Privacy-Preserving Location Corroborations
    41.
    发明申请

    公开(公告)号:US20180316653A1

    公开(公告)日:2018-11-01

    申请号:US15497652

    申请日:2017-04-26

    Inventor: Yaron Kanza

    Abstract: Concepts and technologies disclosed herein are directed to privacy-preserving location corroborations. According to one aspect, a localized corroborator system can receive a message digest from a user device. The message digest can be generated by the user device using a cryptographic hash function based upon bitwise XOR of a user identifier and a location proof identifier. The location proof identifier can uniquely identify a location proof to be created by the system. The system can concatenate a corroborator identifier, a location, a time, and the message digest to create a concatenated message. The system can sign the concatenate message using a private key to create the location proof and can send the corroborator identifier and the location proof to the user device. The user device can use the location proof to prove that the user was located at the location at the time.

    SYSTEMS AND METHODS FOR MODELING NETWORKS
    42.
    发明申请

    公开(公告)号:US20180006897A1

    公开(公告)日:2018-01-04

    申请号:US15198448

    申请日:2016-06-30

    Abstract: A system may include a processor and an input adapted to communicate with a network. The system may also include memory storing instructions that cause the processor to effectuate operations. The operations may include detecting a plurality of nodes in the network based on data received at the input and for each of a plurality of nodes, instantiating a node data structure. The operations may also include, for each respective node of the plurality of nodes, identifying an edge indicative of a connection between the respective node and a second node of the plurality of nodes, and instantiating a plurality of edge data structures based on the edges. The operations may also include creating a graph database comprising a layered graph based on data structures, the data structures comprising the plurality of node data structures and the plurality of edge data structures.

    Testing accessibility of geospatial applications using contextual filters

    公开(公告)号:US12153915B2

    公开(公告)日:2024-11-26

    申请号:US17933477

    申请日:2022-09-19

    Abstract: A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.

    Implementing network security rules in home routers

    公开(公告)号:US12149552B2

    公开(公告)日:2024-11-19

    申请号:US17935812

    申请日:2022-09-27

    Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for implementing programmable security specifications in home routers. For instance, in one example, a method performed by a processing system including at least one processor includes monitoring network traffic flowing into and out of a home network that is connected to a core network via a gateway device, constructing a model of network traffic flowing into and out of the home network, based on the monitoring, detecting an anomaly in the model of the network traffic, generating a rule based on the anomaly, where the rule specifies an action to be taken when a match condition related to the anomaly is detected, and deploying the rule on the gateway device.

    Geospatial-based forecasting for access point deployments

    公开(公告)号:US11997508B2

    公开(公告)日:2024-05-28

    申请号:US17929740

    申请日:2022-09-05

    CPC classification number: H04W16/18 G06N20/00 H04W24/08

    Abstract: A processing system may obtain usage volume information for endpoint devices for at least one cell site of a cellular network, determine at least one earning value of the at least one cell site based upon a summation of an earning metric of each of the endpoint devices for the at least one cell site, the earning metric comprising for each of the endpoint devices in a given time period: a total earning for the cellular network from the endpoint device times a ratio of the usage volume via the at least one cell site divided by the total usage volume via the cellular network, train a prediction model to predict an earning value of a new cell site, based upon geospatial features of the at least one cell site as predictor factors, and determine a predicted earning value of the new cell site via the prediction model.

    LOCALIZED ACCESS CONTROL FOR PRIVATE NETWORKS

    公开(公告)号:US20240106800A1

    公开(公告)日:2024-03-28

    申请号:US17934545

    申请日:2022-09-22

    CPC classification number: H04L63/0272 H04L63/102

    Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for managing access control in private networks like home or corporate networks based on a current location such as a defined area, e.g., a room, in which a network-connected device is located. For instance, in one example, a method performed by a processing system including at least one processor includes receiving a request from a user endpoint device to access a private network that provides a network connectivity within a structure, determining a current location of the user endpoint device within the structure, determining whether an access control rule permits access to the private network for a combination of the user endpoint device and the current location of the user endpoint device, and taking, in response to the determining, an action to enforce the access control rule.

    TESTING ACCESSIBILITY OF GEOSPATIAL APPLICATIONS USING CONTEXTUAL FILTERS

    公开(公告)号:US20240095008A1

    公开(公告)日:2024-03-21

    申请号:US17933477

    申请日:2022-09-19

    CPC classification number: G06F8/65

    Abstract: A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.

    AI-based, semi-supervised interactive map enrichment for radio access network planning

    公开(公告)号:US11809522B2

    公开(公告)日:2023-11-07

    申请号:US17867798

    申请日:2022-07-19

    Abstract: Aspects of the subject disclosure may include, for example, obtaining user input identifying a first user-identified network feature of a training image of a geographical region. The training image and the user-identified feature are provided to a neural network adapted to train itself according to the user-identified features to obtain a first trained result that classifies objects within the image according to the user-identified feature. The training image and the first trained result are displayed, and user-initiated feedback is obtained to determine whether a training requirement has been satisfied. If not satisfied, the user-initiated feedback is provided to the neural network, which retrains itself according to the feedback to obtain a second trained result that identifies an updated machine-recognized feature of the training image. The process is repeated until a training requirement has been satisfied, after which a map is annotated according to the machine-recognized feature. Other embodiments are disclosed.

    CONFIDENTIALITY PRESERVING INTRAORGANIZATIONAL EXPERT SEARCH

    公开(公告)号:US20230350962A1

    公开(公告)日:2023-11-02

    申请号:US17734400

    申请日:2022-05-02

    CPC classification number: G06F16/9538

    Abstract: A processing system including at least one processor may obtain at least one search term and an identity of a searcher, identify individuals who are each either a one-step or two-step association of the searcher, identify first documents associated with the individuals and associated with the search term(s), calculate, for each individual, a score based upon citations of second documents to documents associated with the individual from among the first documents, generate an invitation to at least one individual to appear in a search result, and obtain a consent from the at least one individual. The processing system may then present the search result as an ordered list of at least a portion of the individuals, where the ordered list is ordered by the score for each individual, and where the at least the portion of the plurality of individuals includes the at least one individual.

Patent Agency Ranking