H04L63/0876

CLUSTERING OF VIRTUAL PRIVATE NETWORK SERVERS
20230052050 · 2023-02-16 · ·

A method in a first virtual private network (VPN) server associated with clustering a plurality of VPN servers in a clustered network, the method including receiving, from a VPN service provider (VSP) control infrastructure, VPN data associated with a user device having an established VPN connection with the clustered network; and communicating, utilizing key information, the VPN data with the user device during the established VPN connection. Various other aspects are contemplated.

SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
20230052965 · 2023-02-16 ·

Some embodiments may provide systems, methods and computer program code to method to facilitate an interaction involving a user which include determining that a user authentication is required to complete the interaction, identifying at least a first verified device associated with the user, and transmitting an authentication message to the at least first verified device.

BOOTSTRAP METHOD OF ELECTRIC VEHICLE CHARGING STATION
20230052150 · 2023-02-16 ·

Provided is a bootstrap method for registering a charging station (CS), which was in an offline state, to an electric vehicle charging station management system (CSMS) and operating same. The bootstrap method comprises the steps of: storing at least partial bootstrap information in a CS so as to configure bootstrap information; connecting the CS to a CSMS by setting a security channel between the CS and the CSMS for maintaining registration information about the CS; and registering the CS to the CSMS.

COMPUTER-IMPLEMENTED USER IDENTITY VERIFICATION METHOD
20230050280 · 2023-02-16 ·

A computer-implemented method of verifying a user's identity comprising the steps of receiving biometric user data, personalized user data, and unique phone data of a verifying user from the verifying user's electronic computing device 102, compiling the biometric user data, personalized user data, and unique phone data of a verifying user into a single user identity data file, encrypting the single user identity data file and generating a data decryption key, and segregating the single user identity data file into a plurality of encrypted segregated user identity data files each independently stored on a first administrator server and a second administrator server, wherein the plurality of encrypted segregated user identity data files may only be aggregated and decrypted upon providing secondary biometric user data, personalized user data, and unique phone data which matches the original biometric user data, personalized user data, and unique phone data of the verifying user.

System and Method for Authenticating Client Devices Communicating with an Enterprise System

A system and method are provided for authenticating client devices communicating with an enterprise system. The method includes providing a policy enforcement interceptor to intercept API calls and enabling the policy enforcement interceptor to communicate with a policy information point to query the at least one endpoint for entitlements associated with an account. The method also includes intercepting an API call to the application API, communicating with the policy information point to determine entitlements associated with the account by having the policy information point query an entitlements database and, when the entitlements returned to the policy enforcement interceptor are valid, invoking a policy decision point to validate the client device. The method also includes, when the client device is validated, permitting invocation of the API. The method also includes providing an API response to the client device to permit access to the application via the API.

IoT MALWARE CLASSIFICATION AT A NETWORK DEVICE

Some examples relate to classifying IoT malware at a network device. An example includes receiving, by a network device, network traffic from an Internet of Things (IoT) device. Network device may analyze network parameters from the network traffic with a machine learning model. In response to analyzing, network device may classify the network traffic into a category of malware activity. Network device may determine an effectiveness of network traffic classification by measuring a deviation of the network parameters from previously trained network parameters that were used for training the machine learning model. In response to a determination that the deviation of the network parameters from the trained network parameters is more than a pre-defined threshold, network device may generate an alert highlighting the deviation, which allows a user to perform a remedial action pertaining to the IoT device.

Secure communication with individual edge devices of remote networks that use local security credentials
11582027 · 2023-02-14 · ·

A device management service of a provider network maintain a device repository that is accessible to a remote managed network. The device management service assigns different service credentials for different edge devices indicated by the device repository. For a particular edge device, the device management service provides, based on the service credentials assigned for the edge device, secure transmission of a message between the device management service and a network manager of the managed network. The network manager of the managed network provides secure transmission of the message between the network manager and the edge device based on local credentials assigned for the edge device.

Detecting a landing page that violates an online system policy based on a structural similarity between the landing page and a web page violating the policy

An online system receives a content item including a link to a landing page and determines a likelihood the landing page violates an online system policy based on a structural similarity between the landing page and a web page violating the policy. To determine the likelihood, the online system determines a hierarchical structure associated with the web page violating the policy and an additional hierarchical structure associated with the landing page. The hierarchical structure represents a structure of at least a portion of the web page and the additional hierarchical structure represents a structure of a corresponding portion of the landing page. The online system compares the hierarchical structure and additional hierarchical structure. Based on the comparison, the online system computes a measure of dissimilarity between the hierarchical structure and additional hierarchical structure and determines a likelihood the landing page violates the policy based on the measure of dissimilarity.

Configuration of a virtual private network server
11582197 · 2023-02-14 · ·

A method including retrieving, by a processor associated with a virtual private network (VPN) server, an initial operating system stored in a non-volatile memory, the initial operating system being associated with the VPN server providing VPN services; storing, by the processor, the initial operating system in a volatile memory; executing, by the processor, the initial operating system from the volatile memory to obtain a VPN operating system; storing, by the processor, the VPN operating system in the volatile memory; and executing, by the processor, the VPN operating system from the volatile memory to provide the VPN services. Various other aspects are contemplated.

Authority transfer system, server and method of controlling the server, and storage medium
11582232 · 2023-02-14 · ·

An authority transfer system comprising a client, a resource server, a server that receives, from the client, an authorization request requesting permission to access to a resource managed by the resource server, and a user terminal possessed by an owner of the resource is provided. The server registers a first user terminal in accordance with a registration request of the first user terminal being received from the first user terminal, and determines whether or not a registered second user terminal can be deregistered in accordance with a registration cancellation request being received from the first user terminal, and if it is determined that the second user terminal can be deregistered, authenticates the first user terminal or the second user terminal, and deregisters the second user terminal in accordance with the authentication.