Software credential token process, software, and device

    公开(公告)号:US12058262B2

    公开(公告)日:2024-08-06

    申请号:US18145841

    申请日:2022-12-22

    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.

    Low-overhead routing
    183.
    发明授权

    公开(公告)号:US12047285B2

    公开(公告)日:2024-07-23

    申请号:US16812917

    申请日:2020-03-09

    CPC classification number: H04L45/74 H04L45/02 H04L45/125 H04L45/24 H04W40/00

    Abstract: A method of routing an Internet Protocol (IP) packet from a routing device is provided. The method includes receiving a first IP packet having a first IP header and a first IP data field, the first IP packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. A second IP packet having a second IP header and a second IP data field is generated. The second IP data field is a copy of the first IP data field, and a destination IP address field in the second IP header includes an IP address of a next hop on the network route. The second IP packet does not include an IP address of the final destination in the second IP header.

    System for cyber-attack simulation using artificial intelligence modeling

    公开(公告)号:US12032681B1

    公开(公告)日:2024-07-09

    申请号:US17896974

    申请日:2022-08-26

    CPC classification number: G06F21/53 G06F21/552 G06N3/04 H04L63/1458

    Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server executes a first attack action by a virtual attack machine against a virtual target machine based on a cyber-attack scenario, wherein the virtual target machine is configured to be controlled by the user computer. The server receives a user response to the first attack action, determines, using a decision tree, a first proposed attack action based on the user response, and executes an artificial intelligence model to determine a second proposed attack action based on the user response. The server selects a subsequent attack action from the first proposed attack action and the second proposed attack action and executes the subsequent attack action by the virtual attack machine against the virtual target machine.

    System for deploying and monitoring network-based training exercises

    公开(公告)号:US11887505B1

    公开(公告)日:2024-01-30

    申请号:US16393276

    申请日:2019-04-24

    CPC classification number: G09B5/12 G02B27/017 G06T19/003 G06T19/006

    Abstract: Techniques are described for implementing a system that deploys and monitors training simulations and exercises across a network, and that enables the development and execution of virtual training. An example system outputs, for display in a web browser of a trainee computing system, a graphical user interface that includes one or more training exercises, and initiates execution of software agent(s) associated with skill(s) to be demonstrated by a trainee. The example system outputs, at the trainee computing system, content corresponding to scene(s) of an at least partially virtual environment for a training exercise, where the content is rendered for display at least in the web browser of the trainee computing system. After receiving interaction data collected by the software agent(s) during the training exercise, the example system determines, based on the interaction data, that the skill(s) associated with the training exercise have been demonstrated.

Patent Agency Ranking