Electronic message authentication

    公开(公告)号:US11025642B1

    公开(公告)日:2021-06-01

    申请号:US15934419

    申请日:2018-03-23

    Abstract: An electronic message delivery service receives a request to transmit an electronic message to a recipient. In response to the request, the electronic message delivery service determines first information from the electronic message usable to uniquely identify the electronic message. The electronic message delivery service obtains, based at least in part on the first information and a cryptographic key, cryptographic information that can be inserted into the electronic message. The electronic message delivery service inserts the cryptographic information and second information usable to validate at least a portion of the electronic message with the cryptographic information into the electronic message. The electronic message is transmitted to the recipient.

    Automated management of security operations centers

    公开(公告)号:US11228614B1

    公开(公告)日:2022-01-18

    申请号:US16043817

    申请日:2018-07-24

    Abstract: Disclosed are various embodiments providing automated management of security operations centers. In one embodiment, a correlation and decision engine correlates event data generated by a plurality of monitoring services with a plurality of alerts generated by a plurality of threat intelligence services. The engine then adjusts at least one rule of one or more threat intelligence services with respect to at least one event based at least in part on a corresponding frequency of at least one of the plurality of alerts meeting a threshold, where the adjusted alert(s) are associated with the event(s).

    Analyzing distributed datasets
    8.
    发明授权

    公开(公告)号:US09960975B1

    公开(公告)日:2018-05-01

    申请号:US14533905

    申请日:2014-11-05

    Abstract: Techniques for analyzing a dataset may be provided. For example, a configuration file may be accessed. The dataset may be analyzed based on a condition identified in the configuration file. A report may be generated and transmitted based on the analysis. Another report generated based on an analysis of another dataset according to another configuration file may be accessed. The dataset may be further analyzed based on this report to determine if a reported observation may also be associated with the dataset. If so, a confirmation may be generated and transmitted.

    Detecting network attacks based on network records
    9.
    发明授权
    Detecting network attacks based on network records 有权
    基于网络记录检测网络攻击

    公开(公告)号:US09426171B1

    公开(公告)日:2016-08-23

    申请号:US14500869

    申请日:2014-09-29

    Abstract: Techniques for analyzing access to a network-based resource may be provided. For example, a client record associated with the access to the network-based resource over a network may be compared to a provider record. The client record may indicate an address of the network based resource and can be received from a computing resource. The provider record can also indicate the address and can be received from a trusted computing resource. Based on the comparison, an issue associated with the access to the network-based resource over the network may be detected.

    Abstract translation: 可以提供用于分析对基于网络的资源的访问的技术。 例如,可以将通过网络对基于网络的资源的访问相关联的客户端记录与供应商记录进行比较。 客户记录可以指示基于网络的资源的地址并且可以从计算资源接收。 提供商记录还可以指示地址并且可以从可信计算资源接收。 基于比较,可以检测到通过网络对基于网络的资源的访问相关联的问题。

Patent Agency Ranking