact that the computed duration of the ownership interval is less than a threshold value, considering the suspicious device, located on at least one suspicious IP address, to be malicious and generating at least one report on detection of malicious activity in the infrastructure.
    • 10. 发明专利
    • Fahrzeuginternes Netzwerksystem
    • DE102016208435B4
    • 2022-11-24
    • DE102016208435
    • 2016-05-17
    • DENSO CORP
    • HASEGAWA TAKAOKOMORI SYOTA
    • H04L65/00G06F13/42H04L9/40H04L12/407H04L43/0876H04L47/36H04L47/765H04L67/00H04L67/12H04L69/00
    • Fahrzeuginternes Netzwerksystem, das System umfassend:fahrzeuginterne Vorrichtungen (501-504) in einem Fahrzeug; undeinen Netzwerkbus (100), welcher mehrere Knoten (200, 300, 401-404) kommunizierbar verbindet, welche die fahrzeuginternen Vorrichtungen steuern, wobei die mehreren Knoten miteinander unter Verwendung eines Steuerprotokolls kommunizieren und umfasseneinen Senderknoten (200), welcher mit dem Netzwerkbus verbunden ist und einen ersten Rahmen sendet, und einen Empfängerknoten (300), welcher mit dem Netzwerkbus verbunden ist und einen Flusssteuerrahmen (FC) nach Empfangen des ersten Rahmens sendet, wobeider Empfängerknoten den Flusssteuerrahmen (FC) nach Hinzufügen von Nutzdatenlängeninformation (24, 34) an den Flusssteuerrahmen (FC) gemäß dem Steuerprotokoll an den Senderknoten sendet,der Senderknoten eine Nutzdatenlänge eines zu übertragenden nachfolgenden Rahmens (CF) nach Empfangen des Flusssteuerrahmens basierend auf der Nutzdatenlängeninformation festlegt,der Flusssteuerrahmen ferner einen Kopfbereich umfasst,der Empfängerknoten fähig ist, einen Datenlängencode (24) in dem Kopfbereich des Flusssteuerrahmens zu ändern,der Senderknoten die Nutzdatenlänge des nachfolgenden Rahmens basierend auf dem Datenlängencode festlegt, undder Empfängerknoten die Nutzdatenlängeninformation bildet, um eine kürzere Nutzdatenlänge des nachfolgenden Rahmens festzulegen, wenn eine Kommunikationslast des Netzwerkbusses zunimmt.