Patents Examined by Daniel B Potratz
  • Patent number: 11755731
    Abstract: A processor for mitigating side channel attacks includes units that perform fetch, decode, and execution of instructions and pipeline control logic. The processor performs speculative and out-of-order execution of the instructions. The units detect and notify the control unit of events that cause a change from a first translation context (TC) to a second TC. In response, the pipeline control logic prevents speculative execution of instructions that are dependent in their execution on the change to the second TC until all instructions that are dependent on the first TC have completed execution, which may involve stalling their dispatch until all first-TC-dependent instructions have at least completed execution, or by tagging them and dispatching them to execution schedulers but preventing them from starting execution until all first-TC-dependent instructions have at least completed execution.
    Type: Grant
    Filed: July 23, 2020
    Date of Patent: September 12, 2023
    Assignee: Ventana Micro Systems Inc.
    Inventors: John G. Favor, David S. Oliver
  • Patent number: 11755732
    Abstract: A processor is disclosed that mitigates side channel attacks that exploit speculative store-to-load forwarding. The processor includes logic that conditions store-to-load forwarding of uncommitted store data in the store queue from an uncommitted store instruction to the load instruction upon circumstances associated with a translation context (TC) change or update. The TC comprises an address space identifier (ASID), a virtual machine identifier (VMID), a privilege mode (PM) or a combination of two or more of the ASID, VMID and PM or a derivative thereof. The logic is embedded or associated with any of several structures, such as a store queue (SQ), a memory dependence predictor (MDP), or a reorder buffer (ROB).
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: September 12, 2023
    Assignee: Ventana Micro Systems Inc.
    Inventor: John G. Favor
  • Patent number: 11755753
    Abstract: Secure memory sharing between enclaves (virtual machines) and virtual input/output adapters includes, in response to a request for an enclave to create a virtual input/output adapter, creating a virtual input/output adapter associated with the enclave, creating a non-sharable micro-enclave, to contain only data, nested within the enclave to use with the virtual input/output adapter, generating a key by a memory encryption engine of an ultravisor for the virtual input/output adapter for use by only the virtual input/output adapter, in response to a request to obtain data from the enclave by the virtual input/output adapter, exchanging the key with the non-sharable micro-enclave, in response to receiving the key, decrypting memory of only the non-sharable micro-enclave associated with the virtual input/output adapter to obtain the data, and sending the data from the non-sharable micro-enclave nested within the enclave to the virtual input/output adapter.
    Type: Grant
    Filed: June 13, 2018
    Date of Patent: September 12, 2023
    Assignee: Kyndryl, Inc.
    Inventors: Breno H. Leitao, Mauro Sergio Martins Rodrigues, Daniel Battaiola Kreling, Rafael Camarda Silva Folco
  • Patent number: 11750681
    Abstract: A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and generates a mapping between portions of data received from a client device and interface fields or data elements of the client device. Upon receiving subsequent data from the client device, the gateway device can access the generated mapping to identify portions of the subsequent data corresponding to particular interface fields or data elements of the client device using the mapping, and can encode the identified portions of the subsequent data, for instance based on data protection techniques defined by a security policy. The encoded data can then be outputted by the gateway device to the server device.
    Type: Grant
    Filed: October 2, 2021
    Date of Patent: September 5, 2023
    Assignee: PROTEGRITY CORPORATION
    Inventors: Vichai Levy, Yigal Rozenberg, Rajnish Jain, Ulf Mattsson
  • Patent number: 11727108
    Abstract: Systems and methods for identifying and remedying password insecurities are disclosed. The systems and methods include crawling websites to identify popular cultural terms and saving the cultural terms in a backend system. The cultural terms can include names of celebrities, politicians, movies, and the like. An identification system receives a password and compares the received password to the cultural terms using a similarity score. If the number of similarities is above a predetermined threshold, or if the number of differences is below a predetermined threshold, the identification system denies the password. A recommendation system can generate a suggested password, which can also be compared to the cultural terms. The systems and methods also provide the ability to calculate a similarity score if the cultural terms or passwords are saved in an encrypted or hashed format.
    Type: Grant
    Filed: January 8, 2021
    Date of Patent: August 15, 2023
    Assignee: CAPITAL ONE SERVICES, LLC
    Inventors: Jacob Learned, Michael Saia, Max Miracolo, Kaylyn S. Gibilterra
  • Patent number: 11722466
    Abstract: The present disclosure is directed to methods that provide a secure communication protocol by utilizing one step process of authenticating and encrypting data without having to exchange symmetric keys or needing to renew or re-issue digital identities fundamental to asymmetric encryption methodology.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: August 8, 2023
    Assignee: National Technology & Engineering Solutions of Sandia, LLC
    Inventor: Sung Nam Choi
  • Patent number: 11711382
    Abstract: A method and system for securing an operating domain that spans one or more distributed information technology networks is disclosed. In the present invention, a state machine reference monitor, comprising a monitor port operatively connected to one or more network traffic capture devices positioned across a distributed network of an operating domain, with each traffic capture interception network device in communication with a central server. Each interception network device along with the central server having a processor and a memory comprising instructions, which when executed by each device processor perform the method of extracting logic state data and deducting ancillary logic state data across the distributed operating domain.
    Type: Grant
    Filed: November 27, 2020
    Date of Patent: July 25, 2023
    Inventor: Paul Williams
  • Patent number: 11693968
    Abstract: In one aspect, an embedded controller (EC) in a device may receive a firmware update for another component in the device and determine whether the firmware update has been previously applied at the component. If the firmware update has not been previously applied, the EC may assign an identifier to the firmware update and digitally sign the identifier. The EC may then provide the firmware update and the digitally-signed identifier to the component so that the component may apply the firmware update.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: July 4, 2023
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Thorsten P. Stremlau, Kevin Wayne Beck, Russell Speight VanBlon, Joseph M. Pennisi
  • Patent number: 11689544
    Abstract: Intrusion detection systems and methods monitor legal control messages in an operational control system to detect subtly malicious sequences of control messages with undesirable emergent effects on devices in the operational control system. A message provenance component may investigate system-level correlations between messages rather than detecting if individual messages are anomalous. A semantic fuzzing component may search, based on the operational effect of candidate message sequences, the space of legal messages for sequences that cause actual harm. Behavior oracles may be used to test message sequences to identify sequences that induce drift towards a failure state. The intrusion detection system is able to prevent harm and disruption arising from control messages that individually appear legitimate and benign but that, in combination with other messages, can cause undesirable outcomes.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: June 27, 2023
    Assignee: SRI INTERNATIONAL
    Inventors: Gabriela Ciocarlie, Michael E. Locasto, Cherita Corbett, Dejan Jovanovic
  • Patent number: 11683165
    Abstract: The concepts and technologies disclosed herein are directed to quantum key distribution (“QKD”) networking as a service. According to one aspect disclosed herein, a microservices controller can establish a plurality of quantum connections with a plurality of virtual quantum connection managers (“vQCMs”) deployed in association with a set of quantum user nodes (“QUNs”) in a QKD network. The microservices controller can receive a request to initialize the QKD network. The microservices controller can coordinate with the plurality of vQCMs to handle initialization of the QKD network. The microservices controller can receive a QKD service request from a QKD network operator. The microservices controller can invoke a plurality of microservices to handle the QKD service request.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: June 20, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Moshiur Rahman, William Trost, Daniel Solero, Daniel Sheleheda
  • Patent number: 11676011
    Abstract: Embodiments are disclosed for a method for private transfer learning. The method includes generating a machine learning model comprising a training application programming interface (API) and an inferencing API. The method further includes encrypting the machine learning model using a predetermined encryption mechanism. The method additionally includes copying the encrypted machine learning model to a trusted execution environment. The method also includes executing the machine learning model in the trusted execution environment using the inferencing API.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, John Behnken, John Melchionne, Michael Amisano, David K. Wright
  • Patent number: 11677542
    Abstract: An example operation may include one or more of identifying blockchain transactions for a particular blockchain, identifying blockchain transaction metrics from the blockchain transactions, determining whether the blockchain transaction metrics require a change to current blockchain operating rules, and when the blockchain transaction metrics require the change to the current blockchain operating rules, modifying the current blockchain operating rules.
    Type: Grant
    Filed: May 17, 2018
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Garfield Vaughn, Tetiana Iakovenko, Marcelo A. Martins, Nitin Gaur, Rolando Franco
  • Patent number: 11671412
    Abstract: The technology disclosed herein provides network bound encryption that enables a node management device to orchestrate workloads with encrypted data without sharing the decryption key. An example method may include: obtaining an asymmetric key pair comprising a public asymmetric key and a private asymmetric key; establishing a symmetric key using a key establishment service, wherein the symmetric key is established in view of the private asymmetric key of a first computing device and a public asymmetric key of the key establishment service; transmitting sensitive data encrypted using the symmetric key to a persistent storage device accessible to a second computing device; initiating a creation of an execution environment on the second computing device; and providing, by the first computing device, the public asymmetric key and the location data to the second computing device, wherein the location data corresponds to the key establishment service.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: June 6, 2023
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum
  • Patent number: 11671446
    Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: June 6, 2023
    Assignee: Google LLC
    Inventors: Francois Pepin, Andre Lloyd Perlee Harder, Prajakta Joshi, Amitabha Roy, Saila Talagadadeevi, Emil Kiner, Chia-Tung Kuo, Jiayu Ye
  • Patent number: 11665182
    Abstract: One or more computing devices, systems, and/or methods are provided. Event information associated with a plurality of events may be identified. The plurality of events may be associated with first entities corresponding to a first entity type and second entities associated with a second entity type. A first network profile associated with the first entities and the second entities may be generated based upon the event information. An arrangement of particles corresponding to the first entities and the second entities may be generated. Charges associated with the particles may be determined based upon the first network profile. The particles may be rearranged to a second arrangement of particles based upon the charges. One or more clusters of particles in the second arrangement of particles may be identified. One or more coalition networks associated with fraudulent activity may be identified based upon the one or more clusters of particles.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: May 30, 2023
    Assignee: Yahoo Assets LLC
    Inventor: Timothy Michael Olson
  • Patent number: 11664976
    Abstract: A method for hyper security encoding includes receiving data to be encrypted, and padding the data to be encrypted with padding data to avoid un-obfuscated bits after encryption. The method also includes encrypting, with a Mojette Transform, the data to be encrypted after the data to be encrypted is padded with the padding data, and outputting a result of the encryption as encrypted data.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: May 30, 2023
    Assignee: ZEBWARE AB
    Inventor: Johan Andersson
  • Patent number: 11665004
    Abstract: Systems and methods are described that enable trusted communications between two entities. In one implementation, a controller of a vehicle may include one or more processors configured to receive data and a controller signature from a second controller of the vehicle. The controller signature may be generated based on at least a first portion of the data. The one or more processors may be further configured to transmit the data and the controller signature to a gateway of the vehicle and receive a gateway signature from the gateway. The gateway signature may be generated based on at least a second portion of the data and transmitted to the controller after the gateway verified the controller signature. In addition, the one or more processors may be configured to verify the gateway signature and process the data.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: May 30, 2023
    Assignee: NEUSTAR, INC.
    Inventor: Brian R. Knopf
  • Patent number: 11658979
    Abstract: A method for providing access to media content from a media content provider is performed at an electronic device. The method includes receiving, from a client device, a request for access to a media item. The request for access includes a self-describing user-identifier. The method includes, in response to the request for access to the media item, initiating an analysis to determine whether the client device is authorized to access the media item, the analysis including an examination of a media consumption log associated with the client device. The media consumption log stores data representing self-describing user-identifiers. The analysis includes, based on the examination of the media consumption log, detecting multiple requests from different self-describing user identifiers corresponding to the client device to determine whether the client device has reached an access limit and, when the client device has reached the access limit, terminating access to the media item.
    Type: Grant
    Filed: March 29, 2021
    Date of Patent: May 23, 2023
    Assignee: Spotify AB
    Inventors: Henrik Tobias Lof, Marcus Per Vesterlund
  • Patent number: 11652844
    Abstract: Methods and systems are provided for identifying suspect Internet Protocol (IP) addresses, in accordance with embodiments described herein. In particular, embodiments described herein include obtaining a set of login pairs comprising login identifiers (e.g., user identifiers) and IP addresses used in attempts to login to a source. A set of IP clusters is generated using the set of login pairs. Each IP cluster can include one or more IP addresses identified as related based on a login identifier being used to attempt to login to the source via multiple IP addresses or an IP address being used to attempt to login to the source via multiple login identifiers. Thereafter, it is determined that a particular IP cluster exceeds a threshold amount of IP addresses. Each of the IP addresses within the particular IP cluster is designated as a suspect IP address.
    Type: Grant
    Filed: May 1, 2020
    Date of Patent: May 16, 2023
    Assignee: ADOBE INC.
    Inventors: Portase Nicuşor-Sorin, Cristian-Aurel Opincaru, Manole Catalin-Teodor
  • Patent number: 11651063
    Abstract: In one example, a non-transitory computer readable medium for component verification and revocation includes instructions for a processor to verify that a component in a device is valid using a verification service and consequently enable a premium service. The processor may later use information from the verification service that the component is no longer valid and consequently alter the premium service.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: May 16, 2023
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Shell Simpson, Brett Green, Timothy P. Blair