Patent classifications
H04L63/30
Intelligent Secure Social Media Based Event Management System
An intelligent system and method for gathering social network data for an event, moderate the data, and display it to people along with analytics. The system helps event managers to see all the details posted about the event and they can control what to show to the general public. It also helps people to see what is being posted about the event and also encourages them to post. Additionally, the back end intelligence can scan through the posts and group them according to common thread and allow those to be backed up in redundant servers for forensic analysis.
Optimized routing for law enforcement support
An improved lawful intercept (LI) infrastructure is described. In response to a valid LI provisioning request, a subscriber management component statically allocates a user equipment (UE) subject to the LI provisioning request to an edge location comprising a high-speed gateway and a Mediation and Delivery Function (MDF), which coordinates the delivery of intercepted communications. The subscriber management component maintains this allocation for the life of the LI provisioning request and reverses the UE to a dynamic gateway allocation scheme when the LI provisioning request ends. As a result, only a subset of edge locations must be equipped with MDFs, and the handover is transparent to the UE.
Secure social network
Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of people who are subject to security or law enforcement limitations or otherwise reside within a controlled or correctional facility. All submitted information requires administrative approval, either by a human administrator or an automated process, before it can be viewed by other members of the social network.
Privacy enhancing man-in-the-middle
In one embodiment, a device in a network receives traffic sent from a first endpoint. The device sends a padding request to the second endpoint indicative of a number of padding bytes. The device receives a padding response from the second endpoint, after sending the padding request to the second endpoint. The device adjusts the received traffic based on the received padding response by adding one or more frames to the received traffic. The device sends the adjusted traffic to the second endpoint.
Stateless session synchronization between secure communication interceptors
Embodiments provide a system and method for stateless session synchronization between inspectors for high availability deployments. Man in the Middle inspectors of a communication session between a client and server exchange a shared key that is used as a common seed value in a mapping function algorithm. Each inspector generates identical key-pairs using the common mapping function algorithm, and the inspectors generate the session keys from the key-pairs. Inspectors use the session keys to decrypt and either actively or passively inspect data transferred in a session between a client and server.
INLINE SECRET SHARING
Embodiments are directed to monitoring communication between computers using network monitoring computers (NMCs). NMCs identify a secure communication session established between two of the computers based on an exchange of handshake information associated with the secure communication session. Key information that corresponds to the secure communication session may be obtained from a key provider such that the key information may be encrypted by the key provider. NMCs may decrypt the key information. NMCs may derive the session key based on the decrypted key information and the handshake information. NMCs may decrypt network packets included in the secure communication session. NMCs may be employed to inspect the one or more decrypted network packets to execute one or more rule-based policies.
System and method for delaying execution of financial transactions
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for delaying execution of financial transactions. A first message including data for a first financial transaction is received, the first message being uncorrupted. A first trading symbol that is a target of the first financial transaction is determined. The first trading symbol is determined to be a target of at least one financial transaction that was included in at least one previous message that was determined to be corrupted. Execution of the first financial transaction is delayed.
System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.
Systems and methods for implementing a traffic visibility network
A method of packet processing, includes: providing a plurality of network appliances that form a cluster, wherein two or more of the plurality of network appliances in the cluster are located at different geographical locations, are communicatively coupled via a private network or an Internet, and are configured to collectively perform out-of-band packet processing; receiving a packet by one of the network appliances in the cluster; processing the packet using two or more of the plurality of the appliances in the cluster; and passing the packet to one or more network monitoring tools after the packet is processed.
System and method for implementing digital cloud forensics
The invention relates to digital cloud forensics. An embodiment of the present invention applies collection processes and tools to cloud infrastructure as a service to provide a more efficient and faithful representation of evidence. An embodiment of the present invention applies innovative concepts to retrospectively investigate ephemeral instances which may have long since terminated. This innovative process provides organizations a strategy to provide forensic investigations within either a public or private cloud environment.