-
公开(公告)号:US11468158B2
公开(公告)日:2022-10-11
申请号:US16380026
申请日:2019-04-10
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
Abstract: A machine-learning algorithm receives code indicative of a software unit and parses the code to extract an authenticating parameter. The machine-learning algorithm constructs an authentication template based on the authenticating parameter and providing the authentication template to a user. The algorithm receives user input from the user responsive to the authentication template and creates an authentication microservice based on the authentication template (and optionally the input). The algorithm links the authentication microservice to the software unit to deploy the authentication microservice within the software unit. The machine-learning algorithm is then modified based on the input.
-
公开(公告)号:US11438803B2
公开(公告)日:2022-09-06
申请号:US16512139
申请日:2019-07-15
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
Abstract: A system includes a participating device, an input-output interface, and a processor coupled to the input-output interface wherein the processor is further coupled to a memory, the memory having stored thereon executable instructions that when executed by the processor cause the processor to effectuate operations including authenticating the participating device as an edge device on a network, allocating a resource on the participating device to be used for serving a user device operating on the network, receiving a request for service from the user device, and causing the participating device to provide a service to the user devices using the resource from the participating device.
-
公开(公告)号:US11423623B2
公开(公告)日:2022-08-23
申请号:US16898131
申请日:2020-06-10
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , Samuel N. Zellner
Abstract: In one example, a method performed by a processing system includes controlling a first device in a first location to project a virtual presences in a current field of view of a subscriber of a virtual presence projection service, computing a moving trajectory of the subscriber from the first location to a second location, identifying a second device that is located along the moving trajectory, wherein the second device includes a second set of resources for projecting virtual presences, and wherein the second device is registered with the virtual presence projection service to lend the second set of resources to subscribers of the virtual presence projection service, and controlling the second device to project the virtual presence in the current field of view of the subscriber when the subscriber is no longer within range of the first device but is within range of the second device.
-
公开(公告)号:US20220239477A1
公开(公告)日:2022-07-28
申请号:US17719414
申请日:2022-04-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
Abstract: Aspects of the subject disclosure may include, for example, a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including: dividing data provided for storage into data segments; encrypting each data segment of the data segments with an encryption key, thereby creating encrypted data slices; arranging a cluster of sectorized servers in an ordered list of sectorized servers; selecting a first sectorized server from the ordered list of sectorized servers; generating an access key; and sending a first encrypted data slice of the encrypted data slices and the access key to the first sectorized server, wherein the first sectorized server stores the first encrypted data slice in a sector of the first sectorized server, and retrieves the first encrypted data slice from the sector upon presentation of the access key. Other embodiments are disclosed.
-
公开(公告)号:US20220237710A1
公开(公告)日:2022-07-28
申请号:US17719429
申请日:2022-04-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
IPC: G06Q50/00 , G06F3/0489 , G08B25/08 , G06N20/00 , G06V40/20
Abstract: A system may display a representative image of historical information associated with a social media account. In an example, an apparatus may include a processor and a memory coupled with the processor that effectuates operations. The operations may include receiving information during a period associated with a social media account, wherein the information comprises one or more keywords associated with an image, text, audio, or video of respective social media posts, and wherein the one or more keywords is determined based on computer image analysis or machine learning of the respective social media posts, based on the information, determining that a threshold amount of activity associated with the social media account corresponds with at least a representative image indicative of the activity during the period; and sending an alert that comprises the representative image.
-
公开(公告)号:US20220174587A1
公开(公告)日:2022-06-02
申请号:US17105875
申请日:2020-11-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
Abstract: A slicing security management system (“system”) can receive, from an application executing on a device, a request to initiate a communications session with an application server. The system can receive information about the communications session. The system can trigger separate notification flows to provide each element participating in the communications session with sub slices and security credentials to be used during the communications session. The system can provide a radio access network and the application with a frequency range and the security credentials to be used for each of the sub slices. The system can instruct a transport network to configure virtual private network routers at each transport network edge. The system can instruct the core network to instantiate a virtual machine for each of the sub slices. The system can synchronize the elements participating in the communications session and can instruct the application to initiate the communications session.
-
公开(公告)号:US11218591B1
公开(公告)日:2022-01-04
申请号:US17181270
申请日:2021-02-22
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Howard Lang , Joseph Soryal
Abstract: The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, facilitating, by a first device, receiving a first communication directed to a second device from a third device associated with a first telephone number. The method can further include determining, by the first device, that the first communication comprises a reference to a second telephone number different from the first telephone number, resulting in a number discrepancy. Further, based on the number discrepancy and an analysis of the first communication, the method can further include preventing, by the first device, communication of the first communication to the third device.
-
公开(公告)号:US11218491B2
公开(公告)日:2022-01-04
申请号:US16712461
申请日:2019-12-12
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , Dylan C. Reid
Abstract: The concepts and technologies disclosed herein are directed to security de-escalation for data access. A user device can define a security de-escalation rule. The user device can define a multi-tiered security zone within a user device file system utilized by a memory of the user device. The multi-tiered security zone can include a plurality of security tiers. The user device can identify data for de-escalation in accordance with the security de-escalation rule. The user device can de-escalate the data to generate de-escalated data by storing the data identified for de-escalation in a less secure security tier of the plurality of security tiers of the multi-tiered security zone. The user device can receive a data access request from an external user device. The user device can verify a data access credential contained in the data access request. The user device can provide the de-escalated data to the external user device.
-
公开(公告)号:US11216560B2
公开(公告)日:2022-01-04
申请号:US16392231
申请日:2019-04-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal
Abstract: A method includes monitoring access by a first user to a first updating server and a second updating server, suspending access by the first user to the second updating server when the first user accesses the first updating server to load code updates to the first updating server, comparing a first code update from the first updating server and a second code update from the second updating server, and downloading the first code update based on the comparing step. The downloading step occurs only when the first code update and the second code update are identical.
-
90.
公开(公告)号:US20210377284A1
公开(公告)日:2021-12-02
申请号:US16885376
申请日:2020-05-28
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
Abstract: Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of a memory of a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication processor, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate report that includes information associated with the anomaly.
-
-
-
-
-
-
-
-
-