Patent classifications
H04L9/40
Secure communication with individual edge devices of remote networks that use local security credentials
A device management service of a provider network maintain a device repository that is accessible to a remote managed network. The device management service assigns different service credentials for different edge devices indicated by the device repository. For a particular edge device, the device management service provides, based on the service credentials assigned for the edge device, secure transmission of a message between the device management service and a network manager of the managed network. The network manager of the managed network provides secure transmission of the message between the network manager and the edge device based on local credentials assigned for the edge device.
Secure communication with individual edge devices of remote networks that use local security credentials
A device management service of a provider network maintain a device repository that is accessible to a remote managed network. The device management service assigns different service credentials for different edge devices indicated by the device repository. For a particular edge device, the device management service provides, based on the service credentials assigned for the edge device, secure transmission of a message between the device management service and a network manager of the managed network. The network manager of the managed network provides secure transmission of the message between the network manager and the edge device based on local credentials assigned for the edge device.
Establishing and maintaining trusted relationship between secure network devices in secure peer-to-peer data network based on obtaining secure device identity containers
In one embodiment, a method comprises: establishing, by a secure executable container executed by a network device, a two-way trusted relationship with a verified subscriber that enables secure user access by the verified subscriber to a secure peer-to-peer data network, including creating a secure public key and a first device identifier uniquely identifying the network device, for insertion into a first device identity container that provides secure identification of the network device in the secure peer-to-peer data network; obtaining a second device identity container for a second network device and comprising a second public key owned by the second network device and a second device identifier uniquely identifying the second network device; and establishing a corresponding two-way trusted relationship with the second network device based on executing a prescribed secure salutation protocol with the second network device based on the second public key and the second device identifier.
Secured communications with display device
Techniques are provided herein for secure display device communications. In one example, a video communications device provides, to a display device over a first connection, communication information that enables the display device to contact a server over a second connection. The video communications device further provides, to the display device over the first connection, a command configured to initiate an interaction with the server. The server obtains, from the display device over the second connection, a message initiating the interaction in response to the command based on the communication information.
Securing encrypted volumes in a distributed environment
The present disclosure relates to generating a passphrase for an encrypted volume by at least cryptographically combing the first cryptographic key and the shared secret. Where the shared secret is split into a plurality of shares and a first number of the plurality of shares is greater than a second number of the plurality of shares and the second number of the plurality of shares is required to reconstruct the shared secret.
Parallel encrypted data streams for virtual private networks
A virtual private network (VPN) server connected to a client device within a VPN obtains data for delivery to the client device. The VPN server selects a data stream from a set of data streams of the VPN connection with the client device, where each data stream of the set of data streams has a different encryption context. The VPN server generates a data packet based on the data such that the data packet is encrypted using the encryption context specific to the selected data stream. The VPN server transmits the data packets to the client device via the selected data stream.
Parallel encrypted data streams for virtual private networks
A virtual private network (VPN) server connected to a client device within a VPN obtains data for delivery to the client device. The VPN server selects a data stream from a set of data streams of the VPN connection with the client device, where each data stream of the set of data streams has a different encryption context. The VPN server generates a data packet based on the data such that the data packet is encrypted using the encryption context specific to the selected data stream. The VPN server transmits the data packets to the client device via the selected data stream.
Detecting a landing page that violates an online system policy based on a structural similarity between the landing page and a web page violating the policy
An online system receives a content item including a link to a landing page and determines a likelihood the landing page violates an online system policy based on a structural similarity between the landing page and a web page violating the policy. To determine the likelihood, the online system determines a hierarchical structure associated with the web page violating the policy and an additional hierarchical structure associated with the landing page. The hierarchical structure represents a structure of at least a portion of the web page and the additional hierarchical structure represents a structure of a corresponding portion of the landing page. The online system compares the hierarchical structure and additional hierarchical structure. Based on the comparison, the online system computes a measure of dissimilarity between the hierarchical structure and additional hierarchical structure and determines a likelihood the landing page violates the policy based on the measure of dissimilarity.
Characterization of HTTP flood DDoS attacks
A method and system for characterizing application layer flood denial-of-service (DDoS) attacks are provided. The method includes receiving an indication on an on-going DDoS attack directed to a protected entity; generating a dynamic applicative signature by analyzing requests received during the on-going DDoS attack, wherein the dynamic applicative signature characterizes requests generated by an attack tool executing the on-going DDoS attack; and characterizing each incoming request based on the generated dynamic applicative signature, wherein the characterization provides an indication for each incoming request whether a request is generated by the attack tool.
Message management using silent SMS
A system and method of managing messages in a telecommunications network comprises: transmitting the first SMS message to a wireless device, the first SMS message including a first acknowledgement request and a content processing request; determining whether a first acknowledgement has been received from the wireless device in response to the first acknowledgement request within a first predetermined time period; in response to a determination that the first acknowledgement has not been received within the first predetermined time period: transmitting a second SMS message to the wireless device, the second SMS message including a second acknowledgement request and a content non-processing request; determining whether a second acknowledgement has been received from the wireless device in response to the second acknowledgement request; and in response to a determination that the second acknowledgement has been received within a second predetermined time period, retransmitting the first SMS message to the wireless device.