H04L12/22

Secure processing of confidential information on a network
10491413 · 2019-11-26 ·

A system, method, and apparatus for processing confidential information. In one embodiment, the method includes: receiving confidential information on an incoming line coupled to the call center server; intercepting a DTMF tone portion of the confidential information at an encoder located between the incoming line and an agent at the remote client; and processing the DTMF tone at approximately the same time for two separate data paths, wherein a first path contains encoded confidential information for a call server, and a second path contains no confidential information for the agent.

Secure processing of confidential information on a network
10491413 · 2019-11-26 ·

A system, method, and apparatus for processing confidential information. In one embodiment, the method includes: receiving confidential information on an incoming line coupled to the call center server; intercepting a DTMF tone portion of the confidential information at an encoder located between the incoming line and an agent at the remote client; and processing the DTMF tone at approximately the same time for two separate data paths, wherein a first path contains encoded confidential information for a call server, and a second path contains no confidential information for the agent.

Source entities of security indicators

Examples disclosed herein relate to source entities of security indicators. Some examples disclosed herein enable identifying, in a security information sharing platform, a security indicator that is originated from a source entity where the security indicator comprises an observable. Some examples further enable determining a reliability level of the source entity based on at least one of: security events, sightings of the observable, a first set of user feedback information that is submitted for the security indicator by users of the security information sharing platform, or a second set of user feedback information that is collected from external resources that are external to the security information sharing platform.

Firewall port access rule generation

A method includes generating firewall port access rules between a first cloud system a second cloud system for each tenant of a plurality of tenants. A unique IP address range is generated for each tenant. The firewall port access rules are applied to each IP address.

Firewall port access rule generation

A method includes generating firewall port access rules between a first cloud system a second cloud system for each tenant of a plurality of tenants. A unique IP address range is generated for each tenant. The firewall port access rules are applied to each IP address.

Information Display Regarding Playback Queue Subscriptions
20190294406 · 2019-09-26 ·

Example techniques relate to playback queue subscriptions. An example implementation involves a computing system receiving, from a first computing device associated with a first user account, an instruction to enable subscription to a first playback queue associated with a first media playback system. In response to the instruction, the computing system enables second user accounts to subscribe to the first playback queue. The second user accounts are registered with respective second media playback systems in respective second household. The computing system receives, from a particular second media playback system, a request to subscribe to the first playback queue; and in response, sends one or more messages that update a control interface of the first control device to display a subscriber indication and (ii) sends one or more messages that populate a second playback queue of the particular second media playback system with audio tracks of the first playback queue.

Information Display Regarding Playback Queue Subscriptions
20190294406 · 2019-09-26 ·

Example techniques relate to playback queue subscriptions. An example implementation involves a computing system receiving, from a first computing device associated with a first user account, an instruction to enable subscription to a first playback queue associated with a first media playback system. In response to the instruction, the computing system enables second user accounts to subscribe to the first playback queue. The second user accounts are registered with respective second media playback systems in respective second household. The computing system receives, from a particular second media playback system, a request to subscribe to the first playback queue; and in response, sends one or more messages that update a control interface of the first control device to display a subscriber indication and (ii) sends one or more messages that populate a second playback queue of the particular second media playback system with audio tracks of the first playback queue.

Method and system for detecting client causing network problem using client route control system
10411981 · 2019-09-10 ·

Provided are a method and a system for identifying an IP of a DDoS attack orderer by using a client route control server. A method for detecting a network problem-causing client by using a client route control server includes: forming an edge server IP allocation matrix; checking a network problem occurrence in an edge server; allocating an edge server IP according to the edge server IP allocation matrix when a network problem occurs in an edge server; and detecting user information or a client IP, which has no edge server IP to be allocated according to the edge server IP allocation matrix, as a network problem-causing client, wherein an edge server IP is allocated differently for each user information or client IP in the edge server IP allocation matrix, and the edge server IP allocation is performed by at least two-stage edge server IP for each user information or client IP.

Method and system for detecting client causing network problem using client route control system
10411981 · 2019-09-10 ·

Provided are a method and a system for identifying an IP of a DDoS attack orderer by using a client route control server. A method for detecting a network problem-causing client by using a client route control server includes: forming an edge server IP allocation matrix; checking a network problem occurrence in an edge server; allocating an edge server IP according to the edge server IP allocation matrix when a network problem occurs in an edge server; and detecting user information or a client IP, which has no edge server IP to be allocated according to the edge server IP allocation matrix, as a network problem-causing client, wherein an edge server IP is allocated differently for each user information or client IP in the edge server IP allocation matrix, and the edge server IP allocation is performed by at least two-stage edge server IP for each user information or client IP.

Video monitoring and alarm verification technology

Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.