OPTIMIZING APPLICATION SECURITY BASED ON MALICIOUS USER INTENT

    公开(公告)号:US20220417267A1

    公开(公告)日:2022-12-29

    申请号:US17489359

    申请日:2021-09-29

    Abstract: An example method identifying a request to access or modify a data resource. The request is made by a user. The example method further includes authenticating the user. Based on authenticating the user, the example method includes determining that the request is associated with a malicious intent based on a characteristic of the user. Further, based on determining that the request is associated with the malicious intent, the example method includes blocking the user from accessing or modifying the data resource.

    Opentelemetry Security Systems and Methods
    2.
    发明公开

    公开(公告)号:US20240073234A1

    公开(公告)日:2024-02-29

    申请号:US17823256

    申请日:2022-08-30

    CPC classification number: H04L63/1433 H04L63/1416

    Abstract: According to some embodiments, a method includes detecting a start of an OpenTelemetry span by an application and determining security information related to the start of the OpenTelemetry span. The method further includes monitoring the application for one or more application behaviors during execution of the OpenTelemetry span. The method further includes detecting an end of the OpenTelemetry span by the application, and in response, calculate a security score for the OpenTelemetry span using the security information related to the start of the OpenTelemetry span and the one or more application behaviors detected during execution of the OpenTelemetry span. The method further includes updating a status of the OpenTelemetry span to include the security score and a text string related to the calculation of the security score.

    MICROSERVICE VISIBILITY AND CONTROL
    5.
    发明公开

    公开(公告)号:US20230188496A1

    公开(公告)日:2023-06-15

    申请号:US18163979

    申请日:2023-02-03

    CPC classification number: H04L61/4511

    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.

    APPLICATION SECURITY POLICY MANAGEMENT AGENT

    公开(公告)号:US20210034772A1

    公开(公告)日:2021-02-04

    申请号:US17076465

    申请日:2020-10-21

    Abstract: A policy generation agent automatically generates a security policy for an application and a security manager. The agent runs the application in a development environment, causing the application to request permissions from the security manager. The agent passes the permissions request to the security manager. The security manger determines whether to approve or deny the request based on a permissions policy. Responsive to a determination to deny the request, the agent generates an updated permissions policy by updating the permissions policy to approve subsequent requests for the permissions. The agent also associates the updated permissions policy with the application, and suppresses any exceptions generated by the security manager in denying the request before approving the request for the permissions in the development environment.

    Systems and Methods for Application Clustering Based on Included Libraries and Observed Events

    公开(公告)号:US20230388346A1

    公开(公告)日:2023-11-30

    申请号:US17752987

    申请日:2022-05-25

    CPC classification number: H04L63/20 H04L63/1433 G06K9/6223

    Abstract: A system of one embodiment that provides proactive security policy suggestions for applications based on the applications' software composition and runtime behavior. The system includes a memory and a processor. The system is operable to access data that represents one or more features of an application. The application is running on one or more nodes in a computer network, and a feature indicates an application library of the node. The system is operable to apply a clustering algorithm to the data to generate a plurality of cluster sets. The system is operable to determine a security policy to apply to a cluster set of the plurality of cluster sets and apply the security policy to an application whose features are represented by the data in the cluster set.

Patent Agency Ranking