-
公开(公告)号:US20170295077A1
公开(公告)日:2017-10-12
申请号:US15217801
申请日:2016-07-22
Applicant: Dell Software Inc.
Inventor: Karl Dyszynski , Steven C. Work
IPC: H04L12/26
CPC classification number: H04L43/0817 , H04L67/1008 , H04L67/1021 , H04L67/18 , H04L67/327
Abstract: A network routing server can be configured to receive client requests from multiple client devices and route the client requests to optimal service providers to service the request. To determine which service provider is optimal to service the client request, the network routing service can analyze multiple factors, such as geographic location of the client, geographic location of the service providers, and health metrics describing service quality of the various service providers. Health metrics can include Central Processing Unit (CPU) usage, bandwidth, memory usage, connectivity, service providers network status, network latency, user capacity saturation, etc. Based on an analysis of this data, the network routing service can determine the service provider that is best suited to service the client request and route the client request accordingly.
-
公开(公告)号:US20170289391A1
公开(公告)日:2017-10-05
申请号:US15631946
申请日:2017-06-23
Applicant: DELL SOFTWARE INC.
Inventor: Samuel James Liddicott
CPC classification number: H04N1/32304 , B41F9/003 , B41F11/02 , B41M3/10 , B42D25/21 , B42D25/333 , B42D25/40 , D21F1/46 , D21H19/74 , D21H21/40 , G03G15/6582 , G03G15/6585 , G06K19/086 , G06K19/10 , G06K19/14 , G07D7/12 , H04N1/32144 , H04N1/32288 , H04N1/32293 , H04N1/32299 , H04N1/32325
Abstract: Systems and methods are directed towards generating a verified unique watermark. More specifically, the systems and methods are directed towards generating a watermark that is as long as possible without any repetition. Such watermarks are possible by selecting characteristics of the watermark and methods for producing the watermarks (e.g., dandy rollers). By producing longer unique watermarks, users would be capable of generating longer rolls of paper whereby more sheets can be produced that each possesses a unique watermark. With the unique watermark, users can identify what information is printed on each sheet as well as authenticate the contents of each individual sheet.
-
公开(公告)号:US20170272336A1
公开(公告)日:2017-09-21
申请号:US15072715
申请日:2016-03-17
Applicant: Dell Software, Inc.
Inventor: Curtis Johnstone , Michel Albert Brisebois
CPC classification number: H04L43/04 , H04L41/22 , H04L43/0817 , H04L43/14
Abstract: Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. Data elements included in the usage data may be determined based at least in part on the data schema. A permission model associated with the usage data may be determined. Based at least in part on the permission model, one or more additional employees that have access to the usage data may be determined. The employee may use a user interface to display the type of usage data that is being collected and the one or more additional employees that have access to the usage data. The employee may use the user interface to provide permission to collect the type of usage data.
-
24.
公开(公告)号:US09760713B1
公开(公告)日:2017-09-12
申请号:US14191648
申请日:2014-02-27
Applicant: Dell Software Inc.
Inventor: Timothy Charles Sedlack , Leslie G. Wardwell
CPC classification number: G06F21/552 , G06F21/554 , G06F21/577
Abstract: In one embodiment, a method is performed by a computer system comprising computer hardware. The method includes monitoring a file system for risk-assessment events. The method further includes, responsive to a real-time determination of at least one risk-assessment event, determining a content-independent risk of exposure for a file-system object associated with the risk-assessment event. The determining of the content-independent risk of exposure is based, at least in part, on a depth of the file-system object in the file system and a set of users who can access the file-system object.
-
公开(公告)号:US09736048B2
公开(公告)日:2017-08-15
申请号:US15077891
申请日:2016-03-22
Applicant: Dell Software Inc.
Inventor: Zhong Chen , Aravind Thangavelu , Dong Xiang , Yanjun Yang
CPC classification number: H04L43/0847 , H04L43/065 , H04L43/0876 , H04L63/0272 , H04L63/08 , H04L63/164 , H04L67/142 , H04L67/2809 , H04L69/40
Abstract: Methods and systems are provided for detecting dead tunnels associated with a VPN. An indicator of a tunnel capability, for example, a DPD vendor ID, is received from a peer through a VPN connection. The tunnel capability is associated with one or more phase II tunnels associated with the VPN. Traffic generated by the peer is detected, and if traffic is detected at a tunnel, the tunnel is presumed to be alive. When no traffic is detected in a tunnel, a DPD packet exchange with the tunnel is initiated. A determination is made, based on the packet exchange, whether the tunnel is alive.
-
公开(公告)号:US20170228558A1
公开(公告)日:2017-08-10
申请号:US15017107
申请日:2016-02-05
Applicant: Dell Software, Inc.
Inventor: Olivier Le Rudulier , Michel Albert Brisebois
CPC classification number: G06F21/6245 , G06F16/182 , G06F21/57 , G06F2221/034 , G06Q10/10 , H04L63/105
Abstract: A risk analysis system of associated with an enterprise system for determining delegation risks associated with assigning candidate individuals to perform various tasks. In some cases, the delegation risk analysis system may generate individual delegation risk scores to each candidate individual to assist in the delegation of tasks throughout an organization. In some examples, the delegation risk analysis system may determine the delegation risk scores based on context risk factors associated with the task and the individual and intrinsic delegation risk factors associated with the enterprise system.
-
公开(公告)号:US20170187753A1
公开(公告)日:2017-06-29
申请号:US14980009
申请日:2015-12-28
Applicant: Dell Software, Inc.
Inventor: Mitch Brisebois , Olivier Le Rudulier
IPC: H04L29/06
Abstract: A context-aware delegation engine can enable an account owner to identify granular criteria (or context) that will be used to determine what content a delegate will have access to. The account owner can therefore leverage a wide range of information to dynamically determine whether a delegate will receive access to particular content. The delegation engine can be configured to provide a delegation policy to be evaluated to determine whether a delegate should receive access to particular content. Such a delegation policy can be generated based on input provided by the delegator thereby providing the delegator with fine-grained control over which content will be accessible to a particular delegate. The delegation policy can be structured in accordance with an authorization protocol schema such as XACML, SAML, OAuth 2.0, OpenID, etc. to allow the evaluation of the delegation policy to be performed by a policy decision point in such authorization architectures.
-
公开(公告)号:US09690576B2
公开(公告)日:2017-06-27
申请号:US14619853
申请日:2015-02-11
Applicant: Dell Software, Inc.
Inventor: David McAleer
CPC classification number: G06F9/00 , G06F9/455 , G06F9/45558 , G06F2009/45591 , G06F2009/45595 , H04L41/0645 , H04L41/0677 , H04L41/0853
Abstract: A management system sends a first request for first data associated with multiple network entities. If the first request times out, the first request is split to create multiple smaller requests and the multiple smaller requests sent, requesting data from a subset of the multiple network entities. Based on responses to the multiple smaller requests, the management system identifies a particular network entity that caused the first request to time out and adds the particular network entity to a set of problematic entities. The management system sends a second request that requests second data from a portion of the multiple network entities that excludes the particular network entity. The multiple network entities may include one or more of a virtual machine (VM), a host node (to host VMs), a storage device, a network link, another type of network entity, or any combination thereof.
-
公开(公告)号:US20170171424A1
公开(公告)日:2017-06-15
申请号:US14968455
申请日:2015-12-14
Applicant: Dell Software Inc.
Inventor: Samuel James Liddicott
CPC classification number: H04N1/32304 , B41F9/003 , B41F11/02 , B41M3/10 , B42D25/21 , B42D25/333 , B42D25/40 , D21F1/46 , D21H19/74 , D21H21/40 , G03G15/6582 , G03G15/6585 , G06K19/086 , G06K19/10 , G06K19/14 , G07D7/12 , H04N1/32144 , H04N1/32288 , H04N1/32293 , H04N1/32299 , H04N1/32325
Abstract: Systems and methods are directed towards generating a verified unique watermark. More specifically, the systems and methods are directed towards generating a watermark that is as long as possible without any repetition. Such watermarks are possible by selecting characteristics of the watermark and methods for producing the watermarks (e.g., dandy rollers). By producing longer unique watermarks, users would be capable of generating longer rolls of paper whereby more sheets can be produced that each possesses a unique watermark. With the unique watermark, users can identify what information is printed on each sheet as well as authenticate the contents of each individual sheet.
-
公开(公告)号:US20170163650A1
公开(公告)日:2017-06-08
申请号:US14962211
申请日:2015-12-08
Applicant: Dell Software, Inc.
Inventor: Jake Seigel , Robert Maclitosh
IPC: H04L29/06
CPC classification number: H04L63/102 , H04L63/104
Abstract: Systems and techniques to identify and modify unused (or seldom used) access privileges are described. Group membership data may be correlated with access map data to create a user-resource access map identifying privilege levels associated with individual user accounts to access computing resources in a computing system. User activity event logs generated as a result of user accounts accessing the resources may be correlated with the user-resource access map to identify user accounts that do not use (or seldom use) particular privilege levels to access particular resources. The identified user accounts may be modified to remove the unused (or seldom used) privileges levels.
-
-
-
-
-
-
-
-
-