H04L63/0227

I2NSF registration interface yang data model

The present disclosure provides a registration method by a developer's management system in a security management system managing a Network Security Function (NSF) through a registration interface.

Utilizing a model to manage resources of a network device and to prevent network device oversubscription by endpoint devices

A network device may receive configuration data identifying resource subscription thresholds associated with a plurality of respective endpoint devices and may receive traffic from the plurality of endpoint devices. The network device may process the traffic and the configuration data, with a resource allocation model, to determine that processing traffic associated with a first endpoint device requires allocating a resource of the network device, and may process the configuration data, with the resource allocation model, to identify the resource of the network device from a particular resource of the network device that is currently allocated to traffic associated with a second endpoint device. The network device may allocate the particular resource of the network device to the traffic associated with the first endpoint device, and may process the traffic associated with the first endpoint device with the particular resource to generate processed traffic.

Method for managing system and apparatus therefor

The present disclosure provides a method of managing a system and an apparatus therefor. The method of the present disclosure may include providing a menu management tool for managing a menu of a system, setting an item of the menu and an authority to access the item by receiving an input through the menu management tool, and providing, when a terminal having the authority accesses the system, information regarding the item to the terminal.

Method, system, and computer program product for preventing transmission of malicious data

A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.

Adjusting behavior of an endpoint security agent based on network location

Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.

SYSTEM FOR MONITORING AND MANAGING DATACENTERS

An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.

TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

Holistic fraud cocoon

Provided herein is a holistic fraud cocoon that protects a user from incoming or outgoing fraud and phishing communications by capturing, analyzing and either altering, discarding or presenting communications to the user. For example, the holistic fraud cocoon captures all incoming sources (mail, in-person visits, phone, TV, radio, newspapers and internet) and the actions performed by the user, triggered by those sources. Certain actions are held in a queue to be reviewed, validated and acted upon by a third party before the actions are executed.

Method and system for electronic communication
20220327533 · 2022-10-13 ·

Communication and a communications apparatus are controlled with a communication intermediating apparatus. Multiple methods of processing communication requests are provided. Decided rules comprising of pairs of identification information of communication requests and methods of processing are recorded beforehand. When a communication request is received, the identification of the communication request is distinguished, an applying rule is picked from the recorded rules, and the communication request is processed. A virtual account to be set maximum payment amount beforehand is used, and electronic transactions communication is done.

METHOD FOR CONTROLLING A MODULAR ENERGY SYSTEM USER INTERFACE

A method for controlling a user interface of a modular energy system. The modular energy system comprises a header module and a display screen on which the user interface is displayed. The modular energy system can detect attachment of a first module thereto, control the user interface to display one or more first user interface elements corresponding to the first module, detect attachment of a second module to the modular energy system, control the user interface to resize the one or more first user interface elements to accommodate display of one or more second user interface elements corresponding to the second module, and control the user interface to display the one or more second user interface elements. The various UI elements can correspond to the particular module type that is being connected to the modular energy system.