Malware infection prediction
    11.
    发明授权

    公开(公告)号:US11533333B2

    公开(公告)日:2022-12-20

    申请号:US15733663

    申请日:2019-03-19

    IPC分类号: H04L9/40

    摘要: A computer implemented method of protecting a target subnet, including a set of network connected devices in a hierarchy of subnets of a computer network, from malware attack. The method includes generating a dynamical system for each subnet in the network, each dynamical system modelling a rate of change of a number of network connected devices in the subnet that are: susceptible to infection by the malware; infected by the malware; protected against infection by the malware; and remediated of infection by the malware. The dynamical systems are based on rates of transmission of the malware between pairs of subnets; evaluating a measure of risk of infection of the target subnet at a predetermined point in time based on the dynamical system for the target subnet; and responsive to the measure of risk meeting a predetermined threshold, deploying malware protection measures to devices in the target subnet.

    Multi factor network anomaly detection

    公开(公告)号:US11520882B2

    公开(公告)日:2022-12-06

    申请号:US16701857

    申请日:2019-12-03

    发明人: Giulio Giaconi

    IPC分类号: G06F21/55 G06N3/08

    摘要: A computer implemented method of detecting anomalous behavior in a set of computer systems communicating via a computer network, the method including evaluating a difference in a level of activity of the computer system between a baseline time period and a runtime time period, and responsive to a determination of anomalous behavior, implementing one or more protective measures for the computer network.

    RESOURCE ACCESS CONTROL
    13.
    发明申请

    公开(公告)号:US20220376902A1

    公开(公告)日:2022-11-24

    申请号:US17753774

    申请日:2020-09-11

    IPC分类号: H04L9/08

    摘要: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.

    Failover system and method for diverting data traffic over a replacement access network

    公开(公告)号:US11489764B2

    公开(公告)日:2022-11-01

    申请号:US16764940

    申请日:2018-11-23

    摘要: A communications router (6) is provided with an add-on device (7) for diverting data traffic over a replacement connection (70, 80) when a primary connection route (60) meets a failover criterion. Traffic addressed to an allocated network address associated with the primary connection (60) is diverted to a network termination of the replacement connection (70) by a routing function (31) if the replacement connection (70) has been authenticated by an authentication system (35). Authentication is provided by setting up an association between the internet IP address of the router (6) when addressed through the link (60), and a network identity of the add-in unit (7). This may achieved by having the add-on unit (7), when first installed, transmit its identity of a SIM over the fixed line connection (60) to the authentication system (35), which can then associate that SIM identity with the network address from which it has been received so that during a subsequent failover condition traffic addressed to the fixed-line network address can be diverted to the replacement connection, thereby allowing the same network address to be used during the failover condition.

    Home network access
    16.
    发明授权

    公开(公告)号:US11489693B2

    公开(公告)日:2022-11-01

    申请号:US16620277

    申请日:2018-06-08

    摘要: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record, wherein the network access point provides access to a local network inaccessible to the other network access point; and permitting access to the local network by the mobile device via the other network access point.

    Dedicated bearer management
    17.
    发明授权

    公开(公告)号:US11477691B2

    公开(公告)日:2022-10-18

    申请号:US15733673

    申请日:2019-03-28

    摘要: A method of managing data bearers between a cellular network subscriber device and a packet data gateway in a cellular network core, the cellular network subscriber device and the packet data gateway being connected by a default bearer, the method including receiving at least one dedicated bearer request for a communication session between the cellular network subscriber device and an external network resource; comparing at least one parameter of the received dedicated bearer against a set of predetermined rules; and if at least one parameter of the received dedicated bearer request matches at least one of the set of predetermined rules: storing the at least one parameter of the received dedicated bearer request; and sending a message to the subscriber device to cause the cellular network subscriber device and packet data gateway to use the default bearer for the communication session.

    Cellular telecommunications network

    公开(公告)号:US11470548B2

    公开(公告)日:2022-10-11

    申请号:US16335863

    申请日:2017-08-29

    IPC分类号: H04W52/02

    摘要: This disclosure provides a base station, and a method of operating a base station, in a cellular telecommunications network, the method including the first base station operating in energy saving mode; the first base station receiving a first message, the first message instructing the first base station to exit energy saving mode and to compensate for a second base station; and the first base station exiting energy saving mode and compensating for the second base station.

    Malware barrier
    19.
    发明授权

    公开(公告)号:US11470109B2

    公开(公告)日:2022-10-11

    申请号:US15733664

    申请日:2019-03-19

    IPC分类号: H04L29/06 H04L9/40

    摘要: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.

    Management of interoperating machine learning algorithms

    公开(公告)号:US11451398B2

    公开(公告)日:2022-09-20

    申请号:US16611701

    申请日:2018-05-03

    摘要: A computer implemented method of validating use of a computing resource by a an executing requester software module from a plurality of discrete software modules, the method including validating a characteristic of the requester software module; generating a first transaction defining criteria for consumption of the computing resource by the requester software module, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester software module to consume the computing resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.