-
公开(公告)号:US20230129621A1
公开(公告)日:2023-04-27
申请号:US17452535
申请日:2021-10-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
Abstract: Improved optical network security (e.g., using a computerized tool) is enabled. Various embodiments herein can send (e.g., via a network) to a group of network devices comprising a first network device and a second network device, a first encrypted data stream, a second encrypted data stream, a first hash code, and a second hash code, wherein the first network device deletes the second encrypted data stream after the first network device hashes the second encrypted data stream, and in response to the second network device being determined not to have received the second hash code within a defined threshold time, determine that the first network device is unauthorized to use the network.
-
公开(公告)号:US20240364716A1
公开(公告)日:2024-10-31
申请号:US18768076
申请日:2024-07-10
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
CPC classification number: H04L63/1416 , G06N20/00 , H04L63/1425 , H04L63/1466 , H04L63/0428
Abstract: Network security is applied to identify malicious activity occurring on a network or at network nodes from a coordinated attack. For instance, a device, comprising a memory and a processor, can generate a first flag signal representative of a first flag applicable to first data and a second flag signal representative of a second flag applicable to second data in response to the first and second data being determined to be related and directed to a common destination node using identifiers associated with network equipment.
-
公开(公告)号:US12058150B2
公开(公告)日:2024-08-06
申请号:US17351563
申请日:2021-06-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
CPC classification number: H04L63/1416 , G06N20/00 , H04L63/1425 , H04L63/1466 , H04L63/0428
Abstract: Network security is applied to identify malicious activity occurring on a network or at network nodes from a coordinated attack. For instance, a device, comprising a memory and a processor, can generate a first flag signal representative of a first flag applicable to first data and a second flag signal representative of a second flag applicable to second data in response to the first and second data being determined to be related and directed to a common destination node using identifiers associated with network equipment.
-
公开(公告)号:US20230019807A1
公开(公告)日:2023-01-19
申请号:US17374410
申请日:2021-07-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
IPC: H04W40/36 , H04W40/28 , H04W40/12 , H04W12/108 , H04W12/047 , H04W12/60 , H04L9/32
Abstract: Secure, distributed radio access networks are enabled, e.g., to facilitate network resilience and security. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response an event being determined to have occurred that affects operation of a primary radio access network, activating an alternate radio access network via a group of mobile devices and re-routing communications from being communicated via a fixed location radio access network equipment of the primary radio access network to being communicated via the group of mobile devices of the alternate radio access network.
-
公开(公告)号:US11909885B2
公开(公告)日:2024-02-20
申请号:US17452535
申请日:2021-10-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
CPC classification number: H04L9/3236 , H04L9/0643 , H04L9/14
Abstract: Improved optical network security (e.g., using a computerized tool) is enabled. Various embodiments herein can send (e.g., via a network) to a group of network devices comprising a first network device and a second network device, a first encrypted data stream, a second encrypted data stream, a first hash code, and a second hash code, wherein the first network device deletes the second encrypted data stream after the first network device hashes the second encrypted data stream, and in response to the second network device being determined not to have received the second hash code within a defined threshold time, determine that the first network device is unauthorized to use the network.
-
公开(公告)号:US20220407892A1
公开(公告)日:2022-12-22
申请号:US17351589
申请日:2021-06-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
Abstract: Augmented reality security is enabled, e.g., to prevent transmission of maliciously manipulated augmented reality data. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: based on a defined tampering criterion, determining whether a virtual frame, of a group of virtual frames received via a communication link established between the device and augmented reality equipment, has been modified without authorization, and in response to the virtual frame being determined to have been modified, causing the augmented reality equipment to stop displaying the group of virtual frames.
-
公开(公告)号:US20220407871A1
公开(公告)日:2022-12-22
申请号:US17351563
申请日:2021-06-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
Abstract: Network security is applied to identify malicious activity occurring on a network or at network nodes from a coordinated attack. For instance, a device, comprising a memory and a processor, can generate a first flag signal representative of a first flag applicable to first data and a second flag signal representative of a second flag applicable to second data in response to the first and second data being determined to be related and directed to a common destination node using identifiers associated with network equipment.
-
公开(公告)号:US20250030731A1
公开(公告)日:2025-01-23
申请号:US18908599
申请日:2024-10-07
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
Abstract: The described technology is generally directed towards coordinated cellular network attack detection and mitigation. A security function deployed at a network node can monitor network traffic conditions for anomalous behavior indicative of a coordinated attack. In response to detecting the anomalous behavior, the security function can respond with any of several different attack mitigation procedures, in order to protect the network from the coordinated attack. Furthermore, the security function can collect data from connected devices, and use the data to identify malicious code. The security function can then send data and instructions to the connected devices to enable the connected devices to isolate or remove the malicious code.
-
公开(公告)号:US12113827B2
公开(公告)日:2024-10-08
申请号:US17654104
申请日:2022-03-09
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
CPC classification number: H04L63/1458 , H04L63/1425 , H04W4/14 , G06N20/00
Abstract: The described technology is generally directed towards coordinated cellular network attack detection and mitigation. A security function deployed at a network node can monitor network traffic conditions for anomalous behavior indicative of a coordinated attack. In response to detecting the anomalous behavior, the security function can respond with any of several different attack mitigation procedures, in order to protect the network from the coordinated attack. Furthermore, the security function can collect data from connected devices, and use the data to identify malicious code. The security function can then send data and instructions to the connected devices to enable the connected devices to isolate or remove the malicious code.
-
公开(公告)号:US12058180B2
公开(公告)日:2024-08-06
申请号:US17351589
申请日:2021-06-18
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Dylan Chamberlain Reid
IPC: H04L29/06 , G06F18/22 , G06F21/64 , G06N5/04 , G06N20/00 , G08B5/22 , H04L9/32 , H04L9/40 , H04J1/02 , H04L12/46
CPC classification number: H04L63/205 , G06F18/22 , G06F21/64 , G06N5/04 , G06N20/00 , G08B5/22 , H04L9/3236 , H04L63/0272 , H04L63/1416 , G06V2201/031 , H04J1/02 , H04L12/4641
Abstract: Augmented reality security is enabled, e.g., to prevent transmission of maliciously manipulated augmented reality data. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: based on a defined tampering criterion, determining whether a virtual frame, of a group of virtual frames received via a communication link established between the device and augmented reality equipment, has been modified without authorization, and in response to the virtual frame being determined to have been modified, causing the augmented reality equipment to stop displaying the group of virtual frames.
-
-
-
-
-
-
-
-
-