Patent classifications
H04L29/06
STREAMING MEDIA FILE PROCESSING METHOD AND APPARATUS
A media file processing method, comprising: receiving a request for downloading a target streaming media file; obtaining, in response to the request, a uniform resource locator (URL) of the target streaming media file; determining, according to first pattern information of a header of the URL, whether the target streaming media file is a streaming media file of a Microsoft Media Server (MMS) Protocol; in accordance with a determination that the target streaming media file is a streaming media file of the MMS Protocol, determining, according to a preset correspondence between URL pattern information and a plurality of network communication protocols, a first network communication protocol of the plurality of network communication protocols, that corresponds to the first pattern information of the header of the URL as a target network communication protocol; and obtaining the target streaming media file from a target server by using the target network communication protocol.
SYSTEMS AND METHODS FOR A NODE SUPPORTING NETWORK CODED MESH NETWORKING IN A NETWORK OF MOVING THINGS
Communication network architectures, systems, and methods supporting network coding of packet data in a network of moving things. Through the use of network coding, a network of moving things provides redundancy and improved network capacity and reliability.
IDENTIFYING AND REMEDIATING MALWARE-COMPROMISED DEVICES
Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.
INFORMATION PUSHING METHOD AND APPARATUS
Embodiments of the present disclosure disclose an information pushing method performed at a computer server, the method comprising: receiving an information retrieving request sent by a client; in response to the information retrieving request, identifying an information list and a current retrieval position of the information list; retrieving, from the information list, multiple pieces of information starting from the current retrieval position in a cyclic manner; and pushing the multiple pieces of information to the client, wherein the multiple pieces of information is presented at the client in their retrieval order.
Cloud Assisted Behavioral Automated Testing
A computer readable storage medium, system and method for improving automated testing systems to include a first and second behavioral data. The first behavioral data is collected periodically and the second behavioral data is collected in real time. The receipt of the first behavioral data and a second behavioral data are followed by the receipt of a system configuration template. A test case is updated based on the first and second behavioral data, and an automated test environment is reconfigured based on the first behavioral data, second behavioral data, and the system configuration template. The test executes in the automated test environment producing a test result.
Ransomware Protection For Cloud File Storage
A cloud storage server-based approach allows detection of ransomware activity in cloud storage systems caused by ransomware infections on an endpoint device. A heuristic or rule-based technique is employed for recognizing sequences of file operations that may indicate ransomware activity. In some embodiments, users may be offered an opportunity to approve or disapprove of the possible ransomware activity. In others, cloud system file activity may be suspended or halted for the affected user upon recognition of possible ransomware actions. Enhanced recovery of files affected prior to recognition of the ransomware activity may be performed in some embodiments.
HARDWARE ACCELERATION ARCHITECTURE FOR SIGNATURE MATCHING APPLICATIONS FOR DEEP PACKET INSPECTION
A signature matching hardware accelerator system comprising one or more hardware accelerator circuits, wherein each of the hardware accelerator circuit utilizes a compressed deterministic finite automata (DFA) comprising a state table representing a database of digital signatures defined by a plurality of states and a plurality of characters, wherein the plurality of states are divided into groups, each group comprising a leader state having a plurality of leader state transitions and one or more member states, each having a plurality of member state transitions is disclosed. The hardware accelerator circuit comprises a memory circuit configured to store the leader state transitions within each group of the compressed DFA, only the member state transitions that are different from the leader state transitions for a respective character within each group of the compressed DFA and a plurality of member transition bitmasks associated respectively with the plurality of member state transitions.
Multi-Factor Authentication to Access Services
A technology is provided for using a multi-factor authentication process to access services in a computing service environment. One or more policies can be defined for allowing access to one or more services and/or resources associated with a service provider environment according to an authenticated identity. A device, detected by a voice-capturing endpoint within a defined geographical location, may be authenticated according to a unique identification (ID). Voice data received from the voice-capturing endpoint can be authenticated. The authenticated identity can be established according to the authenticated device and the authenticated voice data. A command, received via a voice command from the voice-capturing endpoint, may be issued with the authenticated identity to access the one or more services and/or resources associated with the service provider environment according to the plurality of policies.
WAKE UP RADIO DEVICE, CIRCUIT CONFIGURATION, AND METHOD
According to the present disclosure, a communication device configured to power on a main receiver to receive data from a network includes: a low power receiver configured to receive a wake up packet, including a preamble, from the network and oversample the wake up packet; a circuit arrangement including: a correlator configured to correlate the oversampled portion of the preamble; a delay and adder configured to take an output of the correlator, delay the output of the correlator, and add the output of the correlator back onto itself to produce a delay output; a peak detector configured to detect a peak pattern in the delay output; a demodulator configured to calculate a decoding threshold value to produce a demodulated data; and a packet parser configured to check the demodulated data for a data set in order to selectively output a nonzero signal to power on the main receiver.
Monitoring Traffic in a Computer Network
A computer-implemented method, computerized apparatus and computer program product for monitoring traffic in a computer network. The computer network comprises a plurality of devices configured to apply a transformation function on a target port identifier of a requested transmission by an application program executing thereon and direct the transmission to a different target port per the scrambled identifier thereby obtained. The transformation function depends on at least one parameter shared among the plurality of devices and applying thereof is conditioned on the application program requesting transmission being listed in a list of authorized application programs. Attempts to access invalid ports as defined by the transformation function are identified and an action for mitigating a security threat ascribed thereto is provided.