会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Distributed threat management
    • 分布式威胁管理
    • US07373666B2
    • 2008-05-13
    • US10185008
    • 2002-07-01
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • G06F12/00G06F7/04G06F11/30H04L9/32
    • G06F21/554
    • A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    • 提供了一种用于管理分布式系统中的安全威胁的方法和系统。 系统的分布式元素会将威胁管理代理的可疑活动检测并报告。 威胁管理代理确定攻击是否发生,并在攻击确定发生时部署对攻击的对策。 还提供另一种方法和系统来管理分布式系统中的安全威胁。 威胁管理代理审查报告了可疑活动,包括从系统的至少一个分布式元素报告的可疑活动,根据报告确定是否发生攻击的模式特征,并预测何时可能发生下一次攻击。 基于预测发生下一次攻击的时间窗口,针对预测的下一次攻击的对策部署。
    • 2. 发明申请
    • DISTRIBUTED THREAT MANAGEMENT
    • 分布式威胁管理
    • US20090013410A1
    • 2009-01-08
    • US12058156
    • 2008-03-28
    • Christopher KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • Christopher KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • G06F21/00
    • G06F21/554
    • A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    • 提供了一种用于管理分布式系统中的安全威胁的方法和系统。 系统的分布式元素会将威胁管理代理的可疑活动检测并报告。 威胁管理代理确定攻击是否发生,并在攻击确定发生时部署对攻击的对策。 还提供另一种方法和系统来管理分布式系统中的安全威胁。 威胁管理代理审查报告了可疑活动,包括从系统的至少一个分布式元素报告的可疑活动,根据报告确定是否发生攻击的模式特征,并预测何时可能发生下一次攻击。 基于预测发生下一次攻击的时间窗口,针对预测的下一次攻击的对策部署。
    • 3. 发明授权
    • Distributed threat management
    • 分布式威胁管理
    • US07707637B2
    • 2010-04-27
    • US12058156
    • 2008-03-28
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • G06F7/04G06F11/30H04L9/00
    • G06F21/554
    • A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    • 提供了一种用于管理分布式系统中的安全威胁的方法和系统。 系统的分布式元素会将威胁管理代理的可疑活动检测并报告。 威胁管理代理确定攻击是否发生,并在攻击确定发生时部署对攻击的对策。 还提供另一种方法和系统来管理分布式系统中的安全威胁。 威胁管理代理审查报告了可疑活动,包括从系统的至少一个分布式元素报告的可疑活动,根据报告确定是否发生攻击的模式特征,并预测何时可能发生下一次攻击。 基于预测发生下一次攻击的时间窗口,针对预测的下一次攻击的对策部署。
    • 5. 发明授权
    • Secure internet-scale eventing
    • 安全的互联网规模事件
    • US08086849B2
    • 2011-12-27
    • US10210067
    • 2002-08-02
    • Christopher G. KalerJohn P. ShewchukGiovanni Moises Della-LiberaLuis Felipe Cabrera
    • Christopher G. KalerJohn P. ShewchukGiovanni Moises Della-LiberaLuis Felipe Cabrera
    • H04L9/00
    • H04L63/0428H04L63/08H04L63/126
    • A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event generation device for generating and disseminating an event message through the network to event distribution devices serving as edge event delivery devices having recipient devices connected thereto. Event messages may be encrypted at the event generation device for each of the destination recipient devices or event messages may be encrypted at each of the edge event delivery devices for delivery to respective recipient devices connected thereto. A signing key may also be included with the encrypted message such that the respective recipient devices may authenticate a sender of the encrypted message based on the signing key. Encryption keys may be established based on policies of the network of event distribution devices or based on policies of the respective recipient devices.
    • 提供了一种以安全可伸缩的方式传送事件消息的方法和系统。 网络包括作为事件发生设备的事件发布设备,用于通过网络生成和传播事件消息到用作具有连接到其的接收设备的边缘事件传递设备的事件分发设备。 事件消息可以在每个目的地接收者设备的事件生成设备处被加密,或者可以在每个边缘事件传递设备处对事件消息进行加密,以便递送到与之相连接的相应接收者设备。 签名密钥也可以包含在加密的消息中,使得相应的接收者设备可以基于签名密钥来认证加密消息的发送者。 加密密钥可以基于事件分发设备的网络的策略或基于各个接收方设备的策略来建立。