Patents Examined by Sharif E Ullah
  • Patent number: 11736280
    Abstract: A quantum entity authentication apparatus and method. The quantum entity authentication apparatus includes a quantum state preparation unit for preparing an authentication quantum state that is generated based on an authentication key previously shared with an entity, a quantum channel verification unit for transmitting a quantum state, generated by performing an operation using a prestored unique operator on the authentication quantum state, to a quantum measurement device, and for verifying security of a quantum channel by using a result of Bell measurement and the authentication quantum state, the result of Bell measurement being revealed by the quantum measurement device for the quantum state, and a quantum entity authentication unit for, when the security of the quantum channel is verified, authenticating the entity using the result of the Bell measurement and the unique operator.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: August 22, 2023
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Changho Hong, Nayoung Kim, Osung Kwon, Younchang Jeong, Se Wan Ji, Eun Ji Kim, Seok Kim, Jingak Jang, Daesung Kwon
  • Patent number: 11727265
    Abstract: Methods, apparatus, systems and articles of manufacture to provide machine programmed creative support to a user are disclosed. An example apparatus include an artificial intelligence architecture to be trained based on previous inputs of the user; a processor to: implement a first machine learning model based on the trained artificial intelligence architecture; and predict a first action based on a current state of a computer program using the first machine learning model; implement a second machine learning model based on the trained artificial intelligence architecture; and predict a second action based on the current state of the computer program using the second machine learning model; and a controller to select a state based on the action that results in a state that is more divergent from the current state of the computer program.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: August 15, 2023
    Assignee: Intel Corporation
    Inventors: Ignacio Javier Alvarez, Javier Felip Leon, David Israel Gonzalez Aguirre, Javier Sebastian Turek, Luis Carlos Maria Remis, Justin Gottschlich
  • Patent number: 11727829
    Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data, a set of data attributes about the data, and a risk profile data structure indicative of a vulnerability of the data in a PQC data environment. The example method further includes retrieving PQC cryptographic performance information associated with a set of PQC cryptographic techniques. The PQC cryptographic performance information may comprise a set of PQC cryptographic performance attributes for a plurality of PQC cryptographic techniques in the set of PQC cryptographic techniques. The example method further includes selecting a PQC encryption algorithm for encrypting the data based on the set of data attributes, the risk profile data structure, the PQC cryptographic performance information, and a PQC optimization machine learning model. Subsequently, the example method includes encrypting the data based on the selected PQC encryption algorithm.
    Type: Grant
    Filed: March 29, 2022
    Date of Patent: August 15, 2023
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Pierre Arbajian, Adam Sanders, Andrew J. Garner, Michael Erik Meinholz, Ramesh Yarlagadda, Ramanathan Ramanathan, Abhijit Rao, Bradford A. Shea
  • Patent number: 11714908
    Abstract: Techniques and architectures for representing data with one or more n-dimensional representations and/or using one or more models to identify malware are described herein. For example, the techniques and architectures may determine one or more coordinates for one or more points based on one or more sets of bits in the data and generate an n-dimensional representation for the data based on the one or more points. The techniques and architectures may evaluate the n-dimensional representation with one or more machine-trained models to detect malware.
    Type: Grant
    Filed: October 12, 2020
    Date of Patent: August 1, 2023
    Assignee: Quantum Star Technologies Inc.
    Inventor: Garrett Thomas Oetken
  • Patent number: 11706233
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). NMCs may determine requests provided to a server based on a first portion of network traffic. NMCs may determine suspicious requests based on characteristics of the provided requests. NMCs may employ the characteristics of the suspicious requests to provide correlation information that is associated with the suspicious requests. NMCs may determine dependent actions associated with the server based on a second portion of the network traffic and the correlation information. And, in response to determining anomalous activity associated with the evaluation of the dependent actions, NMCs may provide reports associated with the anomalous activity.
    Type: Grant
    Filed: March 26, 2021
    Date of Patent: July 18, 2023
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jesse Abraham Rothstein, Xue Jun Wu, Michael Kerber Krause Montague, Kevin Michael Seguin
  • Patent number: 11681790
    Abstract: A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user regarding the user's identity, which is then electronically authenticated. Upon authentication, personal information regarding the verified identity of the user is retrieved from a source database which is used to verify the identity of the user, via user interaction. Upon successful verification and authentication, biometric data regarding the user is electronically collected.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: June 20, 2023
    Assignee: ALCLEAR, LLC
    Inventors: Kenneth Cornick, Caryn Seidman-Becker
  • Patent number: 11681803
    Abstract: Systems and methods for malware detection using multiple neural networks are provided.
    Type: Grant
    Filed: September 30, 2020
    Date of Patent: June 20, 2023
    Assignee: Fortinet, Inc.
    Inventor: Xu Yang
  • Patent number: 11671252
    Abstract: In one embodiment, a system including a tangible token comprising a single integrated transparent gemstone produced by fusing together a first transparent gemstone and a second transparent gemstone, a first internal side of the first transparent gemstone is etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, the first internal side of the first transparent gemstone is aligned with a second internal side of the second transparent gemstone, and the aligning encapsulates the information within a perimeter of the second internal side such that the information does not extend beyond the perimeter. The system includes a computing device that executes instructions to: read the information, validate, via a network and the address, the public key and private key are associated with the blockchain, and present an indication of whether or not the information is validated.
    Type: Grant
    Filed: July 12, 2022
    Date of Patent: June 6, 2023
    Assignee: EllansaLabs Inc.
    Inventor: Omar Besim Hakim
  • Patent number: 11664986
    Abstract: In one embodiment, a system including a tangible token comprising a single integrated transparent gemstone produced by fusing together a first transparent gemstone and a second transparent gemstone, a first internal side of the first transparent gemstone is etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, the first internal side of the first transparent gemstone is aligned with a second internal side of the second transparent gemstone, and the aligning encapsulates the information within a perimeter of the second internal side such that the information does not extend beyond the perimeter. The system includes a computing device that executes instructions to: read the information, validate, via a network and the address, the public key and private key are associated with the blockchain, and present an indication of whether or not the information is validated.
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: May 30, 2023
    Assignee: EllansaLabs Inc.
    Inventor: Omar Besim Hakim
  • Patent number: 11657162
    Abstract: In one example an apparatus comprises a memory and a processor to create, from a first deep neural network (DNN) model, a first plurality of DNN models, generate a first set of adversarial examples that are misclassified by the first plurality of deep neural network (DNN) models, determine a first set of activation path differentials between the first plurality of adversarial examples, generate, from the first set of activation path differentials, at least one composite adversarial example which incorporates at least one intersecting critical path that is shared between at least two adversarial examples in the first set of adversarial examples, and use the at least one composite adversarial example to generate a set of inputs for a subsequent training iteration of the DNN model. Other examples may be described.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: May 23, 2023
    Assignee: INTEL CORPORATION
    Inventors: Michael Kounavis, Antonios Papadimitriou, Anindya Sankar Paul, Micah Sheller, Li Chen, Cory Cornelius, Brandon Edwards
  • Patent number: 11641283
    Abstract: A method of transferring access to a digital asset is disclosed. The method comprises receiving a first blockchain transaction (4) from a first participant (6) by each of a plurality of second participants (8), (10). The first participant (6) has a first private key of a first private-public key pair of a cryptography system, and each participant (6), (8), (10) has a respective first share of a second private key of a second private-public key pair of the cryptography system, and the first blockchain transaction is signed with the first private key. Signature of the first blockchain transaction with the first private key is verified by each second participant (8), (10). A respective first share is applied to the first blockchain transaction to generate a respective second share of a second blockchain transaction signed with the second private key.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: May 2, 2023
    Assignee: nChain Licensing AG
    Inventors: John Fletcher, Thomas Trevethan
  • Patent number: 11637816
    Abstract: A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods. The system and methods may be employed in virtually any system or network, and may be used to protect virtually any type of data, whether at rest (data storage), in motion (data transfer), or in use. In some embodiments, synchronization points are used as analogs for encryption/decryption keys, enabling the encrypting system and decrypting system to begin randomly altering encryption data in a like-manner, thereby creating a constantly changing encryption field that is virtually impossible to decrypt without authorization.
    Type: Grant
    Filed: July 19, 2021
    Date of Patent: April 25, 2023
    Assignee: Cyphyx, LLC
    Inventors: Charles C. Sammet, Alan Mintzer
  • Patent number: 11636182
    Abstract: There is provided a method for use by a playback system to play back encrypted content associated with a first globally unique identifier (ID). The method includes storing an encrypted content in a memory being under control of a memory controller having a second globally unique ID, storing the first globally unique ID, transmitting a request from the memory controller to a license server, the request comprising the first globally unique ID, the second globally unique ID and a request for a content license to play back the encrypted content, receiving the content license enabling a right for the playback of the encrypted content, the content license including content keys and being encrypted to be decryptable according to a memory controller secret associated with the second globally unique ID, decrypting the content license, according to the memory controller secret to recover the content keys to a playback module.
    Type: Grant
    Filed: July 9, 2021
    Date of Patent: April 25, 2023
    Assignee: Disney Enterprises, Inc.
    Inventors: Hanno Basse, Ian E. Harvey
  • Patent number: 11637865
    Abstract: The present disclosure provides a registration method by a developer's management system in a security management system managing a Network Security Function (NSF) through a registration interface.
    Type: Grant
    Filed: June 12, 2020
    Date of Patent: April 25, 2023
    Assignee: Research & Business Foundation Sungkyunkwan University
    Inventors: Jaehoon Jeong, Sangwon Hyun, Taekyun Roh, Sarang Wi
  • Patent number: 11632309
    Abstract: In one embodiment, a service receives administration traffic data in a network associated with a remote administration session in which a control device remotely administers a client device. The service analyzes the administration traffic data to determine whether any portion of the administration traffic data is resulting from an administration session involving a trusted administrator. The service flags a first portion of the administration traffic data as authorized when the first portion of the administration traffic data is determined to result from an administration session involving a trusted administrator, and a second portion of the administration traffic data is non-flagged. The service assesses the second portion of the administration traffic data using a machine learning-based traffic classifier to determine whether the second portion of the administration traffic data is malicious.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: April 18, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Martin Rehak, Blake Harrell Anderson, Sunil Amin
  • Patent number: 11618394
    Abstract: An example apparatus comprises a processing resource coupled to a memory resource. The processing resource may be configured to execute instructions stored on the memory resource to generate a first secure key including a private key stored by a vehicle, generate a first secure message including the first secure key, transmit the first secure message over a vehicle bus to a vehicle part associated with the vehicle, and receive, from the vehicle part, a second secure message including at least one of a vehicle identification number (VIN) and a configuration parameter corresponding to the vehicle part in response to a determination that the first secure key matches a secure key corresponding to the vehicle part.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: April 4, 2023
    Assignee: Micron Technology, Inc.
    Inventors: Alberto Troia, Antonino Mondello
  • Patent number: 11621976
    Abstract: A method for detecting malware software in a computer system includes accessing a plurality of hostnames for a malware server from a computer system infected with malware and attempting to communicate with the malware server, each hostname including a plurality of symbols in each of a plurality of symbol positions; training an autoencoder based on each of the plurality of hostnames, wherein the autoencoder includes: a set of input units for each possible symbol and symbol position in a hostname; output units each for storing an output of the autoencoder; and a set of hidden units smaller in number than the set of input units and each interconnecting all input and all output units with weighted interconnections, such that the autoencoder is trainable to provide an approximated reconstruction of values of the input units at the output units; selecting a set of one or more symbol and symbol position tuples based on weights of interconnections in the trained autoencoder; and identifying infected computer systems
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: April 4, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, George Kallos
  • Patent number: 11611588
    Abstract: One or more computer processors intercept one or more network inputs entering or existing an internal network; synthesize one or more network input images from a random noise vector sampled from a normal distribution of textually embedded network inputs utilizing a trained generative adversarial network; classify one or more synthesized network input images by identifying contained objects utilizing a trained convolutional neural network with rectified linear units, wherein the objects include patterns, sequences, trends, and signatures; predict a security profile of the one or more classified network input images and associated one or more network inputs, wherein the security profiles includes a set of rules and associated mitigation actions, analogous historical network traffic, a probability of infection, a probability of signature match with historical malicious network inputs, and a harm factor; apply one or more mitigation actions based on the predicted security profile.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: March 21, 2023
    Assignee: KYNDRYL, INC.
    Inventor: Karthick Vasu
  • Patent number: 11606338
    Abstract: Systems and methods for providing policy-controlled communication over the Internet are provided. A system may include a client endpoint function configured to execute on a client device while coupled to a first VPN tunnel, a service endpoint function that operates a remote service of a plurality of remote services, a gateway server including a first VPN termination point that authenticates and terminates the first VPN tunnel, a stitcher server including a second VPN termination point that authenticates and terminates a second VPN tunnel, and a mid-link server coupled to the first VPN tunnel and the second VPN tunnel. The mid-link server may include a plurality of Access Resource Servers (ARSs), and the gateway server and the stitcher server may communicate via a network connecting the plurality of ARSs.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: March 14, 2023
    Assignee: Netskope, Inc.
    Inventors: Kevin Eugene Sapp, Victor Ronin, David Goldschlag, Vadim Tarnavsky
  • Patent number: 11599650
    Abstract: A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: March 7, 2023
    Assignee: CUPP Computing AS
    Inventor: Omar Nathaniel Ely