Systems and methods for correcting timestamps on data received from untrusted devices

    公开(公告)号:US09977724B2

    公开(公告)日:2018-05-22

    申请号:US14859345

    申请日:2015-09-20

    Applicant: Google Inc.

    Abstract: Aspects of the technology include receiving (202) an event log of events, each that are associated with wall clock and uptime clock timestamps, and extracting (204) a currently analyzed event from the event log. Further, aspects include associating (208) a processor time to the currently analyzed event as a trusted event time if the event is the first event. Aspects include calculating (212) an elapsed time from wall clock times associated with an immediately preceding event and the currently analyzed event where the immediately preceding event is a boot log event. Further aspects can include calculating (214) the elapsed time from uptime clock times associated with the immediately preceding event and the currently analyzed event where the immediately preceding event is not a boot log event. Finally, aspects can include calculating (216) a trusted time by deducting the elapsed time from a trusted event time.

    SYSTEMS AND METHODS FOR CORRECTING TIMESTAMPS ON DATA RECEIVED FROM UNTRUSTED DEVICES

    公开(公告)号:US20170083552A1

    公开(公告)日:2017-03-23

    申请号:US14859345

    申请日:2015-09-20

    Applicant: Google Inc.

    Abstract: Aspects of the technology include receiving (202) an event log of events, each that are associated with wall clock and uptime clock timestamps, and extracting (204) a currently analyzed event from the event log. Further, aspects include associating (208) a processor time to the currently analyzed event as a trusted event time if the event is the first event. Aspects include calculating (212) an elapsed time from wall clock times associated with an immediately preceding event and the currently analyzed event where the immediately preceding event is a boot log event. Further aspects can include calculating (214) the elapsed time from uptime clock times associated with the immediately preceding event and the currently analyzed event where the immediately preceding event is not a boot log event. Finally, aspects can include calculating (216) a trusted time by deducting the elapsed time from a trusted event time.

Patent Agency Ranking