Patent classifications
H04L29/06
Cloud Connected Haptic Platform
A computer-based method for controlling a haptic actuator over a network is provided. The method includes, at a haptic server, receiving a selection of a haptic actuator connected to a haptic hardware support platform, receiving a selection of a haptic effect driver software package or library, receiving a selection of a haptic effect, creating a haptic command message including haptic actuator drive values, and transmitting the haptic command message to the haptic hardware support platform over the network. The haptic hardware support platform is configured to receive the haptic command message over the network, parse the haptic command message to extract the haptic actuator drive values, and apply a haptic actuator drive signal to the haptic actuator to play the selected haptic effect, the haptic actuator drive signal based on the haptic actuator drive values.
DEDICATED REMOTE CONTROL OF A PLURALITY OF MEDICAL APPARATUSES
The present invention relates to a method for contactlessly establishing a coupling between a medical apparatus (e.g., a hemodialysis apparatus or a peritoneal dialysis apparatus) and a remote control apparatus. An optical coupling signal is exchanged between the involved communication entities, in order to establish bijective, data-processing coupling between the remote control apparatus and the medical apparatus. Only after successful coupling is a remote control procedure initiated for remote control of the medical apparatus.
VIRTUAL SMART CARDS WITH AUDIT CAPABILITY
Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart cards. A remote client computer system includes a system level agent which establishes the client computer machine to the VSS as a trusted computer system. A user level agent at the client computer system responds to a request for a virtual smart card operation by causing the client computer system to obtain user authentication information, negotiate with the system level agent to obtain a cookie, and initiate a request to the VSS for the virtual smart card operation. The VSS will perform the virtual smart card operation provided that a security policy is satisfied and will communicate the results to the user level agent.
SYSTEMS AND METHODS FOR ENSURING CONTINUED ACCESS TO MEDIA OF A PLAYLIST DESPITE GEOGRAPHIC CONTENT RESTRICTIONS
Systems and methods are described herein for detecting information that indicates that a user will be traveling from a first geographic location to a second geographic location, and responsively accessing a playlist indicated by a profile of the user that indicates a plurality of streaming media that the user intends to consume. Control circuitry may then compare data corresponding to each streaming media of the plurality of streaming media to a database to determine whether each streaming media of the plurality of streaming media is accessible to the user at the second geographic location, and may determine that a subset of the plurality of media is not accessible to the user at the second geographic location. In response to determining that the subset is not accessible to the user at the second geographic location, the control circuitry may download each media of the subset.
LEADER STATE TRANSITION COMPRESSION MECHANISM TO EFFICIENTLY COMPRESS DFA BASED REGULAR EXPRESSION SIGNATURES
A signature matching hardware accelerator system comprising one or more hardware accelerator circuits, wherein each of the hardware accelerator circuit utilizes a compressed deterministic finite automata (DFA) comprising a state table representing a database of digital signatures defined by a plurality of states and a plurality of characters, wherein the plurality of states are divided into groups, each group comprising a leader state having a plurality of leader state transitions and one or more member states, each having a plurality of member state transitions is disclosed. The hardware accelerator circuit comprises a memory circuit configured to store a single occurrence of a most repeated leader state transition within each group, the unique leader state transitions comprising the leader state transitions that are different from the most repeated leader state transition within the respective group; and leader transition bitmasks associated respectively with the leader states within each group.
SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF ATTACKS ON IN-VEHICLE NETWORKS
Systems and methods for detection of attacks on a communication authentication layer of an in-vehicle network, including determining, by at least one network node, at least one attack attempt on the communication authentication layer of the in-vehicle network, wherein the determination is carried out by identifying anomalies in at least one of messages, data and metadata directed to the communication authentication layer, and selecting, by the at least one network node, a response corresponding to the determined attack attempt from at least one of modification of parameter values corresponding to a security protocol, a failsafe response, and rejection of messages identified as anomalies.
SCALABLE COMPUTER VULNERABILITY TESTING
Vulnerability testing tasks can be received and distributed, via a work scheduler, to computer test environments. Each of the test environments can have a detector computing component running in the environment. Each detector component can respond to receiving one of the tasks from the work scheduler by conducting a vulnerability test on an endpoint of a target, detecting results of the vulnerability test, generating output indicating the results of the vulnerability test, and sending the output to an output processor. The work scheduler can initiate dynamic scaling of the test environments by activating and deactivating test environments in response to determining that the test environments are overloaded or underloaded, respectively. Also an overall time-based limit on testing for a target can be enforced via the work scheduler.
CONCURRENT SERVING OF A MEDIA STREAM
Online content is served to participant devices using two or more systems. The content served by each system is not the same. Rather, the content streams coming from each system is a partial or lower-quality version of the original high-quality version of the content stream. A single one of the partial data streams can be used by the participant device to output a lower-quality version of the original content stream to the user. Alternately, the received partial content streams can be combined to output, to the user, a high-quality version of the original content stream.
DATA CENTER RESELECTION
An initial data center is selected to host the online conference. This data center can be selected based on the locations of the participants, a weighting (or ‘priority’) of the participants, or a combination of the two (e.g., locations that are weighted by the participant's priority.) Typically, the data center closest to the centroid (i.e., geometric center, or ‘center of mass’) of the participants is selected. In anticipation that participants will join and/or leaver the conference, a list is calculated that each possible change to a respective data center that will be selected if that change occurs. This list may be distributed to the data centers that, if selected, would host the online conference.
Targeted Secure Software Deployment
The techniques and systems described herein are directed to providing targeted, secure software deployment in a computing system. An identity of the computing device can be determined and verified using a trusted platform module (TPM) of the computing device, and a software update can be expressly configured to operate solely on the computing device. Further, a configuration of the computing device can be ascertained using platform configuration registers (PCRs) of the TPM to determine that the computing device has not been modified from a trusted configuration. For example, if malware or unauthorized software is operating on the computing device, the software update may be prevented from being installed. Further, the software update can be targeted for a particular computing device, such that when the software update is received at the computing device, the software update may not be duplicated and provided to an additional, unauthorized device.