Vulnerability Analysis Using Continuous Application Attestation

    公开(公告)号:US20220398324A1

    公开(公告)日:2022-12-15

    申请号:US17346898

    申请日:2021-06-14

    Abstract: The present disclosure is directed to systems and methods for vulnerability analysis using continuous application attestation, a method including receiving a load map associated with an application , the load map indicating loaded modules of the application; determining whether at least one notification is received indicating at least one update to the loaded modules of the application, wherein, if the at least one notification is received, the load map is updated based on the indicated at least one update, and wherein, if the at least one notification is not received, the load map is retained in an existing state; periodically retrieving call traces associated with the application, the call traces indicating executed modules of the application; and generating a continuous application attestation comprising at least a combination of the updated load map or the retained load map, and the retrieved call traces associated with the application at a given time.

    STEERING TRAFFIC ON A FLOW-BY-FLOW BASIS BY A SINGLE SIGN-ON SERVICE

    公开(公告)号:US20220116381A1

    公开(公告)日:2022-04-14

    申请号:US17069540

    申请日:2020-10-13

    Abstract: Techniques for using a single sign-on (SSO) service as a software defined networking (SDN) controller for a virtual private network environment. The techniques disclosed herein may include receiving, at a first authentication service, first data including a first request to authenticate a user of a client device to access an application. The techniques may also include sending, to the client device, second data representing a second request configured to prompt a second authentication service to authenticate the user of the client device. Additionally, the first authentication service may receive an indication that the user was authenticated by the second authentication service and determine, based at least in part on an attribute associated with at least one of the client device or the application, whether the client device is to access the application using an unsecured connection or, alternatively, access the application using a secured connection.

    END-TO-END SECURITY FOR VIRTUAL PRIVATE SERVICE CHAINS
    13.
    发明申请
    END-TO-END SECURITY FOR VIRTUAL PRIVATE SERVICE CHAINS 有权
    虚拟私人服务链的端到端安全

    公开(公告)号:US20160182458A1

    公开(公告)日:2016-06-23

    申请号:US14573564

    申请日:2014-12-17

    Abstract: A first virtual machine is established in a virtual private service chain to provide a first network service to virtual private service chain traffic. A second virtual machine is also established the virtual private service chain to provide a second network service to the virtual private service chain traffic. The virtual private service chain traffic is encrypted for transmission within the virtual private service chain from the first virtual machine to the second virtual machine, wherein the encryption uses a key shared by the first and second virtual machines.

    Abstract translation: 在虚拟专用服务链中建立第一虚拟机以向虚拟专用服务链流量提供第一网络服务。 第二个虚拟机也建立了虚拟专用服务链,为虚拟私人服务链流量提供第二个网络服务。 虚拟专用服务链流量被加密以在虚拟专用服务链中从第一虚拟机到第二虚拟机的传输,其中加密使用由第一和第二虚拟机共享的密钥。

    PENETRATION TESTING FOR API SERVICE SECURITY

    公开(公告)号:US20230004651A1

    公开(公告)日:2023-01-05

    申请号:US17662477

    申请日:2022-05-09

    Abstract: According to some embodiments, a method comprises: obtaining an application programming interface (API) specification for an API service; performing one or more tests on the API service to determine an amount of deviation between the API service and the API specification; and determining a deviation score based on the amount of deviation between the API service and the API specification. The method may include transmitting the deviation score to a scoring agent.

    SYSTEMS AND METHODS FOR DISTRIBUTING SD-WAN POLICIES

    公开(公告)号:US20210369309A1

    公开(公告)日:2021-12-02

    申请号:US17403676

    申请日:2021-08-16

    Abstract: In one embodiment, a router includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors. The one or more computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the router to perform operations including receiving software-defined networking in a wide area network (SD-WAN) policies from a component of an SD-WAN network. The operations also include establishing a session with a mobile device and receiving information associated with the mobile device in response to establishing the session with the mobile device. The operations further include filtering the SD-WAN policies based on the information associated with the mobile device to generate SD-WAN device-specific policies and communicating the SD-WAN device-specific policies to the mobile device.

    DYNAMICALLY TAILORED TRUST FOR SECURE APPLICATION-SERVICE NETWORKING IN AN ENTERPRISE

    公开(公告)号:US20210044623A1

    公开(公告)日:2021-02-11

    申请号:US16867642

    申请日:2020-05-06

    Abstract: Dynamically tailored trust for secure application-server networking and advanced enterprise security is provided. A system can individually assess the security posture of each application connecting to the Internet from each client device in an enterprise. For each application, the system tailors a security mode of the Internet connection based on the security posture of the application. Assessment of the security posture of an application is a comprehensive inventory of the security of the application, the security of the device hosting the application, the rights and security of the user, security attributes of the intended service or website being accessed, the security of the communication channel, and so forth. A network-based controller communicates with an agent running within a secure boot mode of each client device to select a security mode for application-service connection, including lean-trust direct access to the Internet, secure VPN-like access, or no access to the Internet.

Patent Agency Ranking