会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 14. 发明授权
    • Malware containment on connection
    • 连接恶意软体
    • US08566946B1
    • 2013-10-22
    • US11717475
    • 2007-03-12
    • Ashar AzizWei-Lung LaiJayaraman Manni
    • Ashar AzizWei-Lung LaiJayaraman Manni
    • G06F13/30
    • G06F21/568G06F21/554G06F21/56G06F2009/45591H04L63/145H04L63/1491
    • Systems and methods for malware containment on connection are provided. Digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device is temporarily directed to a controller which then analyzes the network data to identify unauthorized activity and/or malware within the newly connected digital device. An exemplary method to contain malware comprises detecting a digital device upon connection with a communication network, temporarily redirecting network data from the digital device for a predetermined period of time, and analyzing the network data to identify malware within the digital device.
    • 提供了连接恶意软件包含系统和方法。 连接到通信网络时,数字设备被隔离预定的时间段。 当数字设备被隔离时,由数字设备发送的所有网络数据被临时指向控制器,控制器然后分析网络数据以识别新连接的数字设备内的未经授权的活动和/或恶意软件。 包含恶意软件的示例性方法包括在与通信网络连接时检测数字设备,在预定时间段内临时地重定向来自数字设备的网络数据,以及分析网络数据以识别数字设备内的恶意软件。
    • 17. 发明授权
    • Malware containment and security analysis on connection
    • 连接恶意软件包含和安全性分析
    • US08539582B1
    • 2013-09-17
    • US11717408
    • 2007-03-12
    • Ashar AzizWei-Lung LaiJayaraman Manni
    • Ashar AzizWei-Lung LaiJayaraman Manni
    • G08B23/00H04L29/06
    • G06F21/554G06F9/45558G06F21/56G06F2009/45587H04L63/14H04L63/145H04L63/1491
    • Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device is directed to a controller which then analyzes the network data to identify unauthorized activity and/or malware within the newly connected digital device. An exemplary method to contain malware includes detecting a digital device upon connection with a communication network, quarantining network data from the digital device for a predetermined period of time, transmitting a command to the digital device to activate a security program to identify security risks, and analyzing the network data to identify malware within the digital device.
    • 提供了连接恶意软件包含和安全分析的系统和方法。 连接到通信网络时,数字设备被隔离预定的时间段。 当数字设备被隔离时,由数字设备发送的所有网络数据被引导到控制器,控制器然后分析网络数据以识别新连接的数字设备内的未经授权的活动和/或恶意软件。 包含恶意软件的示例性方法包括在与通信网络连接时检测数字设备,在预定时间段内从数字设备隔离网络数据,向数字设备发送命令以激活安全程序以识别安全风险;以及 分析网络数据以识别数字设备内的恶意软件。
    • 19. 发明授权
    • Approach for provisioning network devices
    • 方法来配置网络设备
    • US07657615B1
    • 2010-02-02
    • US10731889
    • 2003-12-08
    • Martin PattersonJayaraman ManniShriram KrishnanBenjamin H. StoltzChristopher T. La
    • Martin PattersonJayaraman ManniShriram KrishnanBenjamin H. StoltzChristopher T. La
    • G06F15/177
    • G06F9/4416
    • An approach for provisioning network devices generally involves supplying boot data to network devices over a network so that the network devices can be booted up in an imaging mode or an application mode, depending upon the particular boot data supplied to the network device. When booted up in the imaging mode, imaging data can be downloaded and stored on network devices. When booted up in the application mode, the network devices execute one or more programs contained in the image data stored on the network devices. The first and second boot data may be in the form of boot loader scripts. Furthermore, the first and second boot data may be provided to the network device in the payload of a dynamic host configuration protocol (DHCP) reply. The DHCP reply may be generated and provided by a DHCP server to the network device in response to receiving a DHCP request from the network device. The approach may be implemented using a secure network environment.
    • 用于配置网络设备的方法通常涉及通过网络向网络设备提供引导数据,使得根据提供给网络设备的特定引导数据,网络设备可以以成像模式或应用模式启动。 当以成像模式启动时,成像数据可以下载并存储在网络设备上。 当在应用模式下启动时,网络设备执行包含在存储在网络设备上的图像数据中的一个或多个程序。 第一和第二引导数据可以是引导加载程序脚本的形式。 此外,可以在动态主机配置协议(DHCP)应答的有效载荷中将第一和第二引导数据提供给网络设备。 响应于从网络设备接收到DHCP请求,DHCP响应可以由DHCP服务器生成并提供给网络设备。 该方法可以使用安全网络环境来实现。