Patent classifications
H04L63/0209
SDN CONTROLLER
An SDN controller used in a network constructed with an SDN, the SDN controller causes a computer to function as an address information specifying processing unit which specifies, based on a global address of an illegal attack server received from a threat detection system, communication with the received global address among communication in the network, and specifies a local address of a communication partner of the global address in the specified communication, a terminal identification information specifying processing unit which specifies terminal identification information on a client terminal to which the specified local address is assigned, and a security processing unit which passes to an edge network device, based on the specified terminal identification information, a control instruction to perform predetermined control processing to communication of the client terminal.
Telecommunication system for the secure transmission of data therein and device associated therewith
A telecommunication system of the type wherein a series of terminals are mutually connected through a server and of a data transmission network characterised in that the management and the control of data management within the network are furthermore provided, with a single device made up of a SOC (System on Chip) processor to which the required support peripherals are associated.
CRYPTOASSET CUSTODIAL SYSTEM WITH DIFFERENT CRYPTOGRAPHIC KEYS CONTROLLING ACCESS TO SEPARATE GROUPS OF PRIVATE KEYS
Methods, systems, and apparatus, including medium-encoded computer program products, for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include, in at least one aspect, a method including: identifying for an action an associated private-keys group out of different private-keys groups, each having an associated cryptographic group key; decrypting, at a first computer, a first level of encryption of a private key associated with the action using the associated cryptographic group key; decrypting, at a second computer distinct from the first computer, a second level of encryption of the private key associated with the action using a hardware-based cryptographic key used by the second computer; using, at the second computer, the private key associated with the action in a process of digitally signing data to authorize the action; and sending the digitally signed data to a third computer to effect the action.
Transport layer signaling security with next generation firewall
Techniques for transport layer signaling security with next generation firewall are disclosed. In some embodiments, a system/process/computer program product for transport layer signaling with next generation firewall includes monitoring transport layer signaling traffic on a service provider network at a security platform; and filtering the transport layer signaling traffic at the security platform based on a security policy.
Object property getter and setter for clientless VPN
A modified accessor function call is provided to the client device by a clientless VPN in conjunction with a browsing session performed by the client device via the clientless VPN. A native accessor function call is received at a client device. The modified accessor function call is executed at the client device, including by using the native accessor function call.
EXTENDING BERKELEY PACKET FILTER SEMANTICS FOR HARDWARE OFFLOADS
Examples include registering a device driver with an operating system, including registering available hardware offloads. The operating system receives a call to a hardware offload, inserts a binary filter representing the hardware offload into a hardware component and causes the execution of the binary filter by the hardware component when the hardware offload is available, and executes the binary filter in software when the hardware offload is not available.
ARTIFICIAL INTELLIGENCE CYBER SECURITY ANALYST
An analyzer module forms a hypothesis on what are a possible set of cyber threats that could include the identified abnormal behavior and/or suspicious activity with AI models trained with machine learning on possible cyber threats. The Analyzer analyzes a collection of system data, including metric data, to support or refute each of the possible cyber threat hypotheses that could include the identified abnormal behavior and/or suspicious activity data with the AI models. A formatting and ranking module outputs supported possible cyber threat hypotheses into a formalized report that is presented in 1) printable report, 2) presented digitally on a user interface, or 3) both.
Methods, systems, and computer readable media for receiving a clock synchronization message
Methods, systems, and computer readable media for receiving a clock synchronization message are disclosed. According to one exemplary method, the method occurs at a first node configured to operate on a protected side of a firewall device. The method includes sending, via the firewall device and to a second node configured to operate on a non-protected side of the firewall device, a clock lease message indicating an amount of time for clock synchronization, wherein the clock lease message triggers the firewall device to allow a clock synchronization message from the second node to the first node. The method also includes receiving, via the firewall device and from the second node, the clock synchronization message.
Enabling cross-realm authentication between tenant and cloud service provider
A first network adapter is inserted into a first resource server of each tenant of a plurality of tenants serviced by a cloud service provider. The first network adapter is configured to be controlled by the cloud service provider. The first resource server of each tenant includes a second network adapter configured to be controlled by the tenant. Each of the first network adapter is operably coupled with an interconnection network infrastructure. The interconnection network infrastructure is operably coupled with cloud service provider infrastructure. Related methods, techniques, apparatuses, systems, non-transitory computer program products, and articles are also described.
METHODS AND APPARATUS FOR SCALABLE METRICS GATHERING FROM SECURE DATA CENTERS
A method for integrating a new secure datacenter into a data storage network is provided. The method detects, by an accessible datacenter connected to the data storage network, the new secure datacenter connected to the data storage network, wherein the new secure datacenter includes a high security level that prevents user access, and wherein the accessible datacenter includes a decreased security level that permits user access; expands a storage layer in the accessible datacenter, by increasing available storage hardware of the accessible datacenter; connects a data pipeline from the new secure datacenter to the storage layer in the accessible datacenter, wherein the data pipeline comprises dedicated servers configured to buffer data, orchestrate a cluster of servers, and push data from the new secure datacenter to the accessible datacenter; and provides end user access to the storage layer.