Method and apparatus for entitled data transfer over the public internet
    1.
    发明授权
    Method and apparatus for entitled data transfer over the public internet 有权
    用于通过公共互联网进行数据传输的方法和装置

    公开(公告)号:US08612751B1

    公开(公告)日:2013-12-17

    申请号:US12195242

    申请日:2008-08-20

    IPC分类号: G06F11/30 H04L29/06 H04L9/32

    摘要: In one embodiment, a method for securely transferring entitled data from one or more devices in a customer's network to a vendor's network via a public network is described. The data is obtained from a collection module communicatively coupled to the devices. The obtained data is transformed into a format that is recognized by a backend server present in the vendor's network. The transformed data is then assorted by associating the transformed data with corresponding one or more devices. Finally, the assorted data is then encrypted and sent to the backend server securely via the public network along with entitlement attributes corresponding to the one or more devices.

    摘要翻译: 在一个实施例中,描述了一种用于通过公共网络将授权数据从客户网络中的一个或多个设备安全地传送到供应商的网络的方法。 数据从通信地耦合到设备的收集模块获得。 所获得的数据被转换成由供应商网络中存在的后端服务器识别的格式。 然后通过将变换的数据与相应的一个或多个设备相关联来分类变换的数据。 最后,然后对各种数据进行加密,并通过公共网络安全地发送到后端服务器以及与一个或多个设备相对应的授权属性。

    DATA PRIVACY FOR SMART SERVICES
    3.
    发明申请
    DATA PRIVACY FOR SMART SERVICES 有权
    SMART服务的数据隐私

    公开(公告)号:US20130111596A1

    公开(公告)日:2013-05-02

    申请号:US13286177

    申请日:2011-10-31

    IPC分类号: G06F21/24

    摘要: Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes non-sensitive data and sensitive data. In response to the determining, the first network device generates mapping data that maps dummy information to the sensitive data. The first network device generates output data that comprises the non-sensitive data and the dummy data and sends the output data to a second network device. In other embodiments, the user may select the network parameters that are sensitive. The first network device may also receive first report data from the second network device that identifies a network problem and includes the dummy data and generate second report data by using the mapping data to replace the dummy information with the sensitive data.

    摘要翻译: 公开了隐藏来自支持服务提供商的敏感信息的技术。 在一个实施例中,第一网络设备确定网络设备信息包括非敏感数据和敏感数据。 响应于确定,第一网络设备生成将虚拟信息映射到敏感数据的映射数据。 第一网络设备生成包括非敏感数据和伪数据的输出数据,并将输出数据发送到第二网络设备。 在其他实施例中,用户可以选择敏感的网络参数。 第一网络设备还可以从第二网络设备接收识别网络问题的第一报告数据,并且包括虚拟数据,并且通过使用映射数据生成第二报告数据以用敏感数据替换虚拟信息。

    Data privacy for smart services
    5.
    发明授权
    Data privacy for smart services 有权
    智能服务的数据隐私

    公开(公告)号:US08910296B2

    公开(公告)日:2014-12-09

    申请号:US13286177

    申请日:2011-10-31

    摘要: Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes non-sensitive data and sensitive data. In response to the determining, the first network device generates mapping data that maps dummy information to the sensitive data. The first network device generates output data that comprises the non-sensitive data and the dummy data and sends the output data to a second network device. In other embodiments, the user may select the network parameters that are sensitive. The first network device may also receive first report data from the second network device that identifies a network problem and includes the dummy data and generate second report data by using the mapping data to replace the dummy information with the sensitive data.

    摘要翻译: 公开了隐藏来自支持服务提供商的敏感信息的技术。 在一个实施例中,第一网络设备确定网络设备信息包括非敏感数据和敏感数据。 响应于确定,第一网络设备生成将虚拟信息映射到敏感数据的映射数据。 第一网络设备生成包括非敏感数据和伪数据的输出数据,并将输出数据发送到第二网络设备。 在其他实施例中,用户可以选择敏感的网络参数。 第一网络设备还可以从第二网络设备接收识别网络问题的第一报告数据,并且包括虚拟数据,并且通过使用映射数据生成第二报告数据以用敏感数据替换虚拟信息。

    Routing and analyzing business-to-business service requests
    8.
    发明授权
    Routing and analyzing business-to-business service requests 有权
    路由和分析企业对企业的服务请求

    公开(公告)号:US09106516B1

    公开(公告)日:2015-08-11

    申请号:US13439718

    申请日:2012-04-04

    摘要: In one embodiment, a central service request management system for managing service requests across a plurality of ticketing systems. The central service request management system includes translation logic for receiving service request messages from the plurality of ticketing systems and translating the service request messages to a standardized format, where each service request message is associated with a respective service request. Additionally, the central service request management system includes data storage logic for maintaining a status of service requests based on the translated service request messages. The central service request management system further includes routing logic for identifying one of the plurality of ticketing systems to transmit each translated service request message to based on the maintained status of the service request associated with the service request message, and for transmitting the translated service request message to the identified ticketing system.

    摘要翻译: 在一个实施例中,一种用于跨多个票务系统管理服务请求的中央服务请求管理系统。 中央服务请求管理系统包括用于从多个票务系统接收服务请求消息并将服务请求消息转换成标准化格式的翻译逻辑,其中每个服务请求消息与相应的服务请求相关联。 此外,中央服务请求管理系统包括用于基于翻译的服务请求消息来维护服务请求的状态的数据存储逻辑。 中央服务请求管理系统还包括用于识别多个票务系统中的一个的路由逻辑,以基于与服务请求消息相关联的服务请求的维护状态来传送每个翻译的服务请求消息,并且用于发送翻译的服务请求 消息到确定的票务系统。

    Topology-aware attack mitigation
    10.
    发明授权
    Topology-aware attack mitigation 有权
    拓扑感知攻击缓解

    公开(公告)号:US08261355B2

    公开(公告)日:2012-09-04

    申请号:US12509297

    申请日:2009-07-24

    IPC分类号: H04L29/06

    CPC分类号: H04L63/145 H04L63/0218

    摘要: Techniques are disclosed for preventing malicious attacks or other exploits on a computer server. A network manager may be configured to determine a topology of a plurality of network devices and deploy an intrusion prevention system in one or more of the network devices to mitigate attacks against the vulnerable servers. The one or more network devices may be identified based on the topology and one or more constraints for optimizing the deployment of the intrusion prevention systems.

    摘要翻译: 公开了用于防止计算机服务器上的恶意攻击或其他攻击的技术。 网络管理器可以被配置为确定多个网络设备的拓扑并且在一个或多个网络设备中部署入侵防御系统以减轻针对易受攻击的服务器的攻击。 可以基于拓扑和用于优化入侵防御系统的部署的一个或多个约束来识别一个或多个网络设备。