会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Multi-profile interface specific network security policies
    • 多配置界面特定的网络安全策略
    • US08201234B2
    • 2012-06-12
    • US11746478
    • 2007-05-09
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • H04L29/06
    • H04L63/20H04L63/0428H04L63/08
    • Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
    • 计算机可读介质,其上存储有用于定义表示网络安全策略的模式的数据结构。 数据结构包括第一数据字段,包括基于网络安全策略定义要应用的参数的数据。 网络安全策略定义以下至少一个:防火墙规则和连接安全规则。 数据结构还包括具有指定包含在第一数据字段中的参数的限制的数据的第二数据字段。 第一数据字段中的参数和第二数据字段中的限制形成用于表示要处理的网络安全策略的模式。 网络安全策略管理计算设备与至少一个其他计算设备之间的通信。
    • 4. 发明申请
    • Firewall control with multiple profiles
    • 具有多个配置文件的防火墙控制
    • US20080282336A1
    • 2008-11-13
    • US11891379
    • 2007-08-10
    • Gerardo Diaz CuellarDavid Abzarian
    • Gerardo Diaz CuellarDavid Abzarian
    • G06F9/00
    • H04L63/0263H04L63/20
    • A networked computer with a software firewall that may be configured for any of a number of network contexts may be quickly configured with an appropriate set of rules for a current network context. The computer has multiple profiles, each containing rules applicable to a different network context. When a change in network context is detected, a difference between the profile for the current context and the profile with which the firewall was previously configured is determined. These differences are applied to quickly reconfigure the firewall without blocking, even temporarily, communications that are allowed in the previously configured and current profiles. Additionally, when the networked computer is connected to multiple networks simultaneously, an appropriate profile may be selected.
    • 具有软件防火墙的联网计算机可以被配置用于许多网络环境中的任何一个,可以用当前网络上下文的适当的规则集来快速配置。 计算机具有多个配置文件,每个配置文件包含适用于不同网络环境的规则。 当检测到网络上下文的变化时,确定当前上下文的配置文件与先前配置了防火墙的配置文件之间的区别。 这些差异适用于快速重新配置防火墙,而不会阻塞(甚至暂时的)先前配置的和当前配置文件中允许的通信。 此外,当联网计算机同时连接到多个网络时,可以选择适当的配置文件。
    • 5. 发明申请
    • Remote configuration of software component using proxy
    • 使用代理远程配置软件组件
    • US20080028457A1
    • 2008-01-31
    • US11495412
    • 2006-07-28
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • G06F15/16
    • H04L63/1441H04L63/08
    • A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
    • 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。
    • 6. 发明授权
    • Monitoring remote access to an enterprise network
    • 监控企业网络的远程访问
    • US08775614B2
    • 2014-07-08
    • US13299975
    • 2011-11-18
    • Dhiraj K. GuptaGerardo Diaz-CuellarAshish SaxenaAbhishek Tiwari
    • Dhiraj K. GuptaGerardo Diaz-CuellarAshish SaxenaAbhishek Tiwari
    • G06F15/173
    • H04L63/10G06F11/3006G06F11/3065H04L63/0428H04L63/08H04L63/20H04L67/40
    • Techniques to provide an improved representation of remote network access for a network administrator managing and controlling access to resources on an enterprise network. The representation indicates resources accessed by a remote computer or by a user of that computer and provides associated information useful for managing remote network access. To create the representation, multiple security associations formed between a remote client computer and resources on the enterprise network are associated with entity sessions, based on identical session identifiers generated for each security association within an entity session. The entity sessions may be aggregated into a to DirectAccess “connection” between the remote client computer and the enterprise network, based on an identity of the remote client computer. Resources accessed over the connection may be identified using a session identifier of each entity session so that security associations in that entity session may be matched with the resources.
    • 为网络管理员提供远程网络访问的改进表示的技术,管理和控制对企业网络上的资源的访问。 该表示指示由远程计算机或该计算机的用户访问的资源,并提供对管理远程网络访问有用的相关信息。 为了创建表示,基于为实体会话期间的每个安全关联生成的相同的会话标识符,在远程客户端计算机和企业网络上的资源之间形成的多个安全关联与实体会话相关联。 基于远程客户端计算机的身份,实体会话可以聚合到远程客户端计算机和企业网络之间的DirectAccess“连接”中。 可以使用每个实体会话的会话标识符来识别通过连接访问的资源,使得该实体会话中的安全关联可以与资源匹配。
    • 7. 发明授权
    • Firewall installer
    • 防火墙安装程序
    • US08266685B2
    • 2012-09-11
    • US11804409
    • 2007-05-18
    • David AbzarianEran YarivEmanuel PaleologuGerardo Diaz CuellarIan Carbaugh
    • David AbzarianEran YarivEmanuel PaleologuGerardo Diaz CuellarIan Carbaugh
    • H04L29/06
    • H04L63/0263G06F8/61G06F9/44505G06F21/57H04L41/0806H04L41/082
    • Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative format that describes one or more rules to be implemented by the firewall, and that automatically configures the firewall. Providing a firewall installer that is capable of configuring a firewall based upon declarative input rather than procedural process-oriented input facilitates administration of a firewall by allowing an administrator to specify desired firewall configuration at a higher, declarative level and frees the administrator from the need to specify procedures for implementing configuration changes in the firewall. In one embodiment of the invention, the firewall installer can receive and store input for configuring a firewall even when the firewall is not running, such that the firewall executes on those configuration changes when it next comes online.
    • 本发明的实施例涉及一种防火墙安装程序,其接收一组配置指令,用于以说明性格式配置防火墙,该声明性格式描述要由防火墙实现的一个或多个规则,并且自动配置防火墙。 提供能够基于声明性输入而不是过程性过程导向输入配置防火墙的防火墙安装程序,通过允许管理员以更高的声明级别指定所需的防火墙配置,从而有助于管理防火墙,并释放管理员不需要 指定在防火墙中实现配置更改的过程。 在本发明的一个实施例中,防火墙安装者可以接收和存储用于配置防火墙的输入,即使在防火墙未运行时,防火墙安装者也可以接收和存储用于配置防火墙的输入,使得防火墙在下一次联机时对这些配置更改执行。
    • 9. 发明授权
    • Remote configuration of software component using proxy
    • 使用代理远程配置软件组件
    • US07836495B2
    • 2010-11-16
    • US11495412
    • 2006-07-28
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • G06F9/00
    • H04L63/1441H04L63/08
    • A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
    • 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。
    • 10. 发明申请
    • Determining a merged security policy for a computer system
    • 确定计算机系统的合并安全策略
    • US20090007219A1
    • 2009-01-01
    • US11823837
    • 2007-06-28
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • G06F17/00
    • H04L63/20G06F21/577H04L63/0263
    • Embodiments of the invention described herein are directed to a mechanism for determining whether at least one operation will be effective in view of at least one security policy. In exemplary implementations, determining whether at least one operation will be effective in view of at least one security policy may comprise determining a merged security policy for a computer system by merging security policies for the computer system from two or more sources. The security policies may be security policies set by a user and/or an administrator of the computer system, may be security policies of a computer network to which the computer system is connected, or may be security policies of one or more other computer systems that are above the computer system in a computer network hierarchy.
    • 本文描述的本发明的实施例涉及用于根据至少一个安全策略来确定至少一个操作是否有效的机制。 在示例性实现中,鉴于至少一个安全策略确定至少一个操作是否有效可以包括通过从两个或更多个源合并计算机系统的安全策略来确定计算机系统的合并安全策略。 安全策略可以是由用户和/或计算机系统的管理员设置的安全策略,可以是计算机系统连接到的计算机网络的安全策略,或者可以是一个或多个其他计算机系统的安全策略, 在计算机网络层次结构中的计算机系统之上。