Managing system load
    182.
    发明授权

    公开(公告)号:US09906552B1

    公开(公告)日:2018-02-27

    申请号:US13766350

    申请日:2013-02-13

    CPC classification number: H04L63/1458

    Abstract: System load, such as load caused by a denial of service attack, is managed by requiring those requesting access to the system to provide proof of work. A system receives, from a requestor, a request for access to the system. Before the request can be processed, the system provides a challenge to the requestor. The requestor obtains a solution to the challenge and provides proof of having obtained the solution. The system verifies the correctness of the solution and, if the correct solution is verified, the system services the request.

    Transparent policies
    186.
    发明授权

    公开(公告)号:US09854001B1

    公开(公告)日:2017-12-26

    申请号:US14225300

    申请日:2014-03-25

    CPC classification number: H04L63/20

    Abstract: A system enforces policies in connection with requests to access resources. Users are provided the ability to obtain information about the policies the system enforces. Some of the users have associated restrictions such that, when those users request information about the policies, the information provided is incomplete. The information provided may lack information about one or more policies that apply to the users.

    SIGNING KEY LOG MANAGEMENT
    188.
    发明申请

    公开(公告)号:US20170346638A1

    公开(公告)日:2017-11-30

    申请号:US15656805

    申请日:2017-07-21

    Abstract: Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested to perform one or more actions using the keys. The logging property can specify how to log use of a respective key. A key can also include a mutability property for specifying whether the logging property can be changed, and if so under what circumstances or in which way(s). The ability to specify and automatically enforce logging can be important for environments where audit logs are essential. These can include, for example, public certificate authorities that must provide accurate and complete audit trails. In cases where the data is not to be provided outside a determined secure environment, the key can be generated with a property indicating not to log any of the usage.

    AUTOMATED SECRET RENEGOTIATION
    190.
    发明申请

    公开(公告)号:US20170264602A1

    公开(公告)日:2017-09-14

    申请号:US15605739

    申请日:2017-05-25

    Abstract: Secret information, such as seeds, codes, and keys, can be automatically renegotiated between at least one sender and at least one recipient. Various mechanisms, such as counters, events, or challenges, can be used to trigger automatic renegotiations through various requests or communications. These changes can cause the current secret information to diverge from older copies of the secret information that might have been obtained by unintended third parties. In some embodiments, a secret can be configured to “decay” over time, or have small changes periodically introduced that can be determined to be valid by an authorized party, but can reduce the effectiveness of prior versions of the secret information.

Patent Agency Ranking