H04L2463/121

METHOD FOR TRANSMITTING DIGITAL INFORMATION
20210051140 · 2021-02-18 ·

A method of secure communication between a computer server and users each having a connected computer system, comprising recording of a unique identifier of the server in the memory of a trusted server, the connected system having first and second digital communication modes, the method further comprising: the transmission of an ASC application to the connected system, the application being installed on the connected system, its execution controlling the automatic opening of a computer session with the trusted server according to the second digital communication mode, the opening of a communication session by the connected system with a server, the opening of a secured communication session by the server with the trusted server, the transmission by the server of an identifier of the connected system, the calculation by the trusted server of a time-stamped code associated with the key, the transmission of the time-stamped code by the trusted server to the connected system corresponding to the identifier transmitted by the server, via a first communication protocol, the acquisition of the time-stamped code by the connected system according to the first protocol, the opening of a communication session by the connected system according to a second protocol, with the trusted server through the application previously loaded and transmission of the acquired code, the verification of the conformity of the code transmitted by the connected system, the transmission to the system connected by the trusted server of a digital validation message including a code conformity indicator and information relating to the server associated with the validated code.

CERTIFICATE DISCOVERY AND WORKFLOW AUTOMATION

An embodiment includes executing a discovery pattern for the certificate authority, where the discovery pattern contains instructions for obtaining one or more digital certificates from the certificate authority; obtaining, from the certificate authority, a representation of a digital certificate acquired by a managed network from the certificate authority; storing, in a first set of mappings, a first new mapping between the certificate authority and the digital certificate; receiving, from a computing device disposed with the managed network, an indication that the digital certificate is installed on the computing device;, storing, in a second set of mappings, a second new mapping between the digital certificate and the computing device; determining that the digital certificate is expired; and storing, in a third set of mappings, a third new mapping between the digital certificate and a critical status indicator.

Autonomous vehicle sensor security system

Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.

Peer authentication by source devices
10965676 · 2021-03-30 · ·

A first request and a first identifier corresponding to an identity of a first source device that initiated the first request is received. At least a second source device is queried to obtain information indicative of whether the first source device is authorized to complete the first request. The second source device is configured to periodically gather and transmit data, over one or more networks, to one or more local processing devices or one or more remote devices for data analysis. The first request is blocked or authorized to proceed based at least in part on whether at least the first source device is authorized to complete the first request.

METHODS, SYSTEMS, AND DEVICES FOR EFFICIENT REUSE OF INTERNET OF THINGS (IOT) DEVICES DEPLOYED IN TEMPORARY APPLICATIONS
20210075680 · 2021-03-11 ·

Disclosed herein are methods, systems, and devices for solving the problem of efficient reuse of internet-of-things (IoT) devices deployed in temporary applications. According to one embodiment, a method is implemented on a computing device. The method includes receiving, over a wide area network (WAN) from a mobile device, a device identification (ID) associated with an IoT device. The method further includes determining first digital rights management (DRM) privileges for the IoT device based on the device ID. The first DRM privileges are associated with a first entity and a first timestamp. The method further includes receiving, over the WAN from the mobile device, a first request to provide second DRM privileges for the IoT device. The second DRM privileges are associated with a second entity and a second timestamp. The method further includes granting the second DRM privileges based at least partially on a permission from the first entity.

ASSESSING TECHNICAL RISK IN INFORMATION TECHNOLOGY SERVICE MANAGEMENT USING VISUAL PATTERN RECOGNITION

A computer system, non-transitory computer storage medium, and a computer-implemented method of assessing technical risk using visual pattern recognition in an Information Technology (IT) Service Management System. A data visualization engine and a time series generation engine receive the operational data, respectively. A first representation of the data is generated by the data visualization engine, and a second representation of the data is generated by the time series generation engine. Anomaly patterns are identified by a pattern recognition engine configured to perform feature extraction and data transformation. An ensembler is configured to accept the outputs from two AI anomaly engines and make a final decision of whether anomaly patterns are captured. Risk scores based on the identified anomaly patterns are output by a pattern recognition engine to an automated management system. The anomalies includes information regarding vulnerabilities of devices or components of the IT Service Management System.

TRACKING OF TRANSPORT TRANSFERS
20210042691 · 2021-02-11 ·

An example operation may include one or more of receiving, by a node, a request for a transfer of a transport to a location, passing, by the node, the request to a plurality of nodes, receiving permissions from the plurality of the nodes, responsive to the permissions, sending a request to at least one node from the plurality of the nodes based on the location, and recording, by the node, the transfer of the transport to the at least one node on a remote storage.

Container life cycle management with retention rate adjustment based on detected anomalies

A plurality of containers related to one or more containerized applications are managed by monitoring an execution of the one or more containers; determining that a given one of the one or more containers exhibits anomalous behavior; and in response to the determining, adjusting a retention time of the given container, wherein the retention time of the given container determines when the given container is one or more of terminated and changes role to a honeypot container. The anomalous behavior comprises, for example, the given container exhibiting behavior that is different than a learned baseline model of the given container or including program code consistent with malicious activity. An alert notification of the anomalous behavior is optionally generated. The retention time of the given container can be adjusted for example, to an interval between deployment of the given container and the time the anomalous behavior is detected.

STRUCTURAL GRAPH NEURAL NETWORKS FOR SUSPICIOUS EVENT DETECTION
20210067527 · 2021-03-04 ·

A computer-implemented method for graph structure based anomaly detection on a dynamic graph is provided. The method includes detecting anomalous edges in the dynamic graph by learning graph structure changes in the dynamic graph with respect to target edges to be evaluated in a given time window repeatedly applied to the dynamic graph. The target edges correspond to particular different timestamps. The method further includes predicting a category of each of the target edges as being one of anomalous and non-anomalous based on the graph structure changes. The method also includes controlling a hardware based device to avoid an impending failure responsive to the category of at least one of the target edges.

DEFAULT ACCOUNT AUTHENTICATION

One embodiment provides a method, including: receiving, at a remote device and from a user, a request to generate a one-time password for accessing a default account of a device, wherein the remote device comprises a device public key corresponding to the device and an account public/private key pair corresponding to the default account; generating, at the remote device, the one-time password utilizing the account private key and the device public key; and providing, from the remote device, the one-time password to the user. Other aspects are described and claimed.