-
公开(公告)号:US20250071713A1
公开(公告)日:2025-02-27
申请号:US18943880
申请日:2024-11-11
Applicant: Google LLC
Inventor: Jonathan Gonzalez , Punyabrata Ray , Dutt Kalapatapu , Ji Yang , Amol Tuli , Satheesh Bommakanti
IPC: H04W60/04 , H04L9/40 , H04L65/1016 , H04L65/1045 , H04L65/1104 , H04W8/18
Abstract: A method for carrier network integration through a user proxy interface includes receiving a request from a mobile device associated with a subscriber of a carrier provider to establish voice services with the carrier provider for a companion device linked to the mobile device. The request includes a subscriber identifier of the mobile device. The method also includes authenticating the companion device based on the subscriber identifier, obtaining session initiation protocol (SIP) credentials corresponding to the subscriber identifier, and registering the SIP credentials for the companion device at a network interface proxy. The network interface proxy is in communication with an internet protocol multimedia subsystem (IMS) of the carrier provider and the companion device. The method also includes establishing voice services between the companion device and the IMS through the network interface proxy using the SIP credentials.
-
公开(公告)号:US20250071208A1
公开(公告)日:2025-02-27
申请号:US18941388
申请日:2024-11-08
Applicant: Karen Paulson
Inventor: Karen Paulson
IPC: H04M3/53 , G06Q10/1091 , H04L9/40 , H04L51/04 , H04L51/10 , H04L51/23 , H04L51/234 , H04L51/42 , H04M3/22 , H04M3/533
Abstract: A communication logging system facilitates communications between two or more users. A secured database stores communications from each user, and the system notifies the intended recipients of the communications. The system records times of creation of the communications, times of access to the communications, and who created and/or accessed the communications. The communications may not be altered or deleted once recorded, so there is a permanent source of reliable evidence as to the content of the communications and information associated therewith.
-
公开(公告)号:US20250071143A1
公开(公告)日:2025-02-27
申请号:US18948775
申请日:2024-11-15
Applicant: Zscaler, Inc.
Inventor: Ritesh R. Agrawal , Vinay Adavi , Satish M. Mohan
Abstract: Systems and methods for a zero trust (ZT) network branch, which includes an edge switch on premises (on prem) with other services being offered in the cloud, include plurality of endpoints on the branch network each of which is configured in a network of one; and route east-west and north-south traffic flows associated with the plurality of endpoints through a cloud for security processing thereon. The security processing is based on one or more security applications selectively configured for the east-west and north-south traffic flows.
-
公开(公告)号:US20250071142A1
公开(公告)日:2025-02-27
申请号:US18453673
申请日:2023-08-22
Applicant: Dell Products L.P.
Inventor: Parminder Singh Sethi , Sheiesh Chopra , Anay Kishore , Atishay Jain
Abstract: A method for performing an application migration operation includes initiating the application migration operation to migrate an application from a source device to a target device, where the source device includes a source data migration agent and the target device comprises a target data migration agent. The method also includes initiating an active scan of network traffic at a transmission control protocol layer. The method further includes establishing a secure data path between the source device and the target device. In addition, the method includes beginning migration of the application from the source device to the target device using the secure data path. Moreover, the method includes making a first determination, using the active scan, that a data packet is associated with suspicious activity and rejecting the data packet based on the first determination.
-
公开(公告)号:US20250071141A1
公开(公告)日:2025-02-27
申请号:US18237155
申请日:2023-08-23
Applicant: Fortinet, Inc.
Inventor: Babak Barazandeh , Partha Bhattacharya
IPC: H04L9/40
Abstract: Systems, devices, and methods are discussed for detecting and/or mitigating the spread of computer malware in a network environment.
-
公开(公告)号:US20250071138A1
公开(公告)日:2025-02-27
申请号:US18237139
申请日:2023-08-23
Applicant: Fortinet Inc.
Inventor: Jason Abate , Shabbir Karimi
IPC: H04L9/40
Abstract: Various approaches for providing network maintenance and health monitoring are discussed. In some cases, some approaches include systems, methods, and/or devices that provide for detecting problematic network behavior and deploying countermeasures in relation to the detected behavior without an agent operating on the device where the countermeasures are implemented.
-
公开(公告)号:US20250071134A1
公开(公告)日:2025-02-27
申请号:US18237980
申请日:2023-08-25
Applicant: BANK OF AMERICA CORPORATION
Inventor: Shailendra Singh , Krishna Rangarao Mamadapur
IPC: H04L9/40
Abstract: A system is provided for intelligent automated simulation of penetration testing and isolation of vulnerable distributed electronic data registers. In particular, the system may extract metadata regarding one or more nodes or sections of a distributed register. Based on the metadata, the system may generate a knowledge graph that may indicate the vulnerabilities associated with particular nodes, blocks, and/or sections of the distributed register. Based on the knowledge graph, the system may compute vulnerability scores for the various nodes, blocks, and/or sections, and generate a vulnerability heatmap based on the scores. The system may further be configured to allow a user to perform automatic simulated penetration tests on the vulnerable portions of the distributed register and/or execute one or more remediation process on such vulnerable portions. In this way, the system provides an efficient way to identify and remediate vulnerabilities within a distributed register.
-
公开(公告)号:US20250071125A1
公开(公告)日:2025-02-27
申请号:US18238081
申请日:2023-08-25
Applicant: Fortinet, Inc.
IPC: H04L9/40
Abstract: Systems, devices, and methods are discussed for network security using hardware accelerated network traffic classification capable of classifying network traffic as a first occurrence of a network traffic event or a subsequent occurrence of a network traffic event.
-
公开(公告)号:US20250071119A1
公开(公告)日:2025-02-27
申请号:US18452627
申请日:2023-08-21
Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
Inventor: Yosef Ben SHLOMO , Ori JOSEPH , Erez ISRAEL , Eliya MOREINIS ADAR , Arie BLUMIN
Abstract: A device and method for employing a machine learning model using processor circuitry to intelligently predict user permissions within a network environment and output a restriction recommendation for modifying user permissions.
-
公开(公告)号:US20250071099A1
公开(公告)日:2025-02-27
申请号:US18724674
申请日:2022-12-20
Applicant: CHINA IWNCOMM CO., LTD.
IPC: H04L9/40
Abstract: The present application provides a method, apparatus, and device for secure data transmission. The method comprises: a node 1 incrementally updates an SN1 value, performs first mathematical transformation on the updated SN1 value to calculate an IV1, encrypts a first data packet according to the IV1 and a key, and then sends the encrypted first data packet to a node 2; the node 2 acquires the SN1 value in the first data packet, performs the first mathematical transformation on the acquired SN1 value to calculate the IV1, and decrypts the encrypted first data packet by using the IV1 and the key; the node 2 incrementally updates an SN2 value, performs second mathematical transformation on the updated SN2 value to calculate an IV2, encrypts a second data packet according to the IV2 and the key, and sends the encrypted second data packet to the node 1.