Patents Examined by Helai Salehi
-
Patent number: 11962570Abstract: A method including configuring, by an infrastructure device, a virtual private network (VPN) server to install an initial operating system on a volatile memory associated with the VPN server; configuring, by the infrastructure device, the VPN server to execute the initial operating system from the volatile memory to receive a VPN operating system; configuring, by the infrastructure device, the VPN server to install the VPN operating system on the volatile memory; and configuring, by the infrastructure device, the VPN server to execute the VPN operating system from the volatile memory to provide VPN services. Various other aspects are contemplated.Type: GrantFiled: March 31, 2022Date of Patent: April 16, 2024Assignee: UAB 360 ITInventor: Karolis Pabijanskas
-
Patent number: 11962609Abstract: Examples disclosed herein relate to source entities of security indicators. Some examples disclosed herein enable identifying, in a security information sharing platform, a security indicator that is originated from a source entity where the security indicator comprises an observable. Some examples further enable determining a reliability level of the source entity based on at least one of: security events, sightings of the observable, a first set of user feedback information that is submitted for the security indicator by users of the security information sharing platform, or a second set of user feedback information that is collected from external resources that are external to the security information sharing platform.Type: GrantFiled: February 12, 2016Date of Patent: April 16, 2024Assignee: Micro Focus LLCInventors: Tomas Sander, Brian Frederik Hosea Che Hein, Nadav Cohen, Ted Ross
-
Patent number: 11962585Abstract: A Third Generation Partnership Project (3GPP) based network, such as an enterprise private 3GPP network, is operative to provide a guest onboarding of a device using a realm-based discovery of an identity provider and a mutual authentication of identity federation peers. A secure connection may be established between the peers so that the device may be authenticated based on credentials associated with a Subscriber Identity Module (SIM) provided by its Mobile Network Operator (MNO). Credentials may be extended to those associated with embedded SIMs (eSIMs), digital certificates from private enterprises, login and passwords, and identities from a wide range of identity providers. After device authentication, the 3GPP-based network is operative to select and enforce access policies according to an identity or other attribute of the device.Type: GrantFiled: August 10, 2020Date of Patent: April 16, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: John Martin Graybeal, Bart A. Brinckman, Srinath Gundavelli
-
Patent number: 11956365Abstract: An access manager determines whether access will be granted to a guarded species or space utilizing a controller including a digital processor with a memory for storing an ID library and a transducer block coupled with the processor for accessing a plurality of different ID types and an access control block coupled with the processor for granting or denying access.Type: GrantFiled: October 5, 2020Date of Patent: April 9, 2024Assignee: FaceFirst, Inc.Inventors: Joseph Ethan Rosenkrantz, Gifford Hesketh
-
Patent number: 11943612Abstract: A method for authenticating by a network server a communication apparatus, the communication apparatus contains a tamper resistant area adapted to memorize a first secret, by receiving from the communication apparatus a request message including a subscriber identifier; providing, by consulting a database accessible by the network server, a device identifier associated to the received subscriber identifier allowing to identify the communication apparatus; identifying in a secure distributed ledger a record published by a manufacturer of at least a portion of the communication apparatus, the record including a second secret attributed to the identified communication apparatus; generating a challenge message including a random number and sending it to the communication apparatus for it to generate a first result; receiving from the communication apparatus a response message including the first result, the communication apparatus being authenticated by the network server if the first result is equal to a secondType: GrantFiled: November 13, 2019Date of Patent: March 26, 2024Assignee: THALES DIS FRANCE SASInventors: Milas Fokle Kokou, Jean-Yves Fine, Michel Anslot
-
Patent number: 11943233Abstract: An electronic control unit is connected to a network in an in-vehicle network system. The electronic control unit includes a first control circuit and a second control circuit. The first control circuit is connected to the network via the second control circuit. The second control circuit performs a first determination process on a frame to determine conformity of the frame with a first rule. Upon determining that the frame conforms to the first rule, the second control circuit transmits the frame to the first control circuit. The first control circuit performs a second determination process on the frame to determine conformity of the frame with a second rule. The second rule is different from the first rule.Type: GrantFiled: December 22, 2021Date of Patent: March 26, 2024Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICAInventors: Yoshihiro Ujiie, Jun Anzai, Yoshihiko Kitamura, Masato Tanabe, Hideki Matsushima, Tomoyuki Haga, Takeshi Kishikawa, Ryota Sugiyama
-
Patent number: 11902792Abstract: At given user equipment in a communication system, a unified subscription identifier data structure is constructed. The unified subscription identifier data structure includes a plurality of fields that specify information for a selected one of two or more subscription identifier types and selectable parameters associated with the selected subscription identifier type, and wherein the information in the unified subscription identifier data structure is useable by the given user equipment to access one or more networks associated with the communication system based on an authentication scenario corresponding to the selected subscription identifier type. For example, during different authentication scenarios, the given user equipment utilizes the unified subscription identifier data structure to provide the appropriate subscription identifier (e.g., SUPI, SUCI or IMSI) and associated parameters for the given authentication scenario.Type: GrantFiled: April 4, 2019Date of Patent: February 13, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi, Dimitrios Schoinianakis
-
Patent number: 11886603Abstract: A method for signing an electronic document is disclosed. The method includes: receiving, from a first client device: a first electronic document in a first state, the first electronic document containing first data in the first state; a first indication of approval for the first electronic document in the first state; and a selection of one or more second client devices; sending, to each of the one or more second client devices, an invite to access the first electronic document in the first state, each invite including a link to access the first electronic document; receiving, from at least one of the one or more second client devices, a second indication of approval for the first electronic document in the first state; validating the second indications of approval; in response to the validating, submitting a locked form version of the first electronic document to a virtual document signing ceremony.Type: GrantFiled: July 16, 2018Date of Patent: January 30, 2024Assignee: The Toronto-Dominion BankInventors: Avinash Malliah, Gregory Boddison, Angelique Louise Carle
-
Patent number: 11863530Abstract: A computerized method for establishing a secure channel between a virtual private network (VPN) client processing on a network device for a user and a network gateway is disclosed. The computerized method includes operations of the controller of transmitting an authentication request to an identity provider based on receipt of a resource request from the VPN client, receiving an authentication response from the identity provider, generating an authentication token based on the authentication response and transmitting the authentication token to the VPN client, wherein the controller further stores the authentication token.Type: GrantFiled: May 4, 2021Date of Patent: January 2, 2024Assignee: Aviatrix Systems, Inc.Inventors: Arvind Sreekumar, Ramkrishnan Kunnath, Xiaobo Sherry Wei
-
Patent number: 11863555Abstract: In one embodiment, a management service for a network that is executed by one or more devices establishes a trust relationship with an entity associated with an endpoint in the network. The management service receives, via a Manufacturer Usage Description (MUD) file for the endpoint, an indication that the entity desires remote access to the endpoint in the network. The management service configures, based on the indication, the network to provide a remote access connection between the entity and the endpoint in the network. The management service provides, to the entity, credentials to the entity for the remote access connection.Type: GrantFiled: February 12, 2021Date of Patent: January 2, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert E. Barton, Jerome Henry, Vinay Saini
-
Patent number: 11855976Abstract: A system for utilizing behavioral features to authenticate a user entering login credentials. The system includes an electronic processor configured to receive a request to access a user account and compare behavioral features included in the request to behavioral features included in a user behavior profile associated with the user account. The electronic processor is also configured to, based on the comparison, generate one or more scores. The electronic processor is further configured to, for each of the one or more scores, compare the score to a predetermined threshold and, based on the comparison of the score to the predetermined threshold, adjust a match value. The electronic processor is also configured to compare the match value to one or more predetermined thresholds to determine whether the behavioral features included in the request to access the user account authenticates the user, does not authenticate the user, or is inconclusive.Type: GrantFiled: August 7, 2020Date of Patent: December 26, 2023Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Sik Suen Chan, Anton Laptiev, Parin Prashant Shah
-
Patent number: 11853437Abstract: A method for storing data on a storage entity (SE) includes: computing a file identifier for a file to be stored on the SE; checking if the file has already been stored using the file identifier; generating a user-specific private and public identifier, wherein generating the user-specific private identifier is based on using an oblivious key generation protocol between the client and a trusted entity, and wherein the user-specific private identifier is a deterministic private identifier; updating or computing tags of the file by the client such that the updating or computing is homomorphic in the user-specific private identifier and in parts of the file; and providing the user-specific public identifier, the updated tags and a proof of possession of the secret identifier to the SE to enable the SE to store information associated with the file.Type: GrantFiled: May 20, 2021Date of Patent: December 26, 2023Assignee: NEC CORPORATIONInventors: Jens-Matthias Bohli, Ghassan Karame, Frederik Armknecht
-
Patent number: 11848962Abstract: Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based upon whether the device posture assessment reveals that device to be a managed device that is in compliance with compliance rules.Type: GrantFiled: September 24, 2020Date of Patent: December 19, 2023Assignee: AirWatch, LLCInventors: Craig Farley Newell, Jonathan Blake Brannon, Kabir Barday, Ashish Jain
-
Patent number: 11805121Abstract: A method for authenticating a user for performing a transaction comprises receiving unique knowledge of the user such as photoauthentication, and receiving a hardware profile associated with the user. The unique knowledge and the hardware profile are compared against previously stored data representing unique knowledge of the user and a hardware profile associated with the user. If both the received data representing the unique knowledge of the user and the received hardware profile are authenticated, the transaction is allowed to go forward.Type: GrantFiled: December 7, 2018Date of Patent: October 31, 2023Assignee: Traitware, Inc.Inventors: Herbert W. Spencer, III, Christopher M. Canfield, Harlan Hutson, Vince Conroy, Steven A. Hickerson
-
Patent number: 11799871Abstract: A security level of data generated by an application may be communicated from the application layer to the network layer and that security level used to determine of several available network connects for transmitting the data. A method of communicating may include associating the plurality of network connections with security levels to form associations, the associations indicating security levels of data that may be transmitted over each of the plurality of network connections; receiving, at the network layer, data for transmission; determining, at the network layer, a security level for the data; determining, at the network layer, at least one network connection of a plurality of network connections to transmit the data based, at least in part, on the security level; and transmitting the data packet over the at least one network connection.Type: GrantFiled: October 22, 2020Date of Patent: October 24, 2023Assignee: Dell Products L.P.Inventors: Dileep Kumar Soma, Harpreet Narula, Brian E. Manser
-
Patent number: 11784977Abstract: Methods, apparatus, systems and articles of manufacture for communicating encrypted data via a virtual private network are disclosed. An example computer system disclosed herein includes a memory including instructions that, when executed, cause one or more processors to establish a first tunnel and a second tunnel between a VPN client and a VPN server. The instructions further cause the one or more processors to access a request message to be sent via the VPN and determine, in response to a payload being formatted using a first protocol, whether a packet associated with the request message includes an encrypted server name indication (SNI). The instructions further cause the one or more processors to, in response to the packet including the encrypted SNI, encrypt the header of the request message to form an encrypted header, create an encrypted message including the encrypted header and the payload of the request message, and transmit the encrypted message through the first tunnel.Type: GrantFiled: December 2, 2020Date of Patent: October 10, 2023Assignee: MCAFEE, LLCInventors: Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava
-
Patent number: 11774953Abstract: Disclosed is a method for checking the setting of predefined security functions of a field device of process and automation technology, wherein the predefined security functions relate to an access to a function of the field device by an unauthorized person. The method includes: identifying a user; starting by the user a query about the actual setting of the security functions predefined at the measuring point; comparing actual setting of the predefined security functions with a target setting of the predefined security functions defined by the stipulated security level; and outputting an electronic report about the matching or deviation of the actual setting from the target setting of the predefined security functions. Depending on the matching or deviation of the actual setting from the target setting of the predefined security functions, different steps are carried out.Type: GrantFiled: November 23, 2020Date of Patent: October 3, 2023Assignee: Endress+Hauser Wetzer GmbH+Co. KGInventor: Michael Kuhl
-
Patent number: 11682232Abstract: An image matching method includes extracting, from a first image of an object, a landmark patch including a landmark point of the object; extracting, from a second image of the object, a target patch corresponding to the landmark patch; and determining a target point in the second image corresponding to the landmark point based on a matching between the landmark patch and the target patch.Type: GrantFiled: October 1, 2018Date of Patent: June 20, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Sungun Park, Jihye Kim, Jaejoon Han, Minsu Ko, Seungju Han, Jinwoo Son, Changyong Son
-
Patent number: 11683160Abstract: Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a request for secure communications with a second node to the remote management system using a control channel. The remote management system generates and encrypts a group encryption key usable by the first and second nodes and forwards the encrypted group encryption key to the first and second nodes using one or more control channels. The first and second communication nodes decrypt the group encryption key and use it to encrypt data transmitted between the nodes using a data transport network. In some implementations the securely communicating nodes may use encryption keys and/or techniques that prevent the remote management system from eavesdropping on the nodes' communications.Type: GrantFiled: April 25, 2019Date of Patent: June 20, 2023Assignee: Orion Labs, Inc.Inventors: Greg Albrecht, Andy Isaacson, Nelson Carpentier, Dan Phung, Schuyler Erle
-
Patent number: 11665141Abstract: Virtual private network (VPN) service provider infrastructure (SPI) receives a request to access a VPN from a client device. The VPN SPI selects an Internet Protocol (IP) address for access to the VPN by the client device from a pool of IP addresses. The VPN SPI provides access to the VPN for the client device via the IP address. The VPN SPI receives one or more handshake notifications from the client device. The VPN SPI determines that a threshold time period has passed since a latest-in-time handshake notification of the one or more handshake notifications. The VPN SPI disconnects the client device from the VPN in response to determining that the threshold time period has passed. The VPN SPI adds the IP address to the pool of IP addresses in response to disconnecting the client device from the VPN.Type: GrantFiled: March 4, 2022Date of Patent: May 30, 2023Assignee: Oversec, UABInventors: Darjus Ilcevic, Gvidas Uzkuras