Methods and Apparatus for Secure Device Pairing for Secure Network Communication Including Cybersecurity

    公开(公告)号:US20190097809A1

    公开(公告)日:2019-03-28

    申请号:US15713463

    申请日:2017-09-22

    Abstract: In one illustrative example, a network cybersecurity procedure may be employed with use of at least one unmanned aerial vehicle (UAV), where the UAV includes an intermediary pairing device for providing a temporary connection between a first network (e.g. a private LAN) and a second network (e.g. the Internet). The network cybersecurity procedure may involve deploying the UAV in proximity to the first network, such that the intermediary pairing device pairs with a first pairing device via a first transceiver and with a second pairing device via a second transceiver. A temporary connection is established between the first network connected via the first pairing device and the second network connected via the second pairing device. Data is communicated between a first device (e.g. IoT device) or server of the first network and a second device or server of the second network over the temporary connection. During this time, the intermediary pairing device executes a cybersecurity service function. Once completed, the UAV may be withdrawn out of proximity of the first network. One or more features of the cybersecurity service function may be updated and the UAV redeployed. Multimodal data fusion techniques with use of a plurality of network and device sensors may be employed for device verification and/or anomaly detection.

    Performing transactions between application containers

    公开(公告)号:US10067810B2

    公开(公告)日:2018-09-04

    申请号:US15222890

    申请日:2016-07-28

    Abstract: Various implementations disclosed herein provide a method for performing one or more transactions between application containers. In various implementations, the method includes transmitting a key request to a first network node within a cluster of network nodes that are configured to generate and maintain a distributed ledger. In some implementations, the key request indicates that the requested key is for one or more transactions between a first application container and a second application container. In various implementations, the method includes receiving a key in response to transmitting the key request. In some implementations, the key is valid for the one or more transactions between the first application container and the second application container. In various implementations, the method includes synthesizing, at the first application container, transaction data with the key. In various implementations, the method includes transmitting, by the first application container, the transaction data to the second application container.

    Search Engine for Sensors
    19.
    发明申请

    公开(公告)号:US20170337285A1

    公开(公告)日:2017-11-23

    申请号:US15160588

    申请日:2016-05-20

    CPC classification number: G06F16/951

    Abstract: Various implementations disclosed herein provide a search engine that receives a search request from a sensor gateway, and provides search results in return. In various implementations, the search request includes a first set of measurements captured by a first sensor, a first measurement from the first set of measurements is outside a defined range. In various implementations, the search engine determines a first feature vector based on the first set of measurements, and identifies a second feature vector that indicates a second set of measurements within a degree of similarity to the first set of measurements. In some implementations, the second set of measurements are captured by a second sensor. In various implementations, the search engine determines a search result based on the second feature vector, and transmits the search result. In some implementations, the search result indicates one or more instructions executable by the first sensor.

Patent Agency Ranking