Separate cryptographic keys for multiple modes

    公开(公告)号:US10742412B2

    公开(公告)日:2020-08-11

    申请号:US15882952

    申请日:2018-01-29

    Abstract: According to examples, an apparatus may include a security enclosure, a main processor housed in the security enclosure, and a physical security monitoring control unit (PSMCU) processor housed in the security enclosure. The PSMCU processor may cause the apparatus to switchably operate between a first mode and a second mode. In the first mode, the PSMCU processor may allow access by the main processor to a first cryptographic key while preventing access by the main processor to a second cryptographic key. In addition, in the second mode, the PSMCU processor may allow access by the main processor to the second cryptographic key while preventing access by the main processor to the first cryptographic key.

    WORKLOAD MIGRATION
    23.
    发明申请
    WORKLOAD MIGRATION 审中-公开

    公开(公告)号:US20200218566A1

    公开(公告)日:2020-07-09

    申请号:US16240858

    申请日:2019-01-07

    Abstract: In some examples, a system migrates, responsive to a request, a workload comprising components and relationships among the components as represented by a topology model, the migrating comprising migrating the workload from the source infrastructure to a target infrastructure, and migrating components of the workload from the source infrastructure to the target infrastructure.

    Tweak-based string encryption
    24.
    发明授权

    公开(公告)号:US10686588B2

    公开(公告)日:2020-06-16

    申请号:US15693327

    申请日:2017-08-31

    Abstract: A technique includes performing element-by-element encryption of a segment of the plaintext string to provide a segment of an encrypted string. Performing the element-by-element encryption includes, for a given string element of the segment of the plaintext string, encrypting the given string element to provide a given string element of the segment of the encrypted string; and tweaking the encryption of the given string element based on a selector that includes multiple string elements of the encrypted string. The technique may include searching an encrypted database based on the encrypted string.

    Aggregation based event identification

    公开(公告)号:US10592308B2

    公开(公告)日:2020-03-17

    申请号:US15569206

    申请日:2015-04-30

    Abstract: According to an example, aggregation based event identification may include aggregating each of a plurality of source events by an event type of event types that represent dusters of the source events and/or a host of a source event of the source events to generate a reduced number of the source events. Aggregation based event identification may further include analyzing a characteristic for each of the reduced number of the source events, and assigning, based on the analysis of the characteristic for each of the reduced number of the source events, a characteristic weight to each of the reduced number of the source events. Further, aggregation based event identification may include aggregating the characteristic weights for each of the reduced number of the source events to determine an aggregated event issue weight for each of the reduced number of the source events.

    Interactive sequential pattern mining

    公开(公告)号:US10565218B2

    公开(公告)日:2020-02-18

    申请号:US15325493

    申请日:2014-08-18

    Abstract: Interactive sequential pattern mining is disclosed. One example is a system including a sequence miner, and an interaction processor. A sequence database is received, the sequence database including a plurality of input sequences, where each sequence of the plurality of input sequences is an ordered list of events, and each event in the list of events includes at least one item. The sequence miner mines the sequence database for a plurality of candidate sequence patterns, the mining based on an interaction with a user. The interaction processor processes the interaction with the user, the interaction based on domain relevance of the plurality of candidate sequence patterns to the user.

    Inferring a network topology
    29.
    发明授权

    公开(公告)号:US10516578B2

    公开(公告)日:2019-12-24

    申请号:US15558659

    申请日:2015-03-31

    Abstract: In a method for inferring a topology of components in a network, at least one operation parameter is provided for each of a plurality of components in a network, and a similarity measure is computed between at least two of said components based on values of said operation parameters. Based on said similarity measure, it is determined whether said two components are topologically connected, wherein said similarity measure is computed in terms of a normalized mutual information between said operation parameters pertaining to said two components.

    MACHINE LEARNING-BASED SECURITY THREAT INVESTIGATION GUIDANCE

    公开(公告)号:US20190340353A1

    公开(公告)日:2019-11-07

    申请号:US15973189

    申请日:2018-05-07

    Inventor: Tamir Mitelman

    Abstract: A technique includes accessing data representing a state of a given investigation of a potential security threat to a computer system by a security analyst. The state includes a result of a current investigative step of the investigation, and the analyst conducting the investigation uses an investigation graphical user interface (GUI). The technique includes applying machine learning that is trained on observed investigations to determine a recommendation to guide the analyst in a next investigative step for the given investigation. The technique includes communicating the recommendation through an output provided to the investigation GUI.

Patent Agency Ranking