H04L67/104

System and method for a media intelligence platform
11544752 · 2023-01-03 · ·

A multi-tenant media processing platform system and method. At least a first media analysis service of a plurality of media analysis services is activated for at least a portion of an active communication session of an entity in the platform system. The first activated media analysis service performs a first media analysis on media of the active communication session that is collected by the platform system. The first activated media analysis service performs the first media analysis on the collected media while the communication session is active to generate a first media analysis result. During the active communication session, at least one media analysis result is applied.

System and method for a media intelligence platform
11544752 · 2023-01-03 · ·

A multi-tenant media processing platform system and method. At least a first media analysis service of a plurality of media analysis services is activated for at least a portion of an active communication session of an entity in the platform system. The first activated media analysis service performs a first media analysis on media of the active communication session that is collected by the platform system. The first activated media analysis service performs the first media analysis on the collected media while the communication session is active to generate a first media analysis result. During the active communication session, at least one media analysis result is applied.

Information processing apparatus and method for processing information

There is provided an information processing apparatus including a processor that generates a plurality of pieces of authority information for obtaining user information classified into a plurality of categories, in which the processor generates the authority information to correspond to each of a plurality of the categories.

Threat information sharing based on blockchain

Systems and methods provide a platform for threat information sharing. A method comprises transmitting an access permission request to a blockchain network. The request asks for access to cyber threat information stored in at least one cyber threat information storage system. The information may come from a plurality of organizations. The blockchain network may include a blockchain ledger storing access control information from the plurality of organizations. Upon receipt of a reference to an access permission token generated by the blockchain network using at least one smart contract, a transaction request to the cyber threat information server may be sent. In response to the transaction request including the reference to the access permission token, the requested cyber threat information may be retrieved from the cyber threat information server.

Wireless terminal authentication
11546174 · 2023-01-03 · ·

A device for wireless terminal authentication may include at least one processor configured to receive, from a wireless terminal device, a request for user information, the request comprising a certificate corresponding to the wireless terminal device. The at least one processor may be further configured to verify the certificate based at least in part on a public key stored on the electronic device. The at least one processor may be further configured to, when the certificate is verified, determine whether the certificate indicates that the wireless terminal device is authorized to receive the requested user information. The at least one processor may be further configured to transmit, to the wireless terminal device, the requested user information when the certificate indicates that the wireless terminal device is authorized to receive the requested user information.

Wireless terminal authentication
11546174 · 2023-01-03 · ·

A device for wireless terminal authentication may include at least one processor configured to receive, from a wireless terminal device, a request for user information, the request comprising a certificate corresponding to the wireless terminal device. The at least one processor may be further configured to verify the certificate based at least in part on a public key stored on the electronic device. The at least one processor may be further configured to, when the certificate is verified, determine whether the certificate indicates that the wireless terminal device is authorized to receive the requested user information. The at least one processor may be further configured to transmit, to the wireless terminal device, the requested user information when the certificate indicates that the wireless terminal device is authorized to receive the requested user information.

Systems and methods for IT management of distributed computing resources on a peer-to-peer network
11546168 · 2023-01-03 · ·

Systems and methods for managing distributed computing resources including blockchain-based management of serverless computing and edge computing. Distributed computing resources are managed on a peer-to-peer network, and serverless functions are hosted on a distributed IT infrastructure. Developers for the serverless functions and providers of distributed IT infrastructure utilize a blockchain-based IT marketplace platform to make transactions relating to computing resource consumption.

Systems and methods for IT management of distributed computing resources on a peer-to-peer network
11546168 · 2023-01-03 · ·

Systems and methods for managing distributed computing resources including blockchain-based management of serverless computing and edge computing. Distributed computing resources are managed on a peer-to-peer network, and serverless functions are hosted on a distributed IT infrastructure. Developers for the serverless functions and providers of distributed IT infrastructure utilize a blockchain-based IT marketplace platform to make transactions relating to computing resource consumption.

Systems and methods of providing ledger as a service
11546425 · 2023-01-03 · ·

Described herein are systems and methods for a providing Ledger as a Service (LaaS). Blockchain technology helps bring potential solutions to the distributed ledger problem, with a linear record structure to record transaction history. However, there are different types of blockchain techniques (e.g., Hyperledger, Ethereum, Quorum), and users/developers need to know the explicit features of each technique and align with the required APIs. Ledger as a Service can allow users to an develop applications more efficiently, and can allow users to easily migrate applications among different blockchain techniques and platforms (e.g., between Hyperledger and Ethereum). LaaS can also allow for simplified transactions with a blockchain, and can additionally provide simplified communication between blockchains of different types.

Peer-to-Peer Media Streaming from an Edge Data Storage Device to a Browser
20220417302 · 2022-12-29 ·

Systems and methods for peer-to-peer video streaming from an edge data storage device to a browser are described. A media device, such as a surveillance video camera, may include a media server and a proxy server. The media server may send media streaming files using a first data transfer protocol to the proxy server in the media device. Using a second data transfer protocol, the proxy server on the media device may establish a secure peer-to-peer connection to another proxy server on a user device. The proxy server on the user device may provide the media streaming files to an internet browser on the user device and the internet browser may display the media from the media streaming file.