Patents Examined by Angela R Holmes
  • Patent number: 11177961
    Abstract: A method for securely sharing validation information of one or more data files stored on different cloud servers using distributed ledger technology includes requesting access to the data files and calculating a hash thereof. A structured Merkle tree is constructed using the hash and additional hashes of other data files for which a user has not granted access, but has used to construct a corresponding Merkle tree for which the user has committed a root value to a main blockchain. It is checked whether the root value of the Merkle tree is the same as the one the user has committed, and whether the hash of the data files is stored in a block of a satellite blockchain linked to the main blockchain and operated by a subset of nodes of the main blockchain that trust one another.
    Type: Grant
    Filed: September 26, 2018
    Date of Patent: November 16, 2021
    Assignee: NEC CORPORATION
    Inventors: Sebastien Andreina, Ghassan Karame
  • Patent number: 11115558
    Abstract: Systems and methods for maintaining chain of custody for assets offloaded from a portable electronic device. One exemplary system includes an electronic processor configured to receive, from the portable electronic device, an asset manifest including an asset identifier, a fixed-length unique identifier associated with the asset identifier, and a manifest digital signature. The electronic processor is further configured to transmit to the portable electronic device a storage message based on the asset manifest; receive, from the portable electronic device, an upload completion message; retrieve, from a data warehouse an asset file; and determine, for the asset file, an asset file fixed-length unique identifier.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: September 7, 2021
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: David B. Flowerday, Remigiusz Orlowski, Steven D. Tine, Lechoslaw Radwanski
  • Patent number: 11102173
    Abstract: Provided in some embodiments are systems and methods for determining a data flow path including a plurality of network devices for routing data from a first network device to a second network device; determining for the network devices one or more flow rules that specify an input for receiving data, an output for outputting data, and a role tag indicative of a role of a network device, where the role tag for one or more flow rules for a first network device of the network devices indicates a source role; distributing, to the network devices, the one or more flow rules; determining malicious activity on the data flow path; determining that the first network device is a source based at least in part on the role tag for the first network device; and sending, to the first network device, a blocking flow rule to inhibit routing of malicious data.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: August 24, 2021
    Assignee: McAfee, LLC
    Inventors: Shivakrishna Anandam Mulka, Shankar Subramanian, Jayakrishnan Karunakaran Nair, Gopal Agrawal, Shankar Ganesh Pillaiyar Nattamai Jeyaprakash
  • Patent number: 11063985
    Abstract: A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat. The courses of action are hardware and system agnostic, which allows a common response task to be implemented by an underlying response engine for any or multiple similar-function devices regardless of brand or version. The course of action builder allows the administrator to use a simple, graphic-based, business modeling concept to craft and design security response processes rather than having to hard code response routines specific to each piece of hardware on the network. The graphic interface model allows the user of the threat response software incorporating the course of action builder to easily understand the overall flow and paths the response may take, as well as understand the data requirements and dependencies that will be evaluated.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: July 13, 2021
    Assignee: FireEye, Inc.
    Inventors: Christopher Nelson Bailey, Bernd Constant, Juan Manuel Vela
  • Patent number: 11062017
    Abstract: A method for uniquely authenticating a device provides for receiving a scoping request, allocating a scope ID responsive to the request, and storing one or more device identification credentials in a database. Each device identification credential stored in the database includes the allocated scope ID and a device ID provided within the scoping request. The method further provides for receiving a registration request specifying a device identification credential and authenticating the specified device identification credential by confirming a match between the specified device identification credential and one of the device identification credentials stored in the database. The method further provides for provisioning the device with initial configuration information responsive to the authentication.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: July 13, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Nicole Elaine Berdy, Affan A. Dar, Simon D. Porter
  • Patent number: 11063915
    Abstract: A device such as a network-attachable data transfer device may be configured to operate in a cluster to coordinate the storage of data. A cluster manifest may include data and/or metadata related to devices of the cluster. In some cases, a cluster manifest may include, for each of one or more devices of a cluster: an encrypted payload; an identifier associated with the particular device; and an encrypted data entry. The encrypted payload may encode a cryptographic payload key used in part to perform storage operations. The encrypted data entry may include one or more encrypted partitions that are each decryptable by a different security module of the device. The decrypted partitions may be assembled to form a cryptographic key that may decrypt the encrypted payload. The cluster manifest may be provided to a locked device of a cluster as part of a process for unlocking the locked device.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: July 13, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Frank Charles Paterra, Eric Neilsen, Elodie Wun, Mahadeva Navali Basavaraj, Shuo Yang, Vaibhav Tyagi, Xiao Li
  • Patent number: 11055410
    Abstract: An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data object has requested a sensitive action of the computing device before interacting with a user of the computing device. In response to determining that the data object has requested the sensitive action, the data object is classified as a high-risk data object.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: July 6, 2021
    Assignee: iboss, Inc.
    Inventors: Paul Michael Martini, Peter Anthony Martini
  • Patent number: 11038855
    Abstract: The invention relates to a method and an apparatus for encrypted communication between a client and a server, wherein the communication comprises request messages, each with request elements, and response messages, each with response elements. Request elements and response elements can comprise data. It is an object of the invention to hamper or prevent unauthorized access to the data during communication and also during storage and processing on the server. In this case, it is assumed that the communication channel and also the server itself are not trustworthy and neither client nor server provide measures or are adaptable in order to counter said risks of unauthorized access, for example by means of cryptographic methods.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: June 15, 2021
    Assignee: medisite GmbH
    Inventor: Torsten Frank
  • Patent number: 11025621
    Abstract: An example method may include detecting, by an operating system component of a computing device, that a client requesting a network connection is operating in a non-persistent mode that prevents tracking of network locations accessed by the client; in response to the detecting, performing privacy enhancing operations before establishing the network connection for the client. The privacy enhancing operations include: broadcasting network messages to discover networks without using previously stored information related to the networks; receiving network identifying information from the networks; providing the network identifying information for the networks to the client; requesting the client to perform media access control (MAC) address randomization; receiving a random MAC address and authentication information for a connection to a network selected from the networks; and authenticating the client; and causing the network connection to be established upon a successful authentication of the client.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: June 1, 2021
    Assignee: Red Hat, Inc.
    Inventor: Michael Tsirkin
  • Patent number: 11025620
    Abstract: A method and system for authenticating a device, board, assembly or system includes obtaining or processing test/scan information provided via extraction of ECID or other unique identifying information regarding a board. A re-authentication process is performed to verify that the board contains only legitimate ECID or other uniquely identified devices, via comparison of re-extracted codes of devices at known positions against a reference record, the reference record being established by an initial authentication process that utilizes information regarding authentic/unique ECID or other uniquely identified codes of devices delivered to populate the board to derive the reference record for the device.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: June 1, 2021
    Assignee: ELECTRONIC WARFARE ASSOCIATES, INC.
    Inventors: George Bernard La Fever, Iser B. Flaum
  • Patent number: 11025477
    Abstract: This disclosure relates to enhanced overlay network-based transport of traffic to and from customer branch office locations, facilitated through the use of the Internet-based overlay routing. A method of selecting an ingress edge region of the overlay network begins by mapping a service hostname to an IKEv2 destination of an outer IPsec tunnel associated with a first overlay network edge. An IKEv2 session is established from the first overlay network edge to the customer router. Upon tunnel establishment, a secondary lookup is performed to determine whether the first overlay network edge is an appropriate ingress region. Based on a response to the secondary lookup, a IKEv2 redirect is issued to a second overlay network edge. A new tunnel is then established from the second overlay network edge to the customer router. Thereafter, an additional lookup may also be performed to determine whether the second overlay network edge remains an appropriate ingress region.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: June 1, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Ryan Ruel, Fardad Farahmand, Brandon O. Williams
  • Patent number: 11019091
    Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: May 25, 2021
    Assignee: Bugcrowd Inc.
    Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis
  • Patent number: 10999056
    Abstract: An apparatus and method for performing operation being secure against side channel attack are provided. The apparatus and method generate values equal to values obtained through an exponentiation operation or a scalar multiplication operation of a point using values extracted from previously generated parameter candidate value sets and an operation secure against side-channel attack, thereby improving security against side-channel attack without degrading performance.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: May 4, 2021
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Kyu-Young Choi, Duk-Jae Moon, Hyo-Jin Yoon, Ji-Hoon Cho
  • Patent number: 10996880
    Abstract: A data communication device for storing image data input by scanning an original document in an external storage device includes a scanner, an inputting unit, a log-in processing unit, and a processing unit. The scanner scans an original document to input image data. The inputting unit inputs identification information. The log-in processing unit causes a user who is authenticated based on the input identification information to log into the data communication device. The processing unit performs data processing to store image data input by the scanner in an external storage device which is accessible based on the input identification information.
    Type: Grant
    Filed: February 24, 2016
    Date of Patent: May 4, 2021
    Assignee: Canon Kabushiki Kaisha
    Inventor: Mamoru Osada
  • Patent number: 10984091
    Abstract: Disclosed herein are methods and systems for validating an autonomous system that comprises a static-code module and a dynamic-code module, the method including the steps of performing a code-integrity-validation process on the static-code module and performing a behavior-integrity-validation process on the dynamic-code module. In some embodiments, performing the code-integrity-validation process on the static-code module includes performing a signature-verification process on the static-code module. In some embodiments, performing the behavior-integrity-validation process on the dynamic-code module includes using an encrypted-and-signed test vector.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: April 20, 2021
    Assignee: NAGRAVISION S.A.
    Inventors: Scott Jantz, Steven Seltzer
  • Patent number: 10986134
    Abstract: A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat. The courses of action are hardware and system agnostic, which allows a common response task to be implemented by an underlying response engine for any or multiple similar-function devices regardless of brand or version. The course of action builder allows the administrator to use a simple, graphic-based, business modeling concept to craft and design security response processes rather than having to hard code response routines specific to each piece of hardware on the network. The graphic interface model allows the user of the threat response software incorporating the course of action builder to easily understand the overall flow and paths the response may take, as well as understand the data requirements and dependencies that will be evaluated.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: April 20, 2021
    Assignee: FireEye, Inc.
    Inventors: Christopher Nelson Bailey, Bernd Constant, Juan Manuel Vela
  • Patent number: 10972494
    Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: April 6, 2021
    Assignee: BugCrowd, Inc.
    Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis
  • Patent number: 10965390
    Abstract: A receiver apparatus and a method for controlling the access to at least a portion of a content broadcasted via satellite, wherein the receiver apparatus includes a receiver for receiving broadcast signals configured for receiving at least a broadcast signal having at least a content, a receiver for receiving terrestrial signals configured for receiving at least a terrestrial signal, and a processor configured for determining access information on the basis of at least the received terrestrial signal, and allowing or blocking, on the basis of at least the access information, the access to the at least one content of the broadcast signal.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: March 30, 2021
    Assignee: Saronikos Trading and Services, Unipessoal LDA
    Inventor: Robert James
  • Patent number: 10951609
    Abstract: A biometrically encrypted access policy is provided. A commercial transaction request to access a client-supported institution received from a client device is identified. A database structure associates each of a plurality of client-supported institutions with one or more respective biometric tokens for authentication. A one-time password is associated with the client-supported institution based on biometric tokens. An encrypted code is associated with the client-supported institution based on biometric tokens. A encrypted OTP is transmitted to client device, and instructions to capture a biometric scan data via the client device are generated based on parameters of biometric tokens. A decryption key is generated via the client device, and the decryption key is determined to authenticate the user of the client device, and, in response, the commercial transaction request to access the client-support institution is approved.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: March 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Parthasarthi Komperla, Sharath Kumar Aithal
  • Patent number: 10911477
    Abstract: One embodiment of the present invention sets forth a technique for detecting malicious domains via registration profiling. The technique includes receiving domain registration information associated with a plurality of malicious domains and generating a plurality of domain clusters based on the domain registration information. The technique further includes comparing a domain registration profile associated with a candidate domain to the plurality of domain clusters to generate a similarity score and classifying the candidate domain as a malicious domain based on the similarity score.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: February 2, 2021
    Assignee: VERISIGN, INC.
    Inventors: Mohammadamin Kharraz, Alireza Salimi