Patent classifications
H04W12/088
Hardware agnostic platform for transparent access control of internet of everything (IoE) destinations via correlation, classification, and/or tagging
Simplified and/or user friendly interfaces can be employed to facilitate administration of a routing platform that couples devices of a local area network (LAN) to an external communication network (e.g., the Internet). In one aspect, the routing platform comprises a firewall that can be employed to perform access control and/or an Internet of Things (IoT) hub that can be employed to control operations of IoT devices of the LAN, for example, based on domain information, user-defined tags and peer-defined criteria to make correlations that are leveraged to implement access control policies. A search and command interface is employable to issue textual (e.g., natural language) commands to configure access control policies, tags for devices and/or websites, and/or search for data.
Hardware agnostic platform for transparent access control of internet of everything (IoE) destinations via correlation, classification, and/or tagging
Simplified and/or user friendly interfaces can be employed to facilitate administration of a routing platform that couples devices of a local area network (LAN) to an external communication network (e.g., the Internet). In one aspect, the routing platform comprises a firewall that can be employed to perform access control and/or an Internet of Things (IoT) hub that can be employed to control operations of IoT devices of the LAN, for example, based on domain information, user-defined tags and peer-defined criteria to make correlations that are leveraged to implement access control policies. A search and command interface is employable to issue textual (e.g., natural language) commands to configure access control policies, tags for devices and/or websites, and/or search for data.
Systems and methods for managing a compromised autonomous vehicle server
Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.
Digital data access control and automated synthesization of capabilities
A computer system for controlling access to digital data and algorithms, including a multitude of local systems provided at a plurality of remote locations. At least a first subset of the multitude of local systems comprises at least one data acquisition device adapted to generate and provide raw digital data. At least a second subset of the multitude of local systems comprises at least one data processing unit having a memory with a memory capacity and a processor with a computing capacity to process raw digital data to generate processed digital data to be presented to one or more of a plurality of users of the system. The system also includes a filter system, wherein at least one filter is assigned at each local system, each filter having a filter setting for restricting and prohibiting data transfer between the assigned local system and other local systems.
AUTONOMOUS VEHICLE SECURITY MEASURES IN RESPONSE TO AN ATTACK ON AN IN-VEHICLE COMMUNICATION NETWORK
An illicit signal is detected on an in-vehicle communication network of an autonomous vehicle. A severity level corresponding to the illicit signal is identified, among multiple severity levels, based on one or more characteristics associated with the illicit signal. The severity level is indicative of a level of adverse impact on safety related to an autonomous vehicle environment. The adverse impact is to be caused by the autonomous vehicle when the autonomous vehicle is compromised by the illicit signal. A security operation is selected from multiple security operations based on the identified severity level. The security operation is performed to mitigate the adverse impact on safety related to the autonomous vehicle environment.
Computer-based systems configured for one-time passcode (OTP) protection and methods of use thereof
Systems and methods of anti-vishing OTP protection via machine learning techniques are disclosed. In one embodiment, an exemplary computer-implemented method may comprise: receiving a permission indicator identifying a permission by the user to detect OTPs and calls being received by a computing device; receiving an indication of an OTP data item being received; processing the OTP data item to determine a time duration during which a particular OTP included therein is valid; utilizing a trained OTP protection machine learning model to determine phone number(s) as presenting a security risk with respect to the OTP data item; and instructing the computing device to commence at least one security measure based at least in part on a contact list updated with an indication that the phone number(s) present a security risk with regard to the particular OTP during the time duration of the particular OTP.
SYSTEM AND PROCESS IMPLEMENTING A SECURE NETWORK
A wireless network system configured to secure a wireless service provided to at least one wireless device from a wireless network, the wireless network system includes a secure network server implemented in at least one of a network operator cloud and a mobile network operator implementing the wireless network. The secure network server being configured to implement at least one of the following: a unique Access Point Name (APN), an International Mobile Equipment Identity (IMEI) whitelist, a virtual private network (VPN) over encrypted network, a dedicated firewall, a whitelist of IP addresses, and a unique SIM.
SYSTEM AND PROCESS IMPLEMENTING A SECURE NETWORK
A wireless network system configured to secure a wireless service provided to at least one wireless device from a wireless network, the wireless network system includes a secure network server implemented in at least one of a network operator cloud and a mobile network operator implementing the wireless network. The secure network server being configured to implement at least one of the following: a unique Access Point Name (APN), an International Mobile Equipment Identity (IMEI) whitelist, a virtual private network (VPN) over encrypted network, a dedicated firewall, a whitelist of IP addresses, and a unique SIM.
METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
SYSTEM AND METHOD OF NETWORKING SECURITY FOR VIRTUALIZED BASE STATION
Systems and methods for implementing IPsec connections for one or more virtualized base station entities are provided.