Patent classifications
H04L2463/121
Method for controllably sharing private video streams with selected public service agencies
A video surveillance service server shares image streams with first responder agencies in the event of emergency. Nominated agencies establish access credentials at the surveillance service data center. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, PTZR, spectrum, and epoch. Video streams of present and past epochs are controlled by ranges of time. A responding agency receives an electronic notification from the administrator to present their access credential and a handle for each shared camera of interest. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation. Video servers include virtual machines dedicated to each responding agency under control by a customer administrator.
TIME-BASED TOKEN TRUST DEPRECIATION
Disclosed herein are system, method, and device embodiments for time-based trust token (TBTT) depreciation. In an example embodiment, a service provider system (e.g., a service provider and API service) may receive a connection request including a demographic attribute associated with a first client account from a partner device, match the demographic attribute to client information associated with the first client account, send the partner device a connection request identifier and a URL including a depreciating token, and authenticate a second client account via a login page associated with the URL. Further, the service provider system may receive a verification request including the connection request identifier and the depreciating token, determine a security context of the depreciating token based on a depreciation function and the verification request, and determine, based on the security context, whether to create a connection between the second client account and partner device within the service provider system.
AUTHORIZATIONS ASSOCIATED WITH EXTERNALLY SHARED COMMUNICATION RESOURCES
Various embodiments of the present disclosure are directed to a group-based communication apparatus that is configured to enable end-users (e.g., non-admin users) to initiate, by way of client devices, generation of a shareable resource associated with a group-based communication resource identifier to efficiently authorize communication between client devices associated with different organization identifiers in group-based communication interfaces associated with a shared group-based communication resource identifier.
NETWORK ACCESS CONTROL SYSTEM
A network access control system includes a communication device and an authorization system. The communication device is configured to communicate time-critical messages through a time-sensitive network during scheduled time windows. The communication device is further configured to be communicatively connected to a candidate device and to receive a network access request from the candidate device while blocking the candidate device from communicating through the time-sensitive network. The authorization system is communicatively connected to the communication device and configured to authorize the candidate device via a multi-factor authentication protocol that requires a user of the candidate device to successfully provide multiple identification factors. In response to the authorization system authorizing the candidate device, the communication device is configured to grant the candidate device restricted access to one or more of send or receive approved messages through the time-sensitive network.
METHOD AND SYSTEM FOR PROVIDING A COMPLETE TRACEABILITY OF CHANGES INCURRED IN A SECURITY POLICY
A computer-implemented method and a system provide a complete traceability of changes incurred in a security policy corresponding to a resource. A policy tracing engine (PTE) monitors and determines events of interest occurring at the resource. The PTE determines administrator-initiated intent-based changes and dynamic event-based changes incurred in the security policy and assigns a unique policy identifier (UPI) to the security policy. The UPI is a combination of unique identifiers assigned to the intent-based change and the event-based change. The PTE recomputes and stores the security policy and the UP in a policy database. The PTE receives network access information including the UPI from the corresponding resource deployed with the security policy. The PTE generates a traceability report that provides a complete traceability of each policy action performed in a networked environment to a source of each change incurred in the security policy as identified by the UPI.
LIMITED FUNCTIONALITY INTERFACE FOR COMMUNICATION PLATFORM
Techniques are described for expediting communications between a first person of an organization associated with a communication platform and a second person not associated with the organization. The first person requests for the communication platform to generate an invitation to communicate with the second person. The first person provides the invitation to the second person directly or via the communication platform. Responsive to receiving an indication that the second person accepts the invitation, the communication platform identifies whether the second person is associated with the communication platform. If the second user is associated with the communication platform, the communication platform modifies an existing user interface associated therewith to enable communications between the first person and the second person. If the second person is not associated with the communication platform, the communication platform generates a limited functionality user interface to enable the communications between the first person and the second person.
SYSTEM AND METHOD OF ADDING TAGS FOR USE IN DETECTING COMPUTER ATTACKS
Disclosed are systems and methods of adding tags for use in detecting computer attacks. In one aspect, the system comprises a computer protection module configured to: receive a security notification, extract an object from the security notification, search for the extracted object in a threat database, add a first tag corresponding to the extracted object in the threat database only when the extracted object is found in the threat database, search for signs of suspicious activity in a database of suspicious activities based on the received security notification and the added first tag, and when at least one sign of suspicious activity is found, extract a second tag from the database of suspicious activities and add the second tag to an object database, wherein the object database is used for identifying signature of targeted attacks based on security notifications, objects, first tags and second tags.
INDIRECT DIAGNOSIS OF MULTIPLE FLUID MIXER UNIT PERFORMANCE
A liquid additive mixing apparatus is provided that has a plurality of chambers containing additives, as well as a system for mixing the additives. One or more additives are mixed with water to form a mixing fluid. The mixing fluid is placed in a first tank that is fluidly connected to a cement mixing unit. A cementing operation is executed during which the mixing fluid from the first tank is mixed with a cement to form a slurry. A capillary electrophoresis (CE) instrument is employed to monitor at least one additive parameter and detect deviations from a predetermined tolerance for the at least one additive parameter.
Management of transactions in a distributed transaction system
Briefly, embodiments disclosed herein relate to managing transactions in a distributed content transaction system.
Method and device to timestamp a digital image
The method and device are intended to prove the posteriority date (P) and anteriority date (A) of a digital image (IN) including building with a first server a previously unknown code (C) and transmitting this code (C) at the posteriority date (P), acquiring the digital image including a joint representation of a subject (S) and the code (C), computing an electronic fingerprint (EIN) of the digital image (IN), receiving with a second server at the anteriority date (A) the electronic fingerprint (EIN), inserting a combination (EIN+A) of the electronic fingerprint (EIN) and the anteriority date (A) in a block chain and possibly retrieving and sending back with a third server the recorded posteriority (P) and anteriority (A) dates from the reception of a new digital image (IN2). The disclosure is intended in particular to prove with images the correct performance of clinical protocol steps in clinical trials.