Patents Examined by Darren B Schwartz
  • Patent number: 11979398
    Abstract: A voiceprint authentication apparatus is provided, comprising: a voice receiving module configured to receive a user's voices in different speaking modes; a feature extraction module configured to extract respective sets of voice features from the user's voices in different speaking modes; a synthesis module configured to generate a first voiceprint template by synthesizing the respective sets of voice features; and a first communication module configured to send the first voiceprint template to a server to authenticate the user, wherein the user's voices and the respective sets of voice features are not sent to the server. A corresponding voice authentication method, as well as a computer readable medium, are also provided.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: May 7, 2024
    Inventors: Rui Zhang, Zheng Yan
  • Patent number: 11979414
    Abstract: A system, method, and computer-readable medium are disclosed for performing a human factors risk operation. The human factors risk operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a human factors framework; and, performing a human factors risk operation in response to the analyzing the security related activity.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: May 7, 2024
    Assignee: Forcepoint LLC
    Inventors: Raffael Marty, Nicolas Christian Fischbach
  • Patent number: 11979407
    Abstract: A method for protecting entities against bots is provided. The method includes identifying a request from a client to access a protected entity; selecting an access policy in response to the access request, wherein the access policy includes at least one challenge to be performed by the client; identifying results of the at least one challenge, wherein the results are provided by the client upon completion of the challenge; determining a bias of the client based on the completion results, wherein the determined bias is utilized for a cyber-security assessment of the client; and granting access to the protected entity by the client based on the determined bias.
    Type: Grant
    Filed: May 10, 2023
    Date of Patent: May 7, 2024
    Assignee: RADWARE, LTD.
    Inventors: Alon Lelcuk, David Aviv
  • Patent number: 11977641
    Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: May 7, 2024
    Assignee: Forcepoint LLC
    Inventors: Raffael Marty, Nicolas Christian Fischbach, Ofir Arkin
  • Patent number: 11973748
    Abstract: Techniques for sharing query results in a multi-tenant database system are described. The query results can be shared between users of the same account or organization in the multi-tenant network-based database system using security tokens. A first user executes a query, and the results are stored in the network-based database system. The first user can invoke a function to create a security token to provide access to the stored query results to other users in the same account. The first user can share the security token with the other users, who can directly access the stored results in the network-based database system instead of having to download local copies of the query results.
    Type: Grant
    Filed: October 30, 2023
    Date of Patent: April 30, 2024
    Assignee: Snowflake Inc.
    Inventors: Damien Carru, Thierry Cruanes, Jiaqi Yan
  • Patent number: 11963010
    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). According to various embodiments of the present disclosure, an apparatus of a terminal in a wireless communication system may include a transceiver and at least one processor coupled to the transceiver, wherein the at least one processor may be configured to transmit a registration request message or a service request message including primary information and secondary information to an access and mobility management function (AMF), the primary information may be plain information, and the secondary information may be encrypted information.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: April 16, 2024
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Kyungjoo Suh, Youngkyo Baek
  • Patent number: 11947648
    Abstract: In one embodiment, a method for authenticating a user with an electronic device is disclosed. The method incudes receiving digital sensor data from a motion sensor over a signal acquisition time period; deleting a beginning portion of the digital sensor data prior to the signal acquisition time period; suppressing signal components in the data associated with voluntary movement of the user; signal processing the suppressed digital sensor data to extract signal features representing neuro muscular tone of the user; tabulating the extracted signal features over periods of time into a feature vector table; executing a predictive model with the feature vector table; generating a numerical degree of matching level based on the feature vector table and the user parameter set; and making a determination to either authorize the user or not based on the numerical degree of matching level. The predictive model is trained by a user parameter set.
    Type: Grant
    Filed: December 23, 2021
    Date of Patent: April 2, 2024
    Assignee: Proprius Technolgies S.A.R.L
    Inventors: Martin Zizi, Nick Sullivan, Luke Stork, Doron Drusinsky, Kitae Lee
  • Patent number: 11947679
    Abstract: A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.
    Type: Grant
    Filed: April 19, 2023
    Date of Patent: April 2, 2024
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Samiksha Patel, Jessica Colvin, Patrick M. Ward, Marty Grant, Jr., David Everett, Jean-Francois Legault
  • Patent number: 11949700
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: April 2, 2024
    Assignee: Forcepoint LLC
    Inventors: Assaf Almaz, Ofir Arkin, Nicolas Christian Fischbach, Raffael Marty
  • Patent number: 11941121
    Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.
    Type: Grant
    Filed: December 28, 2021
    Date of Patent: March 26, 2024
    Assignee: UAB 360 IT
    Inventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
  • Patent number: 11941124
    Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.
    Type: Grant
    Filed: December 29, 2021
    Date of Patent: March 26, 2024
    Assignee: UAB 360 IT
    Inventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
  • Patent number: 11941122
    Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.
    Type: Grant
    Filed: December 29, 2021
    Date of Patent: March 26, 2024
    Assignee: UAB 360 IT
    Inventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
  • Patent number: 11941123
    Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.
    Type: Grant
    Filed: December 29, 2021
    Date of Patent: March 26, 2024
    Assignee: UAB 360 IT
    Inventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
  • Patent number: 11936688
    Abstract: Systems and methods are provided for performing simulated phishing attacks using social engineering indicators. One or more failure indicators can be configured in a phishing email template, and each failure indicator can be assigned a description about that failure indicator through use of a markup tag. The phishing email template containing the markup tags corresponding to the failure indicators can be stored and can be used to generate a simulated phishing email in which the one or more markup tags are removed.
    Type: Grant
    Filed: March 6, 2023
    Date of Patent: March 19, 2024
    Assignee: KnowBe4, Inc.
    Inventors: Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
  • Patent number: 11928230
    Abstract: A method for execution by a computing device to adjust efficiency of storing data in a storage network includes processing a data segment based on a storage approach to produce a processed data segment, the storage approach being based on an estimated overwrite frequency for the data segment. The method continues by error encoding the processed data segment to produce a set of encoded data slices, where a decode threshold number of encoded data slices is needed to recover the processed data segment. The method continues by storing the set of encoded data slices in the memory of the storage network.
    Type: Grant
    Filed: February 3, 2023
    Date of Patent: March 12, 2024
    Assignee: Pure Storage, Inc.
    Inventors: Ilya Volvovski, Wesley B. Leggette, Michael C. Storm, Jason K. Resch
  • Patent number: 11928215
    Abstract: An apparatus to verify firmware in a computing system, comprising a non-volatile memory, including firmware memory to store agent firmware associated with each of a plurality of interconnect protocol (IP) agents and version memory to store security version numbers (SVNs) included in the agent firmware, a security controller comprising verifier logic to verify an integrity of the version memory by applying a hash algorithm to contents of the version memory to generate a SVN hash, and a trusted platform module (TPM) to store the SVN hash.
    Type: Grant
    Filed: June 29, 2022
    Date of Patent: March 12, 2024
    Assignee: Intel Corporation
    Inventors: Prashant Dewan, Chao Zhang, Nivedita Aggarwal, Aditya Katragada, Mohamed Haniffa, Kenji Chen
  • Patent number: 11930126
    Abstract: The present invention provides systems and methods for supporting encrypted communications with a medical device, such as an implantable device, through a relay device to a remote server, and may employ cloud computing technologies. An implantable medical device is generally constrained to employ a low power transceiver, which supports short distance digital communications. A relay device, such as a smartphone or WiFi access point, acts as a conduit for the communications to the internet or other network, which need not be private or secure. The medical device supports encrypted secure communications, such as a virtual private network technology. The medical device negotiates a secure channel through a smartphone or router, for example, which provides application support for the communication, but may be isolated from the content.
    Type: Grant
    Filed: February 15, 2023
    Date of Patent: March 12, 2024
    Assignee: Piltorak Technologies LLC
    Inventor: Alexander I Poltorak
  • Patent number: 11924332
    Abstract: The disclosure relates to, among other things, systems and methods for facilitating the secure recording of assertions made by entities tied to identities. Embodiments of the disclosed systems and methods may allow users to make non-revocable, difficult to forge, cryptographic assertions tied to their identities through the posting of entries in an immutable ledger. In certain embodiments, a user's cryptographic assertions may be preceded by ledger entries which feature certificates from trusted authorities that tie the keys used for making assertions to the user's identity. Further embodiments provide for a mechanism for disabling further entries posted under a user's key, either automatically or at the user's initiation.
    Type: Grant
    Filed: March 10, 2023
    Date of Patent: March 5, 2024
    Assignee: Intertrust Technologies Corporation
    Inventor: Caleb Levy
  • Patent number: 11924179
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive, by the network communication device from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: March 5, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Patent number: 11916890
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be accessed from a cryptographic service. The private session key can be communicated from the user space software to a network communication device. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can be configured to generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: February 27, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz