REDIRECT TO INSPECTION PROXY USING SINGLE-SIGN-ON BOOTSTRAPPING
    61.
    发明申请
    REDIRECT TO INSPECTION PROXY USING SINGLE-SIGN-ON BOOTSTRAPPING 审中-公开
    使用单点启动重新检查检查代码

    公开(公告)号:US20160149898A1

    公开(公告)日:2016-05-26

    申请号:US15010003

    申请日:2016-01-29

    CPC classification number: H04L63/0815 H04L63/04 H04L63/08 H04L63/0884

    Abstract: An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user. The authentication response includes an assertion on behalf of the user. A delivery resource locator for the assertion is rewritten to a resource locator of a proxy in order to redirect the assertion to the proxy. The authentication response is sent to the client device together with the resource locator of the proxy in order to cause the client device to send the assertion to the proxy that decodes the re-written resource locator and sends the assertion to the service provider.

    Abstract translation: 当客户机设备的用户尝试发起与由服务提供商管理的应用的用户会话时,生成认证请求。 基于从用户接收的凭证生成认证响应。 认证响应包括代表用户的断言。 用于断言的传送资源定位符被重写到代理的资源定位符,以便将断言重定向到代理。 认证响应与代理的资源定位器一起被发送到客户机设备,以便使客户端设备将该断言发送到对重写的资源定位符进行解码的代理,并将该断言发送给服务提供商。

    Using a trust anchor to control functionality of an ASIC

    公开(公告)号:US12072981B2

    公开(公告)日:2024-08-27

    申请号:US17335219

    申请日:2021-06-01

    CPC classification number: G06F21/57 H04L9/0869 G06F2221/034

    Abstract: According to certain embodiments, a method performed by a trust anchor comprises determining a random value (K), encrypting the random value (K) using a long-term key associated with a hardware component in order to yield an encrypted value, communicating the encrypted value to the hardware component, and receiving a response encrypted using the random value (K). The response is received from the hardware component. The method further comprise encrypting a schema using the random value (K) and sending the encrypted schema to the hardware component. The schema indicates functionality that the hardware component is authorized to enable.

    Privacy enhancing man-in-the-middle

    公开(公告)号:US11671447B2

    公开(公告)日:2023-06-06

    申请号:US17390518

    申请日:2021-07-30

    CPC classification number: H04L63/1466 H04L63/0485 H04L63/166 H04L63/30

    Abstract: In one embodiment, a device in a network receives traffic sent from a first endpoint. The device sends a padding request to the second endpoint indicative of a number of padding bytes. The device receives a padding response from the second endpoint, after sending the padding request to the second endpoint. The device adjusts the received traffic based on the received padding response by adding one or more frames to the received traffic. The device sends the adjusted traffic to the second endpoint.

    CORRELATING ENDPOINT AND NETWORK VIEWS TO IDENTIFY EVASIVE APPLICATIONS

    公开(公告)号:US20230129786A1

    公开(公告)日:2023-04-27

    申请号:US18088284

    申请日:2022-12-23

    Abstract: In one embodiment, a service receives traffic telemetry data regarding encrypted traffic sent by an endpoint device in a network. The service analyzes the traffic telemetry data to infer characteristics of an application on the endpoint device that generated the encrypted traffic. The service receives, from a monitoring agent on the endpoint device, application telemetry data regarding the application. The service determines that the application is evasive malware based on the characteristics of the application inferred from the traffic telemetry data and on the application telemetry data received from the monitoring agent on the endpoint device. The service initiates performance of a mitigation action in the network, after determining that the application on the endpoint device is evasive malware.

Patent Agency Ranking