METHOD TO DETECT ATTACK ATTEMPT, RECORD MEDIUM AND SECURITY PROCESSOR FOR THIS METHOD Russian patent published in 2015 - IPC G06F21/55 G06F21/71 

Abstract RU 2568298 C2

FIELD: measurement equipment.

SUBSTANCE: method is disclosed to detect an attempt of security processor attack with the help of the security processor itself, containing stages, when: several different events are measured, which happen independently from each other in absence of attack attempts; the value of attack index is created depending on one index of the ratio between two different measured events. The ratio index is time proximity between two different measured events, and the attack attempt is found, if the attack index value exceeds the specified threshold.

EFFECT: detection of an attack attempt at a security processor with the help of directly a security processor.

8 cl, 4 dwg

Similar patents RU2568298C2

Title Year Author Number
METHOD OF DETECTING ERROR WHEN READING DATA ITEM 2012
  • Baro Ehmmanjuehl'
  • Soke Patrik
RU2573952C1
METHOD OF RECEIVING MULTIMEDIA CONTENT SCRAMBLED USING CONTROL WORDS 2011
  • Gadacha Khajtem
RU2547230C2
TRANSMISSION METHOD, RECEPTION METHOD AND IDENTIFICATION METHOD, SECURITY PROCESSOR AND DATA MEDIUM FOR SAID METHODS 2009
  • Sh'Ez Kenten
  • Leporini David
RU2542934C2
METHODS FOR DECRYPTING, TRANSMITTING AND RECEIVING CONTROL WORDS, RECORDING MEDIUM AND CONTROL WORD SERVER TO IMPLEMENT SAID METHODS 2011
  • Djubrejk Zhil'
  • Mazhi Ehrvann
RU2541190C2
METHOD OF DETERMINING ILLEGAL USE OF PROCESSING DEVICE OF SECURITY SYSTEM 2011
  • Buaven Mat'E
  • Djubrejk Zhil'
RU2554825C9
METHOD OF RECEIVING AND METHOD OF TRANSMITTING MULTIMEDIA CONTENT, RECEIVER, TRANSMITTER, RECORDING MEDIUM AND DATA SECURITY PROCESSOR FOR SAID METHOD 2009
  • Djubrejk Zhil'
RU2495525C2
METHOD AND DEVICE TO DIAGNOSE FIRST RECEPTION OF IDENTIFIER, METHOD OF DETECTION, RECORD MEDIUM AND COMPUTER PROGRAMME FOR THIS METHOD 2009
  • Gadasha Ehjtan
RU2494454C2
METHOD OF SMOOTHING WORKLOAD ON SERVER 2012
  • Buaven Mat'E
RU2573236C2
SELECTING RESOURCE FOR DETECTION AND COMMUNICATION FROM DEVICE TO DEVICE 2015
  • Chzhao Yujsin
  • Pani Diana
  • Pellete Gislen
  • Marine Pol
  • Pellete Benua
  • Kaur Samian
RU2643349C1
METHOD OF PROTECTION AGAINST DDOS-ATTACK ON BASIS OF TRAFFIC CLASSIFICATION 2018
  • Repin Dmitrij Sergeevich
  • Krasnov Andrej Evgenevich
  • Nadezhdin Evgenij Nikolaevich
  • Nikolskij Dmitrij Nikolaevich
  • Galyaev Vladimir Sergeevich
  • Zykova Evgeniya Andreevna
RU2704741C2

RU 2 568 298 C2

Authors

Baro Ehmmanjuehl'

Graneh Oliv'E

Soke Patrik

Dates

2015-11-20Published

2010-06-23Filed