METHOD OF TRUSTED INTEGRATION OF ACTIVE NETWORK HARDWARE CONTROL SYSTEMS WITH DISTRIBUTED COMPUTER SYSTEMS AND SYSTEM TO THIS END Russian patent published in 2015 - IPC G06F21/44 H04L12/937 

Abstract RU 2557482 C2

FIELD: physics, computation hardware.

SUBSTANCE: invention relates to safety of info systems. Standard technical conditions of active network hardware are, first, recorded. The list of open network ports, check sums of configuration files and software files, check sums of the results of control effects over active network hardware control system are recorded. Intermittent monitoring of active network hardware is executed. Reference and current states of said reference and current hardware are compared. In case current technical state does not comply with reference state, appropriate message is generated.

EFFECT: higher level of active network hardware protection.

2 cl, 2 dwg

Similar patents RU2557482C2

Title Year Author Number
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL 2016
  • Dudarev Dmitrij Aleksandrovich
  • Panasenko Sergej Petrovich
  • Puzyrev Dmitrij Vyacheslavovich
  • Romanets Yurij Vasilevich
  • Syrchin Vladimir Kimovich
RU2633098C1
COMPUTER SYSTEM WITH REMOTE MANAGEMENT OF SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT 2017
  • Bychkov Ignat Nikolaevich
  • Dudarev Dmitrij Aleksandrovich
  • Molchanov Igor Anatolevich
  • Orlov Mikhail Viktorovich
  • Panasenko Sergej Petrovich
  • Puzyrev Dmitrij Vyacheslavovich
  • Romanets Yurij Vasilevich
  • Syrchin Vladimir Kimovich
RU2690782C2
SYSTEM FOR PROTECTING INFORMATION CONTAINING STATE SECRETS FROM UNAUTHORISED ACCESS 2012
  • Borodakij Jurij Vladimirovich
  • Mironov Aleksej Gennad'Evich
  • Dobrodeev Aleksandr Jur'Evich
  • Nashchekin Pavel Aleksandrovich
  • Chivikov Vitalij Jur'Evich
  • Boldina Marija Nikolaevna
RU2504835C1
ATTACK DETECTION SYSTEM WITH ADAPTIVE DISTRIBUTION OF COMPUTING RESOURCES 2023
  • Dobryshin Mikhail Mikhailovich
  • Shugurov Dmitrii Evgenevich
  • Reformat Andrei Nikolaevich
  • Belov Andrei Sergeevich
  • Filimonov Aleksei Valerevich
  • Gromov Iurii Iurevich
  • Anisimov Vladimir Georgievich
RU2813461C1
SYSTEM OF DATA PROTECTION FROM UNAUTHORIZED ACCESS TO THE DATA THAT CONSTITUTES NATIONAL SECURITY INFORMATION 2010
  • Borodakij Jurij Vladimirovich
  • Bel'Tov Andrej Georgievich
  • Dobrodeev Aleksandr Jur'Evich
  • Korotkov Sergej Viktorovich
  • Nashchekin Pavel Aleksandrovich
  • Nepomnjashchikh Aleksej Viktorovich
  • Sokolov Igor' Anatol'Evich
RU2443017C1
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY 2017
  • Pai, Navin Narayan
  • Jeffries, Charles G.
  • Viswanathan, Giridhar
  • Schultz, Benjamin M.
  • Smith, Frederick J.
  • Reuther, Lars
  • Ebersol, Michael B.
  • Diaz Cuellar, Gerardo
  • Pashov, Ivan Dimitrov
  • Gaddehosur, Poornananda R.
  • Pulapaka, Hari R.
  • Rao, Vikram Mangalore
RU2755880C2
CONTROL SYSTEM FOR SECURITY POLICY OF ELEMENTS OF CORPORATE COMMUNICATION NETWORK 2023
  • Dobryshin Mikhail Mikhailovich
  • Shugurov Dmitrii Evgenevich
  • Belov Andrei Sergeevich
  • Anisimov Vladimir Georgievich
  • Gromov Iurii Iurevich
  • Klimov Sergei Mikhailovich
  • Mishin Dmitrii Stanislavovich
  • Filin Andrei Viktorovich
RU2813469C1
METHOD FOR SEARCHING FOR SAMPLES OF MALICIOUS MESSAGES 2019
  • Regentov Georgij Aleksandrovich
RU2750627C2
METHOD OF CONTROLLING IDENTIFICATION OF USERS OF INFORMATION RESOURCES OF HETEROGENEOUS COMPUTER NETWORK 2009
  • Lekshin Oleg Sergeevich
RU2415466C1
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES 2015
  • Glejzmejkers Kurt
  • Khemilton Malkolm
  • Berberoglu Gokkhan
RU2675055C2

RU 2 557 482 C2

Authors

Konoplev Artem Stanislavovich

Kalinin Maksim Olegovich

Zegzhda Dmitrij Petrovich

Dates

2015-07-20Published

2013-04-23Filed