DATA TAGS GENERATIONS IN NETWORK ENVIRONMENTS

    公开(公告)号:US20240305456A1

    公开(公告)日:2024-09-12

    申请号:US18179229

    申请日:2023-03-06

    CPC classification number: H04L9/088 H04L9/0822 H04L9/3073

    Abstract: A computing device may receive data associated with an event from an originating apparatus in the form of a data item. The computing device may then apply an evaluation function to the data item, wherein applying the evaluation function generates a processing result characterizing an aspect of the data item. The computing device may generate a tag based on the processing result. The computing device may associate the generated tag with the data, wherein the tag is transmitted with the data outside the network environment where the data item is not accessible for processing outside the network environment, but the data tag is accessible. The computing device may provide the data and the tag for transmission.

    ADAPTIVE DOMAIN NAME SYSTEM
    4.
    发明申请

    公开(公告)号:US20210203671A1

    公开(公告)日:2021-07-01

    申请号:US17054492

    申请日:2018-09-18

    Abstract: In an example, there is provided a method for tracking domain name server (DNS) requests, wherein the method comprises determining whether a DNS request has resolved; and for each non-resolving DNS request decomposing the domain name of the request into multiple components, determining, for each component, a value of a metric representing the occurrence of the component in a corpus, generating a scaling factor for the request on the basis of the values for each component, and incrementing a count of the total number of non-resolving DNS requests by a scaled value on the basis of the scaling factor.

    DATA MANAGEMENT
    6.
    发明申请

    公开(公告)号:US20220398321A1

    公开(公告)日:2022-12-15

    申请号:US17755012

    申请日:2019-11-22

    Abstract: In some examples, a method for data management, the method comprises booting a trusted diskless operating system image via a device firmware component, accessing a non-volatile storage of the device using the trusted diskless operating system image; and retrieving user data from the non-volatile storage of the device, and/or writing user data received from a remote location to the non-volatile storage of the device.

    RECOVERY KEYS
    7.
    发明申请

    公开(公告)号:US20220393869A1

    公开(公告)日:2022-12-08

    申请号:US17755011

    申请日:2019-11-22

    Abstract: In some example, a method for accessing a cryptographic recovery key of an encryption system of a device comprises mapping a device identity received at a key management system to a recovery key stored in the key management system, specifying at least one device-related operation to which the recovery key is linked, generating an encrypted message for the device, the encrypted message comprising the recovery key, and transmitting the encrypted message and a signed message to the device.

    SECURITY INSPECTIONS
    8.
    发明申请

    公开(公告)号:US20220382636A1

    公开(公告)日:2022-12-01

    申请号:US17755013

    申请日:2019-11-22

    Abstract: In some examples, a method for performing an out-of-band security inspection of a device comprises generating a snapshot of the state of the device, storing data representing the snapshot to a non-volatile storage of the device, and storing a hash of the snapshot in a device BIOS, transitioning the power state of the device, triggering boot of a trusted diskless operating system image, providing the data representing the snapshot and the hash of the snapshot to the trusted diskless operating system image, and executing a script selected on the basis of a trigger event and the hash of the snapshot to analyse at least a portion of the non-volatile storage of the device.

    AUTHENTICATION IN VIRTUAL ENVIRONMENTS

    公开(公告)号:US20210357484A1

    公开(公告)日:2021-11-18

    申请号:US17043076

    申请日:2018-08-13

    Abstract: Example implementations relate to authentication invirtual reality systems. For example, a device comprising a generator engine can generate a stimulus, and display the stimulus to the user in a virtual environment. The device can receive an input from the user in response to the stimulus, via a receiver engine, and authenticate the user based on the input received via an authentication engine. Additionally, the device can obfuscate the received input from the user by preventing the input from being displayed in the virtual environment via an obfuscation engine.

Patent Agency Ranking