JP7088913B2 - 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 - Google Patents
脅威を検出するための動的ポリシーの導入およびアクセスの可視化 Download PDFInfo
- Publication number
- JP7088913B2 JP7088913B2 JP2019514755A JP2019514755A JP7088913B2 JP 7088913 B2 JP7088913 B2 JP 7088913B2 JP 2019514755 A JP2019514755 A JP 2019514755A JP 2019514755 A JP2019514755 A JP 2019514755A JP 7088913 B2 JP7088913 B2 JP 7088913B2
- Authority
- JP
- Japan
- Prior art keywords
- policy
- data
- user
- access
- execution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Debugging And Monitoring (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2022093754A JP7358564B2 (ja) | 2016-09-16 | 2022-06-09 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2023165968A JP7595723B2 (ja) | 2016-09-16 | 2023-09-27 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2024201627A JP2025024129A (ja) | 2016-09-16 | 2024-11-19 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662396016P | 2016-09-16 | 2016-09-16 | |
| US62/396,016 | 2016-09-16 | ||
| US201762447759P | 2017-01-18 | 2017-01-18 | |
| US62/447,759 | 2017-01-18 | ||
| PCT/US2017/051886 WO2018053337A1 (en) | 2016-09-16 | 2017-09-15 | Dynamic policy injection and access visualization for threat detection |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2022093754A Division JP7358564B2 (ja) | 2016-09-16 | 2022-06-09 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2019535068A JP2019535068A (ja) | 2019-12-05 |
| JP2019535068A5 JP2019535068A5 (https=) | 2020-10-01 |
| JP7088913B2 true JP7088913B2 (ja) | 2022-06-21 |
Family
ID=59982502
Family Applications (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2019514755A Active JP7088913B2 (ja) | 2016-09-16 | 2017-09-15 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2022093754A Active JP7358564B2 (ja) | 2016-09-16 | 2022-06-09 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2023165968A Active JP7595723B2 (ja) | 2016-09-16 | 2023-09-27 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2024201627A Pending JP2025024129A (ja) | 2016-09-16 | 2024-11-19 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
Family Applications After (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2022093754A Active JP7358564B2 (ja) | 2016-09-16 | 2022-06-09 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2023165968A Active JP7595723B2 (ja) | 2016-09-16 | 2023-09-27 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
| JP2024201627A Pending JP2025024129A (ja) | 2016-09-16 | 2024-11-19 | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 |
Country Status (5)
| Country | Link |
|---|---|
| US (4) | US10432671B2 (https=) |
| EP (1) | EP3513543B1 (https=) |
| JP (4) | JP7088913B2 (https=) |
| CN (1) | CN109792439B (https=) |
| WO (1) | WO2018053337A1 (https=) |
Families Citing this family (120)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8881289B2 (en) * | 2011-10-18 | 2014-11-04 | Mcafee, Inc. | User behavioral risk assessment |
| US9832678B1 (en) | 2015-01-13 | 2017-11-28 | Syniverse Technologies, Llc | Traffic hub system to provide roaming service in a wireless environment |
| US10204211B2 (en) | 2016-02-03 | 2019-02-12 | Extrahop Networks, Inc. | Healthcare operations with passive network monitoring |
| US9729416B1 (en) | 2016-07-11 | 2017-08-08 | Extrahop Networks, Inc. | Anomaly detection using device relationship graphs |
| US10432671B2 (en) | 2016-09-16 | 2019-10-01 | Oracle International Corporation | Dynamic policy injection and access visualization for threat detection |
| US10855783B2 (en) * | 2017-01-23 | 2020-12-01 | Adobe Inc. | Communication notification trigger modeling preview |
| US10476673B2 (en) | 2017-03-22 | 2019-11-12 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
| US10721239B2 (en) | 2017-03-31 | 2020-07-21 | Oracle International Corporation | Mechanisms for anomaly detection and access management |
| US11032307B2 (en) | 2017-04-30 | 2021-06-08 | Splunk Inc. | User interface for defining custom threat rules in a network security system |
| US10810316B2 (en) * | 2017-05-15 | 2020-10-20 | International Business Machines Corporation | Updating monitoring systems using merged data policies |
| US11632382B2 (en) | 2017-05-15 | 2023-04-18 | Forcepoint Llc | Anomaly detection using endpoint counters |
| US11949700B2 (en) | 2017-05-15 | 2024-04-02 | Forcepoint Llc | Using content stored in an entity behavior catalog in combination with an entity risk score |
| US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
| US10510014B2 (en) * | 2017-05-31 | 2019-12-17 | Microsoft Technology Licensing, Llc | Escalation-compatible processing flows for anti-abuse infrastructures |
| US10666508B2 (en) * | 2017-06-09 | 2020-05-26 | Nicira, Inc. | Unified software defined networking configuration management over multiple hosting environments |
| US10601847B2 (en) * | 2017-06-22 | 2020-03-24 | Cisco Technology, Inc. | Detecting user behavior activities of interest in a network |
| US10318729B2 (en) | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
| US10999324B2 (en) | 2017-08-01 | 2021-05-04 | Forcepoint, LLC | Direct-connect web endpoint |
| US10764295B2 (en) * | 2017-08-08 | 2020-09-01 | International Business Machines Corporation | Monitoring service policy management |
| US10063434B1 (en) | 2017-08-29 | 2018-08-28 | Extrahop Networks, Inc. | Classifying applications or activities based on network behavior |
| US9967292B1 (en) | 2017-10-25 | 2018-05-08 | Extrahop Networks, Inc. | Inline secret sharing |
| US11979422B1 (en) * | 2017-11-27 | 2024-05-07 | Lacework, Inc. | Elastic privileges in a secure access service edge |
| US20230328086A1 (en) * | 2017-11-27 | 2023-10-12 | Lacework, Inc. | Detecting Anomalous Behavior Using A Browser Extension |
| US11017126B2 (en) * | 2017-12-19 | 2021-05-25 | Western Digital Technologies, Inc. | Apparatus and method of detecting potential security violations of direct access non-volatile memory device |
| US11061799B1 (en) | 2017-12-28 | 2021-07-13 | Cerner Innovation, Inc. | Log analysis application |
| US10264003B1 (en) * | 2018-02-07 | 2019-04-16 | Extrahop Networks, Inc. | Adaptive network monitoring with tuneable elastic granularity |
| US10389574B1 (en) | 2018-02-07 | 2019-08-20 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
| US10038611B1 (en) | 2018-02-08 | 2018-07-31 | Extrahop Networks, Inc. | Personalization of alerts based on network monitoring |
| US10270794B1 (en) | 2018-02-09 | 2019-04-23 | Extrahop Networks, Inc. | Detection of denial of service attacks |
| US10652266B1 (en) * | 2018-02-28 | 2020-05-12 | Amazon Technologies, Inc. | Automated threat modeling using machine-readable threat models |
| US11044271B1 (en) * | 2018-03-15 | 2021-06-22 | NortonLifeLock Inc. | Automatic adaptive policy based security |
| US10958649B2 (en) * | 2018-03-21 | 2021-03-23 | Akamai Technologies, Inc. | Systems and methods for internet-wide monitoring and protection of user credentials |
| US10789355B1 (en) * | 2018-03-28 | 2020-09-29 | Proofpoint, Inc. | Spammy app detection systems and methods |
| US11303667B2 (en) * | 2018-04-25 | 2022-04-12 | Illusive Networks Ltd | Organization attack surface management |
| US10116679B1 (en) | 2018-05-18 | 2018-10-30 | Extrahop Networks, Inc. | Privilege inference and monitoring based on network behavior |
| US10887307B1 (en) * | 2018-06-25 | 2021-01-05 | Ca, Inc. | Systems and methods for identifying users |
| US11108823B2 (en) | 2018-07-31 | 2021-08-31 | International Business Machines Corporation | Resource security system using fake connections |
| US10411978B1 (en) | 2018-08-09 | 2019-09-10 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
| US11025641B2 (en) * | 2018-08-21 | 2021-06-01 | Bank Of America Corporation | System for optimizing access control for server privilege |
| US10594718B1 (en) | 2018-08-21 | 2020-03-17 | Extrahop Networks, Inc. | Managing incident response operations based on monitored network activity |
| US11310237B2 (en) | 2018-08-28 | 2022-04-19 | Cobalt Iron, Inc. | Dynamic authorization control system and method |
| US10999290B2 (en) * | 2018-08-28 | 2021-05-04 | Cobalt Iron, Inc. | Dynamic authorization control system and method |
| US11500997B1 (en) * | 2018-09-20 | 2022-11-15 | Bentley Systems, Incorporated | ICS threat modeling and intelligence framework |
| CN110943961B (zh) | 2018-09-21 | 2022-06-21 | 阿里巴巴集团控股有限公司 | 数据处理方法、设备以及存储介质 |
| US11012468B2 (en) * | 2018-10-30 | 2021-05-18 | Okta, Inc. | Detecting and responding to attempts to gain unauthorized access to user accounts in an online system |
| CN111147371B (zh) * | 2018-11-02 | 2022-03-11 | 华为技术有限公司 | 处理路由事件记录表项的方法、网络设备和控制设备 |
| US10904250B2 (en) | 2018-11-07 | 2021-01-26 | Verizon Patent And Licensing Inc. | Systems and methods for automated network-based rule generation and configuration of different network devices |
| US10885186B2 (en) | 2018-11-13 | 2021-01-05 | Forcepoint, LLC | System and method for operating a protected endpoint device |
| EP3748562A1 (en) | 2019-05-08 | 2020-12-09 | EXFO Solutions SAS | Timeline visualization & investigation systems and methods for time lasting events |
| US10965702B2 (en) | 2019-05-28 | 2021-03-30 | Extrahop Networks, Inc. | Detecting injection attacks using passive network monitoring |
| US11233754B2 (en) * | 2019-06-11 | 2022-01-25 | Livechat Software S.A | Real-time chat message preview enabling to view the message during the writing process |
| US11632373B2 (en) * | 2019-06-18 | 2023-04-18 | Microsoft Technology Licensing, Llc | Activity based authorization for accessing and operating enterprise infrastructure |
| GB201910654D0 (en) * | 2019-07-25 | 2019-09-11 | Palantir Technologies Inc | System event detection system and method |
| US11165814B2 (en) | 2019-07-29 | 2021-11-02 | Extrahop Networks, Inc. | Modifying triage information based on network monitoring |
| US10742530B1 (en) | 2019-08-05 | 2020-08-11 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
| US11388072B2 (en) | 2019-08-05 | 2022-07-12 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
| CN110471655B (zh) * | 2019-08-19 | 2023-08-01 | 浪潮云信息技术股份公司 | 一种对象存储中Bucket权限的图形化展示与验证方法 |
| US10742677B1 (en) | 2019-09-04 | 2020-08-11 | Extrahop Networks, Inc. | Automatic determination of user roles and asset types based on network monitoring |
| US11388175B2 (en) * | 2019-09-05 | 2022-07-12 | Cisco Technology, Inc. | Threat detection of application traffic flows |
| CN112787837A (zh) * | 2019-11-07 | 2021-05-11 | 华为技术有限公司 | 数据共享的方法、设备及系统 |
| CN111178064B (zh) * | 2019-12-13 | 2022-11-29 | 深圳平安医疗健康科技服务有限公司 | 基于字段分词处理的信息推送方法、装置和计算机设备 |
| US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
| CN111327607B (zh) * | 2020-02-13 | 2022-11-01 | 重庆特斯联智慧科技股份有限公司 | 一种基于大数据的安全威胁情报管理方法、系统、存储介质及终端 |
| KR102156891B1 (ko) * | 2020-02-25 | 2020-09-16 | 주식회사 에프원시큐리티 | 인공지능 머신러닝 행위 기반 웹 프로토콜 분석을 통한 웹 공격 탐지 및 차단 시스템 및 방법 |
| CN111447202B (zh) * | 2020-03-24 | 2021-03-30 | 江苏易安联网络技术有限公司 | 一种安全策略可视化编排系统 |
| JP7487769B2 (ja) * | 2020-03-27 | 2024-05-21 | 日本電気株式会社 | 異常アクセス予測システム、異常アクセス予測方法および異常アクセス予測プログラム |
| US11283695B2 (en) * | 2020-04-21 | 2022-03-22 | Aviatrix Systems, Inc. | System and method for determination of network operation metrics and generation of network operation metrics visualizations |
| CN111562930A (zh) * | 2020-04-30 | 2020-08-21 | 深圳壹账通智能科技有限公司 | web应用安全的升级方法与系统 |
| US12309206B2 (en) * | 2020-08-09 | 2025-05-20 | Ericom Software Ltd. | System and method for creating access control policies for individual users, user groups, network host or network host groups through network traffic analysis |
| US11483351B2 (en) * | 2020-08-26 | 2022-10-25 | Cisco Technology, Inc. | Securing network resources from known threats |
| US11463466B2 (en) | 2020-09-23 | 2022-10-04 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
| EP4218212A4 (en) | 2020-09-23 | 2024-10-16 | ExtraHop Networks, Inc. | Monitoring encrypted network traffic |
| CN113395251B (zh) * | 2021-01-20 | 2024-06-14 | 腾讯科技(深圳)有限公司 | 一种机器学习安全场景检测方法及装置 |
| US11941020B2 (en) | 2021-02-26 | 2024-03-26 | Micro Focus Llc | Displaying query results using machine learning model-determined query results visualizations |
| US11902284B2 (en) * | 2021-03-05 | 2024-02-13 | Sap Se | Tenant user management in cloud database operation |
| US11838275B2 (en) | 2021-03-12 | 2023-12-05 | Forcepoint Llc | Web endpoint device having automatic switching between proxied and non-proxied communication modes |
| US11216580B1 (en) | 2021-03-12 | 2022-01-04 | Snowflake Inc. | Secure machine learning using shared data in a distributed database |
| US11526617B2 (en) | 2021-03-24 | 2022-12-13 | Bank Of America Corporation | Information security system for identifying security threats in deployed software package |
| US11868500B2 (en) | 2021-03-24 | 2024-01-09 | International Business Machines Corporation | Fine-grained access control of column-major relational database management systems |
| US12013963B2 (en) * | 2021-04-16 | 2024-06-18 | Bank Of America Corporation | Insight generation using personal identifiable information (PII) footprint modeling |
| US12155666B2 (en) * | 2021-05-28 | 2024-11-26 | Capital One Services, Llc | Evaluation of effective access permissions in identity and access management (IAM) systems |
| US11902282B2 (en) | 2021-05-28 | 2024-02-13 | Capital One Services, Llc | Validating compliance of roles with access permissions |
| US11562082B2 (en) | 2021-05-28 | 2023-01-24 | Capital One Services, Llc | Crafting effective policies for identity and access management roles |
| US20220400127A1 (en) * | 2021-06-09 | 2022-12-15 | Microsoft Technology Licensing, Llc | Anomalous user activity timing determinations |
| US11831688B2 (en) * | 2021-06-18 | 2023-11-28 | Capital One Services, Llc | Systems and methods for network security |
| US11349861B1 (en) | 2021-06-18 | 2022-05-31 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
| GB2609194A (en) | 2021-07-19 | 2023-02-01 | Nchain Licensing Ag | Enforcing conditions on blockchain transactions |
| GB2609193A (en) | 2021-07-19 | 2023-02-01 | Nchain Licensing Ag | Enforcing conditions on blockchain transactions |
| US11296967B1 (en) | 2021-09-23 | 2022-04-05 | Extrahop Networks, Inc. | Combining passive network analysis and active probing |
| US12088633B2 (en) * | 2021-09-30 | 2024-09-10 | Hewlett Packard Enterprise Development Lp | Dynamic intrusion detection and prevention in computer networks |
| US12170688B1 (en) * | 2021-09-30 | 2024-12-17 | Amazon Technologies, Inc. | Automated attack mitigation |
| US11818101B2 (en) * | 2021-10-11 | 2023-11-14 | Cisco Technology, Inc. | Context-based path selection for VPN clients to facilitate remote access to network-based applications |
| US12348525B2 (en) | 2021-10-13 | 2025-07-01 | Zscaler, Inc. | Generating zero-trust policy for application access using machine learning |
| US12580921B2 (en) | 2021-10-13 | 2026-03-17 | Zscaler, Inc. | Generating zero-trust policy for application access utilizing knowledge graph based application segmentation |
| US12592930B2 (en) | 2021-10-13 | 2026-03-31 | Zscaler, Inc. | Generating zero-trust policy for application access based on sequence-based application segmentation |
| US12229287B2 (en) * | 2021-10-25 | 2025-02-18 | International Business Machines Corporation | Automatic resource access policy generation and implementation |
| US12445460B2 (en) | 2021-12-03 | 2025-10-14 | International Business Machines Corporation | Tracking a potential attacker on an external computer system |
| CN116319398A (zh) * | 2021-12-21 | 2023-06-23 | 华为技术有限公司 | 一种网络巡检方法、网络设备及网络管理设备 |
| US12267299B2 (en) * | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
| US11979277B2 (en) | 2022-02-02 | 2024-05-07 | Oracle International Corporation | Enhanced network-link architecture for improved end-to-end latency in communication between different cloud environments |
| US12592931B2 (en) | 2022-02-02 | 2026-03-31 | Oracle International Corporation | Networking techniques for enabling communication between multiple cloud environments |
| US20230244517A1 (en) | 2022-02-02 | 2023-08-03 | Oracle International Corporation | Usage of cloud-link adaptor for consumption of cloud services |
| US12204955B2 (en) * | 2022-02-02 | 2025-01-21 | Oracle International Corporation | Multi-cloud infrastructure-database adaptor |
| US12111933B2 (en) | 2022-02-07 | 2024-10-08 | Bank Of America Corporation | System and method for dynamically updating existing threat models based on newly identified active threats |
| US11843606B2 (en) | 2022-03-30 | 2023-12-12 | Extrahop Networks, Inc. | Detecting abnormal data access based on data similarity |
| US12255924B2 (en) | 2022-05-31 | 2025-03-18 | Acronis International Gmbh | Policy creation and adjustment methods |
| WO2023233580A1 (ja) * | 2022-06-01 | 2023-12-07 | 日本電信電話株式会社 | 検知対処制御システム、検知対処制御方法、ハードウェアアクセラレータ、コントローラ、および、プログラム |
| WO2024017798A1 (en) | 2022-07-22 | 2024-01-25 | Nchain Licensing Ag | Proving and verifying input data |
| US12013823B2 (en) | 2022-09-08 | 2024-06-18 | Tyco Fire & Security Gmbh | Gateway system that maps points into a graph schema |
| US12061633B2 (en) | 2022-09-08 | 2024-08-13 | Tyco Fire & Security Gmbh | Building system that maps points into a graph schema |
| WO2024081839A1 (en) | 2022-10-14 | 2024-04-18 | Oracle International Corporation | User signup for services offered in a multi-cloud infrastructure |
| US12061516B2 (en) * | 2022-10-25 | 2024-08-13 | Jpmorgan Chase Bank, N.A. | Determining false positive and active event data |
| US12549576B2 (en) | 2023-03-30 | 2026-02-10 | Cisco Technology, Inc. | Security policy adjustment based on anomaly detection |
| US12278730B2 (en) | 2023-06-21 | 2025-04-15 | International Business Machines Corporation | Analyzing policies executed in a computer system |
| US20250112961A1 (en) * | 2023-10-02 | 2025-04-03 | Okta, Inc. | Techniques for generating policy recommendations and insights using generative ai |
| US12438868B2 (en) | 2024-01-02 | 2025-10-07 | Bank Of America Corporation | Pre-access automated login to computing devices, applications and web sites/services based on machine-learning determined user access patterns |
| CN117847301B (zh) * | 2024-01-09 | 2024-08-02 | 上海开恒光岳机械制造有限公司 | 一种基于数据分析的单向阀运行效率评估系统 |
| US20250272428A1 (en) * | 2024-02-27 | 2025-08-28 | GE Precision Healthcare LLC | Automated role-based access control for patient health information security and compliance |
| CN119853990A (zh) * | 2024-12-31 | 2025-04-18 | 萨孚凯信息系统(无锡)有限公司 | 一种微信运营自动化综合服务平台 |
| US12483384B1 (en) | 2025-04-16 | 2025-11-25 | Extrahop Networks, Inc. | Resynchronizing encrypted network traffic |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050108568A1 (en) | 2003-11-14 | 2005-05-19 | Enterasys Networks, Inc. | Distributed intrusion response system |
| JP2013533531A (ja) | 2010-05-20 | 2013-08-22 | アクセンチュア グローバル サービスィズ リミテッド | 悪意のある攻撃の検出および分析 |
| WO2016138067A1 (en) | 2015-02-24 | 2016-09-01 | Cloudlock, Inc. | System and method for securing an enterprise computing environment |
Family Cites Families (49)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7921459B2 (en) * | 2000-04-28 | 2011-04-05 | International Business Machines Corporation | System and method for managing security events on a network |
| US8990723B1 (en) * | 2002-12-13 | 2015-03-24 | Mcafee, Inc. | System, method, and computer program product for managing a plurality of applications via a single interface |
| GB2405229B (en) * | 2003-08-19 | 2006-01-11 | Sophos Plc | Method and apparatus for filtering electronic mail |
| US7440406B2 (en) * | 2004-12-29 | 2008-10-21 | Korea University Industry & Academy Cooperation Foundation | Apparatus for displaying network status |
| WO2007019583A2 (en) | 2005-08-09 | 2007-02-15 | Sipera Systems, Inc. | System and method for providing network level and nodal level vulnerability protection in voip networks |
| CA2531410A1 (en) | 2005-12-23 | 2007-06-23 | Snipe Network Security Corporation | Behavioural-based network anomaly detection based on user and group profiling |
| US7970746B2 (en) * | 2006-06-13 | 2011-06-28 | Microsoft Corporation | Declarative management framework |
| FI20060665A0 (fi) | 2006-07-07 | 2006-07-07 | Nokia Corp | Poikkeavuuden havaitseminen |
| US7783666B1 (en) | 2007-09-26 | 2010-08-24 | Netapp, Inc. | Controlling access to storage resources by using access pattern based quotas |
| US7912965B2 (en) | 2007-10-12 | 2011-03-22 | Informed Control Inc. | System and method for anomalous directory client activity detection |
| US9338176B2 (en) | 2008-01-07 | 2016-05-10 | Global Dataguard, Inc. | Systems and methods of identity and access management |
| US8756650B2 (en) | 2010-03-15 | 2014-06-17 | Broadcom Corporation | Dynamic authentication of a user |
| US8600875B2 (en) | 2010-04-12 | 2013-12-03 | Visa International Service Association | Authentication process using search technology |
| US9419841B1 (en) | 2011-06-29 | 2016-08-16 | Amazon Technologies, Inc. | Token-based secure data management |
| US8881289B2 (en) | 2011-10-18 | 2014-11-04 | Mcafee, Inc. | User behavioral risk assessment |
| US8839349B2 (en) * | 2011-10-18 | 2014-09-16 | Mcafee, Inc. | Integrating security policy and event management |
| CA2868896C (en) | 2012-03-30 | 2018-01-02 | Goldman, Sachs & Co. | Secure mobile framework |
| US9501613B1 (en) | 2012-04-24 | 2016-11-22 | Alarm.Com Incorporated | Health and wellness management technology |
| US9497212B2 (en) * | 2012-05-21 | 2016-11-15 | Fortinet, Inc. | Detecting malicious resources in a network based upon active client reputation monitoring |
| EP2880820A4 (en) | 2012-07-31 | 2016-03-23 | Hewlett Packard Development Co | PATTERN CONSOLIDATION FOR THE IDENTIFICATION OF MISSING ACTIVITIES |
| US9515892B2 (en) | 2012-09-12 | 2016-12-06 | Tekelec, Inc. | Methods, systems, and computer readable media for providing diameter traffic estimator |
| US9401924B2 (en) | 2012-12-20 | 2016-07-26 | At&T Intellectual Property I, L.P. | Monitoring operational activities in networks and detecting potential network intrusions and misuses |
| US11321784B2 (en) | 2013-03-06 | 2022-05-03 | AppZen, Inc. | Methods and systems for automatically detecting fraud and compliance issues in expense reports and invoices |
| US10313345B2 (en) | 2013-03-11 | 2019-06-04 | Amazon Technologies, Inc. | Application marketplace for virtual desktops |
| CN104065622B (zh) * | 2013-03-20 | 2018-10-19 | 腾讯科技(深圳)有限公司 | 网络设备的安全预警方法及装置 |
| US9166993B1 (en) | 2013-07-25 | 2015-10-20 | Symantec Corporation | Anomaly detection based on profile history and peer history |
| US10063654B2 (en) | 2013-12-13 | 2018-08-28 | Oracle International Corporation | Systems and methods for contextual and cross application threat detection and prediction in cloud applications |
| CN104933049B (zh) | 2014-03-17 | 2019-02-19 | 华为技术有限公司 | 生成数字人的方法及系统 |
| JP6559402B2 (ja) * | 2014-05-12 | 2019-08-14 | 富士通株式会社 | 表示方法、表示装置および表示プログラム |
| US9721212B2 (en) | 2014-06-04 | 2017-08-01 | Qualcomm Incorporated | Efficient on-device binary analysis for auto-generated behavioral models |
| US9356969B2 (en) * | 2014-09-23 | 2016-05-31 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
| US9942158B2 (en) * | 2014-09-25 | 2018-04-10 | Dell Products L.P. | Data traffic policy management system |
| RU2580432C1 (ru) | 2014-10-31 | 2016-04-10 | Общество С Ограниченной Ответственностью "Яндекс" | Способ для обработки запроса от потенциального несанкционированного пользователя на доступ к ресурсу и серверу, используемый в нем |
| US9531757B2 (en) * | 2015-01-20 | 2016-12-27 | Cisco Technology, Inc. | Management of security policies across multiple security products |
| US10412106B2 (en) | 2015-03-02 | 2019-09-10 | Verizon Patent And Licensing Inc. | Network threat detection and management system based on user behavior information |
| US10101244B2 (en) | 2015-03-02 | 2018-10-16 | Ca, Inc. | Self-learning simulation environments |
| US10142353B2 (en) * | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
| CN104951539B (zh) * | 2015-06-19 | 2017-12-22 | 成都艾尔普科技有限责任公司 | 互联网数据中心有害信息监测系统 |
| US10192065B2 (en) | 2015-08-31 | 2019-01-29 | Commvault Systems, Inc. | Automated intelligent provisioning of data storage resources in response to user requests in a data storage management system |
| US10021115B2 (en) * | 2015-11-03 | 2018-07-10 | Juniper Networks, Inc. | Integrated security system having rule optimization |
| CN105303324B (zh) * | 2015-11-10 | 2019-11-19 | 中国建设银行股份有限公司 | 一种信息系统参数管理方法和装置 |
| US20170140278A1 (en) | 2015-11-18 | 2017-05-18 | Ca, Inc. | Using machine learning to predict big data environment performance |
| US9876825B2 (en) | 2016-02-04 | 2018-01-23 | Amadeus S.A.S. | Monitoring user authenticity |
| US10432671B2 (en) | 2016-09-16 | 2019-10-01 | Oracle International Corporation | Dynamic policy injection and access visualization for threat detection |
| US10721239B2 (en) * | 2017-03-31 | 2020-07-21 | Oracle International Corporation | Mechanisms for anomaly detection and access management |
| US10757103B2 (en) | 2017-04-11 | 2020-08-25 | Xage Security, Inc. | Single authentication portal for diverse industrial network protocols across multiple OSI layers |
| WO2018195278A1 (en) * | 2017-04-21 | 2018-10-25 | Walmart Apollo, Llc | Virtual reality appliance management user interface |
| US10812342B2 (en) * | 2017-04-28 | 2020-10-20 | Hewlett Packard Enterprise Development Lp | Generating composite network policy |
| US11178182B2 (en) | 2018-04-20 | 2021-11-16 | Sailpoint Technologies, Inc. | Automated access control management for computing systems |
-
2017
- 2017-09-15 US US15/705,383 patent/US10432671B2/en active Active
- 2017-09-15 CN CN201780056956.5A patent/CN109792439B/zh active Active
- 2017-09-15 US US15/705,388 patent/US10547646B2/en active Active
- 2017-09-15 JP JP2019514755A patent/JP7088913B2/ja active Active
- 2017-09-15 US US15/705,377 patent/US10447738B2/en active Active
- 2017-09-15 EP EP17777467.6A patent/EP3513543B1/en active Active
- 2017-09-15 WO PCT/US2017/051886 patent/WO2018053337A1/en not_active Ceased
-
2019
- 2019-12-16 US US16/716,133 patent/US11516255B2/en active Active
-
2022
- 2022-06-09 JP JP2022093754A patent/JP7358564B2/ja active Active
-
2023
- 2023-09-27 JP JP2023165968A patent/JP7595723B2/ja active Active
-
2024
- 2024-11-19 JP JP2024201627A patent/JP2025024129A/ja active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050108568A1 (en) | 2003-11-14 | 2005-05-19 | Enterasys Networks, Inc. | Distributed intrusion response system |
| JP2013533531A (ja) | 2010-05-20 | 2013-08-22 | アクセンチュア グローバル サービスィズ リミテッド | 悪意のある攻撃の検出および分析 |
| WO2016138067A1 (en) | 2015-02-24 | 2016-09-01 | Cloudlock, Inc. | System and method for securing an enterprise computing environment |
Also Published As
| Publication number | Publication date |
|---|---|
| EP3513543B1 (en) | 2021-05-12 |
| JP7358564B2 (ja) | 2023-10-10 |
| WO2018053337A1 (en) | 2018-03-22 |
| US10432671B2 (en) | 2019-10-01 |
| JP2019535068A (ja) | 2019-12-05 |
| US20180084010A1 (en) | 2018-03-22 |
| JP2025024129A (ja) | 2025-02-19 |
| JP7595723B2 (ja) | 2024-12-06 |
| US20200120141A1 (en) | 2020-04-16 |
| US20180084011A1 (en) | 2018-03-22 |
| US11516255B2 (en) | 2022-11-29 |
| US20180084012A1 (en) | 2018-03-22 |
| EP3513543A1 (en) | 2019-07-24 |
| US10547646B2 (en) | 2020-01-28 |
| JP2023175878A (ja) | 2023-12-12 |
| CN109792439A (zh) | 2019-05-21 |
| CN109792439B (zh) | 2021-08-27 |
| US10447738B2 (en) | 2019-10-15 |
| JP2022126712A (ja) | 2022-08-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7595723B2 (ja) | 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 | |
| US11265329B2 (en) | Mechanisms for anomaly detection and access management | |
| JP7279227B2 (ja) | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 | |
| JP7576561B2 (ja) | クラウドユーザの行動異常の検出 | |
| CN108702367B (zh) | 用于安全管理的计算机实现的方法、系统及可读介质 | |
| HK1260681A1 (en) | Techniques for discovering and managing security of applications | |
| HK1260681B (zh) | 用於安全管理的计算机实现的方法、系统和可读介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20200820 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20200820 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20211005 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20211221 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20220517 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20220609 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 7088913 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |