-
公开(公告)号:US09600686B2
公开(公告)日:2017-03-21
申请号:US14984363
申请日:2015-12-30
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Andrea Forte , Evgene Vahlis
CPC classification number: G06F21/6227 , G06F21/6209 , H04L9/08 , H04L9/0819 , H04L9/0822 , H04L63/0428 , H04L63/062
Abstract: A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.
-
公开(公告)号:US20160357986A1
公开(公告)日:2016-12-08
申请号:US15213093
申请日:2016-07-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Gustavo de los Reyes , Andrea Forte , Juan A. Garay , David Crawford Gibbon , Zhu Liu , Evgene Vahlis , Eric Zavesky
CPC classification number: G06F21/6245 , G06F21/6227 , G06F2221/2107 , G09C5/00 , H04L9/088 , H04N1/32272 , H04N1/4486
Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.
-
公开(公告)号:US20150154598A1
公开(公告)日:2015-06-04
申请号:US14094167
申请日:2013-12-02
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Andrea Forte , Juan A. Garay , Trevor Jim , Evgene Vahlis
CPC classification number: G06F3/04886 , G06F3/041 , G06F3/0412 , G06F3/0488 , G06F21/83 , G06Q20/1085 , G06Q20/204 , G06Q20/206 , G06Q20/3227 , G06Q20/3276 , G06Q20/3278 , G06Q20/34 , G06Q20/38215 , G06Q20/3825 , G06Q20/385 , G06Q20/4012 , G07F7/1041 , H04L9/0822 , H04L9/14 , H04L9/30
Abstract: Methods of obtaining input on a physical input device are provided. A virtual input device is superimposed over the physical input device. The virtual input device has a different layout than the physical input device, such that a first input on the physical input device is mapped to a different input on the virtual input device. In another aspect, methods of securing a transaction according include displaying a first input screen to a user, encrypting a scrambling key using a public key, the scrambling key defining a second input screen that has a different layout from the first input screen, transmitting the encrypted scrambling key to a user device, receiving an input from the user device, and mapping the input to the second input screen.
Abstract translation: 提供了在物理输入设备上获取输入的方法。 虚拟输入设备叠加在物理输入设备上。 虚拟输入设备具有与物理输入设备不同的布局,使得物理输入设备上的第一输入被映射到虚拟输入设备上的不同输入。 另一方面,确保交易的方法包括向用户显示第一输入屏幕,使用公共密钥加密加密密钥,所述加扰密钥定义与第一输入屏幕具有不同布局的第二输入屏幕,发送 加密的加密密钥给用户设备,从用户设备接收输入,并将输入映射到第二输入屏幕。
-
14.
公开(公告)号:US10437469B2
公开(公告)日:2019-10-08
申请号:US15374337
申请日:2016-12-09
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Andrea Forte , Juan A. Garay , Trevor Jim , Evgene Vahlis
IPC: G06F9/48 , G06F3/0488 , G06F21/83 , G06F3/041 , G06Q20/10 , G06Q20/20 , G06Q20/32 , G06Q20/34 , G06Q20/38 , G06Q20/40 , G07F7/10 , H04L9/08 , H04L9/14 , H04L9/30
Abstract: Methods of obtaining input on a physical input device are provided. A method includes superimposing an image of a virtual keypad over an image of a touchscreen keypad, wherein the virtual keypad device has a different layout than the touchscreen keypad, mapping a first input on the touchscreen keypad to a second input on the virtual keypad, wherein the second input is different from the first input, and displaying on the touchscreen keypad a visually encoded symbol that defines a mapping from the touchscreen keypad to the virtual keypad, wherein mapping the first input on the touchscreen keypad to the second input on the virtual keypad is performed in response to the visually encoded symbol.
-
公开(公告)号:US20170090750A1
公开(公告)日:2017-03-30
申请号:US15374337
申请日:2016-12-09
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Andrea Forte , Juan A. Garay , Trevor Jim , Evgene Vahlis
CPC classification number: G06F3/04886 , G06F3/041 , G06F3/0412 , G06F3/0488 , G06F21/83 , G06Q20/1085 , G06Q20/204 , G06Q20/206 , G06Q20/3227 , G06Q20/3276 , G06Q20/3278 , G06Q20/34 , G06Q20/38215 , G06Q20/3825 , G06Q20/385 , G06Q20/4012 , G07F7/1041 , H04L9/0822 , H04L9/14 , H04L9/30
Abstract: Methods of obtaining input on a physical input device are provided. A method includes superimposing an image of a virtual keypad over an image of a touchscreen keypad, wherein the virtual keypad device has a different layout than the touchscreen keypad, mapping a first input on the touchscreen keypad to a second input on the virtual keypad, wherein the second input is different from the first input, and displaying on the touchscreen keypad a visually encoded symbol that defines a mapping from the touchscreen keypad to the virtual keypad, wherein mapping the first input on the touchscreen keypad to the second input on the virtual keypad is performed in response to the visually encoded symbol.
-
16.
公开(公告)号:US09392001B2
公开(公告)日:2016-07-12
申请号:US14283248
申请日:2014-05-21
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Qi Shen , Andrea Forte , Jeffrey Bickford
CPC classification number: H04L63/14 , G06F21/552 , G06F21/566 , H04L63/1491
Abstract: Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.
Abstract translation: 这里公开了用于入侵检测的多层欺骗的概念和技术。 根据本文公开的概念和技术的各种实施例,多层欺骗系统包括蜂蜜服务器,蜂蜜文件和文件夹,蜂蜜数据库和/或蜂蜜计算机。 多层欺骗系统控制器在蜂蜜实体之间产生蜂蜜活动,并且露出具有与蜂蜜用户相关联的联系信息的蜂蜜简档。 任何蜂蜜实体的蜂蜜用户和/或活动的联系可以触发报警和/或指示攻击,并且可以进行分析以防止将来的攻击。
-
公开(公告)号:US20160004870A1
公开(公告)日:2016-01-07
申请号:US14320774
申请日:2014-07-01
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Andrea Forte , Edward G. Amoroso , Gustavo de los Reyes , Mikhail Istomin
IPC: G06F21/60 , G06N99/00 , H04L12/911
CPC classification number: G06F21/57 , G06N99/005 , H04L63/0272 , H04L63/20
Abstract: Concepts and technologies disclosed herein are directed to a personal security agent. According to one aspect disclosed herein, a compute resource includes a processor that can execute the personal security agent to perform operations. The compute resource can receive data from a data source. The compute resource can receive a job request to provide security for an entity. The job request can include a job requirement. The compute resource can analyze the job requirement and the data to determine an action. The compute resource can provide instructions for executing the action to a controller domain. The controller domain can execute the action in at least partial fulfillment of the job requirement.
Abstract translation: 本文公开的概念和技术涉及个人安全代理。 根据本文公开的一个方面,计算资源包括可以执行个人安全代理执行操作的处理器。 计算资源可以从数据源接收数据。 计算资源可以接收作业请求,为实体提供安全性。 作业请求可以包括作业要求。 计算资源可以分析作业要求和数据以确定操作。 计算资源可以向控制器域提供执行操作的指令。 控制器域可以至少部分履行作业要求来执行操作。
-
公开(公告)号:US10467427B2
公开(公告)日:2019-11-05
申请号:US15213093
申请日:2016-07-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Gustavo de los Reyes , Andrea Forte , Juan A. Garay , David Crawford Gibbon , Zhu Liu , Evgene Vahlis , Eric Zavesky
Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.
-
公开(公告)号:US09526024B2
公开(公告)日:2016-12-20
申请号:US14454497
申请日:2014-08-07
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Andrea Forte
CPC classification number: H04W12/08 , H04L41/0803 , H04L43/0811 , H04L45/02 , H04L45/64 , H04L63/10 , H04L63/102 , H04L63/1408 , H04W4/02 , H04W12/12 , H04W24/10 , H04W64/00 , H04W84/18
Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.
Abstract translation: 这里公开了个人虚拟核心网络的概念和技术。 执行网络访问服务的处理器可以确定用户设备是否应该与在具有连接性的位置处提供设备的核心网络隔离。 如果处理器确定用户设备应该被隔离,则处理器可以识别支持连接的资源。 资源可以包括网络资源和核心网。 处理器可以创建虚拟核心网络来支持连接,并激活虚拟核心网络。
-
公开(公告)号:US20160110560A1
公开(公告)日:2016-04-21
申请号:US14984363
申请日:2015-12-30
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Andrea Forte , Evgene Vahlis
CPC classification number: G06F21/6227 , G06F21/6209 , H04L9/08 , H04L9/0819 , H04L9/0822 , H04L63/0428 , H04L63/062
Abstract: A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.
-
-
-
-
-
-
-
-
-