Patent classifications
H04L9/40
File sharing system and method
A file sharing system and methods therefor share one or more files without requiring the files be sent to or stored on a server. The file sharing system enables files to be shared from a user device allowing users to maintain control of the files by storing and sharing files off the cloud. Sharing and file access is typically effectuated via a server and one or more links provided by the server. File access is limited to selected file access types.
Automated honeypot creation within a network
Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.
System and method for presenting tire-related information to customers
A cloud-based system for use by retail store employees or customers at any location to facilitate the sale of automotive tires to consumers is provided. The system accesses multiple independent tire inventory systems from different distributors/manufacturers and provides a personalized set of recommendation tire options and accompanying TPMS service packs.
System and method for securely interconnecting branch networks to enterprise network through TSPS
A system, a method, and a computer program are provided for securely connecting a main network to one or more subnetworks in an enterprise network through a group of enterprise routers has all data traffic routed between the main network and the subnetwork through an encrypted virtual private network (VPN) tunnel. The data traffic is monitored for a cyberthreat indication in the enterprise network, and any cyberthreat indication is has the cyberthreat remediated by modifying a policy in a firewall or one of the group of enterprise routers to stop routing exchange or cease encryption or transmission of data between the main network and the one or more subnetworks. In part, a key server and each router and the group of enterprise routers is configured with an Internet Protocol address, a group security association value, and a group profile which are employed by the technological solution for secure enterprise connectivity.
Access control of administrative operations within an application
A technique to implement access control from within an application begins by dynamically-generating a “management scope” for a transaction associated with a set of managed resources. The management scope is a collection of permissions defined by at least one of: a set of roles, and a set of resource administration rights, that are assigned to a first operator that issues the transaction. As the transaction executes, a request to alter the transaction is then received from a second operator. According to the technique, the management scope for the transaction and associated with the first operator is then evaluated against a management scope associated with the second operator. Upon determining the management scope associated with the first operator has a given relationship to the management scope for the second operator, the transaction is permitted to be altered in response to the request. The given relationship is scoped by one or more rules.
Method for configuring scheduling request, network device and terminal device
Disclosed are a method for configuring a scheduling request, a network device, a terminal device, and a computer storage medium. The method comprises: receiving at least one bandwidth part (BWP) configured by a network side; and receiving configuration parameters of at least one scheduling request configured by the network side for each BWP, wherein the configuration parameters of the scheduling request have a mapping relationship with a logical channel.
Method for filtering communication data arriving via a communication connection, in a data processing device, data processing device and motor vehicle
A method for filtering communication data arriving from a communication partner via a communication connection, which provides access to at least one storage means of a receiving data processing device having at least one computation unit, in the data processing device, wherein PCI Express, in an interface unit, receiving the communication data, of the data processing device, a filter means, at least part of which is embodied as hardware, is used so that, according to configuration information, prescribed on the data processing device, containing at least one approval condition that rates the at least one property of the useful data contained in the communication data, only the communication data meeting at least one approval condition are forwarded from the interface unit to at least one further component of the data processing device.
Resource allocation in communications networks using probability forecasts
A system (1000) is disclosed including a resource allocation optimization (RAO) platform (1002) for optimizing the allocation of resources in network (1004) for delivery of assets to user equipment devices (UEDs) (1012). The RAO platform (1002) determines probabilities that certain asset delivery opportunities (ADOs) will occur within a selected time window and uses these probabilities together with information concerning values of asset delivery to determine an optimal use of asset deliveries. In this regard, the RAO platform (1004) received historical data from repository (1014) that facilitates calculation of probabilities that ADOs will occur. Such information may be compiled based on asset delivery records for similar network environments in the recent past or over time.
Resource allocation in communications networks using probability forecasts
A system (1000) is disclosed including a resource allocation optimization (RAO) platform (1002) for optimizing the allocation of resources in network (1004) for delivery of assets to user equipment devices (UEDs) (1012). The RAO platform (1002) determines probabilities that certain asset delivery opportunities (ADOs) will occur within a selected time window and uses these probabilities together with information concerning values of asset delivery to determine an optimal use of asset deliveries. In this regard, the RAO platform (1004) received historical data from repository (1014) that facilitates calculation of probabilities that ADOs will occur. Such information may be compiled based on asset delivery records for similar network environments in the recent past or over time.
Cloud access security broker systems and methods via a distributed worker pool
A Cloud Access Security Broker (CASB) system includes a controller; a message broker connected to the controller; and a plurality of workers connected to the message broker and connected to one or more cloud providers having a plurality of files contained therein for one or more tenants, wherein the plurality of workers are configured to crawl through the plurality of files for the one or more tenants, based on policy and configuration for the one or more tenants provided via the controller, and based on assignments from the message broker. The plurality of workers can be further configured to cause an action in the one or more cloud providers based on the crawl and based on the policy and the configuration. The action can include any of allowing a file, deleting a file, quarantining a file, and providing a notification.