Patents Examined by Michael D Anderson
-
Patent number: 11290252Abstract: Systems and methods for end-to-end encryption and compression are described herein. A query is encrypted at a client using a homomorphic encryption scheme. The encrypted query is sent to a server where the encrypted query is evaluated over target data to generate encrypted response without decrypting the encrypted query. The result elements of the encrypted response are grouped, co-located, and compressed, without decrypting the encrypted query or the encrypted response. The compressed encrypted response is sent to the client where it is decrypted and decompressed to obtain the results of the query without revealing the query or results to the owner of the target data, an observer, or an attacker.Type: GrantFiled: January 19, 2018Date of Patent: March 29, 2022Assignee: Enveil, Inc.Inventor: Ryan Carr
-
Patent number: 11282414Abstract: There are several approaches to encrypting circuits: combination logic encryption, encrypted gate topologies, transmission gate topologies, and key expansion of gate topologies. One of the approaches provides a circuit having a gate topology comprising a logic gate with integrated key transistors, where the key transistors comprise at least a PMOS stack and an NMOS stack. The PMOS stack comprises a first PMOS switch and a second PMOS switch, where the first and the second PMOS switches have sources to a voltage source and drains that serve as a source to a third PMOS switch. The NMOS stack comprises a first NMOS switch and a second NMOS switch, where the first and the second NMOS switches have sources to ground and drains that serve as a source to a third NMOS switch. Each of the above approaches may encrypt a circuit with certain advantages in delay and power consumption.Type: GrantFiled: October 24, 2016Date of Patent: March 22, 2022Assignee: Drexel UniversityInventors: Ioannis Savidis, Kyle Juretus
-
Patent number: 11277435Abstract: Techniques described herein improve database security by reducing network attack surface area in conjunction with deep input validation. In an embodiment, a database session receives one or more network packets sent via a network, the database session including a database session state that specifies one or more database privileges. The database session reads said one or more network packets into one or more request-packet-buffers, wherein said one or more request-packet-buffers include an RPC op code for a database operation. Based on the one or more database privileges associated with the user associated with the database session, the database session determines whether the RPC op code may be executed. In response to determining that the RPC op code may be executed by said database session, the RPC op code is executed. In response to determining that the op code may not be executed by said database session, the execution of the RPC op code is prevented.Type: GrantFiled: September 14, 2017Date of Patent: March 15, 2022Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Krishna Mohan Itikarlapalli, Santanu Datta, Srinath Krishnaswamy, Lakshminarayanan Chidambaran, Rajesh Kumar, Sumit Sahu, Rajendra Pingte
-
Patent number: 11271954Abstract: Presented herein are techniques for classifying devices as being infected with malware based on learned indicators of compromise. A method includes receiving, at a security analysis device, a set of feature vectors extracted from one or more flows of traffic to domains for a given user in a network during a period of time. The security analysis device analyzes the feature vectors included in the set of feature vectors with a set of operators to generate a set of per-flow vectors for the given user. Based on the set of per-flow vectors for the user, the security analysis device generates a single behavioral vector representative of the given user. The security analysis device classifies a computing device associated with the given user based on the single behavioral vector and at least one of known information or other behavioral vectors for other users.Type: GrantFiled: July 14, 2017Date of Patent: March 8, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Tomá{hacek over (s)} Komárek, Petr Somol
-
Patent number: 11272361Abstract: A technique for establishing connectivity between electronic devices is described. In particular, when an electronic device is first connected to a network, the electronic device may use a predefined location of a registrar device to request location information for a controller for the electronic device. The electronic device may provide a manufacturer certificate to the registrar device to confirm its identity. After receiving from the registrar device the location information and a registrar certificate that confirms its identity, the electronic device may use the location information to request the security information from a controller that allows the electronic device to establish connectivity with another electronic device. The electronic device may receive the security from the controller along with a controller certificate that confirms the identity of the controller. Moreover, the electronic device may establish a connection with the other electronic device based on the security information.Type: GrantFiled: March 30, 2015Date of Patent: March 8, 2022Assignee: ARRIS Enterprises LLCInventor: David Sheldon Stephenson
-
Patent number: 11256821Abstract: Methods and systems for identifying sensitive data (SD) stored on data repositories is disclosed. The data is processed to calculate a plurality of float feature (FF) vectors associated with the data. The FF vectors are clustered into a plurality of clusters, each cluster associated with a respective subset of the data. A DNA vector representative of the cluster is generated for each cluster. The DNA vectors of respective clusters are compared to one or more FF vectors calculated for a respective one or more user supplied examples of SD. One or more clusters are classified as SD based on the result of the comparing, thereby identifying respective subsets of data as SD.Type: GrantFiled: October 10, 2016Date of Patent: February 22, 2022Assignee: MINEREYE LTD.Inventors: Yaniv Avidan, Avner Atias
-
Patent number: 11240255Abstract: A method involves: receiving a request to access a first online financial application from a client device, where the first online financial application is one of a many online financial applications made available by an online financial service, and where the many online applications includes a second online application; attempting to generate a browser fingerprint for a browser application on the client device by applying a fingerprinting algorithm to one or more items of browser metadata; associating the browser fingerprint, if generated, with external user data obtained from a web analytics tool and internal user data obtained from the online financial service; receiving login credentials for the first online financial application from a user of the client device; retrieving, using the login credentials, additional internal user data maintained by the online financial service; personalizing, upon detecting the browser fingerprint and using the external user data, the internal user data, and the additionalType: GrantFiled: January 31, 2018Date of Patent: February 1, 2022Assignee: Intuit Inc.Inventors: Ali Amin, Lewis Dawson, Shweta Singh, Tim Spaulding, Josh Rab, Giovanna Diaz, Tera Thomas, Gonzalo Galicia
-
Patent number: 11234128Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.Type: GrantFiled: February 6, 2017Date of Patent: January 25, 2022Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast- Natuurwetenschappelijk Onderzoek TNOInventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
-
Patent number: 11222116Abstract: Examples associated with heartbeat signal verification are disclosed. One example includes verifying a provisioning key using a trusted key. The provisioning key is received from a remote device via an intermediary process. An intermediate key provided by the intermediary process is verified using the provisioning key. A session identifier encrypted using the intermediate key and provided to the intermediary process. A first heartbeat signal is received from intermediary process. The heartbeat signal is generated based on the session identifier.Type: GrantFiled: February 3, 2016Date of Patent: January 11, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Marcelo Gomes de Oliveira, Diogo Cesa Rosa, Fernando Ferretto, Charles R Staub, Lan Wang, Vali Ali, James R Waldron, Tiago V de Quadros Weber, Julio Cesar Sa Campao
-
Patent number: 11128641Abstract: Example embodiments disclosed herein relate to propagating belief information about malicious and benign nodes. In one example, a domain name system (DNS) resolution graph including multiple nodes is determined. In this example, a first subset of nodes is determined based on an initial benign value or an initial unknown value associated with the respective nodes. In the example, benign belief information is propagated for the first subset based on the respective initial benign values. Moreover, in the example, a second subset of the nodes is determined based on an initial malicious value or an initial unknown value. Malicious belief information is propagated for the second subset based on the respective malicious values. The propagated belief information is copied to a DNS resolution graph.Type: GrantFiled: August 28, 2015Date of Patent: September 21, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Loai Zomlot, Pratyusa K. Manadhata
-
Patent number: 11095442Abstract: A system and method for encryption key generation by receiving a plaintext message having a fixed character length and receiving, from a source, a plurality of random number. A matrix is created from the plurality random numbers and has at least one of the number of rows or columns equal to or greater than the character length. An array that can be used as an encryption key or a seed for an encryption key is generated by selecting an initial element within the matrix, selecting subsequent elements using a selection technique until a number of elements in the array is equal to the character length and rejecting any previously selected elements from the array.Type: GrantFiled: April 5, 2019Date of Patent: August 17, 2021Assignee: QRYPT, INC.Inventors: Denis Mandich, Christopher Knapp, Austin Bradley, Samuel Wolfson, Matthew Neal
-
Patent number: 11080222Abstract: An optical electromagnetic radiation (EM) emitter and receiver are located upon a printed circuit board (PCB) glass security layer. A predetermined reference flux or interference pattern, respectively, is an expected flux or reflection pattern of EM emitted from the EM emitter, transmitted by the glass security layer, and received by the EM receiver. When the PCB is subject to an unauthorized access thereof the optical EM transmitted by glass security layer is altered. An optical monitoring device that monitors the flux or interference pattern of the optical EM received by the EM receiver detects a change in flux or interference pattern, in relation to the reference flux or reference interference pattern, respectively, and passes a tamper signal to one or more computer system devices to respond to the unauthorized access. For example, one or more cryptographic adapter card or computer system functions or secured crypto components may be disabled.Type: GrantFiled: January 4, 2018Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Gerald K. Bartley, Darryl J. Becker, Matthew S. Doyle, Mark J. Jeanson, Mark O. Maxson
-
Patent number: 11082415Abstract: An anonymous or ad hoc communication is established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a user of smart phone may wish to send a message to an unknown user's smartphone. The anonymous or ad hoc communication thus allows messaging with an unknown user.Type: GrantFiled: April 6, 2018Date of Patent: August 3, 2021Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLCInventors: Ginger Chien, Yehoshuva Arasavelli
-
Patent number: 11057223Abstract: The communication system includes a communication buffer and a communication terminal. The communication buffer includes a physical unclonable function (PUF) device, and the communication buffer provides a security key generated by the PUF device. The communication terminal is coupled to the communication buffer, and transmits a mapping request to the communication buffer to ask for the security key. The communication terminal manipulates the transmission data with the security key to generate the encrypted data, and transmits the encrypted data to the communication buffer. The communication buffer further restores the transmission data from the encrypted data according to the security key.Type: GrantFiled: October 11, 2018Date of Patent: July 6, 2021Assignee: eMemory Technology Inc.Inventors: Meng-Yi Wu, Hsin-Ming Chen
-
Patent number: 11055415Abstract: Provided are mechanisms and processes for computational risk analysis and intermediation. Security practices information characterizing security measures in place at a first computing system may be received from the first computing system via a network. Computing services interaction information characterizing data transmitted from a second computing system to the first computing system may be received from the second computing system via the network. A processor may determine a risk profile for the first computing system based on the security practices information. Based on the risk profile and the computing services interaction information, the processor may then determine an estimate of the information security risk associated with transmitting the data from the second computing system to the first computing system. A risk assessment message including the estimate of the information security risk may be transmitted to the second computing system.Type: GrantFiled: September 29, 2017Date of Patent: July 6, 2021Assignee: VALENTE SHERMAN, INC.Inventors: Russell Sherman, Paul Valente
-
Patent number: 11055401Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.Type: GrantFiled: September 29, 2017Date of Patent: July 6, 2021Assignee: INTEL CORPORATIONInventors: Mingwei Zhang, Mingqiu Sun, Ravi L. Sahita, Chunhui Zhang, Xiaoning Li
-
Patent number: 11050726Abstract: A current operating system that is stored in a persistent storage circuit of a secure element is replaced by receiving a set of migration rules that specify changes to a set of data object types. Based upon the set of migration rules, a migration engine identifies data objects stored in a persistent storage circuit and corresponding to the set of data object types. For each of the identified data objects: a subset of the migration rules are selected that correspond to a data object type that corresponds to a particular data object, and based upon the selected subset, the particular data object is transformed. A new operating system can then be enabled.Type: GrantFiled: April 4, 2016Date of Patent: June 29, 2021Assignee: NXP B.V.Inventors: Andreas Lessiak, Josef Fruehwirth, Jozsef Jelenka, Harald Schlatte-Schatte, Alexandre Frey
-
Patent number: 11030569Abstract: A cloud-based package-exchange-service for package delivery to, and pick-up from, a target vehicle includes a GPS-based proximity module. The GPS-based proximity module receives current GPS coordinates of a package delivery vehicle and of the target vehicle. The GPS-based proximity module stores both GPS coordinates. The GPS-based proximity module monitors a distance between the package delivery vehicle and the target vehicle of the customer. The cloud-based system also has a delivery module in the first server associated with a second database. The delivery module includes one or more lists of local delivery services that include registered individuals to be assigned for package exchange operations. The lists of local delivery services also include package delivery restrictions and conditions including package size, hours of operation, distance to operate, and delivery prices.Type: GrantFiled: August 22, 2016Date of Patent: June 8, 2021Assignee: Continental Intelligent Transportation Systems, Inc.Inventors: Seval Oz, Tammer Zein-El-Abedein, Yao Zhao
-
Patent number: 11005888Abstract: Methods, systems, and apparatus in a service layer environment may create, update, or delete access control policy triples whenever an access control policy (ACP) resource is created, updated, or deleted. In addition, methods address potentially frequent and unnecessary ACP triple management.Type: GrantFiled: September 29, 2017Date of Patent: May 11, 2021Assignee: Convida Wireless, LLCInventors: Chonggang Wang, Hongkun Li, Xu Li, Dale N. Seed, Quang Ly, Catalina Mladin
-
Patent number: 10992674Abstract: A method for providing network access to a plurality of user entities through an access point, said access point comprising a LAN interface and a broadband network interface, the method comprising the following steps at a gateway device: establishing a second secure communication link with said access point; receiving an IP address allocation request from one of said plurality of user entities via said second secure communication link; accessing a AAA server to verify whether a successful authentication of said one of said plurality of user entities on the basis of data related to a mobile subscription associated with said one of said plurality of user entities has already taken place; and upon successful verification, completing an IP address allocation scheme with said one of said plurality of user entities and enabling relaying of data between said one of said plurality of user entities and a PDN; wherein said gateway device is adapted to aggregate a plurality of instances of second secure communication liType: GrantFiled: June 4, 2012Date of Patent: April 27, 2021Assignee: Nokia Technologies OyInventors: Thierry Van De Velde, Wim Henderickx, Telemaco Melia