Virtual network segmentation
    131.
    发明授权

    公开(公告)号:US10476738B1

    公开(公告)日:2019-11-12

    申请号:US15181295

    申请日:2016-06-13

    Abstract: Techniques for segmenting a network are described herein. Network locations in a network are grouped such that each group is disjoint with respect to all other groups. The grouping is based on a set of network communication event notifications. The network communication event notifications are used to determine internal and external dependencies for each group and the external and internal dependencies are used to segment the network.

    System for suppressing output of content based on media access

    公开(公告)号:US10417272B1

    公开(公告)日:2019-09-17

    申请号:US14860508

    申请日:2015-09-21

    Abstract: Described are techniques for outputting or suppressing output of network content to a user device based on content previously accessed by the user device. Correspondence between network content accessed by the user device and spoiler data determined from media content may indicate that the network content is associated with the media content. Content consumption data associated with the user device may indicate whether the user device has previously accessed the media content. The network content may be suppressed from output if the user device has not previously accessed the media content. The network content may be output to the user device if the media content has been accessed.

    RESOUCE-BASED CIPHER SUITE SELECTION
    135.
    发明申请

    公开(公告)号:US20190273728A1

    公开(公告)日:2019-09-05

    申请号:US16410814

    申请日:2019-05-13

    Abstract: Cipher suites and/or other parameters for cryptographic protection of communications are dynamically selected to more closely match the intended uses of the sessions. A client indicates a planned use of a session to a server. The client's indication of the planned use may be explicit or implicit. The server selects an appropriate set of parameters for cryptographic protection of communications based at least in part on the indicated planned use and the client and server complete a handshake process to establish a cryptographically protected communications session to use the selected set of parameters.

    System for determining anomalies associated with a request

    公开(公告)号:US10382461B1

    公开(公告)日:2019-08-13

    申请号:US15165221

    申请日:2016-05-26

    Abstract: Described are techniques for identifying anomalous and non-anomalous requests based on metric values determined from a request. Weights to be associated with particular metric values may be determined based on metric data for those values. The metric data may indicate a total number of accesses by requests having a particular metric value, a frequency of access, or particular access times. Based on the weight values and the metric values for the request, a security score for the request may be determined. The security score may indicate a confidence that the request is anomalous or non-anomalous. Potentially anomalous requests may be determined to be non-anomalous if the metric values correspond to known sets of metric values, determined from previous requests. In some cases, metric data may be normalized prior to use to facilitate faster queries and conserve available data storage.

    PROVISIONAL COMPUTING RESOURCE POLICY EVALUATION

    公开(公告)号:US20190245862A1

    公开(公告)日:2019-08-08

    申请号:US16384866

    申请日:2019-04-15

    CPC classification number: H04L63/102 H04L63/20

    Abstract: A policy management service receives a request to evaluate a provisional policy to determine the impact of implementation of the provisional policy. The policy management service evaluates an active policy against a request to access a computing resource to determine an authorization decision. The policy management service then evaluates the provisional policy against the request to access the computing resource to generate an evaluation of the provisional policy. The policy management service provides the evaluation and the authorization decision in response to the request to evaluate the provisional policy.

    PREVENTING INTER-APPLICATION MESSAGE HIJACKING
    138.
    发明申请

    公开(公告)号:US20190081944A1

    公开(公告)日:2019-03-14

    申请号:US16191033

    申请日:2018-11-14

    Abstract: Various approaches discussed herein enable validation of an application on a computing device, such as a mobile computing device, prior to that application being invoked by activation of a link in another application. Upon activation of the link in a calling application, the computing device determines a target application to be invoked in response to the activation. Sensitive or confidential data, such as login credentials, may be included in the link to be passed to the target application. By validating either the calling or the target application, the data may be safeguarded by confirming an identity of an application associated with the link.

    THROTTLING SYSTEM AND METHOD
    139.
    发明申请

    公开(公告)号:US20190073253A1

    公开(公告)日:2019-03-07

    申请号:US16179823

    申请日:2018-11-02

    Abstract: The flow of events though an event-analysis system is controlled by a number of event throttles which filter events, prioritize events and control the rate at which events are provided to event-processing components of the event-analysis system. Incoming events to the event-analysis system are associated with a profile, and a metrics engine generates metrics based on the incoming events for each profile. The flow of events to the metrics engine is controlled on a per profile basis, so that excessive generation of new metrics and new profiles is limited. If the system from which the events originate is compromised, metrics associated with compromised profiles may be frozen to avoid corrupting existing metrics. Processing of events and anomalies by analysis engines within the event-analysis system may be delayed to allow the accumulation of metrics necessary for accurate analysis.

Patent Agency Ranking