G06F15/16

Method and system for protecting privacy of users in session recordings

A computer system is provided. The computer system includes a memory and a processor. The processor is configured to scan user interface (UI) data representative of a plurality of UI controls; detect a portion of the UI data associated with private information, the portion corresponding to a UI control of the plurality of UI controls; record first session data comprising an obfuscated version of the UI control and unobfuscated versions of other UI controls of the plurality of UI controls; record second session data comprising an unobfuscated version of the UI control; encrypt the second session data to generate encrypted session data; and store the encrypted session data in association with the first session data.

Active locking mechanism using machine learning

Methods and systems disclosed herein describe using machine learning to lock and unlock a device. Machine learning may be trained to recognize one or more features. Once the device has been trained to recognize one or more features, a user may define an unlock condition for the device using the one or more trained features. After defining the unlock condition, the device may be locked by verifying the one or more features that the user defined as the unlock condition using machine learning. When verification is successful, the device may be unlocked and the user allowed to access the device.

SERVER NODE ID ADDRESS RECOGNITION DEVICE
20230043550 · 2023-02-09 ·

Disclosed is a server node ID address recognition device, including: a first recognition module, arranged in a cabinet and provided with a light entrance hole and a plurality of light exit holes; a plurality of case vertical plates arranged in the cabinet, each including a light exit hole and a plurality of light entrance holes, and a number and positions of the light entrance holes in each case vertical plate are configured to be associated with an ID address; and a second recognition module arranged on a server, including a light source, the second recognition module is provided with a light exit hole and a plurality of light entrance holes corresponding to the first recognition module.

INTELLIGENT FLOW STATE SYNCHRONIZATION TO IMPROVE RESILIENCY, AVAILABILITY, AND/OR PERFORMANCE OF REDUNDANT NETWORK SECURITY DEVICES
20230037516 · 2023-02-09 ·

Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.

SYSTEMS AND METHODS FOR PRESERVING MEDIA STREAMS

A computer-implemented method for preserving media streams may include (i) identifying a media stream transmitted by a client device to a server that hosts the media stream for access by additional devices, (ii) detecting that the server is expected to go offline, (iii) sending, in response to detecting that the server is expected to go offline, a message to the client device indicating that the server is expected to go offline, (iv) receiving, at an additional server, a request from the client device to host the media stream, and (v) in response to receiving the request, hosting the media stream at the additional server while ceasing to host the media stream at the server that is expected to go offline. Various other methods, systems, and computer-readable media are also disclosed.

Read-Only Caching Network File System
20230042394 · 2023-02-09 ·

A reactive, WebDAV-based, read-only, caching, file system provides immutable read-only files from a WebDAV server to a client in response to on-demand client file requests or, if the file was previously cached, from a cache server to the client. Files are cached on the cache server in response to previous on-demand client file requests or for client searches performed on directories containing the files. By restricting the file system to read-only files, requiring immutability (i.e., prohibiting file changes), and only providing files in response to on-demand pull requests, a WebDAV architecture can be dramatically optimized.

DATA ACCESS CONTROL MANAGEMENT COMPUTER SYSTEM FOR EVENT DRIVEN DYNAMIC SECURITY

Managing security access in real-time to a computer system using control lists includes detecting a security event at a computer system. The security event is analyzed including an analysis of a historical corpus having historical data of security events. An access control list is generated based on the security event. A determination is made when the security event includes abnormal behavior based on the analysis of the security event and the historical corpus. The security event is published to a monitoring system for controlling access to the computer system, in response to the security event.

Operation of a broadband access network of a telecommunications network comprising a plurality of central office points of delivery
11558290 · 2023-01-17 · ·

A method for operation of a broadband access network of a telecommunications network includes: in a first step, a first access functionality primarily associated with a first central office point of delivery is also connected to a second central office point of delivery, and a second access functionality primarily associated with the second central office point of delivery is also connected to the first central office point of delivery; and in a second step, the cluster controller and both a first control functionality or control plane of the first central office point of delivery and a second control functionality or control plane of the second central office point of delivery control whether the first and second access functionalities are served by the first central office point of delivery or second central office point of delivery.

System and method of dynamic and scalable IoT framework

A method and a system for providing one or more services to one or more user devices [202] in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].

Brokering apparatus and brokering method for trusted reality service

A trust reality service brokering apparatus located on an edge cloud receives a context rule, analyzes event data of at least one physical entity connected to the edge cloud based on the context rule, and transmits an action command to a physical entity or virtual entity corresponding to the event when it is determined that an event has occurred according to an analysis result.