-
公开(公告)号:US11343071B2
公开(公告)日:2022-05-24
申请号:US16074890
申请日:2016-02-05
Applicant: ENTIT SOFTWARE LLC
Inventor: Richard Minner
Abstract: Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a format preserving encryptor to obtain a plaintext, obtain a key from a plurality of keys stored in a key database, and encrypt the plaintext using the key to produce a ciphertext having a length of the plaintext. The encrypting device may also include a key reference embedder to obtain a key reference associated with the key, and generate an extended ciphertext by adding to the ciphertext a set of characters associated with the key reference, such that the key reference can be determined based on the extended ciphertext.
-
公开(公告)号:US11271963B2
公开(公告)日:2022-03-08
申请号:US16227750
申请日:2018-12-20
Applicant: ENTIT SOFTWARE LLC
Inventor: Pratyusa K. Manadhata , Martin Arlitt
IPC: G06F11/00 , H04L29/06 , H04L61/4511 , G06F12/14
Abstract: In some examples, a Domain Name System (DNS) server receives, over a network, DNS queries containing domain names, extracts a common domain name shared by the domain names, determines whether a measure of an amount of data relating to the DNS queries containing the common domain name exceeds a threshold, and in response to determining that the measure of the amount of data relating to the DNS queries containing the common domain name exceeds the threshold, trigger a countermeasure action to address a threat associated with the DNS queries.
-
公开(公告)号:US11263104B2
公开(公告)日:2022-03-01
申请号:US16426850
申请日:2019-05-30
Applicant: ENTIT SOFTWARE LLC
Inventor: Manish Marwah , Andrey Simanovsky
Abstract: In some examples, a system is to, given an anomaly score threshold over which at least one anomalous point is to be observed in a test set of points with a specified probability, determine, using raw anomaly scores for a training set of points, a first mapping between raw anomaly scores in a first range and first transformed anomaly scores using a first transformation technique. The system is to determine, using the raw anomaly scores for the training set of points, a second mapping between raw anomaly scores in a second range greater than the first range and second transformed anomaly scores using a second transformation technique different from the first transformation technique. The system is to use the first mapping and the second mapping to detect an anomaly in a computing environment based on the test set of points.
-
公开(公告)号:US11138338B2
公开(公告)日:2021-10-05
申请号:US15926296
申请日:2018-03-20
Applicant: EntIT Software LLC
Inventor: Timothy Roake , Luther Martin
Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.
-
85.
公开(公告)号:US11126481B2
公开(公告)日:2021-09-21
申请号:US14563552
申请日:2014-12-08
Applicant: ENTIT SOFTWARE LLC
Inventor: Stephane Herman Maes , Lars Rossen , Woong Joseph Kim , Keith Kuchler , Jan Vana , Ankit Ashok Desai , Christopher William Johnson , Michael Yang , Roy Ritthaler
Abstract: Catalogs that describe respective offerings for fulfillment by respective applications, are aggregated to form an aggregate catalog. A request relating to at least one of the offerings is received based on content presented from the aggregate catalog. In response to the request, an orchestrated execution of an end-to-end process is performed to fulfill the request relating to the at least one offering, the executing of the end-to-end process comprising calling at least one of the applications.
-
公开(公告)号:US11121867B2
公开(公告)日:2021-09-14
申请号:US15999250
申请日:2016-02-19
Applicant: ENTIT SOFTWARE LLC
Inventor: Richard Minner
Abstract: Examples discussed herein disclose, among other things, a method. The method includes, among other things, obtaining a plaintext, obtaining a key from a plurality of keys, and determining whether the plaintext is longer than a predefined threshold length. If the plaintext is longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a first ciphertext having a length of the plaintext, where the character at a predefined position within the first ciphertext belongs to a first subset of characters. And if the plaintext is not longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a second ciphertext, which is longer than the plaintext, where the character at the same predefined position in the second ciphertext belongs to a second subset of characters.
-
公开(公告)号:US11120217B2
公开(公告)日:2021-09-14
申请号:US16223291
申请日:2018-12-18
Applicant: ENTIT SOFTWARE LLC
Inventor: Stephane Herman Maes , Karan Singh Chhina , Guillaume Dubuc
IPC: G06F40/211 , G06F9/50 , H04L29/08
Abstract: A technique includes receiving, by a computer, data representing a task to be automated in association with a computing environment. The technique includes applying, by the computer, natural language processing to the data to generate a sequence of statements describing operations to be executed to perform the task. The sequence of statements is associated with a predetermined orchestration workflow language.
-
公开(公告)号:US11106672B2
公开(公告)日:2021-08-31
申请号:US15762586
申请日:2015-09-25
Applicant: ENTIT Software LLC
Inventor: Rui Liu , Qiming Chen , Jeff Lefevre , Malu G. Castellanos , Meichun Hsu
IPC: G06F16/24 , G06F16/2453 , G06F16/27 , G06F16/22 , G06F16/2458 , G06F16/25
Abstract: A system includes a database client, and a distributed database comprising database nodes. The distributed database may receive a database query from the client, determine that the query comprises a range of hash values of a table partition stored by a node of the distributed database, and determine that the range of hash values is not stored by other nodes of the distributed database. Responsive to determining that the range of hash values of the query is stored by the node and not by the other nodes, the database may generate an optimized distributed execution plan that includes the node that stores the range of hash values and excludes the nodes that do not include the range of hash values.
-
公开(公告)号:US11055439B2
公开(公告)日:2021-07-06
申请号:US16070008
申请日:2016-01-25
Applicant: ENTIT SOFTWARE LLC
Inventor: Daniel Shmaya , Eliraz Busi , Itay Ben-Yehuda
Abstract: An example technique involves sending, from a user device associated with a particular user, a request for a confirmation message setting. The request may include an indication of an identity of the particular user. The example technique involves determining that an operation included in a predetermined set of operations has been cued. The example technique involves receiving a response comprising an indication of a confirmation message setting for the cued operation prior to performing the cued operation. The confirmation message setting may be based on data generated responsive to the sent request. The confirmation message setting for the cued operation may include an indication of whether or not to output a confirmation message. The example technique involves determining, based on the received response, whether to prompt the particular user via a user interface of the user device for a response to a confirmation message prior to performing the cued operation.
-
公开(公告)号:US11044266B2
公开(公告)日:2021-06-22
申请号:US16078777
申请日:2016-02-26
Applicant: ENTIT SOFTWARE LLC
Inventor: Sasi Siddharth Muthurajan , Ming Sum Sam Ng , Jeremy C. Brooks
Abstract: In some examples, a system includes a scan execution engine and a scan adaptation engine. The scan execution engine may execute a scan of a web application hosted on a web host. During scan execution, the scan adaptation engine may adapt a subsequent scan portion for later execution based on a scan metric received from a monitoring agent that monitors the web application, the web host, or both.
-
-
-
-
-
-
-
-
-