-
公开(公告)号:US11431492B2
公开(公告)日:2022-08-30
申请号:US16911562
申请日:2020-06-25
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
Abstract: Security of network traffic may be increased by utilizing a mutable password to encrypt and decrypt content stored inside an executable utilizing a mutable password (e.g., where a password changes based on an equation when the executable is run). For example, the present password may be associated with a variable, the variable may be modified when the executable is run using the present password, and a subsequent password may be generated based on the modified variable.
-
公开(公告)号:US11409868B2
公开(公告)日:2022-08-09
申请号:US16584284
申请日:2019-09-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.
-
公开(公告)号:US20220121471A1
公开(公告)日:2022-04-21
申请号:US17562994
申请日:2021-12-27
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Dylan Reid , Joseph Soryal
IPC: G06F9/455 , G06F9/445 , G06F21/60 , G06F40/242 , G06F40/289
Abstract: A processing system of a device having at least one processor may obtain a set of codes from a virtual machine orchestrator via a virtualization security controller of the processing system, obtain a first virtual machine configuration file from the virtual machine orchestrator via a hypervisor of the processing system, and pass at least one code of the set of codes from the virtualization security controller to the hypervisor. The processing system may then apply, via the hypervisor, a decryption to the first virtual machine configuration file using the at least one code, determine that a threshold percentage of content of the first virtual machine configuration file comprises dictionary-recognizable words in accordance with the decryption, and instantiate, via the hypervisor, a first virtual machine in accordance with the first virtual machine configuration file when it is determined that the threshold percentage of the content comprises dictionary-recognizable words.
-
公开(公告)号:US11218486B2
公开(公告)日:2022-01-04
申请号:US16416680
申请日:2019-05-20
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Daniel Yaniro, Jr.
IPC: H04L29/06
Abstract: A method includes identifying a first validation parameter of a first network node and a second validation parameter of a second network node. The method includes creating an authentication node based on the first and second validation parameters. The method also includes receiving a request to access a microservice that utilizes the first network node and the second network node. The authentication node analyzes the request to make a validation determination indicative of whether the request satisfies the first and second validation parameters and controls access to the microservice based on the validation determination.
-
公开(公告)号:US11210128B2
公开(公告)日:2021-12-28
申请号:US16584413
申请日:2019-09-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
IPC: G06F9/455 , G06F9/445 , H04L29/06 , G06F21/60 , G06F40/242 , G06F40/289
Abstract: A processing system of a device having at least one processor may obtain a set of codes from a virtual machine orchestrator via a virtualization security controller of the processing system, obtain a first virtual machine configuration file from the virtual machine orchestrator via a hypervisor of the processing system, and pass at least one code of the set of codes from the virtualization security controller to the hypervisor. The processing system may then apply, via the hypervisor, a decryption to the first virtual machine configuration file using the at least one code, determine that a threshold percentage of content of the first virtual machine configuration file comprises dictionary-recognizable words in accordance with the decryption, and instantiate, via the hypervisor, a first virtual machine in accordance with the first virtual machine configuration file when it is determined that the threshold percentage of the content comprises dictionary-recognizable words.
-
公开(公告)号:US11178123B2
公开(公告)日:2021-11-16
申请号:US16584670
申请日:2019-09-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
IPC: H04N19/17 , H04L29/06 , H04L9/08 , H04N21/845 , H04L9/14
Abstract: A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.
-
公开(公告)号:US11176229B2
公开(公告)日:2021-11-16
申请号:US16590542
申请日:2019-10-02
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
Abstract: A processing system of a vehicle having at least one processor may obtain, from a network-based security system, at least a first security code, apply a hash operation to a firmware code of the vehicle in accordance with the at least the first security code to generate a first hash value, and transmit the first hash value to the network-based security system. The processing system may then obtain from the network-based security system at least a first verification code, the network-based security system providing the at least the first verification code in response to a confirmation of the first hash value, apply the at least the first verification code to a verification function, and generate a signal to enable the operation of the vehicle, in response to a positive verification via the verification function.
-
公开(公告)号:US20210097181A1
公开(公告)日:2021-04-01
申请号:US16584284
申请日:2019-09-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.
-
公开(公告)号:US20210096895A1
公开(公告)日:2021-04-01
申请号:US16584413
申请日:2019-09-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Dylan Reid , Joseph Soryal
Abstract: A processing system of a device having at least one processor may obtain a set of codes from a virtual machine orchestrator via a virtualization security controller of the processing system, obtain a first virtual machine configuration file from the virtual machine orchestrator via a hypervisor of the processing system, and pass at least one code of the set of codes from the virtualization security controller to the hypervisor. The processing system may then apply, via the hypervisor, a decryption to the first virtual machine configuration file using the at least one code, determine that a threshold percentage of content of the first virtual machine configuration file comprises dictionary-recognizable words in accordance with the decryption, and instantiate, via the hypervisor, a first virtual machine in accordance with the first virtual machine configuration file when it is determined that the threshold percentage of the content comprises dictionary-recognizable words.
-
公开(公告)号:US20210004462A1
公开(公告)日:2021-01-07
申请号:US16459043
申请日:2019-07-01
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
IPC: G06F21/56
Abstract: In one example, a method performed by a processing system of a server includes sending an instruction to a controller installed on an integrated circuit chip of a remote computing device, wherein the instruction requests that the controller issue a challenge to the integrated circuit, receiving a first signature of the integrated circuit chip from the controller, wherein the first signature is derived by the controller from a response of the integrated circuit chip to the challenge, comparing the first signature to a second signature that is stored on the server, wherein the second signature was derived through testing of the integrated circuit chip prior to the integrated circuit chip being deployed in the remote computing device, and generating an alert when the first signature fails to match the second signature, wherein the alert indicates that the integrated circuit chip may have been tampered with.
-
-
-
-
-
-
-
-
-