H04L63/0245

Securing containerized applications

Techniques for securing containerized applications are disclosed. In some embodiments, a system, process, and/or computer program product for securing containerized applications includes detecting a new application container (e.g., an application pod); deploying a security entity (e.g., a firewall) to the application container; and monitoring all traffic to and from the application container (e.g., all layer-7 ingress, egress, and east-west traffic associated with the application container) using the security entity to enforce a policy.

METHOD FOR CONTROLLING A MODULAR ENERGY SYSTEM USER INTERFACE

A method for controlling a user interface of a modular energy system. The modular energy system comprises a header module and a display screen on which the user interface is displayed. The modular energy system can detect attachment of a first module thereto, control the user interface to display one or more first user interface elements corresponding to the first module, detect attachment of a second module to the modular energy system, control the user interface to resize the one or more first user interface elements to accommodate display of one or more second user interface elements corresponding to the second module, and control the user interface to display the one or more second user interface elements. The various UI elements can correspond to the particular module type that is being connected to the modular energy system.

QUERY ANALYSIS USING A PROTECTIVE LAYER AT THE DATA SOURCE

A method and system for performing query analysis are described. The method and system include receiving a query for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the query and is data agnostic. The method and system also include providing the query from the dispatcher to the data source and to the service as well as analyzing the query using the service.

DEEP PACKET ANALYSIS

A computer-implemented method for protecting a processing environment from malicious incoming network traffic may be provided. The method comprises: in response to receiving incoming network traffic comprising a data packet, performing a packet and traffic analysis of the data packet to determine whether said data packet is non-malicious and malicious, and processing of the data packet in a sandbox environment. Furthermore, the method comprises: in response to detecting that the data packet is non-malicious based on the packet and traffic analysis, releasing the processed data packet from the sandbox environment for further processing in the processing environment, and in response to detecting that the data packet is malicious based on the packet and traffic analysis discarding the data packet.

MANAGING SHARED APPLICATIONS AT THE EDGE OF A CONTENT DELIVERY NETWORK
20230061228 · 2023-03-02 ·

Disclosed herein are enhancements for deploying applications in an edge system of a communication network. In one implementation, a cache node in a content delivery network identifies a request for an application that is shared by a plurality of customers. In response to the request, the cache node determines whether the customer associated with the request is permitted to execute the application and, if permitted, initiates the application as an isolation instance. The cache node further, in response to completing the application, returns control to a source operation associated with the request.

SYSTEMS AND METHODS FOR FILTERING NETWORK COMMUNICATIONS WITH A DEMILITARIZED ZONE

Systems and methods for filtering data network communications using a demilitarized zone (DMZ) are provided. One embodiment includes receiving a first communication from an untrusted network for delivery to a computing device on a trusted network, where the first communication includes a payload and a header. In some embodiments, the method includes filtering the header to determine an internet protocol (IP) address of a remote computing device of the first communication and to determine whether the IP address is associated with an approved remote computing device. Some embodiments include determining whether the header identifies an approved TCP port and/or an approved UDP port. Some embodiments include terminating transmission of the first communication and examining the first communication to determine whether the first communication includes malware. Embodiments may also include maintaining legitimate session records and ensuring the first communication originated from a trusted data source.

PERFORMANCE IMPROVEMENT FOR ENCRYPTED TRAFFIC OVER IPSEC
20230066604 · 2023-03-02 ·

A packet that includes a header and a payload can be acquired. A first portion of the payload can be selected such that the first portion that is smaller than the payload. The header and the first portion of the payload can be encrypted based on an encryption algorithm to generate an encrypted packet. The encrypted packet can be transmitted to a node on a network.

Smart speaker system with cognitive sound analysis and response

Smart speaker system mechanisms, associated with a smart speaker device comprising an audio capture device, are provided for processing audio sample data captured by the audio capture device. The mechanisms receive, from the audio capture device of the smart speaker device, an audio sample captured from a monitored environment. The mechanisms classify a sound in the audio sample data as a type of sound based on performing a joint analysis of a plurality of different characteristics of the sound and matching results of the joint analysis to criteria specified in a plurality of sound models. The mechanisms determine, based on the classification of the sound, whether a responsive action is to be performed based on the classification of the sound. In response to determining that a responsive action is to be performed, the mechanisms initiate performance of the responsive action by the smart speaker system.

Method for energy distribution in a surgical modular energy system

A method of operating a modular surgical system including a control module, a first surgical module, and a second surgical module is disclosed. The method includes detachably connecting the first surgical module to the control module by stacking the first surgical module with the control module in a stack configuration, detachably connecting the second surgical module to the first surgical module by stacking the second surgical module with the control module and the first surgical module in the stack configuration, powering up the modular surgical system, and monitoring distribution of power from a power supply of the control module to the first surgical module and the second surgical module.

Systems and methods for detecting communication fraud attempts

The present disclosure provides a computer system, method, and computer-readable medium for a computer processor to detect, prevent and counter potentially fraudulent communications by proactively monitoring communications and performing multi-step analysis to detect fraudsters and alert communication recipients. The present disclosure may implement artificial intelligence (AI) algorithms to identify fraudulent communications. The AI model may be trained by real world examples to become more efficient.