Patent classifications
H04W12/66
MALICIOUS BLACK HOLE NODE DETECTION AND CIRCUMVENTION
A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
Synchronous multi-tenant single sign-on configuration
A computer implemented method for synchronizing multi-tenant single sign-on configuration. Utilizing a combination layer that is configured a single time to interact with a trust application at an identity provider. The combination layer is also configured to interact with the service provider and manages the security token and authentication state of the user. The identity provider can create a single long-lived trust application that is only responsible for redirecting to the combination layer, rather than a creating plurality of short-lived applications that redirect to a service provider every time a user login request is received. Thus, resulting in improved utilization of computing resources at the identity provider.
INTELLIGENT ATTESTATION OF TRAFFIC USING A ROUTING ENGINE
The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.
METHOD FOR CLASSIFYING ADVERTISEMENT NETWORKS FOR MOBILE APPLICATIONS AND SERVER THEREOF
A method for classifying ad networks to be used by an app, comprising the following steps performed by a server (10): for each app in a database (12), computing a quality index of the app based on evaluating parameters related to the app using an ad network and related to other apps using the same ad network; for each app using the ad network, computing an aggressivity level of the ad network based on aggressivity parameters which measure intrusivity, impact and effectivity of the ad network in the app; ranking all the apps of the database (12) according to the computed quality index and aggressivity level; for each ad network, computing a single classification metric based on structural parameters related to the ad network and to the apps using it; ranking all the ad networks according to the computed classification metric; delivering the rankings of the mobile applications and ad networks to both private users (14) and professional users (15).
Multi-factor authentication of caller identification (ID) identifiers
Systems and methods for multi-factor authentication of a caller identification (ID) identifier are disclosed. In embodiments, a method includes: receiving, by a computing device of a call recipient, a call request message from a remote caller device of a caller, the call request message including an authentication token shared between the caller and the call recipient, and an identifier; authenticating the caller using the authentication token; saving an authorized caller record in an authorized caller list on the computing device, the authorized caller record including the identifier; receiving an incoming telephone call from the caller, the incoming call including a caller ID identifier; determining that the caller ID identifier matches the identifier in the authorized caller record; and initiating completion of the call based on the determining that the caller ID identifier matches the identifier in the authorized caller record.
Detecting Unauthorized Access to a Wireless Network
Systems and methods detect a potential hacking attack by monitoring the number and timing of DELBA (Delete Block Acknowledgement) action frames. When the number and timing of the DELBA action frames correspond to an unauthorized access pattern, an unauthorized access is detected. The potential unauthorized access may be detected by an access point (AP) or by the AP and a backend system. When a potential unauthorized access is detected, the AP may remain in silent mode for a longer period of time and limit access to the network to only trusted devices. In addition, an alarm or other notification of the potential unauthorized access may be provided to a user or other designated contact.
FRAUD DETECTION DURING AN APPLICATION PROCESS
A system may receive, from a server device that provides an application form to a client device, device information associated with the client device, wherein the device information indicates a geolocation associated with the client device. The system may receive, from the server device, behavior information that indicates user behavior associated with inputting data into the application form using the client device, wherein the behavior information indicates a manner in which the data is input into one or more fields of the application form. The system may determine a fraud score based on the device information and the behavior information. The system may transmit an indication of a recommended action to be performed by the server device with respect to the application form and the client device based on the fraud score.
SYSTEMS AND METHODS FOR SEAMLESSLY CONNECTING DEVICES BASED ON RELATIONSHIPS BETWEEN THE USERS OF THE RESPECTIVE DEVICES
Systems and methods are described for seamlessly connecting devices based on relationships between the users of the respective devices. A media guidance application may determine that a first user has entered an environment (e.g., his/her mother's home) and may determine a frequency with which the first user enters the environment (e.g., daily). In response to determining that the first user visits frequently, the media guidance application may identify a second device in the environment (e.g., a smart TV) that a second user (e.g., the first user's mother) is authorized to grant access rights for. The media guidance application may determine a likelihood that the second user will grant the access rights for the second device to the first user, based on interaction data between the first user and the second user. In response to determining a high likelihood, the media guidance application may transmit the access rights.
SYSTEMS AND METHODS FOR ACCELERATED EPIDEMIC RECOVERY
A method comprising receiving, from a user device, a user identifier, the user identifier being associated with a user of the user device, confirming that the user's identity has been confirmed, retrieving, from a remote health record maintained by a third-party health service provider, health information regarding a virus-related test provided on the user, providing a virus-related test status based on the virus-related test results to the user device, receiving an invalidity indication from the third-party health-related entity, the invalidity indication indicating that a particular test is no longer considered valid, reviewing a record of the user to confirm if the user received the particular test, determining that the virus-related test is no longer valid based on the invalidity indication, providing a notice to the user device that the virus-related test status is no longer considered to be valid, and providing an update to the virus-related test status.
END-TO-END DEVICE ATTESTATION
Various examples of device and system implementations and methods for performing end-to-end attestation operations for multi-layer hardware devices are disclosed. In an example, attestation operations are performed by a verifier, including: obtaining layered attestation evidence regarding a state of a compute device, with the layered attestation evidence including attesting evidence provided from a second hardware layer of the compute device, such that the attesting evidence provided from the second hardware layer is generated from attesting evidence provided from a first hardware layer of the compute device to the second hardware layer of the compute device; obtaining endorsement information relating to the layered attestation evidence for the state of the compute device; determining an appraisal policy for performing attestation of the compute device from the layered attestation evidence; and applying the appraisal policy and the endorsement information to the layered attestation evidence, to perform attestation of the compute device.