SYSTEM AND METHOD FOR AUTOMATIC DEVICE DETECTION, DEVICE CONTROL AND REMOTE ASSISTANCE Russian patent published in 2019 - IPC H04L29/06 H04L12/24 

Abstract RU 2691858 C2

FIELD: physics.

SUBSTANCE: invention relates to protection of local network of client systems (for example, Internet devices of things, such as smartphones, household appliances, wearable devices, and so forth) against computer security threats. For this purpose, when introduced into a local network, some versions of implementing a network controller take over some network services from a router, and automatically set a network controller as a gateway to a local network. Network controller then performs an automatic device detection procedure and distributes the agent-specific auxiliary agents over the secure client systems. Example of an auxiliary agent detects when its host device has left the local network, and in response establishes a virtual private network (VPN) tunnel through a security server to provide protection of the corresponding device.

EFFECT: technical result is automatic detection and configuration of such devices for their safety.

28 cl, 23 dwg

Similar patents RU2691858C2

Title Year Author Number
ENDPOINT SECURITY SYSTEM AND METHOD 2015
  • Chebere Bogdan-Konstantin
  • Akim Joan-Aleksandru
  • Stan Kozmin-Klaudiu
  • Rusu Andrej
RU2693922C2
USER INTERFACE FOR PROVIDING SECURITY AND REMOTE CONTROL OF NETWORK ENDPOINTS 2015
  • Chebere Bogdan-Konstantin
  • Akim Joan-Aleksandru
  • Padina Mirela-Lujza
  • Miron Monika-Mariya
  • Stan Kozmin-Klaudiu
  • Albistyanu Katalina
  • Berte Dan-Radu
  • Dumitrake Bogdan-Teodor
  • Mirchesku Danel-Aleksandru
  • Novak Aleksandru
RU2697935C2
SYSTEMS AND METHODS FOR AUTOMATIC DEVICE DETECTION, DEVICE CONTROL AND REMOTE ASSISTANCE 2015
  • Chebere Bogdan-Konstantin
  • Mirchesku Danel-Aleksandru
RU2694022C2
SYSTEMS AND METHODS OF DEVICES AUTOMATIC DETECTION 2017
  • Cebere Bogdan-Constantin
RU2742824C2
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES 2015
  • Glejzmejkers Kurt
  • Khemilton Malkolm
  • Berberoglu Gokkhan
RU2675055C2
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES THROUGH FIREWALL 2016
  • Glejzmejkers Kurt
  • Sellere Toma Bryuno Emmanyuel
  • Abolafiya Natan
  • Berberoglu Gokkhan
  • Iturri Ajtor Peres
  • Lejno Per
  • Bodli-Skott Dzhejmi
RU2714367C1
SYSTEM AND METHOD FOR DEPLOYING PRECONFIGURED SOFTWARE 2012
  • Voronkov Konstantin Pavlovich
  • Deshevykh Stepan Nikolaevich
  • Jablokov Viktor Vladimirovich
RU2541935C2
SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE 2017
  • Lukacs Sandor
  • Lutas Andrei-Vlad
  • Anichitei Ionel C.
RU2691187C1
PROTECTION OF NETWORK DEVICES BY MEANS OF FIREWALL 2016
  • Glazemakers Kurt
  • Allansson Per Johan
  • Cellerier Thomas Bruno Emmanuel
  • Valianos Kosmas
  • Weber Tom Viljo
RU2712815C1
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE 2012
  • Voronkov Konstantin Pavlovich
  • Deshevykh Stepan Nikolaevich
  • Jablokov Viktor Vladimirovich
RU2523113C1

RU 2 691 858 C2

Authors

Chebere Bogdan-Konstantin

Akim Joan-Aleksandru

Stan Kozmin-Klaudiu

Rusu Andrej

Dates

2019-06-18Published

2015-12-11Filed