Abstract:
Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.
Abstract:
Enabling machine-to-machine communication for digital assistants can include initiating a call with a called device, generating audio stream data having a first instance of audio and a first spoken command, which can be provided to the called device. A second instance of audio stream data can be received from the called device, can include a second spoken command, and can be analyzed to determine if it includes assistant signature data. If the second instance of audio stream data includes the assistant signature data, the devices can switch to machine-to-machine communications.
Abstract:
Security rules to apply to resources, including virtual machines (VMs), in the cloud and on network edges can be learned, determined, and tested. A security management component (SMC) can analyze information relating to data traffic associated with a group of resources associated with a tenant. The analysis can comprise an artificial intelligence analysis. Ingress/egress of the data traffic to/from resources of the group of resources initially can be controlled based on a group of security rules selected by the tenant. Based on a result of the analyzing, SMC can determine a modified group of security rules to apply to the group of resources to control ingress/egress of subsequent data traffic to/from the resources, wherein the result of the analyzing can indicate respective first relationships determined between respective resources and respective second relationships determined between the respective resources and respective network addresses associated with the cloud network.
Abstract:
Security rules to apply to resources, including virtual machines (VMs), in the cloud and on network edges can be learned, determined, and tested. A security management component (SMC) can analyze information relating to data traffic associated with a group of resources associated with a tenant. The analysis can comprise an artificial intelligence analysis. Ingress/egress of the data traffic to/from resources of the group of resources initially can be controlled based on a group of security rules selected by the tenant. Based on a result of the analyzing, SMC can determine a modified group of security rules to apply to the group of resources to control ingress/egress of subsequent data traffic to/from the resources, wherein the result of the analyzing can indicate respective first relationships determined between respective resources and respective second relationships determined between the respective resources and respective network addresses associated with the cloud network.
Abstract:
Aspects of the subject disclosure may include, for example, detecting a need to verify an identity of a particular user in the metaverse, obtaining a particular hash/encoding associated with the particular user, wherein the particular hash/encoding is generated based on processing of a video, image, voice recording, or biometric information associated with the particular user, retrieving a second hash/encoding from a user profile of a first user, wherein the second hash/encoding corresponds to a second user and is generated based on processing of a video, image, voice recording, or biometric information associated with the second user, performing a comparison of the second hash/encoding and the particular hash/encoding, and based on a determination that there is a match, identifying that the particular user corresponds to the second user, resulting in a verification of the identity of the particular user. Other embodiments are disclosed.
Abstract:
Providing and using a user login protection service can include detecting, during a login creation process, input that indicates that a computing device has opted-in for protection for a login being created. During the login creation process, the login can be stored at a first data storage location, the login including an address that identifies a location of a distributed ledger and a password, and a reset password at a second data storage location comprising a secure data storage device. In response to detecting an attempt to log in to the third party device to access the resource, a value associated with the distributed ledger can be obtained, the value indicating a status of a trigger condition associated with the login. If the value is zero, the attempt to log in can be allowed to proceed. If the value is one, the attempt to log in can be blocked.
Abstract:
The disclosed technology is directed towards facilitating communication with an unknown person via a device of the person having an unknown communications address. The presence of a visible person at a location can be determined, and a communications device at or near that location can be detected as a candidate device associated with that person. The device's current location, which can be regularly registered along with its communication address, is matched to the person's visible location. Communication via the device, such as by a responder, whether with the person and/or to obtain information from the device, is based on the registered communication address. The person's identity and other data may be obtainable. For a non-visible person, e.g., underneath an obstruction, the location of a detected device predicts the likely presence of a person near that location. A map may be generated showing locations of multiple detected devices.
Abstract:
The disclosed technology is directed towards presenting communications data to a responding entity that are relevant to an emergency situation at an emergency location. The communications data can be obtained from communications (e.g., text messages, transmitted video, voice calls and the like) that involve at least one user device at the situation, including communications that do not involve the responding entity. Users may opt in to such an emergency service to allow access to their communications, whereby their device locations are tracked and known in the event of an emergency. Upon obtaining the communications data, a responder can receive a view of the scene augmented with the communications data. The view can include a three-dimensional and/or two-dimensional representation of the zone/area of the emergency situation. Filtering can be used to eliminate irrelevant communications, and summarization can be used to combine generally redundant communications.
Abstract:
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of facilitating establishment of a communications path between an open device and a remote device through a communications network; receiving an indication of potentially sensitive information on the communications path; and facilitating establishment of a secure communications path between a secure device and the remote device through the communications network. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, a mobile assistant device that obtains information regarding device locations of a plurality of devices; the mobile assistant device is enabled to move among at least a portion of the device locations. The mobile assistant device detects an indication of a need for maintenance, repair, and/or user attention, relating to a target device. The mobile assistant device moves to a location of the target device; obtains device information regarding a condition of the target device; and reports the device information to equipment of the user and/or a controller of the mobile assistant device. The mobile assistant device engages with the user and/or equipment of the user to provide instructions to the equipment of the user for resolving an issue relating to the target device, and can physically engage with the target device to resolve the issue. Other embodiments are disclosed.