Patents Examined by Linglan Edwards
-
Patent number: 11575521Abstract: In one example an apparatus comprises accelerator logic to pre-compute at least a portion of a message representative, hash logic to generate the message representative based on an input message, and signature logic to generate a signature to be transmitted in association with the message representative, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key, and determine whether the message representative satisfies a target threshold allocation of computational costs between a cost to generate the signature and a cost to verify the signature. Other examples may be described.Type: GrantFiled: June 28, 2019Date of Patent: February 7, 2023Assignee: INTEL CORPORATIONInventors: Rafael Misoczki, Vikram Suresh, David Wheeler, Santosh Ghosh, Manoj Sastry
-
Patent number: 11576023Abstract: A communication system provides secure communication between two nodes in a self-organizing network without the need for a centralized security or control device. A first node of the two nodes is provisioned with one or more security profiles, auto-discovers a second node of the two nodes, authenticates the second node based on a security profile of the one or more security profiles, selects a security profile of the one or more security profiles to encrypt a communication session between the two nodes, and encrypts the communication session between the two nodes based on the selected security profile. The second node also is provisioned with the same one or more security profiles, authenticates the first node based on a same security profile as is used to authenticate the second node, and encrypts the communication session based on the same security profile as is used for encryption by the first node.Type: GrantFiled: August 27, 2021Date of Patent: February 7, 2023Assignee: Google Technology Holdings LLCInventors: Shravan Mahidhara, Vasanthi Raghuram
-
Patent number: 11563723Abstract: A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online.Type: GrantFiled: January 29, 2020Date of Patent: January 24, 2023Assignee: Dell Products L.P.Inventor: K V Sai Prasad
-
Patent number: 11563590Abstract: A computing resource service provider provides a certificate management service that allows customers of the computing resource service provider to create, distribute, manage, and revoke digital certificates issued by public and/or private certificate authorities. In an embodiment, when a new certificate is generated, a certificate template is used to apply various settings and policies for the new certificate. In various examples, templates may be used to establish default values, enforce required and optional values, place restrictions on one or more data fields, and enforce signature requirements. In some embodiments, the template establishes rules for rejecting certificate requests that don't conform to the template.Type: GrantFiled: June 25, 2018Date of Patent: January 24, 2023Assignee: Amazon Technologies, Inc.Inventors: Peter Zachary Bowen, Todd Lawrence Cignetti, Preston Anthony Elder, III, Brandonn Gorman, Ronald Andrew Hoskinson, Jonathan Kozolchyk, Kenneth Lawler, Marcel Andrew Levy, Kyle Benjamin Schultheiss, Sandeep Shantharaj, Param Sharma, Jose Maria Silveira Neto
-
Patent number: 11558371Abstract: Authentication processing is provided which includes generating an authentication parameter as a function of a time-dependent input using a predetermined transformation having an inverse transformation. Multiple authentication modes are supported, with a bit-length of the time-dependent input of one authentication mode being different from a bit-length of the time-dependent input of another authentication mode. Generating the authentication parameter is dependent, in part, on whether the time-dependent input is of the one authentication mode or the other authentication mode, and includes performing multiple rounds of transformation of the time-dependent input. A time-dependent password including a character string is generated from the authentication parameter using another predetermined transformation having another inverse transformation. The time-dependent password is forwarded within the authentication system for authentication by an authenticator.Type: GrantFiled: February 11, 2022Date of Patent: January 17, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ross David Cooper, Michael Onghena
-
Patent number: 11556653Abstract: The disclosed computer-implemented method for detecting inter-personal attack applications may include (i) receiving application marketplace information describing application feature information, (ii) creating, by performing natural language processing on the feature information, a feature vector identifying a potentially malicious functionality of the application, (iii) creating a profiling vector that is a categorical feature representation of installation information from an application installation file, and (iv) performing a security action including (A) mapping, using a machine learning model, the feature vector and the profiling vector to a multi-dimensional output vector having element corresponding to a malware category and (B) determining a malicious extent of the application by combining the categories identified by the multi-dimensional output vector with bi-partite graph information identifying (I) relations between a plurality of applications and (II) relations between a plurality of computingType: GrantFiled: June 23, 2020Date of Patent: January 17, 2023Assignee: Gen Digital Inc.Inventors: Yufei Han, Kevin Roundy, Acar Tamersoy
-
Patent number: 11537729Abstract: For detecting and preventing cipher key disclosure, a method detects software code in a copy buffer. In response to detecting the software code, the method detects a cipher key in the software code. In response to detecting the cipher key, the method communicates a cipher alert that the cipher key is in the software code.Type: GrantFiled: December 7, 2020Date of Patent: December 27, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Scott Wentao Li, Igor Stolbikov, Alfredo Zugasti
-
Patent number: 11538122Abstract: Concepts and technologies are disclosed herein for providing an electronic document processing system, an electronic document generation mechanism, an encrypted digital certificate generator, a tool for coordinating the processing of electronic documents, a packaging mechanism for finalizing and authenticating electronic documents, a tracking log for recording relevant electronic document information, and a transferring protocol for transferring the ownership of electronic documents. The present disclosure also is directed to an electronic authentication system including an electronic document authentication watermark seal or signature line for confirming a document's signing within the view.Type: GrantFiled: December 28, 2020Date of Patent: December 27, 2022Assignee: Citrin Holdings LLCInventors: Paul Rakowicz, Robert Shanahan, Yaakov Y. Citrin
-
Patent number: 11531754Abstract: Systems, methods, devices, and computer readable media related to fraud detection. Fraud detection is achieved using a flexible scripting language and syntax that simplifies the generation of fraud detection rules. The rules are structured as conditional IF-THEN statements that include data objects referred to as Anchors and Add-Ons. The Anchors and Add-Ons used to generate the rules also correspond to a distinct data path for the retrieval data from any of a variety of data sources. The generated rules with distinct data paths are then converted using a transpiler from the scripting language into native language source code (e.g., PHP, Java, etc.) for deployment in a particular environment. The rules are then executed in real-time in the environment to detect potential fraudulent activity.Type: GrantFiled: September 11, 2019Date of Patent: December 20, 2022Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Yi Wei Tseng, Randy Lukashuk, Perry McGee, Amiran Gigiberia, Andrew Giblin, Kenny Wan, Andrian Sevastyanov
-
Patent number: 11516259Abstract: Systems and methods for embodiments of a graph based artificial intelligence systems for identity management are disclosed. Embodiments of the identity management systems disclosed herein may utilize a network graph approach to analyzing roles of a distributed networked enterprise computing environment. Specifically, in certain embodiments, an artificial intelligence based identity management systems may utilize role graphs to assess the role structure of a distributed enterprise computing environment.Type: GrantFiled: September 30, 2020Date of Patent: November 29, 2022Assignee: SAILPOINT TECHNOLOGIES, INC.Inventors: Mohamed M. Badawy, Jostine Fei Ho, Rajat Kabra
-
Patent number: 11500973Abstract: A computer-implemented authentication method, the method comprising: matching a brain pattern sequence with a predetermined password to allow access to a system, wherein the brain pattern sequence is calculated by analyzing a signal slope of a slope threshold of the brain activity to determine a timing and a duration of the brain activity.Type: GrantFiled: August 22, 2019Date of Patent: November 15, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hao Chen, Ya Bin Dang, Qi Cheng Li, Shao Chun Li, Jie Ma, Lijun Mei, Jian Wang, Yipeng Yu, Xin Zhou
-
Patent number: 11496478Abstract: An information processing device includes a controller that, when a first device is identified by an identification operation by a first user and a second device is identified by an identification operation by a second user, controls display of a linkage function executable using the first device and the second device. In a further modification of the invention, when the first user and the second user belong to a linkable group and the first device and the second device are identified, the controller may control the display of the linkage function.Type: GrantFiled: June 5, 2018Date of Patent: November 8, 2022Assignee: FUJIFILM Business Innovation Corp.Inventor: Kengo Tokuchi
-
Patent number: 11487894Abstract: A method generates, in a higher security domain (SD), public and secret keys using a first homomorphic encryption scheme (HES), passes the public key to a first shared security zone (SSZ) between the higher SD and a lower SD and through the first SSZ to a second entity in the lower SD, passes a plain text query from the higher SD to the first SSZ, encrypts the plain text query using a second HES, passes the encrypted plain text query to the second entity, performs an oblivious query to generate an encrypted result, and passes that from the lower SD to a second SSZ located between the higher and lower SDs, passes the secret key from the higher SD to the second SSZ, and decrypts the encrypted result using the secret key to generate a plain text result, and passes the plain text result to the higher SD.Type: GrantFiled: November 22, 2019Date of Patent: November 1, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Graham A. Bent, Flavio A. Bergamaschi
-
Patent number: 11483135Abstract: An application server sends a public key from an asynchronous key-pair to a user system to encrypt a user encryption secret that forms part of a first encryption key. The application server uses a second encryption key provided by a key derivation server to encrypt a private key from the asynchronous key-pair. The application server then deletes the second encryption key to prevent decryption of the user encryption secret received from the user system. The application server receives the encrypted user encryption secret from the user system and sends a request to the key derivation server to re-encrypt the user encryption secret. The key derivation server uses a key encryption secret to generate the second encryption key and decrypt the private key. The key derivation server uses the decrypted private key to decrypt the user encryption secret and then re-encrypts the first encryption secret to prevent decryption by the application server.Type: GrantFiled: January 30, 2020Date of Patent: October 25, 2022Assignee: SALESFORCE, INC.Inventor: Patrick Calahan
-
Patent number: 11483301Abstract: Aspects of the subject disclosure may include, for example, detecting a request for access to a wireless network via an access point. Responsive to a first determination that the identifier corresponds to an entry in the list, access is facilitated to the wireless network via the access point without the equipment of the requesting user providing credentials to the wireless network. The list includes a first set of entries corresponding to a first set of users having unrestricted access and a second set of entries corresponding to a second set of users having restricted access. Responsive to a second determination that the identifier does not correspond to any of the entries, a message is transmitted to equipment of the host regarding the request, and responsive to receiving approval, the list is updated to include the identifier. Other embodiments are disclosed.Type: GrantFiled: May 21, 2021Date of Patent: October 25, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Sangar Dowlatkhah, Zhi Cui, Venson Shaw
-
Patent number: 11481477Abstract: A method and apparatus for digital watermarking, recording multimedia contents, as well as detection, by using data recorded in a base, of potentially infringing multimedia contents. The method is based on a watermarking done in conjunction with the recording of specific data in a data base, this data being thereafter used to detect a watermark, if any, in an infringing content in using or not using the original content.Type: GrantFiled: November 28, 2017Date of Patent: October 25, 2022Assignee: LAMARKInventors: Vivien Chappelier, Mathieu Desoubeaux, Jonathan Delhumeau
-
Patent number: 11477169Abstract: A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and generates a processing string. The sending entity appends the processing string to the message and sends the message to the receiving entity. The message is unreadable while the processing string is appended thereto. Upon receipt of the message with the appended processing string, the receiving entity requests removal the processing string. Upon successful verification of the receiving entity, the processing string is removed, and the message is returned to the receiving entity.Type: GrantFiled: January 24, 2022Date of Patent: October 18, 2022Assignee: Syniverse Technologies, LLCInventors: Jacques F. Mouton, Monique Jeanne Morrow
-
Patent number: 11475143Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: GrantFiled: September 12, 2020Date of Patent: October 18, 2022Assignee: Protegrity CorporationInventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Patent number: 11470045Abstract: A communication system for an aircraft comprises a communication interface with the outside of the aircraft and an avionics domain of which the security level is the highest of the communication system. It also comprises a communication domain to which is connected the communication interface and of which the security level is lower than the security level of the avionics domain. A barrier of a first type is arranged to filter the information coming from the communication interface so as to allow the information to pass into the communication domain only if the information corresponds to an authenticated communication. A barrier of a second type is arranged to filter information transmitted from the communication domain to the avionics domain, carrying out at least a syntactic filtering of the information.Type: GrantFiled: June 14, 2019Date of Patent: October 11, 2022Assignees: Airbus Operations SAS, Airbus Operations GmbHInventors: Bertrand Leconte, Pierre Attal, Olaf Bischof, Stephan Marwedel
-
Patent number: 11463480Abstract: A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more services, such as content storage and delivery. The portal comprises a security policy editor, a web-based configuration tool that is intended for use by customers to generate and apply security policies to their media content. The security policy editor provides the user the ability to create and manage security policies, to assign policies so created to desired media content and/or player components, and to view information regarding all of the customer's current policy assignments. The editor provides a unified interface to configure all media security services that are available to the CDN customer from a single interface, and to enable the configured security features to be promptly propagated and enforced throughout the overlay network infrastructure.Type: GrantFiled: August 11, 2020Date of Patent: October 4, 2022Assignee: Akamai Technologies, Inc.Inventors: Nicholas S. Brookins, Akinwale O. Olugbile, James A. Mutton