Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cascading security architecture

A security and correlation technology, applied in computer security devices, file management systems, instruments, etc., can solve the problems of data slowdown, inability to monitor sensitive information, inability to analyze network traffic, etc., and achieve the effect of preventing leakage

Active Publication Date: 2009-04-01
TREND MICRO INC
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The downside of this approach is that it cannot analyze encrypted network traffic
For example, any web traffic using Hypertext Transfer Protocol (HTTP) over Secure Sockets Layer (SSL) protocol is encrypted for security and cannot be monitored for sensitive information
Also, because information checks by network probes take time, data flowing through routers is slowed, affecting network performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cascading security architecture
  • Cascading security architecture
  • Cascading security architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] For illustrative purposes only, the drawings and the following description relate to preferred embodiments of the present invention. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will easily be regarded as viable alternatives that can be adopted without departing from the principles of the claimed invention.

[0023] Reference will now be made in detail to various embodiments, examples of which are illustrated in the accompanying drawings. It should be noted that the same or similar reference numbers wherever feasible in the various drawings may represent the same or similar functions. The drawings depict various embodiments of the invention for illustrative purposes only. Based on the following discussion, those skilled in the art will readily recognize that, without departing from the principles described herein, alternative embodiments of the structures and methods illustrated herein can also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and a method are disclosed for sensitive document management. The system includes one or more agents, a behavior analysis engine, a local policy engine, and a local matching service. The method identifies whether a document is sensitive, identifies behaviors applied to the document, determines whether the document contains sensitive information and determines whether to allow the identified behavior to continue based on security policies.

Description

[0001] Cross reference to related patent applications [0002] According to 35 USC §119(e), this application claims that Fei Huang, Shu Huang and Liwei Ren filed on May 9, 2005, entitled "Architecture Of Cascading Security Solution", US Provisional Patent Application No. 60 / 679,458 And the rights and priority of US Provisional Patent Application No. (Unknown) entitled "Cascading Security Architecture" filed on April 27, 2006 by Fei Huang, Shu Huang and Liwei Ren, the full text of the application is incorporated by reference The method is incorporated into this article. [0003] The present invention is related to the U.S. Utility Patent Application No. 11 / 361,340 entitled "Matching Engine with Signature Generation" filed on February 24, 2006 by Liwei Ren, Dehua Tan, Fei Huang, Shu Huang, and Aiguo Dong. The application claims the rights and interests of the US Provisional Patent Application No. 60 / 679,314 filed on May 9, 2005, and the content of each of the applications is incorpo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/00G06F17/30G06F21/55G06F21/60G06F21/62
CPCG06F17/30011G06F21/554G06F16/93
Inventor 黄飞黄树任利伟
Owner TREND MICRO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products