JPWO2020163049A5 - - Google Patents
Download PDFInfo
- Publication number
- JPWO2020163049A5 JPWO2020163049A5 JP2021533804A JP2021533804A JPWO2020163049A5 JP WO2020163049 A5 JPWO2020163049 A5 JP WO2020163049A5 JP 2021533804 A JP2021533804 A JP 2021533804A JP 2021533804 A JP2021533804 A JP 2021533804A JP WO2020163049 A5 JPWO2020163049 A5 JP WO2020163049A5
- Authority
- JP
- Japan
- Prior art keywords
- network
- wireless client
- client device
- data
- radio frequency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000003542 behavioural effect Effects 0.000 claims 32
- 230000000694 effects Effects 0.000 claims 7
- 238000000034 method Methods 0.000 claims 7
- 206010000117 Abnormal behaviour Diseases 0.000 claims 6
- 238000012806 monitoring device Methods 0.000 claims 5
- 230000000246 remedial effect Effects 0.000 claims 5
- 230000002159 abnormal effect Effects 0.000 claims 4
- 230000000977 initiatory effect Effects 0.000 claims 3
- 238000012544 monitoring process Methods 0.000 claims 1
Claims (16)
無線周波数スキャン・デバイスによって、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の通信のための規定の無線周波数割当空間をスキャンすることと、
前記無線周波数スキャン・デバイスによって、前記ワイヤレス・クライアント・デバイスが、スキャンした規定の無線周波数割当空間に基づき前記ネットワークに接続していることを決定することであって、前記ネットワークは、承認されるネットワーク又は承認されないネットワークのうち1つである、決定することと、
前記無線周波数スキャン・デバイスによって、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の通信活動に関するデータを収集することと、
前記無線周波数スキャン・デバイスによって、挙動パターンと前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の通信活動に関して収集された前記データとの分析に基づいて、前記挙動パターンの知識ベースであって、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の接続のためのアクセス制御を確立するために用いられる、前記挙動パターンの知識ベースを生成することと、
前記ネットワークが承認されるネットワークであるとき、前記無線周波数スキャン・デバイスによって、前記ワイヤレス・クライアント・デバイスの前記ネットワークへの接続のための、前記ワイヤレス・クライアント・デバイスと前記ネットワークとを認識することと、
前記ネットワークが承認されないネットワークであるとき、前記無線周波数スキャン・デバイスによって、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の前記通信活動に関して収集された前記データから挙動パターンを抽出し、前記無線周波数スキャン・デバイスによって、抽出された前記挙動パターンを前記挙動パターンの知識ベースの挙動パターンと比較することと
を含み、前記収集したデータは、前記ワイヤレス・クライアント・デバイスの挙動パターンを記憶、分析するためのものである、方法。 A method of monitoring wireless client devices accessing a network, the method comprising:
scanning, with a radio frequency scanning device , a defined radio frequency allocation space for communication between the wireless client device and the network;
determining, by the radio frequency scanning device , that the wireless client device is connected to the network based on a scanned defined radio frequency allocation space, wherein the network is an authorized network; or one of the unapproved networks;
collecting data regarding communication activity between the wireless client device and the network by the radio frequency scanning device ;
a knowledge base of the behavioral patterns based on analysis of the behavioral patterns and the data collected by the radio frequency scanning device regarding communication activity between the wireless client device and the network; generating a knowledge base of the behavioral patterns used to establish access control for connections between wireless client devices and the network;
recognizing, by the radio frequency scanning device, the wireless client device and the network for connection of the wireless client device to the network when the network is an approved network; ,
extracting, by the radio frequency scanning device, behavioral patterns from the data collected about the communication activity between the wireless client device and the network when the network is an unapproved network; comparing, by a scanning device, the extracted behavioral pattern with a behavioral pattern knowledge base behavioral pattern;
and wherein the collected data is for storing and analyzing behavioral patterns of the wireless client device.
を更に含む、請求項1に記載の方法。 2. The method of claim 1 , further comprising transmitting , by the radio frequency scanning device , the generated knowledge base to the server over a secure communication channel between the radio frequency scanning device and the server.
を更に含む、請求項1に記載の方法。 2. The method of claim 1 , further comprising analyzing the collected data to establish normal behavioral patterns for the wireless client devices connecting to the authorized network.
を更に含む、請求項1に記載の方法。 determining, based on the comparison, that the extracted behavior pattern is an abnormal behavior pattern of the wireless client device when the network is an unapproved network;
2. The method of claim 1, further comprising:
を更に含む、請求項4に記載の方法。 5. The method of claim 4 , further comprising implementing remedial action based on the determination that the extracted behavioral pattern is an abnormal behavioral pattern.
前記無線周波数スキャン・デバイスによって、前記ワイヤレス・クライアント・デバイスの挙動パターンを記憶、分析するため、前記収集したデータを送信することと
を更に含む、請求項1に記載の方法。 Collecting data by the radio frequency scanning device based on the wireless client device initiating a connection with the unauthorized network after a remedial action to terminate the connection with the authorized network. and
2. The method of claim 1, further comprising transmitting , by the radio frequency scanning device, the collected data for storage and analysis of behavioral patterns of the wireless client device.
ワイヤレス・クライアント・デバイスとネットワークとの間の通信のための規定の無線周波数割当空間をスキャンし、
前記ワイヤレス・クライアント・デバイスが、前記スキャンした規定の無線周波数割当空間に基づき前記ネットワークに接続していることを決定し、
前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の通信活動に関するデータを収集し、
挙動パターンと前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の通信活動に関して収集された前記データとの分析に基づいて、前記挙動パターンの知識ベースであって、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の接続のためのアクセス制御を確立するために用いられる、前記挙動パターンの知識ベースを生成し、
前記ネットワークが承認されるネットワークであるとき、前記ワイヤレス・クライアント・デバイスの前記ネットワークへの接続のための、前記ワイヤレス・クライアント・デバイスと前記ネットワークとを認識し、
前記ネットワークが承認されないネットワークであるとき、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の前記通信活動に関して収集された前記データから挙動パターンを抽出し、前記無線周波数スキャン・デバイスによって、抽出された前記挙動パターンを前記挙動パターンの知識ベースの挙動パターンと比較する
ように動作させる命令を記憶した非一時的コンピュータ可読媒体であって、前記ネットワークは、承認されるネットワーク又は承認されないネットワークのうち1つであり、前記収集したデータは、前記ワイヤレス・クライアント・デバイスの挙動パターンを記憶、分析するためのものである、非一時的コンピュータ可読媒体。 When executed by one or more processors, the one or more processors:
scanning a prescribed radio frequency allocation space for communication between a wireless client device and a network;
determining that the wireless client device is connected to the network based on the scanned defined radio frequency allocation space;
collecting data regarding communication activity between the wireless client device and the network ;
a knowledge base of behavioral patterns based on analysis of behavioral patterns and the data collected regarding communication activity between the wireless client device and the network, comprising: generating a knowledge base of said behavioral patterns used to establish access control for connections between
recognizing the wireless client device and the network for connection of the wireless client device to the network when the network is an authorized network;
extracting behavioral patterns from the data collected about the communication activity between the wireless client device and the network when the network is an unapproved network, extracted by the radio frequency scanning device; A non-transitory computer-readable medium storing instructions operable to compare the behavior pattern to behavior patterns in a knowledge base of behavior patterns , wherein the network is one of an approved network or a non-approved network. and wherein the collected data is for storing and analyzing behavioral patterns of the wireless client device.
前記比較に基づき、前記抽出した挙動パターンが前記ワイヤレス・クライアント・デバイスの異常挙動パターンであることを決定する、請求項7に記載の非一時的コンピュータ可読媒体。 When the network is the unapproved network and the instructions are executed by the one or more processors, the one or more processors further:
8. The non-transitory computer-readable medium of claim 7 , determining that the extracted behavioral pattern is an abnormal behavioral pattern of the wireless client device based on the comparison.
前記抽出した挙動パターンが異常挙動パターンであるという前記決定に基づき、救済行動を開始する、請求項10に記載の非一時的コンピュータ可読媒体。 When the instructions are executed by the one or more processors, the one or more processors further:
11. The non-transitory computer readable medium of claim 10 , initiating remedial action based on the determination that the extracted behavior pattern is an abnormal behavior pattern.
前記承認されるネットワークとの接続を終了した後、前記承認されないネットワークとの接続を開始したことに基づき、データを収集し、
前記ワイヤレス・クライアント・デバイスの挙動パターンを記憶、分析するため、前記収集したデータを送信する、請求項7に記載のワイヤレス監視デバイス。 When the instructions are executed by the one or more processors, the one or more processors further:
collecting data based on initiating a connection with the unapproved network after terminating the connection with the approved network;
8. The wireless monitoring device of claim 7 , wherein the collected data is transmitted for storing and analyzing behavioral patterns of the wireless client device.
少なくとも1つの記憶デバイスと、
前記少なくとも1つの記憶デバイスに結合する少なくとも1つのプロセッサであって、
監視デバイスからセキュア通信チャネル上で、承認されるネットワークに接続するワイヤレス・クライアント・デバイスの第1のデータを受信し、
前記承認されるネットワークに接続する前記ワイヤレス・クライアント・デバイスの正常挙動パターンを決定するため、前記受信したデータを分析し、
前記受信した第1のデータ及び前記正常挙動パターンを前記少なくとも1つの記憶デバイス内に記憶し、
前記監視デバイスから前記セキュア通信チャネル上で、承認されないネットワークに接続するワイヤレス・クライアント・デバイスの第2のデータを受信し、
前記承認されないネットワークに接続する前記ワイヤレス・クライアント・デバイスの異常挙動パターンを決定するため、前記受信した第2のデータを分析し、
前記受信した第2のデータ及び前記異常挙動パターンを前記少なくとも1つの記憶デバイス内に記憶し、
記憶された前記第1のデータ、記憶された前記第2のデータ、前記記憶してある正常挙動パターン、及び前記記憶してある異常挙動パターンに基づいて、挙動パターンの知識ベースであって、前記ワイヤレス・クライアント・デバイスと前記ネットワークとの間の接続のためのアクセス制御を確立するために用いられる、前記挙動パターンの知識ベースを生成し、
前記ワイヤレス・クライアント・デバイスの前記承認されるネットワークへの接続のための、前記ワイヤレス・クライアント・デバイスと前記承認されるネットワークとを認識し、
前記ワイヤレス・クライアント・デバイスと前記承認されないネットワークとの間の前記通信活動に関して収集された前記データから挙動パターンを抽出し、抽出された前記挙動パターンを前記挙動パターンの知識ベースの挙動パターンと比較する
ように構成したプロセッサと、
前記プロセッサに結合するセキュリティ・マネージャと
を備え、前記セキュリティ・マネージャは、
前記異常挙動パターンを決定した後、アクセス制御ポリシーに基づき、前記ワイヤレス・クライアント・デバイスのための救済行動を生成する
ように構成する、サーバ・システム。 A server system, said server system comprising:
at least one storage device;
at least one processor coupled to the at least one storage device,
receiving, over a secure communication channel from the monitoring device , first data for a wireless client device connecting to an authorized network ;
analyzing the received data to determine normal behavioral patterns of the wireless client device connecting to the authorized network;
storing the received first data and the normal behavior pattern in the at least one storage device;
receiving second data over the secure communication channel from the monitoring device for a wireless client device connecting to an unauthorized network ;
analyzing the received second data to determine abnormal behavior patterns of the wireless client device connecting to the unauthorized network;
storing the received second data and the abnormal behavior pattern in the at least one storage device ;
a knowledge base of behavioral patterns based on the stored first data, the stored second data, the stored normal behavioral patterns, and the stored abnormal behavioral patterns, comprising: generating a knowledge base of the behavioral patterns used to establish access control for connections between wireless client devices and the network;
recognizing the wireless client device and the authorized network for connection of the wireless client device to the authorized network;
extracting behavioral patterns from the data collected regarding the communication activity between the wireless client device and the unapproved network; and comparing the extracted behavioral patterns to behavioral patterns in a knowledge base of behavioral patterns . a processor configured to
a security manager coupled to the processor, the security manager comprising:
A server system configured to generate a remedial action for said wireless client device based on an access control policy after determining said abnormal behavior pattern.
前記受信した第2のデータからの挙動パターンと、前記記憶してある正常挙動パターンとを比較して、前記ワイヤレス・クライアント・デバイスの前記承認されないネットワークへの接続の前記異常挙動パターンを決定する
ように構成される、請求項13に記載のサーバ・システム。 to analyze the received second data to determine the abnormal behavior pattern of the wireless client device's connection to the unauthorized network, the processor comprising:
comparing behavioral patterns from the received second data with the stored normal behavioral patterns to determine the abnormal behavioral pattern of the wireless client device 's connection to the unauthorized network ;
14. The server system of claim 13 , configured to:
通信チャネル上で、前記ワイヤレス・クライアント・デバイスに関連付けた計算デバイスに前記救済行動を送信する
ように更に構成する、請求項14に記載のサーバ・システム。 The security manager is
15. The server system of claim 14 , further configured to transmit the remedial action to a computing device associated with the wireless client device over a communication channel.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962800927P | 2019-02-04 | 2019-02-04 | |
US62/800,927 | 2019-02-04 | ||
US16/365,393 US11540130B2 (en) | 2019-02-04 | 2019-03-26 | Zero trust wireless monitoring-system and method for behavior based monitoring of radio frequency environments |
US16/365,393 | 2019-03-26 | ||
PCT/US2020/013557 WO2020163049A1 (en) | 2019-02-04 | 2020-01-14 | Zero trust wireless monitoring - system and method for behavior based monitoring of radio frequency environments |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2022519433A JP2022519433A (en) | 2022-03-24 |
JPWO2020163049A5 true JPWO2020163049A5 (en) | 2023-01-26 |
JP7566746B2 JP7566746B2 (en) | 2024-10-15 |
Family
ID=71836884
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021533804A Active JP7566746B2 (en) | 2019-02-04 | 2020-01-14 | Zero Trust Wireless Monitoring System and Method for Behavior-Based Monitoring of Radio Frequency Environments |
Country Status (4)
Country | Link |
---|---|
US (3) | US11540130B2 (en) |
EP (1) | EP3874824A4 (en) |
JP (1) | JP7566746B2 (en) |
WO (1) | WO2020163049A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11540130B2 (en) * | 2019-02-04 | 2022-12-27 | 802 Secure, Inc. | Zero trust wireless monitoring-system and method for behavior based monitoring of radio frequency environments |
US12041444B2 (en) * | 2020-09-10 | 2024-07-16 | Blackberry Limited | Authentication using wireless sensing |
US11470100B1 (en) * | 2022-03-21 | 2022-10-11 | Flying Cloud Technologies, Inc. | Data surveillance in a zero-trust network |
ZA202303226B (en) * | 2022-03-22 | 2023-05-31 | Vui Consultancy Pvt Ltd | An anti-snooping apparatus |
Family Cites Families (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3601434B2 (en) * | 2000-10-13 | 2004-12-15 | 日本電気株式会社 | Pseudo public wireless access service |
US7068998B2 (en) | 2001-04-13 | 2006-06-27 | Northrop Grumman Corp. | Methodology for the detection of intrusion into radio frequency (RF) based networks including tactical data links and the tactical internet |
US7184777B2 (en) | 2002-11-27 | 2007-02-27 | Cognio, Inc. | Server and multiple sensor system for monitoring activity in a shared radio frequency band |
US7295524B1 (en) | 2003-02-18 | 2007-11-13 | Airwave Wireless, Inc | Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments |
US7822424B2 (en) * | 2003-02-24 | 2010-10-26 | Invisitrack, Inc. | Method and system for rangefinding using RFID and virtual triangulation |
US9106479B1 (en) | 2003-07-10 | 2015-08-11 | F5 Networks, Inc. | System and method for managing network communications |
WO2006023575A2 (en) | 2004-08-19 | 2006-03-02 | Cognio, Inc. | System and method for monitoring and enforcing a restricted wireless zone |
US20060123133A1 (en) * | 2004-10-19 | 2006-06-08 | Hrastar Scott E | Detecting unauthorized wireless devices on a wired network |
US20060128311A1 (en) | 2004-12-13 | 2006-06-15 | Yohannes Tesfai | Matching receive signal strenth data associated with radio emission sources for positioning applications |
US7724717B2 (en) * | 2005-07-22 | 2010-05-25 | Sri International | Method and apparatus for wireless network security |
US8249028B2 (en) * | 2005-07-22 | 2012-08-21 | Sri International | Method and apparatus for identifying wireless transmitters |
KR100786478B1 (en) * | 2005-07-27 | 2007-12-17 | 서울신용평가정보 주식회사 | System and Apparatus for verifing authenticity of a person useing customer behavior analysis information |
US7630711B2 (en) * | 2006-01-05 | 2009-12-08 | Qualcomm Incorporated | Method and system for mapping provisioning information of different communications networks |
US20100180331A1 (en) | 2006-03-30 | 2010-07-15 | Nec Corporation | Communication terminal device, rule distribution device, and program |
US20080295172A1 (en) * | 2007-05-22 | 2008-11-27 | Khushboo Bohacek | Method, system and computer-readable media for reducing undesired intrusion alarms in electronic communications systems and networks |
US8595834B2 (en) | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
US8307405B2 (en) | 2008-04-28 | 2012-11-06 | International Business Machines Corporation | Methods, hardware products, and computer program products for implementing zero-trust policy in storage reports |
US8356001B2 (en) * | 2009-05-19 | 2013-01-15 | Xybersecure, Inc. | Systems and methods for application-level security |
US20100306531A1 (en) | 2009-05-29 | 2010-12-02 | Ebay Inc. | Hardware-Based Zero-Knowledge Strong Authentication (H0KSA) |
EP2367374B1 (en) | 2010-03-10 | 2012-05-16 | NTT DOCOMO, Inc. | Method and apparatus for the prevention of a service degradation attack |
US8676196B2 (en) * | 2010-11-30 | 2014-03-18 | Ta-gang Chiou | Apparatus and method for competitor network monitoring |
US20120151565A1 (en) | 2010-12-10 | 2012-06-14 | Eric Fiterman | System, apparatus and method for identifying and blocking anomalous or improper use of identity information on computer networks |
US8955078B2 (en) | 2011-06-30 | 2015-02-10 | Cable Television Laboratories, Inc. | Zero sign-on authentication |
US9185095B1 (en) * | 2012-03-20 | 2015-11-10 | United Services Automobile Association (Usaa) | Behavioral profiling method and system to authenticate a user |
US10091798B2 (en) * | 2012-11-07 | 2018-10-02 | Massachusetts Institute Of Technology | Cognitive radio method and apparatus for achieving ad hoc interference multiple access wireless communication |
US9392939B2 (en) * | 2013-03-04 | 2016-07-19 | Hello Inc. | Methods using a monitoring device to monitor individual activities, behaviors or habit information and communicate with a database with corresponding individual base information for comparison |
US10122479B2 (en) * | 2017-01-23 | 2018-11-06 | DGS Global Systems, Inc. | Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum |
US9189617B2 (en) | 2013-09-27 | 2015-11-17 | Intel Corporation | Apparatus and method for implementing zero-knowledge proof security techniques on a computing platform |
JP2015115794A (en) | 2013-12-12 | 2015-06-22 | 株式会社日立製作所 | Transfer device, transfer method, and transfer program |
EP3276527B1 (en) | 2014-06-02 | 2020-09-16 | Bastille Networks, Inc. | Electromagnetic threat detection and mitigation in the internet of things |
US9858420B2 (en) | 2015-07-28 | 2018-01-02 | International Business Machines Corporation | Transmission of trustworthy data |
JP6298021B2 (en) | 2015-07-30 | 2018-03-20 | トヨタ自動車株式会社 | Attack detection system and attack detection method |
US10367677B2 (en) * | 2016-05-13 | 2019-07-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Network architecture, methods, and devices for a wireless communications network |
US10567362B2 (en) | 2016-06-17 | 2020-02-18 | Rubicon Labs, Inc. | Method and system for an efficient shared-derived secret provisioning mechanism |
US20180097845A1 (en) | 2016-10-05 | 2018-04-05 | Rapid Focus Security, Llc | Self-Managed Intelligent Network Devices that Protect and Monitor a Distributed Network |
US10110585B2 (en) | 2016-12-31 | 2018-10-23 | Entefy Inc. | Multi-party authentication in a zero-trust distributed system |
JP6669138B2 (en) | 2017-07-19 | 2020-03-18 | トヨタ自動車株式会社 | Attack monitoring system and attack monitoring method |
US10502811B2 (en) * | 2018-03-09 | 2019-12-10 | Abl Ip Holding Llc | Network architecture, radio frequency based asset tracking and/or location estimation methods and systems |
US11184374B2 (en) * | 2018-10-12 | 2021-11-23 | International Business Machines Corporation | Endpoint inter-process activity extraction and pattern matching |
US11540130B2 (en) * | 2019-02-04 | 2022-12-27 | 802 Secure, Inc. | Zero trust wireless monitoring-system and method for behavior based monitoring of radio frequency environments |
US11146612B1 (en) * | 2019-09-25 | 2021-10-12 | Motionray, Inc. | System, device and method for streaming and receiving content in real-time from wearable cameras with latency control and quality of content control |
TWI776094B (en) * | 2019-11-11 | 2022-09-01 | 財團法人資訊工業策進會 | Networking behavior detector and networking behavior detection method thereof for indoor space |
US20230231860A1 (en) * | 2022-01-18 | 2023-07-20 | Palo Alto Networks, Inc. | Iot device identification by machine learning with time series behavioral and statistical features |
-
2019
- 2019-03-26 US US16/365,393 patent/US11540130B2/en active Active
-
2020
- 2020-01-14 WO PCT/US2020/013557 patent/WO2020163049A1/en unknown
- 2020-01-14 EP EP20752334.1A patent/EP3874824A4/en active Pending
- 2020-01-14 JP JP2021533804A patent/JP7566746B2/en active Active
-
2022
- 2022-10-06 US US17/961,215 patent/US11716623B2/en active Active
-
2023
- 2023-03-07 US US18/180,055 patent/US20230232230A1/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9628478B2 (en) | Technologies for secure storage and use of biometric authentication information | |
US9117076B2 (en) | System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity | |
US11902307B2 (en) | Method and apparatus for network fraud detection and remediation through analytics | |
JP4523480B2 (en) | Log analysis system, analysis method, and log analysis device | |
US20230195873A1 (en) | Continuous authentication system and related methods | |
US20110314549A1 (en) | Method and apparatus for periodic context-aware authentication | |
Ahmed et al. | Detecting Computer Intrusions Using Behavioral Biometrics. | |
CN107222477B (en) | A kind of equipment access identification Verification System and method | |
CN109347806A (en) | A kind of the digging mine malware detection system and method for Intrusion Detection based on host monitoring technology | |
CN113901499A (en) | Zero-trust access authority control system and method based on trusted computing | |
CN117527430A (en) | Zero-trust network security dynamic evaluation system and method | |
RU2630415C2 (en) | Method for detecting anomalous work of network server (options) | |
CN115062293A (en) | Weak password detection method and device, storage medium, electronic equipment and computer program product | |
CN114760083B (en) | Method, device and storage medium for issuing attack detection file | |
WO2024148905A1 (en) | Data quantum computing management and control method and apparatus, device, and computer medium | |
JPWO2020163049A5 (en) | ||
CN112615828A (en) | Intellectual property operating system based on cloud computing network and intelligent authorization method | |
CN115085956B (en) | Intrusion detection method, intrusion detection device, electronic equipment and storage medium | |
CN112272195B (en) | Dynamic detection authentication system and method thereof | |
CN114205116A (en) | Zero-trust borderless security access system | |
CN118381672B (en) | Data security dynamic protection method and system based on artificial intelligence | |
CN111079111A (en) | Computer network identity verification system | |
EP4016924A1 (en) | Risk-aware access control system and related methods | |
CN117082147B (en) | Application network access control method, system, device and medium | |
KR100939300B1 (en) | Network access control method based on microsoft network access protection |