×

Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens

  • US 10,567,342 B2
  • Filed: 06/20/2016
  • Issued: 02/18/2020
  • Est. Priority Date: 02/24/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method in an enterprise network to detect compromises of enterprise end stations based on tokens tunneled outside the enterprise network while avoiding disclosure of source enterprise network addresses outside the enterprise network, comprising:

  • receiving, at a first server within the enterprise network that is implemented by one or more electronic devices, a first set of one or more packets from a source enterprise network address directed to a destination enterprise network address of the enterprise network, wherein the destination enterprise network address is an enterprise network address assigned to the first server, wherein the first set of one or more packets includes data comprising a token, wherein the token was placed upon an enterprise end station within the enterprise network and wherein the token appears to be useful for accessing the first server or a resource provided by the first server; and

    transmitting, by the first server, a second set of one or more packets via a tunnel across a public network to a second server that is outside of the enterprise network, wherein the second set of one or more packets includes the data comprising the token and an identifier but does not include the source enterprise network address so that the source enterprise network address is not disclosed to the second server, wherein the second set of one or more packets causes the second server to send the data comprising the token to a third server that acts as if it were an enterprise server within the enterprise network but is actually outside of the enterprise network and does not store enterprise data, wherein the presence of the token in the second set of one or more packets allows for determining whether one of the enterprise end stations has been compromised, wherein at least one of the enterprise end station that utilized the source enterprise network address or the source enterprise network address can be determined within the enterprise based upon the identifier, and wherein outside the enterprise the identifier distinguishes between traffic sent from different source enterprise network addresses without disclosing the different source enterprise network addresses; and

    causing, within the enterprise network, one or more security measures to be deployed that monitor or block traffic based on receipt of an alert data that was sent to the enterprise network due to detection of a use of the token in the data sent by the second server to the third server.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×