Patent classifications
H04L67/303
Systems and methods for emulating an environment created by the outputs of a plurality of devices
Systems and methods are disclosed for emulating an environment created by the outputs of a plurality of devices. The system receives device control data for a device in a first venue. The control of the outputs of said devices according to the device control data creates an environment within the first venue. The system retrieves profile data for devices within a second venue. The system associates a device in the second venue with a device from the first venue, both devices having a similar output type. The system then generates control information adapted from the associated device of the first venue for the device in the second venue. The system controls the outputs of each device in the second plurality of devices according to the generated control information to emulate the environment within the first venue in the second venue.
NETWORK SYSTEM, CLOUD CONNECTOR AND METHOD FOR IDENTIFICATION OF NETWORK DEVICES
A network system includes a first network user having a plurality of network devices, wherein the network devices have identification parameters for identification, a second network user having a cloud computing infrastructure, and a cloud connector having a first interface and a second interface. The cloud connector is connected via the first interface to the first network user and connected via the second interface to the second network user. The cloud connector executes a passive scan and an active scan of the first network user so that at least one of the network devices is identifiable by the cloud connector. A network device profile is loadable from the second network user into the cloud connector, and the active scan is executed on the basis of the network device profile being loaded into the cloud connector.
Providing content to co-located devices with enhanced presentation characteristics
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A user of an initiating device is identified. Profile information for the identified user is located. The initiating device includes a display for presenting content to the user. An indication is received from an application running on the initiating device of an intent by the user to receive a first content item on a separate but co-located presentation device having enhanced presentation characteristics for presenting content. Additional content items are selected for delivery along with the first content item. The selection includes identifying a second different content item based on the profile information for the identified user and the enhanced presentation characteristics. The first and second different content items are delivered directly to the co-located presentation device without delivering the first and second different content items to the initiating device.
Providing content to co-located devices with enhanced presentation characteristics
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A user of an initiating device is identified. Profile information for the identified user is located. The initiating device includes a display for presenting content to the user. An indication is received from an application running on the initiating device of an intent by the user to receive a first content item on a separate but co-located presentation device having enhanced presentation characteristics for presenting content. Additional content items are selected for delivery along with the first content item. The selection includes identifying a second different content item based on the profile information for the identified user and the enhanced presentation characteristics. The first and second different content items are delivered directly to the co-located presentation device without delivering the first and second different content items to the initiating device.
SECURING CONNECTIONS TO UNSECURE INTERNET RESOURCES
A computer program product having a computer readable non-transitory storage medium. The storage medium having encoded thereon a computer code for instructing at least one hardware processor to automatically: (a) intercept a plurality of data packets transported over a computer network; (b) analyze said plurality of data packets to identify at least one secure connection request to an unsecure domain hosted on at least one web server; (c) retrieve a digital security certificate for the unsecure domain from a trusted certification authority; (d) associate the digital security certificate with the unsecure domain, thereby converting the unsecure domain to a secure domain; (e) send the digital security certificate to at least one second client terminal. Thereby the computer program product facilitates a secure connection between the at least one second client terminal and the secure domain.
SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT
A method, apparatus and product for sub-networks based cyber security. One method for managing a local network, which is divided into subnets, comprises: monitoring communication traffic of devices in each of the subnets; performing anomaly detection to detect an abnormal communication of a device connected to a subnet; blocking the abnormal communication of the device; and removing the device from the subnet and connecting the device to a quarantine subnet of the local network, whereby reducing connectivity of the device with other devices connected to the local network.
EDGE PROCESSING FOR DATA TRANSMISSION
In some examples, a computing device may determine a prediction of a network outage of a network. The computing device may determine a priority of one or more data types expected to be received during the network outage. Further, the computing device may determine a latency category of the one or more data types expected to be received during the network outage. The computing device may store a data transmission rule for the one or more data types at least partially based on the priority and the latency category. The computing device may receive, from one or more data generators, during the network outage, data for transmission to the network. The computing device may transmit at least some of the received data to the network at least partially based on the data transmission rule.
Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling
Systems and methods for periodically modifying data privacy elements are provided. The systems and methods may identify a set of data privacy elements. A data privacy element can characterizes a feature of a computing device and can be detectable by a network host. A first artificial profile can be generated by modifying a first data privacy element based on an artificial profile model that defines a relationship associated with one or more constraints between the set of data privacy elements. Subsequent to generating the first artificial profile, a second artificial profile can be generated by periodically modifying a second data privacy element in accordance with the relationship defined by the artificial profile model. The computer device can be masked from being identified by the network host by sending the second artificial profile including the second data privacy element to a requested network location.
Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling
Systems and methods for periodically modifying data privacy elements are provided. The systems and methods may identify a set of data privacy elements. A data privacy element can characterizes a feature of a computing device and can be detectable by a network host. A first artificial profile can be generated by modifying a first data privacy element based on an artificial profile model that defines a relationship associated with one or more constraints between the set of data privacy elements. Subsequent to generating the first artificial profile, a second artificial profile can be generated by periodically modifying a second data privacy element in accordance with the relationship defined by the artificial profile model. The computer device can be masked from being identified by the network host by sending the second artificial profile including the second data privacy element to a requested network location.
System and method for cloud-based analytics
A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.