NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD

    公开(公告)号:US20230283611A1

    公开(公告)日:2023-09-07

    申请号:US18315905

    申请日:2023-05-11

    CPC classification number: H04L63/102 G06F21/6263 G06F16/9535

    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.

    SYNTHETIC BIOMETRICS FOR USER PRIVACY
    122.
    发明公开

    公开(公告)号:US20230267192A1

    公开(公告)日:2023-08-24

    申请号:US17651971

    申请日:2022-02-22

    CPC classification number: G06F21/45 H04L63/0861 G06F2221/2115

    Abstract: A synthetic biometric signature is generated for a user for each of a plurality of third parties, and the synthetic biometric signatures are used to interact with the respective third parties such that each of the third parties sees a different synthetic biometric signature for the user. The synthetic biometric signatures comprise a user's actual biometric data altered by a change vector, an artificial biometric signature, and/or artificial biometric characteristics, or by other artificial components. The synthetic biometric signature can be changed if the synthetic biometric signature is compromised, or the user wishes to reset their user relationship with a particular third-party.

    Data privacy policy based network resource access controls

    公开(公告)号:US11625494B2

    公开(公告)日:2023-04-11

    申请号:US16784222

    申请日:2020-02-06

    Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.

    Computing device use restriction system

    公开(公告)号:US11568024B2

    公开(公告)日:2023-01-31

    申请号:US17228064

    申请日:2021-04-12

    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.

    MANAGING NETWORK LATENCY USING BUFFER FILL CONTROL

    公开(公告)号:US20230012394A1

    公开(公告)日:2023-01-12

    申请号:US17370814

    申请日:2021-07-08

    Inventor: Michal Vaner

    Abstract: A method of managing a fill state of a buffer in an external device includes monitoring the latency of a network connection to an external device having a network buffer via a managing device. A state of fill of the network buffer is determined based on at least the monitored latency of the network connection, and the effective network speed is estimated based on the state of fill of the network buffer. One or more network traffic scheduling parameters are adjusted in response to the estimated effective network speed, such as a maximum currently usable network speed that is lower than a maximum possible speed of the network. The maximum currently usable network speed of the network connection is periodically increased if the monitored latency is in a normal state and the maximum currently usable network speed is lower than the maximum possible speed of the network.

    MESSAGING SERVER CREDENTIALS EXFILTRATION BASED MALWARE THREAT ASSESSMENT AND MITIGATION

    公开(公告)号:US20220417262A1

    公开(公告)日:2022-12-29

    申请号:US17356356

    申请日:2021-06-23

    Abstract: A method includes enabling a messaging server and providing credentials for the messaging server. A computing system is enabled and a malware application is received by the computing system. The malware application is executed by the computing system. The credentials are rendered accessible to the malware application via the computing system, and the malware application is enabled to transmit the credentials via network transmission from the computing system to a computer. An actor is enabled to access the messaging server over a network in response to the actor applying the credentials, and a first electronic message transmitted by the actor is received by the messaging server, the first electronic message including first content.

    Efficiently initializing distributed clustering on large data sets

    公开(公告)号:US11461360B2

    公开(公告)日:2022-10-04

    申请号:US16370952

    申请日:2019-03-30

    Abstract: Systems and methods capable of initializing centroids in large datasets before commencement of clustering operations. The systems and methods can utilize a random sampling window to increase the speed of centroid initialization. The systems and methods can be modified to leverage parallelism and be configured for execution on multi-node compute clusters. Optionally, the initialization systems and methods can include post-initialization centroid discarding and/or re-assignment operations that adaptively control cluster sizes.

    Reducing battery impact of network device ARP spoofing

    公开(公告)号:US11438299B2

    公开(公告)日:2022-09-06

    申请号:US16736492

    申请日:2020-01-07

    Abstract: A private network device such as a security device is inserted in a private network using ARP spoofing, which includes sending periodic ARP packets from the private network device to a router and to client devices to ensure the private network device spoofing remains intact. The private network device determines when at least one of the one or more private network devices is inactive, such as by monitoring the network for activity between the devices and a router, and suspends sending the periodic ARP packets to the client devices when they are inactive.

    Online user verification without prior knowledge of the user

    公开(公告)号:US11295118B2

    公开(公告)日:2022-04-05

    申请号:US16022400

    申请日:2018-06-28

    Inventor: Jeroen De Knijf

    Abstract: Systems and method verify a user based on facial image data, without prior information about the user. A user name and facial image of the user are received. A search query comprising the user name can be issued to one or more search engines. Images returned as a result of the search query can be filtered to determine a set of candidate images. The images in the set of candidate images can be compared to the facial image of the use to determine a probability of a match. If there is a match, the user can be considered verified.

Patent Agency Ranking