-
公开(公告)号:US20210192094A1
公开(公告)日:2021-06-24
申请号:US17118976
申请日:2020-12-11
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Brandon Keely , Subir Jhanb , Ido Ofir
Abstract: Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
-
公开(公告)号:US10896268B2
公开(公告)日:2021-01-19
申请号:US16125548
申请日:2018-09-07
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Brandon Keely , Subir Jhanb , Ido Ofir
Abstract: Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
-
公开(公告)号:US10341390B2
公开(公告)日:2019-07-02
申请号:US16170026
申请日:2018-10-24
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Tanton Holt Gibbs , Ido Ofir , Jay Pierre Civelli , Brandon Keely , Christiaan Prins , Zheng Sun , Ning Zheng , James Brooks Miller , Jennifer Seth , Rongjing Xiang , Hugh Brendan McMahan
Abstract: Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome.
-
公开(公告)号:US12026294B2
公开(公告)日:2024-07-02
申请号:US17118976
申请日:2020-12-11
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Brandon Keely , Subir Jhanb , Ido Ofir
CPC classification number: G06F21/87 , G06F11/3051 , G06F11/3058 , G06F21/34 , G06F21/79 , H04L63/20 , G06F2221/2149
Abstract: Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
-
公开(公告)号:US11113183B2
公开(公告)日:2021-09-07
申请号:US16608363
申请日:2017-11-10
Applicant: Google LLC
Inventor: Ravi Shah , Maya Ben Ari , Keun Soo Yim
IPC: G06F9/46 , G06F11/30 , G06F11/263 , G06F11/28 , G06F11/36 , G06F9/54 , G06F11/273 , G06F9/455 , G06F11/22
Abstract: Methods and apparatus are provided for testing computing devices. A host computing device is provided for testing devices under test (DUTs) using a test suite that includes first and second tests. The DUTs can include a first group of DUTs with a first DUT and a second group of DUTs with a second DUT. The first and second groups of DUTs can share a common design. The host computing device can determine that the DUTs execute the first test before the second test. The host computing device can receive failing first test results for the first DUT. The host computing device can determine, based on the first test results and that the first and second DUT groups share a common design, to execute the second test before the first test and can subsequently instruct the second DUT to execute the second test before the first test.
-
公开(公告)号:US20190068647A1
公开(公告)日:2019-02-28
申请号:US16170026
申请日:2018-10-24
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Tanton Holt Gibbs , Ido Ofir , Jay Pierre Civelli , Brandon Keely , Christiaan Prins , Zheng Sun , Ning Zheng , James Brooks Miller , Jennifer Seth , Rongjing Xiang , Hugh Brendan McMahan
CPC classification number: H04L63/20 , H04W12/00503 , H04W12/00504 , H04W12/06 , H04W88/02
Abstract: Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome.
-
公开(公告)号:US10148692B2
公开(公告)日:2018-12-04
申请号:US14311376
申请日:2014-06-23
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Tanton Holt Gibbs , Ido Ofir , Jay Pierre Civelli , Brandon Keely , Christiaan Prins , Zheng Sun , Ning Zheng , James Brooks Miller , Jennifer Fernquist , Rongjing Xiang , Hugh Brendan McMahan
Abstract: Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome.
-
公开(公告)号:US20210109845A1
公开(公告)日:2021-04-15
申请号:US16608363
申请日:2017-11-10
Applicant: Google LLC
Inventor: Ravi Shah , Maya Ben Ari , Keun Soo Yim
Abstract: Methods and apparatus are provided for testing computing devices. A host computing device is provided for testing devices under test (DUTs) using a test suite that includes first and second tests. The DUTs can include a first group of DUTs with a first DUT and a second group of DUTs with a second DUT. The first and second groups of DUTs can share a common design. The host computing device can determine that the DUTs execute the first test before the second test. The host computing device can receive failing first test results for the first DUT. The host computing device can determine, based on the first test results and that the first and second DUT groups share a common design, to execute the second test before the first test and can subsequently instruct the second DUT to execute the second test before the first test.
-
公开(公告)号:US20190005276A1
公开(公告)日:2019-01-03
申请号:US16125548
申请日:2018-09-07
Applicant: Google LLC
Inventor: Tal Dayan , Maya Ben Ari , Brandon Keely , Subir Jhanb , Ido Ofir
Abstract: Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
-
-
-
-
-
-
-
-