Broadcast-based trust establishment
    21.
    发明授权
    Broadcast-based trust establishment 有权
    基于广播的信托机构

    公开(公告)号:US09356971B1

    公开(公告)日:2016-05-31

    申请号:US14497146

    申请日:2014-09-25

    Abstract: A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first device is then authenticated based at least in part on demonstrated access to authentication data prior to broadcast of the authentication data. One or more actions may be taken in response to the authentication of the first device based at least in part on the demonstrated access to the authentication data.

    Abstract translation: 提供了一种用于设备认证的方法和装置。 在该方法和装置中,接收第一设备的认证数据。 然后至少部分地基于在广播认证数据之前证明对认证数据的访问来认证第一设备。 至少部分地基于所证明的对认证数据的访问,可以响应于第一设备的认证而采取一个或多个动作。

    Learning-based data decontextualization
    22.
    发明授权
    Learning-based data decontextualization 有权
    基于学习的数据解密

    公开(公告)号:US09342796B1

    公开(公告)日:2016-05-17

    申请号:US14028396

    申请日:2013-09-16

    CPC classification number: G06N99/005

    Abstract: Techniques are described for employing a crowdsourcing framework to analyze data related to the performance or operations of computing systems, or to analyze other types of data. A question is analyzed to determine data that is relevant to the question. The relevant data may be decontextualized to remove or alter contextual information included in the data, such as sensitive, personal, or business-related data. The question and the decontextualized data may then be presented to workers in a crowdsourcing framework, and the workers may determine an answer to the question based on an analysis or an examination of the decontextualized data. The answers may be combined, correlated, or otherwise processed to determine a processed answer to the question. Machine learning techniques are employed to adjust and refine the decontextualization.

    Abstract translation: 描述了使用众包框架来分析与计算系统的性能或操作相关的数据或分析其他类型的数据的技术。 分析一个问题来确定与问题相关的数据。 相关数据可以被解构化以去除或改变包括在数据中的上下文信息,诸如敏感的,个人的或与业务有关的数据。 然后可以在众包框架中将问题和解构图数据提供给工人,并且工作人员可以基于分析或检验解构数据来确定问题的答案。 答案可以组合,相关或以其他方式处理,以确定问题的处理答案。 机器学习技术被用于调整和完善解构文化。

    ESTABLISHING TRUST USING SIDE CHANNELS
    23.
    发明申请
    ESTABLISHING TRUST USING SIDE CHANNELS 有权
    建立使用信道的信任

    公开(公告)号:US20160042189A1

    公开(公告)日:2016-02-11

    申请号:US14921263

    申请日:2015-10-23

    CPC classification number: G06F21/62 G06F21/556 G06F21/57 G06F2221/034

    Abstract: Disclosed are various embodiments for a trust establishment application. Machine instances executed in the same computing environment generate side channel patterns embodying data identifying themselves as trusted machine instances. The side channel patterns are detected to determine which machine instances are trusted. An operational mode of a machine instance is configured as a function of whether a quorum of trusted machine instances are executed in the computing environment.

    Abstract translation: 公开了用于信任建立应用的各种实施例。 在相同的计算环境中执行的机器实例生成体现数据的侧面信道模式,将自身标识为可信机器实例。 检测侧信道模式以确定哪些机器实例被信任。 机器实例的操作模式被配置为在计算环境中是否执行可信机器实例的数量。

    Techniques for identifying sources of unauthorized code
    24.
    发明授权
    Techniques for identifying sources of unauthorized code 有权
    识别未经授权的代码来源的技术

    公开(公告)号:US09130976B1

    公开(公告)日:2015-09-08

    申请号:US14084287

    申请日:2013-11-19

    Abstract: Techniques described and suggested herein include systems and methods for identifying potential sources of infections of devices by unauthorized code. In an embodiment, network traffic is logged. A plurality of computing devices that include unauthorized code is identified. The logged traffic is used to identify information sources accessed by the identified affected devices. The identified information sources may be refined. Refinement of the identified information sources may include excluding information sources that have been accessed by uninfected devices. A user interface that allows a user to further refine the identified information sources may be provided.

    Abstract translation: 本文描述和建议的技术包括用于通过未经授权的代码识别设备的潜在感染源的系统和方法。 在一个实施例中,记录网络流量。 识别包括未授权代码的多个计算设备。 记录的流量用于识别由识别的受影响设备访问的信息源。 所识别的信息源可以被改进。 识别的信息源的细化可能包括排除未感染设备访问的信息源。 可以提供允许用户进一步细化所识别的信息源的用户界面。

    Proxy server-based malware detection

    公开(公告)号:US10834051B2

    公开(公告)日:2020-11-10

    申请号:US15389343

    申请日:2016-12-22

    Abstract: Disclosed are various embodiments for malware detection by way of proxy servers. In one embodiment, a proxied request for a network resource from a network site is received from a client device by a proxy server application. The proxied request is analyzed to determine whether the proxied request includes protected information transmitted in an unsecured manner. It is then determined whether the network resource comprises malware based at least in part on an execution of the network resource or whether the proxied request includes the protected information transmitted in the unsecured manner. The proxy server application refrains from sending data generated by the network resource to the client device in response to the proxied request when the network resource is determined to comprise the malware.

    Risk scoring in a connected graph
    26.
    发明授权

    公开(公告)号:US10728272B1

    公开(公告)日:2020-07-28

    申请号:US14573980

    申请日:2014-12-17

    Abstract: A method and apparatus for risk scoring in a graph are disclosed. In the method and apparatus, a graph includes a first node that is connected with a node of a plurality of nodes using a communication link of a plurality of communication links. A plurality of link risk measures are then determined, whereby a link risk measure of the plurality of link risk measures pertains to the communication link of the plurality of communication links. Furthermore, a risk measure associated with the first node is determined based at least in part on the plurality of link risk measures. The risk measure is monitored to determine if one or more conditions placed on the risk measure are met and one or more actions are taken as a result of the one or more conditions being met.

    Migrating user accounts from assisted to self-managed

    公开(公告)号:US10713655B1

    公开(公告)日:2020-07-14

    申请号:US15353568

    申请日:2016-11-16

    Abstract: Disclosed are various embodiments for transitioning user accounts from an assisted status to a self-managed status. In one embodiment, a service receives an authentication request from a client device, where the authentication request specifies a unique user identifier corresponding to a communication channel. The service then determines that the unique user identifier corresponds to an assisted user account but the client device is not logged in under an assisting user account. The service generates an ephemeral security credential and sends the ephemeral security credential to the communication channel. The service then creates a self-managed user account having the unique user identifier in response to receiving the ephemeral security credential from the client device.

    Media based authentication
    28.
    发明授权

    公开(公告)号:US10587594B1

    公开(公告)日:2020-03-10

    申请号:US14494520

    申请日:2014-09-23

    Abstract: A service provider or service of the service provider may generate authentication information based on information provided by a user. The information provided by the user may include a selection of a media object, information indicating a segment of the media object, and an indication of an action to be performed by the user. This information may be saved by the service provider and used at some point in time later to determine whether to provide access to restricted computing resources based at least in part on an authentication claim provided by the user. The authentication claim may be generated by a computing device operated by the user and may include information corresponding to the media object, the indicated segment of the media object, and the action performed by the user.

    Enforcing restrictions on third-party accounts

    公开(公告)号:US10560435B2

    公开(公告)日:2020-02-11

    申请号:US15445054

    申请日:2017-02-28

    Abstract: Disclosed are various embodiments for management of third-party accounts for users in an organization. A request is received from a client corresponding to a user in an organization to access a third-party network site under management by the organization. The third-party network site is operated by a third party that does not correspond to the organization. It is determined whether network traffic between the client and the third-party network site is routed via a proxy server operated by the organization. Access of the client to a managed account with the third-party network site is denied in response to determining that the network traffic between the client and the third-party network site is not routed via the proxy server.

Patent Agency Ranking