H04L2463/121

NETWORK SECURITY LAYER
20210344769 · 2021-11-04 · ·

A method performed by a server for protecting a network infrastructure can include: receiving, from an inline hardware appliance associated with an asset, traffic associated with the asset; analyzing the traffic based on a behavioral fingerprint associated with the asset to determine if the traffic is normal or abnormal, wherein the behavioral fingerprint can be stored on the server; and in response to determining that the traffic is normal, forwarding the traffic to the asset.

MULTI-CHANNEL BASED JUST-IN-TIME FIREWALL CONTROL

A method for controlling the transfer of data through a firewall. The method includes one or more computer processors establishing a first communication channel between a first server and a second server. The method further includes transmitting, via the first communication channel, information related to a pending transmission of data from the first server to the second server. The method further includes receiving from the second server, via the first communication channel, a set of security information associated with accessing the second server via a second communication channel. The method further includes establishing the second communication channel between the first server and the second server based on the set of security information received from the second server. The method further includes transmitting the data from the first server to the second server utilizing the established second communication channel.

Network management using a distributed ledger

Examples include systems and methods for managing a network for example, an enterprise network using a distributed ledger. Some examples include maintaining a distributed ledger by a plurality of NMS units in the network. Use of such distributed ledger may allow communication among NMS units of the plurality of NMS units deployed in the network through the distributed ledger.

SECURE TIME SYNCHRONIZATION
20230318830 · 2023-10-05 ·

A method incudes receiving data characterizing a plurality of operating parameters associated with an industrial machine, and receiving data characterizing a plurality of encrypted time. The method also comprises identifying a first encrypted time from the plurality of encrypted times based on temporal location of the first encrypted time relative to a first system time of a plurality of system time. A first operating parameter of the plurality of operating parameters is received at the first system time. The method further comprises generating an operating data set comprising at least the first operating parameter and a new encrypted time based at least on the identified first encrypted time. The new encrypted time is tagged to the first operating parameter. The method also comprises providing the operating data set.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
11777996 · 2023-10-03 · ·

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.

TIME-BASED DIGITAL SIGNATURE

A method includes receiving an event, the event associated with a digital signature in a first time-based message comprising a first trusted time stamp token generated using a first hash of digitally signed content from a trusted timing authority; generating a first block on a distributed ledger; generating a second hash of the first trusted time stamp token; receiving a second trusted time stamp token from the trusted timing authority in response to transmitting the second hash to the trusted timing authority; and generating a second block on the distributed ledger; wherein verification of data integrity of the digitally signed content is provided via the first hash of the digitally signed content and second hash of the first trusted time stamp token and via the hash of the first block and a hash of the second block.

Systems data availability validation

A network connection between a server group of a data intake and query system and each of one or more source network nodes is established. Source data at the server group is received from at least one of the one or more source network nodes via the respective network connections and transformed, by the indexer server, to timestamped data entries of machine data. A model management server detects data constraints for a security model that include a data element used by the security model and an availability requirement set. Using the timestamped data entries, the data constraints are validated, and the validation used to determine a data availability assessment of the security model.

Token node locking

A system and method for providing secure data to a client device having a token is disclosed. In one embodiment, the method comprises (a) binding the token to the client device according to first token binding information comprising a first token identifier (ID), first client device fingerprint data, and a first timestamp, (b) receiving a request to provide secure data to the client device in a secure data service, (c) determining if the request to provide the secure data to the client device was received within an acceptable temporal range of the stored timestamp, and (d) providing the requested secure data according to the determination.

System for managing fraudulent computing operations of users performed in computing networks and methods of use thereof

A method includes displaying on a graphic user interface (GUI) of a computing device of a user, a log of computing operations performed by the user at computing terminals of entity servers respectively managed by entities. The user uses a unique authorization identifier provided by the authorizing entity to authorize the computing operations at the computing terminals of the entity servers. The user provides a fraud indication through the GUI that at least one computing operation in the log is fraudulent. Memory-jogging visual units are displayed on the GUI to the user that cause the user to recall performing the at least one computing operation identified as being fraudulent. An entry of the at least one computing operation in an operation database is marked as a valid operation authorized by the user when receiving a recognition indication and potentially fraudulent when no recognition indication by the user.

Security model utilizing multi-channel data

Systems, methods and computer-readable storage media are utilized dynamically discovering components of a computer network environment. The processing circuit of a data acquisition engine configured determine a domain name associated with an entity profile, determine an IP range, validate at the domain name, the IP range, and the IP address, collect additional device connectivity data, and provide the additional device connectively data.