SYSTEM AND METHOD FOR NETWORK DISTRIBUTION OF QUANTUM ENTANGLEMENT

    公开(公告)号:US20240421914A1

    公开(公告)日:2024-12-19

    申请号:US18816374

    申请日:2024-08-27

    Inventor: Moshiur Rahman

    Abstract: Aspects of the subject disclosure may include, for example, identifying a request to facilitate communications between first and second processing nodes, determining that the communications are to be established via quantum teleportation between, and identifying a network path comprising a first path segment to obtain a quantum channel, wherein quantum entanglement is established between the first and second processing nodes based on transportation of a first quantum entangled object via the quantum channel. A classical communication channel is facilitated between the first and second processing nodes, adapted to exchange between the nodes, quantum state information of a measurement performed upon the first quantum entangled object. Information is exchanged between the first and second processing nodes via the quantum channel according to the transported first quantum entangled object and the exchanged quantum state information. Other embodiments are disclosed.

    Carrier aggregation—handover synergism

    公开(公告)号:US12170930B2

    公开(公告)日:2024-12-17

    申请号:US17712874

    申请日:2022-04-04

    Abstract: Aspects of the subject disclosure may include, for example, determining a Reference Signal Received Power (RSRP) and a Signal to Noise Ratio (SNR) for a plurality of carriers at a user equipment (UE) device, the plurality of carriers transmitted by a source group of cells including a source primary cell (PCell) and one or more source secondary cells (SCells) associated with the source PCell, and initiating a handover of communication with the UE device from the source group of cells to a target group of cells, wherein the target group of cells includes a target PCell and one or more target SCells, wherein the initiating the handover is responsive to the RSRP exceeding a predetermined RSRP threshold and the SNR exceeding a predetermined SNR threshold. Other embodiments are disclosed.

    Correlating radio access network messages of aggressive mobile devices

    公开(公告)号:US12170912B2

    公开(公告)日:2024-12-17

    申请号:US18297982

    申请日:2023-04-10

    Inventor: Yaron Koral

    Abstract: Excessive signaling by devices against a radio access network (RAN) can be detected and mitigated. A security management component (SMC) can determine whether a total number of control signals received by a base station from devices satisfies a threshold total number of control signals indicative of excessive signaling. If so, SMC can identify a device associated with the base station based on analyzing communication conditions associated with the device. SMC can determine whether to classify the device as an excessive signaling device based on whether the number of control signals received from the device by the base station satisfies a threshold number of control signals indicative of excessive signaling. If so, SMC can determine the device is an excessive signaling device. In response, SMC can perform or facilitate performing a mitigation action to mitigate excessive signaling or can generate statistics relating to the excessive signaling.

    Automated security hangar for private cellular networks

    公开(公告)号:US12170904B2

    公开(公告)日:2024-12-17

    申请号:US17453266

    申请日:2021-11-02

    Inventor: Joseph Soryal

    Abstract: The described technology is generally directed towards an automated security hangar for private cellular networks. In response to detecting that a user equipment is departing a geographic area served by a private cellular network, the user equipment can encrypt its data and send it to a private cellular network server. The server can receive and securely store the encrypted data, and the server can provide a code to the user equipment. The user equipment can store the code, disconnect from the private cellular network, and depart the geographic area. When the user equipment returns to the geographic area and reconnects to the private cellular network, the user equipment can present the code to the server. The server can validate the code, the user equipment, and/or the operator of the user equipment, and the server can return the encrypted data to the user equipment.

    AUTOMATIC GENERATION OF TROJAN SIGNATURES FOR INTRUSION DETECTION

    公开(公告)号:US20240414196A1

    公开(公告)日:2024-12-12

    申请号:US18809079

    申请日:2024-08-19

    Abstract: A method includes acquiring a plurality of hypertext transfer protocol (HTTP) session packets associated with activities of a plurality of known Trojans, wherein all of the Trojans are identified by a common signature identifier, extracting a plurality of request packets from the session packets, identifying a plurality of suspicious request packets within the plurality of request packets, grouping the plurality of suspicious request packets into a plurality of subsets, computing a centroid of one subset of the plurality of subsets, identifying a representative packet for the subset, wherein the representative packet is identified based on the centroid, and generating a signature for the one subset, based on the representative packet, wherein the signature is deployable by an intrusion detection system to detect an instance of a Trojan of the plurality of known Trojans.

    METHODS, SYSTEMS, AND DEVICES TO DETERMINE MOST RECENTLY USED MESSAGING APPLICATION FOR DELIVERY OF MESSAGE(S)

    公开(公告)号:US20240414114A1

    公开(公告)日:2024-12-12

    申请号:US18809396

    申请日:2024-08-20

    Abstract: Aspects of the subject disclosure may include, for example, receiving, over a communication network, a first message utilizing a first messaging application from a first communication device associated with a first user and identifying a recipient of the first message as a second user associated with a second communication device. Further embodiments can include determining that the second user utilizes a second message application to exchange a first group of messages via the second communication device resulting in a first determination, and transmitting, over the communication network, the first message to the second communication device utilizing the second messaging application based on the first determination. Other embodiments are disclosed.

    Facilitating panoramic video streaming with brain-computer interactions

    公开(公告)号:US12167066B2

    公开(公告)日:2024-12-10

    申请号:US18067282

    申请日:2022-12-16

    Abstract: Aspects of the subject disclosure may include, for example, obtaining one or more signals, the one or more signals being based upon brain activity of a viewer while the viewer is viewing media content; predicting, based upon the one or more signals, a first predicted desired viewport of the viewer; obtaining head movement data associated with the media content; predicting, based upon the head movement data, a second predicted desired viewport of the viewer; comparing the first predicted desired viewport to the second predicted desired viewport, resulting in a comparison; and determining, based upon the comparison, to use the first predicted desired viewport to facilitate obtaining a first subsequent portion of the media content or to use the second predicted desired viewport to facilitate obtaining a second subsequent portion of the media content. Other embodiments are disclosed.

    System and Method for Quantum-Enabled Cyber Security in a Wireless Mobile Network

    公开(公告)号:US20240405887A1

    公开(公告)日:2024-12-05

    申请号:US18636335

    申请日:2024-04-16

    Inventor: Moshiur RAHMAN

    Abstract: Aspects of the subject disclosure may include, for example, monitoring a security status of a wireless communication session comprising a back-haul link supporting a classical communication channel between a wireless access point and a wireless mobility core network. The classical communication channel is adapted to transport underlying data of the wireless communication session and, responsive to determining a change in the security status, associating with the wireless communication session a quantum communication channel adapted to transport information via qubits. Information is exchanged between the wireless access point and the mobility core network via the qubits of the quantum communication channel, wherein the exchanging of the information via the qubits enhances a security level of the wireless communication session in view of a perceived threat. Other embodiments are disclosed.

    Peer-to-peer network for telecommunication network traffic rerouting

    公开(公告)号:US12160468B2

    公开(公告)日:2024-12-03

    申请号:US17804589

    申请日:2022-05-30

    Abstract: Devices, computer-readable media and methods are disclosed for establishing a peer-to-peer network for rerouting network traffic of a telecommunication network during a network disruption. For example, a processing system may detect a network disruption between a first device and a second device of the telecommunication network. The processing system may identify a first peering device having a connection to the first device of the telecommunication network, identify a second peering device having a connection to the second device of the telecommunication network, and establish a peer-to-peer network via at least the first peering device and the second peering device, wherein at least one of the first peering device or the second peering device is a mobile endpoint device configured to operate as a virtual network function. The processing system may then route network traffic between the first device and the second device via the peer-to-peer network.

    Correlating compromised home internet of things devices with distributed denial of service attacks

    公开(公告)号:US12160445B2

    公开(公告)日:2024-12-03

    申请号:US17724112

    申请日:2022-04-19

    Abstract: A distributed denial of service (“DDoS”) attack profiler can determine a plurality of DDoS attack properties associated with a DDoS attack that utilizes an Internet of Things (“IoT”) device operating in communication with a home gateway. The DDoS attack profiler can create a DDoS attack profile and can provide a DDoS attack report based upon the DDoS attack profile to a correlator. An IoT device profiler can determine a plurality of IoT device properties and can create, based upon the plurality of IoT device properties, an IoT device profile. The IoT device profiler can create an anomaly report that identifies an anomaly associated with the IoT device. The correlator can correlate the DDoS attack report with the anomaly report to determine if a match exists. In response to determining that the match exists, the home gateway system can store the bot match record in a bot match repository.

Patent Agency Ranking