Vulnerability analysis and segmentation of bring-your-own IoT devices

    公开(公告)号:US10742678B2

    公开(公告)日:2020-08-11

    申请号:US15891749

    申请日:2018-02-08

    Abstract: In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.

    METHOD AND APPARATUS FOR SYNTHESIZING ADAPTIVE DATA VISUALIZATIONS

    公开(公告)号:US20190378506A1

    公开(公告)日:2019-12-12

    申请号:US16186019

    申请日:2018-11-09

    Abstract: A system to dynamically update presentations based on context classification of voice inputs, comprising: a storage device and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to: display a first graphical user interface associated with a first context via a user interface, obtain a first voice input, determine one or more first terms from the first voice input, determine that the first voice input is related to a first context based on the one or more first terms, and in response to determining that the first voice input is related to the first context: modify the first graphical user interface associated with the first context and display the modified first graphical user interface associated with the first context via the user interface.

    VULNERABILITY ANALYSIS AND SEGMENTATION OF BRING-YOUR-OWN IOT DEVICES

    公开(公告)号:US20190245882A1

    公开(公告)日:2019-08-08

    申请号:US15891749

    申请日:2018-02-08

    Abstract: In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.

Patent Agency Ranking