Patents Examined by Jeffrey D. Popham
-
Patent number: 11977621Abstract: A system and associated methods for authenticating physical or digital objects are disclosed. In at least one embodiment, a plurality of authentication devices is initiated, with each of the authentication devices associated with a one of the objects and containing a unique authentication sequence algorithm used to generate a sequence of device sequence values stored on each said authentication device. Upon a user desiring to authenticate a given object via a user application on a user device, the authentication device provides a data set to an authentication server. If the authentication server locates the authentication device in an authentication table, and subsequently processes the data set successfully, the authentication server obtains from the authentication table a server sequence value associated with the authentication device. If the device sequence value is later in the sequence than the server sequence value, the authentication server transmits a success message to the user application.Type: GrantFiled: April 12, 2023Date of Patent: May 7, 2024Inventors: Cynthia Fascenelli Kirkeby, Anthony Suk Ko
-
Patent number: 11968292Abstract: Data is encoded to be incrementally authenticable. A plaintext is used to generate a ciphertext that comprises a plurality of authentication tags. Proper subsets of the authentication tags are usable to authenticate respective portions of plaintexts obtained from the ciphertext. Portions of the plaintext can be obtained and authenticated without decrypting the complete ciphertext.Type: GrantFiled: December 18, 2014Date of Patent: April 23, 2024Assignee: Amazon Technologies, Inc.Inventor: Hanson Char
-
Patent number: 11915524Abstract: This disclosure relates generally to a method and system for online handwritten signature verification providing a simpler low cost system. The method comprises extracting signature data for the subject from a sensor array for the predefined time window at regular predefined time instants. Further, differentiating the matrix row wise and column wise to generate a row difference matrix and a column difference matrix. Further, determining an idle signature time fraction for the extracted signature data of the subject being monitored from the column difference matrix. Further, determining a plurality of signature parameters based on the row difference matrix and the column difference matrix.Type: GrantFiled: February 18, 2019Date of Patent: February 27, 2024Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Dibyendu Roy, Arijit Chowdhury, Arijit Sinharay, Avik Ghose
-
Patent number: 11888884Abstract: A cyber threat intelligence infrastructure allows processing of network data to enrich captured data with data from different sources to identify possible and/or actual cyber threats.Type: GrantFiled: December 21, 2017Date of Patent: January 30, 2024Assignee: BCE Inc.Inventors: Hakem Habib, Kushwant Singh Gidda, Corey Still, Maciej Broda, Amir-Hossein Razavi, Matthew Kitching, Marc-Andre Hervieux, James Skinner, Mahamudul Chowdhury, Shaffiq Dhanji
-
Patent number: 11860985Abstract: A user of a device is authenticated after providing a pass code or other data confirming the user can access data on the device. While the user uses the device, behaviometric data is recorded which includes measures of how the user uses the device. Additional data, however, can only be accessed with a biometric and/or second authentication after collecting at least some behaviometric data, in embodiments of the disclosed technology. Depending on how close of a match the behaviometric data received is to previously recorded behaviometric data for the particular user, a threshold minimum is set for the biometric match in order to grant stepped up authentication and authorization to view the additional data. In this manner, a legitimate user often requires less time to authenticate compared to the prior art and a fraudulent user is rejected from access to sensitive data more accurately.Type: GrantFiled: April 8, 2019Date of Patent: January 2, 2024Assignee: BEHAVIOSEC INCInventors: Ingo Deutschmann, Per Burstrom
-
Patent number: 11743257Abstract: An application-operating organization may delegate a third-party server to serve as an automated contextual authentication responder and an authorization responder. The third-party server may manage a delegated section of the organization's namespace that includes the public identities of various devices controlled by the organization. The third-party server may also dynamically generate interaction control list that is tailored to a requesting device's context based on the interaction control policies set forth by the organization. The interaction control list may include information that determines the authorization of the requesting device to interact with another device. The third-party server may also automatically determine the role of a new device to which existing policies are inapplicable and provide guided workflow for the organization to set up new interaction control policies in governing the new device.Type: GrantFiled: January 22, 2021Date of Patent: August 29, 2023Assignee: ValiMail Inc.Inventors: Peter Martin Goldstein, Seth Joshua Blank, Ashley Duane Wilson, Jack William Abbott, Robert Benjamin Barclay
-
Patent number: 11720661Abstract: Systems and methods for a passive wireless multi-factor authentication approach are provided. According to one embodiment, a user authentication request is received by a first computing device connected to a private network. The user authentication request is sent by an endpoint protection suite running on the first computing device to an authentication device associated with the private network. A proximity of a second computing device, which was previously registered with the authentication device to be used as a factor of a multi-factor authentication process involving the first computing device, is determined by the authentication device in relation to one or more wireless access points of a wireless network of the private network. The user authentication request is then processed by the authentication device based on the proximity.Type: GrantFiled: December 18, 2017Date of Patent: August 8, 2023Assignee: Fortinet, Inc.Inventor: Eric C. Hastings
-
Patent number: 11706195Abstract: The technology disclosed herein enables micro-segmentation of virtual computing elements. In a particular embodiment, a method provides identifying one or more multi-tier applications comprising a plurality of virtual machines. Each application tier of the one or more multi-tier applications comprises at least one of the plurality of virtual machines. The method further provides maintaining information about the one or more multi-tier applications. The information at least indicates a security group for each virtual machine of the plurality of virtual machines. Additionally, the method provides identifying communication traffic flows between virtual machines of the plurality of virtual machines and identifying one or more removable traffic flows of the communication traffic flows based, at least in part, on the information. The method then provides blocking the one or more removable traffic flows.Type: GrantFiled: December 15, 2020Date of Patent: July 18, 2023Assignee: Nicira, Inc.Inventors: Laxmikant Gunda, Rajiv Krishnamurthy
-
Patent number: 11657143Abstract: A request control device, when receiving a request issued from a client to a Web system, causes a sandbox in which an environment of the Web system is reproduced to inspect the request. The request control device transfers the request to the Web system if an inspection result of the request in the sandbox does not indicate detection of an attack. The request control device does not transfer the request to the Web system if the inspection result of the request indicates detection of an attack.Type: GrantFiled: January 26, 2018Date of Patent: May 23, 2023Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yang Zhong, Tohru Sato
-
Patent number: 11646867Abstract: Systems and methods for increasing security in a computer system are provided. The system includes one or more logic circuits. The one or more logic circuits receive a plurality of independent first entropy values from a hardware source, apply at least some of the plurality of independent first entropy values to a function to generate a second entropy value, and seed a pseudorandom number generator with the second entropy value. The one or more logic circuits also generate a random number using the pseudorandom number generator seeded with the second entropy value and may produce a block of ciphertext or message authentication code using the random number, or otherwise use the generated numbers as secure random numbers in applications such as cryptographic protocols.Type: GrantFiled: December 22, 2017Date of Patent: May 9, 2023Assignee: The Boeing CompanyInventor: Laszlo Hars
-
Patent number: 11636187Abstract: Disclosed herein are systems and methods for continuous user authentication during access of a digital service. In an exemplary aspect, a continuous authentication module may receive, at a computing device, initial authentication credentials of the user. The initial authentication credentials enable access to a service via the computing device. While the service is being accessed, the continuous authentication module may continuously monitor whether an unauthorized user has replaced the user in accessing the service by comparing usage attributes of the service with historic usage attributes associated with the user. In response to determining that the unauthorized user has replaced the user, the continuous authentication module may cease the access to the service via the computing device.Type: GrantFiled: December 17, 2019Date of Patent: April 25, 2023Assignee: Acronis International GmbHInventors: Oleg Melnikov, Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11570188Abstract: A dark web monitoring, analysis and alert system comprising a data receiving module configured to receive data collected from the dark web and structured; a Structured Data Database (SDD) connected with the data receiving module, the SDD configured to store the structured data; a Text Search and Analytic Engine (TSAE) connected with the SDD, the TSAE configured to enable advanced search and basic analysis in the structured data; a Knowledge Deduction Service (KDS) connected with the TSAE, the KDS configured to deeply analyze the collected data; the deep analysis comprises extracting insights regarding dark web surfers behavioral patterns and interactions; a Structured Knowledge Database (SKD) connected with the KDS, the SKD configured to store the deep analysis results; and an Alert Service connected with the TSAE and the SKD, the Alert Service configured to provide prioritized alerts based on the deep analysis.Type: GrantFiled: December 27, 2016Date of Patent: January 31, 2023Assignee: Sixgill Ltd.Inventors: Elad Lavi, Avi Kasztan
-
Patent number: 11537706Abstract: A service provider receives a set of credentials from a customer and a request to access one or more services provided by the service provider. An authentication service of the service provider receives the set of credentials and, based at least in part on the received set of credentials, one or more activities performed by the customer, the customer's user profile, and the system configuration of the customer's computing device, calculates a risk score. The authentication service subsequently utilizes the calculated risk score to determine a credential rotation schedule for the set of credentials. The authentication service updates one or more servers to enforce the new credential rotation schedule and enables the customer to utilize the set of credentials to access the one or more services.Type: GrantFiled: December 19, 2014Date of Patent: December 27, 2022Assignee: Amazon Technologies, Inc.Inventor: Nima Sharifi Mehr
-
Patent number: 11526620Abstract: Techniques for enabling impersonation without requiring an access manager (AM) controlling access to a computing resource to have direct access to user information. The AM receives an impersonation request for a first user to impersonate a second user, the request being received during a first session initiated by the first user. The second user has an access privilege that permits access to the computing resource. The AM causes information to be obtained from an identity provider, the information being stored in a location inaccessible to the AM and indicating whether the first user has been granted permission to impersonate the second user. An impersonation session is initiated based on determining, using the information obtained from the identity provider, that the first user has been granted permission to impersonate the second user. The initiating comprises switching a user associated with the first session from the first user to the second user.Type: GrantFiled: October 16, 2018Date of Patent: December 13, 2022Assignee: ORACLE INTERNATIONAL CORPORATIONInventor: Ramya Kukehalli Subramanya
-
Patent number: 11516011Abstract: A blockchain integrated station initiates a ciphertext request to a server, where the ciphertext request includes first information associated with input data of an off-chain contract. The blockchain integrated station obtains, from the server, an execution result, where the execution result is obtained by the server by executing the off-chain contract using the input data.Type: GrantFiled: June 29, 2021Date of Patent: November 29, 2022Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Changzheng Wei, Ying Yan, Hui Zhang
-
Patent number: 11483288Abstract: Distributed firewalls reside at different points across a network. Each distributed firewall can include one or more rules that govern traffic over and/or access to the network. The rules can be discovered, converted into a standardized format, and indexed at a centralized rule database. The rules or data of the rules can be verified. The rules can be certified at the centralized database. The certification process can be based on a direction of traffic to which the rule governs. The certification process may have different levels based on the direction of traffic.Type: GrantFiled: September 13, 2019Date of Patent: October 25, 2022Assignee: Wells Fargo Bank, N.A.Inventors: Justin Dunn, Artemio V. Meras, III, Brian Schlemmer, Shawn M. Craig, Duncan Molony, Christopher Houser, Michael Scott Hopkins, Kerrie Heller, Michael Dutilly, Christy K. Lewis Lester, Jonathan Louis Gabel
-
Patent number: 11470094Abstract: A content replication connector receives control data associated with replication of content data from a source system. Based on the control data, the content replication connector fetches the content data from the source system, converts the content data from a first data format to a second data format, and sends the content data to a content replication server. The content replication server replicates the content data, and a target system fetches the content data from the content replication server.Type: GrantFiled: December 16, 2016Date of Patent: October 11, 2022Assignee: SAP SEInventors: Thomas Kunz, Omar-Alexander Al-Hujaj, Jens Baumgart, Harish Mehta, Florian Chrosziel, Marco Rodeck, Thorsten Menke
-
Patent number: 11429725Abstract: Systems and methods involve a database function of an ATM processor on which rules database records for positive transition flows of ATM hardware or software activities are stored, a security agent function of the ATM processor that extracts data points from a transition flow for every succeeding ATM activity, and an algorithm function of the ATM processor that generates a rules database record for the transition flows for succeeding ATM activity based on the extracted data points and discards any generated rules database record that is identical to a rules database record already stored on the rules database function. A discovery phase of the algorithm function stores new rules database records, rules database function, and a protection phase of the algorithm function selects a risk protocol, when a generated record is not identical to a record already stored.Type: GrantFiled: April 26, 2018Date of Patent: August 30, 2022Assignee: CITICORP CREDIT SERVICES, INC. (USA)Inventor: Ganesh Banerjee
-
Patent number: 11397804Abstract: A system and associated methods for authenticating an at least one tangible product are disclosed. In at least one embodiment, upon a user desiring to authenticate a given product via a user application on a user device, an authentication request is initiated with an authentication device attached to the product. A device variable count on the authentication device is incremented based on an underlying algorithm, and the authentication device generates a data set containing at least one of a unique device identifier, a unique device key and the device variable count. The authentication device provides the data set and the device identifier to the user application, which then transmits the data to an authentication server. If the authentication server locates the device identifier in an authentication table, and subsequently processes the data set successfully, the authentication server obtains from the authentication table a server variable count associated with the device identifier.Type: GrantFiled: October 9, 2019Date of Patent: July 26, 2022Inventors: Cynthia Fascenelli Kirkeby, Anthony Suk Ko
-
Patent number: 11392724Abstract: A method for accelerating execution of application in a trusted execution environment includes generating a tag based on computer instructions associated with a function of an application and input data, for representation of a computation to be performed by the application; determining whether the tag correspond to an entry in a database having one or more entries of tag and one or more corresponding computation result; and retrieving a corresponding computation result from the database without performing the computation if a corresponding entry of the tag is found in the database.Type: GrantFiled: December 21, 2017Date of Patent: July 19, 2022Assignee: City University of Hong KongInventors: Cong Wang, Helei Cui, Huayi Duan