Patent classifications
H04L63/30
Information processing apparatus and non-transitory computer readable medium
An information processing apparatus managed by an administrator and used by plural users includes a reception unit and a request unit. The reception unit receives a disclosure request from the administrator related to secret information in a job processed by the information processing apparatus. The request unit requests a disclosure of the secret information with respect to a user of a target job that is a target of the disclosure request.
AUTOMATED PAROLE, PROBATION, AND COMMUNITY SUPERVISION SYSTEM
A system and method of automated supervision and monitoring of offenders who have been paroled from a correctional facility or placed on probation. The system allows offenders to remotely report to their designated parole officer, enabling a convenient and efficient method of ensuring that the offenders are following the terms of their parole through an automated procedure. The system tracks and monitors an offender's movements to ensure they stay within a certain area. The system receives the offender's location information and processes the location information to determine whether the offender stayed within a certain area. The system is also equipped with interfaces to testing systems to administer remote substance abuse monitoring. Community service is another important function that is monitored by the system. The community service requirement for an offender varies depending on the court order. The system reports to the parole office regarding any indication of parole condition violations throughout the automated report by the offender.
Distributed consistency group at splitter
One example method includes intercepting an IO that is directed to a volume, writing the IO to a grid-CG that is one of a plurality of grid-CGs that collectively form a distributed CG, adding the IO to a stream journal associated with the grid-CG, receiving a bookmark request, in response to the bookmark request, inserting a bookmark in the stream journal, incrementing a splitter counter and broadcasting a splitter counter value to the grid-CGs in the distributed CG, and inserting the bookmark in respective stream journals of the grid-CGs in the distributed CG.
System architecture for managing resources in a communication network
A system architecture for managing resources in a communication network comprises in combination at least the following elements: a plurality of radio equipments working in a given frequency band and with identical frequency hopping rules; the radio equipments are managed by a master device; and a radio equipment comprises at least: a radiocommunication module that carries the radiocommunications; a module suitable for tapping, monitoring and intercepting radio signals in the environment and for recording them locally in a database; a module suitable for disrupting non-authorized communications; and a local “3 in 1” management module receiving the orders emitted by the master device, the management module being suitable for controlling the various modules of the radio equipment; a radio-router module; and a tapping and monitoring module.
System and method for capturing data sent by a mobile device
Systems and methods for providing capture, archival, and analysis of data sent by mobile devices over a carrier network, with the systems and methods not requiring the installation of any additional software on the mobile devices, the systems and methods also providing for alerts to be generated based on the content of the data.
Intelligent facility device
Embodiments of intelligent facility devices for use in controlled facility environments are described. In various embodiments, the intelligent facility devices provide limited or controlled access to data networks for inmates of a controlled facility. An embodiment of a method may include receiving a request for access to a network from a user interface device. The method may also include determining an authorized duration of network access for the user interface device. Additionally, the method may include establishing a temporary network access session between the user interface device and the network for the authorized duration of network access.
Device to device security using NAF key
A method, apparatus and computer program product are disclosed for establishing secure off-network communications between first and second Secure Cellular Devices that each have a cellular identity. The second Secure Cellular Device may assume the role of Remote Device for interaction with the NAF keyserver and may obtain a local key. The first Secure Cellular Device may derive the local key and the two devices may conduct secure communications using the shared local key. The two Secure Cellular Devices may alternate the roles of Secure Host and Remote Device, each twice obtaining or deriving a shared local key such that there are two such keys. The devices may employ one key for secure communication in one direction and the other for communication in the other direction. Alternatively, the devices may derive a unique shared key as a function of the two shared keys.
Selectively performing man in the middle decryption
An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second encrypted connection is established between the agent and the resource, to facilitate encrypted communication traffic between the device and the resource. The agent sends a policy request to a network appliance within the network, the request specifying the resource. The agent receives a policy response indicating that the resource is associated with one or more security policies of the network. Traffic passing between the device and the resource is selectively decrypted and inspected depending on the security policies.
Methods and Devices for Triggering Lawful Interception
Methods and network devices implement a lawful interception (LI) trigger control function as an LI target handler and a modified trigger control function. A generic LI triggering interface enables the modified trigger control function to query the LI target handler regarding whether entities using a network function instance are in a target list. The LI target handler has to meet the LI security requirements, but the modified trigger control function does not have to meet such requirements.
METHODS AND SYSTEMS FOR PERFORMING LAWFUL INTERCEPTION (LI) IN COMMUNICATION NETWORKS INVOLVING CONTENT ADULTERATION WITH COLLUDING AGENTS
A method for lawful interception in a communication network involving adulteration by colluding agent is disclosed. The method includes activating, selectively, communication data duplication functionality in at least one of a plurality of network devices, each of the plurality of network devices being located in separate network segments of a communication path between users, the data duplication functionality duplicates data being communicated between the users; comparing, in real-time, a set of adulteration parameters derived from duplicated communication data received from the at least one of the plurality of network devices with associated thresholds within a set of thresholds to detect adulteration in the duplicated communication data; determining a confidence level of detecting adulteration in duplicated communication data received from the at least one of the plurality of network devices; and modifying number of network devices having active communication data duplication functionality based on the comparing and the confidence level.