Detection of data exfiltration
    4.
    发明授权

    公开(公告)号:US10462116B1

    公开(公告)日:2019-10-29

    申请号:US14855298

    申请日:2015-09-15

    IPC分类号: H04L29/06

    摘要: The present document describes systems and methods that detect unauthorized transmission of data from internal networks to remote service providers, even when the transmission occurs over an encrypted connection. An exfiltration monitor is configured to monitor encrypted communications between clients within an internal network and a remote service provider. In various implementations, the exfiltration monitor associates the encrypted connections with account information, and applies exfiltration policies to the connections based at least in part on the associated account information. In additional implementations, the exfiltration monitor is provided with cryptographic keys that facilitate packet inspection of the encrypted connections. In many situations, the exfiltration monitor can use this information to discern between authorized use of a remote service, and unauthorized data exfiltration to the remote service.

    Chained authentication using image transforms

    公开(公告)号:US10409977B2

    公开(公告)日:2019-09-10

    申请号:US15730560

    申请日:2017-10-11

    摘要: A service receives a request from a user of a group of users to perform one or more operations requiring group authentication in order for the operations to be performed. In response, the service provides a first user of the group with an image seed and an ordering of the group of users. Each user of the group applies a transformation algorithm to the seed to create an authentication claim. The service receives this claim and determines, based at least in part on the ordering of the group of users, an ordered set of transformations, which are used to create a reference image file. If the received claim matches the reference image file, the service enables performance of the requested one or more operations.

    Security risk response impact analysis

    公开(公告)号:US10185924B1

    公开(公告)日:2019-01-22

    申请号:US14321163

    申请日:2014-07-01

    IPC分类号: H04L29/06 G06Q10/06 G06F21/57

    摘要: Techniques are described for generating response recommendation information that describes one or more response profiles, each including one or more actions that may be performed to respond to a security risk present in a deployed software module. The response recommendation information may quantify, for each response profile, a cost and a benefit due to the performance of the action(s) included in the response profile. The cost may include lost revenues or other value lost due to the action(s). The benefit may include a mitigation of the security risk.