WO2007117181A3 - Method for protecting information resources of heterogeneous computing networks - Google Patents
Method for protecting information resources of heterogeneous computing networks Download PDFInfo
- Publication number
- WO2007117181A3 WO2007117181A3 PCT/RU2007/000169 RU2007000169W WO2007117181A3 WO 2007117181 A3 WO2007117181 A3 WO 2007117181A3 RU 2007000169 W RU2007000169 W RU 2007000169W WO 2007117181 A3 WO2007117181 A3 WO 2007117181A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information resources
- data
- administrators
- checksum
- sws
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Abstract
The invention relates to computer engineering. The technical result consists in increasing the access protection to information resources of a heterogeneous computer network. The inventive method consists in setting up a system-wide software (SWS), in randomizing each message, in reconfiguring all system interfaces into mechanisms of SWS data exchange, in creating, at each computer site a protected data warehouse for storing a checksum of each configuration file, the identifier of each end program application together with the checksum thereof, confidential data and access rights of any administrator authorized to use said data, in carrying out a mandatory and discretionary access control of an administrators, in systematically checking the above mentioned checksums and the rights of administrators and in interrupting a session the case of the mismatching of at least one of said parameters.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2006111784 | 2006-04-11 | ||
RU2006111784/09A RU2306600C1 (en) | 2006-04-11 | 2006-04-11 | Method for protecting information resources of heterogeneous computing network |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007117181A2 WO2007117181A2 (en) | 2007-10-18 |
WO2007117181A3 true WO2007117181A3 (en) | 2008-03-20 |
Family
ID=38581496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU2007/000169 WO2007117181A2 (en) | 2006-04-11 | 2007-04-10 | Method for protecting information resources of heterogeneous computing networks |
Country Status (2)
Country | Link |
---|---|
RU (1) | RU2306600C1 (en) |
WO (1) | WO2007117181A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667966B (en) * | 2009-06-11 | 2011-10-26 | 中兴通讯股份有限公司 | Method and system for realizing far-end mirror image of router |
RU2504835C1 (en) * | 2012-06-06 | 2014-01-20 | Открытое акционерное общество "Концерн "Системпром" | System for protecting information containing state secrets from unauthorised access |
RU2509425C1 (en) * | 2012-11-12 | 2014-03-10 | Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "ВОЕННАЯ АКАДЕМИЯ СВЯЗИ имени Маршала Советского Союза С.М. Буденного" Министерства обороны Российской Федерации | Method and apparatus for controlling distributed information system data streams |
RU2674802C1 (en) * | 2018-02-06 | 2018-12-13 | Федеральное государственное казенное военное образовательное учреждение высшего образования "Академия Федеральной службы охраны Российской Федерации" (Академия ФСО России) | Method of computer networks protection |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530758A (en) * | 1994-06-03 | 1996-06-25 | Motorola, Inc. | Operational methods for a secure node in a computer network |
RU2163744C2 (en) * | 1999-04-29 | 2001-02-27 | Щеглов Андрей Юрьевич | Protective system for virtual channel of corporate- network using fiscal data access control and built around channels and switching facilities of shared communication network |
RU2163727C2 (en) * | 1998-12-30 | 2001-02-27 | Щеглов Андрей Юрьевич | Protective system for virtual channel of corporate network using capability principle for controlling access to resources and built around switching facilities of shared communication network |
US20020029276A1 (en) * | 2000-04-12 | 2002-03-07 | Samuel Bendinelli | Methods and systems for an extranet |
-
2006
- 2006-04-11 RU RU2006111784/09A patent/RU2306600C1/en not_active IP Right Cessation
-
2007
- 2007-04-10 WO PCT/RU2007/000169 patent/WO2007117181A2/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530758A (en) * | 1994-06-03 | 1996-06-25 | Motorola, Inc. | Operational methods for a secure node in a computer network |
RU2163727C2 (en) * | 1998-12-30 | 2001-02-27 | Щеглов Андрей Юрьевич | Protective system for virtual channel of corporate network using capability principle for controlling access to resources and built around switching facilities of shared communication network |
RU2163744C2 (en) * | 1999-04-29 | 2001-02-27 | Щеглов Андрей Юрьевич | Protective system for virtual channel of corporate- network using fiscal data access control and built around channels and switching facilities of shared communication network |
US20020029276A1 (en) * | 2000-04-12 | 2002-03-07 | Samuel Bendinelli | Methods and systems for an extranet |
Also Published As
Publication number | Publication date |
---|---|
WO2007117181A2 (en) | 2007-10-18 |
RU2306600C1 (en) | 2007-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104769606B (en) | The system and method that the computer environment of safety is provided | |
Tianfield | Security issues in cloud computing | |
US9928359B1 (en) | System and methods for providing security to an endpoint device | |
WO2007053848A1 (en) | Centralized dynamic security control for a mobile device network | |
JP2010539584A (en) | Data security device | |
CN104704506A (en) | System control | |
WO2007117181A3 (en) | Method for protecting information resources of heterogeneous computing networks | |
Just et al. | Review and analysis of synthetic diversity for breaking monocultures | |
CN1743992A (en) | Computer operating system safety protecting method | |
Peisert et al. | Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems | |
CN101282537B (en) | Wireless terminal apparatus and method of protecting system resources | |
Papa et al. | Availability based risk analysis for SCADA embedded computer systems | |
CN202218262U (en) | Safety management system for internal network information | |
US11770363B2 (en) | Systems and methods for secure access smart hub for cyber-physical systems | |
Guo et al. | Cybersecurity risk analysis and technical defense architecture: Research of ICS in nuclear power plant construction stage | |
Byrne | Application firewalls in a defence-in-depth design | |
Sun | Research on security issues and protection strategy of computer network | |
CN2927185Y (en) | Data safety transmission equipment | |
Paudel et al. | Categorization of standards, guidelines and tools for secure system design for critical infrastructure it in the cloud | |
Itani et al. | Efficient healthcare integrity assurance in the cloud with incremental cryptography and trusted computing | |
Mansfield-Devine | A process of defence–securing industrial control systems | |
KR101519543B1 (en) | Control apparatus and method thereof in software defined network | |
Parvizimosaed et al. | Protection against Ransomware in Industrial Control Systems through Decentralization using Blockchain | |
Blanc et al. | Mandatory access control with a multi-level reference monitor: PIGA-cluster | |
Al Lawati et al. | Business perception to learn the art of Operating System auditing: A case of a local bank of Oman |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07747886 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07747886 Country of ref document: EP Kind code of ref document: A2 |