Patents Examined by Kambiz Zand
-
Patent number: 11641377Abstract: Systems, computer program products, and methods are described herein for mapping information security configurations across technology platforms. The present invention is configured to electronically receive, from a computing device associated with a technology infrastructure, one or more responses to one or more queries; extract one or more security information and event management (SIEM) fields from the one or more responses; map the one or more SIEM fields to a generic content schema of a common information security model; generate a unique SIEM map for the technology infrastructure based on at least mapping the one or more SIEM fields to the generic content schema of the common information security model; generate a use case for the technology infrastructure using the common information security model; and transform the use case generated using the common information security model using the unique SIEM map.Type: GrantFiled: May 28, 2021Date of Patent: May 2, 2023Assignee: CYBORG SECURITY, INC.Inventors: Brandon Denker, Austin Jackson, Mike Mitchell, Nick Allen
-
Hybrid intrusion detection model for cyberattacks in avionics internet gateways using edge analytics
Patent number: 11641365Abstract: Techniques are provided for detecting an intrusion event in a network. At a gateway device in the network, performance parameters of the gateway device are monitored. Steady-state operations are defined based on expected performance of the device parameters. The steady-state operations are compared to the monitored device performance and other context parameters. A hybrid network intrusion detection technique is activated to determine a presence of the intrusion event for known and unknown attacks.Type: GrantFiled: September 29, 2020Date of Patent: May 2, 2023Assignee: Honeywell International Inc.Inventors: Kirupakar Janakiraman, Narayanan Srinivasan, Nayyar Rao, Rajeev Mohan, Srihari Jayathirtha -
Patent number: 11637835Abstract: Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.Type: GrantFiled: June 17, 2020Date of Patent: April 25, 2023Assignee: Irdeto B.V.Inventors: Clifford Liem, Martin Soukup, Daniel Murdock
-
Patent number: 11637868Abstract: Attestation support in cloud computing environments is described. An example of an apparatus includes one or more processors to process data, including data related to hosting of workloads for one or more tenants; an orchestration element to receive a request for support of a workload of a tenant according to a selected membership policy, the orchestration element to select a set of one or more compute nodes to provide computation for the workload; and a security manager to receive the membership policy and to receive attestations from the selected compute nodes and, upon determining that the attestations meet the requirements of the membership policy, to add the one or more compute nodes to a group of compute nodes to provide computation for the workload.Type: GrantFiled: December 24, 2020Date of Patent: April 25, 2023Assignee: INTEL CORPORATIONInventors: Vincent Scarlata, Alpa Trivedi, Reshma Lal
-
Patent number: 11637828Abstract: Disclosed are hybrid authentication systems and methods that enable users to seamlessly sign-on between cloud-based services and on-premises systems. A cloud-based authentication service receives login credentials from a user and delegates authentication to an on-premises authentication service proxy. The login credentials can be passed by the cloud-based authentication service to the on-premises authentication service proxy, for instance, as an access token in an authentication header. The access token can be a JavaScript Object Notation (JSON) Web Token (JWT) token that is digitally signed using JSON Web Signature. Some embodiments utilize a tunnel connection through which the cloud-based authentication service communicates with the on-premises authentication service proxy. Some embodiments leverage an on-premises identity management system for user management and authentication.Type: GrantFiled: May 3, 2021Date of Patent: April 25, 2023Assignee: Open Text CorporationInventors: Sachin Gopaldas Totale, Muneer Ahmed, Harish Rawat, Rajakumar Thiruvasagam, Lakshmi Narayana Prasad Kakumani
-
Patent number: 11632385Abstract: In one implementation, a system for the prevention of malicious attack on a computing resource includes one or more processor; computer memory storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: observing traffic flow of a network; altering a SYN threshold value based on the observing of the traffic flow of the network; comparing a metric of SYN messages submitted to the network; and based on the comparison of the metric of SYN messages submitted, selectively engaging corrective action with the network.Type: GrantFiled: February 3, 2021Date of Patent: April 18, 2023Assignee: University of South FloridaInventors: Mohamed Rahouti, Kaiqi Xiong
-
Patent number: 11632393Abstract: Malware is detected and mitigated by differentiating HTTP error generation patterns between errors generated by malware, and errors generated by benign users/software. In one embodiment, a malware detector system receives traffic that includes HTTP errors and successful HTTP requests. Error traffic and the successful request traffic are segmented for further analysis. The error traffic is supplied to a clustering component, which groups the errors, e.g., based on their URI pages and parameters. During clustering, various statistical features are extracted (as feature vectors) from one or more perspectives, namely, error provenance, error generation, and error recovery. The feature vectors are supplied to a classifier component, which is trained to distinguish malware-generated errors from benign errors. Once trained, the classifier takes an error cluster and its surrounding successful HTTP requests as inputs, and it produces a verdict on whether a particular cluster is malicious.Type: GrantFiled: October 16, 2020Date of Patent: April 18, 2023Assignee: International Business Machines CorporationInventors: Jialong Zhang, Jiyong Jang, Marc Philippe Stoecklin
-
Patent number: 11621825Abstract: The present specification is directed toward the use of hash digests and blockchain technology to secure the integrity of a media file having Group-Of-Picture (GOP) video streams, audio streams, and data streams. For GOP video streams, the use of hash digests and blockchain technology may take the form of an H-Frame that appends a GOP of I, P, and B frames. For audio streams, the use of hash digests and blockchain technology may take the form of an AH-Frame that appends an audio block of information. For data streams, the use of hash digests and blockchain technology may take the form of a DH-Frame that appends a data block of information.Type: GrantFiled: August 9, 2019Date of Patent: April 4, 2023Inventor: Tyson York Winarski
-
Patent number: 11620411Abstract: A system includes a memory, a processor in communication with the memory, and a first TEE instance. The first TEE instance is configured to maintain an encrypted secret, obtain a cryptographic measurement associated with a second TEE instance, validate the cryptographic measurement, and provision the second TEE instance with the encrypted secret. Additionally, the first TEE instance and the second TEE instance are both configured to service at least a first type of request.Type: GrantFiled: March 24, 2020Date of Patent: April 4, 2023Assignee: Red Hat, Inc.Inventor: Michael Tsirkin
-
Patent number: 11621858Abstract: A member of a group in a blockchain network may generate a public key and a private key, request a blockchain network group certificate, associated with the private key, from a blockchain network certificate authority, and distribute a private key to members of the group.Type: GrantFiled: December 12, 2020Date of Patent: April 4, 2023Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Petr Novotny, Mariela Claudia Lanza
-
Patent number: 11621970Abstract: The present invention is generally directed to the detection of an intrusion event in a computer network and a control network. More particularly, the present invention provides a system, framework, architecture, etc. for intrusion detection functions for network elements and control elements used in high demand and/or mission critical environments, including, but not limited to, power stations, sub-stations, intelligent transportation systems (ITS), rail, traffic control systems, chemical, oil & gas, critical manufacturing, and industrial applications.Type: GrantFiled: September 13, 2019Date of Patent: April 4, 2023Assignee: iS5 Communications, Inc.Inventor: Tamer Soliman
-
Patent number: 11615323Abstract: A method for verifying a material data chain (MDC) that is maintained by a creator is disclosed. The method includes receiving an unverified portion of the MDC from the creator including a set of consecutive material data blocks (MDBs). Each respective MDB includes respective material data, respective metadata, and a creator verification value. The method includes modifying a genomic differentiation object assigned to the verification cohort based on first genomic regulation instructions (GRI) that were used by the creator to generate the creator verification value. For each MDB in the unverified portion, the method includes determining a verifier verification value based on the MDB, a preceding MDB in the MDC, and a genomic engagement factor (GEF) determined with respect to the MDB. The GEF corresponding to an MDB is determined by extracting a sequence from the metadata of a MDB and mapping the sequence into the modified genomic differentiation object.Type: GrantFiled: February 10, 2022Date of Patent: March 28, 2023Assignee: Quantum Digital Solutions CorporationInventors: William C. Johnson, Karen Ispiryan, Gurgen Khachatryan
-
Patent number: 11616777Abstract: A system, method, and media for providing web-based security to a workflow process is presented. Data may be processed in a web-based workflow management system. The system may detect the transfer of high-level security data through the workflow. Upon detection of the data transfers the system may request review and approval in the form of a biometric input from an approved user to allow the data to be transferred.Type: GrantFiled: October 12, 2020Date of Patent: March 28, 2023Assignee: SoftWarfare, LLCInventor: Wyatt Cobb
-
Patent number: 11606193Abstract: Techniques for re-establishing secure application sessions using an abbreviated authentication process are disclosed. A plurality of servers each use a deterministic process to independently generate a symmetric key. A client initiates an application session with one of the servers using a full authentication process. Before the connection is terminated, the server generates a session ticket, including security parameters negotiated during the full authentication process, and encrypts the session ticket with the symmetric key. Another server receives the session ticket and decrypts the session ticket using the symmetric key to initiate an abbreviated authentication process that is less costly than the full authentication process. The client and the server establish a secure communication channel based on successful completion of the abbreviated authentication process.Type: GrantFiled: September 24, 2020Date of Patent: March 14, 2023Assignee: Oracle International CorporationInventor: Xuelei Fan
-
Patent number: 11606206Abstract: Disclosed herein is a data storage device comprising a data path and an access controller. The access controller generates a recovery private key, generates encrypted authorization data based on the recovery private key, stores the encrypted authorization data, and sends the recovery private key to a manager device. When recovery is desired, access controller receives a recovery public key, calculated based on the recovery private key, from a recovery manager device, decrypts the encrypted authorization data based on the recovery public key, generates a challenge for the recovery manager device based on the decrypted authorization data, sends the challenge to the recovery manager device over the communication channel that is different from the data path, receives a response to the challenge from the recovery manager device over the communication channel, and based at least partly on the response, enables decryption of the encrypted user content data.Type: GrantFiled: January 9, 2020Date of Patent: March 14, 2023Assignee: Western Digital Technologies, Inc.Inventors: Brian Edward Mastenbrook, Matthew Harris Klapman, Michael William Webster
-
Patent number: 11606368Abstract: A method including: establishing an internal swarm intelligence network including security agent modules of a plurality of interconnected network nodes of a local computer network, collecting data related to the respective network nodes, sharing information based on the collected data in the established internal swarm intelligence network, and using the collected data and information received from the internal swarm intelligence network for generating and adapting models related to the respective network node nodes. In case a new threat is identified, the threat is verified and contained, a new threat model is generated and the generated new threat model is shared. The security alert and/or the generated new threat model is transmitted to a security service network for enabling the security service network to share the received security alert and/or the new threat model.Type: GrantFiled: November 11, 2019Date of Patent: March 14, 2023Assignee: Withsecure CorporationInventors: Matti Aksela, Mika Stahlberg
-
Patent number: 11601446Abstract: The present disclosure describes a computer-implemented method that includes: populating a metadata shell database with one or more hash values, wherein: each hash value corresponds to a verified installation of a database system, and the metadata shell database is maintained within a locked-down environment on an enterprise network; and monitoring metadata information of one or more database systems on the enterprise network based on periodically accessing metadata information of one or more database systems; and determining whether a database system on the enterprise network has been compromised based on a hash value of the metadata information of the database system and the one or more hash values from the metadata shell database.Type: GrantFiled: August 20, 2020Date of Patent: March 7, 2023Assignee: Saudi Arabian Oil CompanyInventor: Emad Mohammad Al-Mousa
-
Patent number: 11601284Abstract: Method and apparatus are disclosed for attack tolerant implementations of public key digital signatures based on a cloud of dedicated local devices. A system includes a first security device, a second security device, and a computing device remote from the first and second security devices. The first security device stores a first private key and, in response to receiving a message, generates a first signature based on a message received from the computing device and the first private key. The second security device stores a second private key that is independent from the first private key and, in response to receiving a message, generates a second signature based on a message received from the computing device and the first private key. The computing device generates a composite cryptographic signature based on the first signature and the second signature.Type: GrantFiled: June 14, 2019Date of Patent: March 7, 2023Assignee: Planetway CorporationInventors: Jaan Priisalu, Mart Saarepera
-
Patent number: 11601438Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.Type: GrantFiled: September 25, 2020Date of Patent: March 7, 2023Assignee: Fortinet, Inc.Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
-
Patent number: 11595202Abstract: An apparatus and method for mapping user-associated data to an identifier. The apparatus includes a processor configured to store a plurality of user identifiers. User identifiers may be determined by way of user or by machine-learning modules or the like. Apparatus receives user-associated data from a user to be stored in a resource data storage system. User-associated data may include a plurality of data sets to be mapped to an identifier. Mapping a data set to an identifier may be user determined or use a machine-learning module. Apparatus is configured to update the immutable sequential listing associated with the data set with the mapped identifier.Type: GrantFiled: February 9, 2022Date of Patent: February 28, 2023Assignee: MY JOB MATCHER, INC.Inventors: Arran Stewart, Steve O'Brien