Patent classifications
H04L63/00
DISTRIBUTED PRIVATE LOCATION VERIFICATION AND ENHANCEMENT
Methods and devices for privately verifying and enhancing location data by a distributed ledger system are disclosed. A location-based services server receives a possible location of a mobile device. A location verification system determines a detected location of the mobile device. A distributed ledger system uses a private set intersection technique to determine whether the possible location corresponds to the detected location without the possible location or detected location being shared. Probabilities associated with the possible and detected locations can also be combined to enhance the accuracy of the possible location.
SYSTEMS AND METHODS FOR SECURING VIDEOCONFERENCING MEETINGS
One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.
SCRUBBER FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS TARGETTING MOBILE NETWORKS
A device includes a processor and a memory. The processor effectuates operations including receiving signaling messages traversing a first interface or a second interface from the network traffic, translating the signaling messages into one or more events, detecting one or more anomalies by analyzing the one or more events, determining whether the one or more anomalies is indicative of an attack on a telecommunications network and performing a remediation action to the signaling messages resolving the attack when the one or more anomalies is indicative of an attack on the telecommunications network.
SYSTEMS, METHODS, AND APPARATUS FOR DIVIDING AND ENCRYPTING DATA
A method for data encryption may include receiving input data, finding a delimiter in the input data, generating, based on a position of the delimiter in the input data, a portion of data using a part of the input data, and encrypting the portion of data. The input data may include a record, the delimiter indicates a boundary of the record, and the portion of data may include the record. The position of the delimiter may be in the part of the input data. Generating the portion of data may include generating the portion of data based on a subset of the part of the input data. The part of the input data may be a first part of the input data, and the position of the delimiter may be in a second part of the input data.
ASSEMBLY TYPE EDGE SYSTEM
This application relates to an assembly type edge system. In one aspect, the edge system includes M protocol modules connected to and interworked with the at least one interworking target device according to a specified interworking protocol, and a collection module configured to collect a collection data set of a specified collection data structure through at least one protocol module. The system may also include P processing modules configured to generate n (1≤n≤N) pieces of data to be transmitted to a specified higher-level system, and S structuring modules configured to generate a transmission data set by structuring a data group including the n pieces of data. The system may also include T communication modules configured to apply a specified communication protocol to the transmission data set, and transmit the transmission data set to a specified higher-level system, and a control module configured to control one or more of the modules.
Monitoring a privacy rating for an application or website
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more privacy ratings. The request identifies at least one application, such as an application installed on the client computing device for example. A policy associated with the identified application is obtained. The obtained policy is analyzed to identify a plurality of key words or phrases associated with use by the at least one application of functionality of, or personal information stored on, the client computing device. One or more privacy ratings are generated based on numerical values assigned to each of the identified key words or phrases, the generated one or more privacy ratings are output to the client computing device in response to the request.
ON-DEMAND SECURITY POLICY PROVISIONING
Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.
Information processing apparatus and control method
A control method for an information processing apparatus includes determining whether connection processing is executable by a predetermined access point, the connection processing being based on a predetermined standard for establishing a connection by the predetermined access point transmitting connection information for connecting to the predetermined access point, and executing notification processing for prompting a user to perform a predetermined operation on the predetermined access point, the predetermined operation for causing the predetermined access point to execute the connection processing, in a case where it is determined that the connection processing is executable by the predetermined access point.
AUGMENTED-REALITY EXPERIENCE CONTROL THROUGH NON-FUNGIBLE TOKEN
A system to perform operations that include: accessing a data object that comprises an Augmented-Reality (AR) filter; accessing a blockchain based on the accessing the data object; minting a Non-Fungible Token (NFT) based on the data object and the blockchain; and storing the NFT on the blockchain.
ONE-OF-A-KIND TO OPEN EDITION NON-FUNGIBLE TOKEN DYNAMICS
A system to perform operations that include: minting a Non-Fungible Token (NFT) that comprises a media object and mutable metadata; allocating the NFT to a user of a client device; granting the user of the client device a permission to change the mutable metadata of the NFT based on the allocating the NFT to the user of the client device; generating an open-edition of the NFT, the open-edition of the NFT comprising a reference to the mutable metadata; receiving a change to the mutable metadata from the user of the client device; and updating the open-edition of the NFT based on the change.