Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation
    21.
    发明申请
    Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation 有权
    用于检测基于邻近的移动恶意软件传播的设备,系统和方法

    公开(公告)号:US20140304820A1

    公开(公告)日:2014-10-09

    申请号:US14311433

    申请日:2014-06-23

    Abstract: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.

    Abstract translation: 公开了设备,系统和方法。 代理驻留在移动通信设备中。 代理检测基于邻近的移动恶意软件传播。 代理在候选连接列表中注入一个或多个触发网络连接。 这些连接显示为合法的网络和设备,而是触发与服务提供商网络上的代理服务器的连接。 通过尝试通过触发网络连接进行连接,恶意软件显示本身。 该系统在局部恶意软件爆发后,可以在短时间内收集恶意软件签名,但这种攻击通常会绕过网络中的网络安全检查。

    Enabling machine-to-machine communication for digital assistants

    公开(公告)号:US12300231B2

    公开(公告)日:2025-05-13

    申请号:US17940082

    申请日:2022-09-08

    Abstract: Enabling machine-to-machine communication for digital assistants can include initiating a call with a called device, generating audio stream data having a first instance of audio and a first spoken command, which can be provided to the called device. A second instance of audio stream data can be received from the called device, can include a second spoken command, and can be analyzed to determine if it includes assistant signature data. If the second instance of audio stream data includes the assistant signature data, the devices can switch to machine-to-machine communications.

    ENHANCED LEARNING AND DETERMINATION OF SECURITY RULES FOR DATA TRAFFIC

    公开(公告)号:US20250016203A1

    公开(公告)日:2025-01-09

    申请号:US18890235

    申请日:2024-09-19

    Inventor: Wei Wang

    Abstract: Security rules to apply to resources, including virtual machines (VMs), in the cloud and on network edges can be learned, determined, and tested. A security management component (SMC) can analyze information relating to data traffic associated with a group of resources associated with a tenant. The analysis can comprise an artificial intelligence analysis. Ingress/egress of the data traffic to/from resources of the group of resources initially can be controlled based on a group of security rules selected by the tenant. Based on a result of the analyzing, SMC can determine a modified group of security rules to apply to the group of resources to control ingress/egress of subsequent data traffic to/from the resources, wherein the result of the analyzing can indicate respective first relationships determined between respective resources and respective second relationships determined between the respective resources and respective network addresses associated with the cloud network.

    Enhanced learning and determination of security rules for data traffic

    公开(公告)号:US12126656B2

    公开(公告)日:2024-10-22

    申请号:US17507526

    申请日:2021-10-21

    Inventor: Wei Wang

    CPC classification number: H04L63/205 G06N20/00 H04L41/14 H04L41/16 H04L67/10

    Abstract: Security rules to apply to resources, including virtual machines (VMs), in the cloud and on network edges can be learned, determined, and tested. A security management component (SMC) can analyze information relating to data traffic associated with a group of resources associated with a tenant. The analysis can comprise an artificial intelligence analysis. Ingress/egress of the data traffic to/from resources of the group of resources initially can be controlled based on a group of security rules selected by the tenant. Based on a result of the analyzing, SMC can determine a modified group of security rules to apply to the group of resources to control ingress/egress of subsequent data traffic to/from the resources, wherein the result of the analyzing can indicate respective first relationships determined between respective resources and respective second relationships determined between the respective resources and respective network addresses associated with the cloud network.

    METHOD AND SYSTEM FOR OUT-OF-BAND USER IDENTIFICATION IN THE METAVERSE VIA BIOGRAPHICAL (BIO) ID

    公开(公告)号:US20240137223A1

    公开(公告)日:2024-04-25

    申请号:US17973072

    申请日:2022-10-24

    CPC classification number: H04L9/3231 H04L9/3236 H04L41/16

    Abstract: Aspects of the subject disclosure may include, for example, detecting a need to verify an identity of a particular user in the metaverse, obtaining a particular hash/encoding associated with the particular user, wherein the particular hash/encoding is generated based on processing of a video, image, voice recording, or biometric information associated with the particular user, retrieving a second hash/encoding from a user profile of a first user, wherein the second hash/encoding corresponds to a second user and is generated based on processing of a video, image, voice recording, or biometric information associated with the second user, performing a comparison of the second hash/encoding and the particular hash/encoding, and based on a determination that there is a match, identifying that the particular user corresponds to the second user, resulting in a verification of the identity of the particular user. Other embodiments are disclosed.

    Providing and Using a User Login Protection Service

    公开(公告)号:US20240106652A1

    公开(公告)日:2024-03-28

    申请号:US17951184

    申请日:2022-09-23

    CPC classification number: H04L9/3226 H04L9/3247

    Abstract: Providing and using a user login protection service can include detecting, during a login creation process, input that indicates that a computing device has opted-in for protection for a login being created. During the login creation process, the login can be stored at a first data storage location, the login including an address that identifies a location of a distributed ledger and a password, and a reset password at a second data storage location comprising a secure data storage device. In response to detecting an attempt to log in to the third party device to access the resource, a value associated with the distributed ledger can be obtained, the value indicating a status of a trigger condition associated with the login. If the value is zero, the attempt to log in can be allowed to proceed. If the value is one, the attempt to log in can be blocked.

    EMERGENCY AD HOC DEVICE COMMUNICATION MONITORING

    公开(公告)号:US20240095968A1

    公开(公告)日:2024-03-21

    申请号:US17932867

    申请日:2022-09-16

    CPC classification number: G06T11/00 H04W4/90

    Abstract: The disclosed technology is directed towards presenting communications data to a responding entity that are relevant to an emergency situation at an emergency location. The communications data can be obtained from communications (e.g., text messages, transmitted video, voice calls and the like) that involve at least one user device at the situation, including communications that do not involve the responding entity. Users may opt in to such an emergency service to allow access to their communications, whereby their device locations are tracked and known in the event of an emergency. Upon obtaining the communications data, a responder can receive a view of the scene augmented with the communications data. The view can include a three-dimensional and/or two-dimensional representation of the zone/area of the emergency situation. Filtering can be used to eliminate irrelevant communications, and summarization can be used to combine generally redundant communications.

    SMART SECURITY ASSISTANT FOR RESIDENTIAL AND OFFICE ENVIRONMENTS

    公开(公告)号:US20230037710A1

    公开(公告)日:2023-02-09

    申请号:US17394883

    申请日:2021-08-05

    Abstract: Aspects of the subject disclosure may include, for example, a mobile assistant device that obtains information regarding device locations of a plurality of devices; the mobile assistant device is enabled to move among at least a portion of the device locations. The mobile assistant device detects an indication of a need for maintenance, repair, and/or user attention, relating to a target device. The mobile assistant device moves to a location of the target device; obtains device information regarding a condition of the target device; and reports the device information to equipment of the user and/or a controller of the mobile assistant device. The mobile assistant device engages with the user and/or equipment of the user to provide instructions to the equipment of the user for resolving an issue relating to the target device, and can physically engage with the target device to resolve the issue. Other embodiments are disclosed.

Patent Agency Ranking