H04L63/0209

Network resource access system and method, user portal and resource portal

The invention relates to the technical field of network security, in particular to a network resource access system and method, a user portal, and a resource portal to isolate users from network resources to reduce unnecessary information disclosure, thus reducing security risks. According to the technical solution, the resource portal acquires resource information associated with the resource portal according to a configuration from an administrator or from a third party, as well as a list of user portals capable of communicating with the resource portal, receives a second access request sent from a user portal in the list of user portals, generates a third access request according to the second access request, and then sends the third access request to a target network resource server.

Fulfillment of requests stored on a message queue

According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions that may cause the processor to determine whether a request is stored in a message queue, in which the apparatus may be inside of a domain and the message queue may be outside of the domain. Based on a determination that a request is stored in the message queue, the processor may pull the request from the message queue through a domain boundary, fulfill the request to cause a response to the request to be generated, and forward the response to the message queue through the domain boundary.

Malware Detection with Multi-level, Ensemble Artificial Intelligence using Bidirectional Long Short-Term Memory Recurrent Neural Networks and Natural Language Processing
20230063913 · 2023-03-02 ·

A multi-level, ensemble network monitoring system for detection of suspicious network activity from one or more a plurality of user computing devices on an external network communicatively connected via a network server to a private communication network is disclosed. In malware detection, the ensemble network monitoring system comprises artificial intelligence (AI) with bidirectional long short-term memory (BDLSTM) recurrent neural networks (RNNs) and natural language processing (NLP) to predict possible security threats and then initiate remedial measures accordingly. Enabling a proactive approach to detection and prevention of potential malicious activity, the BDLSTM RNN may perform real-time monitoring and proactively forecast network security violations to block network communications associated with high-risk user computing devices from accessing a private communication network.

SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION
20230060895 · 2023-03-02 · ·

Systems, devices, and methods are discussed for limiting exposure of internal network operations beyond the boundary of a secure network.

Method device and system for policy based packet processing

Provided are methods, apparatus, and system for policy based wide area network. A network of network appliances is configured with a policy configuration. Each network appliance is configured to validate each wide area network packet against the policy configuration. The validation can include verifying that the packets meet the SD-WAN network segment requirements and security rules including verifying that the source and destination address of the packet meet the firewall zone requirements. Each wide area network packet contains a policy header that is checked by the sending and receiving network appliance against the policy configuration.

System and method for automatic WAF service configuration

A method and system for continuously configuring a web application firewall (WAF) are provided. The method includes receiving a request directed at a protected web application, wherein the request is received from a client device associated with a trusted user account, and wherein the protected web application is protected by the WAF; validating the received request based on at least a signature included in a header of the received request; when the received request is validated, generating an authorization rule based on the received request, wherein the authorization rule allows access to a resource of the protected web application designated in the received request, wherein the generated authorization rule is included in at least one whitelist the WAF is configured with; and configuring the WAF with the generated authorization rule to allow the received request and subsequent request to be directed to the resource of the protected web application.

SYSTEM AND METHOD FOR MANAGING AND SECURING AN ENTERPRISE NETWORK ASSOCIATED WITH AN ORGANIZATION
20230164114 · 2023-05-25 ·

A system and method for managing and securing an enterprise network associated with an organization is disclosed. The method includes segmenting an enterprise network into a set of security zones, establishing a communication path between an external zone and an external network card for allowing the external zone to access external networks, and establishing a communication path between the internal zone and an internal network card for allowing the internal zone to access the enterprise network. Furthermore, the method includes performing a partitioning operation on a hardware solution to divide the hardware partition into one or more hardware units, allocating the one or more hardware units to the set of security zones, and assigning one or more access rights to the external zone. The method includes assigning one or more internal services to the internal zone and performing one or more first gateway operations.

CONFIDENTIAL COMPUTING ENVIRONMENT FOR SERVICE MESH ON A NETWORK INTERFACE DEVICE

Examples described herein relate to a executing a service mesh in a trust domain in a network interface device and executing one or more services in a second trust domain in one or more devices. In some examples, the network interface device is configured to determine trust domain capabilities of the network interface device and provide the trust domain capabilities based on a query.

System And Method For Secure Network Access Of Terminal
20220337604 · 2022-10-20 ·

A system and a method for providing a secure network access of a terminal, the system including: a terminal; a gateway located at a boundary of a network to which the terminal belongs; and a server which manages data transmission between the terminal and the gateway. The server: generates a control flow between the terminal and the server upon receiving a controller access request from the terminal; transmits, to the terminal, identification information of the control flow, and a threat detection policy stored in a database of the server; receives, from the terminal, the controller access update request including threat detection information indicating a result of executing a threat detection function installed in the terminal on the basis of the threat detection policy; and, when detection of a threat is confirmed from the threat detection information, cancels the control flow on the basis of the threat detection policy.

Edge gateway system with data typing for secured process plant data delivery

An edge gateway system securely delivers and exposes data generated by and/or related to a process plant for consumption by external systems, and includes a field-facing component that sends, to an edge-facing component of the system, a collection of data types defined based on configurations of the process plant and represented using a syntax that is native to the one or more external systems. The field-facing component streams process plant-related content data indicated by one or more interest lists to the edge-facing component, where the streamed data is expressed using the collection of data types. Each interest list may include multiple types of data (e.g., control, I/O, diagnostic, device, historical, etc.) that collectively represent a particular named entity of the plant. Accordingly, the streamed data is securely delivered and exposed, via the edge-facing component, to the external systems.