Virtual reality for security augmentation in home and office environments

    公开(公告)号:US10990683B2

    公开(公告)日:2021-04-27

    申请号:US15989462

    申请日:2018-05-25

    Abstract: A mechanism for augmenting security features associated with internet of things devices located in home and/or office environments is provided. A method can comprise as a function of retrieved data associated with a device, displaying vulnerability data associated with the device; facilitating downloading of resolution data to the device based on the vulnerability data; facilitating reconfiguring of the device based on the resolution data; and allocating reward data representative of a reward to a user device based on the reconfiguring of the device being determined to have completed.

    Authentication using credentials submitted via a user premises device

    公开(公告)号:US10356096B2

    公开(公告)日:2019-07-16

    申请号:US15436731

    申请日:2017-02-17

    Abstract: An authentication system can be operable to receive from a user premises device credentials associated with a user identity, wherein the user premises device can also be operable to monitor and control a premise of the user identity. The authentication system can process the credentials and transmit an authentication verification to an on-line system to enable access to the on-line system by a user equipment of the user identity. The authentication system can be used as a factor (or additional factor) of authentication, for example, to gain sooner access to an on-line system that has locked out a user identity in response to a personal denial of service (PDoS) attack.

    Devices, systems, and methods for detecting proximity-based mobile malware propagation

    公开(公告)号:US10104118B2

    公开(公告)日:2018-10-16

    申请号:US15412275

    申请日:2017-01-23

    Abstract: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.

    RECOVERY OF SUBSCRIBER DATA IN MOBILE COMMUNICATION NETWORKS
    17.
    发明申请
    RECOVERY OF SUBSCRIBER DATA IN MOBILE COMMUNICATION NETWORKS 审中-公开
    在移动通信网络中恢复用户数据

    公开(公告)号:US20170031777A1

    公开(公告)日:2017-02-02

    申请号:US14811362

    申请日:2015-07-28

    CPC classification number: G06F11/1464 G06F11/1451 H04W8/30 H04W24/02

    Abstract: Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to recover subscriber data in mobile communication networks are disclosed. Example subscriber data recovery methods disclosed herein include communicating with mobile devices operating in a mobile network to configure the mobile devices to (1) locally store backup subscriber data corresponding to subscriber data maintained at a first network element to manage access to the mobile network and (2) transmit the backup subscriber data to a destination based on configuration data. Disclosed example methods also include queueing respective backup subscriber data received from respective ones of the mobile devices for transmission to at least one of the first network element and/or a second network element to restore the subscriber data maintained at a first network element.

    Abstract translation: 公开了在移动通信网络中恢复用户数据的方法,装置,系统和制品(例如,物理存储介质)。 本文公开的示例用户数据恢复方法包括与在移动网络中操作的移动设备进行通信,以将移动设备配置为(1)本地存储对应于维护在第一网络单元处的用户数据的备用用户数据,以管理对移动网络的接入和 2)根据配置数据将备份用户数据发送到目的地。 公开的示例性方法还包括排队从相应的移动设备接收的相应的备用用户数据,以传输到第一网元和/或第二网元中的至少一个,以恢复维护在第一网元上的用户数据。

    Verification service
    19.
    发明授权
    Verification service 有权
    验证服务

    公开(公告)号:US09325690B2

    公开(公告)日:2016-04-26

    申请号:US14283250

    申请日:2014-05-21

    CPC classification number: H04L63/08 H04L63/10 H04L63/126

    Abstract: Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions.

    Abstract translation: 这里公开了用于验证发送者信息的概念和技术。 根据本文公开的概念和技术的各种实施例,验证服务可以确定,接收请求或接收呼叫以验证与数据相关联的发送者信息。 响应于确定要提供发送者信息验证,服务器计算机生成并向发送者设备递送验证消息。 服务器计算机接收到指示数据是否由发送方设备发送的响应。 如果响应表示发件人设备没有发送数据,则服务器计算机可以阻止数据的传送,产生警报或警报,采取其他操作和/或不执行任何操作。 如果响应指示发送方设备发送数据,则服务器计算机可以传送数据,向接收方设备提供验证响应,不采取任何行动和/或采取其他操作。

    Devices, systems, and methods for detecting proximity-based mobile malware propagation
    20.
    发明授权
    Devices, systems, and methods for detecting proximity-based mobile malware propagation 有权
    用于检测基于邻近度的移动恶意软件传播的设备,系统和方法

    公开(公告)号:US09167003B2

    公开(公告)日:2015-10-20

    申请号:US14311433

    申请日:2014-06-23

    Abstract: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.

    Abstract translation: 公开了设备,系统和方法。 代理驻留在移动通信设备中。 代理检测基于邻近的移动恶意软件传播。 代理在候选连接列表中注入一个或多个触发网络连接。 这些连接显示为合法的网络和设备,而是触发与服务提供商网络上的代理服务器的连接。 通过尝试通过触发网络连接进行连接,恶意软件显示本身。 该系统在局部恶意软件爆发后,可以在短时间内收集恶意软件签名,但这种攻击通常会绕过网络中的网络安全检查。

Patent Agency Ranking