会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Domain name system security network
    • 域名系统安全网络
    • US08375120B2
    • 2013-02-12
    • US11437912
    • 2006-05-19
    • David RandScott D. EstersPaul MoriartyJerry Scharf
    • David RandScott D. EstersPaul MoriartyJerry Scharf
    • G06F15/173
    • H04L63/20H04L29/12066H04L61/1511
    • In one embodiment, a DNS security network includes several DNS appliances and a security operations center (SOC) server computer. The SOC server computer may receive telemetry data from the DNS appliances, the telemetry data comprising information about DNS client queries received in the respective DNS appliances. From the telemetry data, the SOC server computer may generate security policies for distribution to the DNS appliances. The security policies may be used by the DNS appliances to determine whether a DNS client query is originated by a client computer performing a prohibited activity (e.g., sending spam, communicating with a zombie control computer, navigating to a prohibited website, etc.). An answer to a client query may be replaced or discarded altogether in cases where the originator is performing a prohibited activity.
    • 在一个实施例中,DNS安全网络包括若干DNS设备和安全操作中心(SOC)服务器计算机。 SOC服务器计算机可以从DNS设备接​​收遥测数据,遥测数据包括关于在各个DNS设备中接收的DNS客户端查询的信息。 从遥测数据中,SOC服务器计算机可以生成用于分发给DNS设备的安全策略。 DNS设备可以使用安全策略来确定DNS客户端查询是否由执行禁止活动的客户端计算机发起(例如,发送垃圾邮件,与僵尸控制计算机通信,导航到被禁止的网站等)。 在发起者正在执行禁止活动的情况下,客户端查询的答案可能被完全替换或丢弃。
    • 9. 发明申请
    • SMTP network security processing in a transparent relay in a computer network
    • SMTP网络安全处理在计算机网络中的透明中继
    • US20070204341A1
    • 2007-08-30
    • US11601604
    • 2006-11-17
    • David RandScott EstersPaul MoriartyGerald Scharf
    • David RandScott EstersPaul MoriartyGerald Scharf
    • G06F12/14
    • G06Q10/107H04L51/12
    • In one embodiment, a transparent relay receives diverted e-mail communications between an e-mail client and an e-mail server. The transparent relay may be configured to examine the e-mail communications for network security policy violations. E-mail communications that do not violate a network security policy may be relayed to their intended destination. Policy actions, such as discarding or redirection, may be performed on those that violate one or more network security policies. The transparent relay may include a pair of communications interfaces running in promiscuous mode, one for downstream communications and another for upstream communications. The transparent relay may decompose a network communication protocol to look network security policy violations.
    • 在一个实施例中,透明中继器在电子邮件客户端和电子邮件服务器之间接收转移的电子邮件通信。 透明中继可以被配置为检查用于网络安全策略违规的电子邮件通信。 不违反网络安全策略的电子邮件通信可能会转发到其预期的目的地。 可能对违反一个或多个网络安全策略的行为执行诸如丢弃或重定向之类的策略动作。 透明中继可以包括以混杂模式运行的一对通信接口,一对用于下行通信,另一个用于上行通信。 透明中继可以分解网络通信协议以查看网络安全策略违规。
    • 10. 发明申请
    • Domain name system security network
    • 域名系统安全网络
    • US20070118669A1
    • 2007-05-24
    • US11437912
    • 2006-05-19
    • David RandScott EstersPaul MoriartyJerry Scharf
    • David RandScott EstersPaul MoriartyJerry Scharf
    • G06F15/16
    • H04L63/20H04L29/12066H04L61/1511
    • In one embodiment, a DNS security network includes several DNS appliances and a security operations center (SOC) server computer. The SOC server computer may receive telemetry data from the DNS appliances, the telemetry data comprising information about DNS client queries received in the respective DNS appliances. From the telemetry data, the SOC server computer may generate security policies for distribution to the DNS appliances. The security policies may be used by the DNS appliances to determine whether a DNS client query is originated by a client computer performing a prohibited activity (e.g., sending spam, communicating with a zombie control computer, navigating to a prohibited website, etc.). An answer to a client query may be replaced or discarded altogether in cases where the originator is performing a prohibited activity.
    • 在一个实施例中,DNS安全网络包括若干DNS设备和安全操作中心(SOC)服务器计算机。 SOC服务器计算机可以从DNS设备接​​收遥测数据,遥测数据包括关于在各个DNS设备中接收的DNS客户端查询的信息。 从遥测数据中,SOC服务器计算机可以生成用于分发给DNS设备的安全策略。 DNS设备可以使用安全策略来确定DNS客户端查询是否由执行禁止活动的客户端计算机发起(例如,发送垃圾邮件,与僵尸控制计算机通信,导航到被禁止的网站等)。 在发起者正在执行禁止活动的情况下,客户端查询的答案可能被完全替换或丢弃。