Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security systems and methods

A file and host technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as false access blocking errors, timeouts, etc.

Active Publication Date: 2009-10-28
CARBON BLACK
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to transparently add this content-based authorization to the operating system in the background, the delay must typically be less than a minute, otherwise the file system will time out and a spurious access blocking error will occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security systems and methods
  • Network security systems and methods
  • Network security systems and methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] see figure 1 , also known as the Digital Antibody System (DAS)10, allows administrators to monitor, understand, and control files installed on large computer networks and protects against known and unknown viruses, worms, spyware, hackers, and social Engineering attacks and unapproved software (such as file-sharing software not intended for business use). The system includes one or more servers, one of which is shown here as server 14 (device). This server provides centralized policy management, event monitoring, agent coordination, and content analysis (such as spyware and virus scanning). A single server can support multiple hosts 12, for example hundreds or thousands of hosts. The server also maintains a database of metadata associated with the analysis, such as scan history and approval status with respect to files and programs. This metadata is known as the "antibody" of each file and program.

[0031] Each protected host 12 has a host agent 16, preferably impl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and unwanted or unknown software. The system can implement centralized policies that allow an administrator to approve, block, quarantine, or log file activities. The system maintains file meta-information in the hosts and in the server. A host detects file operations which can cause changes to file content or file name, and updates the host and / or server meta-information as a result. Changes in server meta-information are made available to hosts.

Description

Background technique [0001] Large enterprises have large information technology (IT) security budgets and layered IT security systems, but network compromise, damage from viruses and worms, and spyware issues are common. Current IT security technologies are expensive to maintain and do not provide protection against new or unknown threats, which are being distributed, detected and reported at an increasing rate. [0002] Security solutions located at the network perimeter, such as firewalls, have visibility limited to network traffic directly passing through them. Input vectors such as email viruses, web browser exploits, wireless access, VPNs, instant messaging, and file sharing create increasingly permeable perimeters that bypass these technologies. It is difficult to define perimeters in modern networks that provide sufficient control and visibility. Many attacks generate network traffic only after they have compromised a machine or network. For example, by the time a vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L63/14H04L63/20G06F21/55
Inventor 托德·F·布伦南艾伦·希拉里约翰·汉拉蒂
Owner CARBON BLACK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products