-
公开(公告)号:US11470109B2
公开(公告)日:2022-10-11
申请号:US15733664
申请日:2019-03-19
发明人: Xiao-Si Wang , Zhan Cui , Ian Herwono
摘要: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.
-
公开(公告)号:US11451398B2
公开(公告)日:2022-09-20
申请号:US16611701
申请日:2018-05-03
摘要: A computer implemented method of validating use of a computing resource by a an executing requester software module from a plurality of discrete software modules, the method including validating a characteristic of the requester software module; generating a first transaction defining criteria for consumption of the computing resource by the requester software module, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester software module to consume the computing resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.
-
公开(公告)号:US20220286931A1
公开(公告)日:2022-09-08
申请号:US17597851
申请日:2020-06-09
IPC分类号: H04W36/24 , H04W36/08 , G06V10/764 , G06V20/00
摘要: This disclosure provides a method, and a network node for implementing the method, of initiating a transfer in a cellular telecommunications network, wherein the cellular telecommunications network comprises a User Equipment (UE) and a base station, wherein the UE includes a camera, the method including storing visual data including a visual representation of at least a part of the base station; receiving visual data captured by the camera of the UE; performing a computer vision operation, trained on the stored visual data, on the captured visual data to determine that the visual representation of the base station or part thereof is present in the captured visual data; and, initiating a transfer of the UE to the base station.
-
公开(公告)号:US20220261466A1
公开(公告)日:2022-08-18
申请号:US17597629
申请日:2020-06-16
发明人: Gabriele GELARDI , Ali Sajjad , Gery DUCATEL
摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.
-
公开(公告)号:US20220164422A1
公开(公告)日:2022-05-26
申请号:US17310969
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviours of the user, the method comprising: defining a training period during which access to the device is determined based on a credential-based authentication scheme wherein each access determination is used to generate an item of training data including at least a result of the credential-based authentication and a behaviour of the user; training a machine learning classifier based on the training data such that the classifier is operable to classify user behaviour as compliant or non-compliant such that compliant behaviour is determined by the classifier to be consistent with prior behaviour for permitting access to the device subsequent to the training period; and responsive to a determination that a behaviour subsequent to the training period is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behaviour as a compliant behaviour by providing the subsequent behaviour as an additional training example.
-
公开(公告)号:US11341237B2
公开(公告)日:2022-05-24
申请号:US16498932
申请日:2018-03-26
发明人: Joshua Daniel , Xiaofeng Du
摘要: A computer implemented method to detect a computer system in execution operating in a manner that is not compliant with a definition of a set of compliant operations, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a first predetermined time period; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the predetermined time period; selecting at least a subset of operations in the set of compliant operations and causing the invocation of each operation of the subset in the computer system over a second predetermined time period to generate a second set of records of occurrences in the computer system; generating a sparse distributed representation of the set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recognition of the records of the input set; and responsive to a determination that a degree of recognition of one or more records of the input set is below a threshold degree, identifying the operation of the computer system as non-compliant.
-
公开(公告)号:US20220156351A1
公开(公告)日:2022-05-19
申请号:US17310972
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant such that compliant behavior is determined by the classifier to be consistent with prior behavior for permitting access to the device. The method further includes, in response to a determination that a subsequent behavior is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behavior as a compliant behavior by providing the subsequent behavior as an additional training example.
-
公开(公告)号:US11336623B2
公开(公告)日:2022-05-17
申请号:US15733355
申请日:2018-12-21
发明人: Simon Ringland , Francis Scahill , Timothy Twell
摘要: There is disclosed a method of processing a data packet received by a packet sniffer, the packet containing an associated identifier, the method including transmitting the packet to a recipient, determining if the identifier corresponds to a particular network, wherein if the identifier is determined to correspond to the particular network, the identifier is provided to the recipient; and if the identifier is determined to not correspond to the particular network, the identifier is withheld from the recipient.
-
公开(公告)号:US20220150118A1
公开(公告)日:2022-05-12
申请号:US17431772
申请日:2020-01-30
发明人: Ruth BROWN , Jonathan HART , Maria CUEVAS RAMIREZ
IPC分类号: H04L41/0816 , H04L45/12 , H04L47/80 , A63F13/332 , A63F13/358
摘要: A method of managing a telecommunications network, the telecommunications network having a first user and a second user, the method comprising the step of: ascertaining a competitive characteristic associated with the first user and a competitive characteristic associated with the second user (210); comparing the ascertained competitive characteristics (220); identifying whether there is a disparity between the competitive characteristics that exceeds a threshold (230), thereby to identify a competitive advantage associated with the first or second user; and if it is identified that the disparity exceeds the threshold, adapting a network configuration of a network connection associated with the first user so as to offset the competitive advantage associated with the first or second user (240).
-
公开(公告)号:US20220141542A1
公开(公告)日:2022-05-05
申请号:US17433414
申请日:2020-02-24
发明人: Timothy STEVENS , Rory TURNBULL , Stephen APPLEBY
IPC分类号: H04N21/6405 , H04N21/6408 , H04N21/266
摘要: Described is a method of delivering content over a network using an approach referred to as “Multicast Assisted Unicast Delivery” (MAUD), as a multicast network is used to assist, rather than substituting for, an otherwise unicast path. Content is requested by client devices from a content server over unicast. The responses containing the requested content are separated into two components: a first component containing elements that are specific to individual client devices (for example session specific data), and a second component that is common to all client devices (typically this is the video content being requested). The first component can be delivered over unicast and the second component over multicast. Identifiers are introduced into each of the first and second components to aid recombination of the components to form the original responses. The separation and recombination are handled by suitably configured proxy servers.
-
-
-
-
-
-
-
-
-