H04L2463/121

Time stamping of data in an offline node

A method for validating timestamps issued by a first node in a communications network, when the first node goes offline. A platform detects disconnection of the first node and triggers a selected second node of the communications network to acquire counter information. When the first node reconnects to the communications network, counter information is retrieved from the second node and timestamped data is received from the first node. The local timestamp information and the counter information are compared to validate or not the local timestamp information. If the local timestamp information is validated, the data can be added to a distributed database such as a Blockchain.

DELAYED AND PROVISIONAL USER AUTHENTICATION FOR MEDICAL DEVICES
20220232013 · 2022-07-21 ·

Representative embodiments of operating a secured device requiring user authentication include receiving a request from a user for operating the device without prior authentication; granting the user temporary access to the device in accordance with a security policy that specifies a predetermined time interval and/or a predetermined number of device operations within which authentication must occur to continue at least some operations of the device; computationally storing an audit trail identifying the temporary access and actions performed during the temporary access; and upon determining that authentication has not been provided within the predetermined time interval or number of device operations, preventing at least some operations of the device and updating the audit trail to specify expiration of the temporary access.

Behavior-Based Authentication
20220239658 · 2022-07-28 ·

Methods and systems for authenticating users based on user application activities are described herein. One or more questions and one or more answers may be generated and stored based on a history of user application activities associated with a user. The one or more questions and one or more answers may be generated randomly, and may relate to one or more other users. A request for access to a service may be received. Based on the request, a question associated with the history of user application activity may be selected and presented to the user. A candidate answer may be received from the user, and the user may be authenticated based on comparing the candidate answer to an answer associated with the question presented.

Mobile wallets with packaged travel services
11393054 · 2022-07-19 · ·

Methods and systems for location-based mobile wallets are disclosed. A one-time mobile wallet can be established on a mobile device and associated with a travel itinerary. Device data and external data can be used with the travel itinerary to determine a travel assistance action. The location of the mobile device can be determined using GPS and/or contactless terminal data, for example. Based on the location of the mobile device and the travel itinerary, a travel assistance action can be performed. This can, for example, include presenting wallet elements to a user or automatically initiating a phone call to a service provider listed in the travel itinerary. In this way, travel assistance can vary with the location of the mobile device. After expiration of the duration, the one-time mobile wallet can be disabled.

Information processing apparatus, system, and non-transitory computer-readable storage medium
11388154 · 2022-07-12 · ·

An information processing apparatus, which is communicably connected to an authorization server and a resource server, includes an expiration time generated based on a time of the information processing apparatus in a request for a token for usage of a service provided by the resource server, and sends the request to the authorization server. When time information of the authorization server is received as a response to the request, the information processing apparatus includes an expiration time generated based on the time information of the authorization server in the request for the token, and resends the requests. The information processing apparatus then requests the resource server for time information of the resource server using the token obtained as a response to the resent request, and corrects the time of the information processing apparatus based on the time information of the resource server.

Automated analytic resampling process for optimally synchronizing time-series signals

The system receives exemplary time-series sensor signals comprising ground truth versions of signals generated by a monitored system associated with a target use case and a synchronization objective, which specifies a desired tradeoff between synchronization compute cost and synchronization accuracy for the target use case. The system performance-tests multiple synchronization techniques by introducing randomized lag times into the exemplary time-series sensor signals to produce time-shifted time-series sensor signals, and then uses each of the multiple synchronization techniques to synchronize the time-shifted time-series sensor signals across a range of different numbers of time-series sensor signals, and a range of different numbers of observations for each time-series sensor signal. The system uses the synchronization objective to evaluate results of the performance-testing in terms of compute cost and synchronization accuracy. Finally, the system selects one of the multiple synchronization techniques for the target use case based on the evaluation.

Denial of service attack mitigation through direct address connection

A method, computer program product, and a system where a processor(s) determines that a destination has been retained as a link in an application. The processor(s) monitors connections of the application to the destination retained as the link, where connecting is providing a locator of the destination to a server(s) to obtain an address for the destination. The processor(s) determines an average time period measured from providing the locator to the server(s) to obtaining the address. The processor(s) retains the returned address for each connection within a given time period. The processor(s) determines that the application has initiated a new connection to the destination and the new connection is incomplete after a time period calculated relative to the average time period has lapsed. The processor(s) provides selectable options in a user interface of the application that are the retained address(es).

PRACTICAL OVERLAY NETWORK LATENCY MEASUREMENT IN DATACENTER

Some embodiments provide a method of identifying packet latency in a software defined datacenter (SDDC) that includes a network and multiple host computers executing multiple machines. At a first host computer, the method identifies and stores (i) multiple time values associated with several packet processing operations performed on a particular packet sent by a first machine executing on the first host computer, and (ii) a time value associated with packet transmission through the SDDC network from the first host computer to a second host computer that is a destination of the particular packet. The method provides the stored time values to a set of one or more controllers to process to identify multiple latencies experienced by multiple packets processed in the SDDC.

UWB system
11418231 · 2022-08-16 · ·

Disclosed is an ultra-wideband (UWB) system and, more particularly, a UWB system capable of optimizing UWB operation for vehicles through hopping. The UWB system includes a memory in which a UWB communication program is embedded and a processor which executes the program. The processor performs UWB time-hopping and frequency-hopping to establish a communication channel.

Automatically generating metadata for a metadata catalog based on detected changes to the metadata catalog

Systems and methods are disclosed for annotating a metadata catalog in a data intake and query system based on a detected change to the metadata catalog. The metadata catalog can store information about datasets associated with the data intake and query system, including dataset configuration records of the datasets, which can be used to process queries for execution by the data intake and query system. Based on a detected change to the metadata catalog, such as a manual or system annotation, the data intake and query system can generate additional annotations for the metadata catalog and use the annotations to update the metadata catalog.