FILTERED ADVERTISEMENTS OF SECONDARY SERVERS

    公开(公告)号:US20230110418A1

    公开(公告)日:2023-04-13

    申请号:US17822231

    申请日:2022-08-25

    Abstract: In examples, a first Anycast advertisement is received from a first server identifying the first server as a primary address for a service. In addition, a second Anycast advertisement is received from the first server identifying the first server as a secondary address for the service. Further, a third Anycast advertisement is received from a second server identifying the second server as the secondary address for the service. A first community advertisement is also from the first server identifying the first server as a member of a first community. Thereafter, a first request is received from a client including the primary address, and the request is routed to the first server. When a second request from the client is received including the secondary address, based at least on the community advertisement, the first server is ignored, and the second request is routed to the second server.

    SYSTEMS AND METHODS FOR IP SPOOFING SECURITY

    公开(公告)号:US20220329625A1

    公开(公告)日:2022-10-13

    申请号:US17657381

    申请日:2022-03-31

    Abstract: Examples of the present disclosure describe systems and methods for providing security against IP spoofing. In aspects, network traffic associated with one or more data requests may be received by a device in a computing environment. The network traffic may be evaluated using one or more automated logic systems or algorithms to identify suspicious or malicious behavior. The automated logic systems or algorithms may implement one or more analyses, such as asymmetric routing analysis, hardware device analysis, user and/or network behavior analysis, etc. Upon identifying suspicious or malicious behavior, the automated logic systems or algorithms may apply a filter to one or more computing devices. For example, a filter for blocking network traffic associated with the suspicious or malicious behavior may be applied to a computing device that is in close geographic and/or logical proximity to an attacking computing device.

    Numeric Pattern Normalization for Cryptographic Signatures

    公开(公告)号:US20180006824A1

    公开(公告)日:2018-01-04

    申请号:US15688364

    申请日:2017-08-28

    CPC classification number: H04L9/3247 H04L9/3242 H04L2209/68

    Abstract: A system for numeric pattern normalization for cryptographic signatures is provided. The system includes a resolving client, and an at least one signature server. The at least one signature server includes at least one processor and non-transitory computer readable media having encoded thereon computer software comprising a set of instructions executable by the at least one processor. The set of instructions may be executed by the signature server to generate a message to be transmitted to a resolving client, normalize the message via numeric pattern normalization, generate a hash value for the normalized message, and generate a cryptographic signature based on the hash value. The signature server may then generate a signed message having the message signed with the cryptographic signature, and transmit the signed message to the resolving client.

    SYSTEM AND METHOD FOR TRANSFERRING A CLIENT CONNECTION

    公开(公告)号:US20250168242A1

    公开(公告)日:2025-05-22

    申请号:US19028106

    申请日:2025-01-17

    Abstract: In a system with a plurality of servers serving one or more clients, situations may arise in which a client has a connection to a first server which is providing a service to the client, and in which it would be advantageous to transfer the connection to a second server, in a manner that does not require the re-establishing of the connection or the making of a renewed request, by the client, for the service. As such, a system and method for transferring a client connection from one server to another server are provided.

    INFERENCE AS A SERVICE
    45.
    发明申请

    公开(公告)号:US20250086510A1

    公开(公告)日:2025-03-13

    申请号:US18829449

    申请日:2024-09-10

    Abstract: Novel tools and techniques are provided for implementing Inference as a Service. In various embodiments, a computing system may receive a request to perform an AI/ML task on first data, the request including desired parameters, in some cases, without information regarding any of specific hardware, specific hardware type, specific location, or specific network for providing network services for performing the requested AI/ML task. The computing system may identify edge compute nodes within a network based on the desired parameters and/or unused processing capacity of each node. The computing system may identify AI/ML pipelines capable of performing the AI/ML task, the pipelines including neural networks utilizing pre-trained AI/ML models. The computing system may cause the identified nodes to run the identified pipelines to perform the AI/ML task. In response to receiving inference results from the identified pipelines, the computing system may send, store, and/or cause display of the received inference results.

    VARIFOCAL THREAT ANALYSIS SYSTEM AND METHOD

    公开(公告)号:US20250039213A1

    公开(公告)日:2025-01-30

    申请号:US18917317

    申请日:2024-10-16

    Abstract: Example systems and methods permit threat intelligence to be determined and used at a local, regional, and/or global level in a communications network. A threat intelligence system may collect traffic information from local computing systems and analyze it for malicious traffic. If a measure of malicious traffic in a local computing system is reached, mitigation actions may be taken in that local computing system. In addition, threat measures may be amplified in other local computing systems, other regions, or globally in the network, in order to more quickly react to a known threat as it may spread in a network.

    CATEGORY-BASED MEDIA EDITING
    49.
    发明申请

    公开(公告)号:US20240379128A1

    公开(公告)日:2024-11-14

    申请号:US18652110

    申请日:2024-05-01

    Abstract: Systems and methods for providing category-based media editing. A media editing service may include an artificial-intelligence/machine-learning editor trained to recognize patterns and characteristics of various attributes of various categories. A user of a streaming service may select a media item and further select a category that may be related to a current content. The streaming service may user the editor to detect occurrences of attributes of the selected category in the media item and to generate editing instructions to obfuscate, hide, remove, skip, or replace detected content with other content based on various filter settings. For instance, the editing instructions may be used to edit the media item such that undesired content including attributes of the selected category may be filtered.

Patent Agency Ranking