Movatterモバイル変換


[0]ホーム

URL:


US20160366163A1 - Method and system for managing a protective distribution system - Google Patents

Method and system for managing a protective distribution system
Download PDF

Info

Publication number
US20160366163A1
US20160366163A1US15/246,635US201615246635AUS2016366163A1US 20160366163 A1US20160366163 A1US 20160366163A1US 201615246635 AUS201615246635 AUS 201615246635AUS 2016366163 A1US2016366163 A1US 2016366163A1
Authority
US
United States
Prior art keywords
disturbance
preset threshold
detected
disturbances
zone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/246,635
Inventor
Stephen SOHN
Scott RYE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cybersecure IPS LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US15/246,635priorityCriticalpatent/US20160366163A1/en
Publication of US20160366163A1publicationCriticalpatent/US20160366163A1/en
Priority to US16/008,729prioritypatent/US10652253B2/en
Priority to US16/008,636prioritypatent/US20180324194A1/en
Priority to US16/860,789prioritypatent/US10893062B2/en
Priority to US17/146,214prioritypatent/US11388181B2/en
Assigned to CyberSecure IPS, LLCreassignmentCyberSecure IPS, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RYE, Scott, SOHN, STEPHEN
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and system for managing a protective distribution system is disclosed. In some embodiments, a physical information transmission line may be monitored. A disturbance on the physical information transmission line may be detected. The detected disturbance may not exceed a first preset threshold for triggering alerts of a first alert type based on detected disturbances. Responsive to the detection, a count for the number of disturbances within a preset time period that do not exceed the first preset threshold may be determined. A determination of whether the count, for the number of disturbances that do not exceed the first preset threshold, exceeds a second preset threshold may be effectuated. The second preset threshold may correspond to a preset number of allowable disturbances within the preset time period. An alert of the first alert type may be triggered responsive to a determination that the count exceeds the second preset threshold.

Description

Claims (20)

What is claimed:
1. A method for managing a protective distribution system, comprising:
monitoring a physical information transmission line;
detecting, via one or more sensors, a disturbance on the physical information transmission line, wherein the detected disturbance does not exceed a first preset threshold for triggering alerts of a first alert type based on detected disturbances;
determining, responsive to the detection via the one or more sensors, a count for the number of disturbances within a preset time period that do not exceed the first preset threshold;
determining whether the count, for the number of disturbances that do not exceed the first preset threshold, exceeds a second preset threshold, wherein the second preset threshold corresponds to a preset number of allowable disturbances within the preset time period; and
triggering an alert of the first alert type responsive to a determination that the count exceeds the second preset threshold.
2. The method ofclaim 1, wherein (1) the detected disturbance is of a first disturbance type, (2) the first preset threshold is a threshold for triggering alerts of the first alert type based on detected disturbances of the first disturbance type, and (3) the second preset threshold corresponds to a preset number of allowable disturbances of the first disturbance type within the preset time period.
3. The method ofclaim 2, wherein the detected disturbance of the first disturbance type comprises at least one of a vibration, a frequency change, an acoustic change, and a change in distance based on reflectometer reading, and a disturbance of a second disturbance type comprises at least a different one of a vibration, a frequency change, an acoustic change, and a change in distance based on reflectometer reading.
4. The method ofclaim 1, wherein the detected disturbance comprises a vibration-related disturbance, and wherein the first preset threshold is a threshold for triggering alerts based on detected vibration-related disturbances.
5. The method ofclaim 1, wherein the detected disturbance comprises a frequency-change-related disturbance, and wherein the first preset threshold is a threshold for triggering alerts based on detected frequency-change-related disturbances.
6. The method ofclaim 1, wherein the detected disturbance comprises an acoustic-change-related disturbance, and wherein the first preset threshold is a threshold for triggering alerts based on detected acoustic-change-related disturbances.
7. The method ofclaim 1, wherein the detected disturbance comprises a disturbance related to a change in signal propagation distance, and wherein the first preset threshold is a threshold for triggering alerts based on detected disturbances related to a change in signal propagation distance.
8. The method ofclaim 1, further comprising:
initiating a response to the detected disturbance responsive to the triggering of the alert of the first alert type, wherein the response comprises at least one of opening a case, dispatching an investigator to investigate the detected disturbance, and documenting the investigation in the case.
9. The method ofclaim 1, further comprising:
initiating a response to the detected disturbance responsive to the triggering of the alert of the first alert type, wherein the response comprises at least one of disabling a data collection, adjusting a physical security device, rerouting a data collection, and performing network analysis.
10. The method ofclaim 1, further comprising:
causing the detected disturbance to be presented in comparison to the first preset threshold in real-time responsive to the detection of the disturbance.
11. The method ofclaim 1, wherein the count is for the number of disturbances within the preset time period that do not exceed the first preset threshold, but exceeds a third preset threshold.
12. A system for managing a protective distribution system, comprising:
a computer system comprises one or more processors programmed to execute computer program instructions which, when executed, cause the computer system to:
monitor a physical information transmission line;
detect, via one or more sensors, a disturbance on the physical information transmission line, wherein the detected disturbance does not exceed a first preset threshold for triggering alerts of a first alert type based on detected disturbances;
determine, responsive to the detection via the one or more sensors, a count for the number of disturbances within a preset time period that do not exceed the first preset threshold;
determine whether the count, for the number of disturbances that do not exceed the first preset threshold, exceeds a second preset threshold, wherein the second preset threshold corresponds to a preset number of allowable disturbances within the preset time period; and
trigger an alert of the first alert type responsive to a determination that the count exceeds the second preset threshold.
13. The system ofclaim 12, further comprising:
an intrusion detector coupled to the computer system,
the disturbance is detected by the computer system via the intrusion detector.
14. The system ofclaim 13, further comprising:
an optical line terminal or network switch;
an optical circuit switch;
an optical test access point device;
a network analytic tool; and
a video camera.
15. The system ofclaim 12, wherein (1) the detected disturbance is of a first disturbance type, (2) the first preset threshold is a threshold for triggering alerts of the first alert type based on detected disturbances of the first disturbance type, and (3) the second preset threshold corresponds to a preset number of allowable disturbances of the first disturbance type within the preset time period.
16. The system ofclaim 15, wherein the detected disturbance of the first disturbance type comprises at least one of a vibration, a frequency change, an acoustic change, and a change in signal propagation distance, and a disturbance of a second disturbance type comprises at least a different one of a vibration, a frequency change, an acoustic change, and a change in signal propagation distance.
17. The system ofclaim 12, wherein the computer system is further caused to:
initiating a response to the detected disturbance responsive to the triggering of the alert of the first alert type, wherein the response comprises at least one of opening a case, dispatching an investigator to investigate the detected disturbance, documenting the investigation in the case, disabling a data collection, adjusting a physical security device, rerouting a data collection, and performing network analysis.
18. The system ofclaim 12, wherein the computer system is further caused to:
causing the detected disturbance to be presented in comparison to the first preset threshold in real-time responsive to the detection of the disturbance.
19. The system ofclaim 12, wherein the count is for the number of disturbances within the preset time period that do not exceed the first preset threshold, but exceeds a third preset threshold.
20. A non-transitory computer-readable medium for storing computer instructions therein, the computer-readable medium comprising a set of instructions which when executed causes a processor to perform a method for managing a protective distribution system, the method comprising:
monitoring a physical information transmission line;
detecting, via one or more sensors, a disturbance on the physical information transmission line, wherein the detected disturbance does not exceed a first preset threshold for triggering alerts of a first alert type based on detected disturbances;
determining, responsive to the detection via the one or more sensors, a count for the number of disturbances within a preset time period that do not exceed the first preset threshold;
determining whether the count, for the number of disturbances that do not exceed the first preset threshold, exceeds a second preset threshold, wherein the second preset threshold corresponds to a preset number of allowable disturbances within the preset time period; and
triggering an alert of the first alert type responsive to a determination that the count exceeds the second preset threshold.
US15/246,6352013-03-152016-08-25Method and system for managing a protective distribution systemAbandonedUS20160366163A1 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US15/246,635US20160366163A1 (en)2013-03-152016-08-25Method and system for managing a protective distribution system
US16/008,729US10652253B2 (en)2013-03-152018-06-14Cable assembly having jacket channels for LEDs
US16/008,636US20180324194A1 (en)2013-03-152018-06-14System and method for detecting a disturbance on a physical transmission line
US16/860,789US10893062B2 (en)2013-03-152020-04-28Cable assembly with jacket LEDs
US17/146,214US11388181B2 (en)2013-03-152021-01-11Cable assembly disturbance detection method

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201361786460P2013-03-152013-03-15
US14/217,259US9160758B2 (en)2013-03-152014-03-17Method and system for protective distribution system (PDS) and infrastructure protection and management
US14/849,746US9455999B2 (en)2013-03-152015-09-10Method and system for protective distribution system (PDS) and infrastructure protection and management
US15/246,635US20160366163A1 (en)2013-03-152016-08-25Method and system for managing a protective distribution system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/849,746ContinuationUS9455999B2 (en)2013-03-152015-09-10Method and system for protective distribution system (PDS) and infrastructure protection and management

Related Child Applications (3)

Application NumberTitlePriority DateFiling Date
US16/008,729Continuation-In-PartUS10652253B2 (en)2013-03-152018-06-14Cable assembly having jacket channels for LEDs
US16/008,729ContinuationUS10652253B2 (en)2013-03-152018-06-14Cable assembly having jacket channels for LEDs
US16/008,636Continuation-In-PartUS20180324194A1 (en)2013-03-152018-06-14System and method for detecting a disturbance on a physical transmission line

Publications (1)

Publication NumberPublication Date
US20160366163A1true US20160366163A1 (en)2016-12-15

Family

ID=51535122

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US14/217,259ActiveUS9160758B2 (en)2013-03-152014-03-17Method and system for protective distribution system (PDS) and infrastructure protection and management
US14/849,746ActiveUS9455999B2 (en)2013-03-152015-09-10Method and system for protective distribution system (PDS) and infrastructure protection and management
US15/246,635AbandonedUS20160366163A1 (en)2013-03-152016-08-25Method and system for managing a protective distribution system

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US14/217,259ActiveUS9160758B2 (en)2013-03-152014-03-17Method and system for protective distribution system (PDS) and infrastructure protection and management
US14/849,746ActiveUS9455999B2 (en)2013-03-152015-09-10Method and system for protective distribution system (PDS) and infrastructure protection and management

Country Status (2)

CountryLink
US (3)US9160758B2 (en)
WO (1)WO2014145539A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2018144019A1 (en)*2017-02-032018-08-09Visa International Service AssociationSystem and method for detecting network topology
US10652253B2 (en)*2013-03-152020-05-12CyberSecure IPS, LLCCable assembly having jacket channels for LEDs
US11088759B2 (en)2019-05-242021-08-10Exfo OyExtracting data traffic from an optical communication fiber
US11831487B2 (en)2022-02-032023-11-28Visa International Service AssociationSystem, method, and computer program product for diagnosing faulty components in networked computer systems

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105790833A (en)*2014-12-232016-07-20中富通股份有限公司Dynamic optical network monitoring system based on GIS technology
CN107428896A (en)2015-02-032017-12-01伊利诺伊大学董事会 Cyclic Dynamic Polyurea for Polyurea Production
CN104954178B (en)*2015-05-292019-02-15北京奇虎科技有限公司 Method and device for optimizing system alarm
US10453325B2 (en)2015-06-012019-10-22Apple Inc.Creation of reminders using activity state of an application
US9603123B1 (en)*2015-06-042017-03-21Apple Inc.Sending smart alerts on a device at opportune moments using sensors
US10235863B2 (en)2015-06-052019-03-19Apple Inc.Smart location-based reminders
US9699205B2 (en)2015-08-312017-07-04Splunk Inc.Network security system
NL2015680B1 (en)*2015-10-292017-05-31Opt/Net Consulting B VAnomaly detection in a data stream.
CN106878091B (en)*2017-03-272019-10-08千寻位置网络有限公司Broadcast the monitoring analysis method of platform in high accuracy positioning differential data internet
US11874160B2 (en)*2020-11-032024-01-16Verizon Patent And Licensing Inc.Systems and methods for utilizing machine learning to minimize a potential of damage to fiber optic cables

Citations (32)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3735353A (en)*1971-10-281973-05-22Johnson Service CoAlarm transmission line security system utilizing pseudo random encoding
US4673935A (en)*1984-01-261987-06-16The Boeing CompanyInstrusion detection system
US5194847A (en)*1991-07-291993-03-16Texas A & M University SystemApparatus and method for fiber optic intrusion sensing
US6288640B1 (en)*1995-12-152001-09-11GAGNON ANDRéOpen transmission line intrusion detection system using frequency spectrum analysis
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US6421632B1 (en)*1996-10-222002-07-16Telefonaktiebolaget Lm EricssonMethod of monitoring disturbances apt to occur at random or in bursts
US6775657B1 (en)*1999-12-222004-08-10Cisco Technology, Inc.Multilayered intrusion detection system and method
US6819849B1 (en)*1985-10-252004-11-16Hughes Electronics CorporationIntrusion detection system for secure fiber optics
US6980108B1 (en)*2002-05-092005-12-27Fiber Instrument SalesOptical fiber cable based intrusion detection system
US20060031446A1 (en)*2004-06-172006-02-09Mohamed HamediGathering network management data using a command line function
US20060153491A1 (en)*2005-01-122006-07-13Murphy Cary RIntrusion detection system for use on single mode optical fiber using a simplified polarimeter
US7092586B2 (en)*2003-07-182006-08-15Network Integrity Systems Inc.Intrusion detection system for use on an optical fiber using a translator of transmitted data for optimum monitoring conditions
US7293238B1 (en)*2003-04-042007-11-06Raytheon CompanyGraphical user interface for an enterprise intrusion detection system
US20070280591A1 (en)*2006-06-022007-12-06Finisar CorporationOptical network test access point device
US20080025229A1 (en)*2006-07-272008-01-31Cisco Technology, Inc.Method and system for protecting communication networks from physically compromised communications
US7356585B1 (en)*2003-04-042008-04-08Raytheon CompanyVertically extensible intrusion detection system and method
US7403674B2 (en)*2003-07-182008-07-22Network Integrity Systems Inc.Intrusion detection system for a multimode optical fiber using a bulk optical wavelength division multiplexer for maintaining modal power distribution
US20090031426A1 (en)*2005-12-302009-01-29Stefano Dal LagoMethod and System for Protected Distribution of Digitalized Sensitive Information
US20090208212A1 (en)*2008-02-192009-08-20Kwan-Il LeeBidirectional wavelength-division-multiplexed passive optical network
US20100117830A1 (en)*2006-12-292010-05-13Schlumberger Technology CorporationFault-tolerant distributed fiber optic intrusion detection
US20110241881A1 (en)*2010-04-062011-10-06Christopher BadinelliSystems and methods for optical secure alarmed protective fiber distribution systems and management
US8355406B1 (en)*2009-06-122013-01-15Sprint Communications Company L.P.Setting signal-power thresholds on nodes in a communications network
US20130312092A1 (en)*2012-05-112013-11-21Wintermute, LlcSystem and method for forensic cyber adversary profiling, attribution and attack identification
US20130322490A1 (en)*2012-05-312013-12-05Kidde Technologies, Inc.Optical fiber sensing system
US20130335219A1 (en)*2012-05-072013-12-19Integrated Security CorporationIntelligent sensor network
US20140056582A1 (en)*2012-08-272014-02-27Calix, Inc.Detecting and communicating potential optical fiber issues in optical networks
US8670111B1 (en)*2012-05-312014-03-11Nlight Photonics CorporationFiber monitoring apparatus and system for detecting an optical fiber thermal event
US20140091929A1 (en)*2012-10-012014-04-03Network Integrity Systems, Inc.Systems and Methods for Secure Alarmed Armored Protective Distribution Systems and Management
US20140109182A1 (en)*2012-10-122014-04-17Schweitzer Engineering Laboratories, Inc.Detection and response to unauthorized access to a communication device
US20150358345A1 (en)*2014-06-092015-12-10Meadow Hills, LLCActive attack detection system
US20160330225A1 (en)*2014-01-132016-11-10Brightsource Industries (Israel) Ltd.Systems, Methods, and Devices for Detecting Anomalies in an Industrial Control System
US20170295031A1 (en)*2016-04-112017-10-12The Boeing CompanySystem and method for context aware network filtering

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4538140A (en)*1982-03-311985-08-27Gould Inc.Fiber optic acoustic transducer intrusion detection system
US5355208A (en)*1992-06-241994-10-11Mason & Hanger National, Inc.Distributed fiber optic sensor for locating and identifying remote disturbances
US5680104A (en)*1996-05-311997-10-21VolutionFiber optic security system
US6633835B1 (en)2002-01-102003-10-14Networks Associates Technology, Inc.Prioritized data capture, classification and filtering in a network monitoring environment
US7852213B2 (en)*2007-08-062010-12-14Woven Electronics, LlcDouble-end fiber optic security system for sensing intrusions
WO2006001868A2 (en)*2004-06-152006-01-05Optellios, Inc.Phase responsive optical fiber sensor
US7292323B2 (en)*2004-11-122007-11-06Alcon, Inc.Optical fiber detection method and system
US8165723B2 (en)*2006-03-102012-04-24Power Analytics CorporationReal-time system for verification and monitoring of protective device settings within an electrical power distribution network and automatic correction of deviances found
US8270845B2 (en)*2009-02-172012-09-18Gigamon LlcMultimode fiber tap for a LRM connection
GB2515677B (en)*2012-12-192015-05-27Tyco Fire & Security GmbhAutomatic intrusion detector threshold controlling systems and methods

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3735353A (en)*1971-10-281973-05-22Johnson Service CoAlarm transmission line security system utilizing pseudo random encoding
US4673935A (en)*1984-01-261987-06-16The Boeing CompanyInstrusion detection system
US6819849B1 (en)*1985-10-252004-11-16Hughes Electronics CorporationIntrusion detection system for secure fiber optics
US5194847A (en)*1991-07-291993-03-16Texas A & M University SystemApparatus and method for fiber optic intrusion sensing
US6288640B1 (en)*1995-12-152001-09-11GAGNON ANDRéOpen transmission line intrusion detection system using frequency spectrum analysis
US6421632B1 (en)*1996-10-222002-07-16Telefonaktiebolaget Lm EricssonMethod of monitoring disturbances apt to occur at random or in bursts
US6775657B1 (en)*1999-12-222004-08-10Cisco Technology, Inc.Multilayered intrusion detection system and method
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US6980108B1 (en)*2002-05-092005-12-27Fiber Instrument SalesOptical fiber cable based intrusion detection system
US7293238B1 (en)*2003-04-042007-11-06Raytheon CompanyGraphical user interface for an enterprise intrusion detection system
US7356585B1 (en)*2003-04-042008-04-08Raytheon CompanyVertically extensible intrusion detection system and method
US7403674B2 (en)*2003-07-182008-07-22Network Integrity Systems Inc.Intrusion detection system for a multimode optical fiber using a bulk optical wavelength division multiplexer for maintaining modal power distribution
US7092586B2 (en)*2003-07-182006-08-15Network Integrity Systems Inc.Intrusion detection system for use on an optical fiber using a translator of transmitted data for optimum monitoring conditions
US20060031446A1 (en)*2004-06-172006-02-09Mohamed HamediGathering network management data using a command line function
US20060153491A1 (en)*2005-01-122006-07-13Murphy Cary RIntrusion detection system for use on single mode optical fiber using a simplified polarimeter
US20090031426A1 (en)*2005-12-302009-01-29Stefano Dal LagoMethod and System for Protected Distribution of Digitalized Sensitive Information
US20070280591A1 (en)*2006-06-022007-12-06Finisar CorporationOptical network test access point device
US20080025229A1 (en)*2006-07-272008-01-31Cisco Technology, Inc.Method and system for protecting communication networks from physically compromised communications
US20100117830A1 (en)*2006-12-292010-05-13Schlumberger Technology CorporationFault-tolerant distributed fiber optic intrusion detection
US8947232B2 (en)*2006-12-292015-02-03Schlumberger Technology CorporationFault-tolerant distributed fiber optic intrusion detection
US20090208212A1 (en)*2008-02-192009-08-20Kwan-Il LeeBidirectional wavelength-division-multiplexed passive optical network
US8355406B1 (en)*2009-06-122013-01-15Sprint Communications Company L.P.Setting signal-power thresholds on nodes in a communications network
US20110241881A1 (en)*2010-04-062011-10-06Christopher BadinelliSystems and methods for optical secure alarmed protective fiber distribution systems and management
US20130335219A1 (en)*2012-05-072013-12-19Integrated Security CorporationIntelligent sensor network
US20130312092A1 (en)*2012-05-112013-11-21Wintermute, LlcSystem and method for forensic cyber adversary profiling, attribution and attack identification
US8670111B1 (en)*2012-05-312014-03-11Nlight Photonics CorporationFiber monitoring apparatus and system for detecting an optical fiber thermal event
US20130322490A1 (en)*2012-05-312013-12-05Kidde Technologies, Inc.Optical fiber sensing system
US20140056582A1 (en)*2012-08-272014-02-27Calix, Inc.Detecting and communicating potential optical fiber issues in optical networks
US20140091929A1 (en)*2012-10-012014-04-03Network Integrity Systems, Inc.Systems and Methods for Secure Alarmed Armored Protective Distribution Systems and Management
US20140109182A1 (en)*2012-10-122014-04-17Schweitzer Engineering Laboratories, Inc.Detection and response to unauthorized access to a communication device
US20160330225A1 (en)*2014-01-132016-11-10Brightsource Industries (Israel) Ltd.Systems, Methods, and Devices for Detecting Anomalies in an Industrial Control System
US20150358345A1 (en)*2014-06-092015-12-10Meadow Hills, LLCActive attack detection system
US9628502B2 (en)*2014-06-092017-04-18Meadow Hills, LLCActive attack detection system
US20170295031A1 (en)*2016-04-112017-10-12The Boeing CompanySystem and method for context aware network filtering

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Vigil-"An Evaluation of Fiber Optic Intrusion Detection System in Interior Applications," March 1994, Pages 1-46.*

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10652253B2 (en)*2013-03-152020-05-12CyberSecure IPS, LLCCable assembly having jacket channels for LEDs
US10893062B2 (en)2013-03-152021-01-12CyberSecure IPS, LLCCable assembly with jacket LEDs
US11388181B2 (en)2013-03-152022-07-12CyberSecure IPS, LLCCable assembly disturbance detection method
WO2018144019A1 (en)*2017-02-032018-08-09Visa International Service AssociationSystem and method for detecting network topology
GB2573970A (en)*2017-02-032019-11-20Visa Int Service AssSystem and method for detecting network topology
US11038766B2 (en)2017-02-032021-06-15Visa International Service AssociationSystem and method for detecting network topology
GB2573970B (en)*2017-02-032022-03-23Visa Int Service AssSystem and method for detecting network topology
US11088759B2 (en)2019-05-242021-08-10Exfo OyExtracting data traffic from an optical communication fiber
US11831487B2 (en)2022-02-032023-11-28Visa International Service AssociationSystem, method, and computer program product for diagnosing faulty components in networked computer systems
US12355611B2 (en)2022-02-032025-07-08Visa International Service AssociationSystem, method, and computer program product for diagnosing faulty components in networked computer systems

Also Published As

Publication numberPublication date
WO2014145539A2 (en)2014-09-18
US9160758B2 (en)2015-10-13
US20140283074A1 (en)2014-09-18
US9455999B2 (en)2016-09-27
WO2014145539A3 (en)2014-11-06
US20150381640A1 (en)2015-12-31

Similar Documents

PublicationPublication DateTitle
US9455999B2 (en)Method and system for protective distribution system (PDS) and infrastructure protection and management
US10893062B2 (en)Cable assembly with jacket LEDs
US10250624B2 (en)Method and device for robust detection, analytics, and filtering of data/information exchange with connected user devices in a gateway-connected user-space
US6353385B1 (en)Method and system for interfacing an intrusion detection system to a central alarm system
US20180324194A1 (en)System and method for detecting a disturbance on a physical transmission line
KR101403465B1 (en)Switchboard Integration Management system based mobile app.
CN117061569B (en)Internet of things-based industrial and social interaction digital information monitoring system
KR20160008267A (en)User's behavior analysis system on the network based video surveillance system
CN114143160A (en)Cloud platform automation operation and maintenance system
CN112217791A (en)Network security situation sensing system based on video monitoring data center
CN117425163A (en)Wireless network remote management system
JP2001331388A (en)System and method for managing remote maintenance of client server
CN119675895A (en) A network security risk assessment system and method
KR20220083046A (en)Machine leaning system for extracting log of ERP system
US9158894B2 (en)Apparatus and method for analyzing rule-based security event association
CN113794590A (en)Method, device and system for processing network security situation awareness information
KR20200054495A (en)Method for security operation service and apparatus therefor
JP7150425B2 (en) COMMUNICATION SYSTEM, CONTROL DEVICE, COMMUNICATION CONTROL METHOD, AND PROGRAM
CN117220940A (en)Method for sensing network situation of ThingsBoard Internet of things based on Wazuh
KR20210037298A (en)A system for managing security of data by using compliance
CN115798136A (en)Security equipment alarm information processing method and device
KR101728370B1 (en) A method of recognizing unique information of video information transmitting apparatus through packet analysis
CN111146863A (en)Power safety detection method for transformer substation
KR102540904B1 (en)A security total management system for weak security management based on big data and a total method of security
CN118694669B (en)Security monitoring networking method, device, equipment and medium

Legal Events

DateCodeTitleDescription
STCVInformation on status: appeal procedure

Free format text:APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STCVInformation on status: appeal procedure

Free format text:EXAMINER'S ANSWER TO APPEAL BRIEF MAILED

STCVInformation on status: appeal procedure

Free format text:ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCVInformation on status: appeal procedure

Free format text:BOARD OF APPEALS DECISION RENDERED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

ASAssignment

Owner name:CYBERSECURE IPS, LLC, MARYLAND

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SOHN, STEPHEN;RYE, SCOTT;REEL/FRAME:057565/0366

Effective date:20210922


[8]ページ先頭

©2009-2025 Movatter.jp