Patents by Inventor Dylan A. Reid
Dylan A. Reid has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240414076Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.Type: ApplicationFiled: August 19, 2024Publication date: December 12, 2024Inventors: Dylan Reid, Joseph Soryal
-
Publication number: 20240314165Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.Type: ApplicationFiled: May 20, 2024Publication date: September 19, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20240283701Abstract: A system includes an orchestrator for a software-defined network and configured to receive a request for operation of the software-defined network, a software-defined network controller in communication with the orchestrator through a northbound application programming interface, at least one network element in communication with the software defined network controller though a southbound application programming interface, and a mutable network element configured to receive the request and instantiate a virtual function within the mutable network element to test the at least one network element in accordance with the request.Type: ApplicationFiled: April 30, 2024Publication date: August 22, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal
-
Patent number: 12068936Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.Type: GrantFiled: October 25, 2021Date of Patent: August 20, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal
-
Patent number: 12028374Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.Type: GrantFiled: July 12, 2021Date of Patent: July 2, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Patent number: 12003366Abstract: A system includes an orchestrator for a software-defined network and configured to receive a request for operation of the software-defined network, a software-defined network controller in communication with the orchestrator through a northbound application programming interface, at least one network element in communication with the software defined network controller though a southbound application programming interface, and a mutable network element configured to receive the request and instantiate a virtual function within the mutable network element to test the at least one network element in accordance with the request.Type: GrantFiled: September 7, 2022Date of Patent: June 4, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal
-
Patent number: 11923967Abstract: Aspects of the subject disclosure may include, for example, a device in which a processing system receives an electromagnetic signal including a plurality of packets, stores a copy of the packets in a memory, converts the signal to an optical signal, and splits the optical signal into first and second optical signals each including the packets. A first converter and second converter then convert the optical signals to electromagnetic signals. A timing coordinator sends a timing signal to the memory and to the first and second converters, resulting in simultaneous release of a copied packet from the memory and first and second packets from the first and second converters. The system compares the copied packet with the first and second packets; if those packets are identical to the copied packet, the system outputs the first and second packets in outgoing signals. Other embodiments are disclosed.Type: GrantFiled: July 28, 2022Date of Patent: March 5, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20240062082Abstract: Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including: receiving input parameters and an output decision of a control device from one or more passive nodes; identifying first information stored in a big data store based on the input parameters and a type of the control device; determining an expected decision for the control device responsive to the first information; comparing the expected decision to the output decision of the control device; and generating an alarm responsive to a comparison of the output decision to the expected decision exceeding a threshold. Other embodiments are disclosed.Type: ApplicationFiled: August 16, 2022Publication date: February 22, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20240039653Abstract: Aspects of the subject disclosure may include, for example, a device in which a processing system receives an electromagnetic signal including a plurality of packets, stores a copy of the packets in a memory, converts the signal to an optical signal, and splits the optical signal into first and second optical signals each including the packets. A first converter and second converter then convert the optical signals to electromagnetic signals. A timing coordinator sends a timing signal to the memory and to the first and second converters, resulting in simultaneous release of a copied packet from the memory and first and second packets from the first and second converters. The system compares the copied packet with the first and second packets; if those packets are identical to the copied packet, the system outputs the first and second packets in outgoing signals. Other embodiments are disclosed.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20230388796Abstract: Aspects of the subject disclosure may include, for example, a device, including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of authenticating an identity of a user of user equipment that controls a virtual entity in a virtual environment; receiving a data feed providing images from the virtual environment; correlating signals from the user equipment with actions of the virtual entity observed in the images; and issuing a warning responsive to the user being unidentified or the signals being uncorrelated with the actions. Other embodiments are disclosed.Type: ApplicationFiled: May 27, 2022Publication date: November 30, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20230111083Abstract: Provided are methods for identification of DNA repair locations in a genome of a non-dividing cell, by incorporating a reactive nucleoside analogs into the genome of the non-dividing cell, then sequencing the regions of the genome that incorporated the nucleoside analog.Type: ApplicationFiled: June 15, 2020Publication date: April 13, 2023Applicant: SALK INSTITUTE FOR BIOLOGICAL STUDIESInventors: Fred H. Gage, Dylan A. Reid, Patrick J. Reed
-
Publication number: 20230103240Abstract: The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.Type: ApplicationFiled: December 5, 2022Publication date: March 30, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20230010945Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.Type: ApplicationFiled: July 12, 2021Publication date: January 12, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20230006879Abstract: A system includes an orchestrator for a software-defined network and configured to receive a request for operation of the software-defined network, a software-defined network controller in communication with the orchestrator through a northbound application programming interface, at least one network element in communication with the software defined network controller though a southbound application programming interface, and a mutable network element configured to receive the request and instantiate a virtual function within the mutable network element to test the at least one network element in accordance with the request.Type: ApplicationFiled: September 7, 2022Publication date: January 5, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal
-
Patent number: 11520860Abstract: The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.Type: GrantFiled: February 26, 2021Date of Patent: December 6, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Publication number: 20220377105Abstract: A method, system, computer readable storage medium, or apparatus provides for monitoring network traffic and creating virtual machines to inspect or block traffic when unusual network traffic is observed.Type: ApplicationFiled: May 18, 2021Publication date: November 24, 2022Inventors: Joseph Soryal, Dylan Reid
-
Patent number: 11469942Abstract: A system includes an orchestrator for a software-defined network and configured to receive a request for operation of the software-defined network, a software-defined network controller in communication with the orchestrator through a northbound application programming interface, at least one network element in communication with the software defined network controller though a southbound application programming interface, and a mutable network element configured to receive the request and instantiate a virtual function within the mutable network element to test the at least one network element in accordance with the request.Type: GrantFiled: August 15, 2019Date of Patent: October 11, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal
-
Publication number: 20220318385Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.Type: ApplicationFiled: June 15, 2022Publication date: October 6, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal
-
Publication number: 20220277059Abstract: The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.Type: ApplicationFiled: February 26, 2021Publication date: September 1, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Dylan Reid
-
Patent number: 11409868Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.Type: GrantFiled: September 26, 2019Date of Patent: August 9, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Dylan Reid, Joseph Soryal