Patent classifications
H04L12/141
Secure application monitoring
Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.
INFORMATION PROCESSING APPARATUS AND SERVICE COST CALCULATION METHOD
An information processing apparatus includes: a memory; and a processor coupled to the memory and the processor configured to: acquire charge system information indicating a charge system of each application programming interface (API) called by a service; acquire usage history information indicating a usage history of the service by a user; and calculate a cost for each API based on a number of calls of each API, which is included in the usage history information, and a charge system of each API.
Systems and methods for providing policy control of parallel signaling in a fifth generation (5G) network
A first network device may receive a protocol data unit (PDU) session establishment or modification request, and may perform one or more actions based on the PDU session establishment or modification request. The first network device may receive, based on performing the one or more actions, a first message indicating that the PDU session is authenticated and authorized, and may select a second network device associated with establishing or modifying a management policy for the PDU session. The first network device may receive, from the second network device, a second message indicating whether to wait for receipt of a charging data response, to a charging data request, before interacting with a third network device, and may provide the charging data request to a fourth network device while interacting with the third network device when the second message indicates not to wait for receipt of the charging data response.
SYSTEM AND METHOD FOR BOT DETECTION AND CLASSIFICATION
A computing system includes a server. The server is communicatively coupled to a data repository and is configured to store a data in the data repository. The server is further configured to create a server instance, wherein the server instance is associated with a user. The server is additionally configured to create a session based on an external entity requesting a resource from the server instance, and to execute a bot detection logic to determine if the external entity is a bot. If the external entity is a bot then the server is configured to perform a bot-based action, wherein the server is configured to provide for multi-instance support to a plurality of users.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ELECTRONICALLY FACILITATING STREAMING PAYMENTS
Methods, systems, and computer readable media for electronically facilitating streaming payments are provided. An exemplary method includes receiving a request to access protected media content hosted by a content provider, determining a minimum currency increment based on a user designated payment type, and establishing a predefined content increment that corresponds to the protected media content. The method further includes determining a minimum session expense ratio based on the minimum currency increment and the predefined content increment, initiating a user session that permits access to the protected media content, and determining a quantification of protected media content that is consumed at a termination of the user session. The method also includes using the minimum session expense ratio and the quantification to determine an on-demand streaming payment amount and utilizing the user designated payment type to determine a manner of routing the on-demand streaming payment amount to a payment processing entity that is configured to facilitate a payment transaction.
Methods Circuits Devices Systems and Functionally Associated Computer Executable Code to Support Data Services from a Radio Access Network of a Wireless Communication Network to a Wireless Device Communicatively Coupled to the Communication Network
The present application discloses methods, circuits, devices, systems and functionally associated computer executable code to support data services provided by one or more edge data service providers/applications running on edge computing resources, integral or otherwise functionally associated with a Radio Access Network (RAN) segment of a wireless communication network, to one or more wireless communication devices communicatively coupled to the wireless communication network through the RAN segment. Embodiments of the present invention include a wireless communication network comprising with at least one network core having one or more network elements to perform each of one or more network management functions, including to managing wireless communication device (User Equipment—UE) related information. The network also includes at least one network edge segment which includes: (a) one or more wireless access nodes to which a UE associated with the network can communicatively couple; and (b) at least one edge computing resource to provide one or more edge data services to a communicatively coupled UE. A network edge gateway between said network core and the network edge segment may include a tokenizer to generate UE specific tokens and to send the tokens to the at least one edge computing resource.
METHODS AND SYSTEMS FOR BILLING OF METADATA IN A NETWORK OF MOVING THINGS
Systems and methods are provided for billing of metadata in a network of moving things.
Multiple usage rates
An example communications system for providing communication services between communications devices may employ multiple usage rates for metered communication services. A method for adjusting usage amounts to account for multiple usage rates may include determining a usage adjustment factor for a communications event; determining a metered usage amount for the communications event; and determining an adjusted usage amount based on the usage adjustment factor and the metered usage amount for the communications amount. Thus, a billing system in the communications system may determine an invoice amount based on the adjusted usage amount and a predetermined bill rate.
SECURE TOKENS FOR CONTROLLING ACCESS TO A RESOURCE IN A RESOURCE DISTRIBUTION NETWORK
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
SECURE TOKENS FOR CONTROLLING ACCESS TO A RESOURCE IN A RESOURCE DISTRIBUTION NETWORK
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a payment-based token based on a payment made for a meter. The payment-based token indicates a credit value to be applied to the meter. The credit value can range from a negative credit value limit and a positive credit value limit. The payment-based token is further generated based on a meter identifier. The headend system transmits the payment-based token to the meter via at least a mesh network. After receiving the payment-based token, the meter validates the payment-based token to determine that the payment-based token is generated for the meter. The meter further determines the balance associated with the meter based on the credit value specified in the payment-based token. Based on the balance, the meter connects or disconnects premises associated with the meter from a resource supply.