Patent classifications
H04L63/0209
TRANSMISSION DEVICE FOR TRANSMITTING DATA
A transmitting data between a real first network and a real second network is provided. The transmission device has a first network port for coupling to the real first network and a second network port for coupling to the real second network and also comprises: a simulation unit which is connected to the first network port and which is configured to receive network-specific data from the real first network via the first network port, to provide, in accordance with the received network-specific data, a virtual simulation network of the real first network, and to prepare the provided virtual simulation network, via the second network port, for access to the provided virtual simulation network by the real second network. The transmission device provided allows an attacker to be deliberately deceived, which increases security against attempts to access the real first network from the real second network.
Relay-Switch with Sandbox Communication Connections
Aspects of the disclosure relate to a relay-switch device that includes at least one sandbox to detect, isolate, and remove any discovered malware or cyber threat. In an embodiment, data is received, saved, and inspected in the at least one sandbox of the relay-switch device. A control layer manages network connectivity so that only home organization network connections or external party network connections are connected at given moment in time.
Enhanced and/or more efficient fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network
A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.
Systems and methods for uploading streamed objects to a cloud storage system
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key. The plaintext object keys are generated in advance of uploads. The plaintext object keys can be stored in an object database in the cloud. Alternatively, the plaintext object keys can be provided to a customer's HSM, encrypted, and returned to the cloud, such that encrypted object keys, encrypted by the customer, are stored in the cloud. The cloud can alternatively encrypt the customer's object keys with a master key for the customer, which is then encrypted by the customer's HSM before being stored in the cloud. Proxies are also deployed for efficiently communicating with customer security modules.
Method for filtering communication data arriving via a communication connection, in a data processing device, data processing device and motor vehicle
A method for filtering communication data arriving from a communication partner via a communication connection, which provides access to at least one storage means of a receiving data processing device having at least one computation unit, in the data processing device, wherein PCI Express, in an interface unit, receiving the communication data, of the data processing device, a filter means, at least part of which is embodied as hardware, is used so that, according to configuration information, prescribed on the data processing device, containing at least one approval condition that rates the at least one property of the useful data contained in the communication data, only the communication data meeting at least one approval condition are forwarded from the interface unit to at least one further component of the data processing device.
Cloud access security broker systems and methods via a distributed worker pool
A Cloud Access Security Broker (CASB) system includes a controller; a message broker connected to the controller; and a plurality of workers connected to the message broker and connected to one or more cloud providers having a plurality of files contained therein for one or more tenants, wherein the plurality of workers are configured to crawl through the plurality of files for the one or more tenants, based on policy and configuration for the one or more tenants provided via the controller, and based on assignments from the message broker. The plurality of workers can be further configured to cause an action in the one or more cloud providers based on the crawl and based on the policy and the configuration. The action can include any of allowing a file, deleting a file, quarantining a file, and providing a notification.
INTELLIGENT FLOW STATE SYNCHRONIZATION TO IMPROVE RESILIENCY, AVAILABILITY, AND/OR PERFORMANCE OF REDUNDANT NETWORK SECURITY DEVICES
Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.
Cybersecurity hardening for networked systems
A computer-readable medium contains cybersecurity configuration settings (CCS) generating file(s) including instructions when executed cause a processor of a computer located at a node in a networked system having computers including at least one computer system class to generate CCS. The CCS generating file includes group policy objects (GPOs) applicable to all computers, policy setting scripts that are applicable to <all the computer s, and group policy definition files which provide a policy setting library for the computer class. Execution of the CCS generating file at the node automatically generates the CCS for cybersecurity protection of the node. The computer class can include computer classes that include ≥2 different operating systems, and there can be a CCS generating file for each computer class. The CCS generating file can be a single multi-class CCS generating file that includes a plurality of CCS generating files.
Monitoring encrypted network traffic
Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
System and method for network tapestry multiprotocol integration
Systems and methods for connecting devices via a virtual global network across network fabrics using a network tapestry are disclosed. The network system comprises a first access point server in communication with a first backbone exchange server, a second access point server in communication with a second backbone exchange server, and a network tapestry comprising a first communication path connecting the first and second access point servers and a second communication path connecting the first and second backbone exchange servers.