Applying security policies to web traffic while maintaining privacy

    公开(公告)号:US11368487B2

    公开(公告)日:2022-06-21

    申请号:US16416794

    申请日:2019-05-20

    Abstract: A computer system applies security policies to web traffic while maintaining privacy. A network security agent is authenticated by a client application to dynamically obtain one or more security policies, wherein the client application and the network security agent are configured to execute on a device and the network security agent is capable of communicating with a source of security policies. Connection information is obtained that includes a request to initiate an encrypted connection with a destination entity. The client application determines whether the encrypted connection between the client application and the destination entity is permitted according to the security policy and based on the connection information. The encrypted connection between the client and the destination entity is established in response to determining that the encrypted connection is permitted. Embodiments may further include a method and computer program product for applying security policies to web traffic.

    ENABLING INTERNAL AND EXTERNAL VERIFICATION OF HASH-BASED SIGNATURE COMPUTATIONS BY SIGNING SERVER

    公开(公告)号:US20230254154A1

    公开(公告)日:2023-08-10

    申请号:US17669302

    申请日:2022-02-10

    CPC classification number: H04L9/3247 H04L9/3239

    Abstract: Methods and systems enable internal and external verification of computations performed by a code signing server according to hash-based signature techniques using unique state, and further for a code signing server to expose parts of a hash-based signature log without negating the security of the one-time signature key pairs generated by the code signing server. A signing module of a code signing server receives a signing request from a client computing system. The signing module configures the code signing server to generate a one-time signature key pair based on a Merkle tree state. The signing module configures the code signing server to issue a hash-based signature to the client computing system. The code signing server is configured to record the Merkle tree state and the issued HBS in an immutably ordered log at a logging server.

    Communication latency based cryptographic negotiations

    公开(公告)号:US11646883B2

    公开(公告)日:2023-05-09

    申请号:US16809135

    申请日:2020-03-04

    CPC classification number: H04L9/0875 H04L9/0852

    Abstract: A method of selecting a particular cryptographic algorithm for an optimal cryptographic negotiation in which higher security level is obtained with an acceptable performance speed. The method includes exchanging information between a first device and a second device for establishing a secure communication connection, measuring network latency between the first device and the second device, and selecting a particular cryptographic algorithm from among a plurality of mutually supported cryptographic algorithms based on the network latency for establishing the secure communication connection.

    Enabling internal and external verification of hash-based signature computations by signing server

    公开(公告)号:US12267437B2

    公开(公告)日:2025-04-01

    申请号:US17669302

    申请日:2022-02-10

    Abstract: Methods and systems enable internal and external verification of computations performed by a code signing server according to hash-based signature techniques using unique state, and further for a code signing server to expose parts of a hash-based signature log without negating the security of the one-time signature key pairs generated by the code signing server. A signing module of a code signing server receives a signing request from a client computing system. The signing module configures the code signing server to generate a one-time signature key pair based on a Merkle tree state. The signing module configures the code signing server to issue a hash-based signature to the client computing system. The code signing server is configured to record the Merkle tree state and the issued HBS in an immutably ordered log at a logging server.

    COMMUNICATION LATENCY BASED CRYPTOGRAPHIC NEGOTIATIONS

    公开(公告)号:US20210281404A1

    公开(公告)日:2021-09-09

    申请号:US16809135

    申请日:2020-03-04

    Abstract: A method of selecting a particular cryptographic algorithm for an optimal cryptographic negotiation in which higher security level is obtained with an acceptable performance speed. The method includes exchanging information between a first device and a second device for establishing a secure communication connection, measuring network latency between the first device and the second device, and selecting a particular cryptographic algorithm from among a plurality of mutually supported cryptographic algorithms based on the network latency for establishing the secure communication connection.

    APPLYING SECURITY POLICIES TO WEB TRAFFIC WHILE MAINTAINING PRIVACY

    公开(公告)号:US20200374314A1

    公开(公告)日:2020-11-26

    申请号:US16416794

    申请日:2019-05-20

    Abstract: A computer system applies security policies to web traffic while maintaining privacy. A network security agent is authenticated by a client application to dynamically obtain one or more security policies, wherein the client application and the network security agent are configured to execute on a device and the network security agent is capable of communicating with a source of security policies. Connection information is obtained that includes a request to initiate an encrypted connection with a destination entity. The client application determines whether the encrypted connection between the client application and the destination entity is permitted according to the security policy and based on the connection information. The encrypted connection between the client and the destination entity is established in response to determining that the encrypted connection is permitted. Embodiments may further include a method and computer program product for applying security policies to web traffic.

Patent Agency Ranking