Systems and methods of secure self-service access to content

    公开(公告)号:US09842220B1

    公开(公告)日:2017-12-12

    申请号:US14683441

    申请日:2015-04-10

    IPC分类号: G06F21/62 H04L29/06

    摘要: In one embodiment, a method is performed by a computer system. The method includes receiving a request from a user to access particular content. The method further includes determining a trust measure of the user, wherein the trust measure is based, at least in part, on an analysis of logged user-initiated communication events of the user on a plurality of communications platforms. In addition, the method includes accessing a self-service access policy applicable to the particular content. Further, the method includes ascertaining, from the self-service access policy, a trust threshold applicable to the particular content. Moreover, the method includes, responsive to a determination that the trust measure fails to satisfy the trust threshold, automatically denying access by the user to the particular content.

    Selective data collection using a management system

    公开(公告)号:US09690576B2

    公开(公告)日:2017-06-27

    申请号:US14619853

    申请日:2015-02-11

    发明人: David McAleer

    IPC分类号: G06F9/00 H04L12/24

    摘要: A management system sends a first request for first data associated with multiple network entities. If the first request times out, the first request is split to create multiple smaller requests and the multiple smaller requests sent, requesting data from a subset of the multiple network entities. Based on responses to the multiple smaller requests, the management system identifies a particular network entity that caused the first request to time out and adds the particular network entity to a set of problematic entities. The management system sends a second request that requests second data from a portion of the multiple network entities that excludes the particular network entity. The multiple network entities may include one or more of a virtual machine (VM), a host node (to host VMs), a storage device, a network link, another type of network entity, or any combination thereof.

    Detecting shared or compromised credentials through analysis of simultaneous actions
    6.
    发明授权
    Detecting shared or compromised credentials through analysis of simultaneous actions 有权
    通过分析同步操作来检测共享或受损的凭据

    公开(公告)号:US09596249B2

    公开(公告)日:2017-03-14

    申请号:US14694647

    申请日:2015-04-23

    IPC分类号: G06F7/04 G06F12/14 H04L29/06

    摘要: A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection can occur through analysis of simultaneous actions that are performed via multiple sessions associated with the same administrator. When two or more sessions associated with the same administrator are opened, the interactions performed over each of the sessions can be monitored to identify whether such interactions could be performed by a single administrator. If it is determined that the interactions over the multiple sessions could not reasonably be performed by a single administrator, various actions can be taken to address the possible breach to the security of the one or more servers.

    摘要翻译: 特权帐户管理系统可以检测用于访问一个或多个服务器的凭据是否已共享或以其他方式受到损害。 该检测可以通过分析通过与相同管理员相关联的多个会话执行的同时动作来进行。 当打开与同一个管理员关联的两个或更多个会话时,可以监视在每个会话上执行的交互,以确定这样的交互是否可以由单个管理员执行。 如果确定多个会话之间的交互无法由单个管理员合理执行,则可以采取各种措施来解决可能违反一个或多个服务器的安全性的操作。

    Systems and methods of reporting content-exposure events
    7.
    发明授权
    Systems and methods of reporting content-exposure events 有权
    报告内容曝光事件的系统和方法

    公开(公告)号:US09569626B1

    公开(公告)日:2017-02-14

    申请号:US14683513

    申请日:2015-04-10

    摘要: In one embodiment, a method is performed by a computer system. The method includes discovering content in a user environment. The method further includes generating one or more content fingerprints on a per-content basis. The method also includes providing information sufficient to identify the one or more content fingerprints to a central computer system. Further, the method includes receiving a user selection of particular content stored in the user environment. In addition, the method includes requesting, from the central computer system, information related to a level of exposure of the particular content across a plurality of platforms and a plurality of users. Moreover, the method includes receiving exposure information for the particular content in response to the request. Additionally, the method includes publishing the exposure information to a user associated with the user environment.

    摘要翻译: 在一个实施例中,一种由计算机系统执行的方法。 该方法包括在用户环境中发现内容。 该方法还包括在每个内容的基础上产生一个或多个内容指纹。 该方法还包括向中央计算机系统提供足以识别一个或多个内容指纹的信息。 此外,该方法包括接收用户选择存储在用户环境中的特定内容。 此外,该方法包括从中央计算机系统请求与跨多个平台和多个用户的特定内容的曝光程度相关的信息。 此外,该方法包括响应于该请求而接收特定内容的曝光信息。 此外,该方法包括将曝光信息发布到与用户环境相关联的用户。

    Time zero classification of messages
    9.
    发明授权
    Time zero classification of messages 有权
    消息的时间零分类

    公开(公告)号:US09516047B2

    公开(公告)日:2016-12-06

    申请号:US15133824

    申请日:2016-04-20

    IPC分类号: G06F21/56 H04L29/06

    摘要: Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious, determining whether a similar message has been noted previously in the event that the message is determined to be suspicious, classifying the message according to its individual characteristics and its similarity to the noted message in the event that a similar message has been noted previously.

    摘要翻译: 检测感染性消息包括执行消息的单独特征分析以确定消息是否是可疑的,确定在消息被确定为可疑的情况下是否先前已经记录了类似的消息,根据其个体特征对该消息进行分类,以及 在之前已经注意到类似的消息的情况下,其与所述消息的相似性。

    CONTENT-BASED ENCRYPTION KEYS
    10.
    发明申请
    CONTENT-BASED ENCRYPTION KEYS 有权
    基于内容的加密密钥

    公开(公告)号:US20160352511A1

    公开(公告)日:2016-12-01

    申请号:US14722854

    申请日:2015-05-27

    IPC分类号: H04L9/06 H04L9/32 G06F11/10

    摘要: Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.

    摘要翻译: 这里描述的技术和机制有助于使用基于内容的加密密钥来加密内容。 根据各种实施例,数据流可以包括一个或多个数据块。 客户端机器可以将哈希函数应用于数据块以确定指纹值。 可以将与远程服务器共享的加密协议应用于指纹值以确定数据块加密密钥。 数据块加密密钥可以用于加密数据块,并且可以将加密的数据块发送到远程服务器进行存储。