会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Method for detecting unauthorized access and network monitoring apparatus
    • 用于检测未经授权的访问和网络监控设备的方法
    • US09203848B2
    • 2015-12-01
    • US14015439
    • 2013-08-30
    • FUJITSU LIMITED
    • Yuki FujishimaMasanobu Morinaga
    • H04L29/06
    • H04L63/1408
    • A method for detecting unauthorized access is executed by a network monitoring apparatus connected to a network in which packets are transmitted between a plurality of information processing apparatuses. The method includes obtaining, by the network monitoring apparatus, packets regarding at least one access performed from a first information processing apparatus to a second information processing apparatus. The method includes selecting at least one condition from among predefined at least two conditions. The selection is performed according to a combination between the first information processing apparatus as an access source and the second information processing apparatus as an access destination. The method includes determining whether each of the obtained packets satisfies the selected at least one condition. The method includes determining a possibility that unauthorized access has been performed on the second information processing apparatus, based on a number of conditions determined to be satisfied.
    • 用于检测未授权访问的方法由连接到其中分组在多个信息处理设备之间传送的网络的网络监视设备执行。 该方法包括由网络监视装置获取关于从第一信息处理装置执行的至少一次访问到第二信息处理装置的分组。 该方法包括从预定的至少两个条件中选择至少一个条件。 根据作为访问源的第一信息处理装置和作为访问目的地的第二信息处理装置之间的组合进行选择。 该方法包括确定所获得的分组中的每一个是否满足所选择的至少一个条件。 该方法包括基于确定要满足的条件的数量来确定已经对第二信息处理装置执行未授权访问的可能性。
    • 4. 发明申请
    • METHOD FOR DETECTING UNAUTHORIZED ACCESS AND NETWORK MONITORING APPARATUS
    • 用于检测未经授权的访问和网络监控设备的方法
    • US20140115663A1
    • 2014-04-24
    • US14015439
    • 2013-08-30
    • FUJITSU LIMITED
    • Yuki FUJISHIMAMasanobu Morinaga
    • H04L29/06
    • H04L63/1408
    • A method for detecting unauthorized access is executed by a network monitoring apparatus connected to a network in which packets are transmitted between a plurality of information processing apparatuses. The method includes obtaining, by the network monitoring apparatus, packets regarding at least one access performed from a first information processing apparatus to a second information processing apparatus. The method includes selecting at least one condition from among predefined at least two conditions. The selection is performed according to a combination between the first information processing apparatus as an access source and the second information processing apparatus as an access destination. The method includes determining whether each of the obtained packets satisfies the selected at least one condition. The method includes determining a possibility that unauthorized access has been performed on the second information processing apparatus, based on a number of conditions determined to be satisfied.
    • 用于检测未授权访问的方法由连接到其中分组在多个信息处理设备之间传送的网络的网络监视设备执行。 该方法包括由网络监视装置获取关于从第一信息处理装置执行的至少一次访问到第二信息处理装置的分组。 该方法包括从预定的至少两个条件中选择至少一个条件。 根据作为访问源的第一信息处理装置和作为访问目的地的第二信息处理装置之间的组合进行选择。 该方法包括确定所获得的分组中的每一个是否满足所选择的至少一个条件。 该方法包括基于确定要满足的条件的数量来确定已经对第二信息处理装置执行未授权访问的可能性。