METHODS, SYSTEMS AND APPARATUS TO DETECT POLYMORPHIC MALWARE

    公开(公告)号:US20190042746A1

    公开(公告)日:2019-02-07

    申请号:US16021411

    申请日:2018-06-28

    Abstract: The disclosed embodiments generally relate to detecting malware through detection of micro-architectural changes (morphing events) when executing a code at a hardware level (e.g., CPU). An exemplary embodiment relates to a computer system having: a memory circuitry comprising an executable code; a central processing unit (CPU) in communication with the memory circuitry and configured to execute the code; a performance monitoring unit (PMU) associated with the CPU, the PMU configured to detect and count one or more morphing events associated with execution of the code and to determine if the counted number of morphine events exceed a threshold value; and a co-processor configured to initiate a memory scan of the memory circuitry to identify a malware in the code.

    Measurements exchange network, such as for internet-of-things (IoT) devices

    公开(公告)号:US09848035B2

    公开(公告)日:2017-12-19

    申请号:US14998104

    申请日:2015-12-24

    CPC classification number: H04L67/06 H04L67/12 H04W4/38

    Abstract: Measurement exchange networks and protocols to exchange measurements of a parameter amongst devices (e.g., IoT devices), select the best measurement(s), accuracy/precision-wise, and determine a process variable for a control system based on the selected best measurement(s). A device may select a peer-provided best measurement to output as the process variable in place of a local measurement, and/or compute the process variable from multiple best measurements (e.g., local and/or peer-provided measurements). Metadata may be used to select a measurement(s) and/or to increase reliability/trust of exchanged data. In this way, each device of an exchange group/network may obtain the highest measurement accuracy of all available collocated sensors with little or no additional processing or cloud connectivity. A best measurement(s) may be selected based on measurement quality specifications extracted from metadata, measurement qualities computed from measurements of respective sensors, locations/proximities of the sensors, a policy(ies), and/or device IDs (e.g., extracted from metadata).

    TECHNOLOGIES FOR COLLECTIVE AUTHORIZATION WITH HIERARCHICAL GROUP KEYS

    公开(公告)号:US20170346640A1

    公开(公告)日:2017-11-30

    申请号:US15271566

    申请日:2016-09-21

    CPC classification number: H04L9/14 H04L9/0822 H04L9/0825 H04L9/0836 H04L9/3247

    Abstract: Technologies for secure collective authorization include multiple computing devices in communication over a network. A computing device may perform a join protocol with a group leader to receive a group private key that is associated with an interface implemented by the computing device. The interface may be an instance of an object model implemented by the computing device or membership of the computing device in a subsystem. The computing device receives a request for attestation to the interface, selects the group private key for the interface, and sends an attestation in response to the request. Another computing device may receive the attestation and verify the attestation with a group public key corresponding to the group private key. The group private key may be an enhanced privacy identifier (EPID) private key, and the group public key may be an EPID public key. Other embodiments are described and claimed.

    System, Apparatus And Method For First Hop Security

    公开(公告)号:US20170289138A1

    公开(公告)日:2017-10-05

    申请号:US15088308

    申请日:2016-04-01

    CPC classification number: H04L63/0823 H04L63/065

    Abstract: In one embodiment, a system includes a hardware processor having at least one core to execute instructions; and a logic to generate a group public key for a subnet having a plurality of computing devices and generate a plurality of group private credentials for the plurality of computing devices, provide the group public key to the plurality of computing devices and provide each of the group private credentials to one of the plurality of computing devices, to enable communication between the plurality of computing devices of the subnet without validation messaging with the system. Other embodiments are described and claimed.

    Network-enabled device provisioning
    66.
    发明授权
    Network-enabled device provisioning 有权
    启用网络的设备配置

    公开(公告)号:US09571464B2

    公开(公告)日:2017-02-14

    申请号:US14456509

    申请日:2014-08-11

    Abstract: Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a storage device; listening logic to wirelessly receive a plurality of key fragments from a corresponding plurality of peer devices, to cause storage of the plurality of key fragments in the storage device, and to receive an encrypted provisioning message from a management device; key generation logic to generate a decryption key based on the plurality of key fragments stored in the storage device to decrypt the encrypted provisioning message, and to decrypt the encrypted provisioning message using the decryption key; and control logic to provision the network-enabled device in accordance with instructions included in the decrypted provisioning message. Other embodiments may be disclosed and/or claimed.

    Abstract translation: 本文公开了用于启用网络的设备供应的系统,设备和技术。 在一些实施例中,启用网络的设备可以包括:存储设备; 侦听逻辑,以从相应的多个对等设备无线地接收多个密钥片段,以使所述多个密钥片段存储在所述存储设备中,以及从管理设备接收加密的供应消息; 密钥生成逻辑,用于基于存储在所述存储装置中的所述多个密钥片段来生成解密密钥,以解密所述加密的配置消息,以及使用所述解密密钥解密所述加密的配置消息; 以及控制逻辑,以根据包括在解密的供应消息中的指令来设置启用网络的设备。 可以公开和/或要求保护其他实施例。

    Methods, systems and apparatus to secure devices via physical and/or virtual locking
    67.
    发明授权
    Methods, systems and apparatus to secure devices via physical and/or virtual locking 有权
    通过物理和/或虚拟锁定来保护设备的方法,系统和装置

    公开(公告)号:US09449200B2

    公开(公告)日:2016-09-20

    申请号:US14229422

    申请日:2014-03-28

    CPC classification number: G06F21/88 G06F21/86

    Abstract: Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.

    Abstract translation: 公开了方法,系统,装置和制品以保护装置。 一个示例公开的设备包括:平台检测器,用于确定设备何时位于与平台邻近的阈值内;设备锁定管理器,用于在阈值邻近范围内启动设备的锁定服务,以及设备篡改管理器启动篡改补救 响应于检测到篡改的指示。

    METHOD AND APPARATUS FOR CLOUD-ASSISTED CRYPTOGRAPHY
    68.
    发明申请
    METHOD AND APPARATUS FOR CLOUD-ASSISTED CRYPTOGRAPHY 有权
    方法和装置用于云组织结构

    公开(公告)号:US20150281189A1

    公开(公告)日:2015-10-01

    申请号:US14227319

    申请日:2014-03-27

    Abstract: In an embodiment, a system includes a processor that includes private key decryption logic to decrypt an encrypted private key received from a consuming device to produce a private key, and symmetric key decryption logic to receive the private key from the private key decryption logic and to decrypt an encrypted symmetric key received from the consuming device using the private key. The system also includes a dynamic random access memory (DRAM) coupled to the processor. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,系统包括处理器,其包括私钥解密逻辑,用于解密从消费设备接收的加密专用密钥以产生私钥,以及对称密钥解密逻辑,用于从私钥解密逻辑接收专用密钥, 使用私钥对从消费设备接收的加密对称密钥进行解密。 该系统还包括耦合到处理器的动态随机存取存储器(DRAM)。 描述和要求保护其他实施例。

    System and method for performing secure communications
    69.
    发明授权
    System and method for performing secure communications 有权
    用于执行安全通信的系统和方法

    公开(公告)号:US08832783B2

    公开(公告)日:2014-09-09

    申请号:US13631080

    申请日:2012-09-28

    Abstract: A system establishes secure communications between first and second electronic devices. The first device stores secured content to be accessed by second device based on identification information of the first device. The identification information of the first device may be manually input into the second device, and the second device may perform an initial pairing operation with the first device based on this manually entered information. The identification information stored from initial pairing may allow secure automatic pairing.

    Abstract translation: 系统建立第一和第二电子设备之间的安全通信。 第一设备基于第一设备的识别信息存储要被第二设备访问的安全内容。 可以将第一设备的识别信息手动输入到第二设备中,并且第二设备可以基于该手动输入的信息与第一设备进行初始配对操作。 从初始配对中存储的识别信息可以允许安全的自动配对。

    Machine learning fraud resiliency using perceptual descriptors

    公开(公告)号:US12229254B2

    公开(公告)日:2025-02-18

    申请号:US17560943

    申请日:2021-12-23

    Abstract: Machine learning fraud resiliency using perceptual descriptors is described. An example of a computer-readable storage medium includes instructions for accessing multiple examples in a training dataset for a classifier system; calculating one or more perceptual hashes for each of the examples; generating clusters of perceptual hashes for the multiple examples based on the calculation of the one or more perceptual hashes for each of the plurality of examples; obtaining an inference sample for classification by the classifier system; generating a first classification result for the inference sample utilizing a neural network classifier and generating a second classification result utilizing the generated clusters of perceptual hashes; comparing the first classification result with the second classification result; and, upon a determination that the first classification result does not match the second classification result, determining a suspicion of an adversarial attack.

Patent Agency Ranking