Patents Examined by Benjamin Kaplan
  • Patent number: 11652837
    Abstract: An access analysis system obtains data about user requests to access particular applications, such as identifiers of the particular user and application involved, the time of the request, and (optionally) additional contextual data, and uses that data to generate user access distributions that quantify the distribution of a given user's requests to access applications over time. After one or more distributions have been generated for a particular user, when that user submits a new access request for an application, the access analysis system can compare the request to the previously-generated access distributions to determine whether (or to what degree) the request is anomalous. If the request is sufficiently non-anomalous, it can be granted with little or no additional actions required by the user or the user's device; if, however, the request is sufficiently anomalous, it can be denied, or additional information—such as additional user authentication factors—can be required.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: May 16, 2023
    Assignee: Okta, Inc.
    Inventor: Gautam Borah
  • Patent number: 11644958
    Abstract: A system and method for investigating trust scores. A trust score is calculated based on peer transfers, a graphical user interface displays actuatable elements associated with a first peer transfer from the peer transfers, in response to receiving an indication the first actuatable element has been actuated, recalculating the trust score without the first peer transfer.
    Type: Grant
    Filed: October 20, 2020
    Date of Patent: May 9, 2023
    Assignee: PAYPAL, INC.
    Inventors: Alex Grigoryan, Avinash Gangadharan, Akshay Peshave, Michael Morgan, Rhys Howell
  • Patent number: 11632363
    Abstract: Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: April 18, 2023
    Assignee: TruePic Inc.
    Inventors: Jason Lyons, Craig Stack, Francis Lyons, Jeffrey McGregor
  • Patent number: 11616770
    Abstract: A method may include receiving, from a user device, a registration request that includes a subscription concealed identifier (SUCI), identifying a network element to decode the SUCI and forwarding the SUCI to the identified network element. The method may also include decoding the SUCI to identify a subscription permanent identifier (SUPI), identifying a unified data management (UDM) device associated with the SUPI and transmitting an authentication request to the identified UDM device to obtain authentication information associated with the user device. The method may further include receiving the authentication information and authenticating the user device based on the received authentication information.
    Type: Grant
    Filed: October 16, 2020
    Date of Patent: March 28, 2023
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Sudhakar Reddy Patil, Lixia Yan, James Mathison
  • Patent number: 11595445
    Abstract: Methods, systems, and computer-readable storage media for receiving, by an AMS, a policy definition file defining policies to be enforced during execution of an instance of an application within the cloud platform, providing, by the AMS, an enhanced policy definition file indicating authorizations for roles for a policy of the policy definition file, providing an authentication bundle for execution of policy decisions at the instance, the authentication bundle provided based on the enhanced policy definition file, the authentication bundle distributed to application containers within the cloud platform, and during execution of the instance: transmitting, by the instance, an authorization request from the instance to an ADC, the ADC including an OPA and being executed within the container and executing policy decisions based on the authentication bundle, receiving, by the instance, a policy decision from the ADC and enforcing the policy based on the policy decision.
    Type: Grant
    Filed: February 2, 2021
    Date of Patent: February 28, 2023
    Assignee: SAP SE
    Inventors: Anett Lippert, Juergen Denner, Matthias Buehl
  • Patent number: 11595441
    Abstract: In one embodiment, a method includes determining a secure path through a first plurality of network nodes within a network and determining an alternate secure path through a second plurality of network nodes within the network. The method also includes routing network traffic through the first plurality of network nodes of the secure path and detecting a failure in the secure path using single-hop BFD authentication. The method further includes rerouting the network traffic through the second plurality of network nodes of the alternate secure path.
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: February 28, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Clarence Filsfils, Reshad Rahman, Eric Albin Voit
  • Patent number: 11586657
    Abstract: Implementations of the present disclosure are directed to providing remote access to electronic documents stored in a server system using a virtual secure room, and include actions of authenticating a user at least partially based on credentials the user, at least partially in response to authenticating the user, providing a secure connection between a computing device of the user and the server system, transmitting at least one electronic document for display to the user on the computing device, monitoring the user, while the at least one electronic document is displayed to the user on the computing device, and selectively closing the secure connection in response to one or more of at least one activity and at least one state of the user.
    Type: Grant
    Filed: September 8, 2020
    Date of Patent: February 21, 2023
    Assignee: United Services Automobile Association (USAA)
    Inventors: Thomas Bret Buckingham, Bryan Osterkamp, Orlando Coleman, Brady Justice, Jonathan Neuse, Sean Thomas, Michael Slaugh, Christopher Thomas Wilkinson, Peter Babcock, Justin Ray White, Peter Bradley Sheeran, Angel Ninette Cade
  • Patent number: 11582264
    Abstract: Techniques for providing network slice-based security in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for network slice-based security in mobile networks in accordance with some embodiments includes monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the service provider network includes a 5G network or a converged 5G network; extracting network slice information for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the network slice information.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: February 14, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Sachin Verma, Leonid Burakovsky
  • Patent number: 11575654
    Abstract: A method including determining, by a first device having an established virtual private network (VPN) connection with a VPN server and an established meshnet connection with a second device in a mesh network, that a destination associated with a transmission packet to be transmitted by the device is the second device in the mesh network; and transmitting, by the first device, the transmission packet utilizing the meshnet connection based at least in part on determining that the destination is the second device in the mesh network. Various other aspects are contemplated.
    Type: Grant
    Filed: December 20, 2021
    Date of Patent: February 7, 2023
    Assignee: UAB 360 IT
    Inventors: Mantas Jonytis, Rytis Karpu{hacek over (s)}ka
  • Patent number: 11569984
    Abstract: A key management method serves as an electronic control unit (ECU) in an onboard network system having a plurality of ECUs that perform communication by frames via a network. The method includes storing a shared key and executing encryption processing based on the shared key. The method further includes executing inspection of a security state of the shared key stored in a case where a vehicle is in at least one of the following particular states: the vehicle is not driving and is an accessory-on state; a fuel cap of the vehicle is open, and the vehicle is not driving and is fueling; the vehicle is parked, which is indicated by the gearshift; the vehicle is in a stopped state before driving, which is indicated by the gearshift; and a charging plug is connected to the vehicle, and the vehicle is electrically charging.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: January 31, 2023
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yoshihiro Ujiie, Jun Anzai, Yoshihiko Kitamura, Masato Tanabe, Takeshi Kishikawa
  • Patent number: 11562062
    Abstract: A network device may receive, via a single port of the network device, a connection request from a user device and may obtain, based on the connection request, information related to an authentication history of the user device. The network device may determine, based on the information related to the authentication history of the user device, an authentication method to be used by the network device to authenticate the user device and may determine, using the authentication method, that the user device is authenticated. The network device may establish, based on determining that the user device is authenticated, an authenticated communication session with the user device on the single port of the network device. The network device may determine, using an additional authentication method, that an additional user device is authenticated and may establish an additional authenticated communication session with the additional user device on the single port.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: January 24, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Subha Sankar Mishra, Nandan Debnath
  • Patent number: 11558354
    Abstract: Techniques are described to provide efficient protection for a virtual private network. In one example, a method is provided that includes obtaining a packet at a first network entity; determining that the packet is a packet type of an authentication type; determining whether authentication content for the packet matches known good criteria for the packet type of the authentication type; based on determining that the authentication content for the packet does not match the known good criteria, performing at least one of dropping the packet and generating an alarm; and based on determining that the authentication content for the packet does match the known good criteria, processing the packet at the first network entity or forwarding the packet toward a second network entity.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: January 17, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kyle Mestery, Graham Bartlett
  • Patent number: 11557227
    Abstract: A machine and its modules assist in steganography for an animal. A steganography module applies behavioral sequencing to create a cover message and a hidden message to covertly pass information from one animal to another animal, with the information embedded in an individual's brain. A visual module references the steganography module to cause a sequence of visual images on a display screen to guide a motor sequence of an individual as the cover message as well as detect and communicate a timing of the individual's motor sequence, relative in timing, to visual images in the sequence of visual images being displayed on the display screen, in order to train in the cover message and hidden message. The hidden message is then extracted at a destination from a sensor monitoring the individual's sequence of motor actions.
    Type: Grant
    Filed: January 29, 2020
    Date of Patent: January 17, 2023
    Assignee: SRI International
    Inventors: Daniel Sanchez, Christopher Connolly
  • Patent number: 11558420
    Abstract: Techniques and systems for detecting malicious activity within a network are provided herein. A method for detecting malicious activity within a network may include receiving, by a network-based authentication system, a network transaction. The network-based authentication system may identify a first attribute of the network transaction. The method may also include selecting, by the network-based authentication system, a first learning statistical model and a second learning statistical model from a plurality of models for handling the network transaction. Each of the first learning statistical model and the second learning statistical model may create a likelihood that the network transaction is authentic. The first learning statistical model may calculate a first score and the second learning statistical score may calculate a second score. Based on a comparison of the first score to a first threshold and the second score to a second threshold, the network transaction may be authenticated.
    Type: Grant
    Filed: July 14, 2020
    Date of Patent: January 17, 2023
    Assignee: The Western Union Company
    Inventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
  • Patent number: 11558404
    Abstract: An on-vehicle communication system includes: a plurality of function units; and one or a plurality of switch devices, each switch device being configured to perform a relay process of relaying communication data between the function units. When unauthorized communication by a function unit has been detected, the switch device performs a validation process of validating a function unit other than an unauthorized-communication function unit that is the function unit for which the unauthorized communication has been detected.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: January 17, 2023
    Assignees: AUTONETWORKS TECHNOLOGIES, LTD., SUMITOMO WIRING SYSTEMS, LTD., SUMITOMO ELECTRIC INDUSTRIES, LTD.
    Inventors: Darmawan Go, Hirofumi Urayama, Takeshi Hagihara, Yasuhiro Yabuuchi
  • Patent number: 11539682
    Abstract: Methods, apparatuses, and computer programs products for connection parameter awareness in an authenticated link-layer network session are disclosed. A client sends, to a network access server (NAS), an initiation packet announcing the initiation of an authentication session. The client establishes an authenticated link-layer session with the NAS. The client receives, from the NAS, a network policy packet including a network policy defined by one or more connection parameters for the link-layer session. The client then enforces the network policy.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: December 27, 2022
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Bogdan-Cosmin Chifor, George-Andrei Stanescu, Radu Mihai Iorga, Corneliu-Ilie Calciu
  • Patent number: 11528261
    Abstract: Systems for dynamically detecting and controlling unauthorized events are presented. In some examples, data may be received from one or more computing systems. In some examples, the computing systems may each be associated with an enterprise unit within an enterprise organization. The data may include, in some examples, processed unauthorized activity event data, such as account takeover event data. The data received may be aggregated and analyzed (e.g., using machine learning) to identify potential threats and threat outputs. In some examples, the threat output may include a user interface indicating the threat or potential threat, systems or applications potentially impacted, enterprise units impacted, and the like. Based on the threat output, one or more mitigation actions may be identified and executed. The mitigation actions may include modifying operation of one or more systems, modifying authentication requirements, and the like.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: December 13, 2022
    Assignee: Bank of America Corporation
    Inventors: Geoffrey George Aslaksen, John H. Denning, Ruchira Ghosh, Russell Scott Nejdl, Jr.
  • Patent number: 11522845
    Abstract: A method for joining an association that includes receiving, by a first cluster, an association access credential and a unique address of an association manager, generating, based on the association access credential, an association access request, sending, to the unique address, the association access request, receiving, in response to the sending, association information, and initiating, based on the association information, a connection to a second cluster in the association.
    Type: Grant
    Filed: November 29, 2019
    Date of Patent: December 6, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Qi Bao, Himabindu Tummala
  • Patent number: 11503074
    Abstract: Disclosed are various examples for enrolling a device in a management service. An enrollment wizard can include a series of user interfaces to facilitate enrollment of a device in the management service. Enrollment data can be obtained from the user and sent to the management service for authentication of the user and device. A user interface object can be instantiated to access a webpage within a user interface of the enrollment wizard for downloading a configuration profile provided by the management service. A user can be redirected to a settings application to install the configuration profile.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: November 15, 2022
    Assignee: VMWARE, INC.
    Inventors: Suyu Pan, Naveen Pitchandi, Gerard T. Murphy, David Jablonski, Christopher Burns
  • Patent number: 11503008
    Abstract: A method including operating, by an infrastructure device, a port associated with a server in a deactivated mode; receiving, by the infrastructure device, a communication from a user device in association with obtaining communication services from the server; pre-authenticating, by the infrastructure device, the user device for obtaining the communication services based at least in part on information indicated in the communication; and operating, by the infrastructure device, the port associated with the server in an activated mode to enable the user device to establish a connection with the server based at least in part on pre-authenticating the user device. Various other aspects are contemplated.
    Type: Grant
    Filed: March 24, 2022
    Date of Patent: November 15, 2022
    Assignee: UAB 360 IT
    Inventor: Adrianus Warmenhoven