Patents Examined by Kambiz Zand
-
Patent number: 11907342Abstract: In some aspects, a user device may detect an authentication event associated with unlocking the user device. The user device may determine, based at least in part on sensor data from a sensor of the user device, an environmental context of the user device. The user device may select, from a plurality of authentication functions of the user device, an authentication function based at least in part on the environmental context of the user device. The user device may activate an authentication component that is associated with the authentication function to authenticate a user in association with unlocking the user device. Numerous other aspects are provided.Type: GrantFiled: November 20, 2020Date of Patent: February 20, 2024Assignee: QUALCOMM IncorporatedInventors: Russell Gruhlke, Naga Chandan Babu Gudivada, Vishnu Vardhan Kasilya Sudarsan, Sumeet Kumar Sahu, Ravishankar Sivalingam
-
Patent number: 11902252Abstract: Techniques managing access rules are provided. Access rules and their associated profiles are determined for evaluation. A triggering rate or a triggering percentage can be used to indicate efficacy of the rule. Recommendations can be provided based on a triggering percentage difference of the rule during a predetermined period of time. The recommendations can be provided in an interactive user interface.Type: GrantFiled: July 22, 2022Date of Patent: February 13, 2024Assignee: Visa International Service AssociationInventors: Benjamin Scott Boding, Christopher Holmes, Cory Siddens, Henry Wong
-
Patent number: 11895237Abstract: Various embodiments of the present application set forth a computer-implemented method that includes generating, based on a resource file stored at an endpoint device, a credential data packet for authenticating with a first application executing in a first network, where the resource file includes a set of encryption keys associated with a plurality of applications including the first application, and where the credential data packet is encrypted with a device key signed by the endpoint device, and the credential data packet is signed by an endpoint device management (EDM) key extracted from the set of encryptions keys included in the resource file, sending, by the endpoint device, the credential data packet to the first application via a trusted communication channel, and receiving, by the endpoint device and in response to the credential data packet, an authorization packet from the first application via the trusted communication channel.Type: GrantFiled: January 5, 2023Date of Patent: February 6, 2024Assignee: SPLUNK INC.Inventors: Mingyuan Chen, Jesse Chor, Dylan Patricia Conway, Michael Emery, Simon Tam, Eeshan Wagh, Glen Wong, Everett Yip
-
Patent number: 11893126Abstract: A method of secure data deletion in a multitenant environment, performed by a storage system is provided. The method includes associating a key with a tenant, in the multitenant environment, as a result of the storage system receiving data from the tenant through a virtual local area network (VLAN) or from an Internet protocol (IP) address. The method includes storing the data, encrypted by the key, in the storage system, and determining that the key, as retained in the storage system, is to be deleted, so that the data is to be inaccessible in unencrypted form, responsive to a request from the tenant to delete the data.Type: GrantFiled: October 14, 2019Date of Patent: February 6, 2024Assignee: PURE STORAGE, INC.Inventors: Andrew Miller, Reena Gupta
-
Patent number: 11895132Abstract: A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.Type: GrantFiled: November 23, 2022Date of Patent: February 6, 2024Assignee: Bank of America CorporationInventors: Steven Sinks, Jonathan Sheedy
-
Patent number: 11886570Abstract: Methods, systems, and apparatuses are described herein for improving the accuracy of synthetic authentication questions by analyzing third party account data. A request for access to a first account associated with a user may be received. The first account may be managed by a first organization. A transactions database might be queried for first account data. Second account data corresponding to a second account associated with the user might be received. That second account may be managed by a second organization different from the first organization. One or more second transactions, unique to the second account, may be identified. A synthetic transaction, configured to be different from transactions in the first account and the one or more second transactions, may be generated. An authentication question may be generated based on the synthetic transaction. Access to the first account might be provided based on a response to the authentication question.Type: GrantFiled: May 7, 2021Date of Patent: January 30, 2024Assignee: Capital One Services, LLCInventors: Joshua Edwards, Vyjayanthi Vadrevu, Tyler Maiman, Viraj Chaudhary, Daniel Miller, David Septimus, Jenny Melendez, Samuel Rapowitz
-
Patent number: 11888972Abstract: A system includes a memory, an application TEE instance, an escrow TEE instance, and a server. The server is configured to receive a request to start the application TEE instance and launch the escrow TEE instance provisioned with a secret. The secret is initially accessible from a first location until the escrow TEE instance is provisioned and accessibility to the secret in the first location is restricted after provisioning the escrow TEE instance with the secret. The escrow TEE instance is configured to obtain a cryptographic measurement associated with the application TEE instance, validate the application TEE instance, and provide the secret from a second location to the application TEE instance.Type: GrantFiled: February 26, 2020Date of Patent: January 30, 2024Assignee: RED HAT, INC.Inventor: Michael Tsirkin
-
Patent number: 11882218Abstract: A matching apparatus generates a random number and transmits second encrypted data obtained by performing an operation of first encrypted data of each of first values related to a first binary vector encrypted and the random number to a matching request apparatus; transmits third encrypted data obtained by performing an operation of the second encrypted data and elements of a matching target second binary vector; based on a second value related to the first binary vector encrypted with the encryption key, the encrypted data and the random number, generates and transmits encrypted data and transmits the generated data to a verification apparatus as a query; and determines whether a count number of mismatched elements between the second binary vector and the first binary vector is less than or equal to a predetermined number based on values obtained by decrypting the encrypted data in the query.Type: GrantFiled: August 9, 2021Date of Patent: January 23, 2024Assignee: NEC CORPORATIONInventors: Haruna Higo, Toshiyuki Isshiki
-
Patent number: 11882131Abstract: A URL velocity monitor is integrated with a message-hold decision maker of an electronic mail processing system that processes electronic messages for a protected computer network. The URL velocity monitor receives or obtains a URL, decomposes the URL into URL features based on logical boundaries, and determines features of interest from the URL features for velocity tracking. Examples of URL features can include a randomized URL segment. The velocity of each feature of interest is tracked over a period of time using a counting algorithm that employs a slow counter or a fast counter. The two different counters track two types of velocities which represent different domain behaviors targeting the protected computer network. The URL velocity monitor determines whether the velocity of a feature of interest is accelerating within the time period. If so, the URL is placed in a queue or a sandbox.Type: GrantFiled: March 26, 2021Date of Patent: January 23, 2024Assignee: Proofpoint, Inc.Inventors: Gregory Lee Wittel, Edward Pavlov
-
Patent number: 11882209Abstract: The present technology includes a controller and an electronic system including the same. The electronic system includes a memory device including a plurality of zones, each zone capable of storing data, a plurality of hosts configured to output access requests for accessing a selected zone, among the plurality of zones, and a controller configured to select one of the plurality of hosts according to order in which the access requests are received, generate and store a key for confirming the selected host, and transmit the key to the selected host, when the access requests to access the selected zone are received from the plurality of hosts, wherein the selected host transmits an operation request including the key to the controller, and the controller executes the operation request when the key is included in the operation request received from the selected host.Type: GrantFiled: March 23, 2021Date of Patent: January 23, 2024Assignee: SK hynix Inc.Inventor: Hee Chan Shin
-
Patent number: 11876903Abstract: A processor may incorporate one or more keys in a media. The one or more keys may each be associated with a specific instance and the one or more keys may be included in a blockchain. The processor may identify that a first specific instance has been encountered. The processor may provide a first key associated with the first specific instance. The processor may determine to allow access to content of the media.Type: GrantFiled: December 9, 2020Date of Patent: January 16, 2024Assignee: International Business Machines CorporationInventors: Dulce B. Ponceleon, Nitin Gaur, Petr Novotny, Luis Angel Bathen
-
Patent number: 11876829Abstract: One variation of a method for emulating a known attack on a computer network includes: generating a set of data packets by recombining packet fragments within a packet capture file representing packet fragments transmitted between machines during a prior malicious attack on a second network; defining transmission triggers for transmission of the set of data packets between pairs of agents connected to a target network based on timestamps of packet fragments in the packet capture file; initiating transmission of the set of data packets between the pairs agents according to the set of transmission triggers to simulate the malicious attack on the target network; and, in response to absence of a security event related to the simulation in a log of a security technology deployed on the target network, generating a prompt to reconfigure the security technology to respond to the malicious attack.Type: GrantFiled: December 22, 2022Date of Patent: January 16, 2024Assignee: AttackIQ, Inc.Inventors: Renan Fischer e Silva, Albert López Fernández, Rajesh K. Sharma
-
Patent number: 11876837Abstract: A user of a client device accesses a service provided by a server computer. The server computer gathers data about the user. The data gathered may be kept private by the server computer, shared only with other computers and users owned by the same entity, shared with selected third parties, or made public. The server computer provides a privacy policy document that describes how the data gathered is used. A privacy server analyzes the privacy policy document and, based on the analysis, generates a privacy score. The privacy score or an informational message selected based on the privacy score are provided to the client device. In response, the client device presents the privacy score or the informational message to the user. In this way, the user is informed of privacy risks that result from accessing the server computer.Type: GrantFiled: November 10, 2022Date of Patent: January 16, 2024Assignee: IDENTITY THEFT GUARD SOLUTIONS, INC.Inventors: Brent VanLoo, Christopher Semke, Doug Pollack
-
Patent number: 11870883Abstract: A method of blockchain-based data management of distributed binary objects includes identifying a binary object to be stored in a first data store. The method further includes encrypting, by a processing device, the binary object using a cryptographic function of a blockchain to generate an encrypted binary object. The method further includes storing the encrypted binary object in the first data store. The method further includes storing a reference to the encrypted binary object on the blockchain.Type: GrantFiled: February 4, 2022Date of Patent: January 9, 2024Assignee: emTRUTH, Inc.Inventors: Irene Wong Woerner, Ronald Chi King Kong
-
Patent number: 11868462Abstract: A method, system, and apparatus comprising: automatically identifying a login session to a first software system in a Graphical User Interface (GUI) of a user device; automatically extracting user credentials from the login session; automatically manipulating at least a portion of the user credentials to obtain manipulated credentials; automatically verifying that the login session is authentic by: encrypting the user credentials, providing the encrypted credentials to a separate environment, and reconstructing the login session at the separate environment; and automatically adding the manipulated credentials to an account of the user in a second software system that is independent from the separate environment.Type: GrantFiled: November 1, 2022Date of Patent: January 9, 2024Assignee: Vim Inc.Inventors: Asaf David, Nicolas Mendzylewski, Moran Shemesh, Chen Rozenes, Daniel Hallel Jakobsen, Nandy Vaisman
-
Patent number: 11870791Abstract: A policy-controlled authorization system including a local application on a client device, a policy component including a plurality of policies, and a mid-link server, coupled to the client device is provided. A request for access to a service using a token is provided by the local application. A correlator correlates the token with the plurality of tokens for identifying a policy from the plurality of policies associated with the token. A token inspector authorizes the token for accessing the service based on the correlation. Based on the authorization, either the token is authorized for access to the service via the remote application, or the token is blocked when unauthorized to prevent access to the service. Confidence scores are assigned to each token based on their categories, compliance with the policies, and a threat level. The confidence scores indicate need to re-authorize the tokens and/or disable them temporarily.Type: GrantFiled: December 29, 2022Date of Patent: January 9, 2024Assignee: Netskope, Inc.Inventors: James S. Robinson, Damian C. Chung, Lamont Orange
-
Patent number: 11855979Abstract: Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.Type: GrantFiled: May 28, 2021Date of Patent: December 26, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Anirban Basu, Oren Jordan Melzer, Kamen K. Moutafov, Victor Boctor, Shuang Lu
-
Patent number: 11856015Abstract: An anomalous action security assessor is disclosed. An anomaly is received from a set of anomalies. A series of linked queries associated with the anomaly is presented to the user. The series of linked queries includes a base query and a subquery. The base query tests an attribute of the anomaly and resolves to a plurality of outcomes of the base query. The subquery is associated with an outcome of the plurality of outcomes of the base query. The series of linked queries finally resolve to one of tag the anomaly and dismiss the anomaly. A security alert is issued if the series of linked queries finally resolves to tag the anomaly.Type: GrantFiled: June 24, 2021Date of Patent: December 26, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Roy Levin, Andrey Karpovsky
-
Patent number: 11853109Abstract: A method, system, and apparatus comprising: automatically identifying a login session to a first software system in a Graphical User Interface (GUI) of a user device; automatically extracting user credentials from the login session; automatically manipulating at least a portion of the user credentials to obtain manipulated credentials; automatically verifying that the login session is authentic by: encrypting the user credentials, providing the encrypted credentials to a separate environment, and reconstructing the login session at the separate environment; and automatically adding the manipulated credentials to an account of the user in a second software system that is independent from the separate environment.Type: GrantFiled: December 1, 2022Date of Patent: December 26, 2023Assignee: VIM INC.Inventors: Asaf David, Nicolas Mendzylewski, Moran Shemesh, Chen Rozenes, Daniel Hallel Jakobsen, Nandy Vaisman
-
Patent number: 11849304Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.Type: GrantFiled: November 3, 2022Date of Patent: December 19, 2023Assignee: LOOKOUT INC.Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani