Abstract:
A method includes aligning a transmitter and receiver to transmit signals through a body part of a person and transmitting, by the transmitter and through the body part, analog signals of known transmission signal strengths. The method also includes receiving, by the receiver, the analog signals after the analog signals have passed through the body part, and identifying the received signal strengths of the analog signals at the receiver. The method calculates attenuation values between the transmission signal strengths and the received signal strengths to generate an identity signature based on biometry.
Abstract:
A method includes receiving a signaling protocol message associated with a voice over Internet Protocol (VoIP) call. The method includes identifying a From value of the signaling protocol message. The From value includes at least one symbol. The method includes converting each symbol of the From value to a corresponding American Standard Code for Information Exchange (ASCII) decimal value. A To value of the at least one signaling protocol message is identified. The To value includes at least one symbol. The method includes converting each symbol of the To value to a corresponding ASCII decimal value. The ASCII decimal value of the From value is compared to the ASCII decimal value of the To value to determine a larger integer and a smaller integer. The method includes concatenating the larger integer and the smaller integer to form a remote service identifier based on a predetermined sequence.
Abstract:
A method includes receiving a signaling protocol message associated with a voice over Internet Protocol (VoIP) call. The method includes identifying a From value of the signaling protocol message. The From value includes at least one symbol. The method includes converting each symbol of the From value to a corresponding American Standard Code for Information Exchange (ASCII) decimal value. A To value of the at least one signaling protocol message is identified. The To value includes at least one symbol. The method includes converting each symbol of the To value to a corresponding ASCII decimal value. The ASCII decimal value of the From value is compared to the ASCII decimal value of the To value to determine a larger integer and a smaller integer. The method includes concatenating the larger integer and the smaller integer to form a remote service identifier based on a predetermined sequence.
Abstract:
A computing device detects and mitigates malicious input at the point of origin before such input invades a communication network. A computing device receives, at an operating system kernel, a first input string and stores, in a cache accessible to the kernel, a copy of the first input string. The computing device receives, by the operating system kernel, a second input string and compares the copy of the first input string and the second input string for redundancy before committing the second input string to an application or communication interface. The computer device rejects the second input when the comparing indicates that the copy of the first input string and the second input string are redundant.
Abstract:
A method includes aligning a transmitter and receiver to transmit signals through a body part of a person and transmitting, by the transmitter and through the body part, analog signals of known transmission signal strengths. The method also includes receiving, by the receiver, the analog signals after the analog signals have passed through the body part, and identifying the received signal strengths of the analog signals at the receiver. The method calculates attenuation values between the transmission signal strengths and the received signal strengths to generate an identity signature based on biometry.
Abstract:
A method and apparatus for improved approaches for detection of exploits and drift in a network is described. The method includes: determining, by a processor, a logical configuration of a network comprising a plurality of links connecting a plurality of nodes; determining, by the processor, a physical path corresponding to one of the links, the physical path including a plurality of switches of the network, wherein the processor is configured to determine whether data sent on one of the nodes to another one of the nodes by the one link is received at the other node; receiving an error detection value computed by one of the switches; and determining, by the processor, whether the error detection value corresponds with a value inaccessible to the one switch.
Abstract:
A system may include a fiber distribution hub including a plurality of fiber-optic cables, wherein a particular one of the plurality of fiber-optic cables includes a machine-readable identifier; and a robotic device configured to access particular ones of the plurality of fiber-optic cables. The robotic device may include a print head configured to splice together the particular ones of the plurality of fiber-optic cables by three-dimensional printing of a silane material. A hand-held unit may also include a print head configured to splice together fiber-optic cables by three-dimensional printing of a silane material.
Abstract:
A method and apparatus for improved approaches for detection of exploits and drift in a network is described. The method includes: determining, by a processor, a logical configuration of a network comprising a plurality of links connecting a plurality of nodes; determining, by the processor, a physical path corresponding to one of the links, the physical path including a plurality of switches of the network, wherein the processor is configured to determine whether data sent on one of the nodes to another one of the nodes by the one link is received at the other node; receiving an error detection value computed by one of the switches; and determining, by the processor, whether the error detection value corresponds with a value inaccessible to the one switch.
Abstract:
An approach for providing multiplexed security token values is described. A security token value multiplexing platform may determine a time interval for generating a security token value, wherein the time interval is different from a previous time interval at which a previous security token value was generated. The security token value multiplexing platform may further select an algorithm from a plurality of algorithms for generating the security token value based on the time interval. The security token value multiplexing platform may also generate the security token value using the algorithm.
Abstract:
A computing device detects and mitigates malicious input at the point of origin before such input invades a communication network. A computing device receives, at an operating system kernel, a first input string and stores, in a cache accessible to the kernel, a copy of the first input string. The computing device receives, by the operating system kernel, a second input string and compares the copy of the first input string and the second input string for redundancy before committing the second input string to an application or communication interface. The computer device rejects the second input when the comparing indicates that the copy of the first input string and the second input string are redundant.