Patents Examined by Ponnoreay Pich
-
Patent number: 11245723Abstract: Disclosed herein is technology that detects potentially deceptive URI (Uniform Resource Identifier) of a homograph attack (e.g., an Internationalized Domain Name (IDN) homograph attack). In one or more implementations, the detection may be accomplished, at least in part, by assessing the likelihood that all of the characters in the URI (e.g., domain name) were typed on a keyboard using a single keyboard map. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.Type: GrantFiled: November 2, 2018Date of Patent: February 8, 2022Assignee: Forcepoint, LLCInventor: Luke Somerville
-
Patent number: 11240218Abstract: This application provides a key distribution and authentication method, system, and an apparatus. The method includes: a service center server distributes different keys to terminal devices, and then the terminal devices perform mutual authentication with the network authentication server based on respective keys and finally obtain communication keys for communication between the terminal devices and a functional network element. This provides a method for establishing a secure communication channel for the terminal device, having a broad application range.Type: GrantFiled: October 24, 2018Date of Patent: February 1, 2022Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Rong Wu, Bo Zhang, Lu Gan, Haiguang Wang
-
Patent number: 11223583Abstract: The present disclosure involves systems, software, and computer implemented methods for tracking of a conversation and management of multi-channel, multi-interaction customer conversations across multiple chat bots. One example system includes operations to receive a first signal comprising a first set of conversational input received via interactions with a conversational interface from a client device, the conversational interface associated with a plurality of chat bots and manages interactions between the client device and the plurality of chat bots. The received conversational input is analyzed to determine a context of the received conversational input based on characteristics of the received conversational input. A request is transmitted to an identified first chat bot associated with the determined context and a response is received from the identified first chat bot. The response is transmitted to the client device for presentation.Type: GrantFiled: July 8, 2020Date of Patent: January 11, 2022Assignee: The Toronto-Dominion BankInventors: Dino Paul D'Agostino, Amanda Le Amaral, Andrew David Clark, Michel Henault-Ethier, Randall Walton Martin
-
Patent number: 11206269Abstract: Techniques for managing access to infrastructure components hosted in a cloud computing environment are provided. One technique includes receiving a request from a user to access a single infrastructure component of multiple infrastructure components hosted in the cloud computing environment. At least one of a current operating state of the cloud computing environment and a context of the user is determined in response to the request. A determination is made to grant the user access to the single infrastructure component, based on an analysis of at least one of the current operating state and the context of the user. In response to the determination, a credential is retrieved that is specific to the single infrastructure component and is valid for a temporary amount of time. The credential is provided to the user.Type: GrantFiled: June 28, 2019Date of Patent: December 21, 2021Assignee: Amazon Technologies, Inc.Inventor: Frank Leslie Van Deman
-
Patent number: 11190502Abstract: An identity provider, within a directory service, provides an automatic technique for configuring the single sign-on settings of a service provider. The directory service contains pre-configured templates for each service provider supported by the directory service which include the details of the service provider's SSO configuration settings web page. A configuration sign-on script is generated to automatically fill in the configuration settings so that the principal can perform single sign-on with the service provider's preferred authentication and authorization protocol.Type: GrantFiled: September 22, 2018Date of Patent: November 30, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Jeevan Suresh Desarda, Arvind Harinder, Mayukh Ray
-
Patent number: 11190938Abstract: Embodiments of the application provide a device identifier access method and relate to the field of communications technologies, so as to reduce a risk of privacy leakage, and improve device security of a terminal. The method implemented by a terminal, includes: receiving request information for accessing a first device identifier by a target application; determining first access permission used when the target application accesses the first device identifier, where the first access permission includes one of the following: prohibiting access to the first device identifier, allowing access to a real value of the first device identifier, and allowing access to a dummy value of the first device identifier; and when the first access permission is allowing access to the dummy value of the first device identifier, returning the dummy value of the first device identifier to the target application.Type: GrantFiled: September 29, 2017Date of Patent: November 30, 2021Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Kao Zhao, Zhen Chen
-
Patent number: 11182494Abstract: A method of controlling access to data on a first electronic device, the method comprising steps of establishing a shared encryption key with a first software application instance running on a second electronic device, receiving a ‘begin session’ command sent by the first software application instance and responsive to the ‘begin session’ command, creating a storage location in a data store of the electronic device, obtaining a data encryption key, receiving data, encrypting the data using the data encryption key and storing the encrypted data in the storage location, receiving an ‘end session’ command sent by the first software application instance and responsive to the ‘end session’ command, discarding the shared encryption key, and deleting the encrypted data from the storage location.Type: GrantFiled: September 25, 2019Date of Patent: November 23, 2021Assignee: BlackBerry LimitedInventors: Siavash James Joorabchian Hawkins, Phillip Riscombe-Burton, Johnathan George White
-
Patent number: 11178180Abstract: Methods, apparatus, and processor-readable storage media for risk analysis and access activity categorization across data structures for use in network security mechanisms are provided herein.Type: GrantFiled: November 1, 2018Date of Patent: November 16, 2021Assignee: EMC IP Holding Company LLCInventors: Sean Miller, Aaron Beaudoin, Avinash Sangappa, Venkata Kanaparthy
-
Patent number: 11171784Abstract: Systems and methods for providing a secured password and authentication mechanism for programming and updating software and firmware are provided. Some methods can include a control panel device or a server device generating a onetime password or security token, the control panel device or the server device identifying an authorized user and a phone number of a mobile device associated with the authorized user, the control panel device or the server device using the phone number to transmit the onetime password or security token to the mobile device, the control panel device receiving user input including the onetime password or security token and instructions to program or update the software or firmware of the control panel device or to power off or restart the control panel device, and the control panel device executing the instructions when the onetime password or security token is valid.Type: GrantFiled: October 15, 2019Date of Patent: November 9, 2021Assignee: Honeywell International Inc.Inventors: RajeshBabu Nalukurthy, SivaSankar Mathuraju, Kanaka Nagendra Prasad Naraharisetti, Balamurugan Venkatesh, Murali R
-
Patent number: 11159554Abstract: Customers of a computing resource service provider may operate computing resources provided by the computing resource service provider. Operational information from customer operated computing resources may be correlated with operational information from computing resources operated by the computing resource service provider or other entities, and correlated threat information may be generated.Type: GrantFiled: June 21, 2019Date of Patent: October 26, 2021Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Alexander Robin Gordon Lucas, Robert Eric Fitzgerald
-
Patent number: 11128442Abstract: A system for performing authentication of users of a distributed register network is provided. In particular, the system may comprise a distributed register network comprising one or more decentralized nodes, each of which may store a separate copy of a distributed data register. The system may further comprise one or more specialized nodes which authenticate users that trigger the generation of blocks in a linked structures of the distributed register network, where the blocks are associated with requests that are submitted by the user. In this way, the system verifies the authenticity of the blocks in the linked structures, thereby providing a more robust distributed register network.Type: GrantFiled: June 23, 2020Date of Patent: September 21, 2021Assignee: BANK OF AMERICA CORPORATIONInventors: Nimish Ravindra Deshpande, Prashant Khare
-
Patent number: 11122066Abstract: Systems for and methods of detecting cyber-attacks by selecting a group of users and monitoring those user's computer systems for behavior that indicates a series of actions reflecting behavior indicative of a cyber-attack.Type: GrantFiled: September 26, 2018Date of Patent: September 14, 2021Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Mackenzie Kyle, Benjamin Arnold, Bradley N. Gunner, Rohith Kondeti, Michael Monte
-
Patent number: 11120169Abstract: The disclosed computer-implemented method for identifying malware locations based on analyses of backup files may include (i) identifying a presence of a backup file set and (ii) performing a security action that may include (a) detecting, based on a scan of the backup file set, malware in the backup file set, (b) determining, based on a location of the malware in a system file structure of the backup file set, a subgraph of the system file structure of the backup file set that includes the malware, (c) identifying a string prefix for the subgraph of the system file structure of the backup file set, (d) using an index to cross-reference the string prefix to a pointer identifying a subgraph of an original file set, and (e) scanning a file in the subgraph of the original file set for the malware. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 19, 2019Date of Patent: September 14, 2021Assignee: NortonLifeLock Inc.Inventor: Bruce McCorkendale
-
Patent number: 11115410Abstract: In one embodiment, a method includes receiving a first audio input from a user requesting access to information or a service, sending a request for the information or service to an authentication server, where the request includes first authentication information based on the first audio input and further includes a user identifier associated with the user, receiving a second audio input from a client system of the user, where the second audio input includes a first authentication code to be compared to a second authentication code generated by the authentication server, sending second authentication information based on the second audio input and the user identifier to the authentication server for verification, receiving, from the authentication server, an indication of whether the user is successfully authenticated based on the second authentication information, and providing, to the user, access to the information or service when the user is successfully authenticated.Type: GrantFiled: November 6, 2018Date of Patent: September 7, 2021Assignee: Facebook, Inc.Inventors: Michael Robert Hanson, Lloyd Hilaiel, Jinsong Yu, Heidi Young, Gary Eugene Baalman, Rachel Jordan Engel
-
Patent number: 11095440Abstract: A device may receive, from a client device, a request with a single packet authorization (SPA) packet that includes data identifying a universal client device identifier (UID), a counter, a first one-time password generated based on a first shared key, the UID, and the counter. The device may generate a second shared key associated with the UID, and may compare the SPA packet to a comparison message authentication code (MAC) generated based on the second shared key, the UID, and the counter. The device may determine whether the SPA packet matches the comparison MAC, and may validate the client device when the SPA packet matches the comparison MAC. The device may provide a MAC associated with the SPA packet to the client device to enable the client device to validate the device for a secure communication based on establishing a pre-master key with the client device.Type: GrantFiled: November 29, 2019Date of Patent: August 17, 2021Assignee: Verizon Patent and Licensing Inc.Inventors: Junaid Islam, William F. Copeland, Mohammed M. Rahman, Gina L. Otts, Brent R. Bilger
-
Patent number: 11087008Abstract: Embodiments described include systems and methods for using an HTML-based application integrated with an embedded browser on a client device, for trusted data transfer for instance. An HTML-based application within an embedded browser of a client device can provide access to a network application and its resources. The HTML-based application can establish a secure session for the network application between a server and the HTML-based application. The embedded browser can determine that the HTML-based application is a trusted application via application of one or more policies. With the secure session established and responsive to determining that the HTML-based application is a trusted application, the embedded browser may establish at least one virtual channel between the embedded browser and the HTML-based application. Using the at least one virtual channels, the embedded browser can transfer data between the secure session of the network application and the operating system (OS) of the client device.Type: GrantFiled: September 19, 2018Date of Patent: August 10, 2021Assignee: Citrix Systems, Inc.Inventors: Vipin Borkar, Santosh Sampath, Deepak Sharma, Arvind SankaraSubramanian
-
Patent number: 11080427Abstract: The present disclosure provides label data leakage channel detection methods and apparatuses. According to one exemplary label data leakage channel detection method, detection labels are generated based on normal labels of a user. The detection labels can be associated with different data usage channels, so as to indirectly detect usage of the detection labels. Possible data leakage channels can be effectively detected based on massive data indexing and searching. One exemplary apparatus of the present disclosure includes a detection label adding module, a channel association module, an interception module, an intercepted information analysis module, a channel searching module, and an output module. The detection methods and apparatuses provided by the present disclosure have the advantages of high detection efficiency and the capability of processing massive and dynamic user label data.Type: GrantFiled: May 14, 2020Date of Patent: August 3, 2021Assignee: ALIBABA GROUP HOLDING LIMITEDInventor: Zhen Wen
-
Patent number: 11080385Abstract: The disclosed computer-implemented method for enabling multi-factor authentication for seamless website logins may include (1) generating a numerical sequence utilized for authenticating a user for multi-factor authentication on a website, (2) detecting user login credentials for initiating a multi-factor authentication session on the website, (3) receiving, in response to the user login credentials, a request for multi-factor authentication data associated with the numerical sequence from the website, (4) retrieving, utilizing an application programming interface (API), the multi-factor authentication data from a secure storage associated with the user, and (5) providing, utilizing the API, the multi-factor authentication data to the website to login the user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 24, 2018Date of Patent: August 3, 2021Assignee: NortonLifeLock Inc.Inventors: SriHarsha Angara, Michael Lo, Simon Tiku, John Meehan
-
Patent number: 11068594Abstract: There is provided a method of detecting a threat against a computer system. The method comprises: creating a modular representation of behavior of known applications on the basis of sub-components of a set of known applications; entering the modular representation to an evolutionary analysis system for generating previously unknown combinations of the procedures; storing the generated previously unknown combinations as candidate descendants of known applications to a future threat candidate database; monitoring the behavior of the computer system to detect one or more procedures matching the behavior of a stored candidate descendant in the future threat candidate database; and upon detection of one or more procedures matching the behavior of the stored candidate descendant and if the stored candidate descendant is determined to be malicious or suspicious, identifying the running application as malicious or suspicious.Type: GrantFiled: October 30, 2018Date of Patent: July 20, 2021Assignee: F-Secure CorporationInventors: Mika Stahlberg, Matti Aksela
-
Patent number: 11054947Abstract: In keystroke recognition technologies, a method and a module for updating a keystroke reference, and a terminal device are provided. The method for updating a keystroke reference includes: receiving a pressing interrupt sent by a keystroke chip; obtaining a plurality of pressing capacitance values from the keystroke chip, where the plurality of pressing capacitance values include a capacitance value of the keystroke chip at a generation moment of the pressing interrupt and a capacitance value of the keystroke chip at a scanning moment next to the generation moment of the pressing interrupt; and setting a release reference of the keystroke chip according to the plurality of pressing capacitance values, to improve interchangeability and anti-interference of the keystroke chip with no extra burden on a main control chip.Type: GrantFiled: October 12, 2018Date of Patent: July 6, 2021Assignee: SHENZHEN GOODIX TECHNOLOGY CO., LTD.Inventors: Jinhui Lin, Dan Wu, Yunfang Long