Patent classifications
H04L63/302
CLASSIFICATION AND INDICATING OF EVENTS ON AN EDGE DEVICE
Described herein are techniques that may be used to identify and indicating events within a media content file. Such techniques may comprise receiving a media content having been collected by a media collection device as well as receiving sensor data corresponding to the media content. The techniques may further comprise determining, based on the received sensor data, at least one event to be associated with the media content, generating at least one event indicator to be associated with the media content based on the determined at least one event, and providing the media content and the at least one event indicator to a recipient computing device.
Triage via machine learning of individuals associated with an event
An approach for triaging injured individuals. The system receives data from one or more mobile computing devices, wherein data comprises a first location associated with an event, video data and audio data and the system analyze the received data. And the system matches one or more medical personnel with one or more injured individual of the event and generates an output list, wherein the output list comprises a second location to transport the injured individual. Furthermore, the system notifies one or more transportation personnel of the second location for transport and notifies one or more personnel at the second location of the arrival of the injured individual.
MANAGING SERVICE INTERRUPTS IN LAWFUL INTERCEPTION
A service interruption manager function, SIMF, receives information that indicates that lawful interception, LI, service interruption associated with an LI task has occurred. Based on the received information, a determination is made of a status regarding the LI service interruption associated with the LI task, for example a determination whether the LI service interruption associated with the LI task has a current status that is any of: terminated, ongoing or initiated. A message is then transmitted, to a delivery function, DF, via an HI2 interface, the message comprising at least the determined status regarding the LI service interruption.
Systems and methods for cloud-based federated records retention compliance orchestration, validation and enforcement
Through a cloud-based centralized user interface, a federated compliance system presents a policy of interest and representations of disparate systems that match the policy of interest to a user. The disparate systems, which operate in a distributed network computing environment, can include cloud-based repositories and off-cloud repositories. The federated compliance system can pull the cloud-based repositories through a cloud orchestrator and the off-cloud repositories through an off-cloud orchestrator over a secure tunnel. The federated compliance system utilizes user-provided information on the policy of interest to determine various categories of attributes from different repository schemas employed by the disparate systems. A federated retention policy mapper, implemented as a compliance service, maps the attributes to a common schema, creates a federated retention policy, and stores it in a federated space in the distributed network computing environment. A policy change can be automatically propagated across the disparate systems using the federated retention policy.
BROWSER EXTENSION FOR CYBERSECURITY THREAT INTELLIGENCE AND RESPONSE
Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: receiving, in a sandbox of a browser by a browser extension, a selection of at least one particular indicator of compromise of the at least one of the indicator of compromise of at least scanned part of a web page; displaying one or more orchestrated responses; receiving a selection of at least one particular orchestrated response of the one or more orchestrated responses; transmitting the selected at least one particular orchestrated response to the cloud-based enrichment and analysis of cybersecurity threat intelligence system; receiving a response including a result of the at least one particular orchestrated response; and displaying the result of the at least one particular orchestrated response.
Dynamically-adaptive-resilient measured cyber performance and effects through command and control integration of full spectrum capabilities
System-of-systems architectures and methods for dynamically and adaptively managing and executing a command and control system across a global cyber enterprise are provided. The system-of-systems architecture integrates, synchronizes and executes with kinetic operations employing an adaptive and dynamic mixing and matching of capabilities for optimal effects in near real time so as to measure and maximize effects across the global cyber enterprise. The methods incorporate execution of a Cyber Operations “CyberOps” Chain of interlocking management cycles for the integration with a kinetic “Kill Chain” to optimize cyber/kinetic integration and mission outcomes. An analytical and software framework enables the on-demand formation of mission-specific dynamic cell groups from various cells stretching across the global cyber enterprise in response to ever-changing faces of cyber threats.
Management of controlled-environment facility resident image and/or background during video visitation
Information associated with a controlled-environment facility resident communications and/or data device, such as device location within the controlled-environment facility, may be used to determine whether the resident device is approved for two-way video visitation or restricted to on-way video visitation. Video visitation may be initiated and voice and video captured and streamed by a non-resident communications and/or data device, as well as voice and/or video captured and streamed by the resident device, is received by a controlled-environment facility electronic communications management system. Voice and video captured at the non-resident device is transmitted to the resident device and, if the resident device is permitted two-way video visitation, voice and video captured by the resident device is transmitted to the non-resident device, if the resident device is restricted to one-way video visitation, only voice is transmitted to the non-resident device.
Alert systems and methods for attack-related events
Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and events. The server builds an attack tree based on attack detection rules. The server monitors large-scale distributed systems and receives alerts from various devices. The server determines attacks using the attack tree while excluding false alarms. The server determines impact and risk metrics for attacks in real-time, and calculates an impact score for each attack. The server ranks and prioritizes the attacks based on the impact scores. The server also generates real-time reports. By consider the mission and system specific context in the analysis alert information, the server gives insight into the overall context of problems and potential solutions, improving decision-making. By showing the impacts of alters, the server allows security personnel to prioritize responses and focus on highest value defense activities.
Automated surveillance system
An internet of things is disclosed, comprising plural SDR receivers and possibly a centralised system, where one or more of the receivers may be mobile. The internet of things thus allows for a very large proportion of RF signals present within a city, for example, to be monitored and analysed for the purpose of identifying, tracking and/or preventing criminal behaviour. The receivers may be equipped with secure SDRs for increased security and privacy and the system preferably includes artificial intelligence using machine learning technology, for increased adaptability among others. The system is flexible due to the programmability of the SDRs.
Managing An Unmanned Aerial Vehicle Identity
In embodiments of systems and methods for managing an unmanned aerial vehicle (UAV) identity, a processor of a network computing device may generate an anonymity token that is associated with a digital certificate of a UAV, provide the anonymity token to the UAV for use in operations, receive a request to authenticate the UAV, wherein the request includes the anonymity token, determine whether the anonymity token included in the request is associated with the digital certificate, and send an indication that the UAV is authenticated responsive to the request in response to determining that the anonymity token included in the request is associated with the digital certificate.