32nd week of 2022 patent applcation highlights part 74 |
Patent application number | Title | Published |
20220255904 | AUTOMATIC PRIVACY-AWARE MACHINE LEARNING METHOD AND APPARATUS - Disclosed are systems and methods for improving interactions with and between computers in content generating, searching, hosting and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide systems and methods for privacy-aware machine learning using an improved data encoding that withholds more information. The disclosed systems and methods encode a corpus of data and encode each query used in searching and generating query results from the corpus of encoded data. | 2022-08-11 |
20220255905 | CENTRALIZED MANAGEMENT CONTROL LISTS FOR PRIVATE NETWORKS - Described herein are systems, methods, and software to manage private networks for computing elements. In one example, a coordination service may obtain a request from a computing element to join a private network. In response to the request, the coordination service may identify communication rules associated with the computing element based on credential and device information in the request and may identify communication information to permit the computing element to communicate with one or more other computing elements in the private network. Once identified, the communication information may be communicated to the computing element. | 2022-08-11 |
20220255906 | System For Protecting Control Data Packet And Method Pertaining To Same - A node includes: a communication circuit; a processor operatively connected to the communication circuit; and a memory which is operatively connected to the processor and stores an access control application. The memory may store instructions that, upon being executed by the processor, cause the node to: sense a controller access event with respect to an external server through the access control application; insert a first protection header to a first control data packet for requesting controller access, the first protection header including a protection information ID for identifying protection information used for authenticating the first control data packet, and first authentication information that is generated on the basis of the protection information and used for authenticating and checking the integrity of the first control data packet; and transmit the first control data packet having the inserted first protection header to the external server by using the communication circuit. | 2022-08-11 |
20220255907 | DATABASE SYNCHRONIZATION SYSTEM IN NETWORKED ZONES USING BLOCKCHAIN - There are provided systems and methods for a database synchronization system in networked zones using blockchain. An electronic service provider may maintain data stores across different zones that may need to synchronize data across these zones. As such, the subject technology provides for data storage using interplanetary file system (IPFS) technology according to some embodiments with blockchain technology to create a secure and reliable data synchronization system. IPFS may be implemented as a data storage layer and blockchain as a transaction management system, where the IPFS address of data files and synchronization points are stored in a distributed ledger. Integration of the IPFS network with a fabric network can enhance IPFS with the fabric network to create a more secure file sharing platform to improve the transfer of data and database synchronization between different zones. | 2022-08-11 |
20220255908 | ELECTRONIC DEVICE FOR PERFORMING ENCRYPTED COMMUNICATION, AND OPERATION METHOD THEREOF - Electronic devices are disclosed, including a first and second device. The first device includes a communication circuit, and a processor. The processor is configured to receive a first signal from the second device, identify a present mode of the second device, based on the received first signal, establish a communicative connection with the second device, based on identifying that the second device is operating in a first mode, in response to establishing the connection, generate first information for inclusion in a second signal to be periodically transmitted from the second device which transitions to a second mode, and second information for encrypting communications with the second device, and transmit the first information and the second information to the second device, and a second device different from the second device. | 2022-08-11 |
20220255909 | Secure Communication Method, Apparatus, and System - A method includes receiving, by a first network device, a first packet and a second packet, where the first packet and the second packet belong to first traffic, and all packets included in the first traffic match a first traffic differentiation rule; based on a mapping relationship between the first traffic and a first encryption policy group, encrypting, by the first network device, the first packet using a first encryption policy to obtain a third packet, and encrypting, by the first network device, the second packet using a second encryption policy to obtain a fourth packet, where the first encryption policy group includes the second encryption policy and the first encryption policy, and the first encryption policy and the second encryption policy are different encryption policies; and sending, by the first network device, the third packet and the fourth packet to a second network device. | 2022-08-11 |
20220255910 | REGISTERING, MANAGING, AND COMMUNICATING WITH IOT DEVICES USING DOMAIN NAME SYSTEM PROCESSES - Provided herein is a method for registering an IoT device with a DNS registry. The method can include obtaining, at a DNS server, an identifier, IP address, and a public key of an asymmetric key pair associated with the IoT device from a network gateway device that is in communication with the IoT device, wherein the asymmetric key pair is provisioned onto the IoT device and an associated private key stored within a memory of the IoT device at a time that IoT device is manufactured or during a predetermined time window after manufacturing; creating at least one DNS record for the IoT device; assigning a domain name associated with the internet protocol (“IP”) address to the IoT device; storing the identifier, IP address, the domain name, and the public key in the at least one DNS record; and providing confirmation of the registration to the IoT device. | 2022-08-11 |
20220255911 | Method for Secure Communication and Device - Embodiments of this application disclose a method for secure communication and a device. A local device sends indication information to a peer device, to indicate the peer device to establish a key negotiation template. After establishing a same key negotiation template, the two devices respectively generate corresponding IPSec keys in IPSec aging periods based on the key negotiation template. According to the method provided in this application, each time an IPSec key needs to be negotiated, the IPSec key may be obtained based on the key negotiation template by exchanging a latest public key and indication information of a current IPSec aging period. Even in large-scale networking scenarios such as IoT, IPSec keys corresponding to IPSec aging periods can still be quickly and efficiently obtained, to implement secure communication between devices. | 2022-08-11 |
20220255912 | Secure Device Notifications From Remote Applications - Methods and systems for securely delivering notifications from remote applications to client devices are described herein. A computing device may listen for notifications from a remote application and receive notification data from the remote application. The computing device may select a notification service for delivery of the notification data to the client device. The computing device may determine whether a client agent application is running as a foreground process on the client device. The computing device may send, to a notification service, notification data for delivery to the client device. At least a portion of the notification data may be encrypted prior to sending to the selected notification service. | 2022-08-11 |
20220255913 | ENHANCED MULTI-FACTOR AUTHENTICATION BASED ON PHYSICAL AND LOGICAL PROXIMITY TO TRUSTED DEVICES AND USERS - This disclosure describes techniques for performing enhanced authentication of a device based on physical and logical proximity of the device to one or more other authenticated devices. An example method includes performing, at a first time, a first authentication of a first device or a first user of the first device and determining that the first device is connected to at least one second device in a communication session. The at least one second device or at least one second user of the at least one second device are authenticated. The example method further includes determining a reauthentication interval based on the first device being connected to the at least one second device in the communication session and initiating, at a second time that is after the first time by the reauthentication interval, a second authentication of the first device or the first user of the first device. | 2022-08-11 |
20220255914 | IDENTITY INFORMATION LINKING - A system, method, and computer-readable media for linking identify information between a group-based communication system and an external application based on a user authorization to share credentials. After sharing the user's credentials, the user may be authenticated with the external application and user data from the group-based communication system may be shared with the external application. Additionally, a preview of a web resource associated with the external application may be displayed to the user within the group-based communication system allowing the user to interact with the web resource from within the group-based communication system. | 2022-08-11 |
20220255915 | CREDENTIAL-FREE USER LOGIN TO REMOTELY EXECUTED APPLICATIONS - Provided is a process including: receiving, with an intermediary server, a request to access web content at a web server; submitting, from the intermediary server a value by which possession of an access credential is demonstrated, wherein the value is withheld from the client web browser; receiving, by the intermediary web browser, instructions to store in web browser memory an access token; and sending, from the intermediary server, to the client web browser executing on the client computing device, instructions to store the access token in browser memory of the client web browser, thereby authenticating the client web browser without the client web browser having access to the value by which possession of the access credential is demonstrated. | 2022-08-11 |
20220255916 | METHODS AND APPARATUS TO ATTEST OBJECTS IN EDGE COMPUTING ENVIRONMENTS - Methods and apparatus to attest objects in edge computing environments are disclosed. An example apparatus generate an attestation information object in an edge computing environment includes an evidence collector to collect evidence for an attestation information object to attest the authenticity of a first object, a temporal data generator to generate temporal information associated with data associated with the object, the evidence collector to associate the evidence and the temporal information with the first object, and an interface generator to generate an interface for the attestation information object. | 2022-08-11 |
20220255917 | Multi-Computer Processing System for Dynamically Evaluating and Controlling Authenticated Credentials - Systems for credential evaluation and control are provided. In some examples, a request to access data via a website may be received. The request may include a username. A browser extension embedded in the web browser used to request the data via the website may be triggered and one or more credential evaluation functions may be executed. An event record associated with the request to access data may be generated. The event record may be analyzed to determine a designation associated with the website and a designation associated with user credentials provided with the request to access the data. The designation of the website and the designation of the credentials may be compared to determine whether the designations match. If so, access to the requested data may be provided. If not, one or more mitigating actions may be identified and executed. | 2022-08-11 |
20220255918 | SINGLE SIGN ON FOR A REMOTE USER SESSION - A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process includes the user entering his or her credentials and being authenticated to the connection broker. In addition to user authentication, the SSO process includes connection broker authentication to confirm that the connection broker is trustworthy. When the connection broker is authenticated, the user credentials are transmitted to the connection broker in a secure manner and the connection broker forwards them onto a machine hosting the remote session so that the user can be logged into the remote session without entering his or her credentials again. | 2022-08-11 |
20220255919 | COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME - Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing unit coupled to a memory, and the memory may be encoded with computer executable instructions that when executed cause the at least one processing unit to receive a set of credentials associated with a user from a user device, cross-reference the set of credentials with a first set of credentials of an agent associated with the user to determine whether the set of credentials is valid; and if the set of credentials is valid, provide a second set of credentials of the agent to the user device in response to a request for the second set of credentials from the user device. | 2022-08-11 |
20220255920 | SYSTEM AND METHOD FOR PROXIMITY-BASED AUTHENTICATION - A system and method for proximity-based authentication are provided. The method conducted at a server includes receiving identification data from a primary user session on a session end point hosted on a computing device, the identification data being usable in linking the primary user session to a user record associated with a registered user. The server provides a token to one of the session end point and a registered end point hosted on a computing device, the registered end point associated with the user record, for local transmission from the end point for proximity-based acquisition by the other one of the session end point and a registered end point. The server receives the token from the other one of the session end point and the registered end point to establish physical proximity of the session end point and the registered end point during the primary user session. | 2022-08-11 |
20220255921 | COMPUTER-IMPLEMENTED SYSTEM AND AUTHENTICATION METHOD - A software system that has an embedded browser, an authenticator and a data channel module where the authenticator is adapted to authenticate a user, to authenticate a data channel and to bind the user authentication with the authenticated channel is disclosed. The authenticator is further adapted to communicate with the user via a graphical user interface of the embedded browser using graphical and control primitives of the authenticator and/or using a stand-alone graphical user interface of the authenticator, and the data channel module is adapted to communicate with service provider servers via a secure protocol, to communicate with the embedded browser and to communicate with the authenticator. A method of authentication using this system increases security and user comfort when accessing services and data requiring authentication is also disclosed. | 2022-08-11 |
20220255922 | ADJUSTING SECURITY POLICIES BASED ON ENDPOINT LOCATIONS - This disclosure describes techniques for setting and/or adjusting a security policy associated with a device based on the physical locations of endpoint devices exchanging data with the device. An example method includes performing, at a first time, a first authentication of a first device connecting to a service; determining addresses of second devices exchanging data with the first device; determining physical locations of the second devices based on the addresses; and defining a reauthentication interval based on the physical locations of the second devices. At a second time that is after the first time by the reauthentication interval, the example method further includes disconnecting the first device from the service; and based on disconnecting the first device from the service, triggering a second authentication of the first device. | 2022-08-11 |
20220255923 | COLLABORATION APPLICATION INTEGRATION FOR USER-IDENTITY VERIFICATION - Disclosed are methods, systems, and non-transitory computer-readable media for utilizes a collaboration application to provide data beneficial to the authentication of the user. The present application discloses receiving at least one item of personal identifying information for a user from a primary multi-factor authentication device. The present application further discloses receiving at least one item of personal identifying information for a user from a conferencing service in which the user is engaged in a conference. The present application also discloses determining whether to authenticate the user based on the items of personal identifying information from the primary multi-factor authentication device and from the conferencing service. | 2022-08-11 |
20220255924 | MULTI-FACTOR APPROACH FOR AUTHENTICATION ATTACK DETECTION - Disclosed are methods, systems, and non-transitory computer-readable media for detecting a presentation attack in a biometric factor domain, such as a multi-factor authentication environment. The methods, systems, and non-transitory computer-readable media comprise analyzing data relevant to a plurality of factors for evaluating whether an authentication attempt by a user is subject to the presentation attack and determining that the authentication attempt is subject to the presentation attack based on analysis of the data from the plurality of factors. The methods, systems, and non-transitory computer-readable media can detect a presentation attack even when the authentication attempt is successful. | 2022-08-11 |
20220255925 | CRYPTOBIONIC SYSTEM AND ASSOCIATED DEVICES AND METHODS - Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data. | 2022-08-11 |
20220255926 | EVENT-TRIGGERED REAUTHENTICATION OF AT-RISK AND COMPROMISED SYSTEMS AND ACCOUNTS - A system and method that detects and mitigates zero-day exploits and other vulnerabilities by analyzing event logs and external databases, forcing reauthentication of at-risk and comprised systems and accounts during an identified threat or potential security risk. | 2022-08-11 |
20220255927 | COMPUTER-IMPLEMENTED METHOD TO SECURE INTERACTIONS BETWEEN AT LEAST TWO USERS IN A NETWORK - A computer-implemented method to secure an interaction between at least two users in a network, whereas at least two network nodes are connected via the network. The method includes: a first user connects to the network via a first of the two network nodes, the first user creates in the network a first identity corresponding to the first user via a software application running on the first network node, whereas the creation includes the first user providing first biometric information characterizing the first user, the first biometric information is stored in encrypted form by a computer-implemented identity management system, a second user accesses the network via a second network node, the second user requests via the network consent of the first user, whereas the request is sent via the identity management system, the first user denies or approves the request of the second user via the software application. | 2022-08-11 |
20220255928 | SYSTEMS AND METHODS FOR DEVICE LOCATION VERIFICATION - Examples of the present disclosure describe systems and methods for verifying the location of a device using blockchain technology and zero-knowledge proofs (ZKPs). In one example aspect, a system may receive raw geolocation and timestamp data from a device. The geolocation data may be corroborated by other third-party trusted devices in a network. Upon receiving the raw geolocation and timestamp data, the system may construct at least one ZKP. In one example, the ZKP involves determining whether the geolocation of the device is within an authorized region from a database of authorized regions. If the geolocation is determined to be in an authorized region, then a ZKP predicate stating that the device was in an authorized region may be constructed. This ZKP predicate may be written to a blockchain so that a verifier may read the block and verify the device's location without receiving the raw, underlying geolocation/timestamp data. | 2022-08-11 |
20220255929 | SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED NETWORK ACCESS - A system configured to execute instructions to perform steps of a method for preventing unauthorized network access is disclosed. The system may receive an authorization request from a first user device and determine a device fingerprint. The system may store the device fingerprint as an authorization fingerprint. The system may receive a login request from a second user device. When the authorization fingerprint matches the device fingerprint, the system may authorize the login request from the second user device. In some embodiments, the system may determine a device state and temporal identifier and create a first device hash to be stored as an authorization hash. The system may receive a login request and cause the first user device to create one or more second device hashes. If at least one second device hash is a match, the system may authorize the login request from the second user device. | 2022-08-11 |
20220255930 | SYSTEMS AND METHODS FOR AUTOMATIC NETWORK VIRTUALIZATION BETWEEN HETEROGENEOUS NETWORKS - The invention is that of systems and methods for communications between one or more networks and subsequently network devices configured with a networking application for processing network based communications when the devices are on different logical and physical networks. The methods herein involve translation of remote IP addresses of LAN devices to addresses comprising headend network prefixes, to allow for LAN extension of remote to headend networks and communications between devices on the disparate networks. Data packets from a remote LAN interface are transferred to an outbound interface once translated, then forwarded via a formed bridged tunnel link to a headend network device. A server comprising a local LAN and outbound interface is further configured with a NAT module for IP address translation and an optional security module for additional authenticity verification of remote devices attempting to penetrate the headend network. | 2022-08-11 |
20220255931 | DOMAIN UNRESTRICTED MOBILE INITIATED LOGIN - Provided is a process for mobile-initiated authentications to web services. Credential values of the user are established within a trusted execution environment of the mobile device and representations are transmitted to a server. The user of the mobile device may authenticate with the mobile device to the server, which may convey access to a web-based service from a relying device that executes a client authentication component to report user sessions to the server. The user may select the relying device from the mobile device to cause the relying device to present credentials to the web-service to login, authenticate, or otherwise obtain user-level permission for the user on the relying device. The user of the mobile device may authenticate with the mobile device to the server, and may initiate the authentication process from the mobile device, without inputting credentials corresponding to the web-service on the relying device. | 2022-08-11 |
20220255932 | METHODS AND SYSTEMS FOR ALLOWING DEVICE TO SEND AND RECEIVE DATA - The present invention discloses a method and system for configuring an electronic device through a management device. When the management device is coupled to the electronic device and the electronic device is not able to communicate with a server, the method and system detect an identity of the electronic device and configure the electronic device according to the identity with a configuration. The configuration may further comprise authentication information, routing policy, energy policy and any information to configure the electronic device or to configure the management device for electronic device. The method and system also allow the electronic device to send data to and to receive data from the server through the management device. The method and system may also diagnose the electronic device before configuring the electronic device. | 2022-08-11 |
20220255933 | METHODS AND SYSTEMS FOR ALLOWING DEVICE TO SEND AND RECEIVE DATA - The present invention discloses a method and system for configuring an electronic device through a management device. When the management device is coupled to the electronic device and the electronic device is not able to communicate with a server, the method and system detect an identity of the electronic device and configure the electronic device according to the identity with a configuration. The configuration may further comprise authentication information, routing policy, energy policy and any information to configure the electronic device or to configure the management device for electronic device. The method and system also allow the electronic device to send data to and to receive data from the server through the management device. The method and system may also diagnose the electronic device before configuring the electronic device. | 2022-08-11 |
20220255934 | SPONSOR DELEGATION FOR MULTI-FACTOR AUTHENTICATION - Disclosed are methods, systems, and non-transitory computer-readable media for using a sponsor as a proxy for multi-factor authentication of a first user account for a first user when a primary multi-factor authentication mechanism is unavailable to the first user account, comprising registering the sponsor in a multi-factor authentication chain of trust associated with the first user account; requesting verification of an identity of the first user from the sponsor; receiving, from the sponsor, a verification of the identity of the first user; and granting access to a service to the first user account. | 2022-08-11 |
20220255935 | ARCHITECTURE HAVING A PROTECTIVE LAYER AT THE DATA SOURCE - A method and system for performing at least one service are disclosed. The method and system include receiving a communication for a data source at a wrapper. The wrapper includes a dispatcher and at least one service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the communication from the dispatcher to the data source and to the at least one service. The at least one service inspects the communication and may perform additional functions. | 2022-08-11 |
20220255936 | METHOD AND NODES FOR HANDLING ACCESS TO EPC SERVICES VIA A NON-3GPP NETWORK - A method performed by a PGW for handling a UEs access to an EPC service via a non-3GPP access network. During a request for connecting the UE to the non-3GPP access network, the PGW receives identity information which indicates an identity of an AAA node from a non-3GPP access gateway. The PGW selects the AAA node which was indicated in the received identity information. The PGW transmits, to the selected AAA node, a request message for the UE. The request message is a request for authorization of the UE to access the EPC service via the non-3GPP access network. | 2022-08-11 |
20220255937 | NONCE-BASED ENTERPRISE SECURITY POLICY ENFORCEMENT - This disclosure describes techniques including, by a domain name service (DNS), receiving a name resolution request from a client computing device and, by the DNS, providing a nonce to the client computing device, wherein a service is configured to authorize a connection request from the client computing device based at least in part on processing the nonce. This disclosure further describes techniques include a method of validating a connection request from a client computing device, including receiving the connection request, the connection request including a nonce. The techniques further include determining that the nonce is a valid nonce. The techniques further include, based at least in part on determining that the nonce is a valid nonce, authorizing the connection request and disabling the nonce. | 2022-08-11 |
20220255938 | METHOD AND SYSTEM FOR PROCESSING NETWORK RESOURCE ACCESS REQUESTS, AND COMPUTER DEVICE - Disclosed is a method for processing network resource access requests. The method comprises: receiving a resource access request and acquiring resource access request information; extracting user information and target resource information from the resource access request information, and requiring to establish a corresponding access mediator instance according to the user information and the target resource information; establishing the access mediator instance; and initiating an access to a target resource correspondingly by using the access mediator instance according to the resource access request information received by the access mediator instance. The network security is improved greatly. | 2022-08-11 |
20220255939 | Unified Workspace for Thin, Remote, and SAAS Applications - Application-manager software authenticates a user of a client device over a channel. The authentication operation is performed using a directory service. The application-manager software presents a plurality of applications in a GUI displayed by the client device. The plurality of applications depends on the authentication, the client device, and the channel. And the plurality of applications includes a thin application and a software-as-a-service (SaaS) application. The application-manager software receives a selection as to an application from the user. If the selection is for the SaaS application, the application-manager software provisions the SaaS application. The provision includes automatically logging the user onto an account with a provider of the SaaS application using a single sign-on and connecting the user to the account so that the user can interact with the SaaS application. If the selection is for the thin application, the application manager software launches the thin application. | 2022-08-11 |
20220255940 | SYSTEM OF CONTROLLING ACCESS OF USER TO RESOURCE AND METHOD THEREOF - A system that controls access to a resource by a user stores policy information for determining a condition with respect to an operation of the resource. The system acquires a first access request that shows a predetermined operation to a first resource by the user from a user terminal. The system acquires user state information that shows a current state of the user from the user terminal. The system determines a condition in case of access by the user based on the user state information. The system determines whether to authorize the first access request based on the policy information and the condition in case of access. | 2022-08-11 |
20220255941 | Method and System for Secure Container Application Framework - An edge device may be configured to generate a secure container to perform a software application on the edge device. A security daemon operating on a processor of the edge device may receive a configure host request message from a container manager. In response, the security daemon may determine integrity of metadata, extract licenses from the metadata, determine image permissions, create a user or group account, and update one or more system service access-control lists (ACLs). The security daemon may generate and send a configure host response message to the container manager, which may create and/or start the container. | 2022-08-11 |
20220255942 | PERIPHERAL LANDSCAPE AND CONTEXT MONITORING FOR USER-IDENTIFY VERIFICATION - Disclosed are methods, systems, and non-transitory computer-readable media for determining a trust score associated with a user, comprising detecting entities near a user device operated by the user; calculating the trust score for the user based on a policy that incorporates data about the entities near the user device, the trust score being a score that is indicative of a trust worthiness of data received from the user device, wherein trusted entities near the user device result in an increased trust score, and untrusted entities near the user device result in a decreased trust score; and permitting access to a resource when the trust score is above a threshold. | 2022-08-11 |
20220255943 | SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONS - Systems and methods for generating account permissions for an account on a computing system are provided. In some embodiments, application programming interface (API) interactions involving an external application and the computing system are used to generate a corresponding set of account permissions for the account. API permissions for the external application may also or instead be used to generate the set of account permissions for the account. The set of account permissions may enable the account to access the same resources on the computing system as the external application, which may avoid granting the account overly broad access to the computing system. | 2022-08-11 |
20220255944 | SEAMLESS FEATURE ACCESS FOR A DEVICE THROUGH A DEVICE MANAGEMENT SERVER - A system and method for enabling feature access for a device. The system includes a database including a plurality of stored unique identifiers, each one of the stored unique identifiers associated with one of a plurality of electronic devices. The system also includes an electronic processor configured to receive, from an electronic device, a request for access to a feature, the request including a unique identifier of the electronic device, validate the request for access by comparing the unique identifier to the plurality of stored unique identifiers to verify an identity of the electronic device, and transmit a token request to a feature server configured to provide the feature. The electronic processor is further configured to receive, from the feature server, a token in response to the token request, and transmit the token to the electronic device. | 2022-08-11 |
20220255945 | MULTI-FACTOR AUTHENTICATION USING CONFIDANT VERIFICATION OF USER IDENTITY - In some implementations, a server device may receive, from a client device, a login credential associated with a user and a request to access a resource. The server device may identify a confidant associated with the user and a confidant device associated with the confidant, wherein the confidant device is different from a user device associated with the user. The server device may transmit, to the confidant device, a request to verify an identity of the user. The server device may determine whether a verification of the identity of the user is received from the confidant device. The server device may grant or deny access to the resource based on determining whether the verification of the identity of the user is received from the confidant device. | 2022-08-11 |
20220255946 | SYSTEM FOR INTRUSION DETECTION USING RESOURCE ACTIVITY ANALYSIS - Systems, computer program products, and methods are described herein for intrusion detection using resource activity analysis. The present invention is configured to receive, from a computing device of a user, an indication that the user has accessed a resource allocation portfolio of a customer; determine a geographic information of the user; retrieve a geographic information of the customer; determine that the geographic information of the user does not match the geographic information of the customer; determine an exposure level associated with the user access of the resource allocation portfolio of the customer; determine that the exposure level is greater than a predetermined threshold; and automatically trigger a transmission of a notification to a computing device of an administrator indicating that the exposure level associated with the user access of the resource allocation portfolio of the customer is greater than the predetermined threshold. | 2022-08-11 |
20220255947 | Gradual Credential Disablement - A method for a gradual credential disablement is provided. The method includes receiving, at data processing hardware, a request for access to a resource. The request includes a request authenticator. The method also includes comparing, by the data processing hardware, the request authenticator against a security credential associated with the resource. The method further includes determining, by the data processing hardware, whether the request authenticator satisfies the security credential. When the request authenticator satisfies the security credential, the method includes granting or denying, by the data processing hardware, access to the resource based on a request failure rate associated with the security credential. | 2022-08-11 |
20220255948 | TELEMETRY HUB - Novel tools and techniques are provided for implementing a telemetry hub, and, more particularly, to methods, systems, and apparatuses for implementing a telemetry hub that obtains sensor data from a plurality of sources and that determines one or more first actions to take in response to receiving the first sensor data. In operation, a telemetry hub might receive first sensor data from one or more sensors. The telemetry hub may determine whether the first sensor data can be trusted and whether the first sensor data is valid. Based on a determination that the first sensor data can be trusted and is valid, the telemetry hub might analyze the first sensor data to determine one or more first actions to take. The telemetry hub might then implement the one or more first actions based at least in part on the analysis of the first sensor data. | 2022-08-11 |
20220255949 | METHOD OF VERIFICATION - The present invention relates to a method of verification of a communicating party. In particular, the invention relates to a method of verifying the identity of a communicating party at a user device, the method comprising the steps of receiving a communication at the user device, wherein the communication comprises information identifying the communicating party; determining whether the information identifying the communicating party comprises a variable authentication sequence indicative of the identity of the communicating party; and comparing the authentication sequence against at least one pre-determined criteria to determine whether the authentication sequence is valid, thereby to verify the identity of the communicating party. | 2022-08-11 |
20220255950 | SYSTEM AND METHOD FOR CREATING HEURISTIC RULES TO DETECT FRAUDULENT EMAILS CLASSIFIED AS BUSINESS EMAIL COMPROMISE ATTACKS - A method for creating a heuristic rule to identify Business Email Compromise (BEC) attacks includes filtering text of received email messages, using a first classifier, to extract one or more terms indicative of a BEC attack from the text of the received email messages. One or more n-grams are generated, using the first classifier, based on the extracted terms. A vector representation of the extracted terms is generated, using a second classifier, based on the generated one or more n-grams. The second classifier includes a logit model. A weight coefficient is assigned to each of the one or more extracted terms based on an output of the trained logit model. A higher weight coefficient indicates higher relevancy to BEC attack of the corresponding term. A heuristic rule associated with the BEC attack is generated by combining the weight coefficients of a combination of the one or more extracted terms. | 2022-08-11 |
20220255951 | Holistic and Verified Security of Monitoring Protocols - Data is received that characterizes a computing architecture including at least one web-based server and an associated cryptographic web protocol to be implemented on such computing architecture according to a desired formal specification. Thereafter, a plurality of inattentive variants complying with the web protocol are generated without associated security checks. Messages to and from each inattentive variant are then monitored while executing the associated security checks. At least one security monitor is generated based on the monitored messages that is configured to address security vulnerabilities in the computing architecture relative to the formal specification. At least one generated security monitor can be later deployed in the computing architecture. Related apparatus, systems, techniques and articles are also described. | 2022-08-11 |
20220255952 | COALITION NETWORK IDENTIFICATION USING CHARGES ASSIGNED TO PARTICLES - One or more computing devices, systems, and/or methods are provided. Event information associated with a plurality of events may be identified. The plurality of events may be associated with first entities corresponding to a first entity type and second entities associated with a second entity type. A first network profile associated with the first entities and the second entities may be generated based upon the event information. An arrangement of particles corresponding to the first entities and the second entities may be generated. Charges associated with the particles may be determined based upon the first network profile. The particles may be rearranged to a second arrangement of particles based upon the charges. One or more clusters of particles in the second arrangement of particles may be identified. One or more coalition networks associated with fraudulent activity may be identified based upon the one or more clusters of particles. | 2022-08-11 |
20220255953 | FEATURE DETECTION WITH NEURAL NETWORK CLASSIFICATION OF IMAGES REPRESENTATIONS OF TEMPORAL GRAPHS - A computer implemented method of feature detection in temporal graph data structures of events, the method including receiving a temporal series of graph data structures of events each including a plurality of nodes corresponding to events and edges connecting nodes corresponding to relationships between events; rendering each graph data structure in the series as an image representation of the graph data structure including a representation of nodes and edges in the graph being rendered reproducibly in a cartesian space based on attributes of the nodes and edges, so as to generate a temporal series of image representations ordered according to the temporal graph data structures; processing the series of image representations by a convolutional neural network to classify the image series so as to identify a feature in the image series, the convolutional neural network being trained by a supervised training method including a plurality of training example image series in which a subset of the training examples are classified as including the feature. | 2022-08-11 |
20220255954 | DETECTION DEVICE, VEHICLE, DETECTION METHOD, AND DETECTION PROGRAM - An unauthorized message in an in-vehicle network is more accurately detected. A detection device includes: a monitoring unit configured to monitor, as target messages, an authorized message being periodically transmitted and the unauthorized message in the in-vehicle network, and monitor a reference message being periodically transmitted; a calculation unit configured to, based on a monitoring result of the monitoring unit, calculate a time difference between a time corresponding to a transmission time of the target message and a time corresponding to a transmission time of the reference message; and a detection unit configured to, based on the time difference calculated by the calculation unit, perform a detection process of detecting the unauthorized message. | 2022-08-11 |
20220255955 | Systems and Methods for Dynamically Restricting the Rendering of Unauthorized Content Included in Information Resources - Systems and methods for dynamically restricting rendering of unauthorized content included in information resources are provided herein. A computing device can identify an information resource including a content object specifying one or more graphical characteristics. The computing device can determine that the content object corresponds to a restricted content object by applying at least one of an action-based detection policy to detect actions performed on the information resource or a visual-based detection policy to detect the graphical characteristics of the content object. The computing device can modify by applying a content rendering restriction policy the information resource to alter rendering of the content element on the information resource responsive to the determination. | 2022-08-11 |
20220255956 | Multi-stage network scanning - Methods and systems for scanning a network. The disclosed methods may involve receiving a list of a plurality of target devices and scanning a first device to determine if a particular port and protocol combination appears to be open on the first device. Upon determining that a particular port and protocol combination appears to be open on the first device, the method involves interrogating the first device before or during scanning of a second device to gather data regarding a service running on the first device. | 2022-08-11 |
20220255957 | AUTOMATED AND SCALABLE WORKER ORCHESTRATION FOR CLOUD-BASED COMPUTER FORENSIC ANALYSIS - Disclosed are techniques for performing forensic analysis of computer systems in a cloud network. The techniques can include using a scalable, cloud-based, specialized computer architecture for performing the forensic analysis of computer systems. | 2022-08-11 |
20220255958 | SYSTEMS AND METHODS FOR DYNAMIC ZONE PROTECTION OF NETWORKS - Disclosed are systems and methods for securing a network using one or more controllers and one or more network nodes. A method may utilize a packet processing engine configured to process incoming network packets, a processing analysis engine configured to perform relatively more complex processing and analysis, and one or more controllers configured to coordinate one or more packet processing engines and one or more processing analysis engines across a network to perform endpoint threat detection and mitigation. | 2022-08-11 |
20220255959 | SYSTEMS AND METHODS FOR MITIGATING RISKS OF THIRD-PARTY COMPUTING SYSTEM FUNCTIONALITY INTEGRATION INTO A FIRST-PARTY COMPUTING SYSTEM - In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems. The risk management and mitigation computing system can generate a recommended control when integrating the third party computing system functionality. | 2022-08-11 |
20220255960 | ROGUE DEVICE DETECTION INCLUDING MAC ADDRESS SPOOFING DETECTION - Systems, methods, and related technologies including media access control (MAC) address spoofing detection are described. The MAC address spoofing detection and response may include accessing a first MAC address associated with a first communication on a first port of a first network device and accessing a second MAC address associated with a second communication on a second port of a second network device. Whether the first MAC address and the second MAC address match may be determined. Information associated with a third communication associated with the first MAC address on the first port of the first network device and information associated with a fourth communication associated with the second MAC address on the second port of the second network device may be accessed. An action may be performed associated with the second port of the second network device based on the second MAC address matching the first MAC address. | 2022-08-11 |
20220255961 | ABUSE MAILBOX FOR FACILITATING DISCOVERY, INVESTIGATION, AND ANALYSIS OF EMAIL-BASED THREATS - Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious. | 2022-08-11 |
20220255962 | SYSTEMS AND METHODS FOR CREATION, MANAGEMENT, AND STORAGE OF HONEYRECORDS - The present disclosure is directed to systems and methods for creating, managing, and storing synthetic data that is designed to be placed within databases having real data to deceive, attract, detect and/or track unauthorized access thereof. The synthetic data can be stored as a honeyrecord in a database table that is interspersed with real data such that the honeyrecord is indistinguishable from real data or combined to form a honeytable having multiple honeyrecords therein. In some embodiments, the synthetic data can be used to create a user persona having one or more parameters to construct a profile or an identity honeyrecord of an individual. The parameters can include private information such as name, sex, passport number, social security number, bank account or credit card details, biometric details, passwords, and other information that is attractive to hackers and other data thieves. Creation of the honeyrecord can be performed without referencing any aspect of real data that is stored within the database, knowledge of the real data, or access to the database. Once created, the system can monitor the honeyrecords for release in online sources or for other forms of interaction, which can indicate that a breach took place. | 2022-08-11 |
20220255963 | DATA LINK LAYER AUTHENTICITY AND SECURITY FOR AUTOMOTIVE COMMUNICATION SYSTEM - The present disclosure relates to authenticity and data security for bus based communication networks in a vehicle. The present disclosure teaches a protocol frame, a sender on data link layer, and a receiver on data link layer providing such authenticity and data security as well as a communication network in a vehicle employing the protocol frame, the sender and the receiver according to the present disclosure. | 2022-08-11 |
20220255964 | Stability criterion for time-delay of cyber-physical power systems under distributed control - The present disclosure provides a stability criterion for time-delay of cyber-physical power systems under distributed control, which relates to a field of cyber-physical power systems technologies. The method first establishes an cyber side model of the cyber-physical power systems under distributed control and a physical power grid model of the cyber-physical power systems under distributed control respectively; then establishes simultaneous equations of the cyber side model and the physical power grid model to establish an unified differential algebraic equation model of the cyber-physical power systems under distributed control, so as to obtain a time-delay characteristic equation expression of the cyber-physical power systems under distributed control; determines a time-delay of each node, and solving the time-delay characteristic equation expression to obtain a maximum characteristic root, and performing the stability criterion for the time-delay of the cyber-physical power systems under distributed control according to a real part of the maximum characteristic root. | 2022-08-11 |
20220255965 | CYBER RISK ANALYSIS AND REMEDIATION USING NETWORK MONITORED SENSORS AND METHODS OF USE - Systems and methods for cyber risk analysis and remediation using network monitored sensors are provided herein. An example system includes one or more data collecting devices deployed within a network that collect entity information and monitor network traffic of the network that is related to security information. The network includes computing systems that are subject to a cyber risk policy having breach parameters defining one or more events that are indicative of a cyber security breach. A cyber security risk assessment and management system is used to automatically detect occurrence of one or more of the events that are indicative of a cyber security breach, automatically determine the breach parameters that apply for the one or more events that occurred, and generates a remediation of cyber security parameters for the network. | 2022-08-11 |
20220255966 | Method and System for Secure Container Application Framework - An edge device may be configured to generate a secure container to perform a software application on the edge device. A security daemon operating on a processor of the edge device may receive a security policy for the software application from a secure container platform, retrieve a license associated with the software application, and determine permissions of the software application based on the retrieved license. The edge device may create a user or group account and updating a system service access-control list (ACL) based on the received security policy and the determined permissions, and generate and send a policy ready message to the secure container platform in response to creating the user or group account and updating the system service ACL. | 2022-08-11 |
20220255967 | Cloud application design for efficient troubleshooting - Systems and methods include providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network; continuously collecting packets intercepted by the enterprise application over a time interval, wherein the collected packets are collected over the time interval; and responsive to an issue with functionality of the enterprise application, transmitting the collected packets to a back end server for troubleshooting of the issue. The time interval is a set amount of time, and each collected packet is deleted at the expiration of the time interval. | 2022-08-11 |
20220255968 | SYSTEMS AND METHODS FOR PROVIDING NETWORK SECURITY USING A SECURE DIGITAL DEVICE - A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions. | 2022-08-11 |
20220255969 | RECONCILIATION DIGITAL FACILITATORS IN A DISTRIBUTED NETWORK - A method for use in a hybrid network ecosystem comprising an enterprise network and a reconciliation network, the method comprising generating, by at least one first computing node in the enterprise network or the reconciliation network, a first digital facilitator, wherein the first digital facilitator enables a first device to use a private key to access data associated with a distributed ledger operation. The method also comprises transmitting, via the reconciliation network, the data from the first computing device to a second computing device, wherein the first computing device and the second computing device are connected via the reconciliation network. | 2022-08-11 |
20220255970 | Deploying And Maintaining A Trust Store To Dynamically Manage Web Browser Extensions On End User Computing Devices - Aspects of the disclosure relate to deploying and maintaining a trust store to dynamically manage web browser extensions on end user computing devices. In some embodiments, an end user computing device may receive a user request to access resources located outside of the enterprise computing infrastructure. The end user computing device may extract and collect user attributes, system attributes, and request attributes from the user request, and deliver the attributes to an enterprise computing platform. The enterprise computing platform may evaluate the attributes to generate a trust score and rules. The enterprise computing platform may deliver the trust score and the rules to the web browser extension associated with the end user computing device. The web browser extension may analyze the trust score using the rules generated by the enterprise computing platform to either grant or deny the user request. | 2022-08-11 |
20220255971 | COORDINATION BETWEEN WIRELINE AND WIRELESS POLICY CONTROLLERS - Embodiments of the disclosure provide a method, device and computer readable medium for coordination between wireline and wireless policy controllers. According to embodiments of the present disclosure, the service controller is able to coordinate between information about a wireless subscription for mapping from a traffic multiplexer used in a wireline access to a wireless data session selector and information sent to a wireline Residential Gateway device about mapping application traffic to a traffic multiplexer used in a wireline access. | 2022-08-11 |
20220255972 | PERSONALIZED CONTENT SHARING PLATFORM - A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method for providing personalized content sharing service is presented. Consistent with some embodiments, the method may include receiving a request to share a content item with a member of the social network. The method may further include determining an interest of the member of the social network based on social data about the member of the social network. A customized posting to share the content item with the member of the social network is then generated using the interest of the user. | 2022-08-11 |
20220255973 | SIMULATING USER INTERACTIONS OVER SHARED CONTENT - Methods, systems, apparatuses, and computer-readable media are provided for simulating user interactions with shared content. In one implementation, the computer-readable medium includes instructions to cause a processor to establish a communication channel for sharing content and user interactions; transmit to at least one second wearable extended reality appliance, first data, representing an object associated with first wearable extended reality appliance, enabling a virtual representation of the object to be displayed through the at least one second wearable extended reality appliance; receive image data from an image sensor associated with the first wearable extended reality appliance; detect in the image data at least one user interaction including a human hand pointing to a specific portion of the object; and transmit to the at least one second wearable extended reality appliance second data indicating an area of the specific portion of the object. | 2022-08-11 |
20220255974 | SYSTEMS AND METHODS FOR VIRTUAL WHITEBOARDS - Methods, systems, apparatuses, and non-transitory computer-readable media are provided for tying virtual whiteboards to physical spaces. In one implementation, the computer-readable medium includes instructions to cause a processor to receive wirelessly, an indication of a location of a first wearable extended reality appliance; perform a lookup to determine that the location of the first wearable extended reality appliance corresponds to a location of a particular virtual whiteboard; transmit to the first wearable extended reality appliance, data corresponding to content of the particular virtual whiteboard; receive, during a first time period, virtual content added by a first user; receive wirelessly at a second time period an indication that a second wearable extended reality appliance is in the location of the particular virtual whiteboard; and transmit to the second wearable extended reality appliance, data corresponding to the content and the added content of the particular virtual whiteboard. | 2022-08-11 |
20220255975 | TEXT DATA TRANSMISSION-RECEPTION SYSTEM, SHARED TERMINAL, AND METHOD OF PROCESSING INFORMATION - A text data transmission-reception system includes a plurality of user terminals; a shared terminal; and an information processing apparatus connectable to each of the plurality of user terminals and the shared terminal via a network. The information processing apparatus includes circuitry configured to receive text data transmitted and received between the plurality of user terminals; determine whether or not the text data transmitted and received between the plurality of user terminals includes a request for controlling the shared terminal; and control the shared terminal based on a determination that the text data includes the request for controlling the shared terminal. | 2022-08-11 |
20220255976 | METHOD AND SYSTEM FOR PROVIDING ELASTIC MEDIA FORKING INFRASTRUCTURE TO CLOUD DISTRIBUTED REAL-TIME APPLICATIONS - A computerized-method for providing an elastic media forking infrastructure to cloud distributed real-time applications, is provided herein. In a network having a direct media streaming between a first media-client and a source device, in a direct media streaming mode, upon receiving a request from a second media-client, via a signaling protocol, to receive media from the source device, switching from the direct media streaming mode to a media forking mode by starting a media forting service on a media forking infrastructure. Upon receiving a request from the second media-client to terminate media reception from the source device, switching from media forking mode to direct streaming mode, by ending the media forking service, and operating the direct media streaming between the first media-client and the source device. | 2022-08-11 |
20220255977 | METHODS, SYSTEMS, AND APPARATUSES FOR IMPROVED CONTENT DELIVERY - Methods, systems, and apparatuses for improved content delivery are described herein. During delivery of content to one or more user devices of a content distribution network (CDN), a content session may be created for each user device. During each content session, each user device may send one or more upstream communications, such as heartbeat signals and bitrate requests, to the CDN. A monitoring module of the CDN may aggregate the upstream communications into session data. The monitoring module may use the session data to determine an impairment associated with content delivery to the one or more user devices. | 2022-08-11 |
20220255978 | PROTOCOL CONVERSION OF A VIDEO STREAM - Aspects of the technology described herein are directed towards systems, methods, and computer storage media for, among other things, converting a video stream being transmitted in a first streaming protocol to a second streaming protocol without transcoding the content communicated in the video stream. For example, the technology described herein may convert an RTP video stream to a non-RTP video stream without transcoding. The technology described herein extracts a plurality of media content from an RTP package and repackages the extracted content into a non-RTP streaming protocol, such as WebRTC or HLS. Moreover, the technology described herein can provide for the synchronization of video and audio data during conversion. | 2022-08-11 |
20220255979 | VIDEO STREAM MANAGEMENT FOR REMOTE GRAPHICAL USER INTERFACES - Embodiments enable display updates other than a video stream in a graphical user interface (GUI) to be rendered, encoded, and transmitted exclusive of the video stream. A virtual machine generates a GUI that includes an encoded video stream and other display updates. A virtual graphics processing unit (VGPU) stack associated with the VM renders the other display updates of the GUI to a framebuffer. The rendered display updates are encoded and transmitted to a client for display. The encoded video stream, or a modified (e.g., reduced bit rate) version of the encoded video stream, may be transmitted to the client, such that the client can display the encoded video stream within the GUI. For example, the encoded video stream may be selectively transmitted to the client based on the performance capabilities of the client. | 2022-08-11 |
20220255980 | SEE, DO, REVIEW, FULL-CYCLE INSTRUCTION PERFORMANCE ANALYSIS PROCESS AND SYSTEM - A system includes a playbook generation module, a coaching computer module linked to the playbook generation module, an electronic playbook, and a wearable player electronic display. The playbook generation module is configured to provide an interface for developing a first play and a second play, the second play being different than the first play. The coaching computer module is configured to receive from a user at least a first selection signal corresponding to the first play and a second selection signal corresponding to the second play. The electronic playbook stores the first play and the second play and is configured to receive the first selection signal and the second selection signal from the coaching computer module. The wearable electronic player display is configured to receive the first play corresponding to the first selection signal and the second play corresponding to the second selection signal. | 2022-08-11 |
20220255981 | Method and Apparatus for Adjusting Attribute of Video Stream - A method for adjusting an attribute of a video stream includes determining a scenario of a first conference site based on image content of a first video stream of the first conference site, determining target attribute information of the first video stream based on a packet loss rate of the first video stream and the scenario, wherein the target attribute information comprises a target resolution and/or a target frame rate, and adjusting attribute information of the first video stream to the target attribute information. | 2022-08-11 |
20220255982 | CONTROLLING A DISPLAY TO PROVIDE A USER INTERFACE - Visual content to be displayed on a display of a user device is received. Obfuscation data for obscuring the visual content is generated and the obscured visual content is displayed on the display. A request to stop obscuring the visual content is transmitted from the user device to a remote device, in response to a drag gesture detected at the user device. As the drag gesture is performed, the obfuscation data is modified to reduce a level of obfuscation applied to the visual content before the request has been accepted, so that the visual content remains obscured but with a lower level of obfuscation. If the request is subsequently accepted at the remote device, the display is controlled to stop obscuring the visual content, thereby rendering the visual content fully visible on the display. | 2022-08-11 |
20220255983 | CONDUCTING INVESTIGATIONS UNDER LIMITED CONNECTIVITY - Systems and methods are provided for obtaining and providing one or more resources for an investigation to be conducted remotely from a server. Resources needed to conduct an investigation may include one or more portions of a database and/or one or more functionalities of a data analysis platform. Based on the investigation to be conducted (e.g., type of investigation, location of investigation, personnel involved, etc.), a computing system may obtain different amounts/types of resources from the server. The investigation may be conducted via a web application that runs on the computing system. The web application may access the resources obtained from the server. The results of the investigation may be sent by the computing system to the server. The computing system may receive updates from the server. The computing system may act as a server for other remote systems that are conducting investigations. | 2022-08-11 |
20220255984 | System and Method to Standardize and Improve Implementation Efficiency of User Interface Content - A system and method to improve implementation efficiency of user interface content by using standard content attributes used across all platforms and devices to implement a lowest common denominator programming system. Standardized content attributes are used to produce a universal content framework that is implemented identically across various devices and platforms, resulting in a consistent and standardized user experience. The invention allows programming functionality to be universally applied and usable with any device and platform so that significant computer programming and updating inefficiencies are eliminated. | 2022-08-11 |
20220255985 | METHOD AND DEVICE FOR PROVIDING SHARED LINK OF VISUAL CONTENT FOR SHARING CREATED VISUAL CONTENTS - A method for providing a shared link of visual content performed by a server includes (a) receiving an upload request of a visual content from first and second terminals in response to project members through an upload area in main interface; (b) providing a shared link access information input area and an authority setting area to the first terminal or the second terminal; (c) generating a shared link in which the uploaded visual content is displayed based on the input shared link access information, and providing access information of the shared link to a third terminal; and (d) grasping whether the third terminal is a previously registered terminal based on user identification information input from the third terminal when the third terminal is accessed through the shared link, and providing a sharing interface, which is preset according to whether the registration is performed, to the third terminal. | 2022-08-11 |
20220255986 | Cloud Queue Tombstone - Example techniques relate to cloud queue tombstones. An example implementation may involve a computing system receiving instructions to remove a particular media item from a playback queue. Based on the instructions, the computing system removes the particular media item from the playback queue and adds, to the playback queue, a tombstone indicator indicating that the particular media item has been removed from the playback queue. The computing system receives, from the media playback system, a request for a window of one or more media items from the playback queue. Based on the request, the computing system sends, to the media playback system, data representing a particular window of media items from the playback queue, wherein the particular window includes the tombstone indicator. The computing system detects a given tombstone removal trigger from among multiple tombstone removal triggers and based on the detecting, removes the tombstone indicator from the playback queue. | 2022-08-11 |
20220255987 | METHOD FOR LINKING OBJECTS OF A CONTROL PROGRAM OF A CONTROL UNIT OF AN AUTOMATION SYSTEM, AND DEVELOPMENT ENVIRONMENT - A method is provided for linking objects of an open platform communication unified architecture (OPC UA) data communication standard with objects of a programmable logic controller (PLC) code of a controller of an automation system is provided. The method comprises reading an OPC UA node set of a companion specification, generating OPC UA instances of the OPC UA object types of the OPC UA node set for the automation system, combining the OPC UA instances in an OPC UA instance node set, generating PLC objects in a PLC code of a control program of the automation system, and linking the OPC UA instances of the OPC UA instance node set with PLC objects of the PLC code of the control program. A development environment for carrying out the method is also provided. | 2022-08-11 |
20220255988 | Systems and Methods for Collaborative Edge Computing - An edge computing system configured to dynamically offload tasks from a user device to an edge device. The edge device may receive a request to download or run a software application suitable processing a sensory feed collected by the user device. The edge device may determine operating requirements of the software application, determine the internal capabilities of the edge device, and compare the determined operating requirements of the software application to the determined capabilities of the edge device to determine whether the edge device is capable of running the entire software application. The edge device may also determine whether the edge device is capable of running a portion of the software application in response to determining that the edge device is not capable of running the entire software application. The edge device may send a message identifying portions that could be run on the edge device. | 2022-08-11 |
20220255989 | SYSTEMS AND METHODS FOR HYBRID BURST OPTIMIZED REGULATED WORKLOAD ORCHESTRATION FOR INFRASTRUCTURE AS A SERVICE - Systems and methods for hybrid burst optimized regulated workload orchestration for infrastructure as a service are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a method for providing hybrid burst optimized regulated workload orchestration for infrastructure as a service may include: (1) receiving a job request for a job comprising at least one job requirement from a job requester; (2) calculating a cost of job for the job based on the at least one job requirement; (3) identifying an IaaS provider from a plurality of IaaS providers that meets the job requirements and the cost of job, wherein the plurality of IaaS providers comprises at least one on-premises IaaS provider and the at least one off-premises IaaS provider; (4) executing an IaaS request for the identified IaaS provider; and (5) monitoring execution of the job by the identified IaaS provider. | 2022-08-11 |
20220255990 | TOPOLOGICAL ORDERING OF BLOCKCHAIN ASSOCIATED PROPOSALS - A processor may record one or more transaction proposals regardless of validity of the one or more transaction proposals. The processor may separate a transaction validation into a series of steps. The processor may validate, asynchronously, one or more transactions respectively associated with each of the one or more transaction proposals based on the transaction validation. | 2022-08-11 |
20220255991 | METHODS AND APPARATUS FOR PEER-TO-PEER DATA CHANNELS FOR STORAGE DEVICES - A method may include transferring data between a host and a first storage device through a first storage interface, transferring data between the host and a second storage device through a second storage interface, and transferring data between the first storage device and the second storage device through a peer-to-peer channel. A storage system may include a host interface, a first storage device having a first storage interface coupled to the host interface, a second storage device having a second storage interface coupled to the host interface, and a peer-to-peer bus coupled between the first and second storage devices. A storage device may include a storage medium, a storage device controller coupled to the storage medium, a storage interface coupled to the storage device controller, and a peer-to-peer interface coupled to the storage device controller. | 2022-08-11 |
20220255992 | Malleability of Transactions for Inclusion in a Blockchain - A method of recording a target transaction in a blockchain, comprising: obtaining an updated version of the target transaction, being updated relative to a pre-existing first version; and instead of the first version, sending the updated version to be propagated through a network of nodes to be recorded in the blockchain. The target transaction comprises an input comprising an unlocking script and a pointer to an output of a first transaction, the output of the first transaction comprising a locking script specifying a plurality of alternative conditions for unlocking that output. The unlocking script of the first version of the target transaction is configured to unlock the first output of the first transaction based on a first of said alternative conditions, and the unlocking script of the updated version is configured to unlock it based on a second one of said alternative | 2022-08-11 |
20220255993 | REPLICATING DATA OVER A PUBLIC NETWORK - A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node. | 2022-08-11 |
20220255994 | DATA PROCESSING DEVICE AND DATA PROCESSING SYSTEM - A data processing device includes a first CPU (Central Processing Unit), a first memory, a CAN (Controller Area Network) controller and a system bus coupled to the first CPU, the first memory and the CAN controller, wherein the CAN controller comprises a receive buffer that stores a plurality of messages each of which has a different ID, and a DMA (Direct Memory Access) controller that selects the latest message among messages having a fist ID stored in the receive buffer and transfers the selected latest message to the first memory, wherein the message is one of CAN, CAN FD and CAN XL messages. | 2022-08-11 |
20220255995 | SYSTEMS AND METHODS FOR SHARING OBSCURED CONTENT TO PROVIDE SITUATIONAL AWARENESS - Systems, methods, and non-transitory computer readable media for providing situational awareness to users of wearable extended reality appliances are disclosed. In one implementation, a non-transitory computer readable medium contains instructions that when executed by at least one processor cause the at least one processor to: cause virtual content to be displayed through a first wearable extended reality appliance; detect a second wearable extended reality appliance in proximity to the first wearable extended reality appliance; establish a link between the first wearable extended reality appliance and the second wearable extended reality appliance; and transmit data representing at least a portion of the virtual content in an obscured form to the second wearable extended reality appliance, wherein the obscured form provides an indication of a position of the at least a portion of the virtual content in a three-dimensional space without revealing substance of the virtual content in obscured form. | 2022-08-11 |
20220255996 | SYSTEMS AND METHODS FOR EXPOSING USER EQUIPMENT IDENTITIES TO APPLICATIONS - A system comprises a Network Exposure Function (NEF) and a Session Management Function (SMF). The MF may be configured to: receive, from the NEF, a first request to subscribe to a notification service offered by the SMF; send a create session request to a User Plane Function (UPF); receive a first response from the UPF to the create session request, wherein the first response includes binding information that pertains to an association between a User Equipment device (UE) identifier (ID) and Internet Protocol (IP) addresses; and send, as part of the notification service, a message that includes the binding information to the NEF. | 2022-08-11 |
20220255997 | MICROCONTROLLER DEVICE FOR SECURE COMMUNICATION - A microcontroller attachment for use with a microcontroller. The microcontroller attachment includes a first network interface controller (NIC) configured to communicate with a first dynamic host configuration protocol (DHCP) server to receive a first DHCP address and configured to establish a virtual private network (VPN) connection for a computing device to communicate with a remote server, the first NIC configured to be communicatively coupled to the computing device. The microcontroller attachment further includes a second NIC configured to receive a second DHCP address from a second DHCP server running on the microcontroller and send the second DHCP address to the computing device. | 2022-08-11 |
20220255998 | ELECTRONIC DEVICE FOR PERFORMING EDGE COMPUTING SERVICE AND A METHOD FOR THE SAME - An electronic device and an operation method of an electronic device are provided. The electronic device includes a memory storing an application, an edge enabler client (EEC), and/or a user equipment (UE) selection route policy (USRP) rule used for producing a session used by the electronic device, a communication circuit used for a communication connection between the electronic device and at least one of a first server, a plurality of second servers, or a third server disposed outside the electronic device, via a base station, and a processor, the application being configured to perform, in the electronic device, one or more services corresponding to an application executable in the third server, and the processor is configured to identify identification information of the EEC and identification information of an EEC included in the USRP rule, in response to activation of the EEC, to set a first packet data unit (PDU) session. | 2022-08-11 |
20220255999 | FUNCTION-AS-A-SERVICE FOR TWO-WAY COMMUNICATION SYSTEMS - The present disclosure relates generally to systems and methods for facilitating two-way communication sessions using serverless cloud-based functions configured in a function-as-a-service (FaaS) system. One example includes accessing a template configured to execute a response based on an event, facilitating a two-way communication session with a user device, and processing data of the two-way communication session to identify an event trigger corresponding to the template. Execution of a serverless cloud-based function associated with the event trigger is requested, and one or more outputs of the serverless cloud-based function associated with the event trigger are integrated into the two-way communication session. | 2022-08-11 |
20220256000 | NETWORK CONNECTION METHOD AND NETWORK DEVICE USING NETWORK CONNECTION METHOD - A network connection method is provided. The network connection method includes: transmitting a detection instruction in a preset format to a second network device to instruct the second network device to query second network address information conforming to a standard of the detection instruction according to the protocol identification information; receiving the second network address information fed back by the second network device according to the first network address information, and connecting to the second network device according to the second network address information. According to the network connection method in the present application, network address information of other network devices can also be obtained by only sending an unidirectional detection instruction although other network devices are unknown to the first network device, so that these network devices can be conveniently connected through a network application. | 2022-08-11 |
20220256001 | METHODS FOR SEAMLESS SESSION TRANSFER WITHOUT RE-KEYING - A method for a seamless transfer of a secure multimedia conference session from one endpoint device to another without a need to rekey the session is provided. In this method, a first endpoint device connects a participant to a multimedia conference session to which at least one other participant is connected and based on detecting one or more second endpoint devices within a predetermined location proximity of the first endpoint device, determines whether to transfer the multimedia conference session to a target endpoint device. Based on determining that the session is to be transferred, the first endpoint device establishes a secure pairing connection directly with the target endpoint device and provides, via the secure pairing connection, information about the multimedia conference session based on which the multimedia conference session is transferred to the target endpoint device without rekeying the multimedia conference session. | 2022-08-11 |
20220256002 | HIERARCHY AWARE GRAPH REPRESENTATION LEARNING - A method includes executing operations to generate a first enhancement function based on a parent-child link in a content hierarchy including a link between a parent node in a first level of the content hierarchy to a child node in a second level of the content hierarchy below the first level. A second enhancement function is generated based on a sibling link in the content hierarchy including a link between a sibling node in a third level of the content hierarchy and a sibling node in the third level of the content hierarchy sharing a common parent node with the first sibling node in a fourth level of the content hierarchy above the third level. A user content consumption metric is generated based on the first and second enhancement functions. A content list including a set of candidate content items ranked based on the user content consumption metric is generated. | 2022-08-11 |
20220256003 | REAL-TIME DETECTION OF COMPLETION OF SENSOR WRAP COMPLETION IN GNMI TELEMETRY OF A NETWORK DEVICE - A device may provide, to a network device, a subscribe request that includes a request for sensor data, and may receive sensor data packets that include the sensor data and header extensions identifying a group identifier for a group of sensor data and final packet information indicating whether the sensor data packet is a final one for the group. The device may store the sensor data packets until the final packet information of one of the sensor data packets indicates that the one of the sensor data packets is a final sensor data packet for the group, and may identify a complete set of the sensor data packets when the final packet information of the one of the sensor data packets indicates that the one of the sensor data packets is the final sensor data packet. The device may perform actions based on the complete set. | 2022-08-11 |