Patents Examined by Jeffrey D. Popham
-
Patent number: 11368446Abstract: A service provider configured to establish a federated identity management with an identity provider, provision a first user account, and retrieve revocation information from a ledger. The revocation information can include a revoked user account identifier published to the ledger by the identity provider. The service provider can determine that the revoked user account identifier corresponds to the first user account. The service provider can delete the first user account from the service provider.Type: GrantFiled: October 2, 2018Date of Patent: June 21, 2022Assignee: International Business Machines CorporationInventors: Keiran W. Robinson, Craig Pearson, Leo M. M. Farrell
-
Patent number: 11321426Abstract: A computer-implemented method of providing limited distribution of a digital media file, the method being executable at a server connected to a network, the server comprising memory. The method includes receiving the digital media file to be distributed; encrypting the digital media file to create an encrypted digital media file; creating a plurality of copies of the encrypted digital media file; creating a plurality of rights tokens, a quantity of the rights tokens being equal to a quantity of copies of the encrypted digital media file, each rights token containing: a key for decrypting a corresponding one of the plurality of copies of the encrypted digital media file, and identifying information related to access rights for the digital media file; and recording the rights tokens to a rights blockchain representative of actions related to distribution of the plurality of copies of the encrypted the digital media file.Type: GrantFiled: February 22, 2018Date of Patent: May 3, 2022Assignee: SCENAREX INC.Inventor: Simon-Pierre Marion
-
Patent number: 11233812Abstract: An operation request is received from a terminal device. An identification of the terminal device is determined. Based on the identification of the terminal device, historical operation requests initiated from the terminal device in a predetermined time period prior to the operation request are determined. A user identity location is determined for each historical operation request. A number of different user identity locations for the historical operation requests is determined. Based on the number of different user identity locations, an account theft risk value is determined.Type: GrantFiled: November 17, 2017Date of Patent: January 25, 2022Assignee: Advanced New Technologies Co., Ltd.Inventor: Chunping Tan
-
Patent number: 11188683Abstract: An apparatus for intrusion detection includes processing circuitry, a switch, signal detection circuitry, and an analog-to-digital converter (“ADC”). The processing circuitry is coupled to send a challenge signal to a device when the device is coupled to the processing circuitry. The switch is coupled to be enabled and disabled by the processing circuitry. The switch is for coupling to the device to receive a response signal in response to the challenge signal sent by the processing circuitry. The signal detection circuitry is coupled to receive the response signal in via the switch, when the processing circuitry enables the switch. The ADC is coupled to take measurements of the signal detection circuitry at a first output. The processing circuitry is coupled to the ADC and configured to analyze whether an intruder is present in the device based on the measurements of the signal detection circuitry.Type: GrantFiled: May 2, 2019Date of Patent: November 30, 2021Assignee: National Technology & Engineering Solutions of Sandia, LLCInventor: Nathan J. Edwards
-
Patent number: 11184172Abstract: Method for suspending a physical protection of an object by a protection device, wherein a host device receives a first and second public key, a third public key and a signed combined identifier incorporating the first and second public keys, wherein the signed identifier is signed with a third private key, which third private key is cryptographically associated with the third public key; the host device requests a search of transactions within a public transaction directory; the host device authenticates the first and second public keys using a signature of the signed identifier; the host device authenticates the protection device and sends an unlock request to the dongle if the search of the transaction directory yields at least one transaction and the first and second public keys, the protection device and the dongle are authentic; and in reaction the dongle sends an unlock command to suspend the protection of the object.Type: GrantFiled: June 16, 2017Date of Patent: November 23, 2021Assignee: Riddle & Code GmbHInventor: Thomas Fuerstner
-
Patent number: 11178133Abstract: The present disclosure includes apparatuses and methods related to a secure vehicle control unit update. An example apparatus comprises a processing resource coupled to a memory resource. The memory resource can be configured to store a private key associated with a vehicle and store data corresponding to an update to a control unit of the vehicle. The processing resource can be configured to compare the private key associated with the vehicle and a private key included in the data corresponding to the update to the control unit that is stored in the memory resource and allow transmission of the update to the control unit of the vehicle in response to the private key associated with the vehicle matching the private key included in the data.Type: GrantFiled: December 19, 2017Date of Patent: November 16, 2021Assignee: Micron Technology, Inc.Inventor: Alberto Troia
-
Patent number: 11140197Abstract: Provided are a DDoS attack detection method and apparatus. The method comprises: acquiring network traffic of a target moment within a first period by sampling, then querying a traffic period change curve acquired in advance, determining predicted traffic corresponding to the target moment, and confirming a DDoS attack if the network traffic acquired by sampling is larger than the determined predicted traffic. The traffic period change curve is used for indicating a period change law of the predicted traffic, so that before DDoS attack detection is performed at each target moment, it only needs to determine the predicted traffic corresponding to the target moment according to the traffic period change curve without calculating the predicted traffic according to massive historical traffic data before each DDoS attack detection; and the calculation volume is reduced.Type: GrantFiled: February 22, 2017Date of Patent: October 5, 2021Assignee: NSFOCUS INFORMATION TECHNOLOGY CO., LTD.Inventors: Hanbing Chen, Bin Zheng, Kun He
-
Patent number: 11121879Abstract: A computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programs thereof.Type: GrantFiled: March 22, 2018Date of Patent: September 14, 2021Assignee: TELEFONICA CYBERSECURITY & CLOUD TECH S.L.Inventors: Aruna Prem Bianzino, Carmen Torrano Gimenez, Rames Sarwat, Salvador Sanchez Taboada
-
Patent number: 11108571Abstract: Implementations of the present disclosure include generating, by a consensus node, a certificate signing request (CSR); sending the CSR to a first certificate authority (CA); receiving a first public key certificate of the consensus node from the first CA, and a first one or more public key certificates issued by a first one or more CAs. The consensus nodes also sends the CSR to a second CA, receives a second public key certificate of the consensus node from the second CA, and a second one or more public key certificates issued by a second one or more CAs. The consensus node further configures a first truststore including the first public key certificate and the first one or more public key certificates, and a second truststore including the second public key certificate and the second one or more public key certificates.Type: GrantFiled: November 30, 2020Date of Patent: August 31, 2021Assignee: Advanced New Technologies Co., Ltd.Inventors: Dong Pan, Xuebing Yan, Shenglong Chen
-
Patent number: 11108775Abstract: The present invention provides a system, method and apparatus for increasing relevance of a content provided to a visitor by a content provider by providing one or more server computers and at least one data storage communicably coupled to the one or more server computers, receiving at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.Type: GrantFiled: April 29, 2019Date of Patent: August 31, 2021Assignee: Your Command, LLCInventor: Douglas Peckover
-
Patent number: 11082229Abstract: A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication to reduce the potential for malicious third-party impersonation of the client. Pre-authorized customer support calls are intelligently and efficiently routed in a manner that reduces the opportunity for malicious call interference and information theft.Type: GrantFiled: March 18, 2019Date of Patent: August 3, 2021Assignee: Capital One Services, LLCInventors: Jeffrey Rule, Rajko Ilincic
-
Patent number: 11080396Abstract: An apparatus, method, and a computer program are provided in order to allow for secure downloading of data to a host operating system. The host operating system transmits a request to a virtual machine in order download the data from the Internet. In response, the virtual machine downloads the data and scans the data for malicious programs. If the result of the scan is negative, then the host operating system is configured to download the data from the virtual machine.Type: GrantFiled: July 30, 2011Date of Patent: August 3, 2021Assignee: OPEN INVENTION NETWORK LLCInventor: William C. (Chuck) Easttom
-
Patent number: 11049026Abstract: Updating ground truth data in a security management platform is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive, in a security management platform, event data relating to a plurality of events corresponding to operation of a computing arrangement in a current time interval, and computing ground truth data for the current time interval based on the received event data, and threat intelligence data from time intervals preceding the current time interval. A prediction model is applied to generate predictions for the current time interval based on the received event data. Ground truth data is re-computed for the time intervals preceding the current time interval based on a comparison of the generated predictions and the computed ground truth data.Type: GrantFiled: March 20, 2017Date of Patent: June 29, 2021Assignee: Micro Focus LLCInventors: Pratyusa K. Manadhata, Sandeep Bhatt, Tomas Sander
-
Patent number: 11030296Abstract: A first request to log in to a suspended account is received. The first request includes an operation code. A determination is made that the operation code satisfies a predetermined condition. In response to the determination, the suspended account is obtained based on the operation code and the suspended account is logged in to.Type: GrantFiled: December 14, 2017Date of Patent: June 8, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Jianbo Qian
-
Patent number: 10956544Abstract: An authentication process is activated by a processor receiving an access request for user access to a user device. One or more biometric sensor module captures imaging data or other sensor data within a field of view encompassing the head of the user, or encompassing a head region including the head of the user. The processor carries out biometric recognition methods on the captured imaging data. Biometric recognition methods may include head-limb gesture recognition (including hand-to-face, and limb-near-head, gestures); head recognition; ocular recognition; facial recognition; and combinations of these methods. Upon successful match of captured sensor data with one or more user credential records stored for an authorized user of the user device, the processor authorizes the access request, providing access to the operating environment of the user device on start-up, or to one or more of a system setting, an application program, a data, and a hardware resource.Type: GrantFiled: March 31, 2017Date of Patent: March 23, 2021Assignee: Massachusetts Mutual Life Insurance CompanyInventors: Michal Knas, Jiby John
-
Patent number: 10887114Abstract: Implementations of the present disclosure include generating, by a consensus node, a certificate signing request (CSR); sending the CSR to a first certificate authority (CA); receiving a first public key certificate of the consensus node from the first CA, and a first one or more public key certificates issued by a first one or more CAs. The consensus nodes also sends the CSR to a second CA, receives a second public key certificate of the consensus node from the second CA, and a second one or more public key certificates issued by a second one or more CAs. The consensus node further configures a first truststore including the first public key certificate and the first one or more public key certificates, and a second truststore including the second public key certificate and the second one or more public key certificates.Type: GrantFiled: April 22, 2019Date of Patent: January 5, 2021Assignee: Advanced New Technologies Co., Ltd.Inventors: Dong Pan, Xuebing Yan, Shenglong Chen
-
Patent number: 10873565Abstract: The technology disclosed herein enables micro-segmentation of virtual computing elements. In a particular embodiment, a method provides identifying one or more multi-tier applications comprising a plurality of virtual machines. Each application tier of the one or more multi-tier applications comprises at least one of the plurality of virtual machines. The method further provides maintaining information about the one or more multi-tier applications. The information at least indicates a security group for each virtual machine of the plurality of virtual machines. Additionally, the method provides identifying communication traffic flows between virtual machines of the plurality of virtual machines and identifying one or more removable traffic flows of the communication traffic flows based, at least in part, on the information. The method then provides blocking the one or more removable traffic flows.Type: GrantFiled: October 23, 2017Date of Patent: December 22, 2020Assignee: Nicira, Inc.Inventors: Laxmikant Gunda, Rajiv Krishnamurthy
-
Patent number: 10805067Abstract: An example method includes accessing first and second blocks of a first blockchain. The second block includes a first backward link including a hash of the first block and second block content. A first prime block is generated that includes the first block and a first forward link. The first forward link includes a hash of the second block of the first blockchain. The first prime block is published on a doubly linked blockchain. A third block of the first blockchain is accessed. The third block includes a second backward link including a hash of the second block and a third block content. A second prime block is generated that includes the second block, a first prime backward comprising a hash of the first prime block, and a second forward link comprising a hash of the third block of the first blockchain.Type: GrantFiled: April 26, 2017Date of Patent: October 13, 2020Assignee: Wells Fargo Bank, N.A.Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 10778626Abstract: An electronic device will identify an electronic message received by a messaging client that is associated with a first recipient, and it will analyze the electronic message to determine whether the electronic message is a simulated malicious message. Upon determining that electronic message is a simulated malicious message, the device will identify an actuatable element in the electronic message. The actuatable element will include a service address. The device will modify the electronic message by appending a user identifier of the first recipient to the service address of the actuatable element. Then, when the actutable element is actuated, the system may determine whether the first recipient actuated the actuatable element or an alternate recipient did so based on whether the user identifier of the first recipient is still appended (or is the only user identifier appended) to the actuatable element.Type: GrantFiled: February 4, 2019Date of Patent: September 15, 2020Assignee: Proofpoint, Inc.Inventors: Kurt Wescoe, Trevor Tyler Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart, Norman Sadeh-Koniecpol
-
Patent number: 10719597Abstract: Embodiments of the disclosure are directed to the use of controlled randomization in authorizing virtual reality interactions. More specifically, a user of a virtual reality (VR) device may seek to initiate an interaction within the virtual reality environment. In order for the interaction to be allowed for the user, a processing computer may need the user to supply an additional credential. In some cases, the user may enter the additional credential using a series of virtual keypads that are rendered in the virtual reality environment. These keypads may have varying layouts that are determined in a controlled manner (e.g., pseudo-randomly) using pre-determined mathematical procedures. The layout of a subsequent keypad may be partially based on the user's selection in a preceding keypad. The keypad positions for the user's selections may be provided to the processing computer to solve for the credential which can be used for validation purposes.Type: GrantFiled: April 4, 2017Date of Patent: July 21, 2020Assignee: Visa International Service AssociationInventors: Siddhant Sonkar, Sumiran Aggarwal, Venkata Krishna Prasad Akkapeddi, Prateek Khare, Mohit Choudhary