METHOD FOR PROVIDING SECURITY SERVICE FOR WIRELESS DEVICE AND APPARATUS THEREOF
    3.
    发明申请
    METHOD FOR PROVIDING SECURITY SERVICE FOR WIRELESS DEVICE AND APPARATUS THEREOF 审中-公开
    为无线设备提供安全服务的方法及其装置

    公开(公告)号:US20160234205A1

    公开(公告)日:2016-08-11

    申请号:US15007073

    申请日:2016-01-26

    CPC classification number: H04W12/06 H04L63/20 H04W12/08 H04W12/12

    Abstract: Disclosed are a method for providing a security service for a wireless device and an apparatus thereof. The method includes obtaining a wireless fingerprint of a wireless device, determining a wireless device type corresponding to the obtained wireless fingerprint by referring to a first database, determining a security policy corresponding to the determined wireless device type by referring to a second database, and applying the determined security policy to a service for the wireless device, so that the wireless device is provided with a tight security service.

    Abstract translation: 公开了一种用于为无线设备提供安全服务的方法及其装置。 该方法包括获取无线设备的无线指纹,通过参考第一数据库来确定与获得的无线指纹相对应的无线设备类型,通过参考第二数据库确定与所确定的无线设备类型相对应的安全策略,以及应用 所确定的安全策略到无线设备的服务,使得向无线设备提供紧密的安全服务。

    INTRUSION RESPONSE APPARATUS AND METHOD FOR VEHICLE NETWORK

    公开(公告)号:US20190332823A1

    公开(公告)日:2019-10-31

    申请号:US16384252

    申请日:2019-04-15

    Abstract: Disclosed herein are an intrusion response apparatus and method for a vehicle network. The intrusion response method for a vehicle network is performed by an intrusion response apparatus for the vehicle network, and includes receiving attack detection information about an intrusive attack on the vehicle network from an intrusion detection system, selecting at least one target electronic control unit that is to be instructed to respond to the intrusive attack from among multiple electronic control units, and sending a response instruction message to the at least one target electronic control unit so that the target electronic control unit responds to the intrusive attack.

    USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT
    6.
    发明申请
    USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT 审中-公开
    用户终端和播放数字管理内容的方法

    公开(公告)号:US20130232337A1

    公开(公告)日:2013-09-05

    申请号:US13779657

    申请日:2013-02-27

    Abstract: Disclosed herein are a user terminal and method for playing DRM content. The user terminal includes a common security platform. The common security platform includes a DRM application management unit and a security management unit. The DRM application management unit stores and executes a DRM application that requests authentication from a license server and receives a license, including a decryption key for decrypting encrypted DRM content. The DRM application is an application in a downloadable form. The security management unit decrypts the encrypted DRM content, provided by a content providing server, using the decryption key included in the license issued via the DRM application.

    Abstract translation: 这里公开了用于播放DRM内容的用户终端和方法。 用户终端包括公共安全平台。 公共安全平台包括DRM应用管理单元和安全管理单元。 DRM应用管理单元存储和执行从许可证服务器请求认证并接收许可证的DRM应用,包括用于解密加密的DRM内容的解密密钥。 DRM应用程序是可下载形式的应用程序。 安全管理部使用通过DRM应用发行的许可证中包含的解密密钥来解密由内容提供服务器提供的加密的DRM内容。

    METHOD AND APPARATUS FOR VISUALIZING MEDICAL DEVICE NETWORK AND SECURITY ATTACK

    公开(公告)号:US20240205242A1

    公开(公告)日:2024-06-20

    申请号:US18512891

    申请日:2023-11-17

    CPC classification number: H04L63/1416 H04L41/22

    Abstract: Disclosed herein is a method for visualizing a medical device network and a security threat. The method includes representing nodes in zones that are divided into a server zone including nodes corresponding to server devices, a medical device zone including nodes corresponding to medical devices, a white zone including registered nodes excluding the server devices and the medical devices, and a gray zone including nodes included in none of the above-mentioned zones, representing links between the nodes, and representing a node and a link in which a security attack is detected using a different color when the security attack is detected in the node.

    DEVICE IDENTIFICATION APPARATUS AND METHOD BASED ON NETWORK BEHAVIOR

    公开(公告)号:US20220150145A1

    公开(公告)日:2022-05-12

    申请号:US17507730

    申请日:2021-10-21

    Abstract: Disclosed herein are a device identification apparatus and method based on network behavior. The device identification apparatus includes one or more processors, and execution memory for storing at least one program that is executed by the one or more processors, wherein the at least one program is configured to collect packet data of a device connected to a network through port mirroring and extract behavior features from the packet data, analyze the behavior features and then generate unique information based on a previously created detection model, and extract an identification number corresponding to the unique information from a database and then identify the device.

    APPARATUS AND METHOD FOR IDENTIFYING ROGUE DEVICE
    9.
    发明申请
    APPARATUS AND METHOD FOR IDENTIFYING ROGUE DEVICE 有权
    装置和识别装置的方法

    公开(公告)号:US20150172289A1

    公开(公告)日:2015-06-18

    申请号:US14540384

    申请日:2014-11-13

    CPC classification number: H04W12/08 H04W12/12 H04W88/08

    Abstract: An apparatus and a method for identifying a rogue device having a media access control (MAC) address counterfeited/forged when a wireless intrusion prevention system controls an access to an access point (AP) and a wireless terminal which are not applied are disclosed. The apparatus includes: a sensor unit configured to collect MAC addresses, RSSI values, and RF feature values based on RF signals of wireless terminals; an RF feature database configured to store the collected MAC addresses, RSSI values, and RF feature values; and a terminal identification unit configured to identify whether a MAC of any one of the wireless terminals is forged by comparing information of the RF feature database with the RSSI value and the RF feature value of any one of the wireless terminals according to a MAC verification request of any one of the wireless terminals from the sensor unit.

    Abstract translation: 公开了一种用于识别当无线入侵防御系统控制对未应用的接入点(AP)和无线终端的接入时伪造/伪造的具有媒体访问控制(MAC)地址的流氓设备的装置和方法。 该装置包括:传感器单元,被配置为基于无线终端的RF信号收集MAC地址,RSSI值和RF特征值; RF特征数据库,被配置为存储所收集的MAC地址,RSSI值和RF特征值; 以及终端识别单元,被配置为通过根据MAC验证请求将RF特征数据库的信息与RSSI值和任何一个无线终端的RF特征值进行比较来识别无线终端中的任何一个的MAC是否被伪造 从传感器单元的任何一个无线终端。

    SELF-LEARNING-BASED INTRUSION DETECTION APPARATUS AND METHOD

    公开(公告)号:US20240205241A1

    公开(公告)日:2024-06-20

    申请号:US18453703

    申请日:2023-08-22

    CPC classification number: H04L63/1416 H04L63/1425

    Abstract: Disclosed herein are self-learning-based intrusion detection apparatus and method. The self-learning-based intrusion detection apparatus includes memory configured to store at least one program, and a processor configured to execute the program, wherein the program is configured to perform detecting an anomaly behavior in network traffic based on a first detection model, and as a self-learning event is published, generating a second detection model through self-learning in parallel with detecting the anomaly behavior, and wherein the program is configured to perform, as the second detection model is generated, in detecting the anomaly behavior, replacing the first detection model with the second detection model, and thereafter detecting the anomaly behavior in the network traffic.

Patent Agency Ranking