SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK
The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined s...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Holzberger,, JR., Paul E Seely, Jeff Key, Christopher B |
description | The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020280576A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020280576A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020280576A13</originalsourceid><addsrcrecordid>eNrjZPALjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1IIcQ0O8fRzV_D28w_3U3BydFFwAYs4hnj6-wUrePopOCoEBPm7hDqDBBT8XEPC_YO8eRhY0xJzilN5oTQ3g7Kba4izh25qQX58anFBYnJqXmpJfGiwkQEQWhiYmps5GhoTpwoA5tgvnw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><source>esp@cenet</source><creator>Holzberger,, JR., Paul E ; Seely, Jeff ; Key, Christopher B</creator><creatorcontrib>Holzberger,, JR., Paul E ; Seely, Jeff ; Key, Christopher B</creatorcontrib><description>The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200903&DB=EPODOC&CC=US&NR=2020280576A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200903&DB=EPODOC&CC=US&NR=2020280576A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Holzberger,, JR., Paul E</creatorcontrib><creatorcontrib>Seely, Jeff</creatorcontrib><creatorcontrib>Key, Christopher B</creatorcontrib><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><description>The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPALjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1IIcQ0O8fRzV_D28w_3U3BydFFwAYs4hnj6-wUrePopOCoEBPm7hDqDBBT8XEPC_YO8eRhY0xJzilN5oTQ3g7Kba4izh25qQX58anFBYnJqXmpJfGiwkQEQWhiYmps5GhoTpwoA5tgvnw</recordid><startdate>20200903</startdate><enddate>20200903</enddate><creator>Holzberger,, JR., Paul E</creator><creator>Seely, Jeff</creator><creator>Key, Christopher B</creator><scope>EVB</scope></search><sort><creationdate>20200903</creationdate><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><author>Holzberger,, JR., Paul E ; Seely, Jeff ; Key, Christopher B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020280576A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Holzberger,, JR., Paul E</creatorcontrib><creatorcontrib>Seely, Jeff</creatorcontrib><creatorcontrib>Key, Christopher B</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Holzberger,, JR., Paul E</au><au>Seely, Jeff</au><au>Key, Christopher B</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><date>2020-09-03</date><risdate>2020</risdate><abstract>The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2020280576A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T19%3A43%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Holzberger,,%20JR.,%20Paul%20E&rft.date=2020-09-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020280576A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |