Intelligent Continuous Authentication for Digital Rights Management

    公开(公告)号:US20230103240A1

    公开(公告)日:2023-03-30

    申请号:US18074595

    申请日:2022-12-05

    Abstract: The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.

    Intelligent continuous authentication for digital rights management

    公开(公告)号:US11520860B2

    公开(公告)日:2022-12-06

    申请号:US17187657

    申请日:2021-02-26

    Abstract: The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.

    DETECTION OF UNAUTHORIZED CRYPTOMINING

    公开(公告)号:US20240414076A1

    公开(公告)日:2024-12-12

    申请号:US18808983

    申请日:2024-08-19

    Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.

    SYSTEM AND METHOD FOR ENSURING SAFE OPERATION OF POWER GRIDS

    公开(公告)号:US20240062082A1

    公开(公告)日:2024-02-22

    申请号:US17888574

    申请日:2022-08-16

    CPC classification number: G06N5/04 G06F16/27 H04L9/50 H04L2209/463

    Abstract: Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including: receiving input parameters and an output decision of a control device from one or more passive nodes; identifying first information stored in a big data store based on the input parameters and a type of the control device; determining an expected decision for the control device responsive to the first information; comparing the expected decision to the output decision of the control device; and generating an alarm responsive to a comparison of the output decision to the expected decision exceeding a threshold. Other embodiments are disclosed.

    Detection of unauthorized cryptomining

    公开(公告)号:US11159407B2

    公开(公告)日:2021-10-26

    申请号:US16601677

    申请日:2019-10-15

    Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.

    DETECTION OF UNAUTHORIZED CRYPTOMINING

    公开(公告)号:US20210111979A1

    公开(公告)日:2021-04-15

    申请号:US16601677

    申请日:2019-10-15

    Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.

    Tamper-sensitive splitter for monitoring network traffic

    公开(公告)号:US11923967B2

    公开(公告)日:2024-03-05

    申请号:US17875655

    申请日:2022-07-28

    Abstract: Aspects of the subject disclosure may include, for example, a device in which a processing system receives an electromagnetic signal including a plurality of packets, stores a copy of the packets in a memory, converts the signal to an optical signal, and splits the optical signal into first and second optical signals each including the packets. A first converter and second converter then convert the optical signals to electromagnetic signals. A timing coordinator sends a timing signal to the memory and to the first and second converters, resulting in simultaneous release of a copied packet from the memory and first and second packets from the first and second converters. The system compares the copied packet with the first and second packets; if those packets are identical to the copied packet, the system outputs the first and second packets in outgoing signals. Other embodiments are disclosed.

    TAMPER-SENSITIVE SPLITTER FOR MONITORING NETWORK TRAFFIC

    公开(公告)号:US20240039653A1

    公开(公告)日:2024-02-01

    申请号:US17875655

    申请日:2022-07-28

    CPC classification number: H04J14/0204 H04Q11/0005 H04Q2011/0015

    Abstract: Aspects of the subject disclosure may include, for example, a device in which a processing system receives an electromagnetic signal including a plurality of packets, stores a copy of the packets in a memory, converts the signal to an optical signal, and splits the optical signal into first and second optical signals each including the packets. A first converter and second converter then convert the optical signals to electromagnetic signals. A timing coordinator sends a timing signal to the memory and to the first and second converters, resulting in simultaneous release of a copied packet from the memory and first and second packets from the first and second converters. The system compares the copied packet with the first and second packets; if those packets are identical to the copied packet, the system outputs the first and second packets in outgoing signals. Other embodiments are disclosed.

    SYSTEM AND METHOD FOR SDN ORCHESTRATION VALIDATION

    公开(公告)号:US20230006879A1

    公开(公告)日:2023-01-05

    申请号:US17939072

    申请日:2022-09-07

    Abstract: A system includes an orchestrator for a software-defined network and configured to receive a request for operation of the software-defined network, a software-defined network controller in communication with the orchestrator through a northbound application programming interface, at least one network element in communication with the software defined network controller though a southbound application programming interface, and a mutable network element configured to receive the request and instantiate a virtual function within the mutable network element to test the at least one network element in accordance with the request.

Patent Agency Ranking