Human user verification of high-risk network access

Active Publication Date: 2015-06-25
FORTINET
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]Systems and methods are described for verifying a high-risk network access has been initiated by or is otherwise authorized by a human user. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test

Problems solved by technology

Some malware actively scan or attack other computers on the Inter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Human user verification of high-risk network access
  • Human user verification of high-risk network access
  • Human user verification of high-risk network access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016]Systems and methods are described for verifying a high-risk network access has been initiated by or is otherwise authorized by a human user. According to one embodiment, automated network accesses initiated by malware can be identified and blocked by an intermediary security device, such as a gateway or a firewall. Responsive to observing a high-risk network access, the intermediary security device may send a verification message to the user. The intermediary security device may allow the network access if an appropriate response to the verification message is received from the user. According to one embodiment, the verification message is something other than a simple Yes or No message, which could be easily intercepted and bypassed by malware without displaying the verification message to the user.

[0017]According to one embodiment, when a high-risk network access is observed by an intermediary security device, a human user test message is sent to a potential user. If a corre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test message is sent to the human user to verify that the high-risk network access was indeed initiated by the human user. After a response to the human user test message is received by the intermediary security device, it is determined if the response is a correct response to the human user test. The security device allows the high risk network access if the response is correct.

Description

COPYRIGHT NOTICE[0001]Contained herein is material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever. Copyright © 2013, Fortinet, Inc.BACKGROUND[0002]1. Field[0003]Embodiments of the present invention generally relate to the field of network security techniques. In particular, various embodiments relate to human user verification of high risk network access performed on an intermediary security device.[0004]2. Description of the Related Art[0005]Malware includes software that may be loaded onto a computer for performing operations against an interest or intension of a user. Malware commonly perform automated network access without notification to or awareness by the user. Such network accesses include downloading malware via drive-by-download. In this ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/10H04L63/08G06F21/32H04L63/0861H04L63/1466G06F2221/2103G06F2221/2133H04L63/126G06F21/31G06F21/34G06F21/42H04L63/083H04L63/0853H04L63/1408G06F21/36H04L63/102H04L67/306H04L63/1416
Inventor YU, QIANYONG
Owner FORTINET
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products