发明名称 METHOD FOR DETECTING THE HIJACKING OF COMPUTER RESOURCES
摘要 <p>The present invention relates to a method for detecting the hijacking of computer resources (111) that are located in an internal network (100), implementing security and confidentiality criteria specific to said internal network (100), and are moreover connected to an external network (102), free from such security and confidentiality criteria, by means of a connection (104) managed by an access provider, characterized in that said method includes the following steps: the step (106) of storing a connection parameter (108) implemented by the computer resources (111) in order to communicate with the external network (102); the step (112) of processing said stored parameter (108) according to an irreversible function, thus generating a single code corresponding to said stored parameter but not allowing said parameter to be identified on the basis of the corresponding generated code; and the step (114) of sending, to a server (118) located in the external network, said generated code so that said server (118) can carry out an analysis of the activity of the computer resources (111) on the basis of said single code and detect the hijacking of the computer resources.</p>
申请公布号 WO2011083226(A1) 申请公布日期 2011.07.14
申请号 WO2010FR52639 申请日期 2010.12.08
申请人 ALCATEL LUCENT;CLEVY, LAURENT;MARTIN, ANTONY 发明人 CLEVY, LAURENT;MARTIN, ANTONY
分类号 G06F21/55;G06F21/56;H04L29/06 主分类号 G06F21/55
代理机构 代理人
主权项
地址