Assured encrypted delivery
    93.
    发明授权

    公开(公告)号:US10075469B1

    公开(公告)日:2018-09-11

    申请号:US14841463

    申请日:2015-08-31

    Abstract: Information can be added to the headers of email messages to ensure the messages are delivered using encryption, without the user having to manage keys or perform the encryption. A user can select an option in an email program that causes a flag to be added to the message header. Each mail server along the delivery path can provide (or expose) information about the type(s) of encryption supported, and if the encryption is not sufficient then the message will not be delivered to that server. This ensures the transport will remain encrypted before delivering the message to the next hop along the path. If the message cannot be delivered encrypted then the message will not be transmitted past that point. An end user then only needs to click a button or perform another such action to ensure encrypted message delivery.

    Probabilistic key rotation
    94.
    发明授权

    公开(公告)号:US10075295B2

    公开(公告)日:2018-09-11

    申请号:US15060487

    申请日:2016-03-03

    CPC classification number: H04L9/0891

    Abstract: Information, such as a cryptographic key, is used repeatedly in the performance of operations, such as certain cryptographic operations. To prevent repeated use of the information from enabling security breaches, the information is rotated (replaced with other information). To avoid the resource costs of maintaining a counter on the number of operations performed, decisions of when to rotate the information are performed based at least in part on the output of stochastic processes.

    ACCESS CONTROL USING IMPERSONIZATION
    96.
    发明申请

    公开(公告)号:US20180183837A1

    公开(公告)日:2018-06-28

    申请号:US15900465

    申请日:2018-02-20

    Abstract: A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.

    Signing key log management
    97.
    发明授权

    公开(公告)号:US09992027B1

    公开(公告)日:2018-06-05

    申请号:US14853605

    申请日:2015-09-14

    Abstract: Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested to perform one or more actions using the keys. The logging property can specify how to log use of a respective key. A key can also include a mutability property for specifying whether the logging property can be changed, and if so under what circumstances or in which way(s). The ability to specify and automatically enforce logging can be important for environments where audit logs are essential. These can include, for example, public certificate authorities that must provide accurate and complete audit trails. In cases where the data is not to be provided outside a determined secure environment, the key can be generated with a property indicating not to log any of the usage.

    Password security
    99.
    发明授权

    公开(公告)号:US09935940B1

    公开(公告)日:2018-04-03

    申请号:US14481798

    申请日:2014-09-09

    CPC classification number: H04L63/083 G06F17/30864 H04L63/20

    Abstract: Techniques are disclosed for increasing the security of a database. A database is coupled with an access manager to limit certain applications that use the database to store user password information to queries that return at most one row. Additionally, returning a record may be limited to a case where the query includes the hash of the user name and password that is stored in the database. Other techniques may be implemented for other user account operations, such as password resets.

Patent Agency Ranking