-
公开(公告)号:US11777965B2
公开(公告)日:2023-10-03
申请号:US16445203
申请日:2019-06-18
发明人: Jun Du , Mei Wang , Hector Daniel Regalado , Jianhong Xia
CPC分类号: H04L63/1425 , G06N20/00 , H04L63/20
摘要: Techniques for providing Internet of Things (IoT) security are disclosed. An applicable system includes profiling IoT devices to limit the number of network signatures applicable to the IoT devices and performing pattern matching using a pattern that is appropriate for the profile of a given IoT device.
-
公开(公告)号:US20230084344A1
公开(公告)日:2023-03-16
申请号:US18056630
申请日:2022-11-17
发明人: Xu Zou , Jianlin Zeng , Mei Wang
IPC分类号: H04L9/40
摘要: Management of IoT devices through a private cloud. An IoT device is coupled to a gateway. A request from the IoT device to connect to a private cloud, wherein the private cloud is used to manage IoT devices, is received at a private cloud control center agent. An identification of the IoT device is determined. The IoT device is onboarded, using the identification, for management through the private cloud. A device profile of the IoT device is generated. The flow of data to and from the IoT device is regulated through application of IoT rules according to the device profile of the IoT device.
-
公开(公告)号:US20210058417A1
公开(公告)日:2021-02-25
申请号:US16942633
申请日:2020-07-29
发明人: Gong Cheng , Pui-Chuen Yip , Zhiwei Xiao , Ran Xia , Mei Wang
摘要: Data packets transmitted to and from an IoT device are obtained and at least one of the data packets are analyzed using deep packet inspection to identify transaction data from payload of the at least one of the data packets. An event log is generated for the IoT device from the transaction data, the event log, at least in part, used to generate a historical record for the IoT device. The IoT device into a device profile based on the historical record for the IoT device. The event log is updated in real-time to indicate current operation of the IoT device. Abnormal device behavior of the IoT device is determined using the event log and the device profile. The device profile is updated to indicate the abnormal device behavior of the IoT device.
-
公开(公告)号:US11681812B2
公开(公告)日:2023-06-20
申请号:US17730055
申请日:2022-04-26
发明人: Gong Cheng , Mayuresh Ektare , Mei Wang
CPC分类号: G06F21/577 , H04L63/0227 , H04L63/1425
摘要: A first device governs operation of a second device based on a network security risk posed by the second device. The second device is disposed locally to the first device and in local network communication with the first device. The first device is in network communication with a cloud-based computational service.
-
公开(公告)号:US20220253535A1
公开(公告)日:2022-08-11
申请号:US17730055
申请日:2022-04-26
发明人: Gong Cheng , Mayuresh Ektare , Mei Wang
摘要: A first device governs operation of a second device based on a network security risk posed by the second device. The second device is disposed locally to the first device and in local network communication with the first device. The first device is in network communication with a cloud-based computational service.
-
公开(公告)号:US10771491B2
公开(公告)日:2020-09-08
申请号:US16279984
申请日:2019-02-19
发明人: Gong Cheng , Pui-Chuen Yip , Zhiwei Xiao , Ran Xia , Mei Wang
摘要: Data packets transmitted to and from an IoT device are obtained and at least one of the data packets are analyzed using deep packet inspection to identify transaction data from payload of the at least one of the data packets. An event log is generated for the IoT device from the transaction data, the event log, at least in part, used to generate a historical record for the IoT device. The IoT device is profiled into a device profile based on the historical record for the IoT device. The event log is updated in real-time to indicate current operation of the IoT device. Abnormal device behavior of the IoT device is determined using the event log and the device profile. The device profile is updated to indicate the abnormal device behavior of the IoT device.
-
公开(公告)号:US11552954B2
公开(公告)日:2023-01-10
申请号:US16520345
申请日:2019-07-23
发明人: Xu Zou , Jianlin Zeng , Mei Wang
摘要: Management of IoT devices through a private cloud. An IoT device is coupled to a gateway. A request from the IoT device to connect to a private cloud, wherein the private cloud is used to manage IoT devices, is received at a private cloud control center agent. An identification of the IoT device is determined. The IoT device is onboarded, using the identification, for management through the private cloud. A device profile of the IoT device is generated. The flow of data to and from the IoT device is regulated through application of IoT rules according to the device profile of the IoT device.
-
公开(公告)号:US11087005B2
公开(公告)日:2021-08-10
申请号:US16538787
申请日:2019-08-12
发明人: Gong Cheng , Mayuresh Ektare , Mei Wang
摘要: Techniques for assessing risks of IoT devices. A system utilizing such techniques can include a packet analysis based IoT device risk assessment system and an IoT device risk assessment system. A method utilizing such techniques can include extraction of IoT device risk factors from a device profile of an IoT device and application of assessment weights to the IoT device risk factors to assess a risk level of an IoT device.
-
公开(公告)号:US20230370484A1
公开(公告)日:2023-11-16
申请号:US18226161
申请日:2023-07-25
发明人: Jun Du , Mei Wang , Hector Daniel Regalado , Jianhong Xia
CPC分类号: H04L63/1425 , H04L63/20 , G06N20/00
摘要: Techniques for providing Internet of Things (IoT) security are disclosed. An applicable system includes profiling IoT devices to limit the number of network signatures applicable to the IoT devices and performing pattern matching using a pattern that is appropriate for the profile of a given IoT device.
-
公开(公告)号:US20210303699A1
公开(公告)日:2021-09-30
申请号:US17342950
申请日:2021-06-09
发明人: Gong Cheng , Mayuresh Ektare , Mei Wang
摘要: An Internet of Things (IoT) device profile applicable to an IoT device is determined. Data packets transmitted to and from the IoT device are analyzed. A risk level of the IoT device is determined based at least in part on the data packet analysis. A determination is made that the risk level exceeds a threshold and a remedial action is taken in response.
-
-
-
-
-
-
-
-
-