Abstract:
This invention provides methods and apparatus for enabling access to restricted information contained at a semi-trusted web-server (100) also called a proxy server. The client (101), semi-trusted web-server (104), and origin web-server (103) are connected to a core network (102). Restricted information is information that is only available to a selected group of authorized clients (101). A client (101) desiring access to the restricted information authenticates itself with a trusted web-server (i.e. origin web-server) (103), and obtains a client credential. The client then contacts the semi-trusted web-server (100) with the credential and obtains access to the restricted content. The restricted information may be encrypted at the semi-trusted web-server (100), so that the restricted information is secure even if the semi-trusted web-server (100) is not completely secure. To shorten the length of time that the client (101) must wait for a response to requests and to lighten the load on the origin web-server (103), the semi-trusted web-server (100) may service the requests of the client (101). Generally, a semi-trusted web-server (100) is chosen to service the requests of a client (101) if the semi-trusted web-server (100) is less than the origin web-server (103).
Abstract:
One embodiment of the present method and apparatus for delegating responses to conditions in computing systems includes acknowledging (e.g., at a systems management component in the computing system) a condition, and delegating responsibility for a strategy for a response to the condition to another component. In further embodiments, the present method and apparatus for delegating responses to conditions in computing systems includes receiving (e.g., at a computing system component) an assignment from another computing system component (e.g., a systems management component), where the assignment assigns responsibility for a strategy for a response to a condition, and determining whether and how to respond to the condition.
Abstract:
A migration scheme for virtualized Trusted Platform Modules (430, 432, 434) is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform (402) to another (404). A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module (432) and all its state information is encrypted using a hybrid of public and symmetric key cryptography (612). The encrypted state is transferred to the target physical platform (616), decrypted and the state of the virtual Trusted Platform Module instance is rebuilt (620).
Abstract:
A distributed feature collection and correlation engine is provided, Feature extraction comprises obtaining one or more data records; extracting information from the one or more data records based on domain knowledge; transforming the extracted information into a key/value pair comprised of a key K and a value V, wherein the key comprises a feature identifier; and storing the key/value pair in a feature store database if the key/value pair does not already exist in the feature store database using a de-duplication mechanism. Features extracted from data records can be queried by obtaining a feature store database comprised of the extracted features stored as a key/value pair comprised of a key K and a value V, wherein the key comprises a feature identifier; receiving a query comprised of at least one query key; retrieving values from the feature store database that match the query key; and returning one or more retrieved key/value pairs.
Abstract:
This invention provides methods and apparatus for enabling access to restricted information contained at a semi-trusted web-server (100) also called a proxy server. The client (101), semi-trusted web-server (104), and origin web-server (103) are connected to a core network (102). Restricted information is information that is only available to a selected group of authorized clients (101). A client (101) desiring access to the restricted information authenticates itself with a trusted web-server (i.e. origin web- server) (103), and obtains a client credential. The client then contacts the semi-trusted web-server (100) with the credential and obtains access to the restricted content. The restricted information may be encrypted at the semi- trusted web-server (100), so that the restricted information is secure even if the semi-trusted web-server (100) is not completely secure. To shorten the length of time that the client (101) must wait for a response to requests an d to lighten the load on the origin web-server (103), the semi-trusted web- server (100) may service the requests of the client (101). Generally, a semi - trusted web-server (100) is chosen to service the requests of a client (101) if the semi-trusted web-server (100) is less than the origin web-server (103 ).
Abstract:
Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.
Abstract:
Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.
Abstract:
Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.