Patents Examined by Shahriar Zarrineh
  • Patent number: 11394692
    Abstract: A novel method of providing virtual private access to a software defined data center (SDDC) is provided. The SDDC uses distributed VPN tunneling to allow external access to application services hosted in the SDDC. The SDDC includes host machines for providing computing and networking resources and a VPN gateway for providing external access to those resources. The host machines that host the VMs running the applications that VPN clients are interested in connecting performs the VPN encryption and decryption. The VPN gateway does not perform any encryption and decryption operations. The packet structure is such that the VPN gateway can read the IP address of the VM without decrypting the packet.
    Type: Grant
    Filed: February 9, 2020
    Date of Patent: July 19, 2022
    Assignee: NICIRA, INC.
    Inventors: Sandesh Sawant, Amit Chopra, Vinayak Shashikant Naik, Jayant Jain, Anirban Sengupta, Uday Masurekar
  • Patent number: 11392687
    Abstract: According to one embodiment, a system receives, at a runtime library executed within a trusted execution environment (TEE) of a host system, a request from an application to invoke a predetermined function to perform a predefined operation. In response to the request, the system identifies a kernel object associated with the predetermined function. The system verifies an executable image of the kernel object using a public key corresponding to a private key that was used to sign the executable image of the kernel object. In response to successfully the system verifies the executable image of the kernel object, transmitting the verified executable image of the kernel object to a data processing (DP) accelerator over a bus to be executed by the DP accelerator to perform the predefined operation.
    Type: Grant
    Filed: January 4, 2019
    Date of Patent: July 19, 2022
    Assignees: BAIDU USA LLC, BAIDU.COM TIMES TECHNOLOGY (BEIJING) CO., LTD., KUNLUNXIN TECHNOLOGY (BEIJING) COMPANY LIMITED
    Inventors: Yueqiang Cheng, Yong Liu, Tao Wei, Jian Ouyang
  • Patent number: 11381551
    Abstract: Systems and methods for connecting a private device to a public device based on various connection parameters. For example, a media guidance application may receive a communication requesting to use the public device from a private device that is implementing a private interface application (e.g., Netflix™ a streaming media application). In response, the media guidance application may generate an authorization key that is unique to the private device and comprises connection parameters. The media guidance application may transmit the authorization key to the private interface application to initiate a session between the public device and the private device. Whenever a command is received from the private device, the media guidance application may verify the authorization key and determine whether the connection parameters are satisfied. In response to verifying the authorization key and the connection parameters, the public device may execute the received command.
    Type: Grant
    Filed: July 14, 2020
    Date of Patent: July 5, 2022
    Assignee: Rovi Guides, Inc.
    Inventor: William L. Thomas
  • Patent number: 11372989
    Abstract: Systems and techniques for an automatic graph-based detection of unlikely file possession are described herein. In an example, a system for detecting unauthorized file possession is adapted to generate a networked computing environment graph for files and the devices which store the files. The detection system may be further adapted to identify a file in question and a device in question that is in possession of the file in question. The detection system may be further adapted to generate a set of connection paths from the device in question to the file in question based upon the edges of the graph. The detection system may be further adapted to determine the device in question should not have possession of the file in question based on a set of metrics derived from the connection paths. The detection system may be further adapted to generate an alert based on the determination.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: June 28, 2022
    Assignee: Code 42 Software, Inc.
    Inventor: Matthew Mills Parker
  • Patent number: 11356244
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product structured for continuous authentication and encryption. In some embodiments, the system is structured for receiving content from an entity system, displaying the content as masked content, and determining, using cognitive analysis, that a user wearing smart glasses is viewing a first portion of the masked content through the smart glasses, where the first portion of the masked content is associated with a first content hash. The system is also structured for identifying a first decryption key associated with the first content hash and determining a first cognitive hash. The system is also structured for receiving a first wearable hash from the smart glasses, comparing the first cognitive hash to the first wearable hash, and in response to the first cognitive hash matching the first wearable hash, transmitting the first decryption key to the smart glasses.
    Type: Grant
    Filed: June 5, 2020
    Date of Patent: June 7, 2022
    Assignee: BANK OF AMERICA CORPORATION
    Inventor: Vijay Kumar Yarabolu
  • Patent number: 11347895
    Abstract: A method of authenticated encryption and decryption includes generating a first digital signature with an encryption circuit of a first processor component. Concatenating the first digital signature to a plaintext message to generate a concatenated message. Encrypting the concatenated message into a ciphertext. Transmitting the ciphertext via a communications channel to a second processor component. Decrypting the ciphertext into a decrypted first digital signature and a decrypted plaintext message with a decryption circuit in the second processor component. Comparing, with the decryption circuit, the decrypted first digital signature with a second digital signature, thereby authenticating the decrypted plaintext message.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: May 31, 2022
    Assignee: Aptiv Technologies Limited
    Inventors: Ranjit V. Abhyankar, Madhurima Lekkala, Akhila P, Sriram Yarlagadda
  • Patent number: 11336663
    Abstract: A non-transitory recording medium on which an evaluating program related to a cyberattack is recorded, the evaluating program making a computer perform: collecting a plurality of pieces of cyberattack information; analyzing the collected plurality of pieces of cyberattack information; identifying an address of a cyberattack source included in the plurality of pieces of cyberattack information; determining an address group as a monitoring target of the cyberattack based on the identified address; calculating an evaluation value related to reliability of setting the address group as the monitoring target according to a state of detection of a cyberattack from an address included in the determined address group; and performing an output corresponding to the calculated evaluation value.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: May 17, 2022
    Assignee: FUJITSU LIMITED
    Inventor: Tsuyoshi Taniguchi
  • Patent number: 11334662
    Abstract: A method of enhancing travel security features associated with a mobile device is provided. The method may include operating a time clock to store a start device confiscation time in a memory and to store an end device confiscation time in the memory, monitoring the mobile device to detect tampering occurring between the start device confiscation time and the end device confiscation time, and in response to the detecting of tampering, prompting the user for a secure identifier. Upon receipt of the secure identifier, the method may include opening a secure i/o pathway to a re-image file. The secure i/o pathway preferably enables execution of an executable re-image file. The re-image file may be used to re-image a software image of the mobile device. The re-image file may contain a pre-tampered image of the mobile device.
    Type: Grant
    Filed: July 14, 2020
    Date of Patent: May 17, 2022
    Assignee: Bank of America Corporation
    Inventors: Vijaya L. Vemireddy, Brandon Sloane, Harvey Summers, Eileen D. Bridges
  • Patent number: 11328090
    Abstract: This disclosure relates to systems and methods for providing a client system access to confidential information of a person stored at a source system, the client system being configured to access the confidential information using a resource identifier, the client system and the source system comprising an encryption module for executing an encryption algorithm.
    Type: Grant
    Filed: July 25, 2018
    Date of Patent: May 10, 2022
    Assignee: Northend Systems B.V.
    Inventor: Guido Johannes van't Noordende
  • Patent number: 11310061
    Abstract: Methods and content consumption devices are disclosed that enable a revocation list to be securely enforced and managed, in terms of enforcing version control and providing granular control of individual capabilities, for example. Aspects also relate to enhanced enforcement control of content consumption control information more generally, for example by enforcing version control of activation messages, and/or granular management of individual capabilities.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: April 19, 2022
    Assignee: Nagravision S.A.
    Inventors: Jean-Bernard Fischer, Patrick Servet, Didier Hunacek
  • Patent number: 11275869
    Abstract: An operating method for a credit card, the method comprising: step S1, a microprocessor is powered on to perform system initialization; step S2, the microprocessor hibernates and is awakened when a preset interruption is detected so as to execute step S3; and step S3, the microprocessor executes preset interruption processing by entering a preset interruption processing flow, and exits the preset interruption processing flow when the preset interruption processing is finished, then returns to step S2. Alternatively, the method comprises: step s1, the microprocessor is powered on to perform system initialization; step s2, the microprocessor checks whether a preset interruption marker is set, and if so, the preset interruption marker is reset so as to execute the preset interruption processing, otherwise the microprocessor executes step s3; and step s3, the microprocessor hibernates, is awakened when detecting the preset interruption so as to set the preset interruption marker, and then returns to step s2.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: March 15, 2022
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11275866
    Abstract: Disclosed herein is an image processing method and an image processing system for deep learning. The image processing method includes converting image data including at least one figure image into a vector image by changing a data format, encrypting at least one first attribute value for a position of the figure image in the vector image according to a selected encryption scheme, constructing a de-identified image for the image data by using a second attribute value which is changed by the encryption, and transferring the de-identified image to a cloud server in which a deep learning model is managed and processing deep learning operations of the de-identified image by the cloud server.
    Type: Grant
    Filed: December 5, 2019
    Date of Patent: March 15, 2022
    Assignee: PUSAN NATIONAL UNIVERSITY INDUSTRY-UNIVERSITY COOPERATION FOUNDATION
    Inventors: Yoon Ho Choi, Dong-Hyun Ko, Seok-Hwan Choi, Jinmyeong Shin, Seon-Jin Hwang
  • Patent number: 11270008
    Abstract: A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. Facial recognition is applied to the submitted files. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: March 8, 2022
    Assignee: Dropbox, Inc.
    Inventors: Mindy Zhang, Pranav Piyush, Jan Senderek
  • Patent number: 11240045
    Abstract: Methods and systems for detecting and responding to fabricated or unauthorized events received by serverless computing environments are provided. In one embodiment the method is provided that includes receiving an event from an event source external to the serverless computing environment for execution by function. The method may then include creating a message that includes the events and signing the message with an identifier of the event source. The message may then be received at the function and the identifier of the event source may be validated. The event may then be executed with the function of the serverless computing environment if the identifier of the event sources successfully validated. However, if the identifier of the event source is not successfully validated, execution of the event with the function may be prevented.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: February 1, 2022
    Assignee: Red Hat, Inc.
    Inventors: Huamin Chen, Michael Hingston McLaughlin Bursell
  • Patent number: 11240006
    Abstract: The present disclosure includes apparatuses, methods, and systems for secure communication for a key replacement. An embodiment includes a processing resource, memory having a first operator's key, and a vehicular communication component. The vehicular communication component can be configured to provide, to a server, a public key generated along with a private key and decrypt, in response to receipt of a second operator's key (e.g., received in response to providing the public key to the server) encrypted using the public key, the second operator's key using the private key. The vehicular communication component can be configured to replace, in response to decrypting the encrypted second operator's key, the first operator's key with the second operator's key.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: February 1, 2022
    Assignee: Micron Technology, Inc.
    Inventors: Antonino Mondello, Alberto Troia
  • Patent number: 11232190
    Abstract: A method for providing an attestation for enabling a device to attest to an assertion concerning the device, comprising: generating an attestation identifier and a base-secret code corresponding to the attestation identifier; providing the attestation identifier and a validation-secret code to a validation apparatus for storage in conjunction with the assertion, wherein the validation-secret code is based on the base-secret code; providing the attestation identifier and a device-secret code to a manufacturer or adapter for provision to a device, wherein the device-secret code is based on the base-secret code.
    Type: Grant
    Filed: October 4, 2019
    Date of Patent: January 25, 2022
    Assignee: Trustonic Limited
    Inventor: Richard Hayton
  • Patent number: 11223624
    Abstract: A system and method for recursive propagating application access control relate to managing third-party application access to content files and folders on a cloud storage system. The access control system may receive an access authorization indication to grant a third-party entity access to a parent folder containing a first file, and then modify an access control rule associated with the parent folder based on the access authorization indication. The modified access control rule is propagated to a child folder of the parent folder, and thus the third-party entity is granted access to a second file in the child folder based on the modified access control rule. The second file shares a common attribute with the first file, 1 and the modified access control rule specifies the common attribute.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: January 11, 2022
    Assignee: Google LLC
    Inventors: Patrick Allen Higgins, Justin Lee Hicks, Thomas Palmer Buzbee, Michael Jeffrey Procopio
  • Patent number: 11218323
    Abstract: A method, system, backend, terminal, and computer program product are disclosed for producing a secure communication channel for a terminal, the method having the following method steps. A first method step for setting up a secure communication channel between a communication partner and a backend by a communication protocol. A second method step for producing a communication channel between the communication partner and the terminal. A third method step for transmitting the channel binding information. A fourth method step for storing the channel binding information on the terminal. A fifth method step for creating a data structure and a first digital signature across the data structure y. A sixth method step for sending the data structure and the digital signature from the backend to the terminal. A seventh method step for checking authenticity of the data structure.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: January 4, 2022
    Inventors: Steffen Fries, Marcus Schafheutle
  • Patent number: 11201737
    Abstract: Disclosed herein are systems and methods for generating tokens using SMPC compute engines. In one aspect, a method may hash, by a node, a data input with a salt value. The method may split, by the node, the hashed data input into a plurality of secret shares, wherein each respective secret share of the plurality of secret shares is assigned to a respective SMPC compute engine of a plurality of SMPC compute engines. The respective SMPC compute engines may be configured to collectively hash the respective secret share with a secret salt value, unknown to the plurality of SMPC compute engines. The respective SMPC compute engine may further receive a plurality of hashed secret shares from remaining SMPC compute engines of the plurality of SMPC compute engines, and generate a token, wherein the token is a combination of the hashed respective secret share and the plurality of hashed secret shares.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: December 14, 2021
    Assignee: ACRONIS INTERNATIONAL GMBH
    Inventors: Mark A. Will, Sanjeev Solanki, Kailash Sivanesan, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11201741
    Abstract: A system allows a user to store his personally identifiable information (PII) on a personal device. When a third party wants to access the user's PII (e.g., to update the PII or to retrieve the PII), a notification will be presented to the user on the personal device seeking consent to the access. The notification may inform the user as to what information is being requested and which entity is requesting the access. The requested access will be denied unless the user consents to the access. In this manner, the user is given control over the dissemination of his PII. Additionally, the system alters or adjusts the PII that is stored in third-party servers so that even if these servers are breached, the user's actual PII is not exposed.
    Type: Grant
    Filed: March 3, 2020
    Date of Patent: December 14, 2021
    Assignee: THE PRUDENTIAL INSURANCE COMPANY OF AMERICA
    Inventors: Venkatesh Sarvottamrao Apsingekar, Sahil Vinod Motadoo, Christopher John Schille, James Francis Lavine