Encoding of security codes
    141.
    发明授权

    公开(公告)号:US10019567B1

    公开(公告)日:2018-07-10

    申请号:US14223399

    申请日:2014-03-24

    CPC classification number: G06F21/45 G06F21/46

    Abstract: A method and apparatus for encoding security codes are provided. In the method and apparatus a first code, which may be an erroneous code, is compared to a set of codes to identify a code portion. The code portion may be identified as contributing to inducing erroneous entry of the first code. The likelihood associated with issuing a second code including the code portion may be updated to negatively bias issuing the second code.

    Iterative network graph placement
    143.
    发明授权

    公开(公告)号:US09998392B1

    公开(公告)日:2018-06-12

    申请号:US14180301

    申请日:2014-02-13

    CPC classification number: H04L47/70

    Abstract: Techniques for making placement decisions for the placement of components within a computer network are described herein. A simplified representation of the computer network is used to determine a candidate placement solution based on a representation of placement requests. Constrained machine locations and constraints on the connections are used to iteratively determine placement locations based on perturbations to those constraints.

    Honeypot computing services that include simulated computing resources

    公开(公告)号:US09985987B1

    公开(公告)日:2018-05-29

    申请号:US14981737

    申请日:2015-12-28

    CPC classification number: H04L63/1491 G06F17/30424 G06F17/30554 H04L63/08

    Abstract: The disclosure relates to provisioning honeypot computing services using a simulation state database to simulate a set of computing resources. One example includes a system that receives a mutating request associated with honeypot credentials, updates a simulation state database associated with the honeypot credentials at least based on the mutating request and generates a simulated mutating response based at least on the simulation state database that simulates a response to the mutating request. The system can also receive a query request associated with the honeypot credentials, query the simulation state database at least based on the query request, and generate a simulated query response based at least on the simulation state database that simulates a response to the query request.

    Distributed public key revocation
    145.
    发明授权

    公开(公告)号:US09900152B2

    公开(公告)日:2018-02-20

    申请号:US15018209

    申请日:2016-02-08

    CPC classification number: H04L9/0891 H04L9/0894

    Abstract: Techniques for improving the security and availability of cryptographic key systems are described herein. A graph representation of a network of cryptographic key servers is created with vertices representing the servers and edges representing connections between pairs of servers. As cryptographic key events are received, the graph is used to locate the appropriate servers upon which to perform the operations associated with the events. In the event that the network requires repairing, the graph is first repaired obeying any constraints on the graph and then the network is updated to reflect alterations to the graph.

    Data storage optimization for non-volatile memory

    公开(公告)号:US09811459B1

    公开(公告)日:2017-11-07

    申请号:US14305894

    申请日:2014-06-16

    CPC classification number: G06F12/0246 G06F9/321 G06F2212/1044 G06F2212/7201

    Abstract: Non-volatile devices may be configured such that a clear operation on a single bit clears an entire block of bits. The representation of particular data structures may be optimized to reduce the number of clear operations required to store the representation in non-volatile memory. A data schema may indicate that a data structure of an application may be optimized for storage in non-volatile memory. A translation layer may convert an application level representation of a data value associated with the data structure to an optimized storage representation of the data value before storing the optimized storage representation of the data value in non-volatile memory.

Patent Agency Ranking