APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF HARDWARE BOARD

    公开(公告)号:US20230004680A1

    公开(公告)日:2023-01-05

    申请号:US17738524

    申请日:2022-05-06

    Abstract: Disclosed herein are an apparatus and method for verifying the integrity of a hardware board. The apparatus includes one or more processors and execution memory for storing at least one program that is executed by the processors, wherein the program is configured to compare images of components arranged on a verification target board and a source board in a first image, obtained by photographing the verification target board, and in a second image prestored for the source board, as to whether images of the components are identical to each other, and compare first firmware extracted from the verification target board with second firmware of the source board, as to whether first firmware is identical to second firmware and verify integrity of the verification target board based on whether the images are identical to each other and on whether the pieces of firmware are identical to each other.

    NETWORK ENVIRONMENT SYNCHRONIZATION APPARATUS AND METHOD

    公开(公告)号:US20220188339A1

    公开(公告)日:2022-06-16

    申请号:US17552328

    申请日:2021-12-15

    Abstract: Disclosed herein are a network environment synchronization apparatus and method. The network environment synchronization apparatus includes one or more processors, and execution memory for storing at least one program that is executed by the one or more processors, wherein the at least one program is configured to collect data from a network environment and generate a management structure in which collected data is distributed into preset respective group units, generate data discriminators for respective group units using a preset hash function, determine whether data of the management structure has changed with reference to data newly collected from the network environment based on the data discriminators, and when it is determined whether data of the management structure has changed, update the data of the management structure with the newly collected data.

    DEVICE WITH FLASH MEMORY AND METHOD FOR WRITING/ERASING/UPDATING DATA IN FLASH MEMORY THEREOF

    公开(公告)号:US20220155974A1

    公开(公告)日:2022-05-19

    申请号:US17507727

    申请日:2021-10-21

    Abstract: Disclosed herein is a device equipped with flash memory, which includes memory in which at least one program is recorded and a processor for executing the program. The memory includes flash memory including a data area and a backup area, and the program divides data into two or more segments depending on whether the data can be stored in a single page and stores the same in the data area. The first segment is stored in a page along with a segment number, indicating the sequential position of the divided data, a segment offset, indicating the number of pages between the pages in which the current segment and the next segment are stored, the size of a data file name, the size of the data, and the file name. At least one additional segment may be stored in another page along with the segment number and segment offset thereof.

    DECOY APPARATUS AND METHOD FOR EXPANDING FAKE ATTACK SURFACE USING DECEPTION NETWORK

    公开(公告)号:US20200153861A1

    公开(公告)日:2020-05-14

    申请号:US16679622

    申请日:2019-11-11

    Abstract: Disclosed herein are a decoy apparatus and a method for expanding a fake attack surface using a deception network. The method includes determining, by a protected server, whether a packet is a target to be processed when the packet is received; converting, by the protected server, the packet and transmitting, by the protected server, the converted packet to the decoy apparatus of the deception network when the packet is determined not to be such a target; receiving, by the protected server, a response packet from a decoy virtual machine included in the decoy apparatus as a reply to the converted packet; and modifying, by the protected server, the response packet and transmitting, by the protected server, the modified response packet to the source from which the packet was transmitted, in order to expand the fake attack surface.

Patent Agency Ranking