SYSTEM AND METHOD OF UTILIZING SECURITY DEVICE PLUGIN FOR EXTERNAL DEVICE MONITORING AND CONTROL IN A SECURED ENVIRONMENT

    公开(公告)号:US20210294616A1

    公开(公告)日:2021-09-23

    申请号:US17338474

    申请日:2021-06-03

    IPC分类号: G06F9/445 H04L29/06 H04L29/08

    摘要: A new approach is proposed that contemplates systems and methods to support utilizing security device plugins for external device control and monitoring in a secured environment. A plugin that implements one or more functionalities to communicate with and to control operations of an external device is provided to a network security device/appliance. The plugin is then loaded to the network security appliance and integrated with a software running on the network security device, wherein the software obtains the functionalities offered by the plugin. A communication link is established between the plugin of the network security device and the external device following a communication protocol. The network security device is then configured to issue/receive one or more commands to/from the external device following the communication protocol to monitor and collect information from and/or control or be controlled by the external device remotely.

    Method and apparatus for neutralizing real cyber threats to training materials

    公开(公告)号:US11100811B2

    公开(公告)日:2021-08-24

    申请号:US16358537

    申请日:2019-03-19

    发明人: Fleming Shi

    IPC分类号: G09B19/00 H04L29/06

    摘要: An approach is proposed to support neutralizing real cyber threats to training materials by intercepting, modifying and redistributing active content(s) of an email arrived at a recipient's email account. Specifically, when the recipient triggers an active content such as an URL link embedded in and/or opens an attachment to the email, the triggered active content is synchronously intercepted and examined in real time for potential malicious intent of a phishing attack. If the active content is determined to be malicious, the malicious active content in the email is then disassembled and deactivated while the payload is reconstructed with links and markings for training purposes. The recipient is then provided with an anti-phishing training exercise, wherein content of the training exercise is specifically customized for the recipient based on the reconstructed payload of the received email and/or the recipient's security posture and awareness.

    SYSTEM AND METHOD OF UTILIZING NETWORK SECURITY DEVICES FOR INDUSTRIAL DEVICE PROTECTION AND CONTROL

    公开(公告)号:US20200028821A1

    公开(公告)日:2020-01-23

    申请号:US16170859

    申请日:2018-10-25

    摘要: A new network security device/appliance is proposed to not only protect, but also to control and operate an industrial IoT device. Specifically, the network security device is configured to detect and block cyber attacks such as viruses, hacking attempts, and other types of cyber threats launched from an outside network against the industrial IoT device based on a set of configurable rules. In addition, the network security device is further configured to control and operate the industrial IoT device remotely in response to the cyber attacks by issuing and communicating certain instructions/command to the industrial IoT device. Besides accepting and executing control command from the network security device, the industrial IoT device is also configured to send a request to the network security device to make certain adjustments to the rules concerning network traffic directed to the industrial IoT device.

    Deployment of branded software
    75.
    发明授权
    Deployment of branded software 有权
    部署品牌软件

    公开(公告)号:US09465598B2

    公开(公告)日:2016-10-11

    申请号:US13920682

    申请日:2013-06-18

    发明人: Steve Frank

    IPC分类号: G06F9/445

    CPC分类号: G06F8/61 G06F8/63

    摘要: A system for branding and deploying backup software includes a branding interface, a branding database, and an installer-generating server. The branding interface receives branding data from a partner associated with a partner machine. The branding database stores the received branding data. The installer-generating server generates a generic full installer capable of installing a software program and generates a branded installation shell in response to a request from the partner and using the stored branding data. The branded installation shell, when executed by the partner machine, retrieves the generic full installer from the installer-generating server. The branded installation shell causes the generic full installer to install in a branded location on the partner machine to make it appear as if the partner generated the software program installed by the generic full installer. Related apparatus, systems, techniques, and articles are also described.

    摘要翻译: 用于品牌和部署备份软件的系统包括品牌界面,品牌数据库和安装程序生成服务器。 品牌界面从与伙伴机器相关联的合作伙伴接收品牌数据。 品牌数据库存储接收到的品牌数据。 安装程序生成服务器生成可以安装软件程序的通用完整安装程序,并响应于来自合作伙伴的请求并使用存储的品牌数据生成品牌安装shell。 品牌安装shell由伙伴机器执行时,从安装程序生成服务器检索通用的完整安装程序。 品牌安装外壳使通用的完整安装程序安装在合作伙伴机器上的品牌位置,使其看起来像合作伙伴生成由通用完全安装程序安装的软件程序。 还描述了相关装置,系统,技术和制品。

    Configuring a plurality of diverse devices/services from an adaptive configuration control hyper-server apparatus
    76.
    发明授权
    Configuring a plurality of diverse devices/services from an adaptive configuration control hyper-server apparatus 有权
    从自适应配置控制超服务器设备配置多个不同的设备/服务

    公开(公告)号:US09021017B2

    公开(公告)日:2015-04-28

    申请号:US13225428

    申请日:2011-09-03

    摘要: When each new device or service is installed into a network, a hyper-server reads a configuration description provided by the new device or service and adapts to provide a user interface for configuring its capabilities. A first server gathers descriptions of available commands and parameters from many diverse devices and services. A second server presents an administrator or operator with a control panel for one or many client devices. The panel presentation changes with respect to the devices or services selected. The hyper-server registers the capabilities of each device or service and transfers the commands and parameter settings to the appropriate device or service under configuration control.

    摘要翻译: 当每个新的设备或服务安装到网络中时,超级服务器读取由新设备或服务提供的配置描述,并且适应于提供用于配置其能力的用户界面。 第一台服务器从许多不同的设备和服务中收集可用命令和参数的描述。 第二个服务器向管理员或操作员显示一个或多个客户端设备的控制面板。 面板显示相对于所选择的设备或服务发生变化。 超级服务器注册每个设备或服务的功能,并将命令和参数设置传输到配置控制下的相应设备或服务。

    SYSTEMS AND METHODS FOR TRANSPARENT PER-FILE ENCRYPTION AND DECRYPTION VIA METADATA IDENTIFICATION
    77.
    发明申请
    SYSTEMS AND METHODS FOR TRANSPARENT PER-FILE ENCRYPTION AND DECRYPTION VIA METADATA IDENTIFICATION 审中-公开
    通过元数据识别进行透明加密和分解的系统和方法

    公开(公告)号:US20140258720A1

    公开(公告)日:2014-09-11

    申请号:US14203974

    申请日:2014-03-11

    IPC分类号: G06F21/62

    CPC分类号: G06F21/6218 G06F21/52

    摘要: A new approach is proposed that contemplates systems and methods to support encryption and decryption of files including data and source code associated with a software application running in a virtual environment on a per-file basis outside of a kernel of an operating system. The proposed approach utilizes metadata of the files associated with the software application to determine the files to be encrypted and decrypted and to monitor various properties of the files including the sizes of the unencrypted files for accurate reporting of information about the files. Under such an approach, the source code of the applications are encrypted and decrypted transparently at the file level without modifying or altering any of the source code of the application, the kernel and libraries of the operating system, and/or any components which are proprietary to the virtual environment.

    摘要翻译: 提出了一种新的方法,其考虑了系统和方法来支持文件的加密和解密,包括与在操作系统的内核之外的每个文件的虚拟环境中运行的软件应用程序相关联的数据和源代码。 所提出的方法利用与软件应用程序相关联的文件的元数据来确定要加密和解密的文件,并且监视文件的各种属性,包括用于准确地报告关于文件的信息的未加密文件的大小。 在这种方法下,应用程序的源代码在文件级别被透明地加密和解密,而无需修改或更改应用程序的任何源代码,操作系统的内核和库,以及/或专有的任何组件 到虚拟环境。

    Apparatus, and system for determining and cautioning users of internet connected clients of potentially malicious software and method for operating such
    78.
    发明授权
    Apparatus, and system for determining and cautioning users of internet connected clients of potentially malicious software and method for operating such 有权
    用于确定和警惕互联网连接客户端潜在恶意软件的用户的装置和系统及其操作方法

    公开(公告)号:US08726384B2

    公开(公告)日:2014-05-13

    申请号:US13091293

    申请日:2011-04-21

    IPC分类号: H04L29/06

    CPC分类号: H04L67/22 H04L63/1416

    摘要: A system at a central server and at a plurality of web filters is installed to observe traffic and to protect users from attempting connection to suspicious, malicious, and/or infectious targets. Targets are defined as Uniform Resource Identifiers (URI) and Internet Protocol (IP) addresses. Traffic is collected, analyzed, and reported for further analysis. Behavior is analyzed for each client attempting a connection to an uncategorized target. IP addresses and URIs are evaluated toward placement in either a Trusted target store or an Anomalous target store. The accumulated content of Anomalous target store is provided back to the Network Service Subscriber Clients. Warnings and tools are presented when appropriate.

    摘要翻译: 安装中央服务器和多个网页过滤器处的系统以观察流量并保护用户尝试连接到可疑,恶意和/或感染目标。 目标定义为统一资源标识符(URI)和互联网协议(IP)地址。 交通收集,分析和报告进一步分析。 分析每个客户端尝试连接到未分类目标的行为。 对可信目标存储或异常目标存储中的位置进行IP地址和URI的评估。 异常目标存储的累积内容提供给网络服务用户客户端。 在适当的时候提供警告和工具。

    Point of recordation terminal apparatus and method of operation
    79.
    发明申请
    Point of recordation terminal apparatus and method of operation 审中-公开
    记录点终端设备及操作方法

    公开(公告)号:US20140104420A1

    公开(公告)日:2014-04-17

    申请号:US13666875

    申请日:2012-11-01

    IPC分类号: H04N7/18

    摘要: A system for providing video intelligence as a service to a plurality of small and medium sized enterprises to distributed video recordation equipment, comprising an apparatus and computer-implemented method. An apparatus comprises a point of recordation terminal apparatus coupled to a public network. A method for operating a system for video intelligence in a public network in a secure manner.

    摘要翻译: 一种用于向多个中小型企业提供视频智能作为分发视频记录设备的系统,包括装置和计算机实现的方法。 一种装置包括耦合到公共网络的记录终端装置的点。 一种用于以安全的方式在公共网络中操作用于视频智能的系统的方法。

    SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT
    80.
    发明申请
    SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT 审中-公开
    系统和网络安全代理方法用于认证授权执行

    公开(公告)号:US20140101442A1

    公开(公告)日:2014-04-10

    申请号:US14103782

    申请日:2013-12-11

    IPC分类号: H04L9/32

    摘要: Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server when a CA is deprecated or has fraudulent certificate generation. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. The apparatus protects an endpoint from a man-in-the-middle attack when a certificate authority has lost control over certificates used in TLS.

    摘要翻译: 启用网络安全管理员可以使用可自定义的证书颁发机构信誉策略存储区撤销证书,当存在CA不推荐使用或产生欺诈性证书时,它将由独立的证书颁发机构信誉服务器通知。 自定义策略存储覆盖操作系统Web网络层或第三方浏览器可访问的受信任的根证书存储。 导入撤销列表或更新浏览器或操作系统是多余的。 当证书颁发机构已经失去对TLS中使用的证书的控制时,该设备保护端点免受中间人攻击。