Patent classifications
H04W12/66
Systems and methods for pre-configuration attestation of network devices
Systems, methods, and computer-readable media are disclosed for measurement of trustworthiness of network devices prior to their configuration and deployment in a network. In one aspect of the present disclosure, a method for pre-configuration of network devices includes receiving, at a dynamic host configuration server, a first request from a network device for configuration data, the configuration data including at least an IP address; sending, by the dynamic host configuration server, a second request to the network device for attestation information; verifying, by the dynamic host configuration server, the network device based on the attestation information; and assigning, by the dynamic host configuration server, the configuration data to the network device upon verifying the network device.
SYSTEMS AND METHODS TO EVALUATE CLIENT DEVICE TRUST IN A DISTRIBUTED COMPUTING SYSTEM
A method includes receiving, by a processing device of a content sharing platform, a request for desired content from a client device, the content being stored in a content delivery network (CDN). The method further includes generating, based on data available to the content sharing platform, a partial trust metric associated with the client device, wherein the partial trust metric is to be used by a CDN server to make a decision regarding access to the desired content by the client device. The method further includes generating a response to the content request, wherein the response comprises one or more resource locators for accessing the desired content in the CDN, and the partial trust metric. The method further includes sending the response to the client device to enable the client device to request the desired content from the CDN server using the resource locator(s) and the partial trust metric.
Intelligent attestation of traffic using a routing engine
The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.
Biometric authentication, identification and detection method and device for mobile terminal and equipment
The application provides a method for attack detection in biometric authentication. The method may be implemented by a mobile terminal device, and comprises: obtaining sensor data of the mobile terminal device, wherein the sensor data is collected when the mobile terminal device performs biometric authentication, and the sensor data comprises acceleration sensor data of the mobile terminal device indicating accelerations of the mobile terminal device in x, y, and z axes of a three-dimensional space, and/or gyroscope data of the mobile terminal device indicating angular velocities in the x, y, and z axes of the three-dimensional space; and inputting the sensor data into an attack determination model to determine whether an attack occurs in the biometric authentication, wherein the attack determination model is trained by using sensor training data obtained based on sensor data of the mobile terminal device collected when the mobile terminal device performed biometric authentication historically.
Providing secure sensor data to automated machines
Systems, methods, and software can be used to provide secure sensor data. In some aspects, a computer-implemented method includes: receiving, at a sensor security evaluation application executing on a device, sensor data from a sensor on the device; determining, by the sensor security evaluation application, a security confidence score associated with the sensor data; and transmitting, from the sensor security evaluation application, the security confidence score and the sensor data to a smart machine processor on the device.
Systems and methods for seamlessly connecting devices based on relationships between the users of the respective devices
Systems and methods are described for seamlessly connecting devices based on relationships between the users of the respective devices. A media guidance application may determine that a first user has entered an environment (e.g., his/her mother's home) and may determine a frequency with which the first user enters the environment (e.g., daily). In response to determining that the first user visits frequently, the media guidance application may identify a second device in the environment (e.g., a smart TV) that a second user (e.g., the first user's mother) is authorized to grant access rights for. The media guidance application may determine a likelihood that the second user will grant the access rights for the second device to the first user, based on interaction data between the first user and the second user. In response to determining a high likelihood, the media guidance application may transmit the access rights.
Method and system for reduced V2X receiver processing load using network based application layer message processing
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
Receiver device for facilitating wireless power reception
Disclosed is a receiver device for facilitating wireless power reception. The receiver device comprises a receiver transceiver configured for wirelessly communicating with at least one transmitter device. The receiver transceiver is configured for transmitting a registration request to the at least one transmitter device, wherein the registration request comprises a unique receiver device identifier, wherein the at least one transmitter device is configured for accessing a distributed block-chain associated with wireless power transfer. Further, the at least one transmitter device is configured for analyzing the registration request, updating the distributed block-chain based on the analyzing of the registration request and transmitting a registration response to the receiver device, wherein the receiver transceiver is configured for receiving the registration response.
CLASSIFICATION INCLUDING CORRELATION
Systems, methods, and related technologies for classification are described. Network traffic from a network may be accessed. One or more values associated with one or more properties associated with an entity may be determined. The one or more values may be determined from the network traffic. A first classification attribute is determined based on the one or more values associated with one or more properties associated with the entity. A second classification attribute is determined, by a processing device, based on the first classification attribute and the one or more values associated with one or more properties associated with the entity. The second classification attribute is stored.
Identifying network risk
Embodiments are disclosed for a method for identifying network risk. The method includes determining that a computing device has created a new connection to a network. Additionally, the method includes determining the public internet protocol (public IP) address of the exit point used by the network. Further, the method includes determining a reputation rating of the network based on the public IP address of the exit point. The method also includes providing a notification indicating the reputation rating of the network.