Invention Grant
US07770223B2 Method and apparatus for security management via vicarious network devices 有权
通过代理网络设备进行安全管理的方法和装置

Method and apparatus for security management via vicarious network devices
Abstract:
In one embodiment of a method and apparatus for protecting data, voice, and video networks from individuals with malicious intent, a real network or network device has a vicarious simulated counterpart that may take the place of the real device or network upon appropriate triggering. The simulated counterpart behaves like the real device, but records the suspect transactions. The integrity of the real network or device is therefore continuously maintained because the suspect is isolated from the real network and the suspect transactions are not passed on to the actual device or network. The recorded transactions may then be analyzed for purposes of exposing the perpetrator, discovering perpetrator behavior patterns, and identifying device or network security weaknesses.
Information query
Patent Agency Ranking
0/0