Zero Day Attack Detection
    671.
    发明申请

    公开(公告)号:US20220171849A1

    公开(公告)日:2022-06-02

    申请号:US17105851

    申请日:2020-11-27

    Inventor: Joseph Soryal

    Abstract: The concepts and technologies disclosed herein are directed to zero day attack detection. A system can monitor, by a sequence manager, a sequence of transaction requests. The sequence manager can determine whether a transaction request in the sequence is anomalous. In response to determining that the transaction request is anomalous, and before the allowing the system to process the transaction request, the sequence manager can provide the sequence of transaction requests to a sequence emulator. The sequence emulator can attempt to verify an output of the sequence of transaction requests. The sequence manager can receive a notification from the sequence emulator. The notification can indicate whether the output of the sequence of transaction requests can be verified. In response, the sequence manager can instruct the system to deny (if the output cannot be verified) or allow (if the output can be verified) processing of the sequence of transaction requests.

    Methods and systems to dynamically extend wireless service assurance capability

    公开(公告)号:US11350488B2

    公开(公告)日:2022-05-31

    申请号:US16928852

    申请日:2020-07-14

    Abstract: Aspects of the subject disclosure may include, for example, detecting that first user equipment is communicating with a first wireless access point, the communicating with the first wireless access point being via a first radio access technology, and the communicating with the first wireless access point using a first radio access technology packet format; detecting whether the first user equipment will be transitioning to communicating with a second wireless access point, the communicating with the second wireless access point being via a second radio access technology, and the communicating with the second wireless access point using a second radio access technology packet format, the second radio access technology being a different radio access technology than the first radio access technology, and the second radio access technology packet format being a packet format different than the first radio access technology packet format; and responsive to a detection that the first user equipment will be transitioning to communicating with the second wireless access point, encapsulating data that would have otherwise been in one or more packets according to the first radio access technology packet format into one or more other packets according to the second radio access technology packet format, the one or more other packets facilitating a communication between the first user equipment and the second wireless access point. Other embodiments are disclosed.

    Grid reference system wireless network anomaly detection and visualization

    公开(公告)号:US11350301B2

    公开(公告)日:2022-05-31

    申请号:US16843370

    申请日:2020-04-08

    Abstract: A processing system including at least one processor may obtain a request that identifies a region associated with a wireless communication network, identify sub-areas within the region, obtain performance indicator data for the sub-areas for a plurality of time periods from mobile devices within each sub-area, and apply an adaptive thresholding to the performance indicator data for each sub-area to determine one or more thresholds associated with the performance indicator data. The processing system may further identify a risk level, from among a plurality of risk levels, for each sub-area for at least one time periods based upon the one or more thresholds and the performance indicator data for each sub-area, where the one or more thresholds define one or more risk levels of the plurality of risk levels, and provide reporting data indicating the risk level for each sub-area for the at least one time period.

    Machine learning-based deployment of guardrail policies

    公开(公告)号:US11349911B1

    公开(公告)日:2022-05-31

    申请号:US17230150

    申请日:2021-04-14

    Abstract: A system can receive a guardrail policy request that specifies a guardrail policy to assess for deployment on a server to protect at least a specific port of the server. The system can execute a fingerprint clustering machine learning model using server fingerprint data to generate cluster data that identifies a virtual machine cluster that includes a plurality of virtual machines executed by the server. The system can execute a traffic discovery machine learning model using server traffic data and the cluster data to generate a confidence score indicative of whether deployment of the guardrail policy would have an adverse impact on the server. The system can execute a risk assessment machine learning model using the application type data to generate a risk assessment score. The system can evaluate the confidence score and the risk assessment score and can determine whether the guardrail policy should be deployed on the server.

    Estimating network data streaming rate

    公开(公告)号:US11349887B2

    公开(公告)日:2022-05-31

    申请号:US16548904

    申请日:2019-08-23

    Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for estimating the streaming rate at which data is delivered over a network. For instance, in one example, a data packet is intercepted from a data streaming session conducted between a first device and a second device connected over a network. A size of a file segment contained in the data packet is calculated. The file segment corresponds to a portion of an item of multimedia content being delivered via the data streaming session. The encoding rate of the data streaming session is then calculated based at least in part on the size of the file segment.

    Identity vault service
    678.
    发明授权

    公开(公告)号:US11349837B2

    公开(公告)日:2022-05-31

    申请号:US16399406

    申请日:2019-04-30

    Abstract: Concepts and technologies are disclosed for an identity vault service. According to one aspect disclosed herein, an identity vault service system can collect self-attested and operator-attested user information. The operator-attested user information can be associated with a user and a mobile telecommunications service provided to the user by a mobile network operator. The system can create a trusted digital identity of the user based upon the self-attested and operator-attested user information. The system can receive an identity access request from a third party. The request can be for access to at least a portion of the trusted digital identity for use by the third party in performance of an act. The system can send a consent request to a user device and can receive a consent response that indicates whether the user permits access to at least the portion of the trusted digital identity of the user.

    Subscriber session director
    679.
    发明授权

    公开(公告)号:US11349804B2

    公开(公告)日:2022-05-31

    申请号:US17020700

    申请日:2020-09-14

    Abstract: Determining a resolved DNS response based on one or more resolutions for a received APN DNS query is disclosed. A resolved DNS response can be based on real-time analysis of a first query and/or on historical resolution of a second query that is sufficiently similar to the first query. In an aspect, training queries can be employed to populate a data store with preferred DNS responses correlated to the training queries and associated network conditions. The data store can then be employed to evaluate a received query, and where sufficiently similar to a training query, corresponding resolution from the training query can be provided as a resolution for the received query. Moreover, as stored query information is determined to become stale, refreshment techniques are disclosed. Additionally, training queries can comprise anticipated queries and historical queries.

Patent Agency Ranking