-
公开(公告)号:US20200322329A1
公开(公告)日:2020-10-08
申请号:US16748965
申请日:2020-01-22
Applicant: Cisco Technology, Inc.
Inventor: Alan Robert Lynn , Frank Michaud , Carlos M. Pignataro , Rajiv Asati
Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.
-
公开(公告)号:US20220244977A1
公开(公告)日:2022-08-04
申请号:US17166145
申请日:2021-02-03
Applicant: Cisco Technology, Inc.
Inventor: Alan Robert Lynn
IPC: G06F9/455
Abstract: The present disclosure is directed to systems and methods for container security using a hopping mechanism. Methods include the steps of selecting a first virtual container associated with one or more software processes; replicating the first virtual container to create a plurality of replicated virtual containers, each of the plurality of replicated virtual containers a duplicate of the first virtual container, and the plurality of replicated virtual containers configured to run synchronously; generating a randomized hopping set that defines a set of replicated virtual containers from the plurality of replicated virtual containers, the randomized hopping set establishing a sequence of the set of replicated virtual containers in which to run the one or more software processes; and running the one or more software processes across the set of replicated virtual containers based on the sequence of the randomized hopping set.
-
3.
公开(公告)号:US20230344830A1
公开(公告)日:2023-10-26
申请号:US18344527
申请日:2023-06-29
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Alan Robert Lynn , David John Zacks , Frank Michaud
CPC classification number: H04L63/0861 , H04L63/107 , H04L63/20 , H04L67/55 , H04L2463/082
Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
-
公开(公告)号:US12229575B2
公开(公告)日:2025-02-18
申请号:US17166145
申请日:2021-02-03
Applicant: Cisco Technology, Inc.
Inventor: Alan Robert Lynn
IPC: G06F9/455
Abstract: The present disclosure is directed to systems and methods for container security using a hopping mechanism. Methods include the steps of selecting a first virtual container associated with one or more software processes; replicating the first virtual container to create a plurality of replicated virtual containers, each of the plurality of replicated virtual containers a duplicate of the first virtual container, and the plurality of replicated virtual containers configured to run synchronously; generating a randomized hopping set that defines a set of replicated virtual containers from the plurality of replicated virtual containers, the randomized hopping set establishing a sequence of the set of replicated virtual containers in which to run the one or more software processes; and running the one or more software processes across the set of replicated virtual containers based on the sequence of the randomized hopping set.
-
公开(公告)号:US11444941B2
公开(公告)日:2022-09-13
申请号:US16748965
申请日:2020-01-22
Applicant: Cisco Technology, Inc.
Inventor: Alan Robert Lynn , Frank Michaud , Carlos M. Pignataro , Rajiv Asati
Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.
-
公开(公告)号:US11388011B2
公开(公告)日:2022-07-12
申请号:US16749106
申请日:2020-01-22
Applicant: Cisco Technology, Inc.
Inventor: Frank Michaud , Ram Abhinav Somaraju , Marcelo Yannuzzi Sanchez , Alan Robert Lynn
Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.
-
公开(公告)号:US20240430257A1
公开(公告)日:2024-12-26
申请号:US18826359
申请日:2024-09-06
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Alan Robert Lynn , David John Zacks , Frank Michaud
Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
-
公开(公告)号:US12107854B2
公开(公告)日:2024-10-01
申请号:US18344527
申请日:2023-06-29
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Alan Robert Lynn , David John Zacks , Frank Michaud
CPC classification number: H04L63/0861 , H04L63/107 , H04L63/20 , H04L67/55 , H04L2463/082
Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
-
公开(公告)号:US11706214B2
公开(公告)日:2023-07-18
申请号:US17225824
申请日:2021-04-08
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Alan Robert Lynn , David John Zacks , Frank Michaud
CPC classification number: H04L63/0861 , H04L63/107 , H04L63/20 , H04L67/55 , H04L2463/082
Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
-
10.
公开(公告)号:US20220329588A1
公开(公告)日:2022-10-13
申请号:US17225824
申请日:2021-04-08
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Alan Robert Lynn , David John Zacks , Frank Michaud
Abstract: The present technology pertains to increasing security of devices that leverages an integration of an authentication system with at least one corporate service. The present technology includes receiving a request from a user device to authenticate a person as a particular user by the authentication system. The present technology also includes capturing a photo of the person attempting to be authenticated as the particular user. The present technology also includes mapping nodal points to the captured photo of the person attempting to be authenticated as the particular user to a device or service. The present technology also includes comparing the nodal points from the photo against a reference model for facial recognition of the particular user. The present technology also includes determining that the nodal points do not sufficiently match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
-
-
-
-
-
-
-
-
-