Patents Examined by Angela R Holmes
-
Patent number: 11177961Abstract: A method for securely sharing validation information of one or more data files stored on different cloud servers using distributed ledger technology includes requesting access to the data files and calculating a hash thereof. A structured Merkle tree is constructed using the hash and additional hashes of other data files for which a user has not granted access, but has used to construct a corresponding Merkle tree for which the user has committed a root value to a main blockchain. It is checked whether the root value of the Merkle tree is the same as the one the user has committed, and whether the hash of the data files is stored in a block of a satellite blockchain linked to the main blockchain and operated by a subset of nodes of the main blockchain that trust one another.Type: GrantFiled: September 26, 2018Date of Patent: November 16, 2021Assignee: NEC CORPORATIONInventors: Sebastien Andreina, Ghassan Karame
-
Patent number: 11115558Abstract: Systems and methods for maintaining chain of custody for assets offloaded from a portable electronic device. One exemplary system includes an electronic processor configured to receive, from the portable electronic device, an asset manifest including an asset identifier, a fixed-length unique identifier associated with the asset identifier, and a manifest digital signature. The electronic processor is further configured to transmit to the portable electronic device a storage message based on the asset manifest; receive, from the portable electronic device, an upload completion message; retrieve, from a data warehouse an asset file; and determine, for the asset file, an asset file fixed-length unique identifier.Type: GrantFiled: May 20, 2016Date of Patent: September 7, 2021Assignee: MOTOROLA SOLUTIONS, INC.Inventors: David B. Flowerday, Remigiusz Orlowski, Steven D. Tine, Lechoslaw Radwanski
-
Patent number: 11102173Abstract: Provided in some embodiments are systems and methods for determining a data flow path including a plurality of network devices for routing data from a first network device to a second network device; determining for the network devices one or more flow rules that specify an input for receiving data, an output for outputting data, and a role tag indicative of a role of a network device, where the role tag for one or more flow rules for a first network device of the network devices indicates a source role; distributing, to the network devices, the one or more flow rules; determining malicious activity on the data flow path; determining that the first network device is a source based at least in part on the role tag for the first network device; and sending, to the first network device, a blocking flow rule to inhibit routing of malicious data.Type: GrantFiled: May 18, 2016Date of Patent: August 24, 2021Assignee: McAfee, LLCInventors: Shivakrishna Anandam Mulka, Shankar Subramanian, Jayakrishnan Karunakaran Nair, Gopal Agrawal, Shankar Ganesh Pillaiyar Nattamai Jeyaprakash
-
Patent number: 11063985Abstract: A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat. The courses of action are hardware and system agnostic, which allows a common response task to be implemented by an underlying response engine for any or multiple similar-function devices regardless of brand or version. The course of action builder allows the administrator to use a simple, graphic-based, business modeling concept to craft and design security response processes rather than having to hard code response routines specific to each piece of hardware on the network. The graphic interface model allows the user of the threat response software incorporating the course of action builder to easily understand the overall flow and paths the response may take, as well as understand the data requirements and dependencies that will be evaluated.Type: GrantFiled: December 18, 2019Date of Patent: July 13, 2021Assignee: FireEye, Inc.Inventors: Christopher Nelson Bailey, Bernd Constant, Juan Manuel Vela
-
Patent number: 11062017Abstract: A method for uniquely authenticating a device provides for receiving a scoping request, allocating a scope ID responsive to the request, and storing one or more device identification credentials in a database. Each device identification credential stored in the database includes the allocated scope ID and a device ID provided within the scoping request. The method further provides for receiving a registration request specifying a device identification credential and authenticating the specified device identification credential by confirming a match between the specified device identification credential and one of the device identification credentials stored in the database. The method further provides for provisioning the device with initial configuration information responsive to the authentication.Type: GrantFiled: August 24, 2018Date of Patent: July 13, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Nicole Elaine Berdy, Affan A. Dar, Simon D. Porter
-
Patent number: 11063915Abstract: A device such as a network-attachable data transfer device may be configured to operate in a cluster to coordinate the storage of data. A cluster manifest may include data and/or metadata related to devices of the cluster. In some cases, a cluster manifest may include, for each of one or more devices of a cluster: an encrypted payload; an identifier associated with the particular device; and an encrypted data entry. The encrypted payload may encode a cryptographic payload key used in part to perform storage operations. The encrypted data entry may include one or more encrypted partitions that are each decryptable by a different security module of the device. The decrypted partitions may be assembled to form a cryptographic key that may decrypt the encrypted payload. The cluster manifest may be provided to a locked device of a cluster as part of a process for unlocking the locked device.Type: GrantFiled: March 24, 2017Date of Patent: July 13, 2021Assignee: Amazon Technologies, Inc.Inventors: Frank Charles Paterra, Eric Neilsen, Elodie Wun, Mahadeva Navali Basavaraj, Shuo Yang, Vaibhav Tyagi, Xiao Li
-
Patent number: 11055410Abstract: An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data object has requested a sensitive action of the computing device before interacting with a user of the computing device. In response to determining that the data object has requested the sensitive action, the data object is classified as a high-risk data object.Type: GrantFiled: October 28, 2019Date of Patent: July 6, 2021Assignee: iboss, Inc.Inventors: Paul Michael Martini, Peter Anthony Martini
-
Patent number: 11038855Abstract: The invention relates to a method and an apparatus for encrypted communication between a client and a server, wherein the communication comprises request messages, each with request elements, and response messages, each with response elements. Request elements and response elements can comprise data. It is an object of the invention to hamper or prevent unauthorized access to the data during communication and also during storage and processing on the server. In this case, it is assumed that the communication channel and also the server itself are not trustworthy and neither client nor server provide measures or are adaptable in order to counter said risks of unauthorized access, for example by means of cryptographic methods.Type: GrantFiled: June 23, 2016Date of Patent: June 15, 2021Assignee: medisite GmbHInventor: Torsten Frank
-
Patent number: 11025621Abstract: An example method may include detecting, by an operating system component of a computing device, that a client requesting a network connection is operating in a non-persistent mode that prevents tracking of network locations accessed by the client; in response to the detecting, performing privacy enhancing operations before establishing the network connection for the client. The privacy enhancing operations include: broadcasting network messages to discover networks without using previously stored information related to the networks; receiving network identifying information from the networks; providing the network identifying information for the networks to the client; requesting the client to perform media access control (MAC) address randomization; receiving a random MAC address and authentication information for a connection to a network selected from the networks; and authenticating the client; and causing the network connection to be established upon a successful authentication of the client.Type: GrantFiled: February 24, 2017Date of Patent: June 1, 2021Assignee: Red Hat, Inc.Inventor: Michael Tsirkin
-
Patent number: 11025620Abstract: A method and system for authenticating a device, board, assembly or system includes obtaining or processing test/scan information provided via extraction of ECID or other unique identifying information regarding a board. A re-authentication process is performed to verify that the board contains only legitimate ECID or other uniquely identified devices, via comparison of re-extracted codes of devices at known positions against a reference record, the reference record being established by an initial authentication process that utilizes information regarding authentic/unique ECID or other uniquely identified codes of devices delivered to populate the board to derive the reference record for the device.Type: GrantFiled: September 4, 2015Date of Patent: June 1, 2021Assignee: ELECTRONIC WARFARE ASSOCIATES, INC.Inventors: George Bernard La Fever, Iser B. Flaum
-
Patent number: 11025477Abstract: This disclosure relates to enhanced overlay network-based transport of traffic to and from customer branch office locations, facilitated through the use of the Internet-based overlay routing. A method of selecting an ingress edge region of the overlay network begins by mapping a service hostname to an IKEv2 destination of an outer IPsec tunnel associated with a first overlay network edge. An IKEv2 session is established from the first overlay network edge to the customer router. Upon tunnel establishment, a secondary lookup is performed to determine whether the first overlay network edge is an appropriate ingress region. Based on a response to the secondary lookup, a IKEv2 redirect is issued to a second overlay network edge. A new tunnel is then established from the second overlay network edge to the customer router. Thereafter, an additional lookup may also be performed to determine whether the second overlay network edge remains an appropriate ingress region.Type: GrantFiled: December 28, 2016Date of Patent: June 1, 2021Assignee: Akamai Technologies, Inc.Inventors: Ryan Ruel, Fardad Farahmand, Brandon O. Williams
-
Patent number: 11019091Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.Type: GrantFiled: October 30, 2019Date of Patent: May 25, 2021Assignee: Bugcrowd Inc.Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis
-
Patent number: 10999056Abstract: An apparatus and method for performing operation being secure against side channel attack are provided. The apparatus and method generate values equal to values obtained through an exponentiation operation or a scalar multiplication operation of a point using values extracted from previously generated parameter candidate value sets and an operation secure against side-channel attack, thereby improving security against side-channel attack without degrading performance.Type: GrantFiled: January 4, 2018Date of Patent: May 4, 2021Assignee: SAMSUNG SDS CO., LTD.Inventors: Kyu-Young Choi, Duk-Jae Moon, Hyo-Jin Yoon, Ji-Hoon Cho
-
Patent number: 10996880Abstract: A data communication device for storing image data input by scanning an original document in an external storage device includes a scanner, an inputting unit, a log-in processing unit, and a processing unit. The scanner scans an original document to input image data. The inputting unit inputs identification information. The log-in processing unit causes a user who is authenticated based on the input identification information to log into the data communication device. The processing unit performs data processing to store image data input by the scanner in an external storage device which is accessible based on the input identification information.Type: GrantFiled: February 24, 2016Date of Patent: May 4, 2021Assignee: Canon Kabushiki KaishaInventor: Mamoru Osada
-
Patent number: 10984091Abstract: Disclosed herein are methods and systems for validating an autonomous system that comprises a static-code module and a dynamic-code module, the method including the steps of performing a code-integrity-validation process on the static-code module and performing a behavior-integrity-validation process on the dynamic-code module. In some embodiments, performing the code-integrity-validation process on the static-code module includes performing a signature-verification process on the static-code module. In some embodiments, performing the behavior-integrity-validation process on the dynamic-code module includes using an encrypted-and-signed test vector.Type: GrantFiled: August 13, 2018Date of Patent: April 20, 2021Assignee: NAGRAVISION S.A.Inventors: Scott Jantz, Steven Seltzer
-
Patent number: 10986134Abstract: A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat. The courses of action are hardware and system agnostic, which allows a common response task to be implemented by an underlying response engine for any or multiple similar-function devices regardless of brand or version. The course of action builder allows the administrator to use a simple, graphic-based, business modeling concept to craft and design security response processes rather than having to hard code response routines specific to each piece of hardware on the network. The graphic interface model allows the user of the threat response software incorporating the course of action builder to easily understand the overall flow and paths the response may take, as well as understand the data requirements and dependencies that will be evaluated.Type: GrantFiled: December 18, 2019Date of Patent: April 20, 2021Assignee: FireEye, Inc.Inventors: Christopher Nelson Bailey, Bernd Constant, Juan Manuel Vela
-
Patent number: 10972494Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.Type: GrantFiled: October 10, 2016Date of Patent: April 6, 2021Assignee: BugCrowd, Inc.Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis
-
Patent number: 10965390Abstract: A receiver apparatus and a method for controlling the access to at least a portion of a content broadcasted via satellite, wherein the receiver apparatus includes a receiver for receiving broadcast signals configured for receiving at least a broadcast signal having at least a content, a receiver for receiving terrestrial signals configured for receiving at least a terrestrial signal, and a processor configured for determining access information on the basis of at least the received terrestrial signal, and allowing or blocking, on the basis of at least the access information, the access to the at least one content of the broadcast signal.Type: GrantFiled: June 15, 2015Date of Patent: March 30, 2021Assignee: Saronikos Trading and Services, Unipessoal LDAInventor: Robert James
-
Patent number: 10951609Abstract: A biometrically encrypted access policy is provided. A commercial transaction request to access a client-supported institution received from a client device is identified. A database structure associates each of a plurality of client-supported institutions with one or more respective biometric tokens for authentication. A one-time password is associated with the client-supported institution based on biometric tokens. An encrypted code is associated with the client-supported institution based on biometric tokens. A encrypted OTP is transmitted to client device, and instructions to capture a biometric scan data via the client device are generated based on parameters of biometric tokens. A decryption key is generated via the client device, and the decryption key is determined to authenticate the user of the client device, and, in response, the commercial transaction request to access the client-support institution is approved.Type: GrantFiled: November 5, 2018Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Parthasarthi Komperla, Sharath Kumar Aithal
-
Patent number: 10911477Abstract: One embodiment of the present invention sets forth a technique for detecting malicious domains via registration profiling. The technique includes receiving domain registration information associated with a plurality of malicious domains and generating a plurality of domain clusters based on the domain registration information. The technique further includes comparing a domain registration profile associated with a candidate domain to the plurality of domain clusters to generate a similarity score and classifying the candidate domain as a malicious domain based on the similarity score.Type: GrantFiled: October 20, 2016Date of Patent: February 2, 2021Assignee: VERISIGN, INC.Inventors: Mohammadamin Kharraz, Alireza Salimi