Patent classifications
H04L2463/121
AUTONOMOUS VEHICLE SENSOR SECURITY SYSTEM
Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.
Optimized and scalable method of detecting dead internet key exchange (IKE) peers
Certain embodiments described herein relate to a method for performing dead peer detection (DPD) by a local gateway. The method includes periodically examining one or more array elements of a timestamp array. The method further includes, for each of the examined one or more array elements, determining whether a corresponding idle timeout threshold is met. The method further includes, upon determining that the corresponding idle timeout threshold is not met, refraining from causing a notification to be transmitted to a peer gateway. The method also includes, upon determining that the corresponding idle timeout threshold is met, causing a notification to be transmitted to the peer gateway to determine whether the peer gateway is responsive with respect to a tunnel associated with the examined array element.
Transaction Replacement Method, Device, and Storage Medium
The present invention provides a transaction replacing method, device, and storage medium, wherein the method comprises selecting the predecessor transaction for replacement by means of disposing a predecessor transaction message for the transaction to be stored into the pre-transaction pool, wherein when the predecessor transaction for replacement is still in the pre-transaction pool, marking the predecessor transaction for replacement as discard and storing the transaction into the pre-transaction pool; when a confirmation message of the transaction is received, storing the transaction into the transaction pool and when the transaction is packaged, deleting all predecessor transactions of the transaction. The present invention allows modification of the transaction content before the transaction enters the transaction pool and prevents the predecessor transaction from being sent back.
SYSTEM AND METHOD FOR VERIFYING DEVICE SECURITY
A method for verifying a proximity of a user device to a beacon, including broadcasting a frame comprising an encrypted payload, receiving the frame, extracting information from the frame, and verifying the proximity of the user device to the beacon based on the extracted information.
METHOD AND APPARATUS FOR PROTECTING INTEGRITY OF DIGITAL INFORMATION
A method and apparatus for integrity protecting data that include and perform: receiving as input data any new digital information from one or more sources; forming a protection block representing the input data received during a first period of time, if any; forming a digital descriptor using at least the protection block; and producing a delay-coding verification code based on the digital descriptor and a previous verification code.
Network Data Timeline
A system and a method are disclosed for describing a mechanism for tracking malicious activity detected on a network. For example, based on network data collected from a server, the disclosed system may detect malicious activity originating from a client device directed to the server. To detect the malicious activity, network data may be captured by the server and analyzed. When malicious activity is detected, the system may track the malicious activity, using the network data, to an earliest connection date of a client device from where the malicious activity potentially originated. The earliest connection date may indicate a potential start date of the malicious activity
SYSTEM AND METHOD FOR REMOTE AUTHENTICATED TESTING APPLICATIONS
The present disclosure provides a system and method for facilitating authenticated remote testing, including conducting the test and certifying the results of the conducted test. The system includes a means to securely deliver a standardised testing kit to a patient, verify validity and authenticate the testing kit, while ensuring that the testing kit is not compromised. The patient can self-administer the test under the supervision (if required) of a medical practitioner. For any remote testing location, the system provides a secure means to deliver the sample to the testing location. The results of the testing at the remote testing location can then be communicated to both the patient and the medical service provider in the form of a certificate if required. The patient can receive a remote testing unit at home or purchase one at a kiosk, and a method for administering the test.
Tracking of transport transfers
An example operation may include one or more of sending, by a transport, a drop off request to a plurality of nodes at a target location, receiving, by the transport, permissions from the plurality of the nodes, responsive to the permissions, acquiring, by the transport, an agreement for the drop off request from at least one node from the plurality of the nodes, and recording the drop off request on a remote storage.
Techniques for media item display configuration
Techniques for media item display configuration are described. In one embodiment, an apparatus may comprise a media management component operative to retrieve a plurality of contact-associated media items associated with a plurality of contacts for a user account associated with a messaging client by a messaging system; retrieve an engagement score for each of the plurality of contacts; and order the plurality of contact-associated media items based on the engagement score for each of the plurality of contacts; and a user interface component operative to receive a mixed-contact media display interface invocation in the messaging client for the messaging system; and display the plurality of contact-associated media items in a mixed-contact media display interface according to the ordering of the plurality of contact-associated media items. Other embodiments are described and claimed.
Automated Bluetooth pairing
This disclosure relates to creating a Bluetooth and/or BLE connection between two devices without using a UUID and/or MAC address. For example, a first device storing a private key may enter advertising mode to create a Bluetooth/BLE connection. An advertising packet (e.g., advertising channel packet data unit (PDU) may be transmitted (e.g., in encrypted format). A second device may enter scanning or initiator mode and may receive the advertising packet. A second device may request that a user log into an account associated with the first device (e.g., a customer account, a financial account, an employee account, and/or the like) in order to initiate a Bluetooth/BLE connection. A second device user may enter login credentials via the second device, which may then be transmitted to a backend system. A backend system may receive and validate the login credentials and, in response, transmit a public key to the second device. The public key may be transmitted in an encrypted format. A second device may receive the public key and may use the public key to perform a public/private key handshake in order to validate the first device. The handshake may then be validated by the first device and a Bluetooth and/or BLE connection may be created.