G06F7/04

Generating and continuously maintaining a record of data processing activity for a computer-implemented system

Technologies related to generating and continuously maintaining a record of data processing activities are described herein, where the processing record is generated on behalf of an enterprise that operates an enterprise computing system. The processing record includes numerous fields related to the processing of data by the enterprise computing system, and such fields are automatically generated based upon information pertaining to the enterprise computing system that is acquired from several different sources.

Method for controlling access to computer resources utilizing user device fingerprints
11539697 · 2022-12-27 · ·

A method of determining whether to provide user access to a computer resource may comprise receiving a request for the computer resource from a user device; obtaining, from the user device, an encrypted persistent cookie responsive to determining that the encrypted persistent cookie is present on the user device, wherein the encrypted persistent cookie comprises a fingerprint signature field comprising a previous device fingerprint encoded into the fingerprint signature field as part of a previous session; obtaining, from the user device, an obtained device fingerprint of the user device; comparing the obtained device fingerprint with the previous device fingerprint of the fingerprint signature field to derive a fingerprint variance representing a difference between the obtained device fingerprint and the previous device fingerprint of the fingerprint signature field; and processing the request for the computer resource based on the fingerprint variance.

Service definition for private networks based on enhanced PLMN identifiers

A method for performing service authorization for private networks based on an enhanced PLMN identifier. The method includes receiving an attach request from a user equipment device (UE) via a private network, where the attach request includes an international mobile subscriber identity value (IMSI). The method further includes determining, based on the IMSI, an organization identifier and a token associated with the private network, where the token is included in an enhanced PLMN for granting the UE access to resources in the private network. The method further includes sending the token to the UE and a network proxy within the private network.

Electronic device for processing video signal and computer readable recording medium

An electronic device according to various embodiments of the present invention comprises: an infrared filter for passing light in an infrared wavelength band; an image sensor for converting the received light into a video signal and outputting the video signal; an infrared light-emitting unit for emitting the light in the infrared wavelength band; and a processor. The processor can execute a first application, confirm a security level of the first application, and authorize the first application with an authority for controlling at least one of the image sensor, the infrared filter and the infrared light-emitting unit according to the confirmed security level of the first application.

Local mapped accounts in virtual desktops

Aspects described herein relate to methods, devices and systems that allow for a client device, as part of a remote access or cloud-based network environment, to map external user identities to desktops and applications. Local user accounts can be dynamically generated on a virtual delivery agent. A mapping of the local user account to an external identity can be secured using signed tokens and maintained by a broker machine that allocates resources for the deployment of particular applications to the client device from the virtual delivery agent. This allows for the removal of any dependency on an Active Directory for maintaining user identities or federated sign-on services, greatly simplifying the management of user identities within the system and allowing for greater compatibility across client devices.

System and methods for machine learning training data selection

A system and method are disclosed for running a plurality of simulation tests on a first machine learning model to obtain a plurality of results that are each produced during a respective simulation test, the first machine learning model gradually trained using first training data historically collected over a period of time, the first training data comprising a plurality of first training data sets each including a subset of first training inputs and first target outputs associated with one of a plurality of points in time during the period of time, determining a simulation test of the plurality of simulation tests at which corresponding results of the first machine learning model satisfy a threshold condition, wherein the threshold condition is based on historical data at a first point in time of the plurality of points in time, identifying a first training data set of the plurality of first training data sets on which the first machine learning model used during the determined simulation test was trained, wherein the first training data set on which the first machine learning model used during the determined simulation test was trained is associated with one or more second points in time that precede the first point in time, and determining a subset of target outputs from the identified first training data set on which the first machine learning model used during the determined simulation test was trained, the determined subset of first target outputs to define an amount of second training data to be sufficient to train a second machine learning model.

Transferring video encoding or decoding devices across regions of a cloud provider network

Techniques are described enabling users to transfer the association of a cloud-managed video encoding or decoding device from one region of a cloud provider network to another. A video processing service of a cloud provider network enables users to purchase video encoding or decoding devices that can be used to encode and reliably transfer video content to the video processing service from locations of the users' choice. The video processing service receives a request to transfer the association of a video encoding or decoding device from one region of the cloud provider to another and the video processing service executes workflows that enable the association of a video encoding or decoding device to be transferred to one region from another.

System white box device utilized in conjunction with intelligent terminal

A system white box device utilized in conjunction with an intelligent terminal is provided. The system white box device includes a controller, a memory, and an SIM unit. The controller provides support for management of the memory and call of the SIM unit. The memory provides a physical medium for storing data and an application of the intelligent terminal. The SIM unit provides security support for operation of the application and the system of the intelligent terminal.

Application white box device utilized in conjunction with intelligent terminal

An application white box device utilized in conjunction with an intelligent terminal is provided. The application white box device includes a controller, a memory, and a SIM unit. The controller provides support for management of the memory and call of the SIM unit. The memory provides a physical medium for storing data and an application of the intelligent terminal. The SIM unit provides support for encryption and security authentication of the data and the application access of the intelligent terminal.

Methods and systems for providing a customized network
11503029 · 2022-11-15 · ·

In some embodiments, a system is a reverse-proxying HTTP cache server that handles user session management and dynamically forwards requests to origin/backend servers based on the content being requested. It caches data from origin servers in order to reduce the stress placed on each origin server. It uses encrypted authorization tokens to handle session management and is able to modify origin data on-the-fly in order to inject per-client authorization information into the data stream. It can enforce maximum concurrent session limits, user bans, limit exemptions, and time-limited live content previews.