Patent classifications
H04L2463/121
Fleetwide Adaptive Rate Limiting Gatekeeper Apparatuses, Processes and Systems
The Fleetwide Adaptive Rate Limiting Gatekeeper Apparatuses, Processes and Systems (FARLG) transforms API call permission request, API call result request datastructure/inputs via FARLG components into API call permission response, API call result response outputs. An API call permission request datastructure associated with an API call of an application structured to identify an API and a set of scopes is obtained. A retry-after interval is determined for each scope in the set of scopes, in which existence of a retry-after interval for a scope indicates that the API previously returned a throttled response for the scope. A wait duration associated with the API call is determined as the maximum retry-after interval across retry-after intervals that exist for the set of scopes. An API call permission response datastructure structured to specify the wait duration is provided.
Method and device for handling personal data in M2M system
The present invention relates to a method and apparatus for handling personal data in a machine-to-machine (M2M) system, and an operation method of an M2M device includes obtaining information related to consent of a user for personal data provided from an Internet of things (IoT) device and creating a consent-related resource based on the information. The resource includes at least one attribute related to the consent.
DELAYED AND PROVISIONAL USER AUTHENTICATION FOR MEDICAL DEVICES
Representative embodiments of operating a secured device requiring user authentication include receiving a request from a user for operating the device without prior authentication; granting the user temporary access to the device in accordance with a security policy that specifies a predetermined time interval and/or a predetermined number of device operations within which authentication must occur to continue at least some operations of the device; computationally storing an audit trail identifying the temporary access and actions performed during the temporary access; and upon determining that authentication has not been provided within the predetermined time interval or number of device operations, preventing at least some operations of the device and updating the audit trail to specify expiration of the temporary access.
Processing refresh token request at application programming interface (API) gateway
Example implementations relate to the processing of refresh token requests at an API gateway. The API gateway determines a first time associated with receipt of the refresh token request and a second time associated with the generation of a current access token. The current access token and a refresh token in the refresh token request are provided by the API gateway to the client device for accessing a backend service. The API gateway determines whether a difference between the first time and the second time is within a pre-defined threshold duration. When the difference between the first time and the second time is within the pre-defined threshold, the API gateway denies the refresh token request for generating the new access token and transmits the current access token back to the client device.
User permissions for access to secure data at third-party
A user permission system manages and regulates access to secure data at one or more third-party data sites. The system may provide access to one or more databases or other data structures based on user authentication and access rules that have been established, such as by a user associated with the data being accessed at the third party data store. Access may be provided via an API to the third-party data site, along with access credentials of a user with data stored with the third-party data site, allowing the system to access data on behalf of the user.
Secure audio transcription
A user requests to join a meeting is detected. The meeting includes a meeting audio stream of one or more participant audio streams that include participant timestamps that correspond to when one or more other users are in the meeting. The user is prompted for an authentication credential based on the detecting the request to join the meeting. A participant profile of the user is determined based the authentication credential. The user is authorized access to the meeting and a first timestamp is saved. A first audio stream of the user is recorded. The user is identified as having left the meeting and a second timestamp is saved. A transcript of the meeting audio stream is generated based on the first audio stream and the one or more participant audio streams. The first timestamp, the second timestamp, and the meeting are associated with the participant profile.
AUTOMATED WEB TRAFFIC ANOMALY DETECTION
An anomaly detection system that includes a database and a server. The server is connected to the database. The server is configured to identify anomalous web traffic for a certain time period based on one or more client keys from the certain time period. The client key(s) includes at least two characteristics related to web traffic data. The server includes a processing unit and a memory. The server is configured to receive the web traffic data from the database, calculate a z-score metric for the client key, calculate a change rate metric for the client key, calculate a failure metric for the client key, determine an anomaly score based on the z-score metric, the change rate metric, and the failure metric, and determine that the certain time period is an anomalous time period based on the anomaly score.
ACCESS CONTROL METHOD, APPARATUS, NETWORK SIDE DEVICE, TERMINAL AND BLOCKCHAIN NODE
The present disclosure provides an access control method, an access control apparatus, a network side device, a terminal and a blockchain node, wherein the access control method includes: receiving relevant information to be verified that is sent by a terminal and corresponds to an access request, wherein the relevant information to be verified includes private key signature information of the terminal and position information of preset information in the blockchain; acquiring the preset information from the blockchain according to the position information; verifying the terminal according to the private key signature information and the preset information; acquiring, in a case that verification is passed, attribute information of the terminal from a blockchain ledger according to the preset information; and feedbacking a request response for access control to the terminal according to the attribute information.
ANOMALY DETECTION IN COMPUTING SYSTEM EVENTS
Methods and systems are described herein for detecting anomalous access to system resources. An anomaly detection system may access system events from one or more computing devices and may generate entries from the system events. Each entry may include a corresponding timestamp indicating a time when a corresponding system event occurred, a corresponding user identifier indicating a user account within a computing environment associated with the corresponding system event, a corresponding location identifier indicating a location within the computing environment, and a corresponding action identifier indicating an action that the user account performed with respect to the location or an object within the computing environment. The generated entries may be aggregated and input into an anomaly detection model to obtain anomalous activity identified by the model.
METHOD AND SYSTEM TO DETECT ABNORMAL MESSAGE TRANSACTIONS ON A NETWORK
A surveillance system connectable to a network, comprising a communication module and a management module; said system being configured to, during an initialization phase: a. intercept a first message being sent to a first device; b. intercept a second message said second message being a response from the first device to the first message; c. calculate a time interval between the interception of the first message and the second message; d. repeat the steps a. to c. to determine further time intervals; e. determine a distribution of said time intervals; f. store the distribution and during a surveillance phase, intercept a third message said message being sent to the first device; intercept a fourth message said fourth message being a response to the third message; calculate a new time interval between the interception of the third and fourth messages; and verify that the new time interval is within the distribution.