Abstract:
In accordance with an aspect of the invention, leakage prevention is implemented by: a) associating—within a network—a unique identifier with a packet transmitted by a process which has previously accessed data containing sensitive information, and b) searching a packet before it exits a network for the unique identifier. This mechanism provides a strong guarantee against leakage of sensitive data out of a network by facilitating the monitoring of packets which potentially contain the sensitive information. The unique identifier may be located in the header of the packet, which is detectable without requiring a heavy investment of network resources. Additionally, a packet's movement within a network may be tracked by analyzing trapped system calls. Furthermore, an exiting packet may be analyzed by a network firewall, the firewall utilizing various policies to determine how to proceed when a packet containing a unique identifier is located.
Abstract:
Autocorrelation technique for measurement of width of optical short pulses based on polarization effects. The optical pulse is split into two orthogonal polarization states and these two replicas have a relative delay which depolarizes the pulse. By tuning the relative delay of the two replicas and measuring the degree-of-polarization (DOP) of the pulse or the induced polarimetric four-wave mixing (FWM) through nonlinear media, the pulse's temporal width can be accurately derived. The technique can be all-fiber-based, wavelength independent, cost effective, applicable to low optical power, and does not require significant optical alignment.
Abstract:
Devices, systems, and methods are disclosed for connecting a plurality of mobile devices in a videoconference over a cellular network via a videoconferencing server. At least one of the mobile devices includes a camera to capture a video of a participant in the videoconference. The video is transmitted to the videoconferencing server on the cellular network. The videoconferencing server edits the video and sends the edited video to receiving mobile devices in real-time. The receiving mobile devices output the video as a projection by using an internal mobile projector or transmit the video to an external display device. A sending mobile device may also act as a receiving mobile device, such that each of the participants may view video of other participants in his/her own background/environment while communicating with the other participants. In some variations, the videoconferencing server removes the background from the video and may replace the background such that the images of participants are placed in front of a new background or in each other's background.
Abstract:
Consistent with the present disclosure, an optical amplifier is provided that is configurable in one of two modes. In both modes, the optical service channel (OSC) may be dropped and converted to an electrical signal. In the first mode, the electrical signal is subject to further processing and the monitoring and/or control information carried by the OSC may be updated with new data. Such updated monitoring and control information is then supplied to an OSC transmitter and modulated onto an OSC output from the optical amplifier. In a second mode of operation (“loop back” mode), however, the monitoring and/or control information bypasses the processing noted above is looped back to the OSC transmitter unchanged. Accordingly, OSC monitoring and control information or data can be rapidly passed through the optical amplifier with little delay. Moreover, the optical amplifier may be configured to operate in either the first or second modes by appropriately configuring a switch. Thus, a standard optical amplifier can be used as a both a line amplifier, in which OSC data is processed and updated, as well as a booster amplifier in which such updating does not occur, for example, but the OSC data may be propagated to other amplifiers with little delay.
Abstract:
An electronic messaging client caches copies of a subset of electronic messages available in a remote store in a local store of a user device. When the user device is in an online state, the client provides for the blended presentation of electronic messages such that a user can concurrently view information about the electronic messages that have been cached in the local store as well as information about electronic messages that are stored only in the remote store. The client also presents a blended state associated with a container of electronic messages to a user of a user device and enables a user to execute a search of cached electronic messages stored in a local store as well as of electronic messages stored in the remote store.
Abstract:
Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.
Abstract:
In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.
Abstract:
System(s), method(s), and device(s) that incorporate a current physical location value associated with a communication device as part of internet protocol (IP) are presented. An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device.