PRIVACY-PRESERVING IDENTITY ASSET EXCHANGE
    11.
    发明申请

    公开(公告)号:US20200044848A1

    公开(公告)日:2020-02-06

    申请号:US16053189

    申请日:2018-08-02

    Abstract: A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.

    SANITIZING VIRTUALIZED COMPOSITE SERVICES
    14.
    发明申请

    公开(公告)号:US20180203890A1

    公开(公告)日:2018-07-19

    申请号:US15407382

    申请日:2017-01-17

    Abstract: A method sanitizes a virtualized composite service. One or more processors provide a sanitization policy for each image within the virtualized composite service. The processor(s) analyze sanitization policies for multiple images in the virtualized composite service in order to detect inconsistencies among the sanitization policies. The processor(s), in response to finding inconsistencies between the sanitization policies, resolve the inconsistencies to produce a consistent sanitization policy, and then use the consistent sanitization policy to sanitize the virtualized composite service to create a sanitized virtualized composite service. The processor(s) receive a request for the virtualized composite service from a requester, and then respond to the request for the virtualized composite service by returning the sanitized virtualized composite service to the requester.

    DETECTING DENIAL-OF-SERVICE ATTACKS ON GRAPH DATABASES
    18.
    发明申请
    DETECTING DENIAL-OF-SERVICE ATTACKS ON GRAPH DATABASES 有权
    检测图形数据库上的服务攻击

    公开(公告)号:US20170078324A1

    公开(公告)日:2017-03-16

    申请号:US14854261

    申请日:2015-09-15

    CPC classification number: H04L63/1458 G06F21/554 H04L63/1408

    Abstract: Detecting a denial-of-service attack on a graph database is provided. In response to receiving a request to process a graph query on the graph database from a client device via a network, a graph query pattern of the graph query is determined. In response to determining that the graph query pattern of the graph query matches a stored graph query pattern that lead to a previous denial-of-service attack on the graph database, the graph query is identified as the denial-of-service attack on the graph database. Then, the request to process the graph query is denied by dropping the graph query.

    Abstract translation: 提供了检测图表数据库上的拒绝服务攻击。 响应于通过网络从客户端设备接收到处理图形数据库上的图形查询的请求,确定图形查询的图形查询模式。 响应于确定图形查询的图形查询模式与导致先前对图形数据库的拒绝服务攻击的存储的图形查询模式相匹配,图形查询被识别为对服务器上的拒绝服务攻击 图形数据库。 然后,通过删除图查询来拒绝处理图查询的请求。

    RESOURCE ACCESS POLICY ENFORCEMENT USING A HYPERGRAPH

    公开(公告)号:US20210306377A1

    公开(公告)日:2021-09-30

    申请号:US16830019

    申请日:2020-03-25

    Abstract: A method trains a neural network to recognize whether a resource is authorized to be returned to a requester. One or more processors train a neural network to traverse a policy enforcement hypergraph in order to identify a security policy to be used for a resource request and to authorize a use of a requested resource by a requester. The policy enforcement hypergraph is derived from a policy enforcement graph that expresses a set of security profiles for resources and requesters. The processor(s) receive a resource request for a requested resource from a requester, where the resource request includes a description of the requester. A system/user inputs a description of the received resource request and a description of the policy enforcement hypergraph into the trained neural network in order to selectively return the requested resource to the requester.

Patent Agency Ranking