23rd week of 2018 patent applcation highlights part 68 |
Patent application number | Title | Published |
20180159810 | DISPLAYING CONVERSATIONS IN A CONVERSATION-BASED EMAIL SYSTEM - A method and system for processing messages is disclosed that includes receiving a plurality of messages directed to a user, where each message has a unique message identifier. Each of the plurality of messages may be associated with a respective conversation, where each conversation has a respective conversation identifier. Also, each conversation includes a set of one or more messages sharing a common set of characteristics that meet a first predefined criteria. A list of conversations is displayed as a set of rows in an order determined by a second predefined criteria, where each row corresponds to one of the listed conversations and includes at least a sender list, a conversation topic and a date/time value. The contents of a conversation is displayed when the user selects a conversation from the displayed list of conversations. Messages can be displayed in one of three modes: expanded, compacted and hidden. | 2018-06-07 |
20180159811 | GENERATING AN INTERFACE IDENTIFYING TO A USER CONTENT ITEMS PROVIDED TO GROUPS MAINTAINED BY AN ONLINE SYSTEM THAT INCLUDE THE USER - An online system maintains groups of online system users. When content is provided to a group, the online system presents the content to users included in the group. To allow a user to more easily access content provided to groups including the user, the online system identifies groups including the user and retrieves content items provided to the identified groups. The online system provides at least a set of the retrieved content items to an application executing on a client device associated with the user along with instructions for generating an interface. Executing the instructions causes the client device to generate an interface that presents representations of the retrieved content items in a portion of a display and describes the identified groups in an additional portion of the display. Based on interactions received from the user, the client device modifies representations of the retrieved content items presented to the user. | 2018-06-07 |
20180159812 | TECHNIQUES TO VISUALIZE MESSAGING FLOW - Techniques to visualize messaging flow are described. In one embodiment, an apparatus may comprise a messaging component operative to receive a message package at a client device, the message package comprising a primary message portion and a quoted message portion, the quoted message portion comprising a quoted message identifier; determine whether a quoted message store corresponding to the quoted message identifier is present on the client device; retrieve a primary message from the primary message portion; retrieve a quoted message based on the quoted message store where the quoted message store corresponding to the quoted message identifier is present on the client device; and retrieve the quoted message from the quoted message portion of the message package where the quoted message store corresponding to the quoted message identifier is not present on the client device. Other embodiments are described and claimed. | 2018-06-07 |
20180159813 | SOURCE-AWARE TECHNIQUE FOR FACILITATING LISP HOST MOBILITY - A method is provided in one example embodiment and includes detecting by a first network element at a first data center site a local connection of an endpoint identifier (“EID”), in which the EID was previously locally connected to a second network element at a second data center site and notifying a mapping server of the local connection of the EID to the first network element. The method further includes receiving from the mapping server identifying information for the second network element and communicating with the second network element using the identifying information to obtain service information for traffic associated with the EID. The method may also include applying a service identified by the service information to outgoing traffic from the EID as well as applying a service identified by the service information to incoming traffic for the EID. | 2018-06-07 |
20180159814 | METHODS AND SYSTEMS FOR UPDATING DOMAIN NAME SERVICE (DNS) RESOURCE RECORDS - The present invention discloses methods and systems for updating domain name service (DNS) resource records. An update message is received at a first system from a network node periodically and upon occurrence of a first predefined event. The DNS resource record is updated at the first system substantially based on the update message. The update message comprises an Internet Protocol (IP) address field, a unique identifier field, and a network interface identifier field. The network node comprises a plurality of network interfaces. | 2018-06-07 |
20180159815 | SELECTIVELY EXTENDING LIFE OF PREFETCHED CONTENT FOR DOMAIN NAME SYSTEM CONTENT DELIVERY - A method for selectively extending a life of prefetched content for DNS content delivery is disclosed. The method includes providing a cache to keep at least one DNS entry. The DNS entry includes a domain name and a DNS answer associated with the domain name. The DNS entry is assigned a lifetime. The method includes determining that a DNS query is received, wherein the DNS query includes a further domain name matching the domain name of the DNS entry. The method further includes determining that the lifetime of the DNS entry is to expire within a pre-determined interval. In response to the determination, the method allows sending the DNS query to an authoritative DNS to obtain a further DNS answer associated with the domain name. If the further DNS answer is not received, the method generates a copy of the DNS entry with a shorter lifetime. | 2018-06-07 |
20180159816 | DYNAMIC EVOLVED PACKET DATA GATEWAY SELECTION - In aspects of the disclosure, a method, an apparatus, and a computer program product for wireless communication are provided. In one aspect, the apparatus determines if a connection to a PLMN has been established. In another aspect, the apparatus builds a FQDN based on the determination by attempting to build the FQDN using each of the prioritized FQDNs in order of priority until the FQDN is built, building the FQDN using a PLMN ID of the PLMN if it is determined that the PLMN is found in the list, or building the FQDN based on the wildcard PLMN if it is determined that the list comprises the wildcard PLMN. Further still, the apparatus selects an ePDG based on the FQDN. | 2018-06-07 |
20180159817 | SYSTEMS AND METHODS FOR LOCALIZATION BASED ON INTERNET TERMINAL LOCATION - Methods and systems for providing sourcing Internet access requests from ISP subscribers serviced by a gateway not physically located near the subscribers. As the localization needs of all subscribers are not necessarily the same, the gateway determines an appropriate source IP address to use to ensure that the IP protocol localization features work efficiently. In addition, the gateway can help enforce rules related to the governing law of the geographic area of the subscriber and/or rules based on the content providers licensing. Through determination of the context of a request, the gateway may also determine whether localized sourcing of a request is necessary based on the type of content being requested. | 2018-06-07 |
20180159818 | Router Node, Network and Method to Allow Service Discovery in a Network - A router node for a network is described. The router node comprises: a transceiver; an interface operably coupled to the transceiver; and a signal processor operably coupled to the transceiver and configured to support a consensus protocol. The signal processor is operably coupled to a cache and configured to receive and distribute resource records to other nodes in the network via the interface and store the resource records in the cache. | 2018-06-07 |
20180159819 | Methods and System for Allocating an IP Address for an Instance in a Network Function Virtualization (NFV) system - A non-transitory computer-readable medium storing computer instructions for allocating an IP address for an instance in a network function virtualization (NFV) system, that when executed by one or more processors, cause the one or more processors to perform the steps of obtaining a first requirement of IP address allocation from VNFD by a first node in the NFV system, determining a second requirement of IP address allocation for the instance according to the first requirement; and sending to a second node in the NFV system the second requirement, wherein the IP address is allocated for the instance based upon the second requirement. | 2018-06-07 |
20180159820 | CONFIGURING DNS CLIENTS - Techniques are provided for increasing the efficiency and efficacy of DNS clients. In one technique, DNS clients log information about performance of one or more DNS servers that the DNS clients use to resolve DNS resolution requests. The DNS clients send, to a control server, performance data regarding the DNS resolution requests and/or subsequent connections to servers associated with resolved domain names. Based on the performance data, the control server sends, to one or more DNS clients, configuration data that adjusts the configuration of the DNS clients. For example, if a particular DNS server is taking a considerable amount of time to resolve DNS resolution requests from one or more DNS clients, then the control server may send, to a plurality of DNS clients, configuration data that indicates a different set of one or more DNS servers for the plurality of DNS clients to contact for subsequent DNS resolution requests. | 2018-06-07 |
20180159821 | PROVIDING SERVICES FOR LOGICAL NETWORKS - Some embodiments provide a method for a network controller that manages several logical networks. The method receives a specification of a logical network that includes at least one logical forwarding element attached to a logical service (e.g., DHCP). The method selects at least one host machine to host the specified logical service from several host machines designated for hosting logical services. The method generates logical service configuration information for distribution to the selected host machine. In some embodiments, the method selects a master host machine and a backup host machine for hosting logical service. In some embodiments, a particular one of the designated host machines hosts at least two DHCP services for two different logical networks as separate processes operating on the particular host machine. | 2018-06-07 |
20180159822 | SYSTEMS AND METHODS FOR FORMING AN INCIDENT AREA NETWORK - A system and method for forming an incident area network including a first sub-system and a second sub-system. The method includes detecting, with an electronic processor of the first sub-system, a network connection to the second sub-system. The method includes initiating a sub-system synchronization process. The process includes including transmitting, from a first domain name server of the first sub-system to a second domain name server of the second sub-system, a first global network address for a first global application instance of the first sub-system, and a first name corresponding to the first global network address. The process includes transmitting, from a first network address translator of the first sub-system to a second network address translator of the second sub-system, the first global network address. The process includes synchronizing a first localized application instance of the first sub-system, with a second localized application instance of the second sub-system. | 2018-06-07 |
20180159823 | NETWORK ADDRESS TRANSLATION SERVER AND NETWORK ADDRESS TRANSLATION METHOD THEREOF - A NAT server and a NAT method thereof are provided. The NAT server receives a SIP message including private network RTP information from a user equipment. The NAT server modifies the private network RTP information of the SIP message into public network RTP information and creates in the mapping table a mapping record of the private network RTP information and the public network RTP information. The NAT server transmits the SIP message to a SIP server. The NAT server receives another SIP message from the SIP server, and determines that the public network RTP information of the another SIP message corresponds to the private network RTP information according to the mapping record. The NAT server modifies the public network RTP information of the another SIP message into the private network RTP information and transmits the another SIP message to another user equipment of the private network. | 2018-06-07 |
20180159824 | ACCESS POINT NAME MANAGEMENT - A computer device may include a memory configured to store instructions and a processor configured to execute the instructions to select to use an access point name (APN) table to be received from a wireless access network and attach to the wireless access network. The processor may be further configured to execute the instructions to receive a Protocol Configuration Options (PCO) message from the wireless access network; retrieve the APN table from the received PCO message; select an APN from the retrieved APN table; and connect to a packet data network associated with the selected APN via the wireless access network using the selected APN. | 2018-06-07 |
20180159825 | NETWORK HOST PROVIDED SECURITY SYSTEM FOR LOCAL NETWORKS - A gateway host connected to a network can be programmed to control packet traffic from other hosts on the network. The gateway host sends spoof packets to one or more of the other hosts, rendering them as controlled hosts. Each controlled host, having received the spoof packets, sends network packets for an intended destination, which are intercepted by the gateway host. The spoof packets have caused reconfiguration of the packet routing by the controlled host, such that network packets are rerouted upon their being sent from the controlled host. The gateway host renders a decision on the network packet traffic. | 2018-06-07 |
20180159826 | APPLICATION BASED NETWORK TRAFFIC MANAGEMENT - Described herein are systems, methods, and software to enhance network traffic management for virtual machines. In one implementation, a host for a virtual machine may identify applications available for execution on the virtual machine from mounted application volumes and identify firewall rules for the applications. Once identified, the host may identify network traffic for the virtual machine, and forward or block the network traffic for the virtual machine based on the firewall rules. | 2018-06-07 |
20180159827 | NON RFC-COMPLIANT PROTOCOL CLASSIFICATION BASED ON REAL USE - A firewall system determines whether a protocol used by an incoming data packet is a standard protocol compliant with Request For Comment (RFC) standards. In the event the protocol is RFC compliant, the firewall transmits the packet to the recipient according to firewall policies regarding the standard protocol. If the protocol is not that of an RFC standard, the firewall determines whether the protocol matches an RFC-exception protocol in a RFC-exception protocol database. If the protocol does match an RFC-exception, the firewall may transmit the packet to the recipient according to firewall policies regarding the RFC-exception protocol. If it does not match an RFC-exception, the firewall may transmit the packet or protocol to a support system where it may be quarantined until it is approved based on a decision that the protocol is safe and/or widely adopted. | 2018-06-07 |
20180159828 | MULTI-REGIONAL PROVISIONING - Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, configured to receive, at a module from a provisioning server, a node identification and an access code. The module joins a network that the module has not previously joined. The module provides the node identification to the network. The network uses the node identification and access code to verify that the module is valid. The module receives from the network a new encryption key to use when sending data on the network. The module encrypts data using the new encryption key. The encrypted data is transmitted on the network. | 2018-06-07 |
20180159829 | SYSTEM AND METHOD FOR COMPUTER BASED ASSESSMENT DISTRIBUTION AND PRINTING - This disclosure relates generally to computer based assessments, and more particularly to secured assessment distribution and printing. In one embodiment, the method includes mapping an assessment metadata with assessment conduction center (ACC) data to identify drive data having ACC location associated with candidates, count of candidates for each subject assessment, and subjects mapping with respective ACCs. The subjects are mapped with prestored content creator profile data to identify content creators capable of creating content for question papers corresponding to assessment subjects. The content for the question papers is bundled into distinct bundles that are encrypted with an encryption key based on schedule of assessment of assessment subject. The bundles are mapped with the drive data to identify bundles for respective ACCs and candidate profiles. The printing of respective questions papers is facilitated at respective ACC as per assessment schedule from the bundle for the respective ACC and the candidate profiles. | 2018-06-07 |
20180159830 | Obfuscating Source Code Sent, from a Server Computer, to a Browser on a Client Computer - Programs written in interpreted languages, such as JavaScript, are distributed in source form, which is helpful to attackers so that they can more easily derive the purposes and effects of a program. As discussed herein, a program's high-level code may be effectively obfuscated by transforming the program's code from its high-level programming language to low-level processor-specific language, such as x86 instructions for x86 processors, JVM bytecode for JVMs, or proprietary opcodes for a corresponding proprietary processor or interpreter. Additional obfuscation techniques can be applied the program's low-level processor-specific code. | 2018-06-07 |
20180159831 | PAIRWISE TEMPORAL KEY CREATION FOR SECURE NETWORKS - A system and method for establishing a pairwise temporal key (PTK) between two devices based on a shared master key and using a single message authentication codes (MAC) algorithm is disclosed. The devices use the shared master key to independently compute four MACs representing the desired PTK, a KCK, and a first and a second KMAC. The Responder sends its first KMAC to the Initiator, which retains the computed PTK only if it verifies that the received first KMAC equals its computed first KMAC and hence that the Responder indeed possesses the purportedly shared master key. The Initiator sends a third message including the second KMAC to the Responder. The Responder retains the computed PTK only if it has verified that the received second KMAC equals its computed second KMAC and hence that the Initiator indeed possesses the purportedly shared master key. | 2018-06-07 |
20180159832 | METHODS AND SYSTEMS FOR PROXYING DATA - Methods and systems are provided for proxying data between an application server and a client device. One exemplary application system includes an application server to generate a virtual application and a proxy server coupled to the application server over a network to provide the virtual application to a client device. The proxy server receives input data from the client device and provides the input data to the application server, wherein the application server encodes the input data for an action in response to authenticating the proxy server and provides the data encoded for the action to the proxy server. The proxy server performs the action on the data and provides the result to the client device. | 2018-06-07 |
20180159833 | METHOD AND APPARATUS FOR SECURING COMMUNICATIONS USING MULTIPLE ENCRYPTION KEYS - The disclosure provides a method and an apparatus for acquiring an electronic file. The method for acquiring an electronic file includes: generating a first encryption key according to login information of a user of a terminal device at the time of logging in to a platform server and a first identifier corresponding to an information providing server that provides the electronic file; sending a first request message for acquiring the electronic file to the platform server; receiving the electronic file encrypted using a second encryption key and returned by the platform server according to the login information and the first request message; and generating a first decryption key according to the first encryption key, and decrypting, using the first decryption key, the electronic file encrypted using the second encryption key, so as to obtain the decrypted electronic file. By means of the disclosed embodiments, private information concerning a user in an electronic file is not leaked by a platform server. Since a terminal device can obtain a decryption key without the need to perform key exchange with an information providing server, use by the user of the terminal device is facilitated. | 2018-06-07 |
20180159834 | SYSTEMS AND METHODS FOR NETWORKS DURING MULTI-REGIONAL ROAMING OF MOBILES - Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, configured to receive, at a module from a provisioning server, a node identification and an access code. The module joins a network that the module has not previously joined. The module provides the node identification to the network. The network uses the node identification and access code to verify that the module is valid. The module receives from the network a new encryption key to use when sending data on the network. The module encrypts data using the new encryption key. The encrypted data is transmitted on the network. | 2018-06-07 |
20180159835 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, INFORMATION PROCESSING SYSTEM, AND COMMUNICATION APPARATUS - There is provided an information processing apparatus, an information processing method, a program, an information processing system, and a communication apparatus that are capable of enhancing authentication safety, the information processing apparatus including: a communication section configured to receive authentication information and a processing request from a first communication apparatus; an authentication information generation section configured to generate authentication information on the basis of first key information associated with a second communication apparatus; and a processing control section configured to control execution of a process corresponding to the processing request on the basis of the authentication information received by the communication section and the authentication information generated by the authentication information generation section. | 2018-06-07 |
20180159836 | IMAGE CAPTURE SYSTEM AND APPLICATION CONTROL METHOD - Provided is an image capture system capable of improving the safety and operability of application control, by a control device that makes a control request for an application, over an image capture device. The image capture system includes an image capture device and a management device that manages control over an application for the image capture device, which are connected with each other through a network. The management device generates a control authority based on the contract relating to the application for the image capture device and the image capture device, transmits image capture device identification information relating to the contract, to a control device, acquires the control request and the image capture device identification information from the control device, determines whether or not the control device has the control authority, based on the image capture device identification information, and transmits the control request to the image capture device identified by the image capture device identification information, in a case where the control device has the control authority. The image capture device receives the control request from the management device, and controls the application for the image capture device, in response to the control request. | 2018-06-07 |
20180159837 | ENABLING SECURE CONNECTIONS BY MANAGING SIGNER CERTIFICATES - Embodiments provide a system for managing security certificates, thereby enabling secure connections between systems. Embodiments collect data; authenticate to a server comprising a keystore comprising a plurality of certificates and having a server configuration; determine keystore characteristics from the server configuration; and, using the keystore characteristics, verify certificate expiration details. The system may determine that at least one certificate in the keystore has expired; and, in response, remove the at least one expired certificate from the keystore of the server. The system may determine that a certificate has expired; receives expired certificate serial number identifying expired certificate; searches for servers storing copies of the expired certificate; determines servers storing copies of the expired certificate; selects one or more of the servers storing copies of the expired certificate; and removes the expired certificate from the selected servers. The system may add the signer certificate to a keystore of the selected servers. | 2018-06-07 |
20180159838 | Real Estate Property Project Analysis Using Augmented Reality User Devices - An augmented reality system that includes an augmented reality user device. The augmented reality user device includes display for overlaying virtual objects onto tangible objects in a real scene, a camera, and a global position system sensor. The augmented reality user device includes a processor implementing an object recognition engine, a virtual assessment engine, and a virtual overlay engine. The object recognition engine identifies features of a property. The virtual assessment engine generates a property profile based on the identified features and alternative features. The virtual assessment engine identifies the property based on the geographic location of the user. The virtual assessment engine generates a property token that includes the property profile and the location identifier. The virtual assessment engine sends the property token to a server and receives information related to the property. The virtual assessment engine presents the information as virtual objects overlaid with the real scene. | 2018-06-07 |
20180159839 | MOBILE CREDENTIAL REDEMPTION CARD - Disclosed herein are systems and methods for redeeming credential credits. A portable token that contains at least two identifiers may be provided. The token may identify a preset quantity of electronic credential credits and at least one of the identifiers may be concealed from view. A third identifier may be received from a user of the portable token, the third identifier associated with a credential credit management account of the user. The user may be authenticated based on at least the third identifier. Upon successful authentication, the preset quantity of the electronic credential credits may be issued to the credential credit management account of the user. An electronic credential may be generated based on the issued credential credits for communication to a remote user. The electronic credential may authenticate the remote user with an access control system. | 2018-06-07 |
20180159840 | USER AUTHENTICATION IN COMMUNICATION SYSTEMS - Methods and systems are provided for user authentication in communication systems. An identification token may be generated in response to a request from a user terminal to load a web page. The identification token may comprise a network address associated with the user terminal, and a time stamp indicating when the network address was used by the user terminal. User authentication information relating to the identification token may then be obtained to authenticate a user of the user terminal. The user terminal may be instructed to request the identification token in response to requesting the web page. | 2018-06-07 |
20180159841 | GESTURE-BASED ACCESS CONTROL IN VIRTUAL ENVIRONMENTS - Techniques of access control in VR environments involve defining a series of gestures that users attending a private meeting within a virtual environment carry out to be allowed into the private meeting. Along these lines, when a user sets up a meeting to take place within a virtual environment, the user may define a series of gestures (e.g., swipes, circles, etc.) that may serve as an effective “secret handshake” that gains admittance to the private meeting. In one implementation, each person invited to the private meeting is given the same gesture to form in the virtual environment that provides access to the private meeting. In other implementations, each user has their own respective gesture that, when matched along with an identifier identifying that user, provides the access. Advantageously, such gestures are easily defined and executed by the users and recognized by servers that control private meetings within the virtual environment. | 2018-06-07 |
20180159842 | SYSTEM AND METHOD FOR A SINGLE SIGN ON CONNECTION IN A ZERO-KNOWLEDGE VAULT ARCHITECTURE - A system and/or method include a connect module for facilitating a single sign-on to a digital vault provided by a service provider in a zero-knowledge architecture. | 2018-06-07 |
20180159843 | SECURE ASYMMETRIC KEY APPLICATION DATA SHARING - To establish a sign on session among single sign on (SSO)-enabled applications, a user can be prompted by an application for an access code. An access interval key can be generated using a key derivative function based on the access code. The access interval key can be considered a session key, and it can be used during a valid SSO session to decrypt a master key stored in a shared memory. In turn, the master key can be used to encrypt and decrypt the contents of the shared memory. To securely distribute the access interval key among the SSO-enabled applications during a current session, individual SSO-enabled applications can each store a public key in the shared memory. The access interval key can then be encrypted, respectively, by the public keys of the SSO-enabled applications and stored in the shared memory to be retrieved securely by the SSO-enabled applications. | 2018-06-07 |
20180159844 | SYSTEMS AND METHODS FOR CLONING AN AGENT IN A DISTRIBUTED ENVIRONMENT - Methods and apparatus to clone an agent in a distributed environment are disclosed. An example apparatus includes a first management agent associated with a first component server in a virtualization environment, the first management agent configured to facilitate communication between the first component server and a virtual appliance, the virtual appliance to authenticate the first management agent based on first credentials including a first identifier and a first certificate. The example apparatus includes a second management agent associated with a second component server in the virtualization environment, the second management agent cloned from the first management agent and including a copy of the first credentials. The example second management agent is to: generate second credentials including a second identifier and a second certificate; authenticate with the virtual appliance based on the first identifier and the first certificate; and delete the copy of the first credentials. | 2018-06-07 |
20180159845 | SYSTEMS AND METHODS TO FACILITATE CERTIFICATE AND TRUST MANAGEMENT ACROSS A DISTRIBUTED ENVIRONMENT - Methods and apparatus to facilitate certificate and trust management across a distributed environment are disclosed. An example apparatus includes a first virtual appliance including a first management endpoint and a first authentication provider including a first certificate validator, the first certificate validator to validate that a first certificate received by the first authentication provider is authentic, virtual appliance to communicate the first certificate via the first management endpoint; and a first component server including a first management agent and a first certificate evaluator, the first management agent to communicate with the first virtual appliance via the first management endpoint, the first management agent to receive the first certificate via the first management endpoint, the first certificate evaluator to evaluate the first certificate to determine a signing authority, the first management agent to restart the first component server and notify the first virtual appliance of acceptance of the first certificate. | 2018-06-07 |
20180159846 | APPARATUS FOR SUPPORTING AUTHENTICATION BETWEEN DEVICES IN RESOURCE-CONSTRAINED ENVIRONMENT AND METHOD FOR THE SAME - Disclosed herein is an apparatus for supporting authentication between devices, which includes a certificate information storage unit for storing certificate data of a first terminal for managing a certificate; a communication unit for receiving a request for a certificate of the first terminal, which uses a signature value and certificate-related information corresponding to the first terminal, from a second terminal and returning information corresponding to a valid certificate of the first terminal to the second terminal in order to enable the second terminal to authenticate the first terminal; and a certificate verification unit for verifying whether a certificate of the first terminal is valid. | 2018-06-07 |
20180159847 | SYSTEMS AND METHODS FOR USING IMAGING TO AUTHENTICATE ONLINE USERS - Systems and methods are disclosed for authenticating an identity of an online user. One method includes receiving from the user, through a first device, a request to access a web page associated with the user's online account; transmitting to the user an image that contains a unique ID and a URL of an authentication server; and receiving from the user, through the first device, an authentication request containing the unique ID. The method also includes receiving from the user, through a second device, a log-in ID associated with the user and the unique ID; and authenticating the identity of the user to grant the user access, through the first device, to the web page associated with the user's online account. | 2018-06-07 |
20180159848 | MANAGEMENT OF CERTIFICATE AUTHORITY (CA) CERTIFICATES - Systems and methods for automatically installing CA certificates received from a network security appliance by a client security manager to make the CA certificate become a trusted CA certificate to a client machine are provided. In one embodiment, a client security manager establishes a connection with a network security appliance through a network, wherein the client security manager is configured for managing security of a client at the client side and the network security appliance is configured for managing the security of traffic pass through the network. The client security manager downloads from the network security appliance a certificate authority (CA) certificate to be used for signing a server certificate of a secure connection between the network security appliance and the client and automatically installs the CA certificate into a certificate store of the client. | 2018-06-07 |
20180159849 | Telecommunication System for the Secure Transmission of Data Therein and Device Associated Therewith - Telecommunication system of the type consisting of a series of terminals mutually connected through a server and of a data transmission network characterised in that means for the management and the control of data management within the network are furthermore provided, said means consisting of a single device made up of a SOC (System on Chip) processor to which the required support peripherals are associated. | 2018-06-07 |
20180159850 | FACILITATION OF SERVICE LOGIN - As provided herein, a first device may be registered as authorized to authenticate a user login into a service from a second device (e.g., a smart phone may be used to log the user into a webmail service on a computer without the user having to enter a password through the computer). Responsive to the user attempting to access the service through the second device, a login interface may be displayed on the first device. The user may confirm or deny that the user wants to log into the service on the second device, thus allowing the user to seamlessly log into the service on the second device (e.g., without entering a password) while mitigating unauthorized logins into the service from unknown devices. Further, the user may use the first device to delegate the authority to authenticate the user login into the service to one or more other devices. | 2018-06-07 |
20180159851 | Facilitating Network Security Analysis Using Virtual Reality Display Devices - A virtual reality system including a virtual reality user device with a display that presents a virtual reality environment to a user, an electronic transfer engine, and a virtual overlay engine. The virtual reality user devices receives network component data and security data for a network components. The virtual reality user devices generates overlays the security data onto the network component data to generate a virtual overlay. | 2018-06-07 |
20180159852 | CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION - A system for contextual and risk-based multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network's traffic data and to serve the traffic data to other modules and a directed computation graph module configured to receive network traffic data from the multi-dimensional time series data server, determine a network traffic baseline from the network traffic data, and determine a verification score needed before granting access based at least in part by the network traffic baseline. A plurality of verification methods build up a user's verification score to required level to gain access. | 2018-06-07 |
20180159853 | HOME NETWORK SYSTEM USING Z-WAVE NETWORK AND HOME AUTOMATION DEVICE CONNECTION METHOD USING SAME - A home network system using a Z-Wave network according to the present invention includes: at least one home automation device connected to the Z-Wave network configuring a wireless network such that the device's state is remotely controlled by a portable terminal or a notification is provided to the portable terminal; a wired/wireless Z-Wave bridge including a Z-Wave communication unit and an Ethernet communication unit, having a unique MAC address, and connecting the portable terminal that is given access to the wired/wireless Z-Wave bridge by a main server through authentication of the unique MAC address, to the Z-Wave network through the Internet; and the main server connected to the wired/wireless Z-Wave bridge or the portable terminal through the Internet, providing an application for a remote control when requested by the portable terminal, and performing authentication for giving access to the wired/wireless Z-Wave bridge. According to the present invention, anyone can easily control a home automation device through a portable terminal by configuring a Z-Wave network system and inputting a unique MAC address. | 2018-06-07 |
20180159854 | SECURE MOBILE ACCESS FOR AUTOMATION SYSTEMS - An industrial automation and control system is provided with a control unit and at least one electronic device. The system establishes a first data connection to an external maintenance unit. The control unit is connected to the electronic device. The electronic device establishes a second data connection to the external maintenance unit and receives or retrieves a proximity information from the external maintenance unit through the second data connection. The electronic device sends the proximity information to the control unit. The control unit grants access to the electronic device by the external maintenance unit through the first data connection to perform maintenance of the electronic device if the proximity information indicates that the external maintenance unit is within a predetermined range from the electronic device. | 2018-06-07 |
20180159855 | METHOD AND APPARATUS FOR REGISTERING DEVICE IN CLOUD SERVER - An apparatus and a method for registering a device in a cloud server are provided. The apparatus includes detecting the device by using short-range communication, requesting an authentication code used for registering the device in the cloud server from an account server in response to the device being detected, receiving the authentication code from the account server, and transmitting the received authentication code and connection address information of the cloud server to the device. | 2018-06-07 |
20180159856 | Secure Access To On-Premises Web Services From Multi-Tenant Cloud Services - Methods, systems, and computer-readable media for using a multi-tenant web relay service to provide secure access to on-premises web services from a tenant-specific cloud service are described herein. In one or more embodiments, a multi-tenant web relay service may receive from a tenant-specific cloud service a connection request to an on-premises web service hosted within a tenant datacenter. The connection request may comprise data indicating a display-friendly name of the web service and the tenant datacenter. Responsive to receiving the request, the web relay service may forward the connection request to the on-premises web service via a rendezvous support service and a web relay agent. Responsive to receiving the connection request, the on-premises web service may generate a response which may be relayed back to the tenant-specific cloud service by the multi-tenant web relay service. | 2018-06-07 |
20180159857 | INTEGRATED ACTIVITY MANAGEMENT SYSTEM AND METHOD OF USING SAME - An integrated activity management system and method for a firm comprising at least one user is disclosed. The system includes at least one communicator, at least one firm unit, a firm network, and a firm administrator. The communicator includes a unique carrier identification, a SIM card, a user memory, and a local processor to generate a log of the time spent on firm activities. The firm unit comprising a firm memory, and a firm processor to determine output based on the user information and firm information stored in the firm memory. The administrator is coupled to the firm unit to selectively grant access to the firm network to the communicator and the firm unit whereby secured communication between the at least one communicator and the at least one firm unit is provided. | 2018-06-07 |
20180159858 | CONTENT SUGGESTION MECHANISM - A method to facilitate control of media content access is disclosed. The method includes acquiring relationship information from one or more external sources, generating trust relationship information based on the relationship information and authorizing access to media content upon a determination that the content has been provided an approval rating by one or more individuals included in the trust relationship information. | 2018-06-07 |
20180159859 | Rolling Security Platform - A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group of one or more servers. The method includes repeatedly initiating rebuilding of the first server group of one or more servers. The method also includes repeatedly initiating rebuilding of the second server group of one or more servers. The rebuilding of the first server group of one or more servers is staggered in time from the rebuilding of the second server group of one or more servers. The servers may be physical servers or virtual machines. Rolling security may also be applied to software containers, computing devices within a data center, and computing devices outside of a datacenter. | 2018-06-07 |
20180159860 | PACKET VALIDATION IN VIRTUAL NETWORK INTERFACE ARCHITECTURE - Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain characteristic, transmits the packet only if the sending queue has authority to send packets having that characteristic. The data packet characteristics can include transport protocol number, source and destination port numbers, source and destination IP addresses, for example. Authorizations can be programmed into the NIC by a kernel routine upon establishment of the transmit queue, based on the privilege level of the process for which the queue is being established. In this way, a user process can use an untrusted user-level protocol stack to initiate data transmission onto the network, while the NIC protects the remainder of the system or network from certain kinds of compromise. | 2018-06-07 |
20180159861 | ACCESS GUARDS FOR MULTI-TENANT LOGGING - A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes a plugin that adds features of an access control list (ACL) to indexes of a logging stack based on a user's access role. The stack is an aggregate of logs for nodes that are stored globally in the system. When a user requests a particular index to logs in the logging stack, an authorization token associated with the user is provided. Before the user request is allowed to proceed, the access guard plugin performs access control on the stack by referencing the ACL using the authorization token to determine which tenants a user can access in view of the user's current access role. The plugin uses the token and the user identifier to construct the ACL to enable each user's access to the stack. | 2018-06-07 |
20180159862 | CBR-Based Negotiation RBAC Method for Enhancing Ubiquitous Resources Management - A CBR-based negotiation RBAC method for ubiquitous resources management is described. The method, which is applicable to serving servers, includes steps of inquiring for a similar case in a case base in order to obtain an initial case, performing a REUSE procedure or a REVISE negotiating procedure on the initial case to assign at least one appropriate role set consisting of a local role and a virtual role, performing a local role and virtual role fitting procedure to fit the local role and the virtual role, and performing a determining and retaining procedure to meet the requirements of users during the negotiation process. | 2018-06-07 |
20180159863 | TECHNIQUES FOR DYNAMIC ENPOINT SECURE LOCATION AWARENESS - Techniques for dynamic endpoint secure location awareness may include determining that a mobile device changed locations. A platform security engine in the mobile device may dynamically send a location query. A location response may be received. The platform security engine may determine whether the mobile device is located in a secure location based on the location response. Other embodiments are described and claimed. | 2018-06-07 |
20180159864 | DOUBLE WRITE DATA EXCHANGE IN A DEAD DROP NETWORK ARCHITECTURE - A sender uses a double-write protocol to pass data to a recipient using a dead drop network architecture. The sender sends, to a dead drop domain, a data payload to store at the dead drop domain, and receives payload access information corresponding to a payload dead drop where the payload data is stored. The sender sends, to the dead drop domain, one or more instances of metadata including the payload access information to store at the dead drop domain, and receives metadata access information corresponding to one or more metadata dead drops where the metadata is stored. The sender provides the metadata access information to one or more recipients. A recipient uses the metadata access information to read the corresponding metadata dead drop. The recipient then uses the payload access information from the metadata to read the payload dead drop and receive the payload data. | 2018-06-07 |
20180159865 | SYSTEM AND METHOD FOR MESSAGE RECIPIENT VERIFICATION - An electronic device includes a communication interface and at least one processor configured for: transmitting to or receiving from a second electronic device over proximity-based communication channel an introduction message including a first encryption key; receiving, from a server via the at least one communication interface, a challenge notification providing notification of a challenge to be completed to initiate a data process, the challenge notification including or providing access to at least one data field associated with a verification challenge; identifying, from the at least one data field, an encrypted challenge response value; decrypting the encrypted challenge response value with a key corresponding to the first encryption key; and transmitting the decrypted challenge response value to the server to complete the challenge to initiate the data process. | 2018-06-07 |
20180159866 | Computer Malware Detection - According to the presently disclosed subject matter, malware induced data compression is harnessed for detecting infection of a host computer by the malicious software, which caused data compression. To this end, compressed ratio of the compressed data received from a host computer is compared with an expected compression ratio and based on the comparison it is determined whether the received data is suspected of being infected by a malware. | 2018-06-07 |
20180159867 | DATA PROTECTION METHOD AND DATA PROTECTION SYSTEM - A data protection method includes: detecting whether a web transmission behavior occurs or not; analyzing a transmitter and a first file of the web transmission behavior, wherein the transmitter is corresponding to a first application program, and the first file is corresponding to a first file characteristic; extracting a historical accessing record of the transmitter from a memory; extracting a second file characteristic of a second file from the memory in a state that the historical accessing record indicates that the transmitter accesses the second file of a second application program; comparing the first file characteristic with the second file characteristic, to generate a first similarity degree; and blocking the web transmission behavior according to the first similarity degree. | 2018-06-07 |
20180159868 | NETWORK ATTACK PATTERN DETERMINATION APPARATUS, DETERMINATION METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF - A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group. | 2018-06-07 |
20180159869 | Method, Mobile Switching Centre, MSC, and a Computer Program Product for Detecting Interconnect Bypass - A method for detecting interconnect bypass by a subscription identity in a telecommunication network, said telecommunication network comprising at least a mobile switching centre, MSC, serving a plurality of subscription identities, said method comprising the steps of setting a bypass threshold value which indicates a number of originating calls from a subscription identity per pre-defined period of time, monitoring the number of originating calls from at least one of said plurality of subscription identities per said pre-defined period of time, and detecting when said monitored number of originating calls for one of said plurality of subscription identities exceeds said bypass threshold value, and issuing an alert message thereby indicating an interconnect bypass by said one of said plurality of subscription identities. | 2018-06-07 |
20180159870 | COMMUNICATION METHOD, PROGRAM AND COMMUNICATION DEVICE USING SAME - A communication device includes: a communication section that transmits and receives a message in a network; an acquisition unit that acquires state information on a state of an object for which the network is provided; an estimation unit that estimates the state of the object based on the state information acquired in the acquisition unit; a setting unit that sets a filtering rule based on the state estimated in the estimation unit; and a filter unit that executes filtering processing for the message in accordance with the filtering rule set in the setting unit. | 2018-06-07 |
20180159871 | Machine Learning Based Malware Detection System - There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set of training data comprising a plurality of training data elements, wherein each of said plurality of training data elements is associated with a respective one of at least two maliciousness related properties, learning a malicious object detection model on the basis of first feature combinations of said plurality of training data elements, said first feature combinations characterizing each of said at least two maliciousness related properties, learning an anomalous data detection model on the basis of second feature combinations of said plurality of training data elements, said second feature combinations characterizing said set of training data, said anomalous data detection model being associated with said malicious object detection model, and providing said malicious object detection model and said anomalous data detection model. | 2018-06-07 |
20180159872 | Systems and Methods of Viral Enablement of Features by Peer-to-Peer Connection - The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing the user's social graph to a list of event attendees. The identified attendees can be stratified into social graph tags that annotate, categorize and prioritize other users in the user's social graph. The technology disclosed also relates to identifying and notifying the user of nearby attendees of sessions at the event who meet introduction preferences of the user by finding matches between introduction preference attributes specified by the user and attributes of the attendees provided by the list of event attendees. | 2018-06-07 |
20180159873 | PUSH NOTIFICATIONS OF SYSTEM EVENTS IN A RESTRICTED NETWORK - Methods, computing systems and computer program products implement embodiments of the present invention that include associating a token with a computing device, defining preferences for the computing device, and conveying, by the computing device, the token and the preferences to an event processing system. Upon the event processing system, an event message from a computing system via a one-way firewall and matching the computing device preferences to the event message, the event processing system can convey the token and the event message to a push notification system. In some embodiments, upon the push notification service receiving the token and the event message, the mobile device can be identified based on the token, and the event message can be conveyed to the computing device. The event messages may include a severity level, and the preferences may include a severity threshold and a message detail level. | 2018-06-07 |
20180159874 | UNWANTED TUNNELING ALERT SYSTEM - Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated. | 2018-06-07 |
20180159875 | Using electronic game as means of data acquisition - Special electronic cyber security simulator game with programmable real-life situations will allow collection of sufficient quantity of controlled attacker behavior data as well as complete labeling of that data at any degree of granularity which can greatly facilitate machine learning and artificial intelligence development in the field of cyber security. | 2018-06-07 |
20180159876 | Consolidating structured and unstructured security and threat intelligence with knowledge graphs - An automated method for processing security events. It begins by building an initial version of a knowledge graph based on security information received from structured data sources. Using entities identified in the initial version, additional security information is then received. The additional information is extracted from one or more unstructured data sources. The additional information includes text in which the entities (from the structured data sources) appear. The text is processed to extract relationships involving the entities (from the structured data sources) to generate entities and relationships extracted from the unstructured data sources. The initial version of the knowledge graph is then augmented with the entities and relationships extracted from the unstructured data sources to build a new version of the knowledge graph that consolidates the intelligence received from the structured data sources and the unstructured data sources. The new version is then used to process security event data. | 2018-06-07 |
20180159877 | MULTI-MODE BOUNDARY SELECTION FOR THREAT DETECTION IN INDUSTRIAL ASSET CONTROL SYSTEM - According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons. | 2018-06-07 |
20180159878 | ATTACKING NODE DETECTION APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF - An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus is stored with a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations. | 2018-06-07 |
20180159879 | SYSTEMS AND METHODS FOR CYBER-ATTACK DETECTION AT SAMPLE SPEED - A threat detection model creation computer receives normal monitoring node values and abnormal monitoring node values. At least some received monitoring node values may be processed with a deep learning model to determine parameters of the deep learning model (e.g., a weight matrix and affine terms). The parameters of the deep learning model and received monitoring node values may then be used to compute feature vectors. The feature vectors may be spatial along a plurality of monitoring nodes. At least one decision boundary for a threat detection model may be automatically calculated based on the computed feature vectors, and the system may output the decision boundary separating a normal state from an abnormal state for that monitoring node. The decision boundary may also be obtained by combining feature vectors from multiple nodes. The decision boundary may then be used to detect normal and abnormal operation of an industrial asset. | 2018-06-07 |
20180159880 | TECHNOLOGIES FOR SECURE PERSONALIZATION OF A SECURITY MONITORING VIRTUAL NETWORK FUNCTION - Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include various security monitoring components, including a NFV security services controller, a VNF manager, and a security monitoring VNF. The security monitoring VNF is configured to receive provisioning data from the NFV security services controller and perform a mutually authenticated key exchange procedure using at least a portion of the provisioning data to establish a secure communication path between the security monitoring VNF and a VNF manager. The security monitoring VNF is further configured to receive personalization data from the VNF manager via the secure communication path and perform a personalization operation to configure one or more functions of the security monitoring VNF based on the personalization data. Other embodiments are described and claimed. | 2018-06-07 |
20180159881 | AUTOMATED CYBER PHYSICAL THREAT CAMPAIGN ANALYSIS AND ATTRIBUTION - A system for automated cyber physical threat campaign analysis and attribution, comprising a multi-dimensional time series and graph hybrid data server, an automated planning service module, and a directed computation graph module. A dataset is gathered from a monitored network and aggregated into a cyber-physical systems graph. Cyberattack simulations on the monitored network are made using exogenously collected data as input. Metrics are generated based on the cyber-physical systems graph and results from the cyberattack simulations, and the generated metrics are used to develop a threat profile. | 2018-06-07 |
20180159882 | SYSTEM AND METHODS TO PREVENT SECURITY BREACHING BY AUTHORIZED USERS IN A CLOUD ENVIRONMENT - A system to facilitate preventing security breach of internal organizational resources by authorized system users. Resource access analysis prevents breaching sensitive organizational information stored in a cloud infrastructure environment. A virtual machine (VM) breach-detection proxy controls and monitors activities of a system user. A virtual machine (VM) breach-detection portal provides system administration of organizational data sensitive regions. The system interfaces with the cloud environment to retrieve log files and provides indexed video session representations of system user activities accessing data sensitive region. | 2018-06-07 |
20180159883 | RULE-BASED NETWORK-THREAT DETECTION - A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination. The packet-filtering device may generate a log entry comprising information from the packet-filtering rule that identifies the one or more network-threat indicators and indicating whether the packet-filtering device prevented the packet from continuing toward its destination or allowed the packet to continue toward its destination. | 2018-06-07 |
20180159884 | DTAT STREAM SURVEILLANCE, INTELLIGENCE AND REPORTING - A method for monitoring and securing interprogram communications between a plurality of business applications in a network includes gathering, using a computing device, information regarding communications between the plurality of business applications, the gathering step including steps of reading information from a log file in which information regarding each communication into and out of the business application is recorded, reading information from internal files of the business application and recording information obtained from data messages entering and leaving the business application, simplifying the gathered information, the simplifying step including normalizing the information into a common format based on a shared parameter value; and merging the normalized information together, classifying the information based on desired parameters, the classifying step including steps of designating a classification of the information based on content of the communication and designating certain information as sensitive; and analyzing the classified information to provide a report on the information to be presented to a user via a user interface based on a user provided query, the analyzing step further including a step of generating the report based at least in part on the classification of the information designated in the classifying step. | 2018-06-07 |
20180159885 | Identifying Matching Event Data from Disparate Data Sources - Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have taken place and been recorded in raw data format. In one embodiment, machine data is turned into a machine data web by organizing machine data into events and then linking events together. | 2018-06-07 |
20180159886 | SYSTEM AND METHOD FOR ANALYZING FORENSIC DATA IN A CLOUD SYSTEM - Disclosed is a system for the analysis of forensic data, wherein the forensic data is present in a cloud system. The system has an analysis unit for analysing the forensic data, wherein the analysis unit is arranged in the cloud system, and has an operating unit for operating the analysis unit, wherein the operating unit is located outside the cloud system remote from the analysis unit. The provided system enables forensic data, which is associated with an IT security incident, to be analysed directly in the cloud system. Thus, extraction of the data from the cloud system or complex transmission of the data to an analysis device is not required. Also disclosed is a method for the analysis of forensic data. | 2018-06-07 |
20180159887 | ENTERPRISE LEVEL CYBERSECURITY AUTOMATIC REMEDIATION - Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation receives at an orchestration system a requested update which may include a configuration change, a code change, a change to a binary, or other change to the installation. A mirror instance of the installation is instantiated on a cloud infrastructure where the requested updated is applied and scanned for cybersecurity threats. Where cybersecurity threats are detected, a remediation response is identified. The update and the remediation response may either be sent to an administrator for acceptance prior to deployment to production, or may be deployed automatically, with rollback information generated in the event the administrator desires to undo the deployment. Information as to whether an administrator accepts or rejects an update and/or a remediation are stored in a community database to assist others to evaluate the update and/or remediation for their use. | 2018-06-07 |
20180159888 | SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN SMART TEMPLATE - The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each template of the plurality of templates identifying a list of a plurality of types of simulated phishing communications and at least a portion of content for the simulated phishing communications. A campaign controller selects a template from the plurality of templates for a simulated phishing campaign directed to a user of a plurality of users; and communicates, to one or more devices of the user a first type of simulated phishing communication of the plurality of types of simulated phishing communications with at least the portion of content identified by the template. | 2018-06-07 |
20180159889 | SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN SMART TEMPLATE - The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign. A campaign controller identifies a starting action for a simulated phishing campaign directed to a user of a plurality of users. The simulated phishing campaign includes a plurality of actions, one or more of the plurality of actions to be determined during execution of the simulated phishing campaign The campaign controller responsive to the starting action, communicates a simulated phishing communication to one or more devices of a user. The campaign controller determines a subsequent action of the plurality of actions of the simulated phishing campaign based at least on one of a response to the simulated phishing communication received by the campaign controller or a lack of response within a predetermined time period and initiating, responsive to the determination, the subsequent action of the simulated phishing campaign. | 2018-06-07 |
20180159890 | MODELING OF ATTACKS ON CYBER-PHYSICAL SYSTEMSCYBER-PHYSICAL SYSTEMS - Techniques of preventing sabotage attacks in cyber-physical systems involve automatically identifying links between nodes of a graph representing cyber-physical systems as vulnerable to sabotage attacks according to a vulnerability metric for each link. The vulnerability metric used depends on the particular sabotage attack used to determine the vulnerable links. Once a computer configured to design cyber-physical systems based on vulnerability to sabotage attacks receives data representing the graph, the computer enumerates the possible links between nodes of the graph along which a sabotage attack may be performed. For each of those links, the computer computes the vulnerability metric. The computer then ranks the links according to respective values of the vulnerability metric. Based on the ranking, a designer may then perform a mitigation analysis that results in changes to the graph to reduce the vulnerability at each node accessible to a malicious actor. | 2018-06-07 |
20180159891 | THREAT DETECTION AND MITIGATION THROUGH RUN-TIME INTROSPECTION AND INSTRUMENTATION - A graph of a plurality of resources in a computing environment is generated, with the graph associating a first resource of the plurality with a second resource of the plurality. Based at least in part on measurements obtained at a point in a test computing environment that corresponds to a point in the computing environment, a graph representing the relationship between the first resource and the second resource is generated. A threat model identifying potential risks to the computing environment is created from the graph. | 2018-06-07 |
20180159892 | RUNTIME PROTECTION OF WEB SERVICES - Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace point vulnerabilities are identified using one or more data payloads. Candidate trace point operations associated with the trace point vulnerabilities are identified. Supplementary candidate operations are computed based on the existing trace point operations and the one or more data payloads. The Web service application is further instrumented with the one or more supplementary candidate operations. | 2018-06-07 |
20180159893 | CLASSIFYING KILL-CHAINS FOR SECURITY INCIDENTS - Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat. | 2018-06-07 |
20180159894 | AUTOMATIC THRESHOLD LIMIT CONFIGURATION FOR INTERNET OF THINGS DEVICES - Presented herein are techniques for mitigating a distributed denial of service attack. A method includes, at a network security device, such as a firewall, monitoring network traffic, flowing through the firewall, destined for a network device, determining whether the network traffic is below a predetermined amount, while the network traffic is below the predetermined amount, sending to the network device a plurality of probes, receiving responses from the network device in response to the probes, and setting one or more thresholds for subsequent traffic destined for the network device based on the responses received from the network device. | 2018-06-07 |
20180159895 | Method, Apparatus and System for Quantifying Defense Result - A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a suspect IP address set included in original data traffic drawn by a defense terminal located in a cloud platform; acquiring normal data traffic, the normal data traffic being data traffic that remains after the defense terminal cleans the suspect data traffic set according to a preset defense strategy; acquiring host performance parameters, the host performance parameters being a set of parameters extracted from the target terminal after the defense terminal sends the normal data traffic to the target terminal; and quantifying a defense result based on a target parameter set, wherein the target parameter set at least includes: the suspect data traffic set, the normal data traffic and the host performance parameters. The defense result is accurate by comprehensively considering evaluation aspects and indexes. | 2018-06-07 |
20180159896 | ENHANCED COMPUTING SYSTEM SECURITY USING A SECURE BROWSER - Described herein are systems, methods, and software to provide secure browsers to end user devices. In one implementation, a secure browsing service receives, over a network, a request for an internet browser from an end user device. The secure browsing service further, in response to the request, allocates a virtual machine with an instance of the internet browser executing thereon to the end user device, and provide a remote connection to the internet browser on the virtual machine to the end user device. | 2018-06-07 |
20180159897 | SECURITY SYSTEM, SECURITY METHOD, AND RECORDING MEDIUM FOR STORING PROGRAM - Provided is a security system or the like with which security can be improved. A security system according to one embodiment of the present invention is provided with: a packet reception means that receives a request from an intruding device that is attempting intrusion; a dummy resource characteristic information storage means that stores characteristic information for a plurality of virtual dummy resources; a dummy response generation means that generates a dummy response on the basis of the characteristic information in response to the request directed to the dummy resource; a dummy response transmission control means that controls a request end flag, which indicates the presence/absence of untransmitted dummy resources, on the basis of a timer value; and a dummy response transmission means that, on the basis of the request end flag, transmits the dummy response to the intruding device that transmits the request. | 2018-06-07 |
20180159898 | ANALYSIS OF NETWORK TRAFFIC RULES AT A NETWORK VISIBILITY NODE - Techniques are disclosed for monitoring usage of network traffic rules applied by devices on a computer network. Operations in accordance with the disclosed techniques can be performed at one or more network visibility nodes that operate as part of a visibility fabric, for example for monitoring traffic on the network. In certain embodiments, packets associated with the traffic are received at a network visibility node communicatively coupled to the network that is operable to enable visibility across the network. The network visibility node can access network traffic rules that mirror the network traffic rules applied at devices on the network. The network visibility node can further process the received packets using the accessed network traffic rules to identify packets or flows of packets that satisfy criteria associated with the accessed network traffic rules. | 2018-06-07 |
20180159899 | USER INTERFACE FOR LOW-TOUCH SECURITY POLICY PROVISIONING - In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy selection section, interpret user input data to include performing at least one security policy selection action in the security policy selection section yielding selection of a first security policy for a first device, and update the first user interface yielding an updated first user interface including the first security policy, and a first security policy activation key for inputting into a second user interface to be generated when the first device is installed, the first security policy activation key being associated with providing authentication for downloading the first security policy to the first device. | 2018-06-07 |
20180159900 | DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE - In various embodiments, a data map generation system is configured to: (1) enable a user to specify one or more criteria; (2) identify one or more data flows based at least in part on the one or more specified criteria; (3) generate a data map based at least in part on the identified one or more data flows; and (4) display the data map to any suitable individual (e.g., the user). In particular embodiments, the system is configured to display all data flows associated with a particular organization that are stored within the system. In other embodiments, the system is configured to display all data flows that are associated with a particular privacy campaign undertaken by the organization. | 2018-06-07 |
20180159901 | METHOD FOR SETTING UP A WebRTC SESSION - Some embodiments relate to a method implemented by a first terminal for setting up a session with a second terminal. An identifier of a session server is obtained at least from a subscriber device in the first terminal which comprises a subscriber identifier and an operator identifier. A session request and an identifier of the second terminal are sent to the server. At least one instruction is received from the server and a message comprising a first set, relative to the first terminal, of at least one characteristic parameter of the requested session is generated in accordance with at least one instruction received and sent to the server. A message is received from the server comprising a second set of at least one characteristic parameter of the requested session, the second set relating to the second terminal and having a non-zero overlap with the first set. | 2018-06-07 |
20180159902 | ACCESS TO DATA ON A REMOTE DEVICE - A first device may receive connection requests to establish communications between a second device located behind a firewall and a third device located outside of the firewall. The first device may be located outside of the firewall. The second device and the third device may store data. The first device may receive a request for the data. The first device may provide the request via a first connection or a second connection. The device may receive the data. The data stored by the second device may be received by the first device from behind the firewall without using a tunnel through the firewall and in a streaming manner. The first device may provide the data. The data stored by the third device may be provided to the second device in the streaming manner. | 2018-06-07 |
20180159903 | COGNITIVE RESOURCE SELECTION - The patterns of usage, participation, and/or item sharing by the participants in a conference call are correlated, recognized, and used to select a data centers. This selection can be done both before and/or during a call. When significant patterns are recognized (e.g., heavy video sharing by one participant at every Friday afternoon meeting) there may be a better (e.g., faster, better quality, more efficient, less use of network resources) data center to host the call than one that is selected based on the geography of the participants alone. Likewise, during a call, other patterns of behavior can be correlated and recognized dynamically such that when these patterns occur, the call is hosted by a different (i.e., better) data center. | 2018-06-07 |
20180159904 | REMOTE LIVE SUPPORT TOOL - To facilitate remote support, a live remote support tool providing versatile information exchange between an apparatus at a site and another apparatus in a remote support site is disclosed. | 2018-06-07 |
20180159905 | EXTENDING COMMUNICATION SERVICES TO A CONSUMPTION DEVICE USING A PROXY DEVICE - A system for data communications comprising a handset having a processor, a wireless communications device, a speaker and a microphone and one or more software applications operating on the processor that are configured to interface with a voice over long-term evolution (VoLTE) service. A wireless access point coupled to the handset through a local wireless communications media and the wireless communications device, the wireless access point further coupled to a long range wireless communications media and configured to interface with a server that provides VoLTE calling functionality. | 2018-06-07 |
20180159906 | Framework and method for realizing multimedia communication, fusion equipment and UE - Disclosed are a framework and method for realizing multimedia communication, fusion equipment and a UE. The method comprises: a first communication terminal utilizes obtained media description to establish a signaling plane with a second communication terminal via a register server, and the fusion equipment establishes a media plane with the second communication terminal. | 2018-06-07 |
20180159907 | SENDING SNIPPETS OF MEDIA CONTENT TO A COMPUTING DEVICE - Techniques include: providing media content to a computing device; waiting a period of time; determining that the media content has not been used; sending a snippet to the computing device, where the snippet corresponds to a portion of the media content that is executable on the computing device; and repeating waiting, determining and sending until the media content has been used or a limiting factor has been met. | 2018-06-07 |
20180159908 | DISTRIBUTION APPARATUS, DISTRIBUTION CONTROL METHOD, AND DISTRIBUTION SYSTEM - A network system includes a server, and the server distributes content and its presentation schedule to a content presentation apparatus at a distribution destination in accordance with an operation performed by an administrator. At this time, not only the business hours in a place where the server is installed and the business hours in a place where the content presentation apparatus is installed, but also the time difference is taken into consideration. When the time difference is taken into consideration, the server distributes content and its presentation schedule to the content presentation apparatus at the distribution destination outside the overlapping business hours in both places. | 2018-06-07 |
20180159909 | Self-adaptive streaming medium processing method and apparatus - A media processing method and apparatus for adaptive streaming are provided. In the method, a Media Presentation (MP) timeline alignment event message carried in a media segment is acquired; an aligned media segment is determined according to the MP timeline alignment event message, where the aligned media segment is a media segment of which a Media Presentation Time (MPT) in an MP timeline is aligned to an external timeline; and one or more MPTs of one or more media segments in an MP timeline alignment event after a mapping between the MP timeline and the external timeline has been established are calculated. | 2018-06-07 |