会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • METHODS FOR INSPECTING SECURITY CERTIFICATES BY NETWORK SECURITY DEVICES TO DETECT AND PREVENT THE USE OF INVALID CERTIFICATES
    • 网络安全设备检测安全证书的方法,以检测和防止使用无效证书
    • US20120167212A1
    • 2012-06-28
    • US13411567
    • 2012-03-04
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • G06F21/00H04L29/06G06F11/00
    • H04L63/0823H04L9/3268H04L63/1408
    • Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.
    • 披露了检查安全证书的方法和媒体。 方法包括以下步骤:由网络安全设备扫描服务器和客户端系统之间的安全协议的消息; 检测具有安全证书的消息; 从消息中检测可疑安全证书; 并中止与可疑证书相关联的安全协议的特定会话。 优选地,仅对服务器证书记录的消息执行扫描步骤。 优选地,该方法还包括向服务器和客户端系统发送无效证书通知的步骤。 优选地,检测可疑证书的步骤包括检测证书的使用不正确生成的私钥。 优选地,检测可疑证书的步骤包括检测证书的撤销信息的不可用性。 优选地,检测可疑证书的步骤包括检测对证书的无效加密算法的使用。
    • 7. 发明授权
    • Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
    • 网络安全设备检查安全证书以检测和防止使用无效证书的方法
    • US08850576B2
    • 2014-09-30
    • US13411567
    • 2012-03-04
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • H04L29/06H04L9/32
    • H04L63/0823H04L9/3268H04L63/1408
    • Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.
    • 披露了检查安全证书的方法和媒体。 方法包括以下步骤:由网络安全设备扫描服务器和客户端系统之间的安全协议的消息; 检测具有安全证书的消息; 从消息中检测可疑安全证书; 并中止与可疑证书相关联的安全协议的特定会话。 优选地,仅对服务器证书记录的消息执行扫描步骤。 优选地,该方法还包括向服务器和客户端系统发送无效证书通知的步骤。 优选地,检测可疑证书的步骤包括检测证书的使用不正确生成的私钥。 优选地,检测可疑证书的步骤包括检测证书的撤销信息的不可用性。 优选地,检测可疑证书的步骤包括检测对证书的无效加密算法的使用。
    • 8. 发明授权
    • Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
    • 网络安全设备检查安全证书以检测和防止使用无效证书的方法
    • US08146159B2
    • 2012-03-27
    • US12356117
    • 2009-01-20
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • G06F11/00G06F7/04H04L29/06
    • H04L63/0823H04L9/3268H04L63/1408
    • Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of: sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.
    • 披露了检查安全证书的方法和媒体。 方法包括以下步骤:由网络安全设备扫描服务器和客户端系统之间的安全协议的消息; 检测具有安全证书的消息; 从消息中检测可疑安全证书; 并中止与可疑证书相关联的安全协议的特定会话。 优选地,仅对服务器证书记录的消息执行扫描步骤。 优选地,该方法还包括以下步骤:向服务器和客户端系统发送无效证书通知。 优选地,检测可疑证书的步骤包括检测证书的使用不正确生成的私钥。 优选地,检测可疑证书的步骤包括检测证书的撤销信息的不可用性。 优选地,检测可疑证书的步骤包括检测对证书的无效加密算法的使用。
    • 9. 发明申请
    • METHODS FOR INSPECTING SECURITY CERTIFICATES BY NETWORK SECURITY DEVICES TO DETECT AND PREVENT THE USE OF INVALID CERTIFICATES
    • 网络安全设备检测安全证书的方法,以检测和防止使用无效证书
    • US20100186086A1
    • 2010-07-22
    • US12356117
    • 2009-01-20
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • G06F21/00
    • H04L63/0823H04L9/3268H04L63/1408
    • Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of: sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.
    • 披露了检查安全证书的方法和媒体。 方法包括以下步骤:由网络安全设备扫描服务器和客户端系统之间的安全协议的消息; 检测具有安全证书的消息; 从消息中检测可疑安全证书; 并中止与可疑证书相关联的安全协议的特定会话。 优选地,仅对服务器证书记录的消息执行扫描步骤。 优选地,该方法还包括以下步骤:向服务器和客户端系统发送无效证书通知。 优选地,检测可疑证书的步骤包括检测证书的使用不正确生成的私钥。 优选地,检测可疑证书的步骤包括检测证书的撤销信息的不可用性。 优选地,检测可疑证书的步骤包括检测对证书的无效加密算法的使用。