G06F2221/2135

METHODS FOR MANAGING VERIFICATION AND VALIDATION OF THIRD-PARTY CODE AND DEVICES THEREOF
20220318372 · 2022-10-06 ·

The disclosed technology relates to receiving an executable function from a client device, wherein the executable function is to be executed on a function as a service (FaaS) platform. Upon performing a verification and validation process on the received executable function prior to runtime, it is determined when to execute the received executable function based on based on one or more execution initiation techniques upon performing. The verified and validated executable function is executed at the runtime on the FaaS platform based on the determination.

Method for regulating access to data connection by an electronic device
11290463 · 2022-03-29 · ·

A method for monitoring and limiting access to a data connection by an electronic which has means for enabling/disenabling selectively the data connection is disclosed. The method includes a) detecting the initial and final time of each access to data connection during a predetermined time interval; b) counting the overall duration of the accesses to the data connection during the predetermined time interval; and c) if the overall duration reaches a value equal to a maximum duration value pre-set before the end of the predetermined time interval, actuating the means for disenabling the data connection until the end of the predetermined time interval. The method can provide a detailed report and a check in real time, by remote access, of the accesses and durations of a web site, of the time use of installed applications on the device, telephone calls, texts and screenshots of the devices placed under control.

Cybersecurity vulnerability classification and remediation based on network utilization

A technology solution for remediating a cyberattack risk in a computing resource asset in a network system. The technology solution includes monitoring data traffic directed to the computing resource asset in the network system along with data traffic to one or more additional computing resource assets in the network system, generating network utilization data based on the monitored data traffic to the computing resource asset and the monitored data traffic to the one or more additional computing resource assets in the network system, receiving a common vulnerability score (CVSS) for a vulnerability in the computing resource asset, determining a network traffic adjustment (NTA) value for the common vulnerability score (CVSS) based on the network utilization data, adjusting the common vulnerability score (CVSS) by the network traffic adjustment (NTA) value to generate a prioritized common vulnerability score (PCVSS) for the computing resource asset, and remediating the computing resource asset to resolve the vulnerability based on the prioritized common vulnerability (PCVSS) score.

Authentication apparatus

An authentication apparatus of embodiments has a counter circuit and a pseudo-pass generating circuit. The counter circuit counts the number of times an inputted cryptographic key and a cryptographic key set in advance consecutively do not match. The pseudo-pass generating circuit outputs a pseudo-pass response when the number of times the keys consecutively do not match, which is counted by the counter circuit, exceeds a predetermined value.

INTENT-DRIVEN POWER MANAGEMENT

Various systems and methods for implementing intent-driven power management are described herein. A system includes: a power monitoring unit to collect real-time telemetry of a processor on a compute node; and a power level controller to: receive a power intent for execution of an application on the compute node; configure a power level of the processor of the compute node based on the power intent, the processor to execute the application; set an initial execution priority of the application on the compute node based on the power intent; and modify the initial execution priority based on the power intent and the real-time telemetry of the compute node.

REPUTATION MANAGEMENT AND INTENT-BASED SECURITY MECHANISMS

Various systems and methods for implementing reputation management and intent-based security mechanisms are described herein. A system for implementing intent-driven security mechanisms, configured to: determine, based on a risk tolerance intent related to execution of an application on a compute node, whether execution of a software-implemented operator requires a trust evaluation; and in response to determining that the software-implemented operator requires the trust evaluation: obtain a reputation score of the software-implemented operator; determine a minimum reputation score from the risk tolerance intent; compare the reputation score of the software-implemented operator to the minimum reputation score; and reject or permit execution of the software-implemented operator based on the comparison

COMPUTATIONAL STORAGE IN A FUNCTION-AS-A-SERVICE ARCHITECTURE

Various systems and methods for implementing computational storage are described herein. An orchestrator system is configured to: receive, at the orchestrator system, a registration package, the registration package including function code, a logical location of input data for the function code, and an event trigger for the function code, the event trigger set to trigger in response to when the input data is modified; interface with a storage service, the storage service to monitor the logical location of the input data and notify a location service when the input data is modified; interface with the location service to obtain a physical location of the input data, the location service to resolve the physical location from the logical location of the input data; and configure the function code to execute near the input data

Anomaly scoring using collaborative filtering

A machine learning model is trained using tuples that identify an actor, a resource, and a rating based on a normalized count of the actor's attempts to access the resource. Actors may be users, groups, IP addresses, or otherwise defined. Resources may be storage, virtual machines, APIs, or otherwise defined. A risk assessor code feeds an actor-resource pair to the trained model, which computes a recommendation score using collaborative filtering. The risk assessor inverts the recommendation score to obtain a risk measurement; a low recommendation score corresponds to a high risk, and vice versa. The risk assessor code or other code takes cybersecurity action based on the recommendation score. Code may accept a risk R, or aid mitigation of the risk R, where R denotes a risk that the scored pair represents an unauthorized attempt by the pair actor to access the pair resource.

CHILDREN'S EARN-TO-PLAY APP
20220101366 · 2022-03-31 ·

A process for controlling device use, the process comprising: receiving, from a first user having a token credit amount, a request to use a play app having a required token amount; determining a play response based on the token credit amount, wherein the determination corresponds to the following: if the token credit amount is greater than the required token amount, then the request is granted; and if the token credit amount is less than the required token amount, then the request is denied.

INTENT-BASED CLUSTER ADMINISTRATION

Various systems and methods for implementing intent-based cluster administration are described herein. An orchestrator system includes: a processor; and memory to store instructions, which when executed by the processor, cause the orchestrator system to: receive, at the orchestrator system, an administrative intent-based service level objective (SLO) for an infrastructure configuration of an infrastructure; map the administrative intent-based SLO to a set of imperative policies; deploy the set of imperative policies to the infrastructure; monitor performance of the infrastructure; detect non-compliance with the set of imperative policies; and modify the administrative intent-based SLO to generate a revised set of imperative policies that cause the performance of the infrastructure to be compliant with the revised set of imperative policies.