PASSIVE OPTICAL NETWORK SECURITY
    1.
    发明申请

    公开(公告)号:US20230129621A1

    公开(公告)日:2023-04-27

    申请号:US17452535

    申请日:2021-10-27

    Abstract: Improved optical network security (e.g., using a computerized tool) is enabled. Various embodiments herein can send (e.g., via a network) to a group of network devices comprising a first network device and a second network device, a first encrypted data stream, a second encrypted data stream, a first hash code, and a second hash code, wherein the first network device deletes the second encrypted data stream after the first network device hashes the second encrypted data stream, and in response to the second network device being determined not to have received the second hash code within a defined threshold time, determine that the first network device is unauthorized to use the network.

    SECURE DISTRIBUTED RADIO ACCESS NETWORKS

    公开(公告)号:US20230019807A1

    公开(公告)日:2023-01-19

    申请号:US17374410

    申请日:2021-07-13

    Abstract: Secure, distributed radio access networks are enabled, e.g., to facilitate network resilience and security. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response an event being determined to have occurred that affects operation of a primary radio access network, activating an alternate radio access network via a group of mobile devices and re-routing communications from being communicated via a fixed location radio access network equipment of the primary radio access network to being communicated via the group of mobile devices of the alternate radio access network.

    Passive optical network security
    5.
    发明授权

    公开(公告)号:US11909885B2

    公开(公告)日:2024-02-20

    申请号:US17452535

    申请日:2021-10-27

    CPC classification number: H04L9/3236 H04L9/0643 H04L9/14

    Abstract: Improved optical network security (e.g., using a computerized tool) is enabled. Various embodiments herein can send (e.g., via a network) to a group of network devices comprising a first network device and a second network device, a first encrypted data stream, a second encrypted data stream, a first hash code, and a second hash code, wherein the first network device deletes the second encrypted data stream after the first network device hashes the second encrypted data stream, and in response to the second network device being determined not to have received the second hash code within a defined threshold time, determine that the first network device is unauthorized to use the network.

    AUGMENTED REALITY SECURITY
    6.
    发明申请

    公开(公告)号:US20220407892A1

    公开(公告)日:2022-12-22

    申请号:US17351589

    申请日:2021-06-18

    Abstract: Augmented reality security is enabled, e.g., to prevent transmission of maliciously manipulated augmented reality data. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: based on a defined tampering criterion, determining whether a virtual frame, of a group of virtual frames received via a communication link established between the device and augmented reality equipment, has been modified without authorization, and in response to the virtual frame being determined to have been modified, causing the augmented reality equipment to stop displaying the group of virtual frames.

    MASSIVE VULNERABLE SURFACE PROTECTION

    公开(公告)号:US20220407871A1

    公开(公告)日:2022-12-22

    申请号:US17351563

    申请日:2021-06-18

    Abstract: Network security is applied to identify malicious activity occurring on a network or at network nodes from a coordinated attack. For instance, a device, comprising a memory and a processor, can generate a first flag signal representative of a first flag applicable to first data and a second flag signal representative of a second flag applicable to second data in response to the first and second data being determined to be related and directed to a common destination node using identifiers associated with network equipment.

    COORDINATED CELLULAR NETWORK ATTACK DETECTION AND MITIGATION

    公开(公告)号:US20250030731A1

    公开(公告)日:2025-01-23

    申请号:US18908599

    申请日:2024-10-07

    Abstract: The described technology is generally directed towards coordinated cellular network attack detection and mitigation. A security function deployed at a network node can monitor network traffic conditions for anomalous behavior indicative of a coordinated attack. In response to detecting the anomalous behavior, the security function can respond with any of several different attack mitigation procedures, in order to protect the network from the coordinated attack. Furthermore, the security function can collect data from connected devices, and use the data to identify malicious code. The security function can then send data and instructions to the connected devices to enable the connected devices to isolate or remove the malicious code.

    Coordinated cellular network attack detection and mitigation

    公开(公告)号:US12113827B2

    公开(公告)日:2024-10-08

    申请号:US17654104

    申请日:2022-03-09

    CPC classification number: H04L63/1458 H04L63/1425 H04W4/14 G06N20/00

    Abstract: The described technology is generally directed towards coordinated cellular network attack detection and mitigation. A security function deployed at a network node can monitor network traffic conditions for anomalous behavior indicative of a coordinated attack. In response to detecting the anomalous behavior, the security function can respond with any of several different attack mitigation procedures, in order to protect the network from the coordinated attack. Furthermore, the security function can collect data from connected devices, and use the data to identify malicious code. The security function can then send data and instructions to the connected devices to enable the connected devices to isolate or remove the malicious code.

Patent Agency Ranking