-
公开(公告)号:US20240334508A1
公开(公告)日:2024-10-03
申请号:US18739427
申请日:2024-06-11
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Lars Benjamin Johnson , Wei Wang , Rachel Rosencrantz , Mikhail Istomin
Abstract: Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of facilitating establishment of a communications path between an open device and a remote device through a communications network; receiving an indication of potentially sensitive information on the communications path; and facilitating establishment of a secure communications path between a secure device and the remote device through the communications network. Other embodiments are disclosed.
-
公开(公告)号:US12095771B2
公开(公告)日:2024-09-17
申请号:US17398193
申请日:2021-08-10
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Mikhail Istomin , Wei Wang
CPC classification number: H04L63/105 , G06F9/452 , H04L63/102
Abstract: A system allows for higher security guarantees on public or shared or even compromised equipment, which may be designated as untrusted equipment, without a need to install additional software on it or connect to it outside of general browser interactions. Based on this system, even if it is compromised, proper information separation may ensure security of the sensitive parts of data. That is, trusted information will only go to (outputs) or come from (inputs) trusted devices and insensitive information can go to or come from both trusted and untrusted devices.
-
公开(公告)号:US20240169052A1
公开(公告)日:2024-05-23
申请号:US17993646
申请日:2022-11-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Mikhail Istomin , Lars Johnson , Rachel Rosencrantz
CPC classification number: G06F21/53 , G06F21/554 , G06F2221/034
Abstract: The concepts and technologies disclosed herein are directed to on-demand trusted extended reality (“XR”) environments. According to one aspect disclosed herein, a user device can create a trusted list identifying at least one trusted XR environment. The user device can connect to an untrusted XR server computer and can allow a user avatar associated with a user to enter an untrusted XR environment provided by the untrusted XR server. The user device can detect an event for which a trusted XR environment is desired. The user device can select the trusted XR environment to handle the event. The user device can select the trusted XR environment from the trusted list. The user device can instruct the untrusted XR server computer to teleport the user avatar from the untrusted XR environment to the trusted XR environment.
-
公开(公告)号:US20240146551A1
公开(公告)日:2024-05-02
申请号:US17979519
申请日:2022-11-02
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Lars Benjamin Johnson , Mikhail Istomin , Rachel Rosencrantz
IPC: H04L9/00
CPC classification number: H04L9/50
Abstract: Aspects of the subject disclosure may include, for example, associating a link of a non-fungible token (NFT) metaverse communication device to provisioning data of a service account of non-virtual user equipment, receiving a communication request, detecting the NFT metaverse communication device is available for use in a metaverse system, and initiating communications with the NFT metaverse communication device via the metaverse system. Other embodiments are disclosed.
-
公开(公告)号:US20230276222A1
公开(公告)日:2023-08-31
申请号:US17587592
申请日:2022-01-28
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Lars Benjamin Johnson , Wei Wang , Rachel Rosencrantz , Mikhail Istomin
Abstract: Aspects of the subject disclosure may include, for example, receiving, from a computing device, a user request to perform a subscriber identity module (SIM) swap for a subscriber, wherein the computing device and a user device are accessible to a user, based on the receiving the user request, generating a code for the SIM swap, resulting in a generated code, providing the generated code to the computing device for presentation, obtaining, from the user device, data associated with the user, the user device, or a combination thereof, facilitating user authentication responsive to the obtaining the data, detecting a transmission of a particular code from the user device, resulting in a detected code, and, based on the detecting the transmission and based on the facilitating the user authentication, performing an action relating to the SIM swap. Other embodiments are disclosed.
-
公开(公告)号:US20230164154A1
公开(公告)日:2023-05-25
申请号:US18155130
申请日:2023-01-17
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Thusitha Jayawardena , Jeffrey E. Bickford , Mikhail Istomin , John Liefert , Gokul Singaraju , Christopher Van Wart
CPC classification number: H04L63/1416 , G06F11/079 , G06F11/0712 , G06F9/45558 , G06F9/45512 , G06F11/0709 , G06F11/0751 , H04L63/145 , G06F2009/45591 , G06F2009/45587
Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.
-
公开(公告)号:US20170353479A1
公开(公告)日:2017-12-07
申请号:US15683129
申请日:2017-08-22
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Thusitha Jayawardena , Jeffrey E. Bickford , Mikhail Istomin , John Liefert , Gokul Singaraju , Christopher Van Wart
CPC classification number: H04L63/1416 , G06F9/45512 , G06F9/45558 , G06F11/0709 , G06F11/0712 , G06F11/0751 , G06F11/079 , G06F2009/45587 , G06F2009/45591 , H04L63/145
Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.
-
公开(公告)号:US09606854B2
公开(公告)日:2017-03-28
申请号:US14825419
申请日:2015-08-13
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Thusitha Jayawardena , Jeffrey E. Bickford , Mikhail Istomin , John Liefert , Gokul Singaraju , Christopher Van Wart
CPC classification number: H04L63/1416 , G06F9/45512 , G06F9/45558 , G06F11/0709 , G06F11/0712 , G06F11/0751 , G06F11/079 , G06F2009/45587 , G06F2009/45591 , H04L63/145
Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.
-
公开(公告)号:US09524394B2
公开(公告)日:2016-12-20
申请号:US14949613
申请日:2015-11-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Jeffrey E. Bickford , Mikhail Istomin , Evgene Vahlis
CPC classification number: H04W12/06 , G06F21/445 , G06F21/602 , G06F21/606 , G06F21/74 , G06F21/82 , G06F21/83 , G06F21/85 , H04L63/0442 , H04L63/101
Abstract: A method, non-transitory computer readable medium and apparatus for securing user input and/or output on a mobile endpoint device. For example, the method receives an input on the mobile endpoint device, encrypts and authenticates the input in a trusted domain of the mobile endpoint device executing an application and sends the input that is encrypted and authenticated to an untrusted domain of the mobile endpoint device over a secure channel.
-
公开(公告)号:US20240169051A1
公开(公告)日:2024-05-23
申请号:US17993643
申请日:2022-11-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Wei Wang , Lars Johnson , Mikhail Istomin , Rachel Rosencrantz
IPC: G06F21/53
CPC classification number: G06F21/53 , G06F2221/034
Abstract: The concepts and technologies disclosed herein are directed to providing a split ledger for securing extended reality (“XR”) environments. According to one aspect, an XR server computer can create an XR environment. The XR server computer can cause a passed ledger to be populated with an environment ID associated with the XR environment. The XR server computer can cause a hash ledger to be populated with a first hash of the environment ID. The XR server computer can register a user for participating in the XR environment and can cause the passed ledger to be populated with a user-created block associated with the user. The XR server computer can cause the hash ledger to be further populated with a second hash of the user-created block. The XR server computer can allow a user avatar associated with the user to join the XR environment.
-
-
-
-
-
-
-
-
-