SEMANTIC RESTRICTION
    1.
    发明申请
    SEMANTIC RESTRICTION 审中-公开
    语义限制

    公开(公告)号:US20170004319A1

    公开(公告)日:2017-01-05

    申请号:US15125675

    申请日:2014-03-14

    CPC classification number: G06F21/6218 G06F21/577 G06F2221/034 G06F2221/2149

    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a semantic restriction associated with a semantic term of the environment, a tracker engine to track the procedure during execution, and a control engine to maintain execution of the procedure based on the restriction and trace information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a procedure to access the set of data, receiving a semantic restriction associated with a semantic term of the environment, tracing the procedure during execution, and providing a view of the set of data based on the restriction and a semantic mapping of trace information.

    Abstract translation: 在一个实现中,数据共享系统可以包括:信任引擎,用于识别满足信任级别的环境;访问引擎,用于请求访问一组数据;接收过程的过程引擎;接收 与环境的语义项相关联的语义限制,在执行期间跟踪过程的跟踪引擎,以及基于限制和跟踪信息来维持该过程的执行的控制引擎。 在另一实现中,用于共享一组数据的方法可以包括验证满足信任级别的环境,接收访问该组数据的过程,接收与环境的语义项相关联的语义限制,在 执行,并且基于跟踪信息的限制和语义映射来提供该组数据的视图。

    HANDLING NETWORK THREATS
    2.
    发明申请

    公开(公告)号:US20180337943A1

    公开(公告)日:2018-11-22

    申请号:US15777185

    申请日:2015-11-17

    Abstract: Examples relate to handling network threats. In one example, a computing device may: receive, from a threat detector, threat data associated with a particular network device included in a plurality of network devices; identify, based on the threat data, a particular analytics operation for assisting with remediation of a threat associated with the threat data; identify, based on the threat data, additional data for performing the particular analytics operation; cause reconfiguration of at least one of the plurality of network devices, the reconfiguration causing each of the reconfigured network devices to i) collect the additional data, and ii) provide the additional data to an analytics device; and receive, from the analytics device, particular analytics results of the particular analytics operation.

    RESOURCE RESTRICTION
    3.
    发明申请
    RESOURCE RESTRICTION 审中-公开
    资源限制

    公开(公告)号:US20160381036A1

    公开(公告)日:2016-12-29

    申请号:US15116851

    申请日:2014-03-14

    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a restriction associated with a resource of the environment, a monitor engine to maintain resource utilization information, and a control engine to limit execution of the procedure based on the restriction and the resource utilization information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a restriction associated with a resource of the environment, receiving a procedure to access the set of data, ascertaining resource utilization information, and providing a view of the set of data based on the restriction and the resource utilization information.

    Abstract translation: 在一个实现中,数据共享系统可以包括:信任引擎,用于识别满足信任级别的环境;访问引擎,用于请求访问一组数据;接收过程的过程引擎;接收 与环境资源相关联的限制,维护资源利用信息的监视引擎,以及基于限制和资源利用信息来限制该过程的执行的控制引擎。 在另一实现中,共享一组数据的方法可以包括验证满足信任级别的环境,接收与环境资源相关联的限制,接收访问该组数据的过程,确定资源利用信息,以及 基于限制和资源利用信息提供该组数据的视图。

    NETWORK ANOMALY DETECTION
    4.
    发明申请

    公开(公告)号:US20170295196A1

    公开(公告)日:2017-10-12

    申请号:US15505820

    申请日:2015-04-10

    Abstract: Examples relate to detecting network anomalies. In one example, a computing device may: receive, from each of a plurality of packet capture devices of a private network, domain name system (DNS) query packets that were sent by a particular client computing device operating on the private network, each DNS query packet specifying i) a destination DNS server, ii) a query domain name, and iii) a source address that specifies the particular client computing device; provide at least one of the DNS query packets to a DNS traffic analyzer that is trained to identify DNS anomalies based on characteristics of the DNS query packets; receive anomaly output from the DNS traffic analyzer, the anomaly output indicating a DNS anomaly that was identified for the DNS query packets; and in response to receiving the anomaly output, provide a user device with data specifying the identified DNS anomaly.

Patent Agency Ranking