Patent classifications
H04L9/36
Systems and methods for providing enhanced security features in a virtual reality (VR) onboarding session
Apparatus, systems and methods for providing a four-part, virtual reality (VR) customer service interaction between a customer service avatar operating on a VR platform and a customer using both a mobile device and a VR device are provided. Methods may include activating a VR session between the customer service avatar and the customer. Methods may include validating the VR session between the customer service avatar and the customer. Methods may include processing a co-browsing VR session request. Methods may include initiating the VR session between the customer service avatar and the customer.
Systems and methods for providing enhanced security features in a virtual reality (VR) onboarding session
Apparatus, systems and methods for providing a four-part, virtual reality (VR) customer service interaction between a customer service avatar operating on a VR platform and a customer using both a mobile device and a VR device are provided. Methods may include activating a VR session between the customer service avatar and the customer. Methods may include validating the VR session between the customer service avatar and the customer. Methods may include processing a co-browsing VR session request. Methods may include initiating the VR session between the customer service avatar and the customer.
Decrypted packet padding processing or decyrypted packet padding removal
In order to improve the efficiency of transfer to outside devices while necessary buffer memory is suppressed, the present invention is an information processing apparatus for decoding a packet that is encrypted in accordance with Transport Layer Security (TLS) protocols and in which a padding portion has a variable length, the information processing apparatus including acquisition means for acquiring an encrypted packet on a unit data basis, decoding means for decoding the encrypted packet on the unit data basis, output means for outputting decoded data obtained through the decoding performed by the decoding means to an external device in accordance with an order in which the decoding is performed by the decoding means, and control means for restricting output to be performed by the output means in a case where a padding pattern is detected from the decoded data obtained through the decoding performed by the decoding means.
Decrypted packet padding processing or decyrypted packet padding removal
In order to improve the efficiency of transfer to outside devices while necessary buffer memory is suppressed, the present invention is an information processing apparatus for decoding a packet that is encrypted in accordance with Transport Layer Security (TLS) protocols and in which a padding portion has a variable length, the information processing apparatus including acquisition means for acquiring an encrypted packet on a unit data basis, decoding means for decoding the encrypted packet on the unit data basis, output means for outputting decoded data obtained through the decoding performed by the decoding means to an external device in accordance with an order in which the decoding is performed by the decoding means, and control means for restricting output to be performed by the output means in a case where a padding pattern is detected from the decoded data obtained through the decoding performed by the decoding means.
SECURE COMPUTATION SYSTEM, SECURE COMPUTATION DEVICE, SECURE COMPUTATION METHOD, AND PROGRAM
A secure computation technique of calculating a polynomial in a shorter calculation time is provided. A secure computation system includes: a comparing means 120 that generates concealed text [[u]] of u, which is the result of magnitude comparison between a value x and a random number r, from concealed text [[x]] by using concealed text [[r]]; a mask means 130 that generates concealed text [[c]] of a mask c from the concealed text [[x]], [[r]], and [[u]]; a reconstructing means 140 that reconstructs the mask c from the concealed text [[c]]; a coefficient calculating means 150 that calculates, for i=0, . . . , n, a coefficient b.sub.i from an order n, coefficients a.sub.0, a.sub.1, . . . , a.sub.n, and the mask c; a selecting means 160 that generates, for i=1, . . . , n, concealed text [[s.sub.i]] of a selected value s.sub.i, which is determined in accordance with the result u of magnitude comparison, from the concealed text [[u]]; and a linear combination means 170 that calculates a linear combination b.sub.0+b.sub.1[[s.sub.1]]+ . . . +b.sub.n[[s.sub.n]] of the coefficient b.sub.i and the concealed text [[s.sub.i]] as concealed text [[a.sub.0+a.sub.1x.sup.1+ . . . +a.sub.nx.sup.n]].
ENTERPRISE SECURITY IN METERS
The present disclosure provides for enterprise security in intelligent electronic devices such as electric power meters. In accordance with the present disclosure, enterprise security is a security system in which each individual device, instead of configuring and storing security configurations locally, use a security server for security verifications. Such a security server of the present disclosure may be a dedicated computer on a network, that is used to manage the security configuration for all users. This makes it simpler for administrators to configure users and devices, which in turn improves security by encouraging security to be properly configured.
ENTERPRISE SECURITY IN METERS
The present disclosure provides for enterprise security in intelligent electronic devices such as electric power meters. In accordance with the present disclosure, enterprise security is a security system in which each individual device, instead of configuring and storing security configurations locally, use a security server for security verifications. Such a security server of the present disclosure may be a dedicated computer on a network, that is used to manage the security configuration for all users. This makes it simpler for administrators to configure users and devices, which in turn improves security by encouraging security to be properly configured.
STEGANOGRAPHIC ENCODING DETECTION AND REMEDIATION
A steganographic coding detector (and method) analyzes one or more pages of a file. For each page containing text strings, the detector counts a number of A0h and 20h characters for the text string. For each text string for which the number of A0h characters is greater than a first threshold, the detector sets a flag to a first state, The first threshold is computed based on the number of 20h characters in that text string. For each text string for which the number of 20h characters is less than the first threshold, the detector sets the flag to a second state. Responsive to the number of text strings that have a flag at the first state being greater than a second threshold, the detector marks the file as being steganographically encoded.
METHODS AND APPARATUS TO IDENTIFY MEDIA
Methods and apparatus for identifying media are described. Example methods disclosed herein include presenting a graphical enable button via a display of a media presentation device, the graphical enable button, when selected, is to enable monitoring functionality implemented by the media presentation device, the monitoring functionality to monitor media presented by the media presentation device, the monitoring functionality to be disabled by default. Disclosed example methods also include detecting a first user input corresponding to selection of the graphical enable button and, in response to detection of the first user input: (i) enabling the monitoring functionality implemented by the media presentation device, and (ii) transmitting, via a network interface, information to a remote monitoring entity.
METHODS AND APPARATUS TO IDENTIFY MEDIA
Methods and apparatus for identifying media are described. Example methods disclosed herein include presenting a graphical enable button via a display of a media presentation device, the graphical enable button, when selected, is to enable monitoring functionality implemented by the media presentation device, the monitoring functionality to monitor media presented by the media presentation device, the monitoring functionality to be disabled by default. Disclosed example methods also include detecting a first user input corresponding to selection of the graphical enable button and, in response to detection of the first user input: (i) enabling the monitoring functionality implemented by the media presentation device, and (ii) transmitting, via a network interface, information to a remote monitoring entity.