Patent classifications
H04L67/01
Detecting relayed communications
Methods, apparatus and computer readable code for determining whether a potential relay device is a relay device are provided herein. In some embodiments, first and second information elements are received from a potential relay device, which is an original source of the second information element. In order to determine whether the potential relay device is a relay device, it is determined whether a feature of an original source of the first information element and a feature of the potential relay device are features unlikely to relate to a single device, wherein a positive result of the determining is indicative that the potential relay device is a relay device. In an exemplary embodiment, a disclosed system includes an information element receiver and a feature incompatibility analyzer. Optionally, the disclosed system includes a feature discovery module, a parameter obtainer and a feature database.
Remote access service inspector
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.
Remote access service inspector
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.
Map reports from vehicles in the field
Aspects of the present disclosure relate generally to systems and methods for assessing validity of a map using image data collected by a laser sensor along a vehicle path. The method may compile image data received from the laser sensor. The map subject to assessment may define an area prohibiting entry by a vehicle.
Map reports from vehicles in the field
Aspects of the present disclosure relate generally to systems and methods for assessing validity of a map using image data collected by a laser sensor along a vehicle path. The method may compile image data received from the laser sensor. The map subject to assessment may define an area prohibiting entry by a vehicle.
Method and system for realizing function by causing elements of hardware to perform linkage operation
A system that stores functional information indicating a capability of each of a plurality of elements located remotely from the system; identifies a function capable of being performed by linking a plurality of the elements based on the stored functional information; and transmits information corresponding to the identified function capable of being performed by linking the plurality of elements to a first device remote from the system.
Method and system for realizing function by causing elements of hardware to perform linkage operation
A system that stores functional information indicating a capability of each of a plurality of elements located remotely from the system; identifies a function capable of being performed by linking a plurality of the elements based on the stored functional information; and transmits information corresponding to the identified function capable of being performed by linking the plurality of elements to a first device remote from the system.
System and method of adaptive rate control and traffic management
A system and method of communication traffic management on a portable communication device having a computer processor and a network connection to a computer server for transmitting or receiving data with the processor over a network is provided. The method includes: identifying, by a traffic manager application running on the processor, a first application running on the processor and delivering first data to or from the server over the network; intercepting, by the traffic manager application, electronic traffic of the first data to or from the first application or to or from the server; and controlling, by the traffic manager application, a rate of delivery of the first data to or from the first application. The system includes the portable communication device and a nonvolatile storage device coupled to the processor and storing instructions that, when executed by the processor, cause the processor to execute the steps of the method.
System and method of adaptive rate control and traffic management
A system and method of communication traffic management on a portable communication device having a computer processor and a network connection to a computer server for transmitting or receiving data with the processor over a network is provided. The method includes: identifying, by a traffic manager application running on the processor, a first application running on the processor and delivering first data to or from the server over the network; intercepting, by the traffic manager application, electronic traffic of the first data to or from the first application or to or from the server; and controlling, by the traffic manager application, a rate of delivery of the first data to or from the first application. The system includes the portable communication device and a nonvolatile storage device coupled to the processor and storing instructions that, when executed by the processor, cause the processor to execute the steps of the method.
Proxy system for bot connectivity to communication channels
A proxy apparatus acts as an intermediary between one or more bot apparatuses and one or more communication channels. The proxy apparatus connects a communication channel to a bot apparatus for the exchange of messages. A user can interact with the bot apparatus through the communication channel. The proxy apparatus is configured to perform one or more operations or services. Example operations include, but are not limited to, registration, authentication and authorization, the recordation of telemetry data, schema transformation, and identity transformation.