Static analysis-based tracking of data in access-controlled systems

    公开(公告)号:US10467423B1

    公开(公告)日:2019-11-05

    申请号:US14225958

    申请日:2014-03-26

    Abstract: Method and apparatus for identifying a flow of data from a first data store to a second data store are disclosed. In the method and apparatus, a service may send the data from the first data store to the second data store, whereby the service may be associated with an access control policy that specifies whether the service is permitted to send or receive the data. The access control policy may be used as a basis for the evaluation of executable instructions of the service, and evaluation of the executable instructions may be used to identify the first data store or the second data store.

    Countering service enumeration through imposter-driven response

    公开(公告)号:US10298598B1

    公开(公告)日:2019-05-21

    申请号:US14108238

    申请日:2013-12-16

    Abstract: Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.

    Duress signatures
    35.
    发明授权

    公开(公告)号:US10110385B1

    公开(公告)日:2018-10-23

    申请号:US14580118

    申请日:2014-12-22

    Abstract: A system and method for generating a signature for a document using credentials indicating an unsanctioned signing event. The system and method includes receiving a request to generate a signature of a signatory for a document, wherein the request includes a received set of credential data for a signatory, obtaining a token identifier for at least one computing device, and determining if the received set of credential data matches credentials indicating the unsanctioned signing event. The system and method further includes receiving the signature of the signatory, the document identifier, and the token identifier, and determining based at least in part on the signature, document identifier, and the token identifier, whether the received signature is associated with the unsanctioned signing event.

    Establishing trust using side channels

    公开(公告)号:US09934391B2

    公开(公告)日:2018-04-03

    申请号:US14921263

    申请日:2015-10-23

    CPC classification number: G06F21/62 G06F21/556 G06F21/57 G06F2221/034

    Abstract: Disclosed are various embodiments for a trust establishment application. Machine instances executed in the same computing environment generate side channel patterns embodying data identifying themselves as trusted machine instances. The side channel patterns are detected to determine which machine instances are trusted. An operational mode of a machine instance is configured as a function of whether a quorum of trusted machine instances are executed in the computing environment.

Patent Agency Ranking