VULNERABILITY ANALYSIS AND SEGMENTATION OF BRING-YOUR-OWN IOT DEVICES

    公开(公告)号:US20190245882A1

    公开(公告)日:2019-08-08

    申请号:US15891749

    申请日:2018-02-08

    Abstract: In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.

    Crowd sourced cloud computing
    34.
    发明授权

    公开(公告)号:US09952908B2

    公开(公告)日:2018-04-24

    申请号:US14851437

    申请日:2015-09-11

    Abstract: A first party, such as a residential subscriber to an Internet Service Provider (ISP), logically partitions its computing resources into an end user partition and a crowd sourced cloud partition. The first party installs a crowd sourced cloud application in each cloud partition. Together, a cloud provider computing system and each cloud application orchestrate cloud services over a communications network, such as the Internet. For each crowd sourced cloud application, orchestration involves registering cloud services with the cloud provider, provisioning each registered cloud service that is requested by the cloud provider, and operating each provisioned service. For the cloud provider, orchestration involves publishing each registered service as available to crowd sourced cloud users, receiving requests for cloud services from a crowd sourced cloud user, and requesting, from a crowd sourced cloud application, a registered service responsive to the request for cloud services.

    CROWD-SOURCED CLOUD COMPUTING RESOURCE VALIDATION

    公开(公告)号:US20180013696A1

    公开(公告)日:2018-01-11

    申请号:US15203767

    申请日:2016-07-06

    CPC classification number: H04L47/822 G06F9/5072 H04L43/022 H04L43/062

    Abstract: Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.

    SECURE OVER-THE-AIR PROVISIONING SOLUTION FOR HANDHELD AND DESKTOP DEVICES AND SERVICES
    37.
    发明申请
    SECURE OVER-THE-AIR PROVISIONING SOLUTION FOR HANDHELD AND DESKTOP DEVICES AND SERVICES 审中-公开
    安全的手持设备和服务的空中提供解决方案

    公开(公告)号:US20160112410A1

    公开(公告)日:2016-04-21

    申请号:US14982693

    申请日:2015-12-29

    Abstract: In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to obtain a unique identification (ID) of the device at the provisioning system. The device and provisioning system then participate in device and user authentication in response to a confirmed unique ID by a backend access control system, where the device generates a secure key pair after successful user authentication. In response to the device being approved for services (e.g., checked by the provisioning system via a registration system), the provisioning system provides a root certificate to the device, and the device sends a certificate enrollment request back to the provisioning system. In response to a certificate authority signing the certificate request, the provisioning system returns a valid certificate to the device, and the valid certificate is installed on the device.

    Abstract translation: 在一个实施例中,设备和服务提供系统彼此建立空中连接,并执行设备状态验证,以在配置系统获得设备的唯一标识(ID)。 设备和配置系统然后响应于后端接入控制系统的确认的唯一ID参与设备和用户认证,其中设备在成功的用户认证之后生成安全密钥对。 响应于设备被批准用于服务(例如,经由注册系统由供应系统检查),供应系统向设备提供根证书,并且设备将证书注册请求发回给供应系统。 响应证书颁发机构对证书请求的签名,配置系统将向设备返回有效的证书,并在设备上安装有效的证书。

Patent Agency Ranking