H04L63/0209

Method and device for installing a node in a home network
11516180 · 2022-11-29 · ·

A method is provided for installing a new node in a wireless home network having a client network and includes a node able to form a mesh network. A connection of a new node to the client network supplied by the home network node is detected, and an identifier of a client device that is connected to the client network is received. If the client device is known to the home network: the new node is notified that the client device that is connected to the client network must be disconnected from the client network; a connection of the client device to the client network supplied by the node of the home network is detected; and identifiers of the mesh network are transferred to the new node if the connection of the disconnected client device to the client network supplied by the node of the domestic network is detected.

INTERPROCESSOR PROCEDURE CALLS
20220374294 · 2022-11-24 ·

A firewall host uses a shared memory to pass arguments to, and receive results from, a remote procedure executing on a locally coupled network processing unit that offloads processing for the firewall.

SYSTEMS AND METHODS FOR DISTRIBUTING EVENT DRIVEN NETWORK SERVICES

Systems and methods are provided for use in providing messaging among different regions, via a distributed event drive architecture. One exemplary method includes receiving, at an event gateway in a region, a network message from a different event gateway in a different region, via a persistent connection between the event gateway and the different event gateway, and validating, by the event gateway, the network message based on at least a certificate associated with the network message. The method also includes, in response to validation of the network message, converting, by the event gateway, the network message to an event and publishing, by the event gateway, the event to the message bus, thereby providing the event associated with the network message to a service to which the network request is directed.

Methods and systems for network device reconfigurations

Disclosed herein are embodiments of systems and methods that dynamically reconfigure a multi-tiered system of network devices and software applications in response to an ongoing and/or anticipated cyber-attack. The dynamic reconfiguration of the network devices may consist of a wide range of processes, which may include generating new network addresses for individual network devices; reconfiguring the network devices by creating firewalls, changing protocols between the network devices in a multi-tier reconfiguration solution, changing the cloud infrastructure provider of the network devices, even when the underlying network infrastructure ecosystem differs across cloud service providers (CSPs); and maintaining a secure and updated data model of a record of reconfigured network devices and their dependencies to allow legitimate users of the network devices to understand reconfiguration actions that are hidden from malicious users such as hackers and cyber-attackers.

ENCODING-FREE JAVASCRIPT STRINGIFY FOR CLIENTLESS VPN
20230056928 · 2023-02-23 ·

A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content.

Methods and systems for PKI-based authentication

Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.

Gateway for mobile terminated wireless communication in a 5G or other next generation wireless network

According to one or more embodiments, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can include establishing a wireless connection to a wireless network. The operations can further include receiving, via the wireless connection, data from a gateway device, that has been communicated via a network device of a publicly accessible network, wherein the data has been compared, by the gateway device, to a template of anomalous activity.

Automated encryption degradation detection, reporting and remediation
11588840 · 2023-02-21 · ·

Communication security is an ongoing problem. Over time, various protocols have been used and then replaced due to insufficient protection. For example, some client/server web communication used to rely on Secure Socket Layers (SSL) to protect communication, but was replaced with a more secure Transport Layer Security (TLS) protocol. TLS itself has undergone several revisions, and TLS 1.0 is now considered not secure. TLS and other protocols provide backwards compatibility, so while a higher security level is desired, communication may fallback to an undesirable level, e.g., TLS 1.0, if required by either communication endpoint. An intermediary to communication with an organization may capture data to facilitate analyzing it to determine what caused a fallback, and to decide if and how to remediate it. Remediation may vary depending on, for example, whether the cause was from within the organization, or external, such as from a client.

Wireless conferencing system and collaboration method thereof
11586409 · 2023-02-21 · ·

A wireless conferencing system for wirelessly connecting a computerized device with a display device includes at least a data transmitter. The data transmitter includes a transmitter self-powered unit, a data transmission module electrically powered by the transmitter self-powered unit, and a computer interface communicatively lined to the data transmission module, wherein when the computer interface is configured for detachably connecting to the computerized device, the data transmission module is powered and ready for wirelessly transmitting data from the computerized device to the display device without consuming power of the computerized device.

Premises management configuration and control
11588787 · 2023-02-21 · ·

Disclosed are methods, systems, and devices for management of a premises. The premises may comprise one or more devices, such as a gateway device, a control device, or a premises device. A computing device, such as a server external to the premises, may receive data indicative of the premises device. The computing device may determine to update a configuration of one or more devices at the premises, such as the gateway device or the control device. Configuration data may be sent to the gateway device to update the configuration.