-
公开(公告)号:US20180300510A1
公开(公告)日:2018-10-18
申请号:US15487129
申请日:2017-04-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam , Daniel Solero
CPC classification number: G06F21/84 , G06F21/577 , G06F21/6245
Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.
-
公开(公告)号:US20220382883A1
公开(公告)日:2022-12-01
申请号:US17333066
申请日:2021-05-28
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam
Abstract: Concepts and technologies disclosed herein are directed to a data security cube with a key cube. According to one aspect of the concepts and technologies disclosed herein, a system can execute a data security cube application. The application can receive user data associated with a user. The application can create a data cube that includes at least one data layer that, in turn, includes the user data represented in a binary format. The application can create a key cube that includes at least one key layer that, in turn, includes a data type of the user data, an element identifier that identifies a location of the user data within the data cube, and a decryption logic that decrypts the user data in the binary format. The application can store the data cube and the key cube in secure storage component of the system.
-
公开(公告)号:US20220018668A1
公开(公告)日:2022-01-20
申请号:US16928388
申请日:2020-07-14
Inventor: Craig Klein , Gregory Harp , Yeeling Lam , Mahendra Kuncham , Barton K. Hawkins , Filip Benuska
Abstract: Facilitating implementation of a multitude of virtual paths for moving an object in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can include generating, by a system that includes a memory and a processor, a traversal route grid for travel of an object between a source node and a target node. The traversal route grid can include multiple alternative route segments between the source node and the target node. The method also can include assigning, by the system, respective values to alternative route segments of the multiple alternative route segments. The respective values can be tailored for the object and determined as a function of a requested time of arrival at the target node. Further, the method can include facilitating, by the system, the travel of the object along the group of alternative route segments.
-
公开(公告)号:US20200028874A1
公开(公告)日:2020-01-23
申请号:US15828643
申请日:2017-12-01
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam
IPC: H04L29/06
Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
-
公开(公告)号:US12041082B2
公开(公告)日:2024-07-16
申请号:US18174722
申请日:2023-02-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam
IPC: H04L9/40
CPC classification number: H04L63/1466 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/145
Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
-
公开(公告)号:US20230231877A1
公开(公告)日:2023-07-20
申请号:US18174722
申请日:2023-02-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam
IPC: H04L9/40
CPC classification number: H04L63/1466 , H04L63/145 , H04L63/1416 , H04L63/1425 , H04L63/1433
Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
-
公开(公告)号:US20200382550A1
公开(公告)日:2020-12-03
申请号:US16995883
申请日:2020-08-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam
IPC: H04L29/06
Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
-
公开(公告)号:US11616808B2
公开(公告)日:2023-03-28
申请号:US16995883
申请日:2020-08-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yeeling Lam
IPC: H04L9/40
Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
-
9.
公开(公告)号:US20220019229A1
公开(公告)日:2022-01-20
申请号:US16929681
申请日:2020-07-15
Inventor: Craig Klein , Gregory Harp , Yeeling Lam , Mahendra Kuncham , Barton K. Hawkins , Filip Benuska
Abstract: Facilitating autonomously linking movement of objects in four dimensions in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can include identifying, by a system comprising a memory and a processor, a first portion of a first traversal route grid associated with a first object and a second portion of a second traversal route grid associated with a second object. The identifying can be based on the first portion and the second portion being determined to be overlapping portions during a same time period. The method also can include linking, by the system, during the same time period, a first movement of the first object and a second movement of the second object across the overlapping portions.
-
公开(公告)号:US11080434B2
公开(公告)日:2021-08-03
申请号:US16794950
申请日:2020-02-19
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Yeeling Lam , Daniel Solero
Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.
-
-
-
-
-
-
-
-
-