Processing

Please wait...

PATENTSCOPE will be unavailable a few hours for maintenance reason on Tuesday 25.01.2022 at 9:00 AM CET
Settings

Settings

Goto Application

1. WO2021229428 - PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS

Publication Number WO/2021/229428
Publication Date 18.11.2021
International Application No. PCT/IB2021/053997
International Filing Date 11.05.2021
IPC
H04L 29/06 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
G06F 40/35
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
40Handling natural language data
30Semantic analysis
35Discourse or dialogue representation
G06N 3/04
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
3Computer systems based on biological models
02using neural network models
04Architectures, e.g. interconnection topology
H04L 63/0218
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
02for separating internal from external traffic, e.g. firewalls
0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
0218Distributed architectures, e.g. distributed firewalls
H04L 63/0263
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
02for separating internal from external traffic, e.g. firewalls
0227Filtering policies
0263Rule management
H04L 63/1416
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
1416Event detection, e.g. attack signature detection
H04L 63/1433
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1433Vulnerability analysis
Applicants
  • INTERNATIONAL BUSINESS MACHINES CORPORATION [US]/[US]
  • IBM UNITED KINGDOM LIMITED [GB]/[GB] (MG)
  • IBM (CHINA) INVESTMENT COMPANY LIMITED [CN]/[CN] (MG)
Inventors
  • PAQUIN, Adam
  • DUNCAN, Peyton
  • SHEN, Kevin
  • BEES, Johathan
  • TUMMALAPENTA, Srinivas Babu
Agents
  • WILLIAMS, Julian
Priority Data
16/875,34015.05.2020US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS
(FR) PROTECTION D'ACTIFS INFORMATIQUES CONTRE LES ATTAQUES MALVEILLANTES
Abstract
(EN) A method selectively installs a particular signature on a particular gateway based on the type of signature and the type of computer asset that is protected by that particular gateway. A system and/or analyst receives multiple signatures, where different signatures from the multiple signatures are specific for different types of computer assets. The system and/or analyst identifies and extracts a particular signature, from the multiple signatures, that will protect, if implemented on the appropriate gateway, a particular computer asset. The system and/or analyst identifies the appropriate gateway that protects the particular computer asset, and installs only the extracted particular signature from the multiple signatures on that appropriate gateway.
(FR) Un procédé installe sélectivement une signature particulière sur une passerelle particulière sur la base du type de signature et du type d'actif informatique qui est protégé par cette passerelle particulière. Un système et/ou un analyste reçoivent de multiples signatures, différentes signatures parmi les multiples signatures étant spécifiques à différents types d'actifs informatiques. Le système et/ou l'analyste identifient et extraient une signature particulière, parmi les multiples signatures, qui protégera, si elle est mise en œuvre sur la passerelle appropriée, un actif informatique particulier. Le système et/ou l'analyste identifient la passerelle appropriée qui protège l'actif informatique particulier, et installent seulement la signature particulière extraite, parmi les multiples signatures, sur cette passerelle appropriée.
Related patent documents
Latest bibliographic data on file with the International Bureau