H04L63/00

Parallel encrypted data streams for virtual private networks
11582195 · 2023-02-14 · ·

A virtual private network (VPN) server connected to a client device within a VPN obtains data for delivery to the client device. The VPN server selects a data stream from a set of data streams of the VPN connection with the client device, where each data stream of the set of data streams has a different encryption context. The VPN server generates a data packet based on the data such that the data packet is encrypted using the encryption context specific to the selected data stream. The VPN server transmits the data packets to the client device via the selected data stream.

CROSS-CHAIN COLLABORATIVE GOVERNANCE SYSTEM, METHOD AND DEVICE AND STORAGE MEDIUM
20230039643 · 2023-02-09 ·

A cross-chain collaborative governance system is configured to perform collaborative service and control governance on cross-chain interoperation between application subchains in a cross-chain alliance. The cross-chain collaborative governance system includes: a cross-chain access application layer configured to make a first application subchain and a second application subchain access the cross-chain collaborative governance system; a credible cross-chain collaborative layer configured to provide collaborative service for cross-chain interoperation between the first application subchain and the second application subchain; and a credible cross-chain governance layer configured to perform control governance on the cross-chain interoperation between the first application subchain and the second application subchain.

Transmission Resource Distribution for Streaming of Variable Bitrate Encoded Media Data
20180007106 · 2018-01-04 ·

A technique for distributing transmission resources in a media data streaming system is disclosed. A user terminal of the media data streaming system comprises an interface configured to receive a stream of variable bitrate encoded media data via a communications network. The user terminal further comprises a memory storing program code and at least one processing device configured to execute the program code. The program code causes the processing device to determine bitrate variation information for the media data stream and to trigger transmission of the bitrate variation information towards a network component. The network component is configured to trigger dynamic distribution of the transmission resources of the communications network among multiple user terminals dependent on the bitrate variation information.

Communication System and Comparison Method

A communication system and a comparison method for securing a communication path for a legitimate user via a terminal apparatus (“TA”). A vehicle-mounted communication device (“VMCD”) transmits a device ID identifying the VMCD to a TA, acquires a terminal ID from the TA, and transmits the device ID and the terminal ID acquired from the TA to a central apparatus. The TA transmits a terminal ID identifying the TA to the VMCD, acquires a device ID from the VMCD, and transmits the terminal ID and the device ID acquired from the VMCD to the central apparatus. The central apparatus receives a device ID and a terminal ID transmitted from the VMCD and a device ID and a terminal ID transmitted from the TA, and compares the device ID and the terminal ID received from the VMCD with the device ID and the terminal ID received from the TA.

System, security and network management using self-organizing communication orbits in distributed networks

A method is provided of managing a non-static collection of machines. A first client machine runs a first communication protocol. The non-static collection of machines includes a first linear communication orbit, the first linear communication orbit comprising a sequence of machines that run the first communication protocol, and a second linear communication orbit, the second linear communication orbit comprising a sequence of machines that run a second communication protocol distinct from the first communication protocol. The first client machine receives an instruction from a server to install the second communication protocol, installs the second communication protocol, and then submits a registration request to the server. The first client machine receives, from the server, contact information of a list of potential neighbors. The first client machine then, proactively constructs and maintains a respective local segment of the second linear communication orbit.

AN INTEGRATED MOBILE PERSONAL ELECTRONIC DEVICE AND A SYSTEM TO SECURELY STORE, MEASURE AND MANAGE USERS HEALTH DATA
20180011973 · 2018-01-11 ·

A mobile device, methods and systems provide the invention mobile Personal Health Records (PHR) management platform solution. The platform enables secure PHR data management, measuring user's medical parameters, managing PHR secured depository containing user's health data on the user's invention combined phone & add-on sleeve device, while blocking none legitimate users access to the invention devices secured storage content. The invention device user's authentication is based on the combined weighted fusion of at least two different human biological sensors within the device and their weighted output analysis. The multi-sensors ensure bio-authentication secured memory entry only for the legitimate device user. In case of authentication success it activates various types of applications on the user PHR data depository content stored in device. The system supports the user's PHR remote health management, remotely monitoring the user's measured medical parameters, updating & managing user's health medical history depository in the user's electronic sleeve.

Methods and apparatus to execute a workload in an edge environment

Methods and apparatus to execute a workload in an edge environment are disclosed. An example apparatus includes a node scheduler to accept a task from a workload scheduler, the task including a description of a workload and tokens, a workload executor to execute the workload, the node scheduler to access a result of execution of the workload and provide the result to the workload scheduler, and a controller to access the tokens and distribute at least one of the tokens to at least one provider, the provider to provide a resource to the apparatus to execute the workload.

METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
20230007120 · 2023-01-05 · ·

Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.

DATA TRANSMISSION METHOD, APPARATUS, AND SYSTEM, COMPUTER DEVICE, AND STORAGE MEDIUM

A data transmission method, apparatus, and system, a computer device, and a storage medium. The method includes: performing two-way authentication with a first interaction device; receiving encrypted interaction data obtained by encrypting interaction data based on a working key and transmitted by the first interaction device, after the two-way authentication is completed, the working key being obtained by the first interaction device by mapping an authentication key used in the two-way authentication; decrypting the encrypted interaction data according to the working key obtained by mapping the authentication key on the communication adapter; transmitting interaction data obtained through the decryption to a second interaction device through a simulated device node identifiable by the second interaction device and based on a communication protocol of the second interaction device that is natively adapted to the device node.

Database protocol for exchanging forwarding state with hardware switches

Some embodiments provide a set of one or more network controllers that communicates with a wide range of devices, ranging from switches to appliances such as firewalls, load balancers, etc. The set of network controllers communicates with such devices to connect them to its managed virtual networks. The set of network controllers can define each virtual network through software switches and/or software appliances. To extend the control beyond software network elements, some embodiments implement a database server on each dedicated hardware. The set of network controllers accesses the database server to send management data. The hardware then translates the management data to connect to a managed virtual network.