发明名称 Configuration management for network activity detectors
摘要 Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings to a second network activity detector. The second network activity detector sends a set of configuration settings in response to the request. The configuration settings include information for detecting digital security threats and/or for responding to detected digital security threats. In this way, configuration settings are propagated from one network activity detector to another so that network activity detectors within a UTMS system are configured consistently, e.g., have up-to-date information for detecting and/or responding to digital security threats.
申请公布号 US9021574(B1) 申请公布日期 2015.04.28
申请号 US201414207382 申请日期 2014.03.12
申请人 TrustPipe LLC 发明人 Flowers John S.
分类号 G06F15/16;H04L29/06 主分类号 G06F15/16
代理机构 Morrison & Foerster LLP 代理人 Morrison & Foerster LLP
主权项 1. A method of promoting computer network security in a network comprising a first network activity detector, a second network activity detector, and a third network activity detector, the method comprising: sending, by the first network activity detector to the second network activity detector, a first User Datagram Protocol (UDP) network packet, wherein the first UDP network packet comprises a request for configuration information; receiving, by the first network activity detector from the second network activity detector, a second UDP network packet, wherein the second UDP network packet comprises a first configuration information, wherein the first configuration information includes a set of information for detecting digital security threats; sending, by the second network activity detector to the third network activity detector, a third UDP network packet, wherein the third UDP network packet comprises a request for configuration information; receiving, by the second network activity detector from the third network activity detector, a fourth UDP network packet, wherein the fourth UDP network packet comprises a second configuration information, wherein the second configuration information includes the set of information for detecting digital security threats; in response to receiving the first UDP network packet from the first network activity detector, sending, to the first network activity detector, the first configuration information, wherein the first configuration information includes the set of information for detecting digital security threats; creating, by the third network activity detector, the set of information for detecting digital security threats; and in response to receiving the third UDP network packet from the second network activity detector, sending, by the third network activity detector to the second network activity detector, the second configuration information, wherein the second configuration information includes the set of information for detecting digital security threats.
地址 Healdsburg CA US