SECURE MANAGEMENT OF HOST CONNECTIONS
    1.
    发明申请
    SECURE MANAGEMENT OF HOST CONNECTIONS 有权
    主机连接的安全管理

    公开(公告)号:US20160378956A1

    公开(公告)日:2016-12-29

    申请号:US14750305

    申请日:2015-06-25

    Applicant: Avaya Inc.

    CPC classification number: G06F21/10 G06F21/606 H04L63/20 H04L67/06

    Abstract: An access gateway monitors a communication session to a first host for commands entered by a user. For example, commands entered in a command line terminal by the user. When a command is received, the access gateway receives information about an effect caused by the command on the first host. The access gateway determines if the effect results in an attempt to establish a communication session between the first host and a second host. For example, to copy files from the second host. In response to determining that the effect results in an attempt to establish a communication session between the first host and the second host, an action is generated. For example, the action may be to block the attempt to establish the communication between the first host and the second host.

    Abstract translation: 访问网关监视与用户输入的命令到第一主机的通信会话。 例如,用户在命令行终端中输入的命令。 当接收到命令时,接入网关接收到由第一主机上的命令引起的影响的信息。 接入网关确定该效果是否导致尝试在第一主机和第二主机之间建立通信会话。 例如,从第二个主机复制文件。 响应于确定该效果导致尝试在第一主机和第二主机之间建立通信会话,产生动作。 例如,该动作可以是阻止建立第一主机和第二主机之间的通信的尝试。

    Secure management of host connections

    公开(公告)号:US09779222B2

    公开(公告)日:2017-10-03

    申请号:US14750305

    申请日:2015-06-25

    Applicant: Avaya Inc.

    CPC classification number: G06F21/10 G06F21/606 H04L63/20 H04L67/06

    Abstract: An access gateway monitors a communication session to a first host for commands entered by a user. For example, commands entered in a command line terminal by the user. When a command is received, the access gateway receives information about an effect caused by the command on the first host. The access gateway determines if the effect results in an attempt to establish a communication session between the first host and a second host. For example, to copy files from the second host. In response to determining that the effect results in an attempt to establish a communication session between the first host and the second host, an action is generated. For example, the action may be to block the attempt to establish the communication between the first host and the second host.

Patent Agency Ranking