H04L43/0876

Monitoring encrypted network traffic

Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.

Monitoring encrypted network traffic

Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.

Apparatus and method for network automation in wireless communication system

Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.

Secure communication between a contact lens and an accessory device

Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.

Secure communication between a contact lens and an accessory device

Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.

Video analysis and data delivery method
11546232 · 2023-01-03 · ·

A method for providing data to a client computing device from an edge computing device is discussed herein. The method may include performing a network proximity check regarding the client computing device associated with a request for data captured by the wideband sensor. The method may further include determining, based on at least one proximity metric associated with the client computing device, a route for data responsive to the request for data associated with the network proximity check, where the route is one of a route including the cloud storage or a route that does not include the cloud storage. The method may also include receiving the request for data captured by the wideband sensor associated with the network proximity check. The method may also include transmitting the data responsive to the request for data captured by the wideband sensor associated with the network proximity check to the client computing device through the determined route.

MANAGING NETWORK LATENCY USING BUFFER FILL CONTROL
20230012394 · 2023-01-12 · ·

A method of managing a fill state of a buffer in an external device includes monitoring the latency of a network connection to an external device having a network buffer via a managing device. A state of fill of the network buffer is determined based on at least the monitored latency of the network connection, and the effective network speed is estimated based on the state of fill of the network buffer. One or more network traffic scheduling parameters are adjusted in response to the estimated effective network speed, such as a maximum currently usable network speed that is lower than a maximum possible speed of the network. The maximum currently usable network speed of the network connection is periodically increased if the monitored latency is in a normal state and the maximum currently usable network speed is lower than the maximum possible speed of the network.

Dynamic host configuration protocol lease allotment

In an example, a Dynamic Host Configuration Protocol (DHCP) lease request from a client device connected to a network is received. Based on the DHCP lease request, an Internet Protocol (IP) address is assigned to the client device for a lease time. A first lease renewal request is received. A probability of utilization for a lease time block is predicted based on a historical lease pattern, device characteristics, traffic information, and DHCP information. Based on a combination of the probability of utilization and a reward value, the lease time block is allotted for lease renewal. For each allotment, the reward value is adjusted based on deployment characteristics and traffic load in the network, and a network connection duration of the client device. A normalized reward value for the lease time block is determined based on reward values for the lease time block over multiple allotments.

Systems and methods for deploying dynamic geofences based on content consumption levels in a geographic location

Systems and methods are provided for determining in real-time geographic areas having a threshold level of content consumption and deploying dynamic geo-fences to contain these geographic areas. These dynamic geo-fences provide a means for timing message notifications in order to optimize the chances of delivering targeted content to a mobile device user based on the current geographic location of the user's device relative to a threshold level of content consumption area. As mobile device users may be more likely to launch a client application in a place where other users are currently consuming content, a general message notification sent to the user's device located in a dynamic geo-fence created based on real-time content consumption, may increase the likelihood that the user will launch the client application and thereby, allow targeted content to be delivered to the user's mobile device.

Systems and methods for deploying dynamic geofences based on content consumption levels in a geographic location

Systems and methods are provided for determining in real-time geographic areas having a threshold level of content consumption and deploying dynamic geo-fences to contain these geographic areas. These dynamic geo-fences provide a means for timing message notifications in order to optimize the chances of delivering targeted content to a mobile device user based on the current geographic location of the user's device relative to a threshold level of content consumption area. As mobile device users may be more likely to launch a client application in a place where other users are currently consuming content, a general message notification sent to the user's device located in a dynamic geo-fence created based on real-time content consumption, may increase the likelihood that the user will launch the client application and thereby, allow targeted content to be delivered to the user's mobile device.