SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTION

    公开(公告)号:US20250085871A1

    公开(公告)日:2025-03-13

    申请号:US18960326

    申请日:2024-11-26

    Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool. The operations include correlating using the controller monitoring and isolation tool and the storage monitoring and isolation tool actual locations for incoming data for a customer, and monitoring performance of the storage platform with the storage monitoring and isolation tool. The operations also include tying the stored blocks of data to a physical memory on which the stored blocks of data reside; and providing a passcode to the customer though the controller monitoring and isolation tool that has to be presented to the controller monitoring and isolation tool and the storage monitoring and isolation tool to store data.

    VIRTUAL REALITY AVATAR ATTENTION-BASED SERVICES

    公开(公告)号:US20250078378A1

    公开(公告)日:2025-03-06

    申请号:US18953150

    申请日:2024-11-20

    Abstract: The disclosed technology relates to detection of attention exhibited by a second user to a first user's avatar in a virtual reality environment. A first user's avatar activity and the second user's activity are evaluated to determine the second user's (e.g., via another avatar) attention level directed towards first user's avatar. Information can be sent to notify the first user that the second user's attention level has satisfied attention-level criterion data. For example, if the second user is viewing and/or is within audio range of the first user for too long of a time or too frequently, then the first user can be notified and/or other action taken. Remedial action is available for negative attention, such blocking the second user from experiencing the first user in the environment. Detection of attention for positive purposes is available, such as to reward an influencer whose avatar is receiving significant attention from followers.

    Systems and methods for sharing information between/among users

    公开(公告)号:US12242921B1

    公开(公告)日:2025-03-04

    申请号:US18493485

    申请日:2023-10-24

    Abstract: Aspects of the subject disclosure may include, for example: receiving, from a first mobile communication device of a first user, first information associated with a computer-readable indicia that has been scanned by the first mobile communication device, wherein the computer-readable indicia had been displayed by a second mobile communication device of a second user at a time of being scanned by the first mobile communication device; responsive to receiving of the first information, obtaining from one or more first databases first characterizing data that is descriptive of one or more characteristics of the second user; and sending to the first mobile communication device the first characterizing data, wherein the sending facilitates a presentation by the first mobile communication device of the one or more characteristics of the second user. Other embodiments are disclosed.

    WEB PAGE SPECTROSCOPY
    37.
    发明申请

    公开(公告)号:US20250071131A1

    公开(公告)日:2025-02-27

    申请号:US18943639

    申请日:2024-11-11

    Abstract: Facilitating web page spectroscopy in a communications network is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise receiving first data that describes a first communication packet flow and second data that describes a second communication packet flow. The operations can also comprise training a model based on the first data and the second data, as a result of which the model is trained to detect respective behaviors represented by the first data and the second. Further, the operations can comprise extracting a common parameter from third data that describes a third communication packet flow and fourth data that describes a fourth communication packet flow based on the model.

    DETECTION AND NOTIFICATION OF ELECTRONIC INFLUENCE

    公开(公告)号:US20250071081A1

    公开(公告)日:2025-02-27

    申请号:US18947027

    申请日:2024-11-14

    Abstract: The disclosed technology is generally directed towards monitoring electronic communications to detect content in a communication that is attempting to influence the user in some way. A user can specify influential intent preference data, such as which electronic communications services/applications to monitor for such influential intent content, and the types of the influential intent to monitor for, e.g., political influence types, advertisement influence types, and so on. A user also can specify remedial or other actions to take upon detection, e.g., block such content, alert on detecting such content and so on. An electronic influence manager server and/or application program can perform the monitoring and/or take the actions. Also described is reporting on the communications with influential intent, user actions with respect thereto. Reputation data can also be collected and used with respect to sources of communications with influential intent.

    CORRELATING RADIO ACCESS NETWORK MESSAGES OF AGGRESSIVE MOBILE DEVICES

    公开(公告)号:US20250063393A1

    公开(公告)日:2025-02-20

    申请号:US18938750

    申请日:2024-11-06

    Inventor: YARON KORAL

    Abstract: Excessive signaling by devices against a radio access network (RAN) can be detected and mitigated. A security management component (SMC) can determine whether a total number of control signals received by a base station from devices satisfies a threshold total number of control signals indicative of excessive signaling. If so, SMC can identify a device associated with the base station based on analyzing communication conditions associated with the device. SMC can determine whether to classify the device as an excessive signaling device based on whether the number of control signals received from the device by the base station satisfies a threshold number of control signals indicative of excessive signaling. If so, SMC can determine the device is an excessive signaling device. In response, SMC can perform or facilitate performing a mitigation action to mitigate excessive signaling or can generate statistics relating to the excessive signaling.

    Adaptable resiliency for a virtualized RAN framework

    公开(公告)号:US12231958B2

    公开(公告)日:2025-02-18

    申请号:US17939793

    申请日:2022-09-07

    Abstract: Adaptable resiliency for a virtualized radio access network (vRAN) framework is disclosed. A resiliency management component can determine vRAN topological adaptations that can reflect resiliency requirements of service instance(s). Accordingly, sufficient redundant vRAN components to satisfy the resiliency requirements can be deployed. However, unlike conventional redundancy techniques that can determine a highest level of redundancy and then apply that relative to all supported services, the disclosed subject matter can avoid over-deploying redundant vRAN components, e.g., redundant components exceeding the resiliency requirement of a service instance, resulting in lowered monetary and non-monetary costs to maintain a vRAN. Moreover, as the services change, the topology of the vRAN can be automatically adapted to purge excessive redundancies, add newly required redundancies, etc., which can facilitate propagating an adequate but lean vRAN topology that is sufficiently resilient.

Patent Agency Ranking