H04L63/0245

Dynamically controlling access to linked content in electronic communications

Aspects of the disclosure relate to dynamically controlling access to linked content in electronic communications. A computing platform may receive, from a user computing device, a request for a uniform resource locator associated with an email message and may evaluate the request using one or more isolation criteria. Based on evaluating the request, the computing platform may identify that the request meets at least one isolation condition associated with the one or more isolation criteria. In response to identifying that the request meets the at least one isolation condition associated with the one or more isolation criteria, the computing platform may initiate a browser mirroring session with the user computing device to provide the user computing device with limited access to a resource corresponding to the uniform resource locator associated with the email message.

Multi-level data channel and inspection architecture including security-level-based filters for diverting network traffic

Deep packet inspection of data in a multi-spoke data tunnel inspection architecture is provided. Inspection may include using a data review tunnel module to receive a first portion of a data stream, encrypted with a first encryption scheme, in a first data conduit. The method may also include receiving a second portion of the data stream, encrypted with a second encryption scheme, in the second data conduit. The method may also include decrypting and reconstructing a complete data stream. The complete data stream may be derived from the decrypted and reconstructed first data stream and the decrypted and reconstructed second data stream. The method may then analyze and review the flow of the complete data stream to determine whether the flow of the data stream is associated with a pre-determined likelihood of intrusion, and then prepare a data report based on the analysis and review.

Systems and methods for implementing universal targets in network traffic classification

The present technology discloses systems, methods, and computer-readable media to establish at least one target for a network, the target including at least one of an ingress parameter or an egress parameter and a policy for network packets; receive at least one network packet on the network; search for at least one matching target from the at least one targets, the at least matching target comprising parameters that match the at least one network packet; apply a policy in the at least one matching target to the at least one network packet; and forward the at least one network packet in accordance with the policy.

Socket transferring for HPC networks using kernel tracing

A computer-implemented method for building socket transferring between containers in cloud-native environments by using kernel tracing techniques is provided including probing a connection-relevant system call event by using an eBPF to collect and filter data at a router, creating a mirror call at a host namespace with a dummy server and dummy client by creating the dummy server with mirror listening parameters, sending a server host address mapping to overlay the server host address to the client coordinator in an overlay process, and creating and connecting the dummy client to return a client host address to the server coordinator. The method further includes transferring mirror connections to the overlay process via a forwarder by temporary namespaces entering and injecting socket system calls and probing a transfer call event to map an overlay socket with a transferred dummy socket to activate duplication when the overlay socket is not locked.

Automated Content Transport Security

A content transport security system includes a computing platform having processing hardware and a memory storing software code and a database including one or more business rule(s). The processing hardware executes the software code to intercept a content file including a content asset, during a file transfer of the content file between a client device and a destination device, determine an authorization status of the destination device, and decrypt the content file, using a decryption key corresponding to an encryption key available to the client device. The processing hardware further executes the software code to search the content asset for a forensic identifier, assign a classification to the file transfer, based on the authorization status and a result of the searching, the classification being one of allowable, forbidden, or suspicious, and allow or block the file transfer to the destination device, based on the classification and the business rule(s).

Judgment Method For Edge Node Computing Result Trustworthiness Based On Trust Evaluation

The present invention relates to a judgment method for edge node computing result trustworthiness based on trust evaluation, and belongs to the technical field of data processing. By means of the present invention, a security mechanism for trustworthiness of a computing result output by an industrial edge node is guaranteed, the industrial edge node is prevented from outputting error data, and attacks of false data of malicious edge nodes are resisted, it is guaranteed that trustworthy computing results not be tampered are input in the industrial cloud, and a site device is made to receive correct computing results rather than malicious or meaningless messages, thereby improving efficiency and security of industrial production.

Information processing device, information processing method, and non-transitory storage medium storing information processing program

An information processing device performs an operation of a delivery service in which a vehicle cabin including a trunk of a vehicle used by a requester is designated as a delivery destination of luggage, or assists in the operation. The information processing device includes a vehicle position information acquisition unit configured to acquire position information of the vehicle, a requester position information acquisition unit configured to acquire position information of a mobile terminal carried by a requester, and a delivery countermeasure decision unit configured to decide a procedure regarding delivery work of the luggage based on the position information of the vehicle and the position information of the mobile terminal carried by the requester when the vehicle is parked.

SYSTEM FOR PERFORMING DYNAMIC MONITORING AND PRIORITIZATION OF DATA PACKETS

Embodiments of the present invention provide a system for dynamically monitoring and filtering data packets associated with accessing one or more entity resources. The system is configured for identifying a data packet in a network comprising at least a first data unit and a second data unit, determining that the first data unit and the second data unit of the data packet are attempting to access an entity resource, determining that first data associated with the first data unit and second data associated with the second data unit cannot access the entity resource at a same instance based on a first signature bit associated with the first data unit and a second signature bit associated with the second data unit, and attenuating the first data unit or the second data unit from the data packet based on the first signature bit and the second signature bit.

Methods and apparatus for encrypted communication

Aspects of the present disclosure relate to an apparatus comprising first interface circuitry to communicate with a first computing device and second interface circuitry to communicate with a second computing device. The first interface circuitry is configured to receive a handshake message from the first computing device. The second interface circuitry is configured to transmit the handshake message to the second computing device and to receive a handshake response message from the second computing device. The first interface circuitry is configured to transmit the handshake response message to the first computing device, whereby to establish a communication session between the first computing device and the second computing device. Apparatus comprises trusted execution environment circuitry to determine a cryptographic session key associated with said communication session, and use said session key to decrypt content of messages transmitted between the first and second computing devices via the apparatus, and analyse said decrypted content.

SYSTEM FOR PERFORMING DYNAMIC MONITORING AND FILTRATION OF DATA PACKETS

Embodiments of the present invention provide a system for dynamically monitoring and filtering data packets associated with accessing one or more entity resources. The system is configured for identifying a data packet in a network comprising at least one data unit, determining that the data packet is attempting to access an entity resource, determining if the at least one data unit of the data packet comprises a signature bit, and allowing or denying the at least one data unit in the data packet to access the entity resource based on determining if the at least one unit comprises the signature bit.