G06F21/00

Methods and apparatuses for dynamically updating routing identifier(s)

Systems, methods, apparatuses, and computer program products for dynamically updating routing identifiers (IDs) are provided. One method may include deciding, at a network node, to update a routing identifier for at least one user equipment. The method may then include obtaining or generating a new routing identifier to be assigned to the at least one user equipment along with authentication vectors, and transmitting the new routing identifier to an authentication entity.

Secure and private hyper-personalization system and method

A secured virtual container is enabled to securely store personal data corresponding to a user, where such data is inaccessible to processes running outside the secured virtual container. The secured virtual container may also include an execution environment for a machine learning model where the model is securely stored and inaccessible. Personal data may be feature engineered and provided to the machine learning model for training purposes and/or to generate inference values corresponding to the user data. Inference values may thereafter be relayed by a broker application from the secured virtual container to applications external to the container. Applications may perform hyper-personalization operations based at least in part on received inference values. The broker application may enable external applications to subscribe to notifications regarding availability of inference values. The broker may also provide inference values in response to a query.

Environmental risk management system

The present disclosure describes devices and methods monitoring a technology environment. In particular, a computing device including a processor with computer readable instructions to access a plurality of indicators (e.g., variables) that have corresponding stored historical information. The indicators are then used to calculate a summed weights table of relative risk for each time period in the past. The summed weights table is then correlated to a target variable (e.g., a variable that documents major issues, incidents, or disruptions that occurred in the technology environment in the past). The correlation coefficient between the summed weights table and the target variable is then used to implement a machine learning algorithm in order to better determine current risk levels (e.g., relative values that predict issues, incidents, or disruption).

License authentication device and license authentication method
11568027 · 2023-01-31 · ·

A license authentication device includes a memory that stores a license file including a license expiration date of an application that adjusts a parameter of a semiconductor manufacturing apparatus in a semiconductor factory; and a processor coupled to the memory. The processor acquires log data when the semiconductor manufacturing apparatus executes a processing; and determines whether or not a time included in the log data has passed the license expiration date stored in the license information storage.

Establishment of network connections

A method for establishing network connections includes connecting a device to a first network, retrieving voice input of a user, sending a message including data related to the voice input to at least one gateway device on the first network, receiving configuration data for a second network via the first network in response to the message, and establishing a connection of the device to the second network using the configuration data received via the first network. Furthermore, an electronic device, a network gateway device and a system are defined.

Biometric authenticated biometric enrollment
11569991 · 2023-01-31 · ·

An example method includes receiving an encrypted biometric enrollment data and user identifier data. The encrypted biometric enrollment data includes at least one biometric enrollment sample from a user encrypted using an encryption key. The encryption key is generated based on a user secret and the user identifier is associated with the user. The user identifier is matched with a stored user secret. A decryption key is generated based on the stored user secret. The encrypted biometric enrollment data is decrypted using the decryption key. The at least one biometric enrollment sample is retrieved from the decrypted biometric enrollment data. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a biometric reference template. A biometric reference template identifier uniquely identifying the biometric reference template is generated. An encryption key is generated based on the stored user secret and encrypts an enrollment confirmation message.

Behavioral detection of malicious scripts
11714904 · 2023-08-01 · ·

A script analysis platform may obtain a script associated with content wherein the script includes one or more functions that include one or more expressions. The script analysis platform may parse the script to generate a data structure and may traverse the data structure to determine the one or more functions and to determine properties of the one or more expressions, wherein traversing the data structure includes evaluating one or more constant sub-expressions of the one or more expressions. The script analysis platform may analyze the properties of the one or more expressions to determine whether the script exhibits malicious behavior. The script analysis platform may cause an action to be performed concerning the script or the content based on determining whether the script exhibits malicious behavior.

Phone number based application authentication

Systems and methods are provided for registering with a given application. The systems and methods include operations for receiving, with a messaging application, a request to authenticate a phone number from the given application, the phone number being input by a user to register an account with the given application; determining that the phone number received in the request matches a user phone number stored in a user account associated with the messaging application; in response to determining that the phone number received in the request matches the user phone number stored in the user account, transmitting a communication from the messaging application to the given application indicating that the phone number has been authenticated; and causing the given application to register the account for the user to enable the user to log into the given application.

Data security protection system

According to embodiments of the present disclosure, there is provided a system, method, electronic device, storage medium and program product of security protection. The system comprises: a security computing sub-system, configured to manage security of developed code to compile the developed code into an installation file corresponding to a target application and a service program for supporting the target application; a data exchange sub-system, configured to manage data communication of the target application or service program with RoW (rest of World); and a security sandbox sub-system, configured to manage traffic data associated with the target application. In this way, the embodiments of the present disclosure can guarantee the security and compliance of data related to the target application.

System and method of categorization of an application on a computing device using a classifier

Disclosed herein are systems and methods for categorizing an application on a computing device including gathering a set of attributes of an application. The set of attributes of the application includes at least one of: a number of files in an application package of the application; a number of executable files in the application package; numbers and types of permissions being requested; a number of classes in the executable files in the application package; and a number of methods in the executable files in the application package. sending the gathered set of attributes to a trained classification model. The application is classified, using the classification model, based on the gathered set of attributes by generating one or more probabilities of the application belonging to respective one or more categories of applications. A category of the application is determined based on the generated one or more probabilities.