Context-based security screening for accessing data

    公开(公告)号:US09811683B2

    公开(公告)日:2017-11-07

    申请号:US15223296

    申请日:2016-07-29

    CPC classification number: G06F21/6218 G06F2221/2111

    Abstract: A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by the computer system for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester by the computer system.

    Security in a Communication Network
    34.
    发明申请

    公开(公告)号:US20170083910A1

    公开(公告)日:2017-03-23

    申请号:US14858389

    申请日:2015-09-18

    Abstract: A computer-implemented method, system, and/or computer program product provides security in a communication network between a user device and a computer related device, and receives payment for services offered through a distributed registry associated with the communication network. One or more processors provide a distributed registry that specifies a plurality of services available to support communications between a user device and a computer related device on a communication network. The processor(s) dynamically construct one or more multi-node transient processing pathways between the user device and the computer related device based on the services. The processor(s) present the plurality of services specified by the distributed registry to the user device, and append metadata describing a current cryptocurrency cost of the services. The processor(s) then charge the current cryptocurrency cost to a cryptocurrency account associated with the user device and provide the particular service to the user device.

    Probabilistically Detecting Low Intensity Threat Events
    35.
    发明申请
    Probabilistically Detecting Low Intensity Threat Events 审中-公开
    概率地检测低强度威胁事件

    公开(公告)号:US20160352762A1

    公开(公告)日:2016-12-01

    申请号:US14721091

    申请日:2015-05-26

    CPC classification number: H04L63/1425

    Abstract: A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate anomalies experienced by each of multiple attack surfaces is received. The disparate anomalies occur over an extended period of time that exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces. A synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces is generated. In response to receiving a notification that the at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event, an alert that a malicious attack is being attempted against one or more attack surfaces is generated.

    Abstract translation: 方法,系统和/或计算机程序产品概率地检测针对攻击面的低强度威胁事件。 接收到多个攻击面各自经历的异常异常的通知。 不同的异常发生在超过确定对多个攻击面中的一个或多个的高强度攻击所需的最大阈值时间段的延长的时间段内。 生成包含多个攻击面所经历的所有异常异常的合成事件。 响应于接收到至少一个特定攻击表面经历在合成事件中发现的预定数量的异常异常的通知,生成针对一个或多个攻击面尝试恶意攻击的警报。

    Secure application debugging
    36.
    发明授权
    Secure application debugging 有权
    安全应用程序调试

    公开(公告)号:US09477845B2

    公开(公告)日:2016-10-25

    申请号:US14956426

    申请日:2015-12-02

    Abstract: A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application from a second computer. Access to data used by the secure software application is protected by a security object, which allows a processor to access the data used by the secure software application without permitting data to exit unprotected from the processor. The first computer receives from the second computer an encrypted secure sidecar debugging application that is designed to debug the secure software application. In response to detecting an error in execution of the secure software application within the first computer, the first computer transmits the secure software application and the secure sidecar debugging application to the second computer, such that the second computer is enabled to decrypt the secure sidecar debugging application and to debug the secure software application.

    Abstract translation: 一种方法,系统和/或计算机程序产品可以安全地调试软件应用程序。 第一计算机从第二计算机接收安全软件应用程序。 访问安全软件应用程序使用的数据受到安全对象的保护,安全对象允许处理器访问安全软件应用程序使用的数据,而不允许数据从处理器退出不受保护。 第一台计算机从第二台计算机接收加密的安全侧面调试应用程序,该应用程序旨在调试安全软件应用程序。 响应于检测第一计算机内的安全软件应用的执行错误,第一计算机将安全软件应用程序和安全侧面调试应用程序发送到第二计算机,使得第二计算机能够解密安全侧面调试 应用程序和调试安全软件应用程序。

    Context-based security screening for accessing data
    37.
    发明授权
    Context-based security screening for accessing data 有权
    用于访问数据的基于上下文的安全筛选

    公开(公告)号:US09477844B2

    公开(公告)日:2016-10-25

    申请号:US14526103

    申请日:2014-10-28

    CPC classification number: G06F21/6218 G06F2221/2111

    Abstract: A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester.

    Abstract translation: 处理器实现的方法,系统和/或计算机程序产品安全地访问特定数据存储。 非上下文数据对象与上下文对象相关联,以定义第一合成基于上下文的对象。 非上下文数据对象模糊地描述了多种类型的人,并且上下文对象提供了从多种类型的人中识别特定类型的人的环境背景。 第一合成基于上下文的对象与数据结构中的至少一个特定数据存储相关联。 描述数据请求者的一串二进制数据,包括用于接收的时间窗口和请求者的安全级别,由用于生成新的合成基于上下文的对象的安全模块接收。 如果新的合成基于上下文的对象,第一个合成的基于上下文的对象和请求者的安全级别之间存在匹配,则将数据返回给请求者。

    Installing virtual machines within different communication pathways to access protected resources
    38.
    发明授权
    Installing virtual machines within different communication pathways to access protected resources 有权
    在不同的通信路径中安装虚拟机以访问受保护的资源

    公开(公告)号:US09459912B1

    公开(公告)日:2016-10-04

    申请号:US14749116

    申请日:2015-06-24

    Abstract: A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. One or more processors create and install a virtual machine within at least one of the different communication pathways, such that the virtual machine controls access to a particular requisite resource by a particular disparate component. One or more processors then issue a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways.

    Abstract translation: 计算机实现的方法,系统和/或计算机程序产品控制对计算机应用程序使用的计算机资源的访问。 一个或多个处理器将计算机应用程序分解成不同的组件。 两个或多个不同的组件被分配到不同的通信路径,其中不同的通信路径导致执行不同组件所需的必需资源。 一个或多个处理器在至少一个不同的通信路径之间创建并安装虚拟机,使得虚拟机通过特定的不同组件控制对特定必需资源的访问。 然后,一个或多个处理器发出资源检索指令以经由虚拟机和不同通信路径中的至少一个来检索特定的必需资源。

    GENERATION AND MAINTENANCE OF SYNTHETIC CONTEXT EVENTS FROM SYNTHETIC CONTEXT OBJECTS
    39.
    发明申请
    GENERATION AND MAINTENANCE OF SYNTHETIC CONTEXT EVENTS FROM SYNTHETIC CONTEXT OBJECTS 审中-公开
    合成语境对象的合成语境事件的产生与维护

    公开(公告)号:US20150302055A1

    公开(公告)日:2015-10-22

    申请号:US14789188

    申请日:2015-07-01

    CPC classification number: G06F16/24575

    Abstract: A method, computer program product and system for generating and maintaining synthetic context events. The steps include searching a data structure of synthetic context-based objects and associated data for a pattern of context exhibited at a first specified frequency within a first specified time period; combining the synthetic context-based objects and associated data exhibiting the pattern of context exhibited at the first specified frequency within the first specified time period into a synthetic context event; and optimizing and maintaining the synthetic context event by searching the data structure for additional synthetic context-based objects and associated data exhibiting a same pattern of context at a second specified time period different than the first specified time period and adding the additional synthetic context-based objects and associated data to the synthetic context event.

    Abstract translation: 一种用于生成和维护合成上下文事件的方法,计算机程序产品和系统。 所述步骤包括在第一指定时间段内以第一指定频率显示的上下文模式搜索合成基于上下文的对象的数据结构和相关数据; 将合成的基于上下文的对象和表现出在第一指定时间段内的第一指定频率处呈现的上下文模式的相关联的数据组合成合成上下文事件; 以及通过在与所述第一指定时间段不同的第二指定时间段内搜索所述数据结构以寻找附加的合成基于上下文的对象和呈现相同模式的上下文的相关联数据来优化和维护所述合成上下文事件,并且添加所述附加合成基于上下文 对象和关联数据到合成上下文事件。

    MULTIPLE APPLICATION PLATFORM OWNER KEYS IN A SECURE OBJECT COMPUTER SYSTEM

    公开(公告)号:US20150113285A1

    公开(公告)日:2015-04-23

    申请号:US14057348

    申请日:2013-10-18

    Abstract: The computer system includes a first memory to store an executable file of a first application platform owner (APO). The executable file includes an owner identification object and an encrypted secure object payload. The computer system includes a key store having one nonvolatile key slot for each of two or more APOs. Each key slot stores one or more keys of a respective APO. The computer system further includes a processor configured upon receiving the executable file to identify a first key slot in the key store corresponding with the owner identification object. The first key slot is associated with the first APO. The processor is configured to determine whether the executable file is authentic using an APO key. Furthermore the processor decrypts the encrypted secure object payload using a first key of the first APO if the executable file is determined to be authentic.

Patent Agency Ranking