Patents Examined by Nega Woldemariam
-
Patent number: 11184395Abstract: An example operation includes one or more of connecting, by an identity provisioning node, a blockchain one to a blockchain two, creating, by an identity provisioning node, an interoperation identity network (IIN) for the blockchain one and for the blockchain two as an instance of a self-sovereign identity (SSI) network, executing a smart contract to: invoke an IIN access control policy, map attributes and permissions of the blockchain one to attributes and permissions of the blockchain two based on the IIN access control policy, and generate a valid verifiable credential (VC) of the IIN in the blockchain one and in the blockchain two based on the mapped attributes and the permissions.Type: GrantFiled: May 13, 2020Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Petr Novotny, Timothy Olson, Venkatraman Ramakrishna, Nitin Gaur
-
Patent number: 11156704Abstract: Method for secure distance measurement comprising the following steps: transmitting from a verifier (V) to a prover (P) a challenge message comprising a challenge bit sequence (C); transmitting from the prover (P) to the verifier (V) a response message comprising the response bit sequence (R); verifying, in the verifier (V), the response message on the basis of the response bit sequence (R); and determining, in the verifier (V), the distance between the verifier (V) and the prover (P) on the basis of the time difference between the challenge message and the response message.Type: GrantFiled: December 28, 2016Date of Patent: October 26, 2021Assignee: 3DB ACCESS AGInventor: Boris Danev
-
Patent number: 11138311Abstract: A graph representation of a designated application may be created. The graph representation may include nodes that each represent a computer programming code statement associated with the designated application as well as edges that each represent a logical linkage between two or more computer programming code statements. A determination may be made as to whether the designated application constitutes an unacceptable security risk by comparing the designated graph representation with a plurality of comparison graph representations. When it is determined that the designated application constitutes an unacceptable security risk, a message may be transmitted to prevent the designated application from being executed.Type: GrantFiled: November 16, 2018Date of Patent: October 5, 2021Assignee: salesforce.com, Inc.Inventor: Michael Cervantez
-
Patent number: 11134715Abstract: A device comprises a sensor and processing circuitry coupled to the sensor. The sensor is configured to obtain authentication information from an identification label of a cartridge of an electronic vaping device. The processing circuitry is configured to perform authentication of the cartridge based on the authentication information; and determine whether to unlock a battery section of the electronic vaping device to power the cartridge based on a result of the authentication of the cartridge.Type: GrantFiled: March 24, 2017Date of Patent: October 5, 2021Assignee: Altria Client Services LLCInventors: Arie Holtz, Bernard Juster, Shmuel Gavrielov
-
Patent number: 11132436Abstract: A method including detecting, in response to a design file uploaded by a development device, validity of an actual constraint file included in the design file and corresponding to an FPGA of the FPGA cloud host; synthesis processing the design file in response to detecting that the actual constraint file is valid; and writing a burner file obtained from the synthesis processing into the FPGA. The validity of the actual constraint file is detected to prevent a malicious attack of a user to FPGA hardware.Type: GrantFiled: May 12, 2020Date of Patent: September 28, 2021Assignee: Alibaba Group Holding LimitedInventor: Chen Liang
-
Patent number: 11108808Abstract: Attacks with inserted data may be greatly thwarted with the disclosed innovation featuring systems and methods of using a governor. A governor may act directly in in-line processing to reduce and limit attack surfaces, enforcing validators pre-selected by applications and/or, in the absence of application preselection, selecting and validating validators separately. The applicability of such a technical improvement to system operations improves the technical operations of most any system with one or more applications that accept potential attack surface items, such as data, data fields and/or data types, from “open” or uncontrolled sources.Type: GrantFiled: March 26, 2020Date of Patent: August 31, 2021Assignee: WELLS FARGO BANK, N.A.Inventor: Christopher Patrick Wells
-
Patent number: 11100227Abstract: Embodiments of the present invention provide a security indication information configuration method and device, to reduce a risk of attack and interception from malicious software. The method includes: detecting, by a terminal, whether universal security indication information is set in the terminal for a TUI; detecting a running status of the terminal if no universal security indication information is set; when it is detected that the running status of the terminal is a secure state, presenting a first input interface on a display by using a first information presentation interface; and receiving input universal security indication information by using the first input interface, and saving the universal security indication information to a trusted execution environment TEE of the terminal.Type: GrantFiled: November 25, 2015Date of Patent: August 24, 2021Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Guoqing Li, Xinmiao Chang, Zi Wang
-
Patent number: 11087018Abstract: An apparatus, method and computer program wherein the apparatus comprises:a plurality of quantum dot-graphene field effect transistors; circuitry configured to provide an individual drain-source bias voltage to each of a plurality of quantum dot-graphene field effect transistors, wherein different individual drain-source bias voltages have different parameters, to enable the plurality of quantum dot-graphene field effect transistors to detect light from a user of an apparatus; and circuitry configured to obtain output signals from each of a plurality of quantum dot-graphene field effect transistors where the output signal is dependent upon both the light detected by the quantum dot-graphene field effect transistor and the parameters of the drain-source bias voltage to enable the obtained output signals to be used as a scrambled identification signal of the user of the apparatus.Type: GrantFiled: April 27, 2017Date of Patent: August 10, 2021Assignee: Nokia Technologies OyInventors: Mark Allen, Troels Ronnow, David Bitauld, Alexander Bessonov
-
Patent number: 11082435Abstract: Exemplary systems and methods for malware attack detection and identification are provided. A malware detection and identification system a controller that features an analysis environment including a virtual machine. The analysis environment to (1) receive data by the virtual machine of the analysis environment and identify a portion of the data that have been received from one or more untrusted, (2) monitor state information associated with the identified portion of the data during execution by the virtual machine, (3) identify an outcome of the state information by tracking the state information during execution of the identified portion of the data by the virtual machine, and (4) determine whether the identified outcome comprises a redirection in control flow during execution by the virtual machine of the portion of the data, the redirection in the control flow constituting an unauthorized activity.Type: GrantFiled: May 6, 2019Date of Patent: August 3, 2021Assignee: FireEye, Inc.Inventors: Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
-
Patent number: 11076292Abstract: Disclosed is a method of controlling access to mobile radio connection(s) in a vehicle, having a policy and charging enforcement function with deep packet inspection capabilities “vePCEF” and optionally a policy and control rules function “vePCRF” in the vehicle. Furthermore, a Man In The Middle (MITM) methodology can be employed within the vehicle PCC architecture to enhance the enforcement of the PCRF/vePCRF policies. Also disclosed is a vehicle containing a PCC architecture having a MITM functionality. Also disclosed is a method of controlling access to mobile radio connection(s) in a vehicle, having a policy and charging enforcement function with deep packet inspection capabilities “vePCEF” which interfaces to a mobile core network PCRF or a cloud based PCRF.Type: GrantFiled: December 21, 2018Date of Patent: July 27, 2021Assignees: RJWilson, Inc., SkeensMcDonell Consulting Group LLC, VectoIQ LLCInventors: Randall J. Wilson, Howard K. McDonell, Mary S. Chan
-
Patent number: 11057431Abstract: Methods, apparatus, systems and articles of manufacture to provide resource security are disclosed. Example methods and apparatus manage a benchmark specific to a resource, the benchmark created during development of the resource and including a collection of rules to constrain behavior of the resource, enable a rule of the benchmark that corresponds with a type of the resource, disable a rule of the benchmark that does not correspond with the type of the resource, test the enabled rule of the benchmark against the resource, identify an insufficiency of the resource based on the enabled rule of the benchmark, and remediate the insufficiency of the resource to comply with the enabled rule of the benchmark.Type: GrantFiled: February 3, 2017Date of Patent: July 6, 2021Assignee: VMWARE, INC.Inventors: Pravin Goyal, Gregory A. Frascadore
-
Patent number: 11042488Abstract: A symmetric key that is stored at a device may be received. A public key from a remote entity may also be received at the device. Furthermore, a derived key may be generated based on a one way function between the symmetric key that is stored at the device and the public key that is received from the remote entity. The derived key may be encrypted with the public key and transmitted to the remote entity. The encryption of the derived key with the public key may provide secure transmission of the derived key to an authorized remote entity with a private key that may be used to decrypt the encrypted derived key.Type: GrantFiled: May 27, 2016Date of Patent: June 22, 2021Assignee: Cryptography Research, Inc.Inventor: Ambuj Kumar
-
Patent number: 11039311Abstract: A profile downloading method and apparatus is provided for a terminal to download and install a profile in a communication system. The communication method of the terminal includes transmitting a first message including information on a profile to be received from a profile provision server; receiving a second message including information indicating whether an encryption code input is required and a first modified encryption code; generating, when the first modified encryption code is successfully authenticated, a second modified encryption code; transmitting to the profile provision server a third message including information requesting to the profile provision server for the second modified encryption code and profile download, and receiving a fourth message including information on the profile from the profile provision server.Type: GrantFiled: July 29, 2019Date of Patent: June 15, 2021Assignee: Samsung Electronics Co., Ltd.Inventors: Jonghan Park, Duckey Lee, Hyewon Lee, Sangsoo Lee
-
Patent number: 11038924Abstract: Disclosed are various approaches for generating a device posture token corresponding to a client device. The device posture token can be used by a verification computing device to determine whether the client device complies with the security policies of a particular facility.Type: GrantFiled: January 3, 2020Date of Patent: June 15, 2021Assignee: AirWatch LLCInventors: Dan Quintas, Anthony Kueh
-
Patent number: 11030342Abstract: The disclosed computer-implemented method for controlling uploading of potentially sensitive information to the Internet may include (i) loading, at the computing device, at least a portion of a webpage and (ii) performing a security action including (A) converting, at the computing device, components of the webpage from an online status to an offline status, (B) receiving a sensitive information input to a respective offline component of the webpage, (C) converting, based on a stored user preference and in response to receiving the sensitive information input, the respective offline component to the online status, (D) buffering an outgoing network request comprising the sensitive information input, (E) receiving an approval input indicating approval to transmit the potentially sensitive information to the Internet, and (F) releasing the outgoing network request in response to receiving the approval input. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 21, 2018Date of Patent: June 8, 2021Assignee: NortonLifeLock Inc.Inventors: Daniel Kats, David Silva, Petros Efstathopoulos, Daniel Marino
-
Patent number: 10997260Abstract: A moderation framework monitors content posted in a database network and uses a declarative configuration scheme that defines moderation rules without having to write new software. A user interface operated by the moderation platform allows selection of different user criteria and different content criteria for triggering the moderation rules. The user interface also provides selectable actions for the moderation rules to apply when the content matches the selected user and content criteria. The user interface also allows selection of different entities for associating with different moderation rules, such as accounts, cases, opportunities, Chatter® feed posts, or custom objects defined by customers.Type: GrantFiled: September 26, 2019Date of Patent: May 4, 2021Assignee: SALESFORCE.COM, INC.Inventors: Ashley Mcguire, Joshua Luft-Glidden, Kenneth Chung Kay Ko, Rupali Jagtap, Sanjaya Lai, Volodymyr Ivanov
-
Patent number: 10986500Abstract: In a wireless network, a distributed ledger client maintains hardware-trust with a wireless network slice and distributed ledger nodes. The wireless network slice delivers wireless communication services to wireless user devices. When the distributed ledger client maintains hardware-trust with the wireless network slice, the wireless network slice transfers slice data to the distributed ledger client. The slice data that characterizes the delivery of the wireless communication services. The distributed ledger client transfers the slice data to the distributed ledger nodes. The distributed ledger nodes log the slice data when the distributed ledger client maintains hardware-trust with the distributed ledger nodes.Type: GrantFiled: November 6, 2018Date of Patent: April 20, 2021Assignee: Sprint Communications Company L.P.Inventors: Ronald R. Marquardt, Arun Rajagopal, Lyle Walter Paczkowski
-
Patent number: 10979902Abstract: The method of securing secure communication between a User Equipment (UE) and evolved NodeB (eNB), involves deriving a user plane (UP) encryption key (KUPenc) from a shared key (KeNB) associated with the UE for an ongoing communication session. At the UE, the UP encryption key (KUPenc) may be hashed with a number of random numbers to generate a plurality UP encryption keys(KUPenc(n)), wherein the random numbers are transmitted to the eNB through a Packet Data Convergence Protocol (PDCP) control message. One or more data packets sent from the UE to the eNB may be encrypted, by the UE, using the plurality of UP encryption keys (KUPenc(n)).Type: GrantFiled: November 28, 2018Date of Patent: April 13, 2021Assignee: Wipro LimitedInventors: Shyam Sundar Pal, Gopinath Das
-
Patent number: 10951402Abstract: Disclosed are an apparatus and method for encryption. The encryption apparatus includes a key table generator configured to generate at least one encryption key table from random values obtained from a seed value and generate at least one decryption key table from the at least one encryption key table; an algorithm generator configured to generate an encryption algorithm having a Misty structure that has a round function to which the at least one encryption key table is applied and a decryption algorithm having a Misty structure that has a round function to which the at least one decryption key table is applied; an encryptor configured to encrypt plaintext data with the encryption algorithm; and a decryptor configured to decrypt encrypted data with the decryption algorithm.Type: GrantFiled: September 19, 2017Date of Patent: March 16, 2021Assignee: SAMSUNG SDS CO., LTD.Inventors: Duk-Jae Moon, Kyu-Young Choi, Ji-Hoon Cho
-
Patent number: 10942903Abstract: Some external users in a public on-line community may post excessive numbers of items, causing annoyance to others and unnecessary loading on database resources. A robust moderation framework enables an individual community moderator or admin to specify a set of rules and actions to mitigate this problem. Scalable, performant rate limiting rules employ windowed counters, separately for each rule, with the counters maintained in cache memory resources outside the main database.Type: GrantFiled: May 29, 2019Date of Patent: March 9, 2021Assignee: SALESFORCE.COM, INC.Inventors: Kenneth Chung Kay Ko, Joshua Luft-Glidden, Lucas Pfister