Patent classifications
H04L2463/121
Method, device and computer program product for monitoring access request
Techniques for monitoring an access request are described. For instance, a method comprises: obtaining a request parameter indicating a target storage space to which the access request is directed; determining a target address range of the target storage space based on the request parameter; determining, in a set of kernel logs, a target kernel log associated with the access request based on the target address range, the set of kernel logs recording operations that occur in a kernel of an operating system; and determining information of an operation of the access request based on the kernel log, the operation corresponding to the target kernel log.
SYSTEM FOR RESOURCE DISTRIBUTION WITHIN AN OFFLINE ENVIRONMENT
Embodiments of the present invention provide a system for resource distribution within an offline environment. A merchant device internally stores a repository of reference codes and managing entity public keys that are paired with managing entity private keys. The user requests an amount of resources for offline exchange from the managing entity system. The managing entity system transmits certain authorization and encryption information to a user device. When the user device receives an exchange prompt from the computing device of the merchant through near field communication, it generates a digital token incorporating layers of content encryption ending with a managing entity's private key. The encrypted token and reference code are transmitted via near field communication to the merchant device. The merchant device matches the reference code to the managing entity public key and decrypts portions of the token with the managing entity public key to acquire the usable exchange information.
Systems and methods for photo recognition-based identity authentication
A combination of target images and control images are presented to a user device for selection by the user. Based on a correct selection of images that the user either recognizes or does not recognize, the user may be authenticated. Target images have some connection to a legitimate user in a way that a legitimate user may recognize the target image. Control images have no known connection to the legitimate user, such that they would not typically be recognized by the legitimate user. The legitimacy of a user may be determined based on images selected and/or not selected, depending on accompanying instructions for selection.
TRACKING OF TRANSPORT TRANSFERS
An example operation may include one or more of sending, by a transport, a drop off request to a plurality of nodes at a target location, receiving, by the transport, permissions from the plurality of the nodes, responsive to the permissions, acquiring, by the transport, an agreement for the drop off request from at least one node from the plurality of the nodes, and recording the drop off request on a remote storage.
SYSTEM AND METHOD FOR LATENCY CERTIFICATION SERVICE
Systems and methods provide a latency certification service. One or more network devices in an application service layer network receive a service request for a latency certification service and instantiate a Transmission Control Protocol (TCP) proxy for a data session between an application server device and a user equipment (UE) device. The one or more network devices obtain a digital certificate for the TCP proxy. The one or more network devices receive, at the TCP proxy, a data packet from the UE device; apply a certified timestamp to the data packet to form a certified timestamped data packet; and forward the certified timestamped data packet to the application server device.
SYSTEM AND METHOD FOR IMPROVING NETWORK PERFORMANCE WHEN USING SECURE DNS ACCESS SCHEMES
A system and method for improving network performance of DNS queries. The system includes a terminal which receives DNS queries from a customer premise equipment (CPE), and supplies matching DNS records in response to the queries. The terminal monitors all traffic from the CPE and generates a preload list containing domains and a time schedule at which name resolution should be requested for the domains. A DNS preload client in the CPE receives the preload list from the terminal, and submits preload DNS queries for name resolution of domains contained in the preload list at times specified in the time schedule. Preload records supplied in response to the preload DNS queries are stored by the CPE and used to resolve DNS queries from applications installed on the CPE.
OBSCURING INFORMATION IN VIRTUALIZATION ENVIRONMENT
A hardware request of an application is detected. The Application executes on a virtualized computer system. It is determined that the hardware request includes a counter. The counter is to be performed by the virtualized computer system. The counter includes a counter value. The hardware request is intercepted before the it is processed by a hypervisor that hosts the virtualized computer system. The interception is based on the determining the hardware request includes the counter. The counter value is saved in a secure memory. The secure memory is obscured from the hypervisor. A scrambled counter value is generated. The hardware request is updated with the scrambled counter value. After the hardware request is updated it is provided to the hypervisor.
ADJUSTMENT OF ENVIRONMENT OF TRANSPORTS
An example operation may include one or more of monitoring, by a transport, data related to behavior of an occupant of the transport, determining, by the transport, a mode of the occupant based on the data, and adjusting, by the transport, an environment of the transport based on the mode of the occupant.
Systems and methods for in-session refresh of entitlements associated with web applications
The described technology provides a capability to perform in-session updates to entitlements associated with a user's access to content served by a web application. The content may be from one or more external servers. The technology provides for automatically detecting changes to entitlements, and without requiring a user of an active session to initiate a new session, updating entitlement data in a memory such that subsequent requests for data made by the client in the same active session are serviced using the updated entitlements.
REMOTE ATTESTATION IN NETWORK
The present disclosure relates to a remote attestation in a network. Embodiments provide a method comprising: attesting a first node in a network, by a node adjacent to the first node in the network; and generating an attestation result of the first node. A plurality of attestation results of the first node generated by a plurality of nodes adjacent to the first node in the network are combined to determine a credibility of the first node. In such embodiments, a fixed verifier for other nodes is eliminated, and a risk of a collapse due to a failure of such fixed verifier may be avoided.