Patent classifications
H04L63/20
CLUSTERING OF VIRTUAL PRIVATE NETWORK SERVERS
A method in a first virtual private network (VPN) server associated with clustering a plurality of VPN servers in a clustered network, the method including receiving, from a VPN service provider (VSP) control infrastructure, VPN data associated with a user device having an established VPN connection with the clustered network; and communicating, utilizing key information, the VPN data with the user device during the established VPN connection. Various other aspects are contemplated.
BLUETOOTH DEVICE AND BLUETOOTH GATEWAY
A Bluetooth device (702) is disclosed, the Bluetooth device being provisioned with a security credential (710) that is shared with an authentication server (706). The Bluetooth device comprises processing circuitry configured to use a Bluetooth pairing mechanism to establish a pairing with a Bluetooth gateway (704a-c) by establishing a shared secret key with the Bluetooth gateway and to perform an Extensible Authentication Protocol (EAP) authentication method towards the authentication server using the security credential, wherein performing the EAP authentication method comprises using the paired Bluetooth gateway to forward messages to and from the authentication server. The processing circuitry is further configured to bind the pairing established with the paired Bluetooth gateway to the performed EAP authentication method. Also disclosed are a Bluetooth gateway and methods performed by a Bluetooth device and a Bluetooth gateway.
METHOD AND APPARATUS FOR CONTROLLING DEVICE IN INTERNET OF THINGS, AND GATEWAY DEVICE AND STORAGE MEDIUM
Disclosed are a method and apparatus for controlling a device in the Internet of Things, and a gateway device and a storage medium, which relate to the technical field of the Internet of Things. The method comprises: acquiring remote access attribute information of all resource links, wherein the remote access attribute information is used for indicating whether a corresponding resource link is allowed to be remotely accessed; when there is a first resource link, remote access attribute information corresponding to the first resource link indicates that the first resource link is allowed to be remotely accessed, and an operation request sent by a client device on the basis of the first resource link is received, triggering a server device to execute a functional operation corresponding to the first resource link.
METHOD FOR DETERMINING RISK LEVEL OF INSTANCE ON CLOUD SERVER, AND ELECTRONIC DEVICE
A method for determining a risk level of an instance on a cloud server. The method includes: obtaining one or more monitoring items of an instance to be monitored and a rule base of each monitoring item; obtaining monitoring data corresponding to each monitoring item of the instance to be monitored; and determining a risk level of the instance to be monitored under each monitoring item based on the rule base and the monitoring data of each monitoring item.
System and Method for Authenticating Client Devices Communicating with an Enterprise System
A system and method are provided for authenticating client devices communicating with an enterprise system. The method includes providing a policy enforcement interceptor to intercept API calls and enabling the policy enforcement interceptor to communicate with a policy information point to query the at least one endpoint for entitlements associated with an account. The method also includes intercepting an API call to the application API, communicating with the policy information point to determine entitlements associated with the account by having the policy information point query an entitlements database and, when the entitlements returned to the policy enforcement interceptor are valid, invoking a policy decision point to validate the client device. The method also includes, when the client device is validated, permitting invocation of the API. The method also includes providing an API response to the client device to permit access to the application via the API.
IoT MALWARE CLASSIFICATION AT A NETWORK DEVICE
- Madhusoodhana Chari SESHA ,
- Ramasamy APATHOTHARANAN ,
- Shree Phani Sundara BANAVATHI NARAYANA SASTRY ,
- Priyanka Chandrashekar BHAT ,
- Venkatesh MADI ,
- Srinidhi HARI PRASAD ,
- Azath Abdul SAMADH ,
- Kumar SURESH ,
- Manjunath Rajendra BATAKURKI ,
- Madhumitha RAJAMOHAN ,
- Ganesh PAGOTI ,
- Sriram MAHADEVA ,
- Karthik ARUMUGAM ,
- Harish RAMACHANDRAN ,
- Fahad KAMEEZ
Some examples relate to classifying IoT malware at a network device. An example includes receiving, by a network device, network traffic from an Internet of Things (IoT) device. Network device may analyze network parameters from the network traffic with a machine learning model. In response to analyzing, network device may classify the network traffic into a category of malware activity. Network device may determine an effectiveness of network traffic classification by measuring a deviation of the network parameters from previously trained network parameters that were used for training the machine learning model. In response to a determination that the deviation of the network parameters from the trained network parameters is more than a pre-defined threshold, network device may generate an alert highlighting the deviation, which allows a user to perform a remedial action pertaining to the IoT device.
PRIVATE NETWORK ACCESS
A method is disclosed including establishing a browser session in response to receiving a request from a browser application in a public network. The browser session is assigned to a dedicated network service running in a dedicated network name space. Requests received from the browser application are proxied to a dedicated network service. A local web session in the dedicated network service authenticates a user of the browser application for access to at least one private webservice. A security client in the dedicated network service establishes a networking tunnel between the proxy and a remote gateway to the private network, thereby obtaining network access to the private webservice from the dedicated network name space. Within the dedicated network name space, proxied requests addressing the private webservice are forwarded over the networking tunnel to the private network.
SYSTEMS AND METHODS FOR MANAGING IDS IN IAM/RESOURCE POLICIES
Disclosed are methods, systems, and non-transitory computer-readable medium for managing IDs in identity access management (IAM)/resource policies. For instance, the method may include obtaining a request regarding a target identification in a set of IAM/resource policies, the request including an action request; pulling the set of IAM/resource policies from a service; for each policy of the set of IAM/resource policies, traversing a data structure of the policy to return keypath(s) that include the target identification; and modifying each policy that includes the target identification by performing the action request using the keypath(s).
SYSTEMS, MEDIA, AND METHODS FOR UTILIZING A CROSSWALK ALGORITHM TO IDENTIFY CONTROLS ACROSS FRAMEWORKS, AND FOR UTILIZING IDENTIFIED CONTROLS TO GENERATE CYBERSECURITY RISK ASSESSMENTS
In one or more embodiments, the disclosed systems, methods, and media include utilizing a crosswalk algorithm to identify controls (e.g., cybersecurity controls) across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments. A cybersecurity module may identify one or more controls in a data structure. The process may utilize a crosswalk algorithm to determine a relatedness between the identified controls and different controls of different frameworks. The process may update the data structure with selected different controls, such that a more robust set of controls are identified when the cybersecurity module indexes into the data structure to identify particular controls. Additionally, the process may generate a risk assessment for a device/software. The process may generate a risk score for the risk assessment, and the risk score may be based on a determined compliance level for each control determined to be related to a defined risk of interest.
COMBINED SECURITY ACCESS SYSTEM
A combined security access system for a building that includes a controllable building component. The system includes a combined security access device connected to the building component. The access device further includes: a processor; a first memory device connected to the processor; a second memory device connected to the processor; and a wireless interface module connected to the processor. The access device may be connected to an external electronic device, and the external electronic device communicates with the processor of the access control system to control the building component.