The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 11, 2015

Filed:

Dec. 08, 2010
Applicants:

Laurent Clevy, Nozay, FR;

Antony Martin, Nozay, FR;

Inventors:

Laurent Clevy, Nozay, FR;

Antony Martin, Nozay, FR;

Assignee:

Alcatel Lucent, Boulogne-Billancourt, FR;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); G06F 17/00 (2006.01); H04L 29/06 (2006.01); H04L 9/32 (2006.01); G06F 21/56 (2013.01); G06F 21/55 (2013.01);
U.S. Cl.
CPC ...
G06F 21/566 (2013.01); G06F 21/55 (2013.01); H04L 63/0407 (2013.01); H04L 63/0236 (2013.01); H04L 63/0428 (2013.01); H04L 63/08 (2013.01); H04L 63/1408 (2013.01); H04L 63/1416 (2013.01); H04L 63/1458 (2013.01); H04L 63/1466 (2013.01); H04L 2463/144 (2013.01);
Abstract

An exemplary technique is provided for detecting a hijacking of computer resources, located in an internal network implementing security criteria and confidentiality criteria specific to the internal network, connected to an external network with no security criteria and confidentiality criteria, through a connection managed by a service provider. The technique includes storing, at the internal network, a connection parameter implemented by the computer resources to communicate with the external network; processing, at the internal network, the stored connection parameter based on an irreversible function to generate a unique code that corresponds to the stored connection parameter but which does not allow the identification of the stored connection parameter from the corresponding generated unique code; and sending, at the internal network, the generated unique code to a server located on the external network so that the server can analyze an activity of the computer resources from the unique code and detect any hijacking of the computer resources.


Find Patent Forward Citations

Loading…