-
公开(公告)号:US12068936B2
公开(公告)日:2024-08-20
申请号:US17452219
申请日:2021-10-25
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
IPC: G06F15/16 , H04L9/06 , H04L9/08 , H04L43/0876 , H04L45/125 , H04L47/72 , H04L9/00
CPC classification number: H04L43/0876 , H04L9/0643 , H04L9/0819 , H04L9/088 , H04L45/125 , H04L47/72 , H04L9/50
Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.
-
22.
公开(公告)号:US12028374B2
公开(公告)日:2024-07-02
申请号:US17373365
申请日:2021-07-12
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Reid
CPC classification number: H04L63/1483 , G06N5/04 , G06N20/00
Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.
-
公开(公告)号:US12003366B2
公开(公告)日:2024-06-04
申请号:US17939072
申请日:2022-09-07
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
IPC: H04L41/0806 , G06F9/455 , H04L41/00 , H04L41/06 , H04L41/0893 , H04L43/50
CPC classification number: H04L41/0806 , G06F9/455 , H04L41/06 , H04L41/0893 , H04L41/20 , H04L43/50
Abstract: A system includes an orchestrator for a software-defined network and configured to receive a request for operation of the software-defined network, a software-defined network controller in communication with the orchestrator through a northbound application programming interface, at least one network element in communication with the software defined network controller though a southbound application programming interface, and a mutable network element configured to receive the request and instantiate a virtual function within the mutable network element to test the at least one network element in accordance with the request.
-
公开(公告)号:US20230388796A1
公开(公告)日:2023-11-30
申请号:US17826458
申请日:2022-05-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Reid
IPC: H04W12/06 , G06T19/00 , G06T19/20 , H04L67/131 , H04L67/10
CPC classification number: H04W12/06 , G06T19/006 , G06T19/20 , H04L67/131 , H04L67/10 , G06T2219/2021
Abstract: Aspects of the subject disclosure may include, for example, a device, including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of authenticating an identity of a user of user equipment that controls a virtual entity in a virtual environment; receiving a data feed providing images from the virtual environment; correlating signals from the user equipment with actions of the virtual entity observed in the images; and issuing a warning responsive to the user being unidentified or the signals being uncorrelated with the actions. Other embodiments are disclosed.
-
25.
公开(公告)号:US20230010945A1
公开(公告)日:2023-01-12
申请号:US17373365
申请日:2021-07-12
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Reid
Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.
-
公开(公告)号:US20220318385A1
公开(公告)日:2022-10-06
申请号:US17840723
申请日:2022-06-15
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.
-
-
-
-
-