Inference models for intrusion detection systems in time sensitive networks

    公开(公告)号:US12095782B2

    公开(公告)日:2024-09-17

    申请号:US17706955

    申请日:2022-03-29

    CPC classification number: H04L63/1416 H04J3/0667 H04L63/145 H04L63/1475

    Abstract: Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious.

    INFERENCE MODELS FOR INTRUSION DETECTION SYSTEMS IN TIME SENSITIVE NETWORKS

    公开(公告)号:US20220224701A1

    公开(公告)日:2022-07-14

    申请号:US17706955

    申请日:2022-03-29

    Abstract: Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious.

    Time recovery in a time sensitive network

    公开(公告)号:US12120212B2

    公开(公告)日:2024-10-15

    申请号:US17706939

    申请日:2022-03-29

    CPC classification number: H04L7/0016 H04J3/06 H04J3/0673

    Abstract: Time recovery techniques are described. A method comprises receiving messages from the first device by the second device in the first network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time, determining the second clock is to recover the network time for the second device without new messages from the first device, retrieving a first set of timestamps previously stored for events in the first network domain using the network time from the second clock, retrieving a second set of timestamps previously stored for the events in the first network domain using a redundant time from a third clock, where the third clock is not synchronized with the first and second clocks, and recovering the network time using a regression model and the redundant time from the third clock.

    Leader Bootstrapping and Recovery of Time in Time Sensitive Networks

    公开(公告)号:US20220224501A1

    公开(公告)日:2022-07-14

    申请号:US17706939

    申请日:2022-03-29

    Abstract: Time recovery techniques are described. A method comprises receiving messages from the first device by the second device in the first network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time, determining the second clock is to recover the network time for the second device without new messages from the first device, retrieving a first set of timestamps previously stored for events in the first network domain using the network time from the second clock, retrieving a second set of timestamps previously stored for the events in the first network domain using a redundant time from a third clock, where the third clock is not synchronized with the first and second clocks, and recovering the network time using a regression model and the redundant time from the third clock.

    Multi-output synchronization
    5.
    发明授权

    公开(公告)号:US10931989B2

    公开(公告)日:2021-02-23

    申请号:US15829612

    申请日:2017-12-01

    Abstract: Systems and methods of generating a synchronized media content presentation using a plurality of media output systems communicably coupled to a respective plurality of network connected platforms are provided. A first network connected platform receives an IEEE 802.1AS master timing signal generated by “Grand Master” timing circuitry disposed in a second network connected platform. IEEE 802.1AS application service circuitry disposed in the first network connected platform determines an offset between a local timing signal and the receive master timing signal. Talker circuitry disposed in the first network connected platform synchronizes a media content presentation to the master timing signal and communicates a media/master timing signal synchronization signal to each of the network connected platforms. The media/master timing signal synchronization signal includes data representative of a media start location and a media start time referenced to the master timing signal.

    Power consumption reduction in a computing device
    7.
    发明授权
    Power consumption reduction in a computing device 有权
    计算设备的功耗降低

    公开(公告)号:US09342134B2

    公开(公告)日:2016-05-17

    申请号:US14040284

    申请日:2013-09-27

    Abstract: Various techniques for reducing power consumption of a computing device are described herein. In one example, a method includes detecting that the computing device is to execute a first operation for a first hardware component. The method can also include determining that the computing device is not to execute a second operation for a second hardware component during a period of time. Furthermore, the method can include loading operation data corresponding to the first operation into a processor cache from a non-volatile storage device and detecting that the first operation is not to request memory data from a volatile storage device. The method can also include removing power from at least one storage device.

    Abstract translation: 这里描述了用于降低计算设备的功耗的各种技术。 在一个示例中,一种方法包括检测计算设备要对第一硬件组件执行第一操作。 该方法还可以包括确定计算设备在一段时间内不对第二硬件组件执行第二操作。 此外,该方法可以包括将来自非易失性存储装置的与第一操作相对应的操作数据加载到处理器高速缓存中,并且检测第一操作不是从易失性存储设备请求存储器数据。 该方法还可以包括从至少一个存储设备移除电力。

Patent Agency Ranking