TECHNOLOGIES FOR AUTHENTICATION AND SINGLE-SIGN-ON USING DEVICE SECURITY ASSERTIONS
    1.
    发明申请
    TECHNOLOGIES FOR AUTHENTICATION AND SINGLE-SIGN-ON USING DEVICE SECURITY ASSERTIONS 有权
    使用设备安全性认证的认证和单一标识技术

    公开(公告)号:US20160285858A1

    公开(公告)日:2016-09-29

    申请号:US14670955

    申请日:2015-03-27

    摘要: Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server. Other embodiments are described and claimed.

    摘要翻译: 用于远程设备认证的技术包括客户端计算设备,身份提供商和通过网络进行通信的应用服务器。 身份提供者向客户端发送认证挑战。 客户端的能力代理拦截认证挑战响应,并从客户端计算设备的安全环境检索一个或多个安全断言。 能力代理可以是向客户端的平台特征提供HTTP接口的嵌入式web服务器。 客户端将基于安全性断言的资源访问令牌发送给身份提供者。 身份提供者验证资源访问令牌,并根据用户认证因素(如用户名和密码),基于资源访问令牌对客户端计算设备进行身份验证。 身份提供者向客户端发送认证响应,该响应将认证响应转发给应用服务器。 描述和要求保护其他实施例。

    Cloud data storage location monitoring
    2.
    发明授权
    Cloud data storage location monitoring 有权
    云数据存储位置监控

    公开(公告)号:US09264499B2

    公开(公告)日:2016-02-16

    申请号:US13715387

    申请日:2012-12-14

    IPC分类号: G06F15/173 H04L29/08

    摘要: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed.

    摘要翻译: 用于监视云数据的数据存储位置的技术包括配置为与一个或多个云客户计算设备和云服务提供商进行通信的云监控服务器。 云监控服务器接收来自云客户计算设备的监控请求,并从云服务提供商检索提供商信息。 云监控服务器根据监控请求和提供者信息编辑响应数据,并将响应数据发送给云客户计算设备。 云客户计算设备可以发送按需监视请求和/或连续的基于策略的监视请求。 对于基于策略的监控,云监控服务器持续监控提供商信息,并在满足策略中指定的一个或多个条件时提供响应数据。 云监控服务器还可以根据监控请求或提供者信息提出建议并提供反馈。 描述和要求保护其他实施例。

    CLOUD DATA STORAGE LOCATION MONITORING
    3.
    发明申请
    CLOUD DATA STORAGE LOCATION MONITORING 有权
    云数据存储位置监控

    公开(公告)号:US20140173089A1

    公开(公告)日:2014-06-19

    申请号:US13715387

    申请日:2012-12-14

    IPC分类号: H04L12/26

    摘要: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed.

    摘要翻译: 用于监视云数据的数据存储位置的技术包括配置为与一个或多个云客户计算设备和云服务提供商进行通信的云监控服务器。 云监控服务器接收来自云客户计算设备的监控请求,并从云服务提供商检索提供商信息。 云监控服务器根据监控请求和提供者信息编辑响应数据,并将响应数据发送给云客户计算设备。 云客户计算设备可以发送按需监视请求和/或连续的基于策略的监视请求。 对于基于策略的监控,云监控服务器持续监控提供商信息,并在满足策略中指定的一个或多个条件时提供响应数据。 云监控服务器还可以根据监控请求或提供者信息提出建议并提供反馈。 描述和要求保护其他实施例。

    CLOUD-ASSISTED METHOD AND SERVICE FOR APPLICATION SECURITY VERIFICATION
    4.
    发明申请
    CLOUD-ASSISTED METHOD AND SERVICE FOR APPLICATION SECURITY VERIFICATION 有权
    应用安全验证的云协助方法和服务

    公开(公告)号:US20140096241A1

    公开(公告)日:2014-04-03

    申请号:US13631283

    申请日:2012-09-28

    IPC分类号: G06F21/00

    摘要: A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system's recommendation.

    摘要翻译: 公开了一种用于基于浏览器的应用安全验证的方法,设备和系统。 客户端设备从Web服务器请求基于浏览器的应用程序。 客户端设备的应用安全模块介入并向云服务系统发送应用验证请求。 云服务系统从云资源和云服务器的本地数据库检索有关应用程序和源的安全性的数据。 云服务系统然后使用数据来验证源并验证基于浏览器的应用程序的安全性。 云服务系统为客户端设备提供有关基于浏览器的应用程序安全性的建议,并更新其本地数据库。 然后,客户端设备可以在确定是下载还是执行基于浏览器的应用程序并且向云服务系统提供反馈时考虑该建议。 在接收到云服务系统的建议之后,客户端设备还可以执行本地安全分析。

    DISTRIBUTED, DETERMINISTIC COMPUTE AND NETWORKING CO-SCHEDULING SYSTEM FOR CYBER-PHYSICAL SYSTEMS BASED ON A TIME-TRIGGERED ARCHITECTURE

    公开(公告)号:US20230281060A1

    公开(公告)日:2023-09-07

    申请号:US18178876

    申请日:2023-03-06

    IPC分类号: G06F9/50 G06F9/48

    CPC分类号: G06F9/5077 G06F9/4881

    摘要: The technology described herein includes receiving a global demand to process a workflow; determining if one or more virtual resources are available to process the workflow; in response to the one or more virtual resources being available to process the workflow, determining if the one or more virtual resources have available timeslots for a class of service of the workflow; and in response to the one or more virtual resources having available timeslots for the class of service of the workflow, selecting a starting timeslot and scheduling the workflow on a selected one or more of the one or more virtual resources, accepting the workflow, and sending one or more local demands corresponding to the workflow to one or more local resource managers managing the selected one or more of the one or more virtual resources.

    CLOUD TRANSFORMABLE DEVICE
    6.
    发明申请
    CLOUD TRANSFORMABLE DEVICE 有权
    CLOUD可变形装置

    公开(公告)号:US20140181489A1

    公开(公告)日:2014-06-26

    申请号:US13723871

    申请日:2012-12-21

    IPC分类号: G06F9/44

    CPC分类号: G06F9/45558

    摘要: Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation.

    摘要翻译: 用于在计算设备上执行平台变换的技术包括将计算设备的可变形组件从第一硬件配置(其中启用第一组硬件特征)转换为启用不同硬件特征的第二硬件配置的第一硬件配置。 当处于第一配置时,计算设备具有第一能力,并且当处于第二配置时具有不同的能力。 在执行平台转换时,计算设备确定平台转换构建,与基于云的平台转换服务建立通信连接,并从基于云的平台转换服务中识别和检索相关平台定义。 平台定义用于实现所需的平台转换。

    CONTEXT-AWARE PROACTIVE THREAT MANAGEMENT SYSTEM
    8.
    发明申请
    CONTEXT-AWARE PROACTIVE THREAT MANAGEMENT SYSTEM 有权
    背景知识主动威胁管理系统

    公开(公告)号:US20150195301A1

    公开(公告)日:2015-07-09

    申请号:US14359969

    申请日:2013-11-19

    摘要: This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about external activities (e.g., provided by remote resources) for threat assessment and mitigation. A device may comprise, for example, a hostile environment detection (HED) module to coordinate threat assessment and mitigation. The HED module may accumulate internal activity data (e.g., from security services in the device), and external activity data regarding a system environment and/or a physical environment from the remote resources. The HED module may then assess threats based on the activity data and determine automated and/or manual mitigation operations to respond to the threats. In one embodiment, visualization features may also be used to, for example, visualize threats to a user, visualize automatic/manual mitigation operations, request user confirmation regarding the performance of manual mitigation operations, etc.

    摘要翻译: 本公开涉及上下文感知主动威胁管理系统。 通常,设备可以使用内部活动数据以及关于外部活动的数据(例如由远程资源提供)来进行威胁评估和缓解。 设备可以包括例如恶意环境检测(HED)模块来协调威胁评估和缓解。 HED模块可以从远程资源累积内部活动数据(例如,来自设备中的安全服务)和关于系统环境和/或物理环境的外部活动数据。 然后,HED模块可以基于活动数据来评估威胁,并且确定自动和/或手动缓解操作以应对威胁。 在一个实施例中,可视化特征也可以用于例如可视化对用户的威胁,可视化自动/手动缓解操作,请求关于手动缓解操作的执行的用户确认等。

    APPARATUS AND METHODS FOR CAPTURING AND GENERATING USER EXPERIENCES
    9.
    发明申请
    APPARATUS AND METHODS FOR CAPTURING AND GENERATING USER EXPERIENCES 有权
    用于捕获和产生用户体验的装置和方法

    公开(公告)号:US20150120617A1

    公开(公告)日:2015-04-30

    申请号:US14128564

    申请日:2013-10-25

    IPC分类号: G06N5/02 H04W4/00

    摘要: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.

    摘要翻译: 描述用于捕获和产生用户体验的设备和方法的实施例。 在实施例中,装置可以包括处理器。 该装置还可以包括与处理器耦合的数据存储模块,以存储由附接到一个或多个设备的多个传感器收集的传感器数据。 该装置还可以包括与数据存储模块耦合的体验相关模块,至少部分地基于标识用户体验的一个或多个规则将传感器数据的至少一部分与用户体验相关联,以使得能够在 至少部分地基于传感器数据的部分,针对用户的至少一部分用户体验。 可以描述和/或要求保护其他实施例。