Carrier Integration Through User Network Interface Proxy

    公开(公告)号:US20250071713A1

    公开(公告)日:2025-02-27

    申请号:US18943880

    申请日:2024-11-11

    Applicant: Google LLC

    Abstract: A method for carrier network integration through a user proxy interface includes receiving a request from a mobile device associated with a subscriber of a carrier provider to establish voice services with the carrier provider for a companion device linked to the mobile device. The request includes a subscriber identifier of the mobile device. The method also includes authenticating the companion device based on the subscriber identifier, obtaining session initiation protocol (SIP) credentials corresponding to the subscriber identifier, and registering the SIP credentials for the companion device at a network interface proxy. The network interface proxy is in communication with an internet protocol multimedia subsystem (IMS) of the carrier provider and the companion device. The method also includes establishing voice services between the companion device and the IMS through the network interface proxy using the SIP credentials.

    COMMUNICATION LOGGING SYSTEM
    2.
    发明申请

    公开(公告)号:US20250071208A1

    公开(公告)日:2025-02-27

    申请号:US18941388

    申请日:2024-11-08

    Applicant: Karen Paulson

    Inventor: Karen Paulson

    Abstract: A communication logging system facilitates communications between two or more users. A secured database stores communications from each user, and the system notifies the intended recipients of the communications. The system records times of creation of the communications, times of access to the communications, and who created and/or accessed the communications. The communications may not be altered or deleted once recorded, so there is a permanent source of reliable evidence as to the content of the communications and information associated therewith.

    Zero Trust Network Branch
    3.
    发明申请

    公开(公告)号:US20250071143A1

    公开(公告)日:2025-02-27

    申请号:US18948775

    申请日:2024-11-15

    Applicant: Zscaler, Inc.

    Abstract: Systems and methods for a zero trust (ZT) network branch, which includes an edge switch on premises (on prem) with other services being offered in the cloud, include plurality of endpoints on the branch network each of which is configured in a network of one; and route east-west and north-south traffic flows associated with the plurality of endpoints through a cloud for security processing thereon. The security processing is based on one or more security applications selectively configured for the east-west and north-south traffic flows.

    END-TO-END TCP MONITORING DURING APPLICATION MIGRATION

    公开(公告)号:US20250071142A1

    公开(公告)日:2025-02-27

    申请号:US18453673

    申请日:2023-08-22

    Abstract: A method for performing an application migration operation includes initiating the application migration operation to migrate an application from a source device to a target device, where the source device includes a source data migration agent and the target device comprises a target data migration agent. The method also includes initiating an active scan of network traffic at a transmission control protocol layer. The method further includes establishing a secure data path between the source device and the target device. In addition, the method includes beginning migration of the application from the source device to the target device using the secure data path. Moreover, the method includes making a first determination, using the active scan, that a data packet is associated with suspicious activity and rejecting the data packet based on the first determination.

    SYSTEM FOR INTELLIGENT AUTOMATED SIMULATION OF PENETRATION TESTING AND ISOLATION OF VULNERABLE DISTRIBUTED ELECTRONIC DATA REGISTERS

    公开(公告)号:US20250071134A1

    公开(公告)日:2025-02-27

    申请号:US18237980

    申请日:2023-08-25

    Abstract: A system is provided for intelligent automated simulation of penetration testing and isolation of vulnerable distributed electronic data registers. In particular, the system may extract metadata regarding one or more nodes or sections of a distributed register. Based on the metadata, the system may generate a knowledge graph that may indicate the vulnerabilities associated with particular nodes, blocks, and/or sections of the distributed register. Based on the knowledge graph, the system may compute vulnerability scores for the various nodes, blocks, and/or sections, and generate a vulnerability heatmap based on the scores. The system may further be configured to allow a user to perform automatic simulated penetration tests on the vulnerable portions of the distributed register and/or execute one or more remediation process on such vulnerable portions. In this way, the system provides an efficient way to identify and remediate vulnerabilities within a distributed register.

    METHOD, APPARATUS AND DEVICE FOR SECURE DATA TRANSMISSION

    公开(公告)号:US20250071099A1

    公开(公告)日:2025-02-27

    申请号:US18724674

    申请日:2022-12-20

    Abstract: The present application provides a method, apparatus, and device for secure data transmission. The method comprises: a node 1 incrementally updates an SN1 value, performs first mathematical transformation on the updated SN1 value to calculate an IV1, encrypts a first data packet according to the IV1 and a key, and then sends the encrypted first data packet to a node 2; the node 2 acquires the SN1 value in the first data packet, performs the first mathematical transformation on the acquired SN1 value to calculate the IV1, and decrypts the encrypted first data packet by using the IV1 and the key; the node 2 incrementally updates an SN2 value, performs second mathematical transformation on the updated SN2 value to calculate an IV2, encrypts a second data packet according to the IV2 and the key, and sends the encrypted second data packet to the node 1.

Patent Agency Ranking