发明名称 DETECTING NETWORK INTRUSION USING A DECOY CRYPTOGRAPHIC KEY.
摘要 <p>Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data (410). The first network device receives data from the second network device that is encrypted using the decoy cryptographic key (420). The first network device determines that the data is encrypted using the decoy cryptographic key (430). The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key (440). The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data (450). The alert message also instructs the other network devices to ignore data originating from the second network device.</p>
申请公布号 MX2014011953(A) 申请公布日期 2014.12.08
申请号 MX20140011953 申请日期 2013.04.01
申请人 LANDIS+GYR INNOVATIONS, INC. 发明人 CHASKO, STEPHEN;DEMETER, MICHAEL
分类号 H04L29/06;G01D4/00 主分类号 H04L29/06
代理机构 代理人
主权项
地址
您可能感兴趣的专利