Providing and Using an Activity Logging Service

    公开(公告)号:US20240069986A1

    公开(公告)日:2024-02-29

    申请号:US17899747

    申请日:2022-08-31

    CPC classification number: G06F9/542

    Abstract: Providing and using an activity logging service can include registering an activity logging service with a hash ledger storage service that can store a hash ledger that represents an activity log for an entity, and registering an observer device with the activity logging service. The observer device can provide event data to the activity logging service, and the event data can describe an event associated with the entity. The event data can be obtained from the observer device and a block that represents the event can be generated. A block can be added to the activity log, and a hash of a portion of the activity log can be generated and sent to the hash ledger storage service. The hash ledger storage service can be configured to append the hash of the portion of the activity log to the hash ledger that represents the activity log for the entity.

    MACHINE LEARNING-BASED ENCODING/ENCRYPTION KEY GENERATION

    公开(公告)号:US20230353547A1

    公开(公告)日:2023-11-02

    申请号:US17731558

    申请日:2022-04-28

    CPC classification number: H04L63/0478 H04L9/0816 H04L9/14

    Abstract: A processing system may obtain a first source data and encoding the first source data in accordance with a first key via an encoder associated with an encoder-decoder model to generate a first source data encoding that is a first output of the encoder and a second key that is a second output of the encoder. The processing system may then transmit the first source data encoding to a recipient system, where the second key is for generating a second source data encoding for transmission by the processing system to the recipient system. A processing system may also obtain a first encoded source data from a sending system, apply the first encoded source data and a first key as inputs to a decoder associated with an encoder-decoder model to obtain a first decoded source data and a second key as outputs, and present the first decoded source data.

    ENHANCED LEARNING AND DETERMINATION OF SECURITY RULES FOR DATA TRAFFIC

    公开(公告)号:US20230128064A1

    公开(公告)日:2023-04-27

    申请号:US17507526

    申请日:2021-10-21

    Inventor: Wei Wang

    Abstract: Security rules to apply to resources, including virtual machines (VMs), in the cloud and on network edges can be learned, determined, and tested. A security management component (SMC) can analyze information relating to data traffic associated with a group of resources associated with a tenant. The analysis can comprise an artificial intelligence analysis. Ingress/egress of the data traffic to/from resources of the group of resources initially can be controlled based on a group of security rules selected by the tenant. Based on a result of the analyzing, SMC can determine a modified group of security rules to apply to the group of resources to control ingress/egress of subsequent data traffic to/from the resources, wherein the result of the analyzing can indicate respective first relationships determined between respective resources and respective second relationships determined between the respective resources and respective network addresses associated with the cloud network.

    Security Management for Internet-Of-Things Devices

    公开(公告)号:US20220158974A1

    公开(公告)日:2022-05-19

    申请号:US17097078

    申请日:2020-11-13

    Abstract: Security management for Internet-of-things devices can include device-level security, hub-level security, and service-level security. Internet-of-things devices can communicate threats to each other and/or to an Internet-of-things hub on a gateway. The gateway can receive a communication associated with an Internet-of-things device, the communication request including a request for the Internet-of-things device to connect with another device. Based on connection data included in security communications received from the Internet-of-things device, the gateway can determine if the communication associated with the Internet-of-things device should be allowed. If the communication associated with the Internet-of-things device should not be allowed, an action can be taken to limit the communication, If the communication should be allowed, the communication can be allowed.

    PROVIDING SECURITY THROUGH CHARACTERIZING MOBILE TRAFFIC BY DOMAIN NAMES

    公开(公告)号:US20210185071A1

    公开(公告)日:2021-06-17

    申请号:US17189232

    申请日:2021-03-01

    Abstract: A method, computer-readable medium, and apparatus for classifying mobile traffic for securing a network or a mobile user endpoint device are disclosed. For example, a method may include a processor for classifying mobile network traffic using a probabilistic model for a plurality of mobile software applications based on a distribution of domain names, detecting an anomaly associated with a mobile software application of the plurality of mobile software applications, and performing a remedial action to address the anomaly.

    Security network buffer device
    57.
    发明授权

    公开(公告)号:US10652272B2

    公开(公告)日:2020-05-12

    申请号:US15602241

    申请日:2017-05-23

    Abstract: A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach.

    AUTHENTICATION USING CREDENTIALS SUBMITTED VIA A USER PREMISES DEVICE

    公开(公告)号:US20190289008A1

    公开(公告)日:2019-09-19

    申请号:US16429643

    申请日:2019-06-03

    Abstract: An authentication system can be operable to receive from a user premises device credentials associated with a user identity, wherein the user premises device can also be operable to monitor and control a premise of the user identity. The authentication system can process the credentials and transmit an authentication verification to an on-line system to enable access to the on-line system by a user equipment of the user identity. The authentication system can be used as a factor (or additional factor) of authentication, for example, to gain sooner access to an on-line system that has locked out a user identity in response to a personal denial of service (PDoS) attack.

    SECURITY NETWORK BUFFER DEVICE
    60.
    发明申请

    公开(公告)号:US20170264636A1

    公开(公告)日:2017-09-14

    申请号:US15602241

    申请日:2017-05-23

    CPC classification number: H04L63/1441 H04L63/1416

    Abstract: A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach.

Patent Agency Ranking