H04L29/06

APPARATUS ADAPTED FOR MAINTAINING RECEIVING DATA QUALITY AND METHOD FOR RECEIVING DATA
20180007113 · 2018-01-04 ·

A communication device is described comprising a media output unit, a receiver configured to receive a packet of a sequence of packets, the packet comprising a compressed header and media payload and a processor configured to detect whether decompression of the compressed header is prevented, and, if decompression of the compressed header is prevented, to determine a sequence number of the media payload, extract the media payload from the packet and forward the media payload and an indication of the sequence number to the media output unit.

PRIVATE CLOUD CONTROL
20180007058 · 2018-01-04 · ·

Management of IoT devices through a private cloud. An IoT device is coupled to a gateway. A request from the IoT device to connect to a private cloud, wherein the private cloud is used to manage IoT devices, is received at a private cloud control center agent. An identification of the IoT device is determined. The IoT device is onboarded, using the identification, for management through the private cloud. A device profile of the IoT device is generated. The flow of data to and from the IoT device is regulated through application of IoT rules of an IoT firewall according to the device profile of the IoT device.

SESSION KEY REPOSITORY

In one implementation, a system for a session key repository includes a monitor engine to monitor communication between a first computing device and a second computing device that is encrypted with a private key, an identification engine to determine a number of session keys and session IDs that correspond to the encrypted communication, a rules engine to determine a number of rules for storing and sharing the number of corresponding session keys and session IDs, a repository engine to send a portion of the number of session keys and session IDs to a network tool based on the number of rules and identification of the network tool.

ANTI-MALWARE DEVICE, ANTI-MALWARE SYSTEM, ANTI-MALWARE METHOD, AND RECORDING MEDIUM IN WHICH ANTI-MALWARE PROGRAM IS STORED
20180004939 · 2018-01-04 · ·

An anti-malware device 50 includes: a risk information storage unit 51 in which risk information 510 is stored, in which there are associated a value indicating an attribution of an information processing device 60 for executing software 600, a value indicating an attribution of the software 600, and a value that indicates the degree of risk when the software 600 is executed; a subject attribution collection unit 53 for collecting the value indicating the attribution of the information processing device 60; an object attribution collection unit 54 for collecting the value indicating the attribution of the software 600; and a determination unit 55 for determining that the software 600 is malware when the value indicating the degree of risk obtained by comparing the risk information 510 and the values collected by the subject attribution collection unit 53 and object attribution collection unit 54 satisfies a criterion.

COLLABORATIVE INVESTIGATION OF SECURITY INDICATORS
20180007071 · 2018-01-04 ·

Examples relate to collaborative investigation of security indicators. The examples disclosed herein enable presenting, via a user interface, community-based threat information associated with a security indicator to a user. The community-based threat information may comprise investigation results that are obtained from a community of users for the security indicator, and an indicator score that is determined based on the investigation results. The examples further enable obtaining an investigation result from the user and updating the indicator score based on the investigation result.

MALWARE DETECTION USING INTERNAL AND/OR EXTERNAL MALWARE DETECTION OPERATIONS
20180007064 · 2018-01-04 ·

A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The system may perform the internal operation by modifying an environment, executing on a particular device, to form a modified environment. The system may perform the external operation by performing a communication from the particular device. The system may monitor the modified environment for a first behavior indicative of the malware infection, and may monitor a result of performing the communication for a second behavior indicative of the malware infection. The system may detect that the first or second behavior has occurred. The system may provide a notification that the client device is infected with malware based on detecting that the first or second behavior has occurred. The notification may cause one or more network devices to block network traffic to or from the client device.

MONITORING DYNAMIC DEVICE CONFIGURATION PROTOCOL OFFERS TO DETERMINE ANOMALY
20180007075 · 2018-01-04 ·

Example embodiments disclosed herein relate to monitoring Dynamic Device Configuration Protocol offers via a control plane. In one example, an address range or multiple address ranges for sources of the Dynamic Device Configuration Protocol offers can be tracked. In this example, an anomaly can be determined based on one of the Dynamic Device Configuration Protocol offers and the address range(s).

TRANSMISSION APPARATUS, TRANSMISSION METHOD, RECEPTION APPARATUS, AND RECEPTION METHOD
20180007406 · 2018-01-04 · ·

Simplifying subtitle display processing in a variable speed reproduction mode on the receiving side is intended.

A video stream formed with a video packet having coded image data in a payload is generated. A subtitle stream formed with a subtitle packet having subtitle information in a payload is generated. A multiplexed stream including the video stream and the subtitle stream is generated and transmitted. In generating the multiplexed stream, the subtitle packet is arranged at a random access position.

REALM TRANSLATION IN AN IMS NETWORK
20180007533 · 2018-01-04 ·

Various embodiments of the present technology allow multi-realm support at US-CSCF to IMS by the same I/S-CSCF nodes. Some embodiments allow for a registration message to be received from an IMS client. The registration message can be used to establish, through an Internet Protocol Multimedia Subsystem (IMS) core network, a service between a first endpoint associated with a first realm and a second endpoint associated with a second, different realm. The registration message can be translated so that the second endpoint believes the first endpoint is associated with the second realm before being transmitted to the second endpoint. Upon receiving a successful IMS registration message from the IMS core network, a binding can be created between the first endpoint and the second endpoint.

PERIMETER ENCRYPTION
20180007014 · 2018-01-04 ·

Encryption keys for an enterprise are stored at a perimeter device such as a gateway, and rules are applied at the network perimeter to control whether and how these keys are used for cryptographic processing of communications passing through the perimeter device. The encrypted status of communications, e.g. whether and how files are encrypted with the encryption keys, may also be used to assist in selecting appropriate security handling and routing of the communications.