Patents Issued in September 14, 2023
-
Publication number: 20230291732Abstract: A central entity can be in communication with a terminal and a plurality of authentication entities. The central entity can receive a token from the terminal and the central entity can decide to transmit the token to a subset of the plurality of authentication entities. The authentication entities which receive the token, can verify or authenticate the token and transmit an authentication message to the central entity. Based on the authentication messages, the central entity can transmit a message to the terminal indicating which authentication entities authenticated or verified the user and/or a request associated with the user.Type: ApplicationFiled: March 15, 2023Publication date: September 14, 2023Inventors: Jeremy PHILLIPS, Joseph GOLDSTEIN
-
Publication number: 20230291733Abstract: A system and method of sharing user credentials by use of a virtual electronic badge to validate an entry of a user within an authorized building/premises. The system includes a first device associated with a user configured to store a unique identifier that represents a user credential issued to the user. The second device is configured to communicate with the first device and obtain the unique identifier associated with the user. The system includes a server which is communicably coupled with the first device and the second device and configured to store therein a profile information of users related to the first device and the second device. The system further includes that the second device communicates the unique identifier with the server and receives the profile information related to the user of the first device which is reproduced in the form of electronic badge on the second electronic device.Type: ApplicationFiled: March 10, 2023Publication date: September 14, 2023Inventors: Mahesh Dhumpeti, Laxmi Krishna Kanth Jarugumilli, Yuri Novozhenets, Kishore Maroju, Rajesh Krishna Etikela, Gokul Ellanki, Ramesh Lingala
-
Publication number: 20230291734Abstract: A cloud-based communication framework. A first secure channel may be established for communication between an IT device and a cloud-computing platform. A request for a device user interface may be received over the first secure channel. A second secure channel for communication between the IT device and the cloud-computing platform may be established in response to the request for the device user interface. The device user interface may then be forwarded over the second secure channel to the cloud-computing platform.Type: ApplicationFiled: May 19, 2023Publication date: September 14, 2023Inventors: Arnaldo ZIMMERMANN, Livio CECI
-
Publication number: 20230291735Abstract: Techniques are described for providing network provisioning by a network management system (NMS) based on fingerprint information determined by a network access control (NAC) system. An example method includes receiving, by the NAC system, a network access request for a client device to access an enterprise network; obtaining, by the NAC system, fingerprint information of the client device associated with the network access request, wherein the fingerprinting information comprises information specifying one or more attributes associated with the client device; authenticating, by the NAC system, the client device to access the enterprise network; sending, by the NAC system and to the NMS, the fingerprint information of the client device; and provisioning, by the NMS, one or more network resources associated with the client device based on the fingerprint information of the client device.Type: ApplicationFiled: June 29, 2022Publication date: September 14, 2023Inventors: Madhava Rao Cheethirala, Raja Rao Tadimeti, Natarajan Manthiramoorthy
-
Publication number: 20230291736Abstract: Embodiments herein may relate to a technique for identification and verification of compliance with one or more pre-defined security policy sets for a network. Specifically, embodiments may include generation of an access control graph (ACG) that relates to the network. One or more paths of the ACG may be identified, and then compared against the pre-defined security policy sets. Other embodiments may be described or claimed.Type: ApplicationFiled: March 8, 2022Publication date: September 14, 2023Applicant: salesforce.com, inc.Inventors: Michal TREMBACZ, Gianstefano MONNI
-
Publication number: 20230291737Abstract: A computer system for controlling access to digital data and algorithms, including a multitude of local systems provided at a plurality of remote locations. At least a first subset of the multitude of local systems comprises at least one data acquisition device adapted to generate and provide raw digital data. At least a second subset of the multitude of local systems comprises at least one data processing unit having a memory with a memory capacity and a processor with a computing capacity to process raw digital data to generate processed digital data to be presented to one or more of a plurality of users of the system. The system also includes a filter system, wherein at least one filter is assigned at each local system, each filter having a filter setting for restricting and prohibiting data transfer between the assigned local system and other local systems.Type: ApplicationFiled: April 28, 2023Publication date: September 14, 2023Applicant: HEXAGON TECHNOLOGY CENTER GMBHInventor: Mark DURBIN
-
Publication number: 20230291738Abstract: Disclosed is a method of dynamically returning a Domain Name System record. The method comprises receiving, by a Domain Name System service (202), a Domain Name System query, initiated by a Domain Name System client (204). Moreover, the method comprises receiving a programmable script (208) from a user associated with the Domain Name System service (202), and executing, by a programmable script execution engine (206), the programmable script (208) to dynamically generate a response (210) based on the Domain Name System query, wherein programmable script execution engine is communicably coupled to the Domain Name System service. Furthermore, the method comprises providing the generated response from the Domain Name System service to the Domain Name System client as the Domain Name System record. Disclosed also is a system (200) of dynamically returning a Domain Name System record.Type: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Inventor: Dejan Grofelnik Pelzel
-
Publication number: 20230291739Abstract: A system and method for cloud based blacklisting of public email services from scan to email operations includes a cloud server where a blacklist is created and maintained by an administrator for one or more multifunction peripherals having IP addresses in a selected subnet. When a multifunction peripheral receives a scan to email instruction with an associated email address from a user, it requests a copy of the blacklist from the cloud server. The cloud server sends the blacklist to the multifunction peripheral if it has an IP address in the authorized subnet. The multifunction peripheral checks the destination email address and completes the scan to email operation if a domain associated with the email address is not in the blacklist.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventor: Adrian NIELSON
-
Publication number: 20230291740Abstract: Systems and methods for enabling a person who is experiencing and interacting in a virtual environment to obtain customer support or another form of assistance within the environment for an object, service, or experience they interact with in the virtual environment.Type: ApplicationFiled: March 13, 2023Publication date: September 14, 2023Inventor: Erik Ashby
-
Publication number: 20230291741Abstract: Disclosed in various examples are methods, systems, and machine-readable media for exposing a Representational State Transfer (RESTful) interface to users whereby management commands on a datacenter may be issued remotely from the users' workstations for secure, remote management of the datacenter. An application task automation command (e.g., a POWERSHELL® command) is executed remotely by creating a proxy command (e.g., based on a POWERSHELL® cmdlet code) to cause the application task automation command to be executed when the proxy command is remotely invoked and deploying the proxy command to a remote computer, such as the user's workstation. The remote computer issues a request including a user identifier and any parameters for the application task automation command when the corresponding proxy command has been invoked by the remote computer.Type: ApplicationFiled: May 17, 2023Publication date: September 14, 2023Inventors: Vikas Ahuja, Joel T. Hendrickson, Xiaoting Zhang, Yi Zeng
-
Publication number: 20230291742Abstract: A method of dynamically adjusting access privileges of system identities. A set of access logs associated with a system are analyzed in order to generate a restricted access policy for an over privileged system identity. An initial access policy of the system identity is replaced with the restricted access policy and a continuous monitoring and access management (CMAM) service is initiated. Access logs are collected for a monitoring time window and an access denied error can be extracted from the access logs. The access denied error can be compared to an ignore list and/or the access denied error can be added to the ignore list. Authorization checks can be performed to determine if the action associated with the access denied error is authorized. If the action is authorized, the access policy is adjusted to allow for performance of the action.Type: ApplicationFiled: May 19, 2023Publication date: September 14, 2023Inventor: Ashish Kurmi
-
Publication number: 20230291743Abstract: Systems, methods, and non-transitory computer readable media including instructions for determining utilized permissions in a cloud computing environment.Type: ApplicationFiled: March 24, 2023Publication date: September 14, 2023Applicant: ORCA SECURITY LTD.Inventors: Avi SHUA, Itamar GOLAN, Lior DRIHEM
-
Publication number: 20230291744Abstract: Systems and methods for providing secure access to digital collaboration rooms with dynamic tenancy in response to an event are provided. An example method includes establishing, via an orchestration service, a digital collaboration room for an entity; receiving and storing three authentication factors of a user, the three authentication factors including a first authentication factor relating a corporate email account of the user assigned by the entity; and upon an entity's request and in response to an event activating an isolate mode and isolating the digital collaboration room.Type: ApplicationFiled: May 12, 2023Publication date: September 14, 2023Inventors: Kevin Gaffney, Paul Meagher, Marlon Rodrigues, Jordan McGrath, Omar Anshasi
-
Publication number: 20230291745Abstract: Various example embodiments for supporting security in a communication system are presented. Various example embodiments for supporting security in a communication system may be configured to support stateful security redundancy in the communication system. Various example embodiments for supporting stateful security redundancy in a communication system may be configured to support stateful security redundancy for a set of client devices based on a set of security nodes arranged in a security redundancy architecture. Various example embodiments for supporting stateful security redundancy for a set of client devices based on a set of security nodes arranged in a security redundancy architecture may be configured to support stateful security redundancy for a client device based on a security redundancy domain including an active security node and one or more standby security nodes.Type: ApplicationFiled: May 17, 2023Publication date: September 14, 2023Inventors: Jun Hu, John Coffell
-
Publication number: 20230291746Abstract: Novel tools and techniques are provided for utilizing blockchain to implement named data networking. In various embodiments, a computing system might determine whether a cache that is communicatively coupled to the computing system contains data that is responsive to a first request received from a user. If so, the computing system might retrieve and send (to the client device) data that is responsive to the received first request. If not, the computing system might send, to a blockchain system, a second request for identifying a blockchain containing a block containing data responsive to the received first request. In response to identifying such a blockchain, the computing system might receive a copy of the identified blockchain; might abstract, from the identified blockchain, the block containing the data responsive to the received first request; might abstract the data from the identified block; and might send the data to the client device.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Applicant: CenturyLink Intellectual Property LLCInventors: Kevin M. McBride, Stephen Opferman, Steven M. Casey, William O’Brien, JR.
-
Publication number: 20230291747Abstract: In the specification and drawings a method of securing a voting transaction is described and shown that includes initiating a voting transaction; verifying the identity of a voter; generating a passcode by the voting system; transmitting the passcode from the voting system to the voter over the telecommunication network; entering the passcode into a voting station; making one or more voting selections by the voter; transmitting the one or more voting selections from the voting station to the voting system over the telecommunication network; transmitting the passcode from the voting station to the voting system over the telecommunication network; verifying the authenticity of the passcode by the voting system; and declining to include the one or more voting selections in a vote count unless the passcode transmitted to the voting system by the voting station is verified authentic.Type: ApplicationFiled: September 7, 2022Publication date: September 14, 2023Applicant: DUCKPOND TECHNOLOGIES, INC.Inventor: DARTANYON ANTWAUN WILLIAMS
-
Publication number: 20230291748Abstract: An apparatus comprising: a receive-input for coupling to a transmission medium; a transceiver configured to receive signals representative of one or more data transmission units from the receive-input and output said data transmission units a protocol module configured to process at least a subset of the one or more data transmission units output from the transceiver according to a protocol, said processing including at least removing one or more fields of information from said subset of data transmission units associated with said protocol; and wherein the apparatus is configured to add at least one field to the subset of data transmission units processed by said protocol module, the at least one field comprising protocol information derived from said processing by the protocol module and provide said data transmission units with the at least one field added to a receive-output of the apparatus.Type: ApplicationFiled: March 7, 2023Publication date: September 14, 2023Inventors: Philip Axer, Christian Herber
-
Publication number: 20230291749Abstract: Systems and methods for verified messaging through the interaction involving a short-range transceiver, such as a contactless card, a client device and a server are presented. Verified messaging may be provided in the context of using a client device to receive a user identifier from the user's short-range transceiver, such as a contactless card, and sending a messaging request with the user identifier to a server, which may look up client device information and compare with data about the client device accompanying the request. Matching received client device information to stored client device data based on a user identifier obtained from a short-range transceiver provides an enhanced ability to verify that the client device corresponds to the user associated with the short-range transceiver.Type: ApplicationFiled: May 19, 2023Publication date: September 14, 2023Inventors: Jeffrey RULE, Kevin OSBORN
-
Publication number: 20230291750Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communications device via a communications network. One embodiment may include obtaining, via a communications network coupled to a client computing resource, signals indicative of the subscriber identifier.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Inventors: Manish Dalwani, Christopher Cunningham, Yekaterina Bardash, Greg Bonin
-
Publication number: 20230291751Abstract: A system and method for preventing access to potentially malicious network destinations. The method includes determining a plurality of network destinations and indicators of the plurality of network destinations including an indicator of a first network destination. A plurality of feature vectors are generated based on the plurality of network destinations including a first feature vector based on the first network destination. Access by a user via a computing device to a second network destination is detected. A second feature vector is generated, and an indicator is determined based on the second network destination. The second feature vector is compared to the plurality of feature vectors. The access by the user to the second network destination is blocked based on the indicator of the first network destination, the indicator of the second network destination, and the comparison of the second feature vector to the plurality of feature vectors.Type: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Applicant: Avast Software s.r.o.Inventors: Armin Wasicek, Fabrizio Biondi, Thomas Salomon
-
Publication number: 20230291752Abstract: A method for detecting anomalies in a telecommunications network. The method includes implementing, by a first anomaly detection module: obtaining a plurality of first measurement data representing a resource usage of the network at a given time at a level of a target element; determining from the first measurement data at least one anomaly category from a plurality of anomaly categories a presence of attack, a presence of a fault and an absence of anomaly; requesting validation of the determined category to a second attack detection module and/or to a third fault detection module, depending on the determined anomaly category, the request including at least at the given time, an identifier of the target item, the determined anomaly category and the first measurement data; and on receipt of a response from the second and/or third module, deciding on a processing action to trigger in the network according to the response.Type: ApplicationFiled: June 3, 2021Publication date: September 14, 2023Inventors: Yosra Ben Slimen, Hichem Sedjelmaci
-
Publication number: 20230291753Abstract: Methods, systems, and computer readable media to control a cyber physical system using an observer-based controller are described. The observer-based controller including a detector to determine an occurrence of an attack on the cyberphysical system and to inform the observer-based controller via a signal. An observer estimates a system state of the cyberphysical system based on at least partial information about the cyber physical system. The observer-based controller is configured with a predetermined observer gain and controller gain. The observer-based controller is configured to control the cyberphysical system using an estimated error determination that is altered depending on a type of cyber attack. The observer-based controller is configured to control the cyberphysical system subjected to cyber attacks in both a forward channel connecting at least one sensor with the observer and a backward channel connecting the observer-based controller with actuators.Type: ApplicationFiled: March 10, 2023Publication date: September 14, 2023Applicant: KING FAHD UNIVERSITY OF PETROLEUM AND MINERALSInventors: Mutaz M. HAMDAN, Magdi S. MAHMOUD, Uthman BAROUDI
-
Publication number: 20230291754Abstract: A computing system comprising a processing circuit is configured to receive, via a data channel from an agentless monitoring data source, user activity data associated with a first computing device of a first user, determine a policy violation based on the user activity data, compare employee-related information associated with the first user to a threshold, determine a baseline level of risk based on the employee-related information exceeding the threshold, determine a user score based on at least one of a threat dimension or an exposure dimension or an impact dimension, determine a probability of an adverse event based on the determined baseline level of risk and the user score, generate a user-interactive electronic notification comprising an indication of the probability of the adverse event, and transmit the user-interactive electronic notification to a second computing device of a second user.Type: ApplicationFiled: May 9, 2023Publication date: September 14, 2023Applicant: Wells Fargo Bank, N.A.Inventors: Daniel Fricano, Peter A. Makohon
-
Publication number: 20230291755Abstract: A method includes obtaining data associated with operation of a monitored system. The method also includes using one or more first machine learning models to identify anomalies in the monitored system based on the obtained data, where each anomaly identifies an anomalous behavior. The method further includes using one or more second machine learning models to classify each of at least some of the identified anomalies into one of multiple classifications. Different ones of the classifications are associated with different types of cyberthreats to the monitored system, and the identified anomalies are classified based on risk scores determined using the one or more second machine learning models. In addition, the method includes identifying, for each of at least some of the anomalies, one or more actions to be performed in order to counteract the cyberthreat associated with the anomaly.Type: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Inventors: Thomas M. Siebel, Aaron W. Brown, Varun Badrinath Krishna, Nikhil Krishnan, Ansh J. Hirani
-
Publication number: 20230291756Abstract: Certain aspects involve a system, computer-implemented method, and computer-readable medium for identifying attributes associated with a target entity such as a person. A hierarchical characterization system receives an attribute and a request for associated identity data. The system generates an identity graph that includes attribute nodes corresponding to respective attributes and online interaction nodes corresponding to respective online interactions. The system correlates at least a subset of the online interactions and at least a subset of the attributes with a particular entity. The system generates a report indicating an identity of the entity and a behavior of the entity based on the correlated online interactions and the correlated attributes.Type: ApplicationFiled: July 29, 2021Publication date: September 14, 2023Inventors: Nathan Daniel MONNIG, Joshua Michael JOHNSTON
-
Publication number: 20230291757Abstract: A computer implemented method for wireless communications access security, the method comprising steps a computer processor of a client device is programmed to perform, the steps comprising: receiving at least one reference set of values from a server computer, each one of the received reference sets pertaining to a respective access point, measuring at least one parameter during wireless communication with an active access point, and determining a threat indication for the active access point based on a deviation of at least one of the measured parameters from a respective one of the received reference sets of values pertaining to the active access point.Type: ApplicationFiled: May 15, 2023Publication date: September 14, 2023Applicant: CORONET CYBER SECURITY LTDInventor: Doron MILCHTAICH
-
Publication number: 20230291758Abstract: Detection and notification of malware at a user device may be performed by a validation server. The user device may hash elements associated with a document object model of a webpage and send generated hash values to the validation server. The validation server may validate the hash values. Based on detection of hash values corresponding to elements maliciously-injected by malware, the validation server may send one or more notifications to other servers that may communicate with the user device.Type: ApplicationFiled: May 23, 2023Publication date: September 14, 2023Inventors: Joel Richard Townsend, John Raymond Omernik, William Anderson Hodges
-
Publication number: 20230291759Abstract: Examples described herein relate to a method and a management system for evaluating an information technology (IT) infrastructure's vulnerability to a network attack. The management system determines whether a vulnerability evaluation template corresponding to a network attack is uploaded in a template repository. In response to determining that the vulnerability evaluation template is uploaded in the template repository, the management system transmits the vulnerability evaluation template to a sensor deployed in the IT infrastructure. The vulnerability evaluation template, when executed by the sensor, causes the sensor to generate an assessment indicative of a vulnerability of the IT infrastructure to the network attack. The management system receives the assessment from the sensor and reports it via a dashboard.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventors: Mohd Shahnawaz SIRAJ, Andre BEAUDIN, Qiang ZHOU
-
Publication number: 20230291761Abstract: Aspects of the disclosure relate to monitoring virtual desktops accessed by devices at remote locations using machine-learning models to mitigate potential cyber-attacks. In some embodiments, a computing platform may monitor data associated with a series of activities from a virtual desktop accessed by a remote computing device. Subsequently, the computing platform may detect new activity data on the virtual desktop accessed by the remote computing device, and evaluate the new activity data relative to the data associated with the series of activities, wherein evaluating includes applying a machine learning model to the new activity data. Based on evaluating the new activity data, the computing platform may determine if the new activity data is indicative of a potential cyber-attack. In response to determining that the new activity data is indicative of a potential cyber-attack, the computing platform may initiate one or more security response actions.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventor: Patrick Lewis
-
Publication number: 20230291762Abstract: Techniques, methods and/or apparatuses are disclosed that enable facilitation of remediation of one or more vulnerabilities detected in a web application. Through the disclosed techniques, methods and/or apparatuses, users will be able to navigate to respective web pages of the detected vulnerabilities and snap directly to the vulnerabilities within the webpages. This allows the users to immediately know the location of the vulnerability, and inline feedback can be provided on the issue, including description, severity, solution and plugin outputs.Type: ApplicationFiled: May 17, 2023Publication date: September 14, 2023Inventors: Fergus COONEY, Greg KURUC
-
Publication number: 20230291763Abstract: The described technology is generally directed towards coordinated cellular network attack detection and mitigation. A security function deployed at a network node can monitor network traffic conditions for anomalous behavior indicative of a coordinated attack. In response to detecting the anomalous behavior, the security function can respond with any of several different attack mitigation procedures, in order to protect the network from the coordinated attack. Furthermore, the security function can collect data from connected devices, and use the data to identify malicious code. The security function can then send data and instructions to the connected devices to enable the connected devices to isolate or remove the malicious code.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Inventors: Joseph Soryal, Dylan Chamberlain Reid
-
Publication number: 20230291764Abstract: Threat detection systems and methods in which feature syntax language (FSL) statements are used to define functions that generate features corresponding to detected text within textual non-attachment, non-URL input data. Generated features are aggregated in a core object, and classification rules are applied to the core object to determine a threat classification and theme associated with the input data. Using FSL statements and classification rules enable the system to rapidly generate thematic threat classifications identifying socially engineered attacks. A user interface enables users to rapidly update the FSL statements that define the functions used to generate the features, as well as the threat classification rules that are applied to the features in the core object to classify the input data. The modified statements and rules can be immediately used by the system.Type: ApplicationFiled: March 11, 2022Publication date: September 14, 2023Inventors: Cameron Michael Schmauch, Chaitanya Puchakayala
-
Publication number: 20230291765Abstract: Methods for securing an electronic communication is provided. Methods may include, in a registration process, creating and/or selecting an anti-phish, personalized, security token for a predetermined account. Methods may include, in the registration process, storing the token in a database. Methods may include, in an in-use process, generating an electronic communication at a channel. The database may be interposed along the channel. Methods may include, in the in-use process, forwarding the communication to a recipient. The recipient may be associated with the account. Methods may include, in the in-use process, intercepting the communication at the database. Methods may include, in the in-use process, selecting, from the database, the anti-phish, personalized, security token that is associated with the account. Methods may include, in the in-use process, injecting the selected token into the communication.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
-
Publication number: 20230291766Abstract: Systems, and methods of protecting users against cyber-attacks that utilize SIM Swap or Email Hijacking. A method includes: (a) detecting that a user is requested to input his genuine email address into an email address field of an account profile page or an account settings page of a computerized service; (b) inserting, into that email address field of that page, a replacement email address that replaces a genuine email address of the genuine user at that computerized service; and later, (c) automatically monitoring and handling, continuously at a remote server or a remote service, incoming email messages that arrive to that replacement email address of that genuine user and that request the genuine user to perform an elevated-security operation or to reset his credentials for accessing that computerized service.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventors: Avi Turgeman, Kfir Yeshayahu, Guy Bauman, Yaron Dror, Erez Zohar
-
Publication number: 20230291767Abstract: Herein is disclosed a method of verifying the authenticity of emails sent within an email domain from a sender to a recipient, the emails each having a sender’s email address, a receiver’s email address, and a user-accessible field for receiving content. The content of the user-accessible field is visible to the recipient upon opening an email inbox in the second email application. The method includes the steps of first identifying the receiver for an email to be sent by the sender. A current sequence marker for the receiver is then generated. The current sequence marker represents a next sequence identifier in a sequence of emails between the sender and the receiver. The current sequence marker is then inserted into the user-accessible field of the email and the email is then sent.Type: ApplicationFiled: March 5, 2023Publication date: September 14, 2023Inventor: William Michael Pearce
-
Publication number: 20230291768Abstract: Systems and methods are disclosed for securing a network, for admitting new nodes into an existing network, and/or for securely forming a new network. As a non-limiting example, an existing node may be triggered by a user, in response to which the existing node communicates with a network coordinator node. Thereafter, if a new node attempts to enter the network, and also for example has been triggered by a user, the network coordinator may determine, based at least in part on parameters within the new node and the network coordinator, whether the new node can enter the network.Type: ApplicationFiled: May 3, 2023Publication date: September 14, 2023Inventors: Yoav Hebron, Na Chen, Zong Liang WU, Ronald Lee
-
Publication number: 20230291769Abstract: A plurality of security rule processing nodes is configured for network traffic of a set of sources and destinations. Respective subsets of configuration information of the sources and destinations, including security rules, are transmitted to the nodes. Respective addresses of at least a subset of the nodes are transmitted to a packet processing intermediary. The intermediary requests evaluation of applicable security rules with respect to packet flows by selected nodes prior to initiating routing actions for packets of the flows.Type: ApplicationFiled: May 12, 2023Publication date: September 14, 2023Applicant: Amazon Technologies, Inc.Inventors: Dheerendra Talur, Venkat Maithreya Paritala, Abhishek Chhajer, Charlie Jahchan, Yogeshkumar Kuite
-
Publication number: 20230291770Abstract: This disclosure relates to systems and methods for managing connected devices and associated network connections. In certain embodiments, trust, privacy, safety, and/or security of information communicated between connected devices may be established in part through use of security associations and/or shared group tokens. In some embodiments, these security associations may be used to form an explicit private network associated with the user. A user may add and/or manage devices included in the explicit private network through management of various security associations associated with the network's constituent devices.Type: ApplicationFiled: May 15, 2023Publication date: September 14, 2023Applicant: Intertrust Technologies CorporationInventors: David P. MAHER, Gilles BOCCON-GIBOD
-
Publication number: 20230291771Abstract: A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer, Brian Philip Murphy
-
Publication number: 20230291772Abstract: Methods and systems for filtering video content items are described herein. The system identifies a plurality of video content items that are linked to respective image content items. The system determines, for each of the plurality of video content items, whether a video content item corresponds to a respective image content item. In response to the determining, the system causes to be provided information identifying the plurality of video content items excluding video content items that do not correspond to respective image content items.Type: ApplicationFiled: May 22, 2023Publication date: September 14, 2023Inventors: Nishchit Mahajan, Nainika Aggarwal, Dennis Anthony Varkey, Ankur Anil Aher
-
Publication number: 20230291773Abstract: A wireless communication network provides a text-messaging service and a voice-calling service to wireless communication devices. The wireless communication network monitors performance of text-messaging functions and voice-calling functions. The wireless communication network prioritizes the text-messaging functions and the voice-calling functions based on their performance. The wireless communication network transfers function lists that prioritize the text-messaging functions and the voice-calling functions by their performance. The wireless communication network wirelessly exchanges text-messaging signaling and voice-calling signaling between the wireless communication devices and the text-messaging functions and the voice-calling functions. Individual ones of the wireless communication devices exchange the text-messaging signaling with selected ones of the text-messaging functions based on the function list that prioritizes the text-messaging functions by their performance.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventors: Rajil Malhotra, Anuj Sharma, Anil Kumar Mariyani, Ramesh Kumar Golla
-
Publication number: 20230291774Abstract: According to one embodiment, a telephone number research device researches on the usage status of a telephone number in an IMS network, an NGN network, and an IP network without ringing an incoming call by transmitting a specific SIP message that causes call rejection using an IMS interconnection interface or the like for interconnection between carriers. The telephone number research device is connected via an NGN network to a telephone connected to a destination network that is an IMS network or a VoIP network. The telephone number research device adds a first SDP parameter to an INVITE request for the telephone before sending the request to the destination network selected by the NGN network and determines the usage status of the telephone number of the telephone based on a response from the destination network regardless of the type of the destination network.Type: ApplicationFiled: October 26, 2021Publication date: September 14, 2023Inventor: Yasunori KAWAKAMI
-
Publication number: 20230291775Abstract: Aspects of the technology described herein provide a collaborative browsing experience in which real-time browsing activity and saved browsing activity of session collaborators in a collaborative browsing session are shared with the collaborators. A collaborative session may be initiated, which may create a tab group associated with the session and linked to a collaborator. Other collaborators may be invited to join the session, and additional tab groups for each collaborator may be created. The tab groups of the collaborators may be included in a collective tab group, which may be updated in real-time with changes made by any of the collaborators. For example, client changes may be handled locally and communicated to a service to which each client is connected. The service may sequence and broadcast the ordered changes to the clients, which may each implement the changes according to the sequence to synchronize a shared state amongst clients.Type: ApplicationFiled: May 15, 2023Publication date: September 14, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Avi Ashish VAID, Joseph Jiwoong OAK, Mohamed MANSOUR
-
Publication number: 20230291776Abstract: Systems and methods may be used for coordinating users into groups in an online meeting. A method may include, during a video conferencing meeting, displaying, in a participant user interface component, attendee video streams of attendees of the video conferencing meeting, identifying tags for the attendees of the video conferencing meeting, and determining, from content shared within the video conferencing meeting, metadata corresponding to at least one tag of the tags for the attendees. The method may include, responsive to determining the metadata: generating a group of attendees that are associated with the tag, selecting a subset of the attendee video streams based on the group of attendees, and dynamically recomposing the participant user interface component to include the subset of the attendee video streams.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventors: Defne AYANOGLU, Nakul MADAAN
-
Publication number: 20230291777Abstract: A server for streaming a video to a client involves making the video available from the server to the client upon request in at least a temporal independent version and a temporal dependent version. The server is configured for: i) receiving a request from the client to receive a stream of the video from an arbitrary starting point in time; and ii) retrieving at least the first frame from the temporal independent version; and iii) retrieving frames subsequent to the at least first frame from the temporal dependent version; and iv) sending the at least first frame to the client and send the frames subsequent to the at least first frame to the client.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventors: Maarten TIELEMANS, Pieter-Jan SPEELMANS, Steven TIELEMANS, Egon OKERMAN
-
Publication number: 20230291778Abstract: A media sharing system includes at least two computing devices each having a wireless module for a bidirectional transmission of media data of a displayed image, an input message, a cursor, and a sound, and including: at least one display service block receiving and processing the displayed image from the wireless module; at least one sound service block receiving or outputting a sound signal from or to a controlling side computing device and a controlled side computing device to carry out the sound processing and broadcasting; at least one input device; and at least one input device service block connected to the input device, so as to allow the input device to be activated to issue an activation signal. The input device service block receives an input signal of the input device included in the controlling and controlled side computing devices so as to perform a display-related function.Type: ApplicationFiled: January 31, 2023Publication date: September 14, 2023Applicant: Magic Control Technology CorporationInventor: Pei-Chung LIU
-
Publication number: 20230291779Abstract: Video editing software tools platform utilizing a video display to provide access to specific video editing software tools, such as video oriented applications or widgets, that can assist those in a video broadcasting team, such as a camera operator or video editor, with a video broadcast feed. Various video editing software tools can provide features and functions that can add visual context to video data presented in the image stream from the video camera and provide archived information pertaining to the same. Various embodiments relate to systems and methods for simultaneously switching input image streams to output devices, while providing optional image processing functions on the image streams. Certain embodiments may enable multiple users/viewers to collaboratively control such systems and methods.Type: ApplicationFiled: February 10, 2023Publication date: September 14, 2023Inventors: JACK WADE, CHRIS GREVE
-
Publication number: 20230291780Abstract: The unique watermark system comprising: identifying a presenter attendee, a first recipient attendee, and a second recipient attendee through a video conferencing session; detecting the presenter attendee sharing the visual content with the first recipient attendee and the second recipient attendee; selecting a first unique watermark and a second unique watermark from the plurality of unique watermarks and assigning them to a first recipient attendee and a second recipient attendee, respectively; inserting the first unique watermark into the visual content for the first recipient attendee and the second unique watermark into the visual content for the second recipient attendee; and transmitting the visual content with the first unique watermark to the first recipient attendee and the visual content with the second unique watermark to the second recipient attendee, wherein the method is performed by one or more special-purpose computing devices for hosting the video conferencing session.Type: ApplicationFiled: March 21, 2023Publication date: September 14, 2023Applicant: Zoom Video Communications, Inc.Inventor: Zheng Yuan
-
Publication number: 20230291781Abstract: Methods, systems, and devices for wireless communications are described. The method may include a user equipment (UE) generating a set of multimedia packets including a first multimedia packet and a second multimedia packet that is generated after the first multimedia packet. The UE may add the set of multimedia packets to a queue and apply an uplink packet handling protocol. Using the uplink packet handling protocol, the UE may discard the first multimedia packet and transmit, to a base station, the second multimedia packet. Using the second multimedia packet, a server in communication with the base station may generate a video frame and transmit the video frame to the UE via the base station.Type: ApplicationFiled: March 11, 2022Publication date: September 14, 2023Inventors: Hussein Metwaly Saad, Ravi Agarwal, Peerapol Tinnakornsrisuphap, Mickael Mondet, Hyun Yong Lee, Chih-Ping Li, Prashanth Haridas Hande, Arvind Vardarajan Santhanam
-
Publication number: 20230291782Abstract: An orchestration system and method are described for at least in part orchestrating a multidevice video session in which a plurality of devices each transmit a video, for example of a user, via a network and in which a composition system receives said transmitted videos and composites, for a respective device from the plurality of devices, videos of other devices into one or more video streams and transmits the one or more video streams via the network to the device. A grouping of the users/devices may be determined to allow the video stream(s) to be generated for respective devices in a manner which may be dependent on the group to which they are deemed to belong. In particular, the video stream(s) may be generated by the composition system such that the videos of devices within a same group are shown in a better quality than the videos of devices from another group, as a user of a device may prefer to see the users from the same group in a better quality than the users from another group.Type: ApplicationFiled: August 30, 2021Publication date: September 14, 2023Inventors: Simon Norbert Bernard Gunkel, Hans Maarten Stokking