H04L29/04

Automated lifecycle system operations for threat mitigation
10637888 · 2020-04-28 · ·

Techniques are described for automatically performing lifecycle operations to mitigate identified threats via an intrusion detection (IDS) system and a lifecycle operations manager (LOM). In one example, a notification from an IDS is received at a LOM, the notification indicating a malicious activity associated with a particular application included in an enterprise software environment monitored by the IDS. The application can be associated with a first endpoint accessible via a navigation target, where the navigation target sends requests received at the navigation target to the first endpoint. In response to receiving the notification, automatically and without user input, the LOM executes at least one countermeasure operation including creating a new copy of the application, associating the new copy of the application with a different second endpoint, and updating the navigation target to cause the navigation target to send requests to the new copy of the application at the second endpoint.

Lightweight authentication protocol using device tokens

A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.

Adaptive deployment of applications for mobile devices

A method of installing an application on a mobile user device is disclosed. A request for the application is received. Information is received related to the mobile user device on which the application is to be installed. A version of an application is determined to send in response to the request for the application and the information related to the mobile user device. The application version is sent to the mobile user device. Information is received related to the performance of the application version. Adapted application determination information is stored related to at least a portion of the received information.

Method and apparatus to efficiently support group call confirmation

A method in a call information server for a two-way radio system includes accessing, by the server, group list information associating the plurality of subscriber units with one or more groups; receiving, at the server, updates related to presence information, availability information, and the group list information; and confirming, by the server, for each particular subscriber unit indicated in a particular group list as forming a particular group, the particular subscriber unit's participation in a particular group call to the particular group, as a function of the presence information, the availability information, and the group list information. A call information server and a two-way radio system are also disclosed.

System for supplying power to at least one power distribution and data hub using a portable battery pack

A system for supplying power to at least one power distribution and data hub using a portable battery pack including a battery enclosed by a wearable and replaceable pouch or skin is disclosed, wherein the pouch or skin can be provided in different colors and/or patterns. Further, the pouch or skin can be MOLLE-compatible. The battery comprises a battery element housed between a battery cover and a back plate, wherein the battery element, battery cover, and back plate have a slight curvature or contour. Further, the battery comprises flexible leads.

Electronic device and decoding program

The present invention provides an electronic device that decodes, through simple procedures, content encoded within a preset time period. The electronic device comprises: a tuner 1, a CAS (Conditional Access System) client 2, and a renderer 3. The CAS client 2 comprises: a control unit 21, a timing unit 22, and a decryption key generating unit 23. The timing unit 22 and the decryption key generating unit 23 are disposed in the CAS client 2; as a result, a preview operation can be easily performed without sending elapsed time information from the renderer 3 to the CAS client 2.

Data management for a multi-tenant identity cloud service

Cloud based identity management is provided by receiving a request from an application by a web gate for a resource, where the request includes an operation on a resource type out of a plurality of resource types and the request specifies a tenant out of a plurality of tenants. Embodiments access a microservice based on the request, resolve the resource type, and validate that the operation is supported by the resource type based on metadata. Embodiments get a data provider associated with the tenant, call the data provider to perform the operation, and then return the resource.

Neighbor establishment method and system, and device

A method for establishing a neighbor relationship, where corresponding authentication information is added to packets that are sent from a first network device and a second network device to each other. The first network device sends a hello packet to the second network device. The second network device receives the hello packet, performs authentication, and responds to the hello packet using an extended unidirectional link (UDL) link state packet (LSP) when the authentication succeeds. The first network device receives the extended UDL LSP, and performs authentication. When an authentication result includes that both the first network device and the second network device enable authentication and the authentication succeeds, a neighbor relationship between the first network device and the second network device may be established.

Transmission apparatus, transmission method, reception apparatus, and reception method
10440424 · 2019-10-08 · ·

Connection with an apparatus with a lower standard is easily performed. A digital signal to which coding has been performed is transmitted to an external device by a differential signal through a plurality of channels via a transmission path. In this case, a digital signal to which first coding has been performed and from which clock extraction is not available is transmitted through a part of the plurality of channels, and a digital signal to which second coding has been performed and from which clock extraction is available is transmitted through the other channels of the plurality of channels. A reception side processes the digital signal received through the plurality of channels on the basis of the clock extracted from the digital signal received through any one of other channels.

VISIBLE INDICATION OF A PORT AS CONFIGURED TO MANAGEMENT FUNCTIONALITY

Examples herein disclose an apparatus. The apparatus includes a network interface controller (NIC) port to be dedicated to a management functionality of a server. The apparatus also includes a light emitting diode (LED), coupled to the NIC port, to provide a visible indication that the NIC port is dedicated to the management functionality of the server.