Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

85 results about "Unified threat management" patented technology

Unified threat management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function. UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors. UTM appliances have been gaining popularity since 2009, partly because the all-in-one approach simplifies installation, configuration and maintenance. Such a setup saves time, money and people when compared to the management of multiple security systems. Instead of having several single-function appliances, all needing individual familiarity, attention and support, network administrators can centrally administer their security defenses from one computer. Some of the prominent UTM brands are Sophos, SonicWall and Check Point.

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYST INC

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Unified authentication method for simulation identity

InactiveCN106612246AImprove the guarantee service abilityImprove service capabilitiesTransmissionSystem integrationPassword
The invention discloses a unified authentication method for a simulation identity, and belongs to the technical field of computer application. The unified authentication method is characterized by comprising the steps of 1, multi-source system unified processing, 2, system integration and 3, unified authentication for the user identity. The advantages are that the method in the embodiment of the invention adopts a corresponding means of identity authentication and a means of performing unified processing on systems with different architectures so as to enable a user to log in a plurality of related systems to perform business processing by only a single user name and a single password when the user logs in the associated systems. Unified management, authority setting and the like are performed on the user. The unified authentication method lays a foundation for construction of an information service system through standardized administration of an information-based means, the safeguard service ability is improved in continuous promotion for the information-based infrastructure construction, a platform support is provided for comprehensively promoting the information construction, and a foundation is laid for the timeliness and the integrity of information resources.
Owner:星际空间(天津)科技发展有限公司

Intelligent vehicle multi-laser-radar data integration system and method thereof

An intelligent vehicle multi-laser-radar data integration system and a method of the intelligent vehicle multi-laser-radar data integration system utilize unified threat management (UTM) - 30 LX laser radars installed at the front side, the rear side, the left side and the right side of an intelligent vehicle body to acquire surrounding information and transmit the information to an upper computer in charge of data integration to obtain surrounding obstacle information, and utilize data acquired by a (learning managed system) LMS 291 and IBEO LUX installed at the front of an intelligent vehicle and transmit the data to the upper computer in charge of the data integration to obtain the obstacle information in front range of 80 meters. Accurate and final obstacle information map is obtained after the upper computer integrates the data according to a certain algorithm. The obstacle information grid map is packed and is transmitted to a programmed decision-making upper computer through a local area network built by routers, and the programmed decision-making upper computer analyzes the information, judges, makes decisions, and makes corresponding execution instructions. Through the intelligent vehicle multi-laser-radar data integration system and the method of the intelligent vehicle multi-laser-radar data integration system, obstacle-shielding capacity and safe driving performance of an unpiloted intelligent vehicle are effectively improved.
Owner:BEIJING UNIV OF TECH

Systems and Methods for Processing Data Flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Pattern management method and system of NoSQL database

The invention relates to a pattern management method of a NoSQL database. The pattern management method specifically includes the following steps that firstly, accessing or updating requests are received; secondly, classification is performed on the accessing or updating requests according to pattern types, or new pattern types and interfaces corresponding to the new pattern types are constructed according to the accessing or updating requests; thirdly, according to a pattern management table connected into the database by the accessing or updating requests through the interfaces corresponding to the pattern types, pattern information in the pattern management table is obtained; fourthly, according to a route provided by the pattern management table, data stored under different pattern types in the database are accessed or updated according to the accessing or updating requests. According to the pattern management method of the NoSQL database, unified management of various heterogeneous data in the NoSQL database is performed; according to different types and features of the data, differential pattern and interface design is achieved, and the high reading and writing performance is ensured. Meanwhile, the universal schema management strategy and a universal read-write interface are provided, and convenience is provided for expansion of data patterns.
Owner:INST OF INFORMATION ENG CAS

Method, device and system for implementing unified authentication management

The invention provides a method, device and system of realizing unified authentication management. The method provided by the invention comprises the following steps: a network management service functional entity receives an operation request message from a network element maintenance terminal; according to the operation request message, the network management service functional entity carries out unified right authentication on the request message; according to authentication results, the network element maintenance terminal executes the operation concerning the network element. The network management service functional entity provided by the invention is characterized in that: the entity comprises a security authentication module, a network element access agent module, a transmission module and a reception module. The invention also provides a system of realizing unified authentication management. The invention solves the problems of conflicting user authentication and right authentication between a network management server and the network element, complicated management right and repeated logon and authentication. With the unified right authentication management, the invention facilitates user operation, improves use satisfaction degree of user and ensures network safety.
Owner:深圳市智通天下科技服务有限公司

A unified management system for debugging information

The invention discloses a unified management system for debugging information, which is used in the field of software engineering. The system includes: an interface management module, which is used to provide a management and operation interface for debugging information; a format management module, which is used for debugging information. The format and contained information are standardized, and the contained information includes output time, module name, level and/or user-defined description information, and the grid includes the display color and layout of the information; the classification management module is used to According to the module, the debugging information is classified and managed to filter unnecessary module information or to filter out effective module information; the level management module is used for level management of the debugging information; the access management module is used for all The above debugging information is used to manage the access mode. The invention enables the software system to uniformly manage the debugging information in the process of modular development and subsequent use, so as to facilitate and effectively use the debugging information.
Owner:深圳市博康智能信息技术有限公司

Unified management and control platform for power distribution communication networks

The invention relates to a unified management and control platform for power distribution communication networks, belonging to the technical field of power communication. The unified management and control platform for the power distribution communication networks provided by the invention can solve the incompatible condition of network management systems of various manufactures. The unified management and control platform disclosed by the invention comprises an interface layer, an application layer and a service layer, and is structurally characterized in that data interaction among various layers is carried out through an Openflow protocol and a message queue manner; the interface layer is used for being docked with an external system; the interface layer manages a management protocol and an equipment interface, and is docked with element management systems EMS of various manufactures through a northbound interface; the interface layer comprises activation application and reply of an interface and activation of a data standardization data module of the interface, and activates a related task of the interface and performs interface log management; the application layer comprises an application functional module; and the application functional module controls logical processing of a process flow service by obtaining configuration information in a related link when the flow is activated.
Owner:STATE GRID LIAONING ELECTRIC POWER CO LTD SHENYANG POWER +2

Intelligent terminal information management cloud platform

The invention belongs to the technical field of intelligent vending machines, and provides an intelligent terminal information management cloud platform. The cloud platform comprises an intelligent vending terminal, a management terminal and a mobile terminal which are installed in a hotel, and a management system for being communicated with the intelligent vending terminal, the management terminal and the mobile terminal; the management system includes an address setting unit for setting the address of storage cells, an authority setting unit for setting the authority of staff, a message push unit for pushing information, a statistical unit for counting commodity vending information, a replenishment and procurement unit for reminding replenishment and procurement, and a connecting unit for being connected with a supplier's delivery system. The intelligent terminal information management cloud platform can conduct unified management on the vending and procurement conditions of goods on the platform, and saves manpower and time, and the intelligent vending machines on the platform meet the immediate needs of hotel users, and can be assembled freely into various sizes according to the requirements of a site, which shortens the manufacturing period and saves the customization cost.
Owner:无锡动力立方科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products