-
公开(公告)号:US10341367B1
公开(公告)日:2019-07-02
申请号:US15842330
申请日:2017-12-14
Applicant: Saint Security Inc.
Inventor: Kihong Kim
Abstract: Methods, systems, and devices are provided for inquiring and storing Indicator of Compromise (IoC) information. In one example, a method of inquiring and storing IoC information can include determining a target IoC information to be identified when an event occurs, requesting an encryption socket communication module of a first user terminal to request the target IoC information from an IoC information providing server, requesting a P2P socket communication module of the first user terminal to request the target IoC information from a P2P socket communication module of at least one other user terminal, and storing the target IoC information that is received first from either the IoC information providing server or the P2P socket communication module of the at least one other user terminal.
-
公开(公告)号:US20190182270A1
公开(公告)日:2019-06-13
申请号:US15842330
申请日:2017-12-14
Applicant: Saint Security Inc.
Inventor: Kihong Kim
CPC classification number: H04L63/1416 , G06F21/552 , G06F21/554 , G06F21/577 , H04L63/1433 , H04L67/104
Abstract: The method of inquiring and storing IoC information of the present disclosure is performed by at least one user terminal in an environment including a plurality of user terminals and an IoC information providing server. The user terminals are respectively provided with an event processing module, an IoC inquiry agent module, an encryption socket communication module and a P2P socket communication module.The method comprises a first step of determining IoC information to be identification target when an event occurs, which is performed by the event processing module; a second step of requesting the encryption socket communication module and the P2P socket communication module to inquire the IoC information, which is performed by the IoC inquiry agent module; a third step of requesting IoC information to the IoC information providing server, which is performed by the encryption socket communication module; a fourth step of requesting IoC information to a P2P socket communication module of the other user terminal, which is performed by the P2P socket communication module; and a fifth step of storing IoC information receiving first among the IoC information requested at the third and fourth steps.
-