-
公开(公告)号:US11533333B2
公开(公告)日:2022-12-20
申请号:US15733663
申请日:2019-03-19
发明人: Xiao-Si Wang , Zhan Cui , Ian Herwono
IPC分类号: H04L9/40
摘要: A computer implemented method of protecting a target subnet, including a set of network connected devices in a hierarchy of subnets of a computer network, from malware attack. The method includes generating a dynamical system for each subnet in the network, each dynamical system modelling a rate of change of a number of network connected devices in the subnet that are: susceptible to infection by the malware; infected by the malware; protected against infection by the malware; and remediated of infection by the malware. The dynamical systems are based on rates of transmission of the malware between pairs of subnets; evaluating a measure of risk of infection of the target subnet at a predetermined point in time based on the dynamical system for the target subnet; and responsive to the measure of risk meeting a predetermined threshold, deploying malware protection measures to devices in the target subnet.
-
公开(公告)号:US11520882B2
公开(公告)日:2022-12-06
申请号:US16701857
申请日:2019-12-03
发明人: Giulio Giaconi
摘要: A computer implemented method of detecting anomalous behavior in a set of computer systems communicating via a computer network, the method including evaluating a difference in a level of activity of the computer system between a baseline time period and a runtime time period, and responsive to a determination of anomalous behavior, implementing one or more protective measures for the computer network.
-
公开(公告)号:US20220376902A1
公开(公告)日:2022-11-24
申请号:US17753774
申请日:2020-09-11
发明人: Ali SAJJAD , Gery DUCATEL , Gabriele GELARDI
IPC分类号: H04L9/08
摘要: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.
-
公开(公告)号:US11509747B2
公开(公告)日:2022-11-22
申请号:US17250241
申请日:2019-05-31
发明人: Ruth Brown , Jonathan Hart , Maria Cuevas Ramirez
IPC分类号: H04L29/08 , H04L67/63 , H04L67/1074 , H04L67/306 , H04L67/61 , H04L67/568
摘要: In a method of operating a content delivery network having a plurality of content caches to deliver requested content to at least one user device, the user device has one or more access network interfaces for connection to content caches of the content delivery network via one or more respective access networks, and the method is performed by a content delivery route decision function running on the user device and interfacing with the content delivery network and the access networks.
-
公开(公告)号:US11489764B2
公开(公告)日:2022-11-01
申请号:US16764940
申请日:2018-11-23
发明人: Thomas Curry , Malcolm Hubert
IPC分类号: H04L12/703 , H04L45/28 , H04L45/02 , H04L45/00 , H04L45/74
摘要: A communications router (6) is provided with an add-on device (7) for diverting data traffic over a replacement connection (70, 80) when a primary connection route (60) meets a failover criterion. Traffic addressed to an allocated network address associated with the primary connection (60) is diverted to a network termination of the replacement connection (70) by a routing function (31) if the replacement connection (70) has been authenticated by an authentication system (35). Authentication is provided by setting up an association between the internet IP address of the router (6) when addressed through the link (60), and a network identity of the add-in unit (7). This may achieved by having the add-on unit (7), when first installed, transmit its identity of a SIM over the fixed line connection (60) to the authentication system (35), which can then associate that SIM identity with the network address from which it has been received so that during a subsequent failover condition traffic addressed to the fixed-line network address can be diverted to the replacement connection, thereby allowing the same network address to be used during the failover condition.
-
公开(公告)号:US11489693B2
公开(公告)日:2022-11-01
申请号:US16620277
申请日:2018-06-08
发明人: Joshua Daniel , Paul Kearney
摘要: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record, wherein the network access point provides access to a local network inaccessible to the other network access point; and permitting access to the local network by the mobile device via the other network access point.
-
公开(公告)号:US11477691B2
公开(公告)日:2022-10-18
申请号:US15733673
申请日:2019-03-28
发明人: Ruth Brown , Jonathan Hart , Maria Cuevas
摘要: A method of managing data bearers between a cellular network subscriber device and a packet data gateway in a cellular network core, the cellular network subscriber device and the packet data gateway being connected by a default bearer, the method including receiving at least one dedicated bearer request for a communication session between the cellular network subscriber device and an external network resource; comparing at least one parameter of the received dedicated bearer against a set of predetermined rules; and if at least one parameter of the received dedicated bearer request matches at least one of the set of predetermined rules: storing the at least one parameter of the received dedicated bearer request; and sending a message to the subscriber device to cause the cellular network subscriber device and packet data gateway to use the default bearer for the communication session.
-
公开(公告)号:US11470548B2
公开(公告)日:2022-10-11
申请号:US16335863
申请日:2017-08-29
发明人: Richard Mackenzie , Michael Fitch
IPC分类号: H04W52/02
摘要: This disclosure provides a base station, and a method of operating a base station, in a cellular telecommunications network, the method including the first base station operating in energy saving mode; the first base station receiving a first message, the first message instructing the first base station to exit energy saving mode and to compensate for a second base station; and the first base station exiting energy saving mode and compensating for the second base station.
-
公开(公告)号:US11470109B2
公开(公告)日:2022-10-11
申请号:US15733664
申请日:2019-03-19
发明人: Xiao-Si Wang , Zhan Cui , Ian Herwono
摘要: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.
-
公开(公告)号:US11451398B2
公开(公告)日:2022-09-20
申请号:US16611701
申请日:2018-05-03
摘要: A computer implemented method of validating use of a computing resource by a an executing requester software module from a plurality of discrete software modules, the method including validating a characteristic of the requester software module; generating a first transaction defining criteria for consumption of the computing resource by the requester software module, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester software module to consume the computing resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.
-
-
-
-
-
-
-
-
-