Patents Assigned to The Institute of Computer Based Software Methodology and Technology
  • Publication number: 20250260515
    Abstract: Disclosed are a user equipment of a wireless communication system and a wireless communication method using the same. More specifically, disclosed are a user equipment including a processor configured to receive DCI through a PDCCH indicating PDSCH scheduling information of each cell in one or more cell(s), identify a transmission scheme in each cell based on a DCI format of the DCI, receive a PDSCH of each cell in the one or more cell(s) based on the scheduling information of the PDCCH, generate a hybrid automatic repeat request acknowledgment (HARQ-ACK) bit sequence for the one or more cell(s) based on the identified transmission scheme of each cell in response to receiving the PDSCH of each cell, and transmit the generated HARQ-ACK bit sequence and a wireless communication method using the same.
    Type: Application
    Filed: April 30, 2025
    Publication date: August 14, 2025
    Inventors: Kyungjun CHOI, Minseok NOH, Jinsam KWAK
  • Publication number: 20250260518
    Abstract: Facilitation of hybrid automatic repeat requests (HARQ) can comprise a system that acquires information about the capability of a mobile device. Next, the system can configure the mobile device with multiple physical uplink control channel (PUCCH) resources and a number of repetitions within a slot for each antenna port of the mobile device. A network node can then transmit a downlink control channel to the mobile device and indicate the PUCCH resources for each antenna port. Consequently, the system can then detect a HARQ acknowledgment (ACK) from the mobile device from all of the PUCCH resources.
    Type: Application
    Filed: April 7, 2025
    Publication date: August 14, 2025
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: SaiRamesh Nammi
  • Publication number: 20250260620
    Abstract: Aspects of the subject disclosure may include, for example, obtaining first information identifying each version of a policy rule base to which a control plane architecture of a wireless network has access; obtaining second information identifying each version of a policy rule base to which a user plane architecture of the wireless network has access; selecting as a selected version a common version of a policy rule base to which each of the control plane architecture and the user plane architecture has access; and communicating an identification of the selected version to each of the control plane architecture and the user plane architecture. Other embodiments are disclosed.
    Type: Application
    Filed: April 29, 2025
    Publication date: August 14, 2025
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Sean Simon, Frank Herrgoss
  • Publication number: 20250260631
    Abstract: A method for deep packet inspection (DPI) in a software defined network (SDN). The method includes configuring a plurality of network nodes operable in the SDN with at least one probe instruction; receiving from a network node a first packet of a flow, the first packet matches the at least one probe instruction and includes a first sequence number; receiving from a network node a second packet of the flow, the second packet matches the at least one probe instruction and includes a second sequence number, the second packet is a response of the first packet; computing a mask value respective of at least the first and second sequence numbers indicating which bytes to be mirrored from subsequent packets belonging to the same flow; generating at least one mirror instruction based on at least the mask value; and configuring the plurality of network nodes with at least one mirror instruction.
    Type: Application
    Filed: April 3, 2025
    Publication date: August 14, 2025
    Inventors: Yossi BARSHESHET, Simhon DOCTORI, Ronen SOLOMON
  • Publication number: 20250260633
    Abstract: This application discloses an enforcement result reporting method and receiving method, a terminal, and a network-side device. The enforcement result reporting method includes: receiving, by a terminal, first information sent by a network-side device, where the first information is a reporting indication, and the first information in carried by at least one URSP rule; and reporting, by the terminal, an enforcement result of a URSP rule according to the first information; where the reporting, by the terminal, an enforcement result of a URSP rule according to the first information includes: in a case that the terminal receives a URSP rule carrying the first information, after the terminal completes enforcement of the URSP rule carrying the first information, reporting, by the terminal, an enforcement result of the URSP rule.
    Type: Application
    Filed: April 25, 2025
    Publication date: August 14, 2025
    Inventors: Huazhang LV, Sihan CHENG
  • Publication number: 20250260643
    Abstract: Systems and methods of interface-based ACLs in a virtual Layer-2 network. The method can include sending a packet from source compute instance in a virtual network to a destination compute instance via a destination virtual network interface card (destination VNIC) within a first virtual layer 2 network and evaluating an access control list (ACL) for the packet with a source virtual network interface card (source VNIC). ACL information relevant to the packet can be embedded in the packet. The VSRS can receive the packet and can identify the destination VNIC within the first virtual layer 2 network for delivery of the packet based on information received with the packet and mapping information contained within a mapping table. The VSRS can access ACL information from the packet and can apply the ACL information to the packet.
    Type: Application
    Filed: April 28, 2025
    Publication date: August 14, 2025
    Applicant: Oracle International Corporation
    Inventors: Lucas Michael Kreger-Stickles, Shane Baker, Bryce Eugene Bockman, Peter Croft Jones, Jagwinder Singh Brar
  • Publication number: 20250260650
    Abstract: An interconnect device is provided. In one example, an interconnect device includes ports and circuits to determine a rate of change in a number of entries in a queue exceeds a first threshold or falls below a second threshold. In response to the rate of change in the number of entries in the queue exceeding the first threshold or falling below the second threshold, a rate at which packets to be transmitted from the interconnect device are processed for egress may be reduced to avoid an excessive drop or rise in power consumption of the interconnect device.
    Type: Application
    Filed: February 13, 2024
    Publication date: August 14, 2025
    Inventors: Niv Aibester, Eyal Srebro, Amit Kazimirsky
  • Publication number: 20250260656
    Abstract: Disclosed are a method, a computer device, and a non-transitory computer-readable recording medium for curing content on various topics through a chatbot. A content curation method may include creating recommended content for at least one topic using original content produced on at least one platform; providing the recommended content to a user using a chatbot for content curation; collecting a user response to the recommended content provided by the user to the chatbot; and reflecting the user response in at least one of a user's personalization recommendation and a report related to the recommended content.
    Type: Application
    Filed: February 4, 2025
    Publication date: August 14, 2025
    Applicant: LINE Plus Corporation
    Inventor: Hongjoong SHIN
  • Publication number: 20250260666
    Abstract: Systems and methods for endpoint application metadata based policy enforcement include monitoring traffic via a cloud, the traffic being monitored inline between one or more endpoints and one or more destinations; identifying, within a request from an endpoint, endpoint process metadata associated with an endpoint process used to make the request; processing the endpoint process metadata; and performing one or more actions on the request based on the processing. The endpoint process metadata can be collected by a connector application executing on the one or more endpoints, and forwarded to the cloud in-band therefrom.
    Type: Application
    Filed: February 13, 2024
    Publication date: August 14, 2025
    Applicant: Zscaler, Inc.
    Inventor: Yaroslav Rosomakho
  • Publication number: 20250260667
    Abstract: Aspects for a VPN server utilizing a first exit internet protocol (IP) address to transmit a first query to a host device for requesting data of interest requested by a user device; determining, based at least in part on transmitting the first query, that the host device has blocked the first exit IP address; suspending, based at least in part on determining that the host device has blocked the first exit IP address, utilization of the first exit IP address with respect to retrieving the data of interest from the host device; and utilizing a second exit IP address, different from the first exit IP address, to transmit a second query to the host device for requesting the data of interest requested by the user device are disclosed. Various other aspects are contemplated.
    Type: Application
    Filed: April 4, 2025
    Publication date: August 14, 2025
    Applicant: UAB 360 IT
    Inventors: Karolis Pabijanskas, Darius Simanel
  • Publication number: 20250260673
    Abstract: This disclosure relates to system and method for preserving privacy of telematic data. The method includes receiving telematic data from a vehicle and a set of predefined policies from an insurance provider. The telematic data and the set of predefined policies are homomorphically encrypted through a multi-key homomorphic encryption technique. The method further includes analyzing the telematic data and the set of predefined policies to obtain an analysis result. The method further includes sharing the analysis result with the vehicle in an encrypted format. The method further includes partially decrypting the analysis result to obtain a partially decrypted result. The method further includes sharing the partially decrypted result to the insurance provider. The method further includes decrypting the partially decrypted result to obtain fully decrypted result in a plain-text format.
    Type: Application
    Filed: November 13, 2024
    Publication date: August 14, 2025
    Inventors: Duc Cuong Nguyen, Hiep Nguyen, Simy Chacko
  • Publication number: 20250260679
    Abstract: One disclosed example method includes obtaining a meeting cryptographic key; transmitting, from a client device to a video conference provider, a request to initiate an encrypted video conference, the encrypted video conference including a plurality of participants; distributing the meeting cryptographic key to each participant of the plurality of participants; obtaining a public cryptographic key of a key pair, the key pair including the public cryptographic key and a private cryptographic key; encrypting the meeting cryptographic key using the public cryptographic key; transmitting, from the client device to the video conference provider, a request to record the video conference; encrypting audio and video from a microphone and image sensor of the client device using the meeting cryptographic key; transmitting the encrypted audio and video to the video conference provider; and providing the encrypted meeting cryptographic key to the video conference provider.
    Type: Application
    Filed: April 29, 2025
    Publication date: August 14, 2025
    Applicant: Zoom Communications, Inc.
    Inventor: Max Krohn
  • Publication number: 20250260684
    Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communicating device via a communications network. One embodiment may include obtaining, at the communicating device, signals representative of one or more high-entropy tokens via the communications network, the one or more high-entropy tokens including one or more component tokens. The method may additionally include encrypting one or more parameters utilizing a first encryption key derived from at least one component token of the one or more component tokens and transmitting, via the communications network, one or more signals representative of the encrypted one or more parameters. The method may further include obtaining, at the communicating device, one or more signals indicating an outcome of a comparison between the one or more encrypted parameters with one or more similar parameters encrypted by an identity verifier.
    Type: Application
    Filed: May 1, 2025
    Publication date: August 14, 2025
    Inventor: Jeffrey Robert Naujok
  • Publication number: 20250260685
    Abstract: Systems and methods for cloud-centric biometric step-up and authentication include monitoring traffic from one or more endpoints via a cloud service; determining a requirement for authentication of a user associated with the traffic based on the monitoring; causing a computing device associated with the user and the traffic to capture a photograph of the user; and processing the photograph to confirm an identity of the user. In various embodiments, the capturing of the photograph is performed by a computing device associated with the user, wherein the processing of the photograph is performed by the cloud service for identification of the user.
    Type: Application
    Filed: February 13, 2024
    Publication date: August 14, 2025
    Applicant: Zscaler, Inc.
    Inventor: Yaroslav Rosomakho
  • Publication number: 20250260691
    Abstract: A security system for internet of things (IoT) devices, comprising a security engine server remote from an enterprise where the IoT devices are installed, and a network device installed at the enterprise. The security engine server is configured to receive functionality information of the IoT devices, generate a vendor model of the IoT devices based on the functionality information, the vendor model indicating vendor approved functionality of the IoT devices, receive installation information of the IoT devices, generate an enterprise model of the IoT device installation based on the installation information, the enterprise model indicating enterprise approved functionality of the IoT devices, and control the network device to provide security services to the IoT devices installed at the enterprise based on the vendor model and the enterprise model.
    Type: Application
    Filed: February 13, 2024
    Publication date: August 14, 2025
    Applicant: Zuul, Inc.
    Inventors: Andrew Cohen, Edward Stanford
  • Publication number: 20250260695
    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed to securely share data. An example apparatus includes at least one first programmable circuit to obtain an access control list for an encrypted data object via a first communication channel with a data provider, the encrypted data object to be provided by the data provider via a second communication channel. Additionally, the example apparatus includes memory controller circuitry to permit or deny a request from at least one second programmable circuit to access the encrypted data object based on the access control list for the encrypted data object.
    Type: Application
    Filed: April 30, 2025
    Publication date: August 14, 2025
    Inventors: Francesc Guim Bernat, Gaspar Mora Porta, Violante Moschiano, Edgar Gonzalez Pellicer, Tommaso Vali, Ignacio Astilleros Diez
  • Publication number: 20250260697
    Abstract: Provided is a system including at least one processor configured to detect a communication request for a communication between a protected party and a second party, in response to determining the communication originated from the second party, determine if an identity of the second party is verified by the originating service provider based on at least one of STIR/SHAKEN attestation or a network operator, in response determining that the identity of the second party is verified by the originating service provider, initiate a search in a database maintained by the protected party based on an identifier of the second party, determine if the identifier of the second party matches an entry in the database based on the search, and in response to determining that the identifier of the second does not match an entry in the database, automatically monitor the communication in real-time.
    Type: Application
    Filed: May 2, 2025
    Publication date: August 14, 2025
    Inventor: Joseph A. Charlson
  • Publication number: 20250260698
    Abstract: Techniques described herein can generate customized, user-based security response recommendations for users of security system(s), such as for security analysts tasked with performing responses to computing security threats. A user-based response recommendation engine can generate the user-based security response recommendations based on incident data associated with security incidents and based on historical user response data. Furthermore, user role inference techniques can optionally be used in conjunction with the user-based response recommendation engine.
    Type: Application
    Filed: February 12, 2024
    Publication date: August 14, 2025
    Inventors: Yi Hong, Tian Bu
  • Publication number: 20250260701
    Abstract: A neural network intrusion detection system (NNIDS) monitors network traffic between a plurality of devices in a system to obtain raw traffic data, processes the raw traffic data to obtain processed traffic data, applies an intrusion detection model to the processed traffic data, makes a determination, based on the applying, that an anomaly is detected in the processed traffic data, and based on the determination, implements a data privacy protection policy to remediate the anomaly.
    Type: Application
    Filed: February 8, 2024
    Publication date: August 14, 2025
    Inventors: Parminder Singh Sethi, Srinath Kappgal, Praveen Kumar
  • Publication number: 20250260709
    Abstract: A system and method for analysis of potential cybersecurity threats in an engineered system combines a functional simulation of the system with a cyberattack information layer. The cyberattack information layer informs the simulation with respect to the effects of a potential cyberattack on devices and links in the system. An iterative AI-based sequential decision-making optimization identifies a sequence of attacker steps for carrying out a cyberattack which has the greatest impact on a key performance indicator relating to operation of the system. The cyberattack information layer includes information relating to a topology and devices in the system from a computer network perspective and includes information on an amount of effort required to carry out possible attacks affecting each device or communication link in the system. The decision-making optimization may be run iteratively between the simulation and the cyberattack information layer to find a most impactful sequence of attacker actions.
    Type: Application
    Filed: June 20, 2023
    Publication date: August 14, 2025
    Applicant: Siemens Corporation
    Inventors: Bruno Paes Leao, Daniel Grinkevich, Jagannadh Vempati, Patrick Mostyn, Siddharth Bhela, Tobias Ahlgrim