-
公开(公告)号:US20240069986A1
公开(公告)日:2024-02-29
申请号:US17899747
申请日:2022-08-31
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Lars Johnson
IPC: G06F9/54
CPC classification number: G06F9/542
Abstract: Providing and using an activity logging service can include registering an activity logging service with a hash ledger storage service that can store a hash ledger that represents an activity log for an entity, and registering an observer device with the activity logging service. The observer device can provide event data to the activity logging service, and the event data can describe an event associated with the entity. The event data can be obtained from the observer device and a block that represents the event can be generated. A block can be added to the activity log, and a hash of a portion of the activity log can be generated and sent to the hash ledger storage service. The hash ledger storage service can be configured to append the hash of the portion of the activity log to the hash ledger that represents the activity log for the entity.
-
公开(公告)号:US20230353547A1
公开(公告)日:2023-11-02
申请号:US17731558
申请日:2022-04-28
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Mikhail Istomin
CPC classification number: H04L63/0478 , H04L9/0816 , H04L9/14
Abstract: A processing system may obtain a first source data and encoding the first source data in accordance with a first key via an encoder associated with an encoder-decoder model to generate a first source data encoding that is a first output of the encoder and a second key that is a second output of the encoder. The processing system may then transmit the first source data encoding to a recipient system, where the second key is for generating a second source data encoding for transmission by the processing system to the recipient system. A processing system may also obtain a first encoded source data from a sending system, apply the first encoded source data and a first key as inputs to a decoder associated with an encoder-decoder model to obtain a first decoded source data and a second key as outputs, and present the first decoded source data.
-
公开(公告)号:US20230128064A1
公开(公告)日:2023-04-27
申请号:US17507526
申请日:2021-10-21
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang
Abstract: Security rules to apply to resources, including virtual machines (VMs), in the cloud and on network edges can be learned, determined, and tested. A security management component (SMC) can analyze information relating to data traffic associated with a group of resources associated with a tenant. The analysis can comprise an artificial intelligence analysis. Ingress/egress of the data traffic to/from resources of the group of resources initially can be controlled based on a group of security rules selected by the tenant. Based on a result of the analyzing, SMC can determine a modified group of security rules to apply to the group of resources to control ingress/egress of subsequent data traffic to/from the resources, wherein the result of the analyzing can indicate respective first relationships determined between respective resources and respective second relationships determined between the respective resources and respective network addresses associated with the cloud network.
-
公开(公告)号:US20230067756A1
公开(公告)日:2023-03-02
申请号:US17465028
申请日:2021-09-02
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang
Abstract: The system may obtain log data and other device/statistical information and automatically identify a normal user experience, positive user experience, negative user experience, or the like. For the negative user experience, different groups of anomalies can be further identified as different types of negative user experiences. Such a system can initiate more targeted user experience study, identify software bugs, configuration issues, or security risks.
-
公开(公告)号:US20220158974A1
公开(公告)日:2022-05-19
申请号:US17097078
申请日:2020-11-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Cristina Serban
IPC: H04L29/06
Abstract: Security management for Internet-of-things devices can include device-level security, hub-level security, and service-level security. Internet-of-things devices can communicate threats to each other and/or to an Internet-of-things hub on a gateway. The gateway can receive a communication associated with an Internet-of-things device, the communication request including a request for the Internet-of-things device to connect with another device. Based on connection data included in security communications received from the Internet-of-things device, the gateway can determine if the communication associated with the Internet-of-things device should be allowed. If the communication associated with the Internet-of-things device should not be allowed, an action can be taken to limit the communication, If the communication should be allowed, the communication can be allowed.
-
公开(公告)号:US20210185071A1
公开(公告)日:2021-06-17
申请号:US17189232
申请日:2021-03-01
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Jeffrey Bickford , Wei Wang
IPC: H04L29/06 , H04W4/12 , H04W12/128
Abstract: A method, computer-readable medium, and apparatus for classifying mobile traffic for securing a network or a mobile user endpoint device are disclosed. For example, a method may include a processor for classifying mobile network traffic using a probabilistic model for a plurality of mobile software applications based on a distribution of domain names, detecting an anomaly associated with a mobile software application of the plurality of mobile software applications, and performing a remedial action to address the anomaly.
-
公开(公告)号:US10652272B2
公开(公告)日:2020-05-12
申请号:US15602241
申请日:2017-05-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Mikhail Istomin , Wei Wang
Abstract: A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach.
-
公开(公告)号:US20190289008A1
公开(公告)日:2019-09-19
申请号:US16429643
申请日:2019-06-03
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Cristina Serban , Wei Wang
Abstract: An authentication system can be operable to receive from a user premises device credentials associated with a user identity, wherein the user premises device can also be operable to monitor and control a premise of the user identity. The authentication system can process the credentials and transmit an authentication verification to an on-line system to enable access to the on-line system by a user equipment of the user identity. The authentication system can be used as a factor (or additional factor) of authentication, for example, to gain sooner access to an on-line system that has locked out a user identity in response to a personal denial of service (PDoS) attack.
-
公开(公告)号:US09773068B2
公开(公告)日:2017-09-26
申请号:US15269096
申请日:2016-09-19
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Andrea G. Forte , Baris Coskun , Qi Shen , Ilona Murynets , Jeffrey Bickford , Mikhail Istomin , Paul Giura , Roger Piqueras Jover , Ramesh Subbaraman , Suhas Mathur , Wei Wang
CPC classification number: G06F17/30867 , G06F17/30554 , G06Q10/00
Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
-
公开(公告)号:US20170264636A1
公开(公告)日:2017-09-14
申请号:US15602241
申请日:2017-05-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Mikhail Istomin , Wei Wang
IPC: H04L29/06
CPC classification number: H04L63/1441 , H04L63/1416
Abstract: A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach.
-
-
-
-
-
-
-
-
-