Patents Examined by Roderick Tolentino
-
Patent number: 11785036Abstract: Aspects of the disclosure relate to real-time validation of data transmissions based on security profiles. A computing platform may collect, in real-time, information associated with a plurality of data transmissions between applications, where the information may include, for each data transmission, an indication of a source application and a destination application. Then, the computing platform may retrieve, from a repository and for each data transmission, a first security profile associated with the source application, and a second security profile associated with the destination application. The computing platform may then compare, for each data transmission, the first security profile to the second security profile. Subsequently, the computing platform may detect, based on a determination that the first security profile does not match the second security profile, a potentially unauthorized data transmission.Type: GrantFiled: February 25, 2022Date of Patent: October 10, 2023Assignee: Bank of America CorporationInventors: George Albero, Guisen Saffel
-
Patent number: 11777967Abstract: A method, an intelligent switch, a device, and a network for recognizing deviations in communication behavior of the network are provided. Characteristics of communication are monitored and evaluated regarding security behavior of the network using a model of a communication behavior of the network. For each communication over a switch of the network, at most three security values are derived from communication metadata of the respective communication using the model of the communication behavior. For each communication, it is checked whether the respective at most three security values meet respective predetermined threshold values. When the respective predetermined threshold values are not met by at least one of the security values, a security warning is generated.Type: GrantFiled: December 3, 2019Date of Patent: October 3, 2023Assignee: Siemens AktiengesellschaftInventors: Jens Makuth, Jürgen Schimmer
-
Patent number: 11777982Abstract: A multidimensional security situation real-time presentation method according to an embodiment includes selecting security testing cases of at least one dimensionality based on a test instruction to generate a target test set, and generating a corresponding target log set according to the target test set, determining a difference log set according to the target log set and a monitoring log set, and performing real-time output display of difference log events, test processing time periods, enhanced training nodes and a test processing efficiency corresponding to the difference log set.Type: GrantFiled: February 1, 2023Date of Patent: October 3, 2023Assignees: State Grid Zhejiang Electric Power Company Hangzhou Power Supply Company, State Grid Zhejiang Hangzhou Xiaoshan District Power Supply CompanyInventors: Jiong Zhu, Quanming Yue, Libo Fan, Ang Li, Rongjie Han, Jin Qian, Xiaohua Xu, Zhiqing Sun, Weihong Hou, Mengjun Du, Yibo Lai, Xue Feng, Yuanzhong Chen, Xinyue Zhou
-
Patent number: 11777738Abstract: An example operation may include one or more of executing, by an endorser node, a smart contract to generate a blockchain transaction data, generating, by the endorser node, metadata specific to the endorser node, concatenating, by the endorser node, the metadata with the blockchain transaction data, signing, by the endorser node, a concatenation result data with a key of the endorser node, and providing, by the endorser node, the signed concatenation result data to a committer node for verification.Type: GrantFiled: June 4, 2019Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Guillermo Romero Lopez, Andres Garagiola
-
Patent number: 11777993Abstract: Disclosed is a unified security system of cloud-based components configured for (a) packet-level and (b) protocol-level access control and traffic inspection, (c) threat detection and (d) activity contextualization. Packet-level inspects and classifies headers in requests or responses, sets a first restrictive state or passes the request or response. Protocol-level performs deep packet inspection for malicious signatures then sets a second state or passes. Threat detection, when the request or response is an HTTP/S stream, classifies as directed to a threat destination or not, then sets a third state or passes the request or response and activity contextualization, when the request is an HTTP/S stream seeking access to a cloud-based application, recognizes, processes and classifies content-containing activity as compromising or not, then sets a fourth state or passes.Type: GrantFiled: January 30, 2021Date of Patent: October 3, 2023Assignee: Netskope, Inc.Inventors: Kand Ly, Amit Ganesh Datar, Kartik Subbanna
-
Patent number: 11775647Abstract: This document relates to securing ownership of devices to particular users when the devices are shipped directly from an original equipment manufacturer in order to prevent malicious use of devices that are lost or stolen. A purchaser may purchase a device from an original equipment manufacturer, and as part of the purchasing process, may provide ownership information for the device, which may include a user identifier and an identity provider. The ownership data can be written to firmware, and upon powering on of the device, the device can request a user identifier, which is then validated by the identity provider before allowing operating systems operations to continue on the device.Type: GrantFiled: June 25, 2020Date of Patent: October 3, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Anni Dong, Yanan Zhang, Brian Stuart Perlman
-
Patent number: 11770380Abstract: A system for detecting and profiling endpoints of a computer network is provided. The system includes a first computing device including at least one processor in communication with at least one memory device. The first computing device is in communication with a computer network. The at least one memory device stores a plurality of instructions, which when executed by the at least one processor cause the at least one processor to receive a plurality of packets transmitted to the computer network, determine an identity of a first end point device associated with the plurality of packets, determine a behavior pattern for the first end point device based on the plurality of packets, and generate a synthetic profile for the first end point device based on the identity and the behavior pattern.Type: GrantFiled: September 12, 2022Date of Patent: September 26, 2023Assignee: Cable Television Laboratories, Inc.Inventors: Steven J. Goeringer, Darshak Thakore
-
Patent number: 11755713Abstract: A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.Type: GrantFiled: July 21, 2022Date of Patent: September 12, 2023Assignee: Argus Cyber Security Ltd.Inventors: Ofer Ben-Noon, Yaron Galula, Oron Lavi
-
Patent number: 11757899Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.Type: GrantFiled: January 19, 2021Date of Patent: September 12, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Shimi Ezra, Natan Kfir, Noam Ben-Yochanan
-
Patent number: 11747799Abstract: The present invention relates to the technical field of industrial networks and information security, and in particular to an industrial control system and a network security monitoring method therefor, for effectively monitoring the network security of an industrial control system. The method comprises: selecting at least one first data source related to an industrial control system and acquiring first data therefrom; counting time-varying features of the first data to serve as a behavior model for the industrial control system; acquiring second data from some or all of the at least one first data source; and determining whether the second data has the features described by the behavior model, and if so, determining that the industrial control system exhibits normal behavior, and if not, determining that the industrial control system exhibits abnormal behavior. In consideration of the certainty of the behavior of the industrial control system, a system behavior model is obtained by means of counting.Type: GrantFiled: May 31, 2017Date of Patent: September 5, 2023Assignee: Siemens AktiengesellschaftInventor: Wen Tang
-
Patent number: 11748157Abstract: A priority determination system includes: an anomaly obtainer that obtains anomaly data items each indicating anomaly in a corresponding one of moving bodies; a state obtainer that obtains state data items each indicating a state of a corresponding one of the moving bodies; a risk value calculator that calculates, for each of the anomaly data items, a risk value indicating a risk of the anomaly based on a state data item of the corresponding one of the moving bodies; a priority determiner that determines a priority of a task for dealing with the anomaly indicated by each of the anomaly data items, based on the risk value of the anomaly data item; and an outputter that provides output based on a result of the determination.Type: GrantFiled: August 31, 2022Date of Patent: September 5, 2023Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Shoichiro Sekiya, Yuishi Torisaki
-
Patent number: 11736488Abstract: A computer-implemented method for selectively monitoring devices may include (i) identifying a set of characteristics of a device-usage session of a device, (ii) calculating, based on the set of characteristics, a privacy score for the device-usage session, (iii) selecting, for the device, a device monitoring profile that is correlated with the privacy score and that defines an intensity level of monitoring actions to be performed on the device, and (iv) monitoring activity performed on the device during the device-usage session in accordance with the device monitoring profile that is correlated with the privacy score for the device-usage session. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 30, 2020Date of Patent: August 22, 2023Assignee: GEN DIGITAL INC.Inventors: Lei Gu, Chengi Kuo
-
Patent number: 11727131Abstract: In association with a communication platform, one or more users can create, share, edit, and/or comment on a document. Some examples of this disclosure are related to providing a list of suggested documents that a user can reference (e.g., add a link to) in a virtual space (e.g., in a message or post to one or more other users). For example, a user can be interacting with a virtual space (e.g., composing a direct message, a channel post, a thread, a workspace, a document, and the like) and invoke a list of suggested documents that can be referenced in the virtual space. In examples of the present disclosure, the list of suggested documents can include documents that are identified (e.g., based on one or more conditions being met) to be relevant to, or otherwise associated with, the virtual space.Type: GrantFiled: December 29, 2021Date of Patent: August 15, 2023Assignee: Salesforce, Inc.Inventors: Sohom Paul, Rohan Venapusala, Michael Brevoort, Scott Goodfriend
-
Patent number: 11729186Abstract: A computer security system comprises at least one authorized node constructed and arranged to execute a consensus protocol for validating and verifying a blockchain transaction and to extract at least one of a signature or feature of a detected cyberattack for the blockchain transaction and mining the transaction to a blockchain network; at least one unauthorized node prohibited from executing the consensus protocol and from validating and verifying a blockchain transaction but authorized to retrieve the at least one of the signature or feature from the blockchain network; and a special-purpose processor of the blockchain network that facilitates a distribution of the at least one of signature or feature for cooperative intrusion detection between the at least one authorized node and the at least one unauthorized node.Type: GrantFiled: October 3, 2019Date of Patent: August 15, 2023Assignee: Research Foundation of the City University of New YorkInventors: Oluwaseyi Ajayi, Tarek Saadawi, Obinna Igbe
-
Patent number: 11722488Abstract: Maintaining a database of a plurality of time series data sets, wherein each time series data set is associated to a previously known computer device of a computer network; detecting a connection request from a second computer device of the computer network; collecting one or more new data sets related to the second computer device; comparing the one or more new data sets with one or more time series data sets; calculating one or more value scores related to the plurality of time series data sets based on the comparison; and determining a device association score based on the calculated one or more value scores related to the plurality of time series data sets, wherein the device association score determines an association level between the previously known computer device and the second computer device of the computer network.Type: GrantFiled: July 29, 2020Date of Patent: August 8, 2023Assignee: Cujo LLCInventors: Victor Kuarsingh, Leonardas Marozas, Filip Savin, Jovaldas Januskevicius, Justinas Bisikirskas
-
Patent number: 11722509Abstract: This specification generally relates to methods and systems for applying network policies to devices based on their current access network. One example method includes identifying a proxy connection request sent from a particular client device to a proxy server over a network, the proxy connection request including a hostname and configured to direct the proxy server to establish communication with the computer identified by the hostname on behalf of the client device; determining an identity of the client device based on the proxy connection request; identifying a domain name system (DNS) response to a DNS request including the hostname from the proxy connection request; and updating DNS usage information for the particular client based on the identified DNS response including the hostname from the proxy connection request.Type: GrantFiled: September 15, 2022Date of Patent: August 8, 2023Assignee: iboss, Inc.Inventor: Paul Michael Martini
-
Patent number: 11722493Abstract: An access analysis system includes: a first analysis unit that analyzes validity of a user based on a characteristic of an operation of a terminal by the user regarding access via a network; a second analysis unit that based on communication regarding the access, analyzes normality of the communication; and a determination unit that determines validity of the access based on an analysis result from the first analysis unit and an analysis result from the second analysis unit, thereby improving the accuracy of determining the validity of access via the network.Type: GrantFiled: February 7, 2019Date of Patent: August 8, 2023Assignee: Nippon Telegraph and Telephone CorporationInventors: Yusuke Urata, Nobuya Shirai, Yoshiko Sueda
-
Patent number: 11711351Abstract: Hosts in a cluster in a virtualized computing environment bypass a management layer when communicating with an external key management service (KMS). One of the hosts is configured with KMS configuration information (including digital certificate information) that enables the host to directly communicate with the KMS via a secure communication connection, instead of communicating with the KMS via the management layer. This KMS configuration information is replicated in a distributed manner from the host to the other hosts in the cluster, thereby enabling the other hosts in the cluster to also directly and independently communicate with the KMS to obtain encryption keys to perform cryptographic operations.Type: GrantFiled: January 14, 2020Date of Patent: July 25, 2023Assignee: VMWARE, INC.Inventors: Georgi Lekov, Rusko Atanasov, Stanimir Lukanov, Elena Dimitrova, Dimo Raychev
-
Patent number: 11711371Abstract: Information is received from a first networked device for a first user and from a second networked device for a second user. The first user and the second user are verified and registered. A first set of data for the first user and a second set of data for the second user that each specify one or more network parameters per network address that communicates with each user are received from a networked collector device. Addresses are selected from each of the first set and the second set where each of the one or more network parameters are above a first activity threshold level for that parameter. A first set and a second set of first level activity addresses are produced. A whitelist is generated for the first user from an intersection of the first set of first level activity addresses and the second set of first level activity addresses.Type: GrantFiled: January 11, 2019Date of Patent: July 25, 2023Assignee: Sanctuary Networks LLCInventors: Brian Girardi, Philip Girardi
-
Patent number: 11706238Abstract: The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.Type: GrantFiled: August 24, 2020Date of Patent: July 18, 2023Assignee: Google LLCInventors: Christopher B. Key, Paul E. Holzberger, Jr.