Risk scoring in a connected graph
    12.
    发明授权

    公开(公告)号:US10728272B1

    公开(公告)日:2020-07-28

    申请号:US14573980

    申请日:2014-12-17

    Abstract: A method and apparatus for risk scoring in a graph are disclosed. In the method and apparatus, a graph includes a first node that is connected with a node of a plurality of nodes using a communication link of a plurality of communication links. A plurality of link risk measures are then determined, whereby a link risk measure of the plurality of link risk measures pertains to the communication link of the plurality of communication links. Furthermore, a risk measure associated with the first node is determined based at least in part on the plurality of link risk measures. The risk measure is monitored to determine if one or more conditions placed on the risk measure are met and one or more actions are taken as a result of the one or more conditions being met.

    Static analysis-based tracking of data in access-controlled systems

    公开(公告)号:US10467423B1

    公开(公告)日:2019-11-05

    申请号:US14225958

    申请日:2014-03-26

    Abstract: Method and apparatus for identifying a flow of data from a first data store to a second data store are disclosed. In the method and apparatus, a service may send the data from the first data store to the second data store, whereby the service may be associated with an access control policy that specifies whether the service is permitted to send or receive the data. The access control policy may be used as a basis for the evaluation of executable instructions of the service, and evaluation of the executable instructions may be used to identify the first data store or the second data store.

    Computer systems monitoring using beat frequency analysis
    17.
    发明授权
    Computer systems monitoring using beat frequency analysis 有权
    使用节拍频率分析的计算机系统监控

    公开(公告)号:US09558053B1

    公开(公告)日:2017-01-31

    申请号:US14752445

    申请日:2015-06-26

    Abstract: A monitoring service receives, from a variety of hardware components of a set of computer systems, binary signals indicative of operation of these components. The monitoring service determines, based at least in part on these signals, a set of beat frequencies for pairings of hardware components of the set of computer systems. The monitoring service uses this set of beat frequencies, as well as information included in a profile for the set of computer systems, to determine whether there is any indication of anomalous behavior in operation of the set of computer systems. If so, the monitoring service generates one or more alerts indicating the anomalous behavior.

    Abstract translation: 监视服务从一组计算机系统的各种硬件组件接收指示这些组件的操作的二进制信号。 该监视服务至少部分地基于这些信号确定用于该组计算机系统的硬件组件的配对的一组拍频。 监视服务使用这组拍频,以及包括在该组计算机系统的简档中的信息,以确定在该组计算机系统的操作中是否存在任何异常行为的指示。 如果是这样,监控服务会产生一个或多个警报,指示异常行为。

    Secure transfer and use of secret material in a shared environment
    18.
    发明授权
    Secure transfer and use of secret material in a shared environment 有权
    在共享环境中安全传输和使用秘密资料

    公开(公告)号:US09141769B1

    公开(公告)日:2015-09-22

    申请号:US13763033

    申请日:2013-02-08

    Abstract: Aspects related to the secure transfer and use of secret material are described. In one embodiment, public vendor and provider keys are provided to a customer and encrypted secret material is received in return. The encrypted secret material may include a customer secret material encrypted by the public vendor and provider keys. The encrypted secret material is imported into a trusted execution environment and decrypted with private provider and vendor keys. In this manner, a provider of cryptographic processes is not exposed to the secret material of the customer, as the customer secret material is decrypted and stored within the trusted execution environment but is not accessed by the provider in an unencrypted form. In turn, the provider may receive various instructions to perform cryptographic operations on behalf of the customer, and those instructions may be performed by the trusted execution environment.

    Abstract translation: 描述与秘密材料的安全转移和使用相关的方面。 在一个实施例中,公共供应商和供应商密钥被提供给客户,并且收到加密的秘密材料。 加密的秘密材料可以包括由公共供应商加密的客户秘密材料和提供商密钥。 加密的秘密资料被导入到受信任的执行环境中,并用专用提供商和供应商密钥进行解密。 以这种方式,密码处理提供者不会暴露给客户的秘密资料,因为客户秘密资料被解密并存储在受信任的执行环境中,但未被提供者以未加密形式访问。 反过来,提供商可以接收代表客户执行密码操作的各种指令,并且这些指令可以由可信执行环境执行。

Patent Agency Ranking