Using deep learning models to obfuscate and optimize communications

    公开(公告)号:US11568209B2

    公开(公告)日:2023-01-31

    申请号:US16792998

    申请日:2020-02-18

    Abstract: Concepts and technologies are disclosed herein for using deep learning models to obfuscate and optimize communications. A request can be received in a first language, from a user device, and at a first computing device storing a first neural network. The request can be translated using the first neural network into a modified request in a custom language. The modified request can be sent to a second computing device hosting an application. The first computing device can receive a modified response that is in the custom language, where the modified response can be created at the second computing device using the second neural network and based on a response from the application. The modified response can be translated into a response in the first language and sent to the user device.

    Quantum tampering threat management

    公开(公告)号:US11476932B2

    公开(公告)日:2022-10-18

    申请号:US17107828

    申请日:2020-11-30

    Abstract: The concepts and technologies disclosed herein are directed to quantum tampering threat management. According to one aspect of the concepts and technologies disclosed herein, a quantum security manager (“Q-SM”) can monitor a plurality of quantum channels for tampering. The Q-SM can detect tampering on a quantum channel of the plurality of quantum channels. The Q-SM can provide tampering monitoring statistics to a software-defined network (“SDN”) that, in turn, notifies a quantum security operations center (“Q-SOC”) about the tampering on the quantum channel. The Q-SM can receive threat mitigation instructions from the Q-SOC. The threat mitigation instructions can instruct the Q-SM how to counter the tampering on the quantum channel. The Q-SM can perform one or more actions in accordance with the threat mitigation instructions to counter the tampering on the quantum channel.

    Quantum Key Distribution Networking as a Service

    公开(公告)号:US20220173896A1

    公开(公告)日:2022-06-02

    申请号:US17107818

    申请日:2020-11-30

    Abstract: The concepts and technologies disclosed herein are directed to quantum key distribution (“QKD”) networking as a service. According to one aspect disclosed herein, a microservices controller can establish a plurality of quantum connections with a plurality of virtual quantum connection managers (“vQCMs”) deployed in association with a set of quantum user nodes (“QUNs”) in a QKD network. The microservices controller can receive a request to initialize the QKD network. The microservices controller can coordinate with the plurality of vQCMs to handle initialization of the QKD network. The microservices controller can receive a QKD service request from a QKD network operator. The microservices controller can invoke a plurality of microservices to handle the QKD service request.

    Single packet authorization in a cloud computing environment

    公开(公告)号:US11349810B2

    公开(公告)日:2022-05-31

    申请号:US16435713

    申请日:2019-06-10

    Abstract: Concepts and technologies disclosed herein are directed to single packet authorization (“SPA”) in a cloud computing environment. A compute node can include a virtual switch operating on at least a portion of a plurality of hardware resources of a cloud computing environment, a virtual firewall, a cloud workload executing a cloud service, and a SPA service. The virtual switch can receive a SPA request from a SPA client executing on a computing device. The virtual switch can forward the SPA request to the virtual firewall and to the SPA service. The virtual firewall can deny the SPA request in accordance with a firewall policy. The SPA service can utilize a SPA validation scheme to validate the SPA request. The virtual firewall can implement a temporary firewall policy to allow incoming packets from the SPA client and directed to the cloud service.

    MOCK DATA GENERATOR USING GENERATIVE ADVERSARIAL NETWORKS

    公开(公告)号:US20210271591A1

    公开(公告)日:2021-09-02

    申请号:US16803609

    申请日:2020-02-27

    Abstract: Mock test data is generated by providing a random input to a generator model. The random input is transformed into generated data that is then provided to a discriminator model along with production data. The discriminator model classifies the generated data and the production data as either fake or real. The discriminator model is trained by updating weights through backpropagation. Similarly, the generator model is trained to provide adjusted generated data. When the discriminator model is unable to distinguish between the classified real data and the adjusted generated data, the generator model is used to generate mock data for an application being tested.

    Tag-Based Security Policy Creation in a Distributed Computing Environment

    公开(公告)号:US20200213365A1

    公开(公告)日:2020-07-02

    申请号:US16817786

    申请日:2020-03-13

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

    Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
    28.
    发明申请
    Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment 有权
    解耦网络安全设备的硬件和软件组件,以在分布式计算环境中提供安全软件即服务

    公开(公告)号:US20150033282A1

    公开(公告)日:2015-01-29

    申请号:US13949695

    申请日:2013-07-24

    Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.

    Abstract translation: 本文公开了用于解耦网络安全设备的硬件和软件组件以在分布式计算环境中提供作为服务的安全软件的概念和技术。 计算机系统包括可执行计算机可执行指令以执行各种操作的处理器。 处理器可以执行操作以向一个或多个客户平台提供安全服务。 这些操作可以包括从安全服务提供商接收网络安全软件组件,以及在分布式计算环境内部署网络安全软件组件,使得网络安全软件组件可以由分布式计算环境的计算资源执行以提供 向客户平台提供安全服务。 网络安全软件组件包括已由安全服务提供商从网络安全设备的硬件组件分离的软件组件。

    Transaction Validation Service
    29.
    发明公开

    公开(公告)号:US20230186304A1

    公开(公告)日:2023-06-15

    申请号:US18107557

    申请日:2023-02-09

    Abstract: Concepts and technologies are disclosed herein for providing a transaction validation service. A device can receive a request to validate a transaction requested by a user device, where the transaction can be performed by an application and where the request to validate the transaction can be obtained with a first hash that is created by the user device. The first hash can include a hash of transaction data that is hashed using data stored on the user device. The device can receive an indication that the transaction has been approved, obtain a second hash of the transaction data that is hashed using the data stored on the user device, and determine, based on the first hash and the second hash, whether the transaction should be allowed or blocked.

    Website Verification Service
    30.
    发明公开

    公开(公告)号:US20230147743A1

    公开(公告)日:2023-05-11

    申请号:US18091272

    申请日:2022-12-29

    Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.

Patent Agency Ranking