KEY THREAT PREDICTION
    32.
    发明申请

    公开(公告)号:US20190171823A1

    公开(公告)日:2019-06-06

    申请号:US15949560

    申请日:2018-04-10

    Abstract: In one example embodiment, a network-connected device provides or obtains one or more computer network communications protected by a key. The network-connected device determines a count of the one or more computer network communications according to one or more properties of the one or more computer network communications. Based on the count of the one or more computer network communications, the network-connected device computes an information entropy of the key. Based on the information entropy of the key, the network-connected device dynamically generates a predicted threat level of the key.

    SECURE CONFIRMATION EXCHANGE FOR OFFLINE INDUSTRIAL MACHINE

    公开(公告)号:US20170223021A1

    公开(公告)日:2017-08-03

    申请号:US15010939

    申请日:2016-01-29

    CPC classification number: H04L63/10 G06Q10/08 G06Q50/04 H04L63/08

    Abstract: In one embodiment, a system and method are disclosed for receiving a request for authorization to commission a target device based, at least in part, on a plurality of requested commissioning actions; determining whether each of the requested commissioning actions is authorized; sending a commissioning authorization, which includes information identifying the one or more authorized commissioning actions; receiving a commissioning complete confirmation message, which includes information identifying one or more completed commissioning actions; validating the commissioning complete confirmation message, in order to ensure that each of the completed actions had been previously authorized; and if all of the completed commissioning actions were previously authorized, sending an acknowledgement message.

    Mechanisms to Use Network Session Identifiers for Software-As-A-Service Authentication
    35.
    发明申请
    Mechanisms to Use Network Session Identifiers for Software-As-A-Service Authentication 审中-公开
    使用网络会话标识符进行软件即服务认证的机制

    公开(公告)号:US20150106617A1

    公开(公告)日:2015-04-16

    申请号:US14572075

    申请日:2014-12-16

    CPC classification number: H04L63/0823 H04L63/08

    Abstract: Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a request from a client device to establish a network session and transfers identity information of the subject, the client device and the network session to a session directory database. A request is sent to access an application on a SaaS server. If it does not contain an identity assertion that identifies the subject, the request is redirected to an identity provider device, to provide identity assertion services to the subject. A network session identifier is inserted into the request by a network access device and the request is forwarded to the identity provider device. The identity provider device uses the network session identifier to query the session directory database for the identity information to be used for a security assertion of the subject to the SaaS server.

    Abstract translation: 提供了用于验证客户端设备的主体以访问软件即服务(SaaS)服务器的技术。 网络接入设备从客户端设备接收建立网络会话的请求,并将主体,客户端设备和网络会话的身份信息传送到会话目录数据库。 发送请求以访问SaaS服务器上的应用程序。 如果它不包含识别主题的身份断言,则将请求重定向到身份提供者设备,以向主题提供身份声明服务。 网络会话标识符被网络接入设备插入到请求中,该请求被转发给身份提供者设备。 身份提供者设备使用网络会话标识符来查询会话目录数据库,以获得要用于SaaS服务器的对象的安全断言的身份信息。

    Dynamic media access control addresses in a wireless network

    公开(公告)号:US12262450B2

    公开(公告)日:2025-03-25

    申请号:US18476737

    申请日:2023-09-28

    Abstract: Embodiments identify a station that rotates an over the air station address. As address rotation was not originally designed into wireless networks, the rotation can introduce communication challenges for the station. The embodiments derive that traffic referencing two different over the air station addresses are associated with a single common station. This is accomplished by determining a similarity between properties of two sets of traffic. A first set of traffic references the first over the air station address and a second set of traffic references the second over the air station address. If the properties common across the two sets of traffic indicate sufficient similarity, the embodiments determine that both sets of traffic are associated with a single device. Network configuration of the device is then adjusted based on the determination.

    Secure confirmation exchange for offline industrial machine

    公开(公告)号:US11240246B2

    公开(公告)日:2022-02-01

    申请号:US16572995

    申请日:2019-09-17

    Abstract: In one embodiment, functionality is disclosed for commissioning a target device based, at least in part, on providing identifying information that identifies a target device, where that identifying information is configured to be included in a request for authorization to commission the target device, and that request for authorization to commission the target device comprises one or more requested commissioning actions; receiving a commissioning authorization, where the commissioning authorization comprises information regarding one or more authorized commissioning actions for which a license is available, where the one or more authorized commissioning actions were selected from among the one or more requested commissioning actions; and performing the one or more authorized commissioning actions.

    ENGAGEMENT AND DISENGAGEMENT OF TRANSPORT LAYER SECURITY PROXY SERVICES WITH ENCRYPTED HANDSHAKING

    公开(公告)号:US20210119974A1

    公开(公告)日:2021-04-22

    申请号:US17116111

    申请日:2020-12-09

    Abstract: Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.

Patent Agency Ranking