Patent classifications
H04L67/30
Systems and methods for proactive network maintenance
The present disclosure generally relates to systems, methods and software for quantitatively evaluating an improvement on an active communication network when an impairment, such as a developing impairment, is addressed by one or more repair options via proactive network maintenance.
Matchmaking video chatting partners
A mediating method may include: preparing at least two lists that respectively correspond to different values of a specific feature and that each of which includes at least one item; receiving first information about a first terminal or a user of the first terminal from the first terminal; deriving a value corresponding to the specific feature using the received first information; selecting a first list from among the at least two lists using the derived value; determining whether a first item matching the user of the first terminal is present in the at least one item included in the first list using the first information; and when it is determined that the first item is present in the first list, transmitting second information corresponding to the first item to the first terminal, or transmitting third information corresponding to the first terminal to a second terminal corresponding to the first item.
Matchmaking video chatting partners
A mediating method may include: preparing at least two lists that respectively correspond to different values of a specific feature and that each of which includes at least one item; receiving first information about a first terminal or a user of the first terminal from the first terminal; deriving a value corresponding to the specific feature using the received first information; selecting a first list from among the at least two lists using the derived value; determining whether a first item matching the user of the first terminal is present in the at least one item included in the first list using the first information; and when it is determined that the first item is present in the first list, transmitting second information corresponding to the first item to the first terminal, or transmitting third information corresponding to the first terminal to a second terminal corresponding to the first item.
Creating malware prevention rules using malware detection and prevention system
Aspects of the present disclosure involve systems and methods computing devices to access a public network posing as a user to the network to detect one or more malware programs available for downloading through the network. More particularly, a malware detection control system utilizes a browser executed on a computing device to access a public network, such as the Internet. Through the browser, sites or nodes of the public network are accessed by the control system with the interactions with the sites of the public network designed to mimic or approximate a human user of the browser. More particularly, the control system may apply the one or more personality profiles to the browser of the computing device to access and interact with the nodes of the public network. Further, the control system may monitor the information retrieved from the network sites to detect the presence of malware within the nodes.
Creating malware prevention rules using malware detection and prevention system
Aspects of the present disclosure involve systems and methods computing devices to access a public network posing as a user to the network to detect one or more malware programs available for downloading through the network. More particularly, a malware detection control system utilizes a browser executed on a computing device to access a public network, such as the Internet. Through the browser, sites or nodes of the public network are accessed by the control system with the interactions with the sites of the public network designed to mimic or approximate a human user of the browser. More particularly, the control system may apply the one or more personality profiles to the browser of the computing device to access and interact with the nodes of the public network. Further, the control system may monitor the information retrieved from the network sites to detect the presence of malware within the nodes.
Method for Uploading Configuration File, Method for Downloading Configuration File, and Apparatus
The method for uploading a configuration file includes: obtaining, by a network device, a local configuration file, where the local configuration file includes configuration information of the network device; compressing, by the network device, the local configuration file, to obtain a compressed file; and sending, by the network device, a configuration file upload request to a storage apparatus, where the configuration file upload request includes the compressed file, and the configuration file upload request is used for requesting the storage apparatus to store the compressed file.
SYSTEM AND METHOD FOR ENHANCED VIRTUAL QUEUING
A system and method for managing virtual queues. A cloud-based queue service manages a plurality of queues hosted by one or more entities. The queue service is in constant communication with the entities providing queue management, queue analysis, and queue recommendations. The queue service is likewise in direct communication with queued persons. Sending periodic updates while also motivating and incentivizing punctuality and minimizing wait times based on predictive analysis. The predictive analysis uses “Big Data” and other available data resources, for which the predictions assist in the balancing of persons across multiple queues for the same event or multiple persons across a sequence of queues for sequential events. Furthermore, the system utilizes a virtual agent engine and various predictive models to schedule and execute callbacks between a person in a virtual queue and a virtual agent based on predictive model results.
Secure multiparty computation for Internet of Things communications
Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices, thus concurrently maintaining individual data privacy and data provenance.
Secure multiparty computation for Internet of Things communications
Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices, thus concurrently maintaining individual data privacy and data provenance.
Cooperative adaptive network security protection
Systems and methods for improving the catch rate of attacks/malware by a cooperating group of network security devices are provided. According to one embodiment, a security management device configured in a protected network, maintains multiple dynamic IP address lists including an NGFW deep detection list, a DDoS deep detection list, a NGFW block list and a DDoS block list. The security management device, continuously updates the lists based on updates provided by a cooperating group of network security devices based on network traffic observed by the network security devices. In response to receipt of a request from a NGFW device or a DDoS mitigation device associated with the protected network, the security management device provides the requestor with the requested dynamic IP address lists for use in connection with processing network traffic by the requestor.