Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020068826 - ELECTRONIC CONTROLLER SECURITY SYSTEM

Publication Number WO/2020/068826
Publication Date 02.04.2020
International Application No. PCT/US2019/052692
International Filing Date 24.09.2019
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04L 29/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
08Transmission control procedure, e.g. data link level control procedure
CPC
H04L 63/1416
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
1416Event detection, e.g. attack signature detection
H04L 63/1425
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
1425Traffic logging, e.g. anomaly detection
H04L 63/1491
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1441Countermeasures against malicious traffic
1491using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
H04L 67/10
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
67Network-specific arrangements or communication protocols supporting networked applications
10in which an application is distributed across nodes in the network
H04L 67/12
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
67Network-specific arrangements or communication protocols supporting networked applications
12adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
H04L 67/34
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
67Network-specific arrangements or communication protocols supporting networked applications
34involving the movement of software or configuration parameters
Applicants
  • KARAMBA SECURITY LTD. [IL]/[IL]
  • DOTAN, Amiram [US]/[US]
Inventors
  • DOTAN, Amiram
  • HERZBERG, Amir
  • HAREL, Assaf
  • BARZILAI, David
  • MORDECHAI, Eli
  • DAVID, Tal Efraim Ben
  • KHAZON, Itay
Agents
  • KARAS, Matthew M.
Priority Data
16/140,14424.09.2018US
62/735,64724.09.2018US
62/752,11129.10.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) ELECTRONIC CONTROLLER SECURITY SYSTEM
(FR) SYSTÈME DE SÉCURITÉ DE DISPOSITIF DE COMMANDE ÉLECTRONIQUE
Abstract
(EN)
Technology descried here can be used for collecting information about malicious attacks on computer devices. Hosting hardware can be configured to host virtual machines, virtual machines of ECU images, and ECUs to collect records of malicious attacks. An attack analyzer can generate fingerprints from the malicious attacks.
(FR)
La présente invention concerne une technologie pouvant servir à collecter des informations concernant des attaques malveillantes sur des dispositifs informatiques. Un matériel d'hébergement peut être conçu afin d'héberger des machines virtuelles, des machines virtuelles d'images d'ECU et des ECU, permettant de collecter des enregistrements d'attaques malveillantes. Un analyseur d'attaques peut produire des empreintes digitales à partir des attaques malveillantes.
Also published as
Latest bibliographic data on file with the International Bureau