KR100831483B1 - 보안 정책을 관리하는 방법 및 시스템 - Google Patents
보안 정책을 관리하는 방법 및 시스템 Download PDFInfo
- Publication number
- KR100831483B1 KR100831483B1 KR1020057018600A KR20057018600A KR100831483B1 KR 100831483 B1 KR100831483 B1 KR 100831483B1 KR 1020057018600 A KR1020057018600 A KR 1020057018600A KR 20057018600 A KR20057018600 A KR 20057018600A KR 100831483 B1 KR100831483 B1 KR 100831483B1
- Authority
- KR
- South Korea
- Prior art keywords
- security
- policy
- policies
- network
- information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/0816—Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
- H04L41/0853—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
- H04L41/0856—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information by backing up or archiving configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
Abstract
Description
Claims (24)
- 하나 또는 그 이상의 보안-인에이블된(security-enabled) 장치들로부터 보안 정보를 검출하는 단계와,상기 보안 정보를 정규화하는 단계와,데이터 저장소에 상기 정규화된 보안 정보를 기록하는 단계를 포함하는 보안 정책 관리 방법.
- 제1항에 있어서, 상기 정규화되어 기록된 보안 정보의 적어도 일부분에 기초하여 보안 정책(security policy)과 관련된 보안 정책 변화를 트리거링(triggering)하는 단계를 더 포함하는 보안 정책 관리 방법.
- 제1항에 있어서, 상기 정규화되어 기록된 보안 정보의 적어도 일부분에 기초하여 보안 정책을 평가하는 단계를 더 포함하는 보안 정책 관리 방법.
- 제1항에 있어서, 검출 시에, 상기 보안 정보는 보안 트랜잭션 프로토콜과 보안 트랜잭션 커맨드 라인 인터페이스 중의 적어도 하나를 사용하여 검출되는 보안 정책 관리 방법.
- 제1항에 있어서, 검출 시에, 상기 보안 정보는 상기 보안-인에이블된 장치들 중의 적어도 하나 상에서 일어나는, 보안 침입들, 보안 경보들, 보안 위반들, 및 비정상 행동들 중의 적어도 하나와 관련되는 보안 정책 관리 방법.
- 제1항에 있어서, 기록 시에, 상기 정규화된 보안 정보는 하나 또는 그 이상의 보안 정책들에게 동적인(dynamic) 정책 피드백을 제공하는 보안 정책 관리 방법.
- 정책 저장소로부터의 보안 정책들을 하나 또는 그 이상의 보안-인에이블된 장치들로 분포(distribute)시키는 단계와,상기 보안-인에이블된 장치들 중의 하나 또는 그 이상의 것에서 다수의 상기 보안 정책들을 집행(enforce)하는 단계와,상기 하나 또는 그 이상의 보안-인에이블된 장치들 각각에서의 보안 트랜잭션들을 추적하는 단계와,상기 추적된 보안 트랜잭션들에 기초하여 상기 정책 저장소를 갱신하는 단계를 포함하는 보안 정책 관리 방법.
- 제7항에 있어서, 분포 시에, 상기 정책 저장소는 데이터 웨어하우스, 데이터베이스, 및 전자 파일 중의 적어도 하나인 보안 정책 관리 방법.
- 제7항에 있어서, 분포 시에, 상기 하나 또는 그 이상의 보안-인에이블된 장치들은 방화벽, 라우터, 스위치, 네트워크 브리지, 게이트웨이, 네트워크 허브, 클라이언트, 주변 장치, 보안 리소스, 침입 검출 시스템, 및 서버 중의 적어도 하나를 포함하는 보안 정책 관리 방법.
- 제7항에 있어서, 추적 시에, 하나 또는 그 이상의 자동화된 애플리케이션들이, 언제 보안 위반이 상기 보안-인에이블된 장치들 중의 하나 또는 그 이상의 것에서 일어나고 상기 보안 위반의 보안 정보를 트랩(trap)하는지를 검출하는 보안 정책 관리 방법.
- 제7항에 있어서, 갱신 시에, 상기 기록된 보안 트랜잭션들은 상기 정책 저장소에 갱신되기 전에 정규화된 데이터 포맷으로 트랜슬레이트(translate)되는 보안 정책 관리 방법.
- 네트워크에 대한 하나 또는 그 이상의 보안 정책들을 갖는 정책 저장소와,상기 정책 저장소로부터 제공된 상기 보안 정책들 중의 하나 또는 그 이상의 것을 집행하는 보안-인에이블된 장치와,상기 보안-인에이블된 장치 상의 보안 트랜잭션들을 모니터링하고 상기 보안 트랜잭션들에 기초한 보안 정보로 상기 정책 저장소를 갱신하는 피드백 애플리케이션을 포함하는 보안 관리 시스템.
- 제12항에 있어서, 상기 정책 저장소로부터 집행용의 상기 보안-인에이블된 장치로 상기 하나 또는 그 이상의 보안 정책들을 푸싱(push)하는 하나 또는 그 이상의 정책 판정 포인트(policy decision point) 트랜슬레이터들을 더 포함하는 보안 관리 시스템.
- 제13항에 있어서, 상기 하나 또는 그 이상의 정책 판정 포인트 트랜슬레이터들은 중간 데이터 포맷으로 상기 정책 저장소로부터 상기 하나 또는 그 이상의 보안 정책들을 검색하고 트랜슬레이터 애플리케이션을 사용하여 상기 하나 또는 그 이상의 보안 정책들을 집행용의 상기 보안-인에이블된 장치에 의해 사용되는 소망 데이터 포맷으로 트랜슬레이트하는 보안 관리 시스템.
- 제12항에 있어서, 상기 정책 저장소는 특정 스키마(schema)에 기초하여 상기 정책 저장소로서 논리적으로 조립된 데이터 기억부들의 집합인 보안 관리 시스템.
- 제12항에 있어서, 상기 정책 저장소는 상기 정책 저장소로부터 원격에 있는 보안 관리 시스템.
- 제12항에 있어서, 피드백 애플리케이션은 상기 네트워크 상의 보안 이벤트들을 모니터링하기 위해 상기 보안-인에이블된 장치의 보안 프로토콜들을 활용하는 보안 관리 시스템.
- 제12항에 있어서, 상기 피드백 애플리케이션은 상기 정책 저장소를 상기 보안 정보로 갱신하기 전에 상기 보안 정보를 상기 정책 저장소에 의해 사용되는 데이터 포맷이 되도록 정규화하는 보안 관리 시스템.
- 관련 명령들을 갖는 머신 액세스 가능 매체로서, 상기 명령들은 실행되었을 때 네트워크 내의 보안 정책들에 대한 관리를 제공하고, 상기 명령들은,네트워크에 걸쳐서, 정책 저장소로부터 하나 또는 그 이상의 보안-인에이블된 장치들로 보안 정책들을 푸싱하는 단계와,상기 하나 또는 그 이상의 보안-인에이블된 장치들에 의해 상기 보안 정책들을 집행하는 단계와,상기 관리되는 네트워크 상에서 일어나는 보안 이벤트들을 모니터링하는 단계와,상기 보안 이벤트들과 관련된 보안 정보를 정규화하는 단계와,상기 정책 저장소를 상기 정규화된 보안 정보로 갱신하는 단계를 수행하는머신 액세스 가능 매체.
- 제19항에 있어서, 다수의 상기 보안 정책들을 조정하기 위해 상기 정규화되고 갱신된 보안 정보의 적어도 일부분을 동적으로 이용하는 명령들을 더 포함하는 머신 액세스 가능 매체.
- 제20항에 있어서, 상기 정규화되고 갱신된 보안 정보의 적어도 일부분에 기초해 상기 정책 저장소로부터 실행용의 다수의 보안-인에이블된 애플리케이션들을 동적으로 트리거링하는 명령들을 더 포함하는 머신 액세스 가능 매체.
- 제19항에 있어서, 푸싱 시에, 상기 정책 저장소는 보안 저작 및 편집 애플리케이션들과 인터페이싱하는, 머신 액세스 가능 매체.
- 제19항에 있어서, 모니터링 시에, 상기 보안-인에이블된 장치들에 의해 사용되는 원시(native) 보안 프로토콜들 및 커맨드들이 사용되어 상기 관리되는 네트워크 상에서 일어나는 보안 이벤트들과 관련된 상기 보안 정보를 획득하는, 머신 액세스 가능 매체.
- 제19항에 있어서, 정규화 시에, 상기 보안 정보는 원시 데이터 포맷에서 상기 정책 저장소에 의해 사용되는 중간 데이터 포맷으로 트랜슬레이트되는, 머신 액세스 가능 매체.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/404,978 US10110632B2 (en) | 2003-03-31 | 2003-03-31 | Methods and systems for managing security policies |
US10/404,978 | 2003-03-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20050118223A KR20050118223A (ko) | 2005-12-15 |
KR100831483B1 true KR100831483B1 (ko) | 2008-05-22 |
Family
ID=32990231
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020057018600A KR100831483B1 (ko) | 2003-03-31 | 2004-02-09 | 보안 정책을 관리하는 방법 및 시스템 |
Country Status (8)
Country | Link |
---|---|
US (1) | US10110632B2 (ko) |
JP (2) | JP2006521598A (ko) |
KR (1) | KR100831483B1 (ko) |
CN (1) | CN1768518A (ko) |
DE (1) | DE112004000428B4 (ko) |
GB (1) | GB2412540B (ko) |
TW (1) | TWI253571B (ko) |
WO (1) | WO2004095801A1 (ko) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101315340B1 (ko) | 2011-10-19 | 2013-10-08 | 주식회사 이노그리드 | 보안 크레디트 정보 처리 방법 |
KR20130138542A (ko) * | 2012-06-11 | 2013-12-19 | 한국전자통신연구원 | 보안 침해 대응 프로세스 기반의 물리/it 보안장비 제어 장치 및 방법 |
KR102090757B1 (ko) * | 2019-01-15 | 2020-03-19 | 주식회사 이글루시큐리티 | 침해사고 대응지시서에 기반한 보안장비 제어정책 자동 적용 시스템 및 그 방법 |
US11882125B2 (en) | 2021-05-26 | 2024-01-23 | Netskope, Inc. | Selection of session protocol based on policies |
Families Citing this family (156)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7783765B2 (en) | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US8910241B2 (en) | 2002-04-25 | 2014-12-09 | Citrix Systems, Inc. | Computer security system |
US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US7472422B1 (en) * | 2003-09-10 | 2008-12-30 | Symantec Corporation | Security management system including feedback and control |
US7383534B1 (en) | 2003-09-10 | 2008-06-03 | Symantec Corporation | Configuration system and methods including configuration inheritance and revisioning |
WO2005032042A1 (en) | 2003-09-24 | 2005-04-07 | Infoexpress, Inc. | Systems and methods of controlling network access |
US8452881B2 (en) * | 2004-09-28 | 2013-05-28 | Toufic Boubez | System and method for bridging identities in a service oriented architecture |
US8127366B2 (en) * | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US20050091068A1 (en) * | 2003-10-23 | 2005-04-28 | Sundaresan Ramamoorthy | Smart translation of generic configurations |
US8146160B2 (en) * | 2004-03-24 | 2012-03-27 | Arbor Networks, Inc. | Method and system for authentication event security policy generation |
ATE338418T1 (de) * | 2004-06-07 | 2006-09-15 | Cit Alcatel | Verfahren und vorrichtung zur verhinderung von angriffen auf einen call-server |
US7698403B2 (en) * | 2004-06-30 | 2010-04-13 | Intel Corporation | Automated management system generating network policies based on correlated knowledge to modify operation of a computer network |
US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US8463819B2 (en) * | 2004-09-01 | 2013-06-11 | Oracle International Corporation | Centralized enterprise security policy framework |
KR100611741B1 (ko) | 2004-10-19 | 2006-08-11 | 한국전자통신연구원 | 네트워크 침입 탐지 및 방지 시스템 및 그 방법 |
CN100346610C (zh) * | 2004-11-01 | 2007-10-31 | 沈明峰 | 基于安全策略的网络安全管理系统和方法 |
US7895650B1 (en) * | 2004-12-15 | 2011-02-22 | Symantec Corporation | File system based risk profile transfer |
US7734649B2 (en) * | 2004-12-28 | 2010-06-08 | Intel Corporation | Deriving and using data access control information to determine whether to permit derivations of data elements |
US20060167818A1 (en) * | 2005-01-21 | 2006-07-27 | David Wentker | Methods and system for performing data exchanges related to financial transactions over a public network |
US20060184490A1 (en) * | 2005-02-11 | 2006-08-17 | Itamar Heim | System and method for enterprise policy management |
US20060191007A1 (en) * | 2005-02-24 | 2006-08-24 | Sanjiva Thielamay | Security force automation |
JP2006252109A (ja) * | 2005-03-10 | 2006-09-21 | Oki Electric Ind Co Ltd | ネットワークアクセス制御装置、遠隔操作用装置及びシステム |
JP4648100B2 (ja) * | 2005-06-08 | 2011-03-09 | 大日本印刷株式会社 | Pkiの環境設定方法、クライアントサーバシステムおよびコンピュータプログラム |
US7827593B2 (en) * | 2005-06-29 | 2010-11-02 | Intel Corporation | Methods, apparatuses, and systems for the dynamic evaluation and delegation of network access control |
US7590733B2 (en) * | 2005-09-14 | 2009-09-15 | Infoexpress, Inc. | Dynamic address assignment for access control on DHCP networks |
WO2007092401A2 (en) * | 2006-02-06 | 2007-08-16 | William Loesch | Utilizing a token for authentication with multiple secure online sites |
US20070192823A1 (en) * | 2006-02-09 | 2007-08-16 | Novell, Inc. | Policy administration and provisioning |
US20070192500A1 (en) * | 2006-02-16 | 2007-08-16 | Infoexpress, Inc. | Network access control including dynamic policy enforcement point |
US20070192858A1 (en) * | 2006-02-16 | 2007-08-16 | Infoexpress, Inc. | Peer based network access control |
EP1826979A1 (en) * | 2006-02-27 | 2007-08-29 | BRITISH TELECOMMUNICATIONS public limited company | A system and method for establishing a secure group of entities in a computer network |
US8856862B2 (en) * | 2006-03-02 | 2014-10-07 | British Telecommunications Public Limited Company | Message processing methods and systems |
US7703126B2 (en) * | 2006-03-31 | 2010-04-20 | Intel Corporation | Hierarchical trust based posture reporting and policy enforcement |
GB2468799B (en) * | 2006-03-31 | 2011-04-06 | Intel Corp | Hierarchical trust based posture reporting and policy enforcement |
CN1863093A (zh) * | 2006-04-06 | 2006-11-15 | 华为技术有限公司 | 一种策略执行点及其与入侵检测系统联动的方法 |
US8554536B2 (en) * | 2006-05-24 | 2013-10-08 | Verizon Patent And Licensing Inc. | Information operations support system, method, and computer program product |
US20070288989A1 (en) * | 2006-06-09 | 2007-12-13 | Nokia Corporation | Method, electronic device, apparatus, system and computer program product for updating an electronic device security policy |
US20080068183A1 (en) * | 2006-09-15 | 2008-03-20 | Diamant John R | Methods and apparatus for accessing, or providing access to, user-configurable or different response policies for different duress codes |
EP2108147B1 (en) * | 2006-10-20 | 2017-03-08 | Her Majesty The Queen, In Right Of Canada As Represented By The Minister Of Health Through The Public Health Agency Of Canada | Method and apparatus for software policy management |
WO2008046218A1 (en) * | 2006-10-20 | 2008-04-24 | Her Majesty The Queen, In Right Of Canada As Represented By The Minister Of Health Through The Public Health Agency Of Canada | Method and apparatus for creating a configurable browser-based forms application |
US7954143B2 (en) * | 2006-11-13 | 2011-05-31 | At&T Intellectual Property I, Lp | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
US8190661B2 (en) * | 2007-01-24 | 2012-05-29 | Microsoft Corporation | Using virtual repository items for customized display |
US7908660B2 (en) * | 2007-02-06 | 2011-03-15 | Microsoft Corporation | Dynamic risk management |
US20080201330A1 (en) * | 2007-02-16 | 2008-08-21 | Microsoft Corporation | Software repositories |
US8145673B2 (en) | 2007-02-16 | 2012-03-27 | Microsoft Corporation | Easily queriable software repositories |
EP1975830A1 (en) * | 2007-03-30 | 2008-10-01 | British Telecommunications Public Limited Company | Distributed computer system |
EP1976220A1 (en) * | 2007-03-30 | 2008-10-01 | British Telecommunications Public Limited Company | Computer network |
US7770203B2 (en) * | 2007-04-17 | 2010-08-03 | International Business Machines Corporation | Method of integrating a security operations policy into a threat management vector |
US7831625B2 (en) | 2007-05-16 | 2010-11-09 | Microsoft Corporation | Data model for a common language |
US8341739B2 (en) * | 2007-05-24 | 2012-12-25 | Foundry Networks, Llc | Managing network security |
US8661534B2 (en) * | 2007-06-26 | 2014-02-25 | Microsoft Corporation | Security system with compliance checking and remediation |
US8935805B2 (en) * | 2007-07-11 | 2015-01-13 | International Business Machines Corporation | Method and system for enforcing password policy in a distributed directory |
WO2009030172A1 (fr) * | 2007-09-06 | 2009-03-12 | Huawei Technologies Co., Ltd. | Procédé et système pour contrôler un service de réseau |
CN101861578B (zh) * | 2007-09-28 | 2012-11-28 | 埃克斯里昂股份公司 | 网络操作系统 |
US8793781B2 (en) * | 2007-10-12 | 2014-07-29 | International Business Machines Corporation | Method and system for analyzing policies for compliance with a specified policy using a policy template |
CN101350054B (zh) * | 2007-10-15 | 2011-05-25 | 北京瑞星信息技术有限公司 | 计算机有害程序自动防护方法及装置 |
CN101350052B (zh) * | 2007-10-15 | 2010-11-03 | 北京瑞星信息技术有限公司 | 发现计算机程序的恶意行为的方法和装置 |
US8516539B2 (en) * | 2007-11-09 | 2013-08-20 | Citrix Systems, Inc | System and method for inferring access policies from access event records |
US8990910B2 (en) | 2007-11-13 | 2015-03-24 | Citrix Systems, Inc. | System and method using globally unique identities |
US9240945B2 (en) | 2008-03-19 | 2016-01-19 | Citrix Systems, Inc. | Access, priority and bandwidth management based on application identity |
US20090254970A1 (en) * | 2008-04-04 | 2009-10-08 | Avaya Inc. | Multi-tier security event correlation and mitigation |
US8095963B2 (en) * | 2008-04-30 | 2012-01-10 | Microsoft Corporation | Securing resource stores with claims-based security |
US8943575B2 (en) * | 2008-04-30 | 2015-01-27 | Citrix Systems, Inc. | Method and system for policy simulation |
EP2136530B1 (en) * | 2008-05-28 | 2019-04-03 | ABB Research Ltd. | Collaborative defense of energy distribution protection and control devices |
CN101651537B (zh) * | 2008-08-15 | 2013-07-10 | 上海贝尔阿尔卡特股份有限公司 | 一种在通信网络系统中进行分散式安全控制的方法和装置 |
WO2010048977A1 (de) * | 2008-10-29 | 2010-05-06 | Siemens Aktiengesellschaft | Verfahren zum schutz eines versorgungsnetzwerkes |
US8990573B2 (en) | 2008-11-10 | 2015-03-24 | Citrix Systems, Inc. | System and method for using variable security tag location in network communications |
US8745361B2 (en) | 2008-12-02 | 2014-06-03 | Microsoft Corporation | Sandboxed execution of plug-ins |
JP5191376B2 (ja) * | 2008-12-25 | 2013-05-08 | 株式会社野村総合研究所 | リスクベース認証システムおよび危険度情報取得サーバならびにリスクベース認証方法 |
US8434126B1 (en) * | 2009-02-02 | 2013-04-30 | Symantec Corporation | Methods and systems for aiding parental control policy decisions |
US20100205014A1 (en) * | 2009-02-06 | 2010-08-12 | Cary Sholer | Method and system for providing response services |
TWI479354B (zh) * | 2009-06-17 | 2015-04-01 | Fineart Technology Co Ltd | 資訊安全管理系統 |
US8095571B2 (en) * | 2009-06-22 | 2012-01-10 | Microsoft Corporation | Partitioning modeling platform data |
US8966607B2 (en) * | 2009-07-15 | 2015-02-24 | Rockstar Consortium Us Lp | Device programmable network based packet filter |
US8601573B2 (en) * | 2009-09-17 | 2013-12-03 | International Business Machines Corporation | Facial recognition for document and application data access control |
US8635705B2 (en) * | 2009-09-25 | 2014-01-21 | Intel Corporation | Computer system and method with anti-malware |
US8489534B2 (en) * | 2009-12-15 | 2013-07-16 | Paul D. Dlugosch | Adaptive content inspection |
US8806620B2 (en) * | 2009-12-26 | 2014-08-12 | Intel Corporation | Method and device for managing security events |
US8868728B2 (en) * | 2010-03-11 | 2014-10-21 | Accenture Global Services Limited | Systems and methods for detecting and investigating insider fraud |
CN102075347B (zh) * | 2010-11-18 | 2013-11-20 | 北京神州绿盟信息安全科技股份有限公司 | 一种安全配置核查设备和方法以及采用该设备的网络系统 |
US20120216281A1 (en) * | 2011-02-22 | 2012-08-23 | PCTEL Secure LLC | Systems and Methods for Providing a Computing Device Having a Secure Operating System Kernel |
US8726376B2 (en) | 2011-03-11 | 2014-05-13 | Openet Telecom Ltd. | Methods, systems and devices for the detection and prevention of malware within a network |
EP2551803A1 (en) * | 2011-07-29 | 2013-01-30 | British Telecommunications Public Limited Company | Distributed computer system |
US9026632B2 (en) | 2012-03-15 | 2015-05-05 | Adva Optical Networking Se | Network with a network wide extended policy framework |
EP2640003B1 (en) * | 2012-03-15 | 2014-05-14 | ADVA Optical Networking SE | Network with a network wide extended policy framework |
US8539548B1 (en) | 2012-04-27 | 2013-09-17 | International Business Machines Corporation | Tiered network policy configuration with policy customization control |
US8984582B2 (en) * | 2012-08-14 | 2015-03-17 | Confidela Ltd. | System and method for secure synchronization of data across multiple computing devices |
US9124619B2 (en) * | 2012-12-08 | 2015-09-01 | International Business Machines Corporation | Directing audited data traffic to specific repositories |
US9369431B1 (en) * | 2013-02-07 | 2016-06-14 | Infoblox Inc. | Security device controller |
CN103634156A (zh) * | 2013-12-17 | 2014-03-12 | 中国联合网络通信集团有限公司 | 一种集中式管控网络安全的方法、设备和系统 |
US9432405B2 (en) | 2014-03-03 | 2016-08-30 | Microsoft Technology Licensing, Llc | Communicating status regarding application of compliance policy updates |
US9860281B2 (en) | 2014-06-28 | 2018-01-02 | Mcafee, Llc | Social-graph aware policy suggestion engine |
US9990505B2 (en) | 2014-08-12 | 2018-06-05 | Redwall Technologies, Llc | Temporally isolating data accessed by a computing device |
US9712382B2 (en) * | 2014-10-27 | 2017-07-18 | Quanta Computer Inc. | Retrieving console messages after device failure |
WO2016094472A1 (en) * | 2014-12-09 | 2016-06-16 | Trustlayers, Inc. | System and method for enabling tracking of data usage |
US10129156B2 (en) * | 2015-03-31 | 2018-11-13 | At&T Intellectual Property I, L.P. | Dynamic creation and management of ephemeral coordinated feedback instances |
WO2016159964A1 (en) * | 2015-03-31 | 2016-10-06 | Hewlett Packard Enterprise Development Lp | Network policy distribution |
US10277666B2 (en) * | 2015-03-31 | 2019-04-30 | At&T Intellectual Property I, L.P. | Escalation of feedback instances |
US10129157B2 (en) * | 2015-03-31 | 2018-11-13 | At&T Intellectual Property I, L.P. | Multiple feedback instance inter-coordination to determine optimal actions |
TWI514178B (zh) * | 2015-04-14 | 2015-12-21 | Prophetstor Data Services Inc | 用於軟體定義網路中資料庫、應用程式,與儲存安全的系統 |
US11350254B1 (en) | 2015-05-05 | 2022-05-31 | F5, Inc. | Methods for enforcing compliance policies and devices thereof |
US9641540B2 (en) | 2015-05-19 | 2017-05-02 | Cisco Technology, Inc. | User interface driven translation, comparison, unification, and deployment of device neutral network security policies |
US9268938B1 (en) * | 2015-05-22 | 2016-02-23 | Power Fingerprinting Inc. | Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection |
CN105258952B (zh) * | 2015-10-26 | 2018-01-16 | 北京汽车股份有限公司 | 汽车peps自动测试系统 |
EP3384390A4 (en) * | 2015-12-02 | 2019-07-31 | Power Fingerprinting Inc. | METHOD AND DEVICES FOR VALIDATING A SUPPLY CHAIN FOR ELECTRONIC DEVICES WITH SIDE CHANNEL INFORMATION IN A SIGNATURE ANALYSIS |
CN105357056A (zh) * | 2015-12-07 | 2016-02-24 | 成都广达新网科技股份有限公司 | 一种基于策略的eoc局端设备升级方法 |
US11757946B1 (en) | 2015-12-22 | 2023-09-12 | F5, Inc. | Methods for analyzing network traffic and enforcing network policies and devices thereof |
US10505990B1 (en) | 2016-01-20 | 2019-12-10 | F5 Networks, Inc. | Methods for deterministic enforcement of compliance policies and devices thereof |
US11178150B1 (en) | 2016-01-20 | 2021-11-16 | F5 Networks, Inc. | Methods for enforcing access control list based on managed application and devices thereof |
US10601872B1 (en) * | 2016-01-20 | 2020-03-24 | F5 Networks, Inc. | Methods for enhancing enforcement of compliance policies based on security violations and devices thereof |
US10200409B2 (en) * | 2016-04-07 | 2019-02-05 | Korea Electric Power Corporation | Apparatus and method for security policy management |
US10313396B2 (en) | 2016-11-15 | 2019-06-04 | Cisco Technology, Inc. | Routing and/or forwarding information driven subscription against global security policy data |
KR101969203B1 (ko) * | 2016-12-23 | 2019-04-15 | 전자부품연구원 | IoT 기반의 공장 통합 관리 시스템에 의한 공장 데이터 보안 관리 방법 |
US10812266B1 (en) | 2017-03-17 | 2020-10-20 | F5 Networks, Inc. | Methods for managing security tokens based on security violations and devices thereof |
US11122042B1 (en) | 2017-05-12 | 2021-09-14 | F5 Networks, Inc. | Methods for dynamically managing user access control and devices thereof |
US11343237B1 (en) | 2017-05-12 | 2022-05-24 | F5, Inc. | Methods for managing a federated identity environment using security and access control data and devices thereof |
US10146964B1 (en) * | 2017-06-06 | 2018-12-04 | Intel Corporation | Security policy management for a plurality of dies in a system-on-chip |
US10560487B2 (en) * | 2017-07-26 | 2020-02-11 | International Business Machines Corporation | Intrusion detection and mitigation in data processing |
US10599668B2 (en) * | 2017-10-31 | 2020-03-24 | Secureworks Corp. | Adaptive parsing and normalizing of logs at MSSP |
EP3509004A1 (en) * | 2018-01-03 | 2019-07-10 | Siemens Aktiengesellschaft | Adaption of mac policies in industrial devices |
US11888606B2 (en) | 2018-02-02 | 2024-01-30 | British Telecommunications Public Limited Company | Monitoring of distributed systems |
US11044271B1 (en) * | 2018-03-15 | 2021-06-22 | NortonLifeLock Inc. | Automatic adaptive policy based security |
US10855702B2 (en) | 2018-06-06 | 2020-12-01 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11036198B2 (en) | 2018-08-30 | 2021-06-15 | British Telecommunications Public Limited Company | Monitoring of distributed systems with measuring effectiveness of a first policy to derive a satisfaction measure |
US11212322B2 (en) * | 2018-10-10 | 2021-12-28 | Rockwelll Automation Technologies, Inc. | Automated discovery of security policy from design data |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
US11218500B2 (en) | 2019-07-31 | 2022-01-04 | Secureworks Corp. | Methods and systems for automated parsing and identification of textual data |
US11233742B2 (en) | 2019-11-05 | 2022-01-25 | Cisco Technology, Inc. | Network policy architecture |
CN111327601B (zh) * | 2020-01-21 | 2022-08-30 | 广东电网有限责任公司广州供电局 | 异常数据响应方法、系统、装置、计算机设备和存储介质 |
CN111800408B (zh) * | 2020-06-30 | 2022-09-30 | 深信服科技股份有限公司 | 策略配置装置、终端的安全策略配置方法和可读存储介质 |
US11968215B2 (en) | 2021-12-16 | 2024-04-23 | Bank Of America Corporation | Distributed sensor grid for intelligent proximity-based clustering and authentication |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1143660A2 (en) * | 1999-06-10 | 2001-10-10 | Alcatel Internetworking, Inc. | State transition protocol for high availability units |
US6408391B1 (en) | 1998-05-06 | 2002-06-18 | Prc Inc. | Dynamic system defense for information warfare |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07141296A (ja) * | 1993-11-15 | 1995-06-02 | Hitachi Ltd | オープンな分散環境におけるセキュリティ管理装置 |
US5968176A (en) * | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
US5978917A (en) * | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses |
US6073089A (en) | 1997-10-22 | 2000-06-06 | Baker; Michelle | Systems and methods for adaptive profiling, fault detection, and alert generation in a changing environment which is measurable by at least two different measures of state |
US6484261B1 (en) * | 1998-02-17 | 2002-11-19 | Cisco Technology, Inc. | Graphical network security policy management |
US6457129B2 (en) | 1998-03-31 | 2002-09-24 | Intel Corporation | Geographic location receiver based computer system security |
US6735701B1 (en) * | 1998-06-25 | 2004-05-11 | Macarthur Investments, Llc | Network policy management and effectiveness system |
US6282546B1 (en) * | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
US6324656B1 (en) * | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
US6301668B1 (en) * | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6499107B1 (en) * | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
US6415321B1 (en) * | 1998-12-29 | 2002-07-02 | Cisco Technology, Inc. | Domain mapping method and system |
JP2000227855A (ja) | 1999-02-05 | 2000-08-15 | Nippon Telegr & Teleph Corp <Ntt> | スクリプト記述生成方法及び装置及びスクリプト記述生成プログラムを格納した記憶媒体 |
US6380851B1 (en) * | 1999-05-12 | 2002-04-30 | Schlumberger Resource Management Services, Inc. | Processing and presenting information received from a plurality of remote sensors |
JP2001273388A (ja) | 2000-01-20 | 2001-10-05 | Hitachi Ltd | セキュリティ管理システムおよび方法 |
US6604100B1 (en) * | 2000-02-09 | 2003-08-05 | At&T Corp. | Method for converting relational data into a structured document |
AU2001294083A1 (en) | 2000-08-18 | 2002-02-25 | Camelot Information Technologies Ltd. | An adaptive system and architecture for access control |
JP4574085B2 (ja) | 2000-09-07 | 2010-11-04 | 富士通株式会社 | 仮想通信路および仮想通信路を制御するエージェント連携システムおよびエージェント連携方法 |
US20020078382A1 (en) * | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
US6766165B2 (en) * | 2000-12-05 | 2004-07-20 | Nortel Networks Limited | Method and system for remote and local mobile network management |
JP2002251374A (ja) | 2000-12-20 | 2002-09-06 | Fujitsu Ltd | 情報管理システム、情報管理方法、およびその方法をコンピュータに実行させるプログラム、並びにそのプログラムを記録したコンピュータ読み取り可能な記録媒体 |
US7412721B2 (en) | 2000-12-20 | 2008-08-12 | Fujitsu Limited | Method of and system for managing information, and computer product |
JP3744361B2 (ja) | 2001-02-16 | 2006-02-08 | 株式会社日立製作所 | セキュリティ管理システム |
US20020184525A1 (en) * | 2001-03-29 | 2002-12-05 | Lebin Cheng | Style sheet transformation driven firewall access list generation |
JP2003085139A (ja) | 2001-09-10 | 2003-03-20 | Mitsubishi Electric Corp | 侵入検知管理システム |
US8776230B1 (en) * | 2001-10-02 | 2014-07-08 | Mcafee, Inc. | Master security policy server |
US7836503B2 (en) * | 2001-10-31 | 2010-11-16 | Hewlett-Packard Development Company, L.P. | Node, method and computer readable medium for optimizing performance of signature rule matching in a network |
US7444679B2 (en) * | 2001-10-31 | 2008-10-28 | Hewlett-Packard Development Company, L.P. | Network, method and computer readable medium for distributing security updates to select nodes on a network |
US7047564B2 (en) * | 2001-10-31 | 2006-05-16 | Computing Services Support Solutions, Inc. | Reverse firewall packet transmission control system |
US20030084326A1 (en) * | 2001-10-31 | 2003-05-01 | Richard Paul Tarquini | Method, node and computer readable medium for identifying data in a network exploit |
US20030188189A1 (en) * | 2002-03-27 | 2003-10-02 | Desai Anish P. | Multi-level and multi-platform intrusion detection and response system |
IL149583A0 (en) * | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
US20070022155A1 (en) * | 2002-08-22 | 2007-01-25 | Owens David H | Method and system for integrating enterprise software applications with desktop software applications |
US8091117B2 (en) * | 2003-02-14 | 2012-01-03 | Preventsys, Inc. | System and method for interfacing with heterogeneous network data gathering tools |
-
2003
- 2003-03-31 US US10/404,978 patent/US10110632B2/en not_active Expired - Fee Related
-
2004
- 2004-02-09 GB GB0513404A patent/GB2412540B/en not_active Expired - Fee Related
- 2004-02-09 KR KR1020057018600A patent/KR100831483B1/ko not_active IP Right Cessation
- 2004-02-09 WO PCT/US2004/003893 patent/WO2004095801A1/en active Application Filing
- 2004-02-09 DE DE112004000428T patent/DE112004000428B4/de not_active Expired - Fee Related
- 2004-02-09 JP JP2005518877A patent/JP2006521598A/ja active Pending
- 2004-02-09 CN CNA2004800089151A patent/CN1768518A/zh active Pending
- 2004-02-12 TW TW093103362A patent/TWI253571B/zh not_active IP Right Cessation
-
2009
- 2009-05-25 JP JP2009125582A patent/JP2009187587A/ja active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6408391B1 (en) | 1998-05-06 | 2002-06-18 | Prc Inc. | Dynamic system defense for information warfare |
EP1143660A2 (en) * | 1999-06-10 | 2001-10-10 | Alcatel Internetworking, Inc. | State transition protocol for high availability units |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101315340B1 (ko) | 2011-10-19 | 2013-10-08 | 주식회사 이노그리드 | 보안 크레디트 정보 처리 방법 |
KR20130138542A (ko) * | 2012-06-11 | 2013-12-19 | 한국전자통신연구원 | 보안 침해 대응 프로세스 기반의 물리/it 보안장비 제어 장치 및 방법 |
KR101928525B1 (ko) | 2012-06-11 | 2018-12-13 | 한국전자통신연구원 | 보안 침해 대응 프로세스 기반의 물리/it 보안장비 제어 장치 및 방법 |
KR102090757B1 (ko) * | 2019-01-15 | 2020-03-19 | 주식회사 이글루시큐리티 | 침해사고 대응지시서에 기반한 보안장비 제어정책 자동 적용 시스템 및 그 방법 |
US11882125B2 (en) | 2021-05-26 | 2024-01-23 | Netskope, Inc. | Selection of session protocol based on policies |
Also Published As
Publication number | Publication date |
---|---|
DE112004000428B4 (de) | 2009-11-26 |
TWI253571B (en) | 2006-04-21 |
GB2412540B (en) | 2006-12-13 |
CN1768518A (zh) | 2006-05-03 |
WO2004095801A1 (en) | 2004-11-04 |
DE112004000428T5 (de) | 2006-02-09 |
TW200500893A (en) | 2005-01-01 |
GB2412540A (en) | 2005-09-28 |
US10110632B2 (en) | 2018-10-23 |
JP2006521598A (ja) | 2006-09-21 |
GB0513404D0 (en) | 2005-08-03 |
KR20050118223A (ko) | 2005-12-15 |
US20040193912A1 (en) | 2004-09-30 |
JP2009187587A (ja) | 2009-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100831483B1 (ko) | 보안 정책을 관리하는 방법 및 시스템 | |
US8185955B2 (en) | Intrusion detection method and system, related network and computer program product therefor | |
US7596807B2 (en) | Method and system for reducing scope of self-propagating attack code in network | |
US7779119B2 (en) | Event monitoring and management | |
US20030135749A1 (en) | System and method of defining the security vulnerabilities of a computer system | |
US7870598B2 (en) | Policy specification framework for insider intrusions | |
US20090271504A1 (en) | Techniques for agent configuration | |
US7926113B1 (en) | System and method for managing network vulnerability analysis systems | |
US20030159060A1 (en) | System and method of defining the security condition of a computer system | |
US20050216956A1 (en) | Method and system for authentication event security policy generation | |
KR102033169B1 (ko) | 지능형 보안로그 분석방법 | |
JP4327698B2 (ja) | ネットワーク型ウィルス活動検出プログラム、処理方法およびシステム | |
US20050203921A1 (en) | System for protecting database applications from unauthorized activity | |
US20050120054A1 (en) | Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications | |
US10567417B1 (en) | Systems and methods for adaptive security protocols in a managed system | |
JP6933320B2 (ja) | サイバーセキュリティフレームワークボックス | |
US20090249483A1 (en) | Command and Control Systems for Cyber Warfare | |
KR102250147B1 (ko) | 네트워크 보안 기능 인터페이스를 위한 보안 정책 번역 | |
Yurcik et al. | UCLog+: a security data management system for correlating alerts, incidents, and raw data from remote logs | |
GB2381721A (en) | system and method of defining unauthorised intrusions on a computer system by specifying data signatures and policies for attacks | |
Agbariah | Automated policy compliance and change detection managed service in data networks | |
Joubert et al. | Collection and Aggregation of Security Events | |
Gerhards et al. | Remotely monitoring IIS log files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20130503 Year of fee payment: 6 |
|
FPAY | Annual fee payment |
Payment date: 20140502 Year of fee payment: 7 |
|
FPAY | Annual fee payment |
Payment date: 20150430 Year of fee payment: 8 |
|
FPAY | Annual fee payment |
Payment date: 20160427 Year of fee payment: 9 |
|
FPAY | Annual fee payment |
Payment date: 20170504 Year of fee payment: 10 |
|
FPAY | Annual fee payment |
Payment date: 20180427 Year of fee payment: 11 |
|
LAPS | Lapse due to unpaid annual fee |