H04L2463/121

Network data timeline
11509669 · 2022-11-22 · ·

A system and a method are disclosed for describing a mechanism for tracking malicious activity detected on a network. For example, based on network data collected from a server, the disclosed system may detect malicious activity originating from a client device directed to the server. To detect the malicious activity, network data may be captured by the server and analyzed. When malicious activity is detected, the system may track the malicious activity, using the network data, to an earliest connection date of a client device from where the malicious activity potentially originated. The earliest connection date may indicate a potential start date of the malicious activity.

THIRD-PARTY VEHICLE OPERATOR SIGN-IN

Systems and methods to authenticate a vehicle operator for an autonomous vehicle on a vehicle service platform are provided. In one example embodiment, a computer-implemented method includes obtaining authentication request data indicative of an authentication request, the authentication request data including at least an operator identifier associated with the vehicle operator and a vehicle identifier associated with the autonomous vehicle. The method includes providing a service code associated with the authentication request to the autonomous vehicle. The method includes obtaining from a user device in response to providing the service code to the autonomous vehicle, operator data associated with the authentication request, the operator data including the service code. The method includes determining an authentication result associated with the authentication request based at least in part on the service code and the operator data. The method includes providing the authentication result to the user device.

COPY PROTECTION METHOD AND COPY-PROTECTED ELECTRONIC SYSTEM
20230179430 · 2023-06-08 ·

A copy protection method for an electronic system has at least one electronic unit and at least one component which interacts with the electronic unit, in which at least one public-key infrastructure having at least one certification authority is used, wherein the certification authority issues at least one first certificate for the electronic unit and at least one second certificate for the at least one component, based on an identification feature of the electronic unit and of the component, respectively, and wherein, to check authenticity at least of the at least one component by means of the electronic unit, the respective certificates are at least mutually checked, wherein at least the first certificate is premade and loaded onto the electronic unit when producing and/or configuring the electronic unit, and/or at least the second certificate is premade and loaded onto the at least one component when producing and/or configuring the component.

SECURE PORTABLE MEDICAL INFORMATION ACCESS SYSTEMS AND METHODS RELATED THERETO
20170337332 · 2017-11-23 ·

Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will enable access to desired medical information stored on a computer network. The secure portable reference provides greater transportability of medical records to a patient or medical data repository including a doctor's office, clinic, or hospital, while maintaining data security to satisfy medical data privacy regulations and expectations. Some described embodiments use encrypted information inside the secure portable reference to hide, for example, who is allowed access to the stored medical information, and the network location of the stored information. Some embodiments use a secret PIN to authenticate the user attempting access to the referenced medical information. The secure portable reference contains information on network resources used to enable download access to medical information, including medical records and medical images.

COLLABORATIVE PUBLIC USER PROFILE
20220366014 · 2022-11-17 ·

A system to generate a graphical user interface to display a presentation of a set of shared user groups between users of a social networking service is described. Embodiments of the present disclosure relate generally to systems for: receiving an identification of a second user from a user account of a first user; identifying a user group that includes the first user and the second user in response to the identification of the second user from the user account of the first user; retrieving user identifiers of the first user and the second user, wherein the user identifiers may include graphical avatars; generating a group identifier based on the user identifiers; and causing display of a presentation of the user group at a client device.

Compact timestamp, encoders and decoders that implement the same, and related devices, systems and methods
11671520 · 2023-06-06 · ·

Compact timestamps and related methods, systems and devices are described. An encoder is configured to generate compact timestamps of the disclosure by sampling states of linear feedback shift registers (LFSRs). A decoder may be configured to determine timing information responsive to the compact timestamps.

Techniques for optimizing authentication challenges for detection of malicious attacks

A method and system for optimizing segregation between human-operated clients and machine-operated clients accessing computing resources are provided. The method comprises receiving, from a client, an authentication request, wherein the authentication request is received in response to a redirect request sent from a remote server to the client; dynamically selecting at least one authentication challenge from a plurality of different authentication challenges; sending the at least one generated authentication challenge to the client; determining whether a notification call is received from the client during a predefined time interval; and upon receiving the notification call during the predefined time interval, confirming that the client passes the authentication challenge, wherein a client that passes the authentication challenge is a human-operated client.

SECURITY SYSTEM
20170331853 · 2017-11-16 ·

A security system which performs predetermined control processing to a computer in a private network and is provided outside the private network, in which the security system which receives a global address which is a target of a threat from a threat detection system which detects the threat from an illegal attack server, specifies a local address corresponding to the received global address by referring to, based on the received global address, a translation table, which is included in a gateway in the private network, between the global address and the local address, and performs, from outside of the private network, predetermined control processing to communication of the computer in the private network using the specified local address.

User permissions for access to secure data at third-party

A user permission system manages and regulates access to secure data at one or more third-party data sites. The system may provide access to one or more databases or other data structures based on user authentication and access rules that have been established, such as by a user associated with the data being accessed at the third party data store. Access may be provided via an API to the third-party data site, along with access credentials of a user with data stored with the third-party data site, allowing the system to access data on behalf of the user.

Executing modular alerts and associated security actions

Techniques and mechanisms are disclosed for configuring actions to be performed by a network security application in response to the detection of potential security incidents, and for causing a network security application to report on the performance of those actions. For example, users may use such a network security application to configure one or more “modular alerts.” As used herein, a modular alert generally represents a component of a network security application which enables users to specify security modular alert actions to be performed in response to the detection of defined triggering conditions, and which further enables tracking information related to the performance of modular alert actions and reporting on the performance of those actions.