会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Policy specification framework for insider intrusions
    • 内幕侵入政策规范框架
    • US20080307493A1
    • 2008-12-11
    • US12193136
    • 2008-08-18
    • Pratyush MogheNarain Gehani
    • Pratyush MogheNarain Gehani
    • G06F17/00
    • H05K7/1495
    • This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    • 本公开提供了一种策略规范框架,以使得企业能够使用给定数据访问的整体视图来指定给定的内部攻击,以及响应于检测到这种攻击的方法来指定和实现一个或多个入侵缓解方法 攻击。 政策规范规定了使用“异常”和“签名”属性来捕捉非法数据访问的复杂行为特征。 当发生攻击时,然后实现先前定义的管理员(或系统定义的)缓解响应(例如,验证,断开,解除配置等)。
    • 3. 发明授权
    • Policy specification framework for insider intrusions
    • 内幕侵入政策规范框架
    • US07415719B2
    • 2008-08-19
    • US10950073
    • 2004-09-24
    • Pratyush MogheNarain Gehani
    • Pratyush MogheNarain Gehani
    • H04L9/00H04L9/32
    • H05K7/1495
    • The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, deprovision, or the like) is then implemented.
    • 本发明提供了一种策略规范框架,以使得企业能够使用给定数据访问的整体视图来指定给定的内部攻击,以及响应于这种检测来指定和实现一个或多个入侵缓解方法的手段 一次攻击 政策规范规定了使用“异常”和“签名”属性来捕捉非法数据访问的复杂行为特征。 当发生攻击时,然后实现先前定义的管理员(或系统定义的)缓解响应(例如,验证,断开连接,取消配置等)。
    • 4. 发明授权
    • Policy specification framework for insider intrusions
    • 内幕侵入政策规范框架
    • US07870598B2
    • 2011-01-11
    • US12193136
    • 2008-08-18
    • Pratyush MogheNarain Gehani
    • Pratyush MogheNarain Gehani
    • H04L9/00H04L9/32
    • H05K7/1495
    • This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    • 本公开提供了一种策略规范框架,以使得企业能够使用给定数据访问的整体视图来指定给定的内部攻击,以及响应于检测到这种攻击的方法来指定和实现一个或多个入侵缓解方法 攻击。 政策规范规定了使用“异常”和“签名”属性来捕捉非法数据访问的复杂行为特征。 当发生攻击时,然后实现先前定义的管理员(或系统定义的)缓解响应(例如,验证,断开,解除配置等)。
    • 5. 发明申请
    • Policy specification framework for insider intrusions
    • 内幕侵入政策规范框架
    • US20050071644A1
    • 2005-03-31
    • US10950073
    • 2004-09-24
    • Pratyush MogheNarain Gehani
    • Pratyush MogheNarain Gehani
    • H04K1/00
    • H05K7/1495
    • The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, deprovision, or the like) is then implemented.
    • 本发明提供了一种策略规范框架,以使得企业能够使用给定数据访问的整体视图来指定给定的内部攻击,以及响应于这种检测来指定和实现一个或多个入侵缓解方法的手段 一次攻击 政策规范规定了使用“异常”和“签名”属性来捕捉非法数据访问的复杂行为特征。 当发生攻击时,然后实现先前定义的管理员(或系统定义的)缓解响应(例如,验证,断开连接,取消配置等)。