FIELD: computer equipment.
SUBSTANCE: method of blocking network connections in real time, in which a certificate is intercepted when a secure connection is established; determining similarity of intercepted certificate to forbidden certificates, where similar is recognized a certificate, which can be displayed on a plurality of prohibited certificates, wherein the display is checked by applying the rule, generated from common features of prohibited certificates obtained as a result of clustering of a plurality of prohibited certificates; blocking the installed connection, if intercepted certificate as a result of determination of similarity is recognized as similar to forbidden certificates.
EFFECT: technical result consists in providing blocking of network connections based on comparison of digital certificates as a result of real-time blocking of network connections.
6 cl, 7 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF BLOCKING NETWORK CONNECTIONS WITH RESOURCES FROM PROHIBITED CATEGORIES | 2018 |
|
RU2702080C1 |
METHOD OF DETECTING UNAUTHORIZED CHANGES TO CERTIFICATE STORE | 2018 |
|
RU2715027C2 |
METHOD FOR DETECTING COUPLED CLUSTERS | 2019 |
|
RU2747451C2 |
METHOD FOR FORMING DEVICE CLUSTERS | 2019 |
|
RU2747452C2 |
METHOD FOR ASSIGNING AN UNKNOWN DEVICE TO A CLUSTER | 2019 |
|
RU2747466C2 |
METHOD TO LOCK ACCESS TO DATA ON MOBILE DEVICE WITH API FOR USERS WITH DISABILITIES | 2015 |
|
RU2618946C1 |
SYSTEM AND METHOD OF GENERATING RULES FOR SEARCHING DATA USED FOR PHISHING | 2014 |
|
RU2580027C1 |
SYSTEM AND METHOD OF BLOCKING SCRIPT EXECUTION | 2015 |
|
RU2606564C1 |
SYSTEM AND METHOD FOR PROVIDING CONTENT TO THE USER | 2021 |
|
RU2786353C1 |
METHOD FOR GENERATING THE SIGNATURE OF AN UNWANTED ELECTRONIC MESSAGE | 2021 |
|
RU2776924C1 |
Authors
Dates
2020-07-29—Published
2018-06-29—Filed