ESTABLISHING SECURE COMPUTING DEVICES FOR VIRTUALIZATION AND ADMINISTRATION
    1.
    发明申请
    ESTABLISHING SECURE COMPUTING DEVICES FOR VIRTUALIZATION AND ADMINISTRATION 审中-公开
    建立安全的计算机设备进行虚拟化和管理

    公开(公告)号:US20160087963A1

    公开(公告)日:2016-03-24

    申请号:US14955819

    申请日:2015-12-01

    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.

    Abstract translation: 实施例涉及在计算系统之间建立安全连接并且在安全计算设备上提供计算机系统虚拟化。 在一种情况下,计算机系统接收到启动至少一个指定功能的请求。 该请求包括用户凭证和识别计算设备的设备声明。 计算机系统使用接收到的用户凭证对用户进行认证,并且基于设备权利要求确定计算设备是已经被批准以发起指定功能的执行的被许可的计算设备。 然后,当确定用户已经被认证并且计算设备被批准发起指定功能的性能时,计算机系统启动指定功能的执行。

    Physical gesture based data manipulation within a virtual scene for investigating a security incident

    公开(公告)号:US11327558B2

    公开(公告)日:2022-05-10

    申请号:US16839062

    申请日:2020-04-02

    Abstract: Disclosed herein is a system for facilitating fast and intuitive investigations of security incidents by responding to physical gestures performed by security analysts within a virtual scene. A query triggers an alert for detecting security incidents that occur with respect to computing resources. Following the alert, the security analyst dons a Near-Eye-Display (NED) device and is presented with a virtual scene having control elements representing various data sets and/or data analysis operations relevant to a security incident. The security analyst investigates the security incident by performing hand motions to “grab-and-drag” control elements representing data sets. The security analyst may also perform hand motions to “tap on” control elements that represents a data analysis operation. Responsive to the hand motions, the system performs data analysis operations and displays a result within the virtual scene. Then, the security analyst performs another hand motion to remediate any threat caused by the security incident.

    Establishing secure computing devices for virtualization and administration
    8.
    发明授权
    Establishing secure computing devices for virtualization and administration 有权
    建立虚拟化和管理的安全计算设备

    公开(公告)号:US09413740B2

    公开(公告)日:2016-08-09

    申请号:US14337936

    申请日:2014-07-22

    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.

    Abstract translation: 实施例涉及在计算系统之间建立安全连接并且在安全计算设备上提供计算机系统虚拟化。 在一种情况下,计算机系统接收到启动至少一个指定功能的请求。 该请求包括用户凭证和识别计算设备的设备声明。 计算机系统使用接收到的用户凭证对用户进行认证,并且基于设备权利要求确定计算设备是已经被批准以发起指定功能的执行的被许可的计算设备。 然后,当确定用户已经被认证并且计算设备被批准发起指定功能的性能时,计算机系统启动指定功能的执行。

Patent Agency Ranking