Patent classifications
H04L9/40
Enhanced and/or more efficient fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network
A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.
System, method and application for transcoding data into media files
A data transcoding device includes a memory device for storing clear data containing private information and a processor configured as a data transcoder. The processor is configured to create packets of the clear data, prepare the packets for transcoding the clear data into an indecipherable multimedia data file appearing as noise, by determining properties of the indecipherable multimedia file based on parameters of the clear data. The processor is configured to generate the indecipherable multimedia file by transcoding the clear data based on the determined properties.
Secured communication distribution system and method
A media distribution system provides controlled distribution of media owned by various parties hosted on a local media access device. A media image communication system provides a secure method of communications between the media host and the client receiving and viewing the media. The media image communication system converts a typical text message into an image file format to prevent unauthorized access to the message, and to prevent any changes and/or manipulation of the message content.
Systems and methods for uploading streamed objects to a cloud storage system
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key. The plaintext object keys are generated in advance of uploads. The plaintext object keys can be stored in an object database in the cloud. Alternatively, the plaintext object keys can be provided to a customer's HSM, encrypted, and returned to the cloud, such that encrypted object keys, encrypted by the customer, are stored in the cloud. The cloud can alternatively encrypt the customer's object keys with a master key for the customer, which is then encrypted by the customer's HSM before being stored in the cloud. Proxies are also deployed for efficiently communicating with customer security modules.
Method and apparatus for a power-efficient framework to maintain data synchronization of a mobile personal computer to simulate a connected scenario
An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed.
Securing a server from untrusted client applications
An information handling system may identify a process identifier of a client application that has requested a connection with the information handling system. The information handling system may obtain an access control list of a process associated with the process identifier. The information handling system may determine whether to establish a connection between the client application and the information handling system based, at least in part, on analysis of the access control list.
Resource determination based on resource definition data
In one example, a computer implemented method may include retrieving resource definition data corresponding to an endpoint. The resource definition data includes adapter information and resource type information. Further, an adapter instance may be generated using the adapter information to establish communication with the endpoint. Furthermore, an API response may be obtained, via the adapter instance, from the endpoint by querying the endpoint using an API call. Further, the API response may be parsed. Further, a resource model corresponding to the resource definition data may be populated using the parsed API response. The resource model may include resource information and associated metric information corresponding to a resource type in the resource type information. Furthermore, a resource and/or metric data associated with the resource may be determined using the populated resource model. The resource may be associated with an application being executed in the endpoint.
Device reputation
A user device is associated with a dynamic trust score that may be updated as needed, where the trust score and the updates are based on various activities and information associated with the mobile device. The trust score is based on both parameters of the device, such as device type, registered device location, device phone number, device ID, the last time the device has been accessed, etc. and activities the device engages in, such as amount of transactions, dollar amount of transactions, amount of denied requests, amount of approved requests, location of requests, etc. Based on a transaction request from the user device, the trust score and a network reputation score is used to determine an overall trust/fraud score associated with the transaction request.
System and method for detecting the user using a single one-time password
An improved One Time Password (iOTP) is used in a two-factor authentication mechanism to decode a username, and the inherent security of the iOTP eliminates the need for a password. When the user is identified by the iOTP, a second challenge is sent. The second challenge may be confirmed by user biometrics or via a PIN code if the user's device does not support biometrics. Benefits of the subject invention include: (1) no username, which eliminates exposure to multiple domain attacks (i.e., attacks on other sites with the same username) that attempt to extract passwords from less secure sites (e.g., where a user used the same username and password across multiple sites); and (2) password-less access—the iOTP replaces both the username and password function, thereby eliminating the need for the user to manage multiple usernames and passwords.
Updating security key
Certain embodiments provide a method of updating a security. The method can include monitoring a bearer that includes first and second radio accesses according to different radio technologies between user equipment and a communications network. One or more properties of the monitored bearer can be determined. An update of a security key utilized for securing communications over at least one of the radio accesses can be triggered in response to determining that the determined properties meet at least one triggering condition capable of indicating a need for the update.