Patents Examined by Noura Zoubair
-
Patent number: 11972412Abstract: Embodiments of the invention relate to systems and methods for efficiently provisioning mobile devices with personalization data. For some embodiments, a method is disclosed comprising receiving a request for provisioning comprising device information for a mobile device and user authentication information for a user, generating a partial personalization script, an activation script, and a deletion script using the device information, sending the partial personalization script, the activation script, and the deletion script to an application provider computer, wherein the application provider computer initiates execution of the partial personalization script on the mobile device, authenticating the user authentication information, and sending an activation message to the application provider computer, wherein the application provider computer initiates execution of the activation script.Type: GrantFiled: April 15, 2021Date of Patent: April 30, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Erick Wong, Oleg Makhotin
-
Patent number: 11949717Abstract: In one embodiment, a method comprises: tracking, by a first security agent executed within a user network device, a plurality of wireless data networks that are available for connection by the user network device for secure communications with a second network device in a secure peer-to-peer data network, and maintaining a history of each of the wireless data networks; determining for each of the wireless data networks, by the first security agent, a corresponding risk assessment that identifies a corresponding risk in encountering a cyber threat on the corresponding wireless data network; and supplying, to a second security agent executed within the user network device, a recommendation for connecting to a wireless data link identified as avoiding the cyber threat during the secure communications, wherein the user network device has a two-way trusted relationship with the second network device in the secure peer-to-peer data network.Type: GrantFiled: June 29, 2021Date of Patent: April 2, 2024Assignee: WhiteStar Communications, Inc.Inventor: Billy Gayle Moon
-
Patent number: 11924321Abstract: A system and method to transform a block of data is disclosed. A block of original data is retrieved from a data store, block of original data including a N number of words, each word including one or more bits of data. A multiplier matrix is provided, the multiplier matrix having N×N words, a plurality of sub matrices arranged diagonally within the N×N matrix, with each of the sub matrix arranged as a binomial matrix. All the words in the multiplier matrix not part of the sub matrix are set to zero. Each of the sub matrix is represented as a product of a plurality of lower factorized matrix, a plurality of upper factorized matrix and a shift matrix. The block of original data is multiplied with the multiplier matrix to generate a transformed block of original data with N number of words.Type: GrantFiled: May 18, 2021Date of Patent: March 5, 2024Inventor: Geoffrey Arthur Boyd
-
Patent number: 11914703Abstract: A method and data processing system are provided for detecting a malicious component in a data processing system. The malicious component may be of any type, such as a hardware trojan, malware, or ransomware. In the method, a plurality of counters is used to count events in the data processing system during operation, where each event has a counter associated therewith. A machine learning model is trained a normal pattern of behavior of the data processing system using the event counts. After training, an operation of the data processing system is monitored using the machine learning model. Current occurrences of events in the data processing system are compared to the normal pattern of behavior. If a different pattern of behavior is detected, an indication, such as a flag, of the different pattern of behavior is provided.Type: GrantFiled: July 3, 2019Date of Patent: February 27, 2024Assignee: NXP B.V.Inventors: Nikita Veshchikov, Ventzislav Nikov
-
Patent number: 11902312Abstract: A method, apparatus and product for assessing security threats from lateral movements and mitigation thereof. The method comprising statically analyzing the network to determine for each asset of a list of assets in a network, potential network lateral movements therefrom to other assets; dynamically analyzing the network to validate each potential network lateral movement identified by the static analysis; generating a graph of network lateral movements, wherein the graph comprises nodes and directed edges, wherein a node of the graph represents an asset of the list of assets, wherein a direct edge of the graph connecting a source node to a target node represents a validated network lateral movement from a source asset, represented by the source node, to a target asset, represented by the target node; and utilizing the graph of network lateral movements to assess security risk to the network.Type: GrantFiled: November 1, 2019Date of Patent: February 13, 2024Assignee: CYMULATE LTD.Inventors: Avihai Ben-Yosef, Shmuel Ur
-
Patent number: 11902782Abstract: Techniques are provided for ad-hoc authenticated group discovery and data sharing in a mesh network. A group of devices is created without leaving a security gap due to the open communication needed to establish the discovery of the devices forming the group. The group can be authenticated autonomously following network discovery of the devices. Instead of requiring global pre-assigned keys for authentication, the devices in the group are authenticated with signatures and certificate passing thereby providing strong security. The efficiency of data sharing between the devices of the network, such as a mesh network, can also be increased. One or more devices may act as a bridge device between devices of a same group that are not in direct wireless communication with each other to reduce re-broadcasts within the mesh network.Type: GrantFiled: June 22, 2021Date of Patent: February 13, 2024Assignee: ITRON GLOBAL SARLInventors: Benjamin Damm, Eric Donald White, Tommi Petteri Parkkila
-
Patent number: 11899798Abstract: Disclosed is a method and system for verifying a regex sanitizer and a validator. The method comprises verifying of at least one of a regex sanitizer and a validator by applying the regex sanitizer and a validator over multiple predefined tainted inputs. An output obtained after applying at least one of the regex sanitizer is checked for one of a tainted output or a non-tainted output. The at least one of the regex sanitizer and validator may be qualified as a valid regex sanitizer and validator based upon the checking. The valid regex sanitizer may be tagged with a validation signature. The valid regex sanitizer is used for checking the tainted input in the user's input.Type: GrantFiled: May 8, 2020Date of Patent: February 13, 2024Assignee: HCL TECHNOLOGIES LIMITEDInventors: Jonathan Afek, Gal Ben-Yair
-
Patent number: 11895219Abstract: An artificial intelligence calculation semiconductor device is provided. The artificial intelligence calculation semiconductor device comprising: a control unit; and a MAC (Multiply and Accumulator) calculator which executes a homomorphic encryption calculation through the control unit, wherein the MAC calculator includes an NTT (Numeric Theoretic Transform)/INTT (Inverse NTT) circuit which generates cipher texts by performing a homomorphic multiplication calculation through transformation or inverse transformation of data, a cipher text multiplier which executes a multiplication calculation between the cipher texts, a cipher text adder/subtractor which executes addition and/or subtraction calculations between the cipher texts, and a rotator which performs a cyclic shift of a slot of the cipher texts.Type: GrantFiled: December 29, 2020Date of Patent: February 6, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Jin Soo Lim, Chang Kyu Seol, Pil Sang Yoon, Ji Youp Kim, Ju-Young Jung
-
Patent number: 11886601Abstract: A method of securely processing data in a third party cloud environment is provided. Third party computer executable code is executed in a secure portion of the third party cloud environment. An external data request for external data to be received from an external data provider is then processed whereby the external data request comprises at least a portion of the secure data. The third party cloud environment determines whether to authorise the first external data request, and if the request is so authorised the request is sent to the external data provider and the external data is received from the external data provider.Type: GrantFiled: December 18, 2020Date of Patent: January 30, 2024Assignee: Barclays Execution Services LimitedInventors: Jeremy Goldstone, Joe O'Brien, Jeeban Panigrahi
-
Patent number: 11888821Abstract: A remote software development infrastructure can include multiple cross-continent datacenters with a variety of remote devices to choose from in the datacenters. A user can select a remote device and access the remote device via a local machine. The infrastructure can stream a video feed of the display of the remote device to the local machine. The user can run a browser on the remote device to test a website, including for example, testing accessing the website and its features via the browser running on the remote device. URL requests to the user's website are received from the local machine and injected into the browser running on the remote device. The browser running on the remote device issues the URL requests. Restricted URL requests can be modified via a browser extension and replaced with a non-restricted URL pointing to the same communication endpoint as the restricted URL.Type: GrantFiled: December 16, 2022Date of Patent: January 30, 2024Assignee: BrowserStack LimitedInventors: Bipul Jain, Vishal Shah, Ryan Rehman
-
Patent number: 11888820Abstract: A method including determining aggregate amounts of VPN data communicated by VPN servers with a host device during sample durations of time within a reference period; determining difference amounts indicating differences in the aggregate amounts of VPN data communicated by VPN servers with the host device during successive sample durations of time; determining average aggregate amounts of VPN data communicated by VPN servers with the host device based at least in part on averaging the difference amounts; determining a largest average aggregate amount, from among the average aggregate amounts, as an average threshold level; and selectively adjusting an amount of VPN data communicated by VPN servers with the host device based at least in part on a result of comparing the average threshold level with an observed average aggregate amount of VPN data communicated by VPN servers with the host device. Various other aspects are contemplated.Type: GrantFiled: February 24, 2022Date of Patent: January 30, 2024Assignee: UAB 360 ITInventor: Adrianus Warmenhoven
-
Patent number: 11870766Abstract: An identity provider of a cloud computing service provides authentication for on-premise applications that is subject to a legacy authentication protocol that differs from the cloud-based network authentication protocol used by the identity provider. The identity provider generates a security ticket for use to gain access to the on-premise application. The security ticket is embedded in a security token associated with a cloud-based network authentication protocol. A client application seeking access to the on-premise application extracts the embedded security ticket from the security token which is then used to access the on-premise application via a legacy authentication protocol.Type: GrantFiled: December 16, 2020Date of Patent: January 9, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Avraham Carmon, Joseph Isenhour, Aakashi Kapoor, Young Moon Ko, Sagar Bholanath Saha, Steven Syfuhs
-
Patent number: 11863689Abstract: A system having one or more processors. The one or more processors receive data having a request for transferring ownership of a portion of a security from a first user computing system. A portion of the data is signed by a signer with a group signature having an extension. The one or more processors further receive a request to link an identity of the signer and open the identity of the signer. The one or more processors provide to a regulator information corresponding to the group signature and a signature of a transferee being linked to the group signature. The one or more processors generate signing ability of a second user computing system associated with an identifier of the transferee. Generating the signing ability of the second user computing system to use the group signature transfers the ownership of the portion of the security.Type: GrantFiled: October 24, 2022Date of Patent: January 2, 2024Assignee: Wells Fargo Bank, N.A.Inventor: Phillip H. Griffin
-
Patent number: 11861013Abstract: Systems and methods are provided for the classification of identified security vulnerabilities in software applications, and their triage based on automated decision-tree triage and/or machine learning. The disclosed system may generate a report listing detected potential vulnerability issues, and automatically determine whether the potential vulnerability issues are exploitable using automated triage policies containing decision trees or by extracting vulnerability features from the report and processing the extracted vulnerability features using machine learning models.Type: GrantFiled: September 28, 2020Date of Patent: January 2, 2024Assignee: Accenture Global Solutions LimitedInventors: Finbarr Tarrant, Gopal Kavanadala Sridhar, Jee Hyub Kim, Navdeep Sharma, Eanna Mulrooney, Anton Plotnikov, Karel Kohout, Mário Lauande Lacroix, Richard Levine, Johnny Obando
-
Patent number: 11863522Abstract: In one embodiment, a method by an apparatus of a Border Gateway Protocol (BGP) network includes accessing an attestation token for the apparatus. The method further includes encoding the attestation token in a BGP signaling message. The method further includes sending the BGP signaling message with the encoded attestation token to a second apparatus of the BGP network.Type: GrantFiled: March 20, 2020Date of Patent: January 2, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Clarence Filsfils, Swadesh Agrawal, Apoorva Karan
-
Patent number: 11856109Abstract: An example operation may include one or more of receiving, by a certificate issuer node, an asset certification request from an asset producer node over a blockchain, endorsing, by the certificate issuer node, an asset certificate in response to detection of the asset certificate issued to the asset producer node by another certificate issuer node, and recording a signature of the certificate issuer node into an asset producer node certification record on the blockchain.Type: GrantFiled: February 6, 2020Date of Patent: December 26, 2023Assignee: International Business Machines CorporationInventors: Igor Anatolyevich Naumov, Yichong Yu
-
Patent number: 11853430Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.Type: GrantFiled: May 22, 2020Date of Patent: December 26, 2023Assignee: SECURITY COMPASS TECHNOLOGIES LTD.Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Patent number: 11848928Abstract: An anonymous authentication service for an invulnerable secret key authentication and encryption token distribution service. Applications place a small code segment within their communications protocol, thereby allowing network participants the full benefit of perfectly secure authenticated and encrypted message traffic without concern for third party key management. This is the world's first participant-managed, independent-trust secure messaging key distribution capability.Type: GrantFiled: March 9, 2021Date of Patent: December 19, 2023Assignee: Qwyit LLCInventor: R Paul McGough
-
Patent number: 11848949Abstract: The technology discloses a method applied by a policy manager to a cloud-based security system that unifies functions of access control and traffic inspection, threat detection and activity contextualization on inspectable and non-inspectable traffic, with a data manager coupled to the policy manager storing a superset of fields used to specify security policies across the cloud-based unified functions, including common fields shared by two or more of the functions.Type: GrantFiled: January 30, 2021Date of Patent: December 19, 2023Assignee: Netskope, Inc.Inventors: Amit Ganesh Datar, Kartik Subbanna, Kand Ly
-
Patent number: 11838403Abstract: The present techniques may provide improved processing and functionality of performance of the 128-bit AES Algorithm, which may provide improved power consumption. For example, in an embodiment, an encryption and decryption apparatus may comprise memory storing a current state matrix of an encryption or decryption process and a plurality of multiplexers configured to receive from the memory current elements of the state matrix stored in the memory, perform a cyclic shift on the received elements of the state matrix, and transmit the shifted elements to the memory for storage as a new state matrix.Type: GrantFiled: April 10, 2020Date of Patent: December 5, 2023Assignee: BOARD OF REGENTS, THE UNIVERSITY OF TEXAS SYSTEMInventors: Alekhya Muthineni, Eugene John