Patents Examined by Beemnet W Dada
  • Patent number: 11816189
    Abstract: Provided is a method including: associating a virtual display of an object with first media content including a first type media content; associating the virtual display of the object with second media content that includes second type media content; generating a data model that includes the virtual display associated with the first media content and the second media content; and storing the data model in a storage device coupled to the computer system. As such, the method unifies all components (e.g., media content, tags, permissions, descriptions) of the data model—text description and attributes, image, video, and audio—to create a unique, multi-dimensional, transferable digital representation of an idea, memory, or history tied to the object.
    Type: Grant
    Filed: August 10, 2022
    Date of Patent: November 14, 2023
    Assignee: Artifcts, Inc.
    Inventors: Heather Nickerson, Ellen Goodwin
  • Patent number: 11811797
    Abstract: Machine learning methods and systems for developing security governance recommendations are disclosed.
    Type: Grant
    Filed: April 8, 2022
    Date of Patent: November 7, 2023
    Assignee: MCKINSEY & COMPANY, INC.
    Inventors: Rares Almasan, Anthony Esposito, Sriram Venkatesan, Sastry Vsm Durvasula
  • Patent number: 11799636
    Abstract: Various embodiments are directed to systems and methods for encryption key management within a group-based communication platform.
    Type: Grant
    Filed: December 2, 2020
    Date of Patent: October 24, 2023
    Assignee: Salesforce, Inc.
    Inventors: Richard Crowley, Audrei Drummond, Jessica Fain, Leah Jones, Ilan Frank, Nikolas Kinkel
  • Patent number: 11799911
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate information exchange using publish-subscribe with blockchain. An example apparatus includes a security manager to integrate a security service with an instruction execution flow in a distributed device environment. The security manager is to include a processor. The processor is to be configured to implement at least an executable hierarchical state machine to provide credential management and access management in conjunction with instruction execution according to an execution plan. The executable hierarchical state machine is to generate a security context for the execution plan to implement a guard condition governing a transition from a first state to a second state in accordance with the execution plan.
    Type: Grant
    Filed: February 26, 2021
    Date of Patent: October 24, 2023
    Assignee: Intel Corporation
    Inventor: Ned Smith
  • Patent number: 11792172
    Abstract: Techniques for providing privacy features in communication systems are provided. For example, a message may be provided from user equipment to an element or function in a communication network that comprises one or more privacy indicators, where privacy features for processing the message are determined based on the privacy indicators. The message may comprise an attach request comprising a subscription identifier for a subscriber associated with the user equipment, with the privacy indicators comprising a flag indicating whether the subscription identifier in the attach request is privacy-protected. As another example, the element of function in the communication network may determine privacy features supported by the communication network and generate and send a message to user equipment comprising one or more privacy indicators selected based on the determined privacy features.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: October 17, 2023
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Suresh P. Nair, Anja Jerichow, Annett Seefeldt
  • Patent number: 11785114
    Abstract: A digital object architecture infrastructure includes a handle system that stores handle data and a proxy server that caches handle data for rapid access. A client connects to the proxy server to request access to the handle data. When the handle data does not have access restrictions and is currently cached, the proxy server returns the handle data to the client without accessing the handle system. When the handle data does not have access restrictions and is not cached, the proxy server obtains the handle data from the handle system, caches a copy of the handle data for future access, and provides the handle data to the client. The proxy server may cache encrypted handle data that is subject to access restrictions, cannot be decrypted by proxy server, and can be provided to a client determined to be allowed access. The client can then decrypt the encrypted handle data.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: October 10, 2023
    Assignee: VeriSign, Inc.
    Inventors: Andrew Fregly, Najmehalsadat Miramirkhani, Swapneel Sheth
  • Patent number: 11784974
    Abstract: The present teaching generally relates to providing optimized access control rules. A request may be received from a client device. A determination may be made, based on the request, that an update is needed for access control rule information for the client device. Rule data may be generated. The rule data may include a plurality of data buckets each including one or more access control rules, each data bucket of the plurality being associated with a range of destination port numbers, and where each of the one or more access control rules comprise a set of tuples having a common source network and source port number, and one or more destination port numbers associated with the common source network and source port number. The rule data may be sent to the client device.
    Type: Grant
    Filed: October 12, 2020
    Date of Patent: October 10, 2023
    Assignee: YAHOO ASSETS LLC
    Inventors: Dmitry Savintsev, Bishan Singh Kochar, Aditya Mahendrakar, Jason Fesler
  • Patent number: 11777965
    Abstract: Techniques for providing Internet of Things (IoT) security are disclosed. An applicable system includes profiling IoT devices to limit the number of network signatures applicable to the IoT devices and performing pattern matching using a pattern that is appropriate for the profile of a given IoT device.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: October 3, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jun Du, Mei Wang, Hector Daniel Regalado, Jianhong Xia
  • Patent number: 11757852
    Abstract: Media, method, and system for providing encryption key management for international data residency. Organizations using a group-based communication system can designate a particular geopolitical area where that organization's data can be stored and another geopolitical area (which may be the same or different) where encryption keys used to encrypt and decrypt that data should be stored. Users of that organization can post message or access messages previously posted on the group-based communication system from any geopolitical area, causing the system to automatically store and retrieve messages and encryption keys from the appropriate regions to allow the users to transparently access the group-based communication system while maintaining security and data residency requirements.
    Type: Grant
    Filed: November 4, 2022
    Date of Patent: September 12, 2023
    Assignee: Salesforce, Inc.
    Inventors: Audrei Drummond, Richard Crowley, James Scheinblum, Eden Ghirmai, Lydia Gorham, Pooja Mehta, Raissa Largman, Karen Nguyen, Ratnadeep Bhattacharjee, Stephen Hamrick
  • Patent number: 11755709
    Abstract: The technology disclosed relates to authenticating users using a plurality of non-deterministic registration biometric inputs. During registration, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate sets of feature vectors. The non-deterministic biometric inputs can include a plurality of face images and a plurality of voice samples of a user. A characteristic identity vector for the user can be determined by averaging feature vectors. During authentication, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate a set of authentication feature vectors. The sets of feature vectors are projected onto a surface of a hyper-sphere. The system can authenticate the user when a cosine distance between the authentication feature vector and a characteristic identity vector for the user is less than a pre-determined threshold.
    Type: Grant
    Filed: February 21, 2022
    Date of Patent: September 12, 2023
    Assignee: SHARECARE AI, INC.
    Inventors: Axel Sly, Srivatsa Akshay Sharma, Brett Robert Redinger, Devin Daniel Reich, Geert Trooskens, Meelis Lootus, Young Jin Lee, Ricardo Lopez Arredondo, Frederick Franklin Kautz, IV, Satish Srinivasan Bhat, Scott Michael Kirk, Walter Adolf De Brouwer, Kartik Thakore
  • Patent number: 11750624
    Abstract: In an embodiment, a statistical approach for augmenting signature detection in a Web application firewall includes receiving a new request including a parameter in a uniform resource identifier (URI), tokenizing the new request, and determining a compound probability that tokens in a value that is associated with the parameter of the URI and that is included in the new request are associated with an attack. The compound probability is determined based at least in part on component probabilities of tokens of historical values associated with the parameter of the URI.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: September 5, 2023
    Assignee: VMWARE, INC.
    Inventors: Chandra Sekhar Kondamuri, Abhijeet Joglekar, Brian Sonnenberg
  • Patent number: 11748472
    Abstract: A method for providing a trusted service to a trusted execution environment running on a remote host machine includes receiving a message from the trusted execution environment and incrementing a counter of the trusted service. A response message is sent to the trusted execution environment using a value of the incremented counter.
    Type: Grant
    Filed: September 2, 2020
    Date of Patent: September 5, 2023
    Assignee: NEC CORPORATION
    Inventors: Ghassan Karame, Claudio Soriente
  • Patent number: 11750621
    Abstract: In one embodiment, a device obtains input features for a neural network-based model. The device pre-defines a set of neurons of the model to represent known behaviors associated with the input features. The device constrains weights for a plurality of outputs of the model. The device trains the neural network-based model using the constrained weights for the plurality of outputs of the model and by excluding the pre-defined set of neurons from updates during the training.
    Type: Grant
    Filed: March 26, 2020
    Date of Patent: September 5, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Petr Somol, Martin Kopp, Jan Kohout, Jan Brabec, Marc René Jacques Marie Dupont, Cenek Skarda, Lukas Bajer, Danila Khikhlukha
  • Patent number: 11743239
    Abstract: A method for processing data of an analytical instrument for analyzing biological samples is presented. The method comprises receiving instrument data from the analytical instrument at a data processing module communicatively connected with the analytical instrument, generating metadata from the received instrument data at the data processing module, applying a first encryption to the instrument data at the data processing module, applying a second encryption to the generated metadata at the data processing module, and transmitting the encrypted metadata and encrypted instrument data to a remote server. The remote server and the data processing module are communicatively connected. The method also comprises removing the second encryption from the metadata at the remote server and forwarding the instrument data encrypted by the first encryption from the remote server to a management system of the analytical instrument.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: August 29, 2023
    Assignee: Roche Diagnostics Operations, Inc.
    Inventors: Urs Suter, Alejandro Morcillo Montejo, Antonio Tienda Fernandez, Stephen Martin
  • Patent number: 11729191
    Abstract: One or more computing devices, systems, and/or methods for assessing riskiness of a domain are provided. For example, a content request is received from a content provider service that hosts a website associated with a domain. The content request is evaluated to identify request features. Feature scores are assigned to the request features using labeled feature data. The feature scores are aggregated to generate a content request risk score corresponding to a riskiness of the content request corresponding to fraud, such as domain spoofing. The content request risk score along with other content request risk scores of content requests associated with the content provider service are aggregated to create a content provider risk score corresponding to a riskiness of the content provider service, such as a risk of the domain being fraudulent. The content provider risk score is used to either block or process the content request.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: August 15, 2023
    Assignee: Yahoo Assets LLC
    Inventors: Liang Wang, Xianen Qiu, Liang Peng, Jianlong Zhang
  • Patent number: 11729204
    Abstract: A method for performing cyber-security analysis includes storing a semantic graph with nodes representing monitored computer-based entities, and edges representing monitored relationships. Each edge has an associated tally. A set of threat scores associated with multiple computer-based entities is stored in the memory. The semantic graph is updated in response to receiving event data. The updating includes decomposing the event data into a set of entities and a set of associated relationships, updating the tally of one of the edges based on the set of relationships, modifying an alert attribute of a monitored computer-based entity when the event data includes an applicable alert, and modifying a threat score of at least one computer-based entity based on the event data when the event data includes an applicable alert, to define a set of modified threat scores. The updated semantic graph is monitored for cyber-security risks within the multiple computer-based entities.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: August 15, 2023
    Assignee: GOOGLE LLC
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Patent number: 11722515
    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which improves the cybersecurity of a unified system comprising a plurality of sub-systems. The analytic server may instantiate a sub attack tree for each network sub-system within the unified system of distributed network infrastructure. The analytic server may access the sub attack trees of the network sub-systems based on the corresponding identifiers. The analytic server may build a high-level attack tree of the unified system by aggregating the sub attack tree of each sub-system. The analytic server may determine how the interconnection of the plurality of network sub-systems may affect the unified system security. The analytic server may update one or more nodes of the attack tree to reflect the changes produced from the interconnection. The analytic server may build the attack tree based on a set of aggregation rules.
    Type: Grant
    Filed: September 20, 2021
    Date of Patent: August 8, 2023
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Robert Joyce, Scott Aloisio
  • Patent number: 11720680
    Abstract: Methods and systems are described for implementing automated controls assessment through an application programming interface (“API”) driven software development kit. For example, the system may receive a response from an API-based agent to an automated controls assessment audit. The system may process the response, using a library of reusable features for controls assessment audits for a plurality of computer domains, to generate a result of the automated controls assessment audit. The system may then generate an outcome of the first automated controls assessment audit.
    Type: Grant
    Filed: December 1, 2021
    Date of Patent: August 8, 2023
    Assignee: THE BANK OF NEW YORK MELLON CORPORATION
    Inventor: Uddipt Mitter
  • Patent number: 11720668
    Abstract: A system and method for accelerated anomaly detection and replacement of an anomaly-experiencing machine learning-based ensemble includes identifying a machine learning-based digital threat scoring ensemble having an anomalous drift behavior in digital threat score inferences computed by the machine learning-based digital threat scoring ensemble for a target period; executing a tiered anomaly evaluation for the machine learning-based digital threat scoring ensemble that includes identifying at least one errant machine learning-based model of the machine learning-based digital threat scoring ensemble contributing to the anomalous drift behavior, and identifying at least one errant feature variable of the at least one machine learning-based model contributing to the anomalous drift behavior; generating a successor machine learning-based digital threat scoring ensemble to the machine learning-based digital threat scoring ensemble based on the tiered anomaly evaluation; and replacing the machine learning-based di
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: August 8, 2023
    Assignee: Sift Science, Inc.
    Inventors: Pradhan Bagur Umesh, Yuan Zhuang, Hui Wang, Nicholas Benavides, Chang Liu, Yanqing Bao, Wei Liu
  • Patent number: 11714903
    Abstract: Techniques for sample traffic based self-learning malware detection are disclosed. In some embodiments, a system/process/computer program product for sample traffic based self-learning malware detection includes receiving a plurality of samples for malware detection analysis using a sandbox; executing each of the plurality of samples in the sandbox and monitoring network traffic during execution of each of the plurality of samples in the sandbox; detecting that one or more of the plurality of samples is malware based on automated analysis of the monitored network traffic using a command and control (C2) machine learning (ML) model if there is not a prior match with an intrusion prevention system (IPS) signature; and performing an action in response to detecting that the one or more of the plurality of samples is malware based on the automated analysis of the monitored network traffic using the C2 ML model. In some embodiments, the IPS signatures and C2 ML model are automatically generated and trained.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: August 1, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanhui Jia, Matthew W. Tennis, Stefan Achleitner, Taojie Wang, Hui Gao, Shengming Xu