-
公开(公告)号:US20220103572A1
公开(公告)日:2022-03-31
申请号:US17548068
申请日:2021-12-10
Applicant: Raytheon BBN Technologies Corp.
Inventor: William Timothy Strayer , Brandon Doherty Kalashian , Michael Hassan Atighetchi , Stephane Yannick Blais , Samuel Cunningham Nelson
IPC: H04L67/561
Abstract: Techniques for enforcing trust policies for payload data transmitted through a data provisioning layer include: receiving, by a node in the data provisioning layer, payload data to be delivered to a recipient; obtaining, by the node, a trust policy indicating multiple attributes used to determine trustworthiness of payloads; determining, by the node, a set of values of the attributes associated with the payload data; generating, by the node, a trustworthiness opinion based at least on the trust policy and the set of values of the attributes; transmitting, by the node, the payload data and the trustworthiness opinion via the data provisioning layer toward the recipient; computing, by the recipient, a trustworthiness metric associated with the payload data based at least on the trustworthiness opinion; and determining, by the recipient, an action to take with respect to the payload data based at least on the trustworthiness metric.
-
公开(公告)号:US20200267175A1
公开(公告)日:2020-08-20
申请号:US16692749
申请日:2019-11-22
Applicant: Raytheon BBN Technologies Corp.
IPC: H04L29/06
Abstract: Techniques for evaluating cyber assets are disclosed. A system obtains, from data sources in an experimental environment, raw data generated in response to execution of a cyber asset. The system generates, from the raw data, at least one instance model corresponding to the data sources. The at least one instance model includes instances of concepts represented in a cyber impact ontology.
-
公开(公告)号:US20240406189A1
公开(公告)日:2024-12-05
申请号:US18519238
申请日:2023-11-27
Applicant: Raytheon BBN Technologies Corp.
Inventor: William Timothy Strayer , Brandon Doherty Kalashian , Michael Hassan Atighetchi , Stephane Yannick Blais , Samuel Cunningham Nelson
IPC: H04L9/40
Abstract: Techniques for enforcing trust policies for payload data transmitted through a data provisioning layer include: receiving, by a node in the data provisioning layer, payload data to be delivered to a recipient; obtaining, by the node, a trust policy indicating multiple attributes used to determine trustworthiness of payloads; determining, by the node, a set of values of the attributes associated with the payload data; generating, by the node, a trustworthiness opinion based at least on the trust policy and the set of values of the attributes; transmitting, by the node, the payload data and the trustworthiness opinion via the data provisioning layer toward the recipient; computing, by the recipient, a trustworthiness metric associated with the payload data based at least on the trustworthiness opinion; and determining, by the recipient, an action to take with respect to the payload data based at least on the trustworthiness metric.
-
公开(公告)号:US11831669B2
公开(公告)日:2023-11-28
申请号:US16692749
申请日:2019-11-22
Applicant: Raytheon BBN Technologies Corp.
CPC classification number: H04L63/1433 , H04L63/20
Abstract: Techniques for evaluating cyber assets are disclosed. A system obtains, from data sources in an experimental environment, raw data generated in response to execution of a cyber asset. The system generates, from the raw data, at least one instance model corresponding to the data sources. The at least one instance model includes instances of concepts represented in a cyber impact ontology.
-
公开(公告)号:US11831657B2
公开(公告)日:2023-11-28
申请号:US17548068
申请日:2021-12-10
Applicant: Raytheon BBN Technologies Corp.
Inventor: William Timothy Strayer , Brandon Doherty Kalashian , Michael Hassan Atighetchi , Stephane Yannick Blais , Samuel Cunningham Nelson
CPC classification number: H04L63/126 , H04L63/123 , H04L63/1408
Abstract: Techniques for enforcing trust policies for payload data transmitted through a data provisioning layer include: receiving, by a node in the data provisioning layer, payload data to be delivered to a recipient; obtaining, by the node, a trust policy indicating multiple attributes used to determine trustworthiness of payloads; determining, by the node, a set of values of the attributes associated with the payload data; generating, by the node, a trustworthiness opinion based at least on the trust policy and the set of values of the attributes; transmitting, by the node, the payload data and the trustworthiness opinion via the data provisioning layer toward the recipient; computing, by the recipient, a trustworthiness metric associated with the payload data based at least on the trustworthiness opinion; and determining, by the recipient, an action to take with respect to the payload data based at least on the trustworthiness metric.
-
公开(公告)号:US20240089286A1
公开(公告)日:2024-03-14
申请号:US18513768
申请日:2023-11-20
Applicant: Raytheon BBN Technologies Corp.
IPC: H04L9/40
CPC classification number: H04L63/1433 , H04L63/20
Abstract: Techniques for evaluating cyber assets are disclosed. A system obtains, from data sources in an experimental environment, raw data generated in response to execution of a cyber asset. The system generates, from the raw data, at least one instance model corresponding to the data sources. The at least one instance model includes instances of concepts represented in a cyber impact ontology.
-
公开(公告)号:US11233707B2
公开(公告)日:2022-01-25
申请号:US16832039
申请日:2020-03-27
Applicant: Raytheon BBN Technologies Corp.
IPC: H04L12/24 , H04L29/06 , G06F16/907 , H04L29/08
Abstract: Techniques for metadata-based information provenance are disclosed. A node in a data provisioning layer receives encrypted payload data to be delivered to a recipient. The node generates provenance metadata that describes at least one action taken by the node with respect to the encrypted payload data. The node transmits the encrypted payload data and the provenance metadata via the data provisioning layer toward the recipient.
-
公开(公告)号:US20210306227A1
公开(公告)日:2021-09-30
申请号:US16832039
申请日:2020-03-27
Applicant: Raytheon BBN Technologies Corp.
IPC: H04L12/24 , H04L29/06 , H04L29/08 , G06F16/907
Abstract: Techniques for metadata-based information provenance are disclosed. A node in a data provisioning layer receives encrypted payload data to be delivered to a recipient. The node generates provenance metadata that describes at least one action taken by the node with respect to the encrypted payload data. The node transmits the encrypted payload data and the provenance metadata via the data provisioning layer toward the recipient.
-
-
-
-
-
-
-