UNWANTED TUNNELING ALERT SYSTEM
    1.
    发明申请

    公开(公告)号:US20220150263A1

    公开(公告)日:2022-05-12

    申请号:US17526953

    申请日:2021-11-15

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    Unwanted tunneling alert system
    2.
    发明授权

    公开(公告)号:US11201879B2

    公开(公告)日:2021-12-14

    申请号:US16822646

    申请日:2020-03-18

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    VERIFIABLE REDACTABLE AUDIT LOG
    3.
    发明申请

    公开(公告)号:US20210258146A1

    公开(公告)日:2021-08-19

    申请号:US17308370

    申请日:2021-05-05

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    Verifiable redactable audit log
    4.
    发明授权

    公开(公告)号:US11032065B2

    公开(公告)日:2021-06-08

    申请号:US16009094

    申请日:2018-06-14

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    Verifiable redactable audit log
    5.
    发明授权
    Verifiable redactable audit log 有权
    可验证的可重新审核日志

    公开(公告)号:US09338013B2

    公开(公告)日:2016-05-10

    申请号:US14223918

    申请日:2014-03-24

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    Abstract translation: 在一些实施例中,可验证的可修改日志,其在每个条目中可以包含多个哈希值,以便将日志的机密性确认为可验证性。 可以使用重新计算散列和验证可信数字签名来验证日志。 在一些实施例中,日志可以被划分成段,每个段由时间服务器签名或使用临时密钥系统进行自签名。 在一些实施例中,关于特定对象或事件的日志消息可以嵌套在日志内以防止报告省略。 日志记录系统可能会收到进入日志的事件或消息。

    Unwanted tunneling alert system
    6.
    发明授权

    公开(公告)号:US12192218B2

    公开(公告)日:2025-01-07

    申请号:US18360713

    申请日:2023-07-27

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    Unwanted tunneling alert system
    7.
    发明授权

    公开(公告)号:US11757905B2

    公开(公告)日:2023-09-12

    申请号:US17526953

    申请日:2021-11-15

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    UNWANTED TUNNELING ALERT SYSTEM
    8.
    发明申请

    公开(公告)号:US20200220884A1

    公开(公告)日:2020-07-09

    申请号:US16822646

    申请日:2020-03-18

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    Unwanted tunneling alert system
    9.
    发明授权

    公开(公告)号:US10609046B2

    公开(公告)日:2020-03-31

    申请号:US15891873

    申请日:2018-02-08

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

Patent Agency Ranking