Movatterモバイル変換


[0]ホーム

URL:


US20200412733A1 - System for processing data collected by iot devices - Google Patents

System for processing data collected by iot devices
Download PDF

Info

Publication number
US20200412733A1
US20200412733A1US17/020,616US202017020616AUS2020412733A1US 20200412733 A1US20200412733 A1US 20200412733A1US 202017020616 AUS202017020616 AUS 202017020616AUS 2020412733 A1US2020412733 A1US 2020412733A1
Authority
US
United States
Prior art keywords
data
user
node
network
virtual instance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/020,616
Inventor
John Leon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orock Technologies Inc
Original Assignee
Orock Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orock Technologies IncfiledCriticalOrock Technologies Inc
Priority to US17/020,616priorityCriticalpatent/US20200412733A1/en
Publication of US20200412733A1publicationCriticalpatent/US20200412733A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A plurality of system nodes coupled via a dedicated private network is described herein. The nodes offer an end-to-end solution for protecting against network-based attacks. The nodes can also execute applications locally at the request of a user device such that a user operating the user device can use the applications executed locally on the nodes as if the applications were executing locally on the user device. To protect user data, the nodes may not transmit any user data to the user device. Rather, a node can generate a graphical representation of the environment in which the applications are executed, and transmit the graphical representation to the user device. As the user performs actions that result in a change of a graphical view of the environment in which the applications are executed, the node can generate and transmit new graphical representations of the environment to the user device.

Description

Claims (13)

What is claimed is:
1. A system comprising:
a network node configured to store data collected by a plurality of IoT devices; and
a delayed/disruption tolerant network (DTN) device configured to operate as an interface between the IoT devices and the network node, the DTN device coupled to the IoT devices by a network, and configured to forward IoT data received from the IoT devices to the network node;
wherein the DTN device is configured to instruct at least one of the IoT devices to implement a policy in which the IoT device (1) detects a loss of a network connection between the IoT device and the DTN device; (2) stores, in a memory of the IoT device, data it collects while the network connection is lost; and (3) in response to detecting reestablishment of the network connection, forwards the stored data to the DTN device and deletes the stored data from the memory.
2. The system ofclaim 1, wherein the network node is configured to communicate with the IoT devices over both a public network and a non-public cellular network.
3. The system ofclaim 1, wherein the network node comprises a plurality of self-encrypting drives that store the collected data, and comprises an encryption key management system that manages encryption keys used by the self-encrypting drives.
4. The system ofclaim 1, further comprising a second network node that is connected to the network node by a private network that is separate from said network, wherein the second network node stores a redundant copy of the collected data, and is configured to operate in place of the first network node while the first network node is down.
5. The system ofclaim 4, wherein the first and second network nodes are configured to communicate network threat detection data with each other over the private network.
6. The system ofclaim 1, wherein the network node comprises a processing server that executes an application, said application providing a user interface that is remotely accessible by user devices, wherein the user interface is configured to display information regarding statuses of the IoT devices.
7. The system ofclaim 6, wherein the user interface includes functionality for a user to specify login credentials of an IoT device, and the node is configured to use the login credentials to access the IoT device.
8. The system ofclaim 6, wherein the user interface includes functionality for a user to define a group that comprises a plurality of the IoT devices, and to specify a set of group-level parameters for the group.
9. The system ofclaim 8, wherein the network node is configured to monitor the plurality of IoT devices to determine whether an IoT device in the group is operating outside the set of group-level parameters.
10. The system ofclaim 6, wherein the user interface includes functionality for a user to specify parameters that control behaviors of the IoT devices.
11. The system ofclaim 10, wherein the application is configured to control an IoT device by transmitting an instruction that instructs the IoT device to modify its behavior.
12. The system ofclaim 1, wherein the data collected by the IoT devices comprises physical parameter data measured by sensors of the IoT devices.
13. The system ofclaim 1, wherein the network node executes an application that is remotely accessible to users from user devices, and the network node is configured to protect data included in user interface displays generated by the application by generating, and transmitting to the user devices, graphical representations of the user interface displays.
US17/020,6162017-06-092020-09-14System for processing data collected by iot devicesAbandonedUS20200412733A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/020,616US20200412733A1 (en)2017-06-092020-09-14System for processing data collected by iot devices

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201762517712P2017-06-092017-06-09
US16/002,738US10873584B2 (en)2017-06-092018-06-07Secure network-accessible system for executing remote applications
US17/020,616US20200412733A1 (en)2017-06-092020-09-14System for processing data collected by iot devices

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/002,738ContinuationUS10873584B2 (en)2017-06-092018-06-07Secure network-accessible system for executing remote applications

Publications (1)

Publication NumberPublication Date
US20200412733A1true US20200412733A1 (en)2020-12-31

Family

ID=64563865

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US16/002,738Expired - Fee RelatedUS10873584B2 (en)2017-06-092018-06-07Secure network-accessible system for executing remote applications
US17/020,616AbandonedUS20200412733A1 (en)2017-06-092020-09-14System for processing data collected by iot devices

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US16/002,738Expired - Fee RelatedUS10873584B2 (en)2017-06-092018-06-07Secure network-accessible system for executing remote applications

Country Status (2)

CountryLink
US (2)US10873584B2 (en)
WO (1)WO2018226790A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200344599A1 (en)*2019-04-292020-10-29Sonicwall Inc.Streamlined creation and expansion of a wireless mesh network
RU2796800C1 (en)*2022-09-232023-05-29Общество с ограниченной ответственностью "НеоБИТ"Method for detecting anomalies in the operation of a smart home device at the hardware level
WO2023115195A1 (en)*2021-12-222023-06-29Mastercard Technologies Canada ULCProtecting sensitive data in internet-of-things (iot) device
US12015717B2 (en)2021-12-082024-06-18Bank Of America CorporationSystem for processing offline digital resource transfers using a hardware device based cryptographic application
US12279115B2 (en)2019-04-292025-04-15Sonicwall Inc.Instant secure wireless network setup
US20250168158A1 (en)*2023-11-212025-05-22NeoDigit LLCManaging In-Vehicle Ecosystems
US12376062B2 (en)2019-04-292025-07-29Sonicwall Inc.Detecting profile-based wireless mesh node failover in communication networks

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2017143137A1 (en)*2016-02-212017-08-24Indiana University Research And Technology CorporationSystems and methods for preventing router attacks
US12277480B1 (en)2017-11-222025-04-15Amazon Technologies, Inc.In-flight scaling of machine learning training jobs
US11977958B2 (en)*2017-11-222024-05-07Amazon Technologies, Inc.Network-accessible machine learning model training and hosting system
US11194922B2 (en)*2018-02-282021-12-07International Business Machines CorporationProtecting study participant data for aggregate analysis
US10678956B2 (en)*2018-06-252020-06-09Dell Products, L.P.Keyboard for provisioning security credentials
US10735472B2 (en)*2018-07-102020-08-04Cisco Technology, Inc.Container authorization policies for network trust
KR102120548B1 (en)*2018-08-232020-06-16제주대학교 산학협력단CLOUD BASED IoT NETWORK VIRTUALIZATION SYSTEM AND NETWORKING METHOD THEREOF
US11368462B2 (en)*2018-09-062022-06-21Servicenow, Inc.Systems and method for hypertext transfer protocol requestor validation
US11368299B2 (en)2018-12-102022-06-21Marvell Asia Pte, Ltd.Self-encryption drive (SED)
US11363063B2 (en)*2018-12-282022-06-14Charter Communications Operating, LlcBotnet detection and mitigation
US10997192B2 (en)2019-01-312021-05-04Splunk Inc.Data source correlation user interface
US10719332B1 (en)*2019-04-292020-07-21Splunk Inc.Provisioning a client device with a multi-component application
US11194564B1 (en)2019-04-292021-12-07Splunk Inc.Maintaining compatibility in a multi-component application
US10754638B1 (en)2019-04-292020-08-25Splunk Inc.Enabling agile functionality updates using multi-component application
CN110677277B (en)*2019-09-022021-12-28深圳中兴网信科技有限公司Data processing method, device, server and computer readable storage medium
US11151125B1 (en)2019-10-182021-10-19Splunk Inc.Efficient updating of journey instances detected within unstructured event data
US11757891B1 (en)*2019-10-292023-09-12Meta Platforms, Inc.Using a host application to authorize a user of a client device to perform an action within a guest application
US11610012B1 (en)*2019-11-262023-03-21Gobeep, Inc.Systems and processes for providing secure client controlled and managed exchange of data between parties
US20210201581A1 (en)*2019-12-302021-07-01Intuit Inc.Methods and systems to create a controller in an augmented reality (ar) environment using any physical object
US11297085B2 (en)2020-01-082022-04-05Bank Of America CorporationReal-time validation of data transmissions based on security profiles
US11627152B2 (en)2020-01-082023-04-11Bank Of America CorporationReal-time classification of content in a data transmission
US11184381B2 (en)2020-01-082021-11-23Bank Of America CorporationReal-time validation of application data
US11770265B2 (en)*2020-04-302023-09-26Deere & CompanyMobile machine with improved machine data authentication
US11269876B1 (en)2020-04-302022-03-08Splunk Inc.Supporting graph data structure transformations in graphs generated from a query to event data
US11233802B1 (en)*2020-06-112022-01-25Amazon Technologies, Inc.Cookie and behavior-based authentication
US11741131B1 (en)2020-07-312023-08-29Splunk Inc.Fragmented upload and re-stitching of journey instances detected within event data
US11552943B2 (en)*2020-11-132023-01-10Cyberark Software Ltd.Native remote access to target resources using secretless connections
US11902424B2 (en)*2020-11-202024-02-13International Business Machines CorporationSecure re-encryption of homomorphically encrypted data
JP2023063948A (en)*2021-10-252023-05-10キヤノン株式会社Image processing apparatus, control method, and program
CN116266087A (en)*2021-12-172023-06-20北京字跳网络技术有限公司 Icon click detection method, device, equipment and storage medium
US11553008B1 (en)*2021-12-302023-01-10Netskope, Inc.Electronic agent scribe and communication protections
US20240169116A1 (en)*2022-11-212024-05-23Kla CorporationProtecting data sources from different entities for semiconductor yield related applications
CN115859335B (en)*2023-02-032023-06-16合肥科颖医药科技有限公司Remote information data consulting method and system based on remote control technology
US20240411873A1 (en)*2023-06-122024-12-12Wiz, Inc.Techniques for cybersecurity inspection of multiple layer virtual workloads

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090055451A1 (en)*2007-08-172009-02-26Clay Andre ReimerSystems and Methods For Providing Redundant Data Storage
US20170149564A1 (en)*2015-11-242017-05-25Red Hat, Inc.Network bound decryption with offline encryption
US20170187642A1 (en)*2015-12-232017-06-29Intel CorporationManaging communication congestion for internet of things devices
US20190213446A1 (en)*2016-06-302019-07-11Intel CorporationDevice-based anomaly detection using random forest models

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8594137B2 (en)*2007-02-202013-11-26Teradici CorporationApparatus and methods for image decoding
US8510798B2 (en)*2007-04-022013-08-13Sony CorporationAuthentication in an audio/visual system having multiple signaling paths
US8776169B2 (en)*2010-03-302014-07-08Authentic8, Inc.Disposable browsers and authentication techniques for a secure online user environment
US8627426B2 (en)*2010-04-262014-01-07Vmware, Inc.Cloud platform architecture
US9886189B2 (en)*2011-09-092018-02-06Cloudon Ltd.Systems and methods for object-based interaction with cloud-based applications
US9032488B2 (en)*2012-04-172015-05-12Salesforce.Com, Inc.Cross instance user authentication architecture
US20140108793A1 (en)*2012-10-162014-04-17Citrix Systems, Inc.Controlling mobile device access to secure data
US20140122875A1 (en)*2012-10-312014-05-01Ubs AgContainer-based management at a user device
WO2014151061A2 (en)*2013-03-152014-09-25Authentic8, Inc.Secure web container for a secure online user environment
US20150215312A1 (en)*2013-09-162015-07-30Clutch Authentication Systems, LlcSystem and method for secure single or multi-factor authentication
US9864874B1 (en)2014-05-212018-01-09Amazon Technologies, Inc.Management of encrypted data storage
US20170193611A1 (en)*2015-01-212017-07-0644Lab5, LlcMethod and computing system adapted for service auto-response generation based upon social media posting
US9355248B1 (en)*2015-01-262016-05-31Red Hat, Inc.Container and image scanning for a platform-as-a-service system
US10740128B2 (en)*2015-05-072020-08-11Quest Software Inc.Selecting a cloud from a plurality of clouds for a workload
US10324744B2 (en)*2015-06-042019-06-18Vmware, Inc.Triggering application attachment based on service login
US10324745B2 (en)*2016-02-012019-06-18Airwatch, LlcThin client with managed profile-specific remote virtual machines
US10855725B2 (en)*2016-06-022020-12-01Microsoft Technology Licensing, LlcHardware-based virtualized security isolation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090055451A1 (en)*2007-08-172009-02-26Clay Andre ReimerSystems and Methods For Providing Redundant Data Storage
US20170149564A1 (en)*2015-11-242017-05-25Red Hat, Inc.Network bound decryption with offline encryption
US20170187642A1 (en)*2015-12-232017-06-29Intel CorporationManaging communication congestion for internet of things devices
US20190213446A1 (en)*2016-06-302019-07-11Intel CorporationDevice-based anomaly detection using random forest models

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200344599A1 (en)*2019-04-292020-10-29Sonicwall Inc.Streamlined creation and expansion of a wireless mesh network
US12022295B2 (en)*2019-04-292024-06-25Sonicwall Inc.Streamlined creation and expansion of a wireless mesh network
US12279115B2 (en)2019-04-292025-04-15Sonicwall Inc.Instant secure wireless network setup
US12376062B2 (en)2019-04-292025-07-29Sonicwall Inc.Detecting profile-based wireless mesh node failover in communication networks
US12015717B2 (en)2021-12-082024-06-18Bank Of America CorporationSystem for processing offline digital resource transfers using a hardware device based cryptographic application
WO2023115195A1 (en)*2021-12-222023-06-29Mastercard Technologies Canada ULCProtecting sensitive data in internet-of-things (iot) device
US12430631B2 (en)2021-12-222025-09-30Mastercard Technologies Canada ULCProtecting sensitive data in internet-of-things (IoT) device
RU2796800C1 (en)*2022-09-232023-05-29Общество с ограниченной ответственностью "НеоБИТ"Method for detecting anomalies in the operation of a smart home device at the hardware level
US20250168158A1 (en)*2023-11-212025-05-22NeoDigit LLCManaging In-Vehicle Ecosystems
WO2025111354A1 (en)*2023-11-212025-05-30NeoDigit LLCManaging in-vehicle ecosystems

Also Published As

Publication numberPublication date
US10873584B2 (en)2020-12-22
US20180359259A1 (en)2018-12-13
WO2018226790A1 (en)2018-12-13

Similar Documents

PublicationPublication DateTitle
US10873584B2 (en)Secure network-accessible system for executing remote applications
US10601790B2 (en)System for providing end-to-end protection against network-based attacks
US20220263800A1 (en)Secure on-premise to cloud communication
US11075955B2 (en)Methods and systems for use in authorizing access to a networked resource
US9800560B1 (en)Systems and methods for monitoring encrypted data transmission
US10992653B2 (en)System for authenticating users using multiple factors
US20130268994A1 (en)System and method for determining and using local reputations of users and hosts to protect information in a network environment
US12335315B2 (en)Method and system for smart recommendation and dynamic grouping of devices for a better device management
US11176276B1 (en)Systems and methods for managing endpoint security states using passive data integrity attestations
EP4350554B1 (en)Secure count in cloud computing networks
US11323454B1 (en)Systems and methods for securing communications
KR20250088522A (en) Systems and methods for building a secure digital network environment
US20250080504A1 (en)Websocket server for cloud-based zero trust network access data plane
EP4521688A1 (en)Zero trust network access connector for customer premises
Rani et al.Cloud computing an empowering technology: architecture, applications and challenges
Johnsson et al.Edge Computing Security for IoT: A Systematic Literature Review
WO2017019551A1 (en)Systems and methods for providing multi-level network security
SajaySecurity Issues in Cloud Computing: An Overview

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp