Patents Examined by Kambiz Zand
  • Patent number: 11907342
    Abstract: In some aspects, a user device may detect an authentication event associated with unlocking the user device. The user device may determine, based at least in part on sensor data from a sensor of the user device, an environmental context of the user device. The user device may select, from a plurality of authentication functions of the user device, an authentication function based at least in part on the environmental context of the user device. The user device may activate an authentication component that is associated with the authentication function to authenticate a user in association with unlocking the user device. Numerous other aspects are provided.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: February 20, 2024
    Assignee: QUALCOMM Incorporated
    Inventors: Russell Gruhlke, Naga Chandan Babu Gudivada, Vishnu Vardhan Kasilya Sudarsan, Sumeet Kumar Sahu, Ravishankar Sivalingam
  • Patent number: 11902252
    Abstract: Techniques managing access rules are provided. Access rules and their associated profiles are determined for evaluation. A triggering rate or a triggering percentage can be used to indicate efficacy of the rule. Recommendations can be provided based on a triggering percentage difference of the rule during a predetermined period of time. The recommendations can be provided in an interactive user interface.
    Type: Grant
    Filed: July 22, 2022
    Date of Patent: February 13, 2024
    Assignee: Visa International Service Association
    Inventors: Benjamin Scott Boding, Christopher Holmes, Cory Siddens, Henry Wong
  • Patent number: 11895237
    Abstract: Various embodiments of the present application set forth a computer-implemented method that includes generating, based on a resource file stored at an endpoint device, a credential data packet for authenticating with a first application executing in a first network, where the resource file includes a set of encryption keys associated with a plurality of applications including the first application, and where the credential data packet is encrypted with a device key signed by the endpoint device, and the credential data packet is signed by an endpoint device management (EDM) key extracted from the set of encryptions keys included in the resource file, sending, by the endpoint device, the credential data packet to the first application via a trusted communication channel, and receiving, by the endpoint device and in response to the credential data packet, an authorization packet from the first application via the trusted communication channel.
    Type: Grant
    Filed: January 5, 2023
    Date of Patent: February 6, 2024
    Assignee: SPLUNK INC.
    Inventors: Mingyuan Chen, Jesse Chor, Dylan Patricia Conway, Michael Emery, Simon Tam, Eeshan Wagh, Glen Wong, Everett Yip
  • Patent number: 11893126
    Abstract: A method of secure data deletion in a multitenant environment, performed by a storage system is provided. The method includes associating a key with a tenant, in the multitenant environment, as a result of the storage system receiving data from the tenant through a virtual local area network (VLAN) or from an Internet protocol (IP) address. The method includes storing the data, encrypted by the key, in the storage system, and determining that the key, as retained in the storage system, is to be deleted, so that the data is to be inaccessible in unencrypted form, responsive to a request from the tenant to delete the data.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: February 6, 2024
    Assignee: PURE STORAGE, INC.
    Inventors: Andrew Miller, Reena Gupta
  • Patent number: 11895132
    Abstract: A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.
    Type: Grant
    Filed: November 23, 2022
    Date of Patent: February 6, 2024
    Assignee: Bank of America Corporation
    Inventors: Steven Sinks, Jonathan Sheedy
  • Patent number: 11886570
    Abstract: Methods, systems, and apparatuses are described herein for improving the accuracy of synthetic authentication questions by analyzing third party account data. A request for access to a first account associated with a user may be received. The first account may be managed by a first organization. A transactions database might be queried for first account data. Second account data corresponding to a second account associated with the user might be received. That second account may be managed by a second organization different from the first organization. One or more second transactions, unique to the second account, may be identified. A synthetic transaction, configured to be different from transactions in the first account and the one or more second transactions, may be generated. An authentication question may be generated based on the synthetic transaction. Access to the first account might be provided based on a response to the authentication question.
    Type: Grant
    Filed: May 7, 2021
    Date of Patent: January 30, 2024
    Assignee: Capital One Services, LLC
    Inventors: Joshua Edwards, Vyjayanthi Vadrevu, Tyler Maiman, Viraj Chaudhary, Daniel Miller, David Septimus, Jenny Melendez, Samuel Rapowitz
  • Patent number: 11888972
    Abstract: A system includes a memory, an application TEE instance, an escrow TEE instance, and a server. The server is configured to receive a request to start the application TEE instance and launch the escrow TEE instance provisioned with a secret. The secret is initially accessible from a first location until the escrow TEE instance is provisioned and accessibility to the secret in the first location is restricted after provisioning the escrow TEE instance with the secret. The escrow TEE instance is configured to obtain a cryptographic measurement associated with the application TEE instance, validate the application TEE instance, and provide the secret from a second location to the application TEE instance.
    Type: Grant
    Filed: February 26, 2020
    Date of Patent: January 30, 2024
    Assignee: RED HAT, INC.
    Inventor: Michael Tsirkin
  • Patent number: 11882218
    Abstract: A matching apparatus generates a random number and transmits second encrypted data obtained by performing an operation of first encrypted data of each of first values related to a first binary vector encrypted and the random number to a matching request apparatus; transmits third encrypted data obtained by performing an operation of the second encrypted data and elements of a matching target second binary vector; based on a second value related to the first binary vector encrypted with the encryption key, the encrypted data and the random number, generates and transmits encrypted data and transmits the generated data to a verification apparatus as a query; and determines whether a count number of mismatched elements between the second binary vector and the first binary vector is less than or equal to a predetermined number based on values obtained by decrypting the encrypted data in the query.
    Type: Grant
    Filed: August 9, 2021
    Date of Patent: January 23, 2024
    Assignee: NEC CORPORATION
    Inventors: Haruna Higo, Toshiyuki Isshiki
  • Patent number: 11882131
    Abstract: A URL velocity monitor is integrated with a message-hold decision maker of an electronic mail processing system that processes electronic messages for a protected computer network. The URL velocity monitor receives or obtains a URL, decomposes the URL into URL features based on logical boundaries, and determines features of interest from the URL features for velocity tracking. Examples of URL features can include a randomized URL segment. The velocity of each feature of interest is tracked over a period of time using a counting algorithm that employs a slow counter or a fast counter. The two different counters track two types of velocities which represent different domain behaviors targeting the protected computer network. The URL velocity monitor determines whether the velocity of a feature of interest is accelerating within the time period. If so, the URL is placed in a queue or a sandbox.
    Type: Grant
    Filed: March 26, 2021
    Date of Patent: January 23, 2024
    Assignee: Proofpoint, Inc.
    Inventors: Gregory Lee Wittel, Edward Pavlov
  • Patent number: 11882209
    Abstract: The present technology includes a controller and an electronic system including the same. The electronic system includes a memory device including a plurality of zones, each zone capable of storing data, a plurality of hosts configured to output access requests for accessing a selected zone, among the plurality of zones, and a controller configured to select one of the plurality of hosts according to order in which the access requests are received, generate and store a key for confirming the selected host, and transmit the key to the selected host, when the access requests to access the selected zone are received from the plurality of hosts, wherein the selected host transmits an operation request including the key to the controller, and the controller executes the operation request when the key is included in the operation request received from the selected host.
    Type: Grant
    Filed: March 23, 2021
    Date of Patent: January 23, 2024
    Assignee: SK hynix Inc.
    Inventor: Hee Chan Shin
  • Patent number: 11876903
    Abstract: A processor may incorporate one or more keys in a media. The one or more keys may each be associated with a specific instance and the one or more keys may be included in a blockchain. The processor may identify that a first specific instance has been encountered. The processor may provide a first key associated with the first specific instance. The processor may determine to allow access to content of the media.
    Type: Grant
    Filed: December 9, 2020
    Date of Patent: January 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Dulce B. Ponceleon, Nitin Gaur, Petr Novotny, Luis Angel Bathen
  • Patent number: 11876829
    Abstract: One variation of a method for emulating a known attack on a computer network includes: generating a set of data packets by recombining packet fragments within a packet capture file representing packet fragments transmitted between machines during a prior malicious attack on a second network; defining transmission triggers for transmission of the set of data packets between pairs of agents connected to a target network based on timestamps of packet fragments in the packet capture file; initiating transmission of the set of data packets between the pairs agents according to the set of transmission triggers to simulate the malicious attack on the target network; and, in response to absence of a security event related to the simulation in a log of a security technology deployed on the target network, generating a prompt to reconfigure the security technology to respond to the malicious attack.
    Type: Grant
    Filed: December 22, 2022
    Date of Patent: January 16, 2024
    Assignee: AttackIQ, Inc.
    Inventors: Renan Fischer e Silva, Albert López Fernández, Rajesh K. Sharma
  • Patent number: 11876837
    Abstract: A user of a client device accesses a service provided by a server computer. The server computer gathers data about the user. The data gathered may be kept private by the server computer, shared only with other computers and users owned by the same entity, shared with selected third parties, or made public. The server computer provides a privacy policy document that describes how the data gathered is used. A privacy server analyzes the privacy policy document and, based on the analysis, generates a privacy score. The privacy score or an informational message selected based on the privacy score are provided to the client device. In response, the client device presents the privacy score or the informational message to the user. In this way, the user is informed of privacy risks that result from accessing the server computer.
    Type: Grant
    Filed: November 10, 2022
    Date of Patent: January 16, 2024
    Assignee: IDENTITY THEFT GUARD SOLUTIONS, INC.
    Inventors: Brent VanLoo, Christopher Semke, Doug Pollack
  • Patent number: 11870883
    Abstract: A method of blockchain-based data management of distributed binary objects includes identifying a binary object to be stored in a first data store. The method further includes encrypting, by a processing device, the binary object using a cryptographic function of a blockchain to generate an encrypted binary object. The method further includes storing the encrypted binary object in the first data store. The method further includes storing a reference to the encrypted binary object on the blockchain.
    Type: Grant
    Filed: February 4, 2022
    Date of Patent: January 9, 2024
    Assignee: emTRUTH, Inc.
    Inventors: Irene Wong Woerner, Ronald Chi King Kong
  • Patent number: 11868462
    Abstract: A method, system, and apparatus comprising: automatically identifying a login session to a first software system in a Graphical User Interface (GUI) of a user device; automatically extracting user credentials from the login session; automatically manipulating at least a portion of the user credentials to obtain manipulated credentials; automatically verifying that the login session is authentic by: encrypting the user credentials, providing the encrypted credentials to a separate environment, and reconstructing the login session at the separate environment; and automatically adding the manipulated credentials to an account of the user in a second software system that is independent from the separate environment.
    Type: Grant
    Filed: November 1, 2022
    Date of Patent: January 9, 2024
    Assignee: Vim Inc.
    Inventors: Asaf David, Nicolas Mendzylewski, Moran Shemesh, Chen Rozenes, Daniel Hallel Jakobsen, Nandy Vaisman
  • Patent number: 11870791
    Abstract: A policy-controlled authorization system including a local application on a client device, a policy component including a plurality of policies, and a mid-link server, coupled to the client device is provided. A request for access to a service using a token is provided by the local application. A correlator correlates the token with the plurality of tokens for identifying a policy from the plurality of policies associated with the token. A token inspector authorizes the token for accessing the service based on the correlation. Based on the authorization, either the token is authorized for access to the service via the remote application, or the token is blocked when unauthorized to prevent access to the service. Confidence scores are assigned to each token based on their categories, compliance with the policies, and a threat level. The confidence scores indicate need to re-authorize the tokens and/or disable them temporarily.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: January 9, 2024
    Assignee: Netskope, Inc.
    Inventors: James S. Robinson, Damian C. Chung, Lamont Orange
  • Patent number: 11855979
    Abstract: Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: December 26, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anirban Basu, Oren Jordan Melzer, Kamen K. Moutafov, Victor Boctor, Shuang Lu
  • Patent number: 11856015
    Abstract: An anomalous action security assessor is disclosed. An anomaly is received from a set of anomalies. A series of linked queries associated with the anomaly is presented to the user. The series of linked queries includes a base query and a subquery. The base query tests an attribute of the anomaly and resolves to a plurality of outcomes of the base query. The subquery is associated with an outcome of the plurality of outcomes of the base query. The series of linked queries finally resolve to one of tag the anomaly and dismiss the anomaly. A security alert is issued if the series of linked queries finally resolves to tag the anomaly.
    Type: Grant
    Filed: June 24, 2021
    Date of Patent: December 26, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Roy Levin, Andrey Karpovsky
  • Patent number: 11853109
    Abstract: A method, system, and apparatus comprising: automatically identifying a login session to a first software system in a Graphical User Interface (GUI) of a user device; automatically extracting user credentials from the login session; automatically manipulating at least a portion of the user credentials to obtain manipulated credentials; automatically verifying that the login session is authentic by: encrypting the user credentials, providing the encrypted credentials to a separate environment, and reconstructing the login session at the separate environment; and automatically adding the manipulated credentials to an account of the user in a second software system that is independent from the separate environment.
    Type: Grant
    Filed: December 1, 2022
    Date of Patent: December 26, 2023
    Assignee: VIM INC.
    Inventors: Asaf David, Nicolas Mendzylewski, Moran Shemesh, Chen Rozenes, Daniel Hallel Jakobsen, Nandy Vaisman
  • Patent number: 11849304
    Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.
    Type: Grant
    Filed: November 3, 2022
    Date of Patent: December 19, 2023
    Assignee: LOOKOUT INC.
    Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani