Trusted tunnel bridge
    1.
    发明授权

    公开(公告)号:US11882099B1

    公开(公告)日:2024-01-23

    申请号:US17162941

    申请日:2021-01-29

    申请人: SPLUNK INC.

    摘要: Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.

    Scaled authentication of endpoint devices

    公开(公告)号:US11895237B1

    公开(公告)日:2024-02-06

    申请号:US18150769

    申请日:2023-01-05

    申请人: SPLUNK INC.

    IPC分类号: H04L9/08 H04L9/32

    CPC分类号: H04L9/088 H04L9/3247

    摘要: Various embodiments of the present application set forth a computer-implemented method that includes generating, based on a resource file stored at an endpoint device, a credential data packet for authenticating with a first application executing in a first network, where the resource file includes a set of encryption keys associated with a plurality of applications including the first application, and where the credential data packet is encrypted with a device key signed by the endpoint device, and the credential data packet is signed by an endpoint device management (EDM) key extracted from the set of encryptions keys included in the resource file, sending, by the endpoint device, the credential data packet to the first application via a trusted communication channel, and receiving, by the endpoint device and in response to the credential data packet, an authorization packet from the first application via the trusted communication channel.

    Generating extended reality overlays in an industrial environment

    公开(公告)号:US11145123B1

    公开(公告)日:2021-10-12

    申请号:US15965785

    申请日:2018-04-27

    申请人: Splunk Inc.

    摘要: A mobile device that includes a camera and an extended reality software application program is employed by a user in an operating environment, such as an industrial environment. The user aims the camera within the mobile device at optical data markers, such as QR codes, that are associated with machines in the environment. The mobile device acquires an image from the camera and decodes the optical data markers included in the acquired image. The mobile device queries the data intake and query system for the values of metrics for the machines associated with the decoded optical data markers. Upon receiving the metric values from the data intake and query system, the mobile device generates AR overlays and superimposes the AR overlays onto the acquired image. The mobile device displays the image with superimposed AR overlays on a display device.

    Trusted tunnel bridge
    5.
    发明授权

    公开(公告)号:US10917389B2

    公开(公告)日:2021-02-09

    申请号:US16051326

    申请日:2018-07-31

    申请人: Splunk Inc.

    摘要: Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.

    Scaled authentication of endpoint devices

    公开(公告)号:US11582036B1

    公开(公告)日:2023-02-14

    申请号:US16657494

    申请日:2019-10-18

    申请人: SPLUNK INC.

    IPC分类号: H04L9/08 H04L9/32

    摘要: Various embodiments of the present application set forth a computer-implemented method that includes generating, based on a resource file stored at an endpoint device, a credential data packet for authenticating with a first application executing in a first network, where the resource file includes a set of encryption keys associated with a plurality of applications including the first application, and where the credential data packet is encrypted with a device key signed by the endpoint device, and the credential data packet is signed by an endpoint device management (EDM) key extracted from the set of encryptions keys included in the resource file, sending, by the endpoint device, the credential data packet to the first application via a trusted communication channel, and receiving, by the endpoint device and in response to the credential data packet, an authorization packet from the first application via the trusted communication channel.