Method and system for secure delivery of information to computing environments

    公开(公告)号:US10050997B2

    公开(公告)日:2018-08-14

    申请号:US15854571

    申请日:2017-12-26

    申请人: Intuit Inc.

    IPC分类号: H04L29/06 G06F21/60 G06F21/57

    摘要: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.

    Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones

    公开(公告)号:US10021143B2

    公开(公告)日:2018-07-10

    申请号:US15014900

    申请日:2016-02-03

    申请人: Intuit Inc.

    IPC分类号: G06F17/00 H04L29/06

    摘要: A service provider computing environment includes a service provider computing device, which receives tenant secrets policies from tenants. The tenants are tenants of multi-tenant assets of a service provider. One or more data security zones in which the multi-tenant assets are located are identified. A service provider secrets policy includes data security jurisdiction zone secrets policy data for the one or more data security jurisdiction zones. The data security jurisdiction zone secrets policy data is analyzed to determine allowed secrets data with respect to each of the identified data security jurisdiction zones. The service provider computing environment determines of the tenant secrets policies satisfy the requirements of the service provider secrets policy. If the tenant secrets policies satisfy the requirements of the service provider secrets policy, the service provider computing environment allows the tenant secrets policies to be applied to tenant data or information in the multi-tenant assets.

    Method and system for validating a virtual asset
    8.
    发明授权
    Method and system for validating a virtual asset 有权
    验证虚拟资产的方法和系统

    公开(公告)号:US09390288B2

    公开(公告)日:2016-07-12

    申请号:US14070050

    申请日:2013-11-01

    申请人: Intuit Inc.

    摘要: Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.

    摘要翻译: 用于创建虚拟资产的虚拟资产创建数据通过包含主要虚拟资产数据的虚拟资产创建系统生成。 也产生次认证数据。 当虚拟资产启动时,辅助认证数据将从虚拟资产创建系统传递到虚拟资产。 来自虚拟资产创建系统和虚拟资产的主要虚拟资产数据和辅助认证数据以及/或与虚拟资产相关联的一个或多个其他来源然后通过不同的通信信道被发送到虚拟资产验证系统。 如果来自两个源的主要虚拟资产数据和辅助认证数据匹配,或者具有定义的阈值相似度,则将虚拟资产的状态转换为有资格接收敏感数据的已验证虚拟资产的状态。

    METHOD AND SYSTEM FOR VIRTUAL ASSET ASSISTED EXTRUSION AND INTRUSION DETECTION AND THREAT SCORING IN A CLOUD COMPUTING ENVIRONMENT
    9.
    发明申请
    METHOD AND SYSTEM FOR VIRTUAL ASSET ASSISTED EXTRUSION AND INTRUSION DETECTION AND THREAT SCORING IN A CLOUD COMPUTING ENVIRONMENT 审中-公开
    云计算环境中的虚拟资产辅助挤压和入侵检测和威胁评估方法与系统

    公开(公告)号:US20160197951A1

    公开(公告)日:2016-07-07

    申请号:US15067528

    申请日:2016-03-11

    申请人: Intuit Inc.

    IPC分类号: H04L29/06

    摘要: An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns, are defined and analysis trigger data is generated. The one or more analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. Any detected message is identified as a potential security threat and is assigned a threat score, which is provided to the virtual asset. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel.

    摘要翻译: 在一个或多个虚拟资产中提供分析触发器监控系统。 定义一个或多个分析触发参数,包括安全威胁模式,并生成分析触发数据。 一个或多个分析触发器监视系统用于监视发送到一个或多个虚拟资产或从一个或多个虚拟资产发送的消息业务的至少一部分,以检测包括一个或多个分析触发参数中的一个或多个的任何消息。 任何检测到的消息被识别为潜在的安全威胁,并且被分配给提供给虚拟资产的威胁分数。 然后将包括一个或多个分析触发参数中的一个或多个的任何检测到的消息的至少一部分的副本传送到一个或多个分析系统,以使用第二通信信道进一步分析。

    Method and system for distributing secrets
    10.
    发明授权
    Method and system for distributing secrets 有权
    分发秘密的方法和系统

    公开(公告)号:US09384362B2

    公开(公告)日:2016-07-05

    申请号:US14053488

    申请日:2013-10-14

    申请人: Intuit Inc.

    摘要: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.

    摘要翻译: 提供表示访问相关资源所需的一个或多个秘密的数据,以及代表用于控制秘密分布的一个或多个秘密分发因子的秘密分发策略数据。 当请求的虚拟资产提交秘密请求数据时,获得与请求的虚拟资产相关联的虚拟资产简档数据。 然后使用至少一个秘密分发因子来分析请求的虚拟资产简档数据,以验证请求的虚拟资产。 然后使用一个或多个秘密分布因子来分析请求的虚拟资产简档数据,以确定请求的虚拟资产合法需要什么秘密。 然后生成表示一个或多个授权秘密的请求虚拟资产的授权秘密数据。 然后,向请求的虚拟资产提供对授权秘密数据的访问。