会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Systems and methods for blocking flanking attacks on computing systems
    • 阻止计算机系统侧翼攻击的系统和方法
    • US09225735B1
    • 2015-12-29
    • US14139829
    • 2013-12-23
    • Symantec Corporation
    • Deb Banerjee
    • H04L29/06G06F21/55
    • H04L63/08G06F21/55G06F21/554H04L63/105H04L63/1416H04L63/1458H04L63/20
    • A computer-implemented method for blocking flanking attacks on computing systems may include (1) detecting a denial-of-service attack targeting a computing network, (2) inferring, based at least in part on detecting the denial-of-service attack, a secondary attack targeting at least one computing resource within the computing network, (3) determining that the computing resource is subject to additional protection based on inferring the secondary attack targeting the computing resource, and (4) protecting the computing resource against the secondary attack by adding an authentication requirement for accessing the computing resource. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于阻止对计算系统的侧向攻击的计算机实现的方法可以包括(1)检测针对计算网络的拒绝服务攻击,(2)至少部分地基于检测到拒绝服务攻击来推断, 针对计算网络内的至少一个计算资源的次要攻击,(3)基于推断针对计算资源的二次攻击来确定计算资源受到额外保护,以及(4)保护计算资源免受次要攻击 通过添加访问计算资源的认证要求。 还公开了各种其它方法,系统和计算机可读介质。
    • 6. 发明授权
    • Enforcing policy-based compliance of virtual machine image configurations
    • 执行虚拟机映像配置的基于策略的合规性
    • US09448826B2
    • 2016-09-20
    • US13838929
    • 2013-03-15
    • Symantec Corporation
    • Deb Banerjee
    • G06F9/455G06F21/53
    • G06F9/45533G06F21/53G06F2009/45575G06F2009/45587
    • Techniques are disclosed for data risk management in accessing an Infrastructure as a Service (IaaS) cloud network. More specifically, embodiments of the invention evaluate virtual machine images launched in cloud-based environments for compliance with a policy. After intercepting a virtual machine image launch request, an intermediary policy management engine determines whether the request conforms to a policy defined by a policy manager, e.g., an enterprise's information security officer. The policy may be based on user identities, virtual machine image attributes, data classifications, or other criteria. Upon determining whether the request conforms to policy, the policy management engine allows the request, blocks the request, or triggers a management approval workflow.
    • 公开了在访问基础架构即服务(IaaS)云网络时进行数据风险管理的技术。 更具体地,本发明的实施例评估在基于云的环境中启动的符合策略的虚拟机映像。 在拦截虚拟机映像启动请求之后,中间策略管理引擎确定请求是否符合由策略管理器(例如企业的信息安全员)定义的策略。 该策略可以基于用户身份,虚拟机图像属性,数据分类或其他标准。 在确定请求是否符合策略后,策略管理引擎允许请求,阻止请求或触发管理批准工作流程。
    • 8. 发明授权
    • Systems and methods for scanning data stored on cloud computing platforms
    • 用于扫描存储在云计算平台上的数据的系统和方法
    • US09104859B1
    • 2015-08-11
    • US13925357
    • 2013-06-24
    • Symantec Corporation
    • Deb Banerjee
    • H04L29/06G06F21/00G06F21/50
    • G06F21/554G06F21/562G06F2221/033H04L63/1408
    • A computer-implemented method for scanning data stored on cloud computing platforms may include (1) identifying a cloud computing service that hosts a plurality of cloud computing instances and a plurality of data volumes that store data for the plurality of cloud computing instances, (2) determining that a data volume within the plurality of data volumes that stores data for a cloud computing instance within the plurality of cloud computing instances is subject to a security scan, (3) detecting a computing system that is external to the cloud computing instance, and (4) performing the security scan on the data volume from the computing system that is external to the cloud computing instance instead of performing the security scan from within the cloud computing instance. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于扫描存储在云计算平台上的数据的计算机实现的方法可以包括(1)识别托管多个云计算实例的云计算服务和存储多个云计算实例的数据的多个数据卷(2 确定存储多个云计算实例内的云计算实例的数据的多个数据卷内的数据卷经受安全扫描,(3)检测云计算实例外部的计算系统, (4)从云计算实例外部的计算系统对数据卷进行安全扫描,而不是从云计算实例执行安全扫描。 还公开了各种其它方法,系统和计算机可读介质。