Patents Examined by Haresh N Patel
  • Patent number: 11463883
    Abstract: This Application describes efficient cellular service transfer mechanisms to move cellular services that are based on cellular service credentials, e.g., eSIMs, between accessory wireless devices under various scenarios, including in some embodiments transfer of multiple eSIMs. The first and second accessory wireless devices and the primary wireless device are associated with a common user account. Transfer of credentials for cellular service access can occur between two accessory wireless devices via the primary wireless device, where the primary wireless device and the accessory wireless devices interact with applicable network-based servers.
    Type: Grant
    Filed: August 24, 2020
    Date of Patent: October 4, 2022
    Assignee: Apple Inc.
    Inventors: Anish Kumar Goyal, Chenzhi Yu, Francisco J. Gonzalez, Li Li, Raj S. Chaugule, Rohan C. Malthankar, Samy Touati
  • Patent number: 11463872
    Abstract: A method for singularizing frames to be transmitted by an object connected to a server via a low-power wireless communication network. The singularization method includes an integration, in a frame to be transmitted identifying the transmitting connected object and including payload data, of at least: a counter that can be incremented as a function of the frame to be transmitted, the counter having a predefined dimension; and a supplementary index that can be modified upon a zeroing of the counter. Thus, two frames originating from one and the same object with the same payload data will be unique because they will include at least one counter and at least one supplementary index that are distinct. The use of the supplementary index makes it possible, without reducing the lifetime of the connected object, to singularize a greater number of frames.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: October 4, 2022
    Assignee: ORANGE
    Inventors: Halim Bendiabdallah, Isabelle Soumoy
  • Patent number: 11437150
    Abstract: Methods and systems provide for receiving, at a remote server, first data and a first sharing key acquired from a first processor associated with a first medical practice, and receiving, at the remote server, second data and a second sharing key acquired from a second processor associated with a second medical practice. The methods and systems provide for comparing, by the remote server, the first sharing key to the second sharing key, and granting, to the first and second processors by the remote server, access to the first and second data stored in the remote server in response to a successful comparison of the first and second sharing keys. The methods and systems provide for sharing, by the remote server, the first and second data with the first and second processors in response to the grant of access.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: September 6, 2022
    Assignee: Inspire Medical Systems, Inc.
    Inventors: John Rondoni, David Todd Dieken
  • Patent number: 11429708
    Abstract: Techniques for authentication for online content using an access token are described. According to various embodiments, online content (e.g., webpages and other types of web content) can be served across a variety of different online resources. According to one or more embodiments, an access token is leveraged to enable a user to authenticate with multiple different distributed content resources for access to online content, and without requiring the user to input authentication credentials for each of the content resources.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: August 30, 2022
    Assignee: Adobe Inc.
    Inventor: Antonio Sanso
  • Patent number: 11418492
    Abstract: Data stored on a data asset may be migrated to another data asset while maintaining compliance to applicable regulations. A data asset may experience a failure. Based on the type of data stored by that data asset and the applicable regulations, requirements, and/or restrictions that relate to a transfer of that type data from that data asset, a target data asset may be determined. The data stored on the data asset may then be transferred to the target data asset. The disclosed systems may use data models and/or data maps in determining the requirements for a data transfer and selecting target data assets.
    Type: Grant
    Filed: September 14, 2021
    Date of Patent: August 16, 2022
    Assignee: OneTrust, LLC
    Inventors: Arockia Gunasingam, Steven W. Finch, Saravanan Pitchaimani, Kevin Jones, Jonathan Blake Brannon
  • Patent number: 11416109
    Abstract: A chat robot may be used to facilitate interaction with a user in the determination of whether to initiate and process a data subject access request (DSAR). At a DSAR submission webpage, the chatbot may interact with a user to determine the information the user is in need of and/or the actions that the user may take. The chatbot may provide the information desired by the user, avoiding the processing overhead of submission and fulfillment of a DSAR. The chatbot may also facilitate completion of a DSAR on behalf of the user when needed.
    Type: Grant
    Filed: July 2, 2021
    Date of Patent: August 16, 2022
    Assignee: OneTrust, LLC
    Inventors: Priya Malhotra, Bryan Patrick Kveen, Jonathan Blake Brannon
  • Patent number: 11411925
    Abstract: A method for implementing indirect GTP firewall filtering includes using a signaling message routing node to dynamically populate an indirect GTP-C firewall filtering database with IMSIs and VPLMN IDs extracted from mobility management signaling messages for updating the locations of outbound roaming subscribers. The method further includes receiving a CCR-I message generated in response to a GTP-C message. The method further includes extracting an IMSI and a VPLMN ID from the CCR-I message. The method further includes accessing the indirect GTP-C firewall filtering database using the IMSI extracted from the CCR-I message. The method further includes determining that a record corresponding to the IMSI is present in the indirect GTP-C firewall filtering database. The method further includes determining that a VPLMN ID in the record does not match the VPLMN ID extracted from the CCR-I message.
    Type: Grant
    Filed: December 31, 2019
    Date of Patent: August 9, 2022
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Vipin Kumar, Shashikiran Bhalachandra Mahalank, Raghavendra Gopala Rao
  • Patent number: 11388145
    Abstract: This specification presents a method and apparatus to establish a transport layer security, TLS, tunnel over Ethernet, ETLS tunnel between two endpoints (UE and WAG) and to transport UE traffic encapsulated and encrypted in a proposed TLS type Ethernet frame for all applications, thus providing secure layer 2 connectivity over public wireless local area networks, WLAN, for all UE traffic and overcome the security vulnerability of the traditional HTTP login mechanism over the public WLAN. The UE uses the TLS handshake protocol which may include negotiating ETLS capabilities extension that comprises wireless control protocol for establishing a packet data connection and tunneled authentication protocol for UE authentication and full Ethernet protection for encrypting Ethernet frames of different types.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: July 12, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Changzheng Wu, Huawei Qin
  • Patent number: 11381562
    Abstract: A method for detection of a user equipment type includes: receiving, by a communication network, a service request message from a user equipment, wherein the service request message requests a service from the communication network and comprises subscriber identity information and/or device identity information related to the user equipment and an indication that an alternative authorization method and/or an alternative authentication method is to be applied to the user equipment; verifying, by the communication network, based on the subscriber identity information and/or the device identity information related to the user equipment, that the user equipment belongs to an internet-of-things user equipment type; and in response to verifying that the user equipment belongs to the internet-of-things user equipment type, granting, by the communication network, the requested service to the user equipment.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: July 5, 2022
    Assignee: DEUTSCHE TELEKOM AG
    Inventor: Kurt Bischinger
  • Patent number: 11381970
    Abstract: A method for authenticating a connection between a user device and a vehicle includes sending, by the vehicle, a first wireless signal through a connection channel, receiving, by the vehicle, a second wireless signal through the connection channel, and acquiring, by the vehicle, a second signal strength sequence from second N continuous signal strength characteristics (PFVeh) of the second wireless signal, receiving, by the user device from the vehicle, the first wireless signal, acquiring a first signal strength sequence from first N continuous signal strength characteristics (PFUDev) of the first wireless signal, and communicating, by the user device, the first signal strength sequence to the vehicle.
    Type: Grant
    Filed: June 14, 2021
    Date of Patent: July 5, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Girish Shivalingappa Revadigar, Zhuo Wei, Tieyan Li, Yanjiang Yang, Hai Yu
  • Patent number: 11354412
    Abstract: Methods and systems for identifying malicious applications and, more particularly, to identifying web shell applications. Embodiments described herein rely on machine learning tools to analyze static and dynamic features of a suspected file to determine whether the file is a web shell application.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: June 7, 2022
    Assignee: Rapid7, Inc.
    Inventors: Aditya Kuppa, Oliver Keyes, Joakim Kennedy, Ilya Biryukov
  • Patent number: 11347852
    Abstract: Methods and systems for identifying malicious applications and, more particularly, to identifying web shell applications. Embodiments described herein rely on machine learning tools to analyze static and dynamic features of a suspected file to determine whether the file is a web shell application.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: May 31, 2022
    Assignee: Rapid7, Inc.
    Inventors: Aditya Kuppa, Oliver Keyes, Joakim Kennedy, Ilya Biryukov
  • Patent number: 11323458
    Abstract: One variation of a method for end-to-end encryption of electronic mail includes: receiving an email encrypted according to a first encryption protocol and designating a recipient within an external domain; verifying encryption protocol supported by the recipient's mail client; in response to a recipient exclusion database identifying the recipient, encrypting the email to a less-robust encryption protocol supported by the recipient mail client and transmitting the email to the recipient; in response to the recipient exclusion database excluding the recipient and the recipient mail client supporting the first encryption protocol, transmitting the email encrypted according to the first encryption protocol to the recipient; and, in response to the recipient exclusion database excluding the recipient and the recipient mail client not supporting the first encryption protocol, generating a notification email including a hyperlink to a secure webpage containing content of the email and transmitting the notification
    Type: Grant
    Filed: January 7, 2022
    Date of Patent: May 3, 2022
    Assignee: Paubox, Inc.
    Inventor: Hoala Greevy
  • Patent number: 11323422
    Abstract: Provided herein is a method for registering an IoT device with a DNS registry. The method can include obtaining, at a DNS server, an identifier, IP address, and a public key of an asymmetric key pair associated with the IoT device from a network gateway device that is in communication with the IoT device, wherein the asymmetric key pair is provisioned onto the IoT device and an associated private key stored within a memory of the IoT device at a time that IoT device is manufactured or during a predetermined time window after manufacturing; creating at least one DNS record for the IoT device; assigning a domain name associated with the internet protocol (“IP”) address to the IoT device; storing the identifier, IP address, the domain name, and the public key in the at least one DNS record; and providing confirmation of the registration to the IoT device.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: May 3, 2022
    Assignee: VeriSign, Inc.
    Inventors: Stephen Daniel James, Daniel Schonfeld, Andrew Fregly, Eric Osterweil
  • Patent number: 11316899
    Abstract: Controlling access to categorized messages includes categorizing a message into a number of categories according to a message objective. The message objective informing user association, message association, and message access rules for each of the number of categories. Controlling access to categorized messages includes determining, based on the message objective, a number of users allowed access to the message. Controlling access to categorized messages includes allowing the number of users to access the message according to the message objective.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: April 26, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jennifer E. Heins, Marc D. Labrecque, Amy Widmer
  • Patent number: 11290884
    Abstract: Disclosed is a data communication method of a vehicle-to-everything (V2X) communication device. The data communication method includes: sending a misbehavior detection (MBD) information request message for collecting information regarding MBD; receiving an MBD information response message as a response message to the MBD information request message from an external V2X communication device, the MBD information response message including MBD information including information regarding MBD of the external V2X communication device; and generating certificate revocation list (CRL) information based on the MBD information. The V2X communication device may have a preset security level required for the V2X communication device to be operated as a misbehavior breaker (MBB) generating the CRL information.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: March 29, 2022
    Assignee: LG Electronics Inc.
    Inventor: Soyoung Kim
  • Patent number: 11272268
    Abstract: In one embodiment, a method for classifying an encrypted flow includes receiving a plurality of packets associated with an encrypted flow traversing a network, collecting telemetry data from the flow without decrypting the flow, sending the telemetry data to a backend system for classification, using the telemetry data to classify the flow using a machine learning classifier, creating a classification response, and using the classification response to modify processing of the flow. In another embodiment, a method for classifying an encrypted flow includes receiving a plurality of packets associated with an encrypted flow traversing a network, collecting telemetry data from the first plurality of packets associated with the flow, sending the telemetry data to a backend system for classification, using the telemetry data to classify the flow using a machine learning classifier, and using the output of the classifier to modify processing of the flow.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: March 8, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Blake Harrell Anderson, David Arthur McGrew, Alison Kendler
  • Patent number: 11271912
    Abstract: The present disclosure relates to a system for providing an anonymous and obfuscated communication over a virtual, modular and distributed satellite communication network.
    Type: Grant
    Filed: October 11, 2019
    Date of Patent: March 8, 2022
    Assignee: ENVISTACOM, LLC
    Inventors: Kasra Toyserkani, Michael Beeler, Cris Mamaril, Michael Geist
  • Patent number: 11265717
    Abstract: Disclosed are various embodiments for detecting Signaling System 7 (SS7) redirection attacks by measuring call audio round trip times between phones. Such redirection attacks force calls to travel longer physical distances than usual, thereby causing longer end-to-end delay. Accordingly, various embodiments implement a distance bounding-inspired protocol that allows for securely characterizing the round trip time between two call endpoints. As a result, telephone users can reliably detect SS7 redirection attacks and protect the information contained in their calls.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: March 1, 2022
    Assignee: University of Florida Research Foundation, Inc.
    Inventors: Patrick G. Traynor, Christian Peeters, Bradley G. Reaves, Hadi Abdullah, Kevin Butler, Jasmine Bowers, Walter N. Scaife
  • Patent number: 11265707
    Abstract: Methods, systems, and devices for wireless communications are described that improve privacy in wireless communications, such as communications by a user equipment (UE), which may in some cases be a vehicle UE. For example, various vehicle-to-everything (V2X) transmissions may be unencrypted, and a vehicle may be expected to periodically change one or more identifiers it uses for various communication services. Privacy may be enhanced, for example, via encryption key roll-over, as well as roll-over of one or more other identifiers associated with a UE that may potentially be used by an observer to track the UE. The UE may transmit a message that includes an updated lower layer identifier (e.g., a layer-2 (L2) identifier) to another UE in a V2X unicast communications link, which may trigger a change in identifiers of a set of identifiers and an updated security context. All or a portion of the message may be encrypted.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: March 1, 2022
    Assignee: QUALCOMM Incorporated
    Inventors: Michaela Vanderveen, Hong Cheng, Junyi Li, Shailesh Patil