End-to-end secure cloud computing
    1.
    发明授权
    End-to-end secure cloud computing 有权
    端到端安全云计算

    公开(公告)号:US09392023B2

    公开(公告)日:2016-07-12

    申请号:US14508663

    申请日:2014-10-07

    Abstract: A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.

    Abstract translation: 一种方法包括在云计算网络的控制节点处接收第一企业特有的第一企业策略和第二企业特有的第二企业策略,以及管理第一企业的至少一个用户设备和 基于第一个企业政策,代表第一个企业托管的至少一个企业应用程序。 该方法还包括基于第二企业策略管理第二企业的至少一个用户设备和代表第二企业托管的至少一个企业应用之间的通信。

    Method and system for content distribution network security
    2.
    发明授权
    Method and system for content distribution network security 有权
    内容分发网络安全的方法和系统

    公开(公告)号:US08881285B2

    公开(公告)日:2014-11-04

    申请号:US13797243

    申请日:2013-03-12

    CPC classification number: H04L63/1416 G06F21/554 H04L67/06

    Abstract: A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.

    Abstract translation: 内容传送系统包括上传模块,内容传递模块和监视模块。 上传模块被配置为从内容提供商接收内容,检测包含恶意软件或专有信息的内容,并将该内容的信息提供给监控模块。 所述内容传递模块被配置为检测包含恶意软件或未经授权的更改的内容,检测对所述内容传递模块的操作改变,向所述监控模块提供关于所述内容的信息和所述操作改变,从所述客户端系统接收对所述内容的请求, 并向客户端系统提供内容。 监视模块被配置为监视网络以获得潜在的恶意流量,从内容传递模块和上传模块接收信息,将信息和潜在恶意流量相关联以识别安全事件,并触发对安全事件的响应。

    METHOD AND SYSTEM FOR CONTENT DISTRIBUTION NETWORK SECURITY
    4.
    发明申请
    METHOD AND SYSTEM FOR CONTENT DISTRIBUTION NETWORK SECURITY 有权
    内容分发网络安全的方法和系统

    公开(公告)号:US20130205392A1

    公开(公告)日:2013-08-08

    申请号:US13797243

    申请日:2013-03-12

    CPC classification number: H04L63/1416 G06F21/554 H04L67/06

    Abstract: A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.

    Abstract translation: 内容传送系统包括上传模块,内容传递模块和监视模块。 上传模块被配置为从内容提供商接收内容,检测包含恶意软件或专有信息的内容,并将该内容的信息提供给监控模块。 所述内容传递模块被配置为检测包含恶意软件或未经授权的更改的内容,检测对所述内容传递模块的操作改变,向所述监控模块提供关于所述内容的信息和所述操作改变,从所述客户端系统接收对所述内容的请求, 并向客户端系统提供内容。 监视模块被配置为监视网络以获得潜在的恶意流量,从内容传递模块和上传模块接收信息,将信息和潜在恶意流量相关联以识别安全事件,并触发对安全事件的响应。

    End-To-End Secure Cloud Computing
    8.
    发明申请
    End-To-End Secure Cloud Computing 有权
    端到端安全云计算

    公开(公告)号:US20160099971A1

    公开(公告)日:2016-04-07

    申请号:US14508663

    申请日:2014-10-07

    Abstract: A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.

    Abstract translation: 一种方法包括在云计算网络的控制节点处接收第一企业特有的第一企业策略和第二企业特有的第二企业策略,以及管理第一企业的至少一个用户设备和 基于第一个企业政策,代表第一个企业托管的至少一个企业应用程序。 该方法还包括基于第二企业策略管理第二企业的至少一个用户设备和代表第二企业托管的至少一个企业应用之间的通信。

Patent Agency Ranking