Malware barrier
    61.
    发明授权

    公开(公告)号:US11470109B2

    公开(公告)日:2022-10-11

    申请号:US15733664

    申请日:2019-03-19

    IPC分类号: H04L29/06 H04L9/40

    摘要: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.

    Management of interoperating machine learning algorithms

    公开(公告)号:US11451398B2

    公开(公告)日:2022-09-20

    申请号:US16611701

    申请日:2018-05-03

    摘要: A computer implemented method of validating use of a computing resource by a an executing requester software module from a plurality of discrete software modules, the method including validating a characteristic of the requester software module; generating a first transaction defining criteria for consumption of the computing resource by the requester software module, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester software module to consume the computing resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.

    INITIATION OF TRANSFER OF USER EQUIPMENT TO BASE STATION ACCORDING TO VISUAL DATA

    公开(公告)号:US20220286931A1

    公开(公告)日:2022-09-08

    申请号:US17597851

    申请日:2020-06-09

    摘要: This disclosure provides a method, and a network node for implementing the method, of initiating a transfer in a cellular telecommunications network, wherein the cellular telecommunications network comprises a User Equipment (UE) and a base station, wherein the UE includes a camera, the method including storing visual data including a visual representation of at least a part of the base station; receiving visual data captured by the camera of the UE; performing a computer vision operation, trained on the stored visual data, on the captured visual data to determine that the visual representation of the base station or part thereof is present in the captured visual data; and, initiating a transfer of the UE to the base station.

    USER AUTHENTICATION BASED ON BEHAVIORAL BIOMETRICS

    公开(公告)号:US20220261466A1

    公开(公告)日:2022-08-18

    申请号:US17597629

    申请日:2020-06-16

    IPC分类号: G06F21/32 G06F21/31

    摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.

    ACCESS CONTROL CLASSIFIER TRAINING
    65.
    发明申请

    公开(公告)号:US20220164422A1

    公开(公告)日:2022-05-26

    申请号:US17310969

    申请日:2020-02-28

    IPC分类号: G06F21/31 G06N20/00

    摘要: A computer implemented method of access control for a user device having at least one component for determining behaviours of the user, the method comprising: defining a training period during which access to the device is determined based on a credential-based authentication scheme wherein each access determination is used to generate an item of training data including at least a result of the credential-based authentication and a behaviour of the user; training a machine learning classifier based on the training data such that the classifier is operable to classify user behaviour as compliant or non-compliant such that compliant behaviour is determined by the classifier to be consistent with prior behaviour for permitting access to the device subsequent to the training period; and responsive to a determination that a behaviour subsequent to the training period is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behaviour as a compliant behaviour by providing the subsequent behaviour as an additional training example.

    Anomaly detection for computer systems

    公开(公告)号:US11341237B2

    公开(公告)日:2022-05-24

    申请号:US16498932

    申请日:2018-03-26

    摘要: A computer implemented method to detect a computer system in execution operating in a manner that is not compliant with a definition of a set of compliant operations, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a first predetermined time period; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the predetermined time period; selecting at least a subset of operations in the set of compliant operations and causing the invocation of each operation of the subset in the computer system over a second predetermined time period to generate a second set of records of occurrences in the computer system; generating a sparse distributed representation of the set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recognition of the records of the input set; and responsive to a determination that a degree of recognition of one or more records of the input set is below a threshold degree, identifying the operation of the computer system as non-compliant.

    ACCESS CONTROL
    67.
    发明申请

    公开(公告)号:US20220156351A1

    公开(公告)日:2022-05-19

    申请号:US17310972

    申请日:2020-02-28

    IPC分类号: G06F21/31 G06N20/00

    摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant such that compliant behavior is determined by the classifier to be consistent with prior behavior for permitting access to the device. The method further includes, in response to a determination that a subsequent behavior is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behavior as a compliant behavior by providing the subsequent behavior as an additional training example.

    Data processing method
    68.
    发明授权

    公开(公告)号:US11336623B2

    公开(公告)日:2022-05-17

    申请号:US15733355

    申请日:2018-12-21

    摘要: There is disclosed a method of processing a data packet received by a packet sniffer, the packet containing an associated identifier, the method including transmitting the packet to a recipient, determining if the identifier corresponds to a particular network, wherein if the identifier is determined to correspond to the particular network, the identifier is provided to the recipient; and if the identifier is determined to not correspond to the particular network, the identifier is withheld from the recipient.

    NETWORK MANAGEMENT
    69.
    发明申请

    公开(公告)号:US20220150118A1

    公开(公告)日:2022-05-12

    申请号:US17431772

    申请日:2020-01-30

    摘要: A method of managing a telecommunications network, the telecommunications network having a first user and a second user, the method comprising the step of: ascertaining a competitive characteristic associated with the first user and a competitive characteristic associated with the second user (210); comparing the ascertained competitive characteristics (220); identifying whether there is a disparity between the competitive characteristics that exceeds a threshold (230), thereby to identify a competitive advantage associated with the first or second user; and if it is identified that the disparity exceeds the threshold, adapting a network configuration of a network connection associated with the first user so as to offset the competitive advantage associated with the first or second user (240).

    MULTICAST ASSISTED DELIVERY
    70.
    发明申请

    公开(公告)号:US20220141542A1

    公开(公告)日:2022-05-05

    申请号:US17433414

    申请日:2020-02-24

    摘要: Described is a method of delivering content over a network using an approach referred to as “Multicast Assisted Unicast Delivery” (MAUD), as a multicast network is used to assist, rather than substituting for, an otherwise unicast path. Content is requested by client devices from a content server over unicast. The responses containing the requested content are separated into two components: a first component containing elements that are specific to individual client devices (for example session specific data), and a second component that is common to all client devices (typically this is the video content being requested). The first component can be delivered over unicast and the second component over multicast. Identifiers are introduced into each of the first and second components to aid recombination of the components to form the original responses. The separation and recombination are handled by suitably configured proxy servers.