Cloud based systems and methods for determining security risks of users and groups

    公开(公告)号:US10142362B2

    公开(公告)日:2018-11-27

    申请号:US15171013

    申请日:2016-06-02

    IPC分类号: H04L29/06 G06F17/30

    摘要: Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying. The cloud-based security system is multi-tenant system supporting a plurality of users, companies, and/or enterprises and the empirical scoring provides a deterministic comparison between the plurality of users, companies, and/or enterprises in the multi-tenant system.

    CLOUD BASED SYSTEMS AND METHODS FOR DETERMINING SECURITY RISKS OF USERS AND GROUPS

    公开(公告)号:US20170353483A1

    公开(公告)日:2017-12-07

    申请号:US15171013

    申请日:2016-06-02

    IPC分类号: H04L29/06 G06F17/30

    摘要: Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying. The cloud-based security system is multi-tenant system supporting a plurality of users, companies, and/or enterprises and the empirical scoring provides a deterministic comparison between the plurality of users, companies, and/or enterprises in the multi-tenant system.

    DYNAMIC USER IDENTIFICATION AND POLICY ENFORCEMENT IN CLOUD-BASED SECURE WEB GATEWAYS
    3.
    发明申请
    DYNAMIC USER IDENTIFICATION AND POLICY ENFORCEMENT IN CLOUD-BASED SECURE WEB GATEWAYS 有权
    基于云安全网关的动态用户识别和政策执行

    公开(公告)号:US20150326613A1

    公开(公告)日:2015-11-12

    申请号:US14712154

    申请日:2015-05-14

    IPC分类号: H04L29/06 H04L29/12 H04L29/08

    摘要: A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained.

    摘要翻译: 基于云的安全Web网关,基于云的安全Web方法和网络向组织提供作为基于云的服务的安全Web网关(SWG),并在其中提供动态用户标识和策略实施。 作为基于云的服务,SWG系统和方法提供了可扩展性和容纳多个组织的能力,其间具有适当的隔离。 基于云的SWG有两个基本要求:(i)具有将流量从组织或其用户转发到SWG节点的方法,以及(ii)能够对组织和用户进行身份验证以进行策略执行和访问日志记录 。 无论源(设备,位置,加密,应用程序类型等),SWG系统和方法都会将流量动态地关联到用户,一旦流量被标记给用户/组织,就可以执行各种策略并审核用户访问日志 可以维护。

    SYSTEM AND METHOD FOR MANAGING HEDGING OF LONGEVITY RISK
    4.
    发明申请
    SYSTEM AND METHOD FOR MANAGING HEDGING OF LONGEVITY RISK 审中-公开
    管理长期风险抵押的制度与方法

    公开(公告)号:US20140052665A1

    公开(公告)日:2014-02-20

    申请号:US13762914

    申请日:2013-02-08

    IPC分类号: G06Q40/06

    CPC分类号: G06Q40/06 G06Q40/08

    摘要: A computer implemented method and system are provided for implementing a longevity bond management system for managing hedging of longevity of beneficiaries. The method may include issuing, through a special purpose vehicle, using computer processing components, a longevity bond having returns following a longevity index defined for a reference population of a pre-selected cohort of beneficiaries. The method may additionally include receiving from investors a payment amount for investment in the longevity bond, investing the payment amount in a collateral pool held by a custodian, and receiving cash flows from the investment in the collateral pool. The method may further include entering into a swap to exchange the cash flows from the investment for an amount equal to the difference between an actual and best-estimate longevity index amount and calculating, using computer processing components, based on the longevity index, a periodic payment to the investors based on the longevity performance of the pre-selected cohort of beneficiaries, such that the periodic payment increases when longevity exceeds expectations and decreases when longevity falls short of expectations.

    摘要翻译: 提供计算机实施的方法和系统,用于实施长寿债券管理系统,用于管理受益人寿命的对冲。 该方法可以包括通过特殊目的的车辆使用计算机处理部件发行长寿债券,其具有为预先选定的受益群体的参考人群定义的长寿指数之后的回报。 该方法可以另外包括从投资者那里收到投资长寿债券的支付金额,将支付金额投资在保管人持有的抵押池中,并从抵押池的投资中获得现金流量。 该方法可以进一步包括进行掉期交换来自投资的现金流量等于实际和最佳估计寿命指数量之间的差额,并且使用计算机处理组件基于长寿指数计算周期性 根据预先选定的受益群体的寿命表现,向投资者支付款项,使寿命超过预期的定期支付增加,寿命不足预期时减少。

    Bone Compression and Fixation Devices
    5.
    发明申请
    Bone Compression and Fixation Devices 有权
    骨压缩和固定装置

    公开(公告)号:US20130238036A1

    公开(公告)日:2013-09-12

    申请号:US13989090

    申请日:2011-11-29

    申请人: Amit Sinha

    发明人: Amit Sinha

    IPC分类号: A61B17/68 A61B17/88

    摘要: A bone screw, for drawing first and second bone fragments together, includes a shaft having a distal section and a proximal section. The distal section has a first external male screw thread and a minor diameter. The proximal section has a second external male screw thread. A major diameter of the distal section is larger than a major diameter of the proximal section. The bone screw includes a sleeve that has an internal female screw thread configured to mate with the second male screw thread. A distal portion of the sleeve has an outer diameter. The outer diameter is equal to or smaller than the minor diameter of the distal section of the shaft.

    摘要翻译: 用于将第一和第二骨碎片牵引在一起的骨螺钉包括具有远端部分和近端部分的轴。 远侧部分具有第一外部外螺纹和小直径。 近端部分具有第二外部公螺纹。 远端部分的大直径大于近端部分的主直径。 骨螺钉包括具有构造成与第二外螺纹螺纹配合的内内螺纹的套筒。 套筒的远端部分具有外径。 外径等于或小于轴的远端部分的小直径。

    Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
    6.
    发明授权
    Methods and systems for wired equivalent privacy and Wi-Fi protected access protection 有权
    有线等效隐私和Wi-Fi保护访问保护的方法和系统

    公开(公告)号:US08281392B2

    公开(公告)日:2012-10-02

    申请号:US11464043

    申请日:2006-08-11

    IPC分类号: H04L29/06

    摘要: Methods and systems for disrupting potential attacks on a wireless network through transmission of random data are disclosed. Specifically, this disclosure relates to systems and methods for disrupting the breaking of the secret key or passphrase by an adversary or rogue device for Wi-Fi networks using wired equivalent privacy (WEP) and Wi-Fi protected access (WPA).

    摘要翻译: 公开了通过传输随机数据来破坏对无线网络的潜在攻击的方法和系统。 具体地,本公开涉及用于使用有线等效隐私(WEP)和Wi-Fi保护访问(WPA)的Wi-Fi网络的对手或流氓设备破坏秘密密钥或密码短消息的系统和方法。

    METHOD AND SYSTEM FOR STORING BINARY LARGE OBJECTS (BLObs) IN A DISTRIBUTED KEY-VALUE STORAGE SYSTEM
    7.
    发明申请
    METHOD AND SYSTEM FOR STORING BINARY LARGE OBJECTS (BLObs) IN A DISTRIBUTED KEY-VALUE STORAGE SYSTEM 有权
    在分布式重要价值存储系统中存储二进制大物体(BLObs)的方法和系统

    公开(公告)号:US20120054197A1

    公开(公告)日:2012-03-01

    申请号:US12978464

    申请日:2010-12-24

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30486

    摘要: A technique for storing binary large objects (BLObs) in a distributed key-value storage system is disclosed. In an embodiment, the storage of BLObs involves dividing the BLObs into smaller “BLOb chunks” and storing the BLOb chunks in storage nodes of the distributed key-value storage system. A BLOb is first associated with a key, referred to as a “BLOb key,” and each subsequent BLOb chunk is associated with a different unique key, referred to as a “BLOb chunk key.” A list of the BLOb chunks keys is maintained and all of the BLOb chunks of the BLOb can be retrieved from the distributed key-value storage system using the BLOb chunks key list.

    摘要翻译: 公开了一种用于在分布式键值存储系统中存储二进制大对象(BLOB)的技术。 在一个实施例中,BLOb的存储包括将BLOB分成更小的“BLOb块”,并将BLOb块存储在分布式键值存储系统的存储节点中。 BLOb首先与被称为“BLOb密钥”的密钥相关联,并且每个后续的BLOb块与不同的唯一密钥相关联,称为“BLOb块密钥”。维护BLOb块密钥的列表 并且可以使用BLOb块密钥列表从分布式密钥值存储系统检索BLOb的所有BLOb块。

    METADATA-BASED DATA ACCESS AND CONTROL
    8.
    发明申请
    METADATA-BASED DATA ACCESS AND CONTROL 审中-公开
    基于元数据的数据访问和控制

    公开(公告)号:US20110314071A1

    公开(公告)日:2011-12-22

    申请号:US12978459

    申请日:2010-12-24

    IPC分类号: G06F17/30

    CPC分类号: G06F16/13

    摘要: Data access is controlled using metadata in the data being stored. As consistent with various example embodiments, data is stored on behalf of one or more of a multitude of disparate users and/or applications using the data, based upon metadata in the data itself and storage rules for the metadata. In one implementation, a rules-based storage and access system retrieves storage rules based upon metadata in received data, and executes the storage rules to select a file system in which to store the received data, from a plurality of file systems having different data retrieval characteristics such as speed, security and quality.

    摘要翻译: 使用正在存储的数据中的元数据来控制数据访问。 与各种示例实施例一致,基于数据本身中的元数据和元数据的存储规则,使用数据代表多个不同用户和/或应用中的一个或多个数据来存储数据。 在一个实现中,基于规则的存储和访问系统基于接收到的数据中的元数据检索存储规则,并且执行存储规则以从具有不同数据检索的多个文件系统中选择存储接收到的数据的文件系统 特点如速度,安全性和质量。

    Distribution of flows in a flow-based multi-processor system
    9.
    发明授权
    Distribution of flows in a flow-based multi-processor system 有权
    基于流的多处理器系统中流的分布

    公开(公告)号:US07369557B1

    公开(公告)日:2008-05-06

    申请号:US10861012

    申请日:2004-06-03

    申请人: Amit Sinha

    发明人: Amit Sinha

    IPC分类号: H04L12/56

    摘要: A flow distribution technique associates probabilistic data structure with each processor of a multi-processor system that is used to determine whether a received packet is included in a flow assigned to the associated processor. A set of tuples of a received packet is processed by multiple hash functions to generate a set of values utilized as indices to search for hits of the probabilistic data structures. Only those flows having hashed indices that hit more than one probabilistic data structure are saved in a collision flow table. The probabilistic data structure require much less memory space than a flow table and can be designed so that the frequency of collisions is very low thereby requiring a small amount of memory for the collision flow table.

    摘要翻译: 流分配技术将概率数据结构与多处理器系统的每个处理器相关联,多处理器系统用于确定接收到的分组是否包含在分配给相关处理器的流中。 接收到的分组的一组元组被多个哈希函数处理,以生成用作搜索命中概率数据结构的索引的一组值。 只有具有多于一个概率数据结构的散列索引的那些流被保存在冲突流表中。 概率数据结构要求比流表少得多的存储器空间,并且可以设计成使得冲突频率非常低,从而为冲突流表需要少量的存储器。

    Cloud based mobile device management systems and methods

    公开(公告)号:US09473537B2

    公开(公告)日:2016-10-18

    申请号:US14711961

    申请日:2015-05-14

    摘要: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.