AUTOMATIC CLASSIFICATION AND PARALLEL PROCESSING OF UNTESTED CODE IN A PROTECTED RUNTIME ENVIRONMENT

    公开(公告)号:US20180060208A1

    公开(公告)日:2018-03-01

    申请号:US15248077

    申请日:2016-08-26

    CPC classification number: G06F11/3604 G06F21/53 G06F21/57 G06F2221/033

    Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.

    Displaying Identities of Online Conference Participants at a Multi-Participant Location
    4.
    发明申请
    Displaying Identities of Online Conference Participants at a Multi-Participant Location 审中-公开
    在多参与者位置显示在线会议参与者的身份

    公开(公告)号:US20160142462A1

    公开(公告)日:2016-05-19

    申请号:US14547763

    申请日:2014-11-19

    CPC classification number: G10L17/005 H04L65/4015 H04L65/403

    Abstract: Techniques are presented herein to visually display who is speaking when an online conference session is established involving participants at multiple locations. When it is determined that there are multiple participants of the online conference session at a first location at which one or more microphones can detect audio from the multiple participants, a visual indicator of the first location is generated for display to the participants in the online conference session. In addition, in a predetermined relationship with the visual indicator of the first location, identifiers of the multiple participants at the first location are generated that can also be displayed to the participants in the online conference session.

    Abstract translation: 这里呈现技术以在多个位置上涉及参与者建立在线会议期间时,谁在说话。 当确定在一个或多个麦克风可以检测来自多个参与者的音频的第一位置处存在多个在线会议会话的参与者时,生成第一位置的视觉指示符以便在线会议中的参与者显示 会话 此外,在与第一位置的视觉指示符的预定关系中,生成第一位置处的多个参与者的标识符,其也可以在在线会议会话中向参与者显示。

    DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK

    公开(公告)号:US20190068552A1

    公开(公告)日:2019-02-28

    申请号:US16173383

    申请日:2018-10-29

    CPC classification number: H04L63/0209 H04L63/0815 H04L63/102

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

    DYNAMIC CREATION OF ISOLATED SCRUBBING ENVIRONMENTS

    公开(公告)号:US20190026460A1

    公开(公告)日:2019-01-24

    申请号:US15654169

    申请日:2017-07-19

    Abstract: An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.

    DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK

    公开(公告)号:US20170149784A1

    公开(公告)日:2017-05-25

    申请号:US14950418

    申请日:2015-11-24

    CPC classification number: H04L63/0209 H04L63/0815 H04L63/102

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

    Delegated access control of an enterprise network

    公开(公告)号:US10757073B2

    公开(公告)日:2020-08-25

    申请号:US16173383

    申请日:2018-10-29

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

Patent Agency Ranking