INPUT/OUTPUT DATA ENCRYPTION
    1.
    发明申请

    公开(公告)号:US20180365451A1

    公开(公告)日:2018-12-20

    申请号:US15420736

    申请日:2017-01-31

    Abstract: Examples relate to Input/Output (I/O) data encryption and decryption. In an example, an encryption/decryption engine on an Integrated Circuit (IC) of a computing device obtains at least one plaintext data. Some examples determine, by the encryption/decryption engine, whether the at least one plaintext data is to be sent to a memory in the computing device or to an I/O device. Some examples apply, when the at least one plaintext data is to be sent to the I/O device and by the encryption/decryption engine, an encryption primitive of a block cipher encryption algorithm to the at least one plaintext data to create output encrypted data, wherein an initialization vector that comprises a random number is applied to the encryption primitive.

    PROPAGATING BELIEF INFORMATION ABOUT MALICIOUS AND BENIGN NODES

    公开(公告)号:US20180262516A1

    公开(公告)日:2018-09-13

    申请号:US15754617

    申请日:2015-08-28

    CPC classification number: H04L63/14 H04L61/1511 H04L63/1425

    Abstract: Example embodiments disclosed herein relate to propagating belief information about malicious and benign nodes. In one example, a domain name system (DNS) resolution graph including multiple nodes is determined. In this example, a first subset of nodes is determined based on an initial benign value or an initial unknown value associated with the respective nodes. In the example, benign belief information is propagated for the first subset based on the respective initial benign values. Moreover, in the example, a second subset of the nodes is determined based on an initial malicious value or an initial unknown value. Malicious belief information is propagated for the second subset based on the respective malicious values. The propagated belief information is copied to a DNS resolution graph.

    Characterizing behavior anomaly analysis performance based on threat intelligence

    公开(公告)号:US10728264B2

    公开(公告)日:2020-07-28

    申请号:US15433136

    申请日:2017-02-15

    Abstract: A technique includes receiving data identifying behavior anomalies that are exhibited by entities that are associated with a computer system. The technique includes associating the behavior anomalies with contexts based at least in part on threat intelligence to provide modified anomalies. The threat intelligence associates the contexts with indicators of potential breach. The technique includes characterizing the behavior anomaly identification based at least in part on the threat intelligence. The characterization includes applying machine learning to features of the modified anomalies to classify the identified behavior anomalies.

Patent Agency Ranking