Patent classifications
H04L41/069
SYSTEMS AND METHODS FOR IDENTIFYING ACCESS ANOMALIES USING NETWORK GRAPHS
In some instances, the disclosure provides a method for identifying access anomalies using network graphs. The method comprises obtaining access data for an entity, generating a network graph baseline profile based on the plurality of data elements, generating a network graph current profile based on the plurality of data elements, generating comparison data based on comparing the plurality of baseline network graphs with the one or more current network graphs and comparing the plurality of baseline nodes and the plurality of baseline edges with the plurality of current nodes and the plurality of current edges, determining, based on the comparison data, anomaly data comprising one or more flagged network accesses to the enterprise system, and providing the anomaly data indicating the flagged network accesses to an authentication system.
SYSTEMS AND METHODS FOR IDENTIFYING ACCESS ANOMALIES USING NETWORK GRAPHS
In some instances, the disclosure provides a method for identifying access anomalies using network graphs. The method comprises obtaining access data for an entity, generating a network graph baseline profile based on the plurality of data elements, generating a network graph current profile based on the plurality of data elements, generating comparison data based on comparing the plurality of baseline network graphs with the one or more current network graphs and comparing the plurality of baseline nodes and the plurality of baseline edges with the plurality of current nodes and the plurality of current edges, determining, based on the comparison data, anomaly data comprising one or more flagged network accesses to the enterprise system, and providing the anomaly data indicating the flagged network accesses to an authentication system.
Communication Device, Surveillance Server, and Log Collection Method
It is provided a communication device which transfers a signal, comprising: an arithmetic device configured to execute predetermined processing; a storage device accessible from the arithmetic device; a log collection module configured to collect first type logs from at least one of the communication device or an equipment coupled to the communication device; an alert generation module configured to generate alert when one of the collected the first type logs satisfies a predetermined condition; and a failure cause candidate determination module configured to determine failure cause candidates in response to the generated alert, and output, to the log collection module, an additional log collection request for collecting second type logs in an additional log collection order that is set based on the determined failure cause candidates.
Communication Device, Surveillance Server, and Log Collection Method
It is provided a communication device which transfers a signal, comprising: an arithmetic device configured to execute predetermined processing; a storage device accessible from the arithmetic device; a log collection module configured to collect first type logs from at least one of the communication device or an equipment coupled to the communication device; an alert generation module configured to generate alert when one of the collected the first type logs satisfies a predetermined condition; and a failure cause candidate determination module configured to determine failure cause candidates in response to the generated alert, and output, to the log collection module, an additional log collection request for collecting second type logs in an additional log collection order that is set based on the determined failure cause candidates.
Systems and methods for registering computer server event notifications
A system for secure transmission of business event notifications includes a memory, at least one processor, a service gateway configured to: publish application programming interfaces (APIs) for secure transmission of business event notifications, a notification server configured to: publish APIs for secure transmission of business event notifications corresponding to the APIs published by the service gateway, obtain a new business event to report, determine a partner to receive a notification of the new business event, transmit an event notification to the partner by way of the service gateway APIs, and register the event notification in a database.
Systems and methods for registering computer server event notifications
A system for secure transmission of business event notifications includes a memory, at least one processor, a service gateway configured to: publish application programming interfaces (APIs) for secure transmission of business event notifications, a notification server configured to: publish APIs for secure transmission of business event notifications corresponding to the APIs published by the service gateway, obtain a new business event to report, determine a partner to receive a notification of the new business event, transmit an event notification to the partner by way of the service gateway APIs, and register the event notification in a database.
Creating library of interferers
A system includes a method for detecting a signal interference in a communication signal of a wireless communication system. An identified source of the signal interference is determined according to an interference profile of a plurality of interference profiles associated with an interference profile library having information that approximates characteristics of the signal interference. The signal interference of the communication signal is mitigated according to an interference parameter associated with the identified source by filtering the communication signal according to the interference parameter.
Creating library of interferers
A system includes a method for detecting a signal interference in a communication signal of a wireless communication system. An identified source of the signal interference is determined according to an interference profile of a plurality of interference profiles associated with an interference profile library having information that approximates characteristics of the signal interference. The signal interference of the communication signal is mitigated according to an interference parameter associated with the identified source by filtering the communication signal according to the interference parameter.
Proactive error capture
During operation, an electronic device may store, in memory, information associated with operation of the electronic device, such as during communication and processing of one or more packets or frames. Furthermore, an error-event monitor in the electronic device may, during a time interval, analyze at least a portion of the stored information to detect an occurrence of an error event in one or more types of error events in the electronic device. When the error event occurs during the time interval, the electronic device may perform a remedial action and may persist, in the memory, at least a second portion of the stored information associated with the error event. Otherwise, when the error event does not occur during the time interval, the electronic device may overwrite, in the memory, the stored information with additional information associated with operation of the electronic device during subsequent communicating and processing.
Proactive error capture
During operation, an electronic device may store, in memory, information associated with operation of the electronic device, such as during communication and processing of one or more packets or frames. Furthermore, an error-event monitor in the electronic device may, during a time interval, analyze at least a portion of the stored information to detect an occurrence of an error event in one or more types of error events in the electronic device. When the error event occurs during the time interval, the electronic device may perform a remedial action and may persist, in the memory, at least a second portion of the stored information associated with the error event. Otherwise, when the error event does not occur during the time interval, the electronic device may overwrite, in the memory, the stored information with additional information associated with operation of the electronic device during subsequent communicating and processing.