Patents Examined by Sharon S Lynch
-
Patent number: 11968299Abstract: Certain aspects relate to encryption systems and methods for medical devices. A medical device can include a connectivity module for establishing a communication channel with a cloud system. After obtaining a test result, the device can generate an unencrypted data block comprising a device identifier and an encrypted data block comprising a serial number of the device and the test result using an encryption key associated with the device identifier. The device can securely send the test result to the cloud system by transmitting the unencrypted data block and the encrypted data block to the cloud system via the communication channel.Type: GrantFiled: November 28, 2022Date of Patent: April 23, 2024Assignee: BECTON, DICKINSON AND COMPANYInventors: Strett Roger Nicolson, Larry Greenspan, Michael Fenske, Paul Fieni, Mark Larsen
-
Patent number: 11968231Abstract: A processor may identify one or more predicted microservice chains for each of one or more user profiles. The one or more predicted microservice chains may be selected based on historical information. The one or more user profiles may each be associated with a respective user of a user device. The processor may analyze user specific information. The user specific information may be associated with the user device. The processor may determine, based on the user specific information, if the user device causes network intrusion. The processor may perform, based on the determination, an action for the user device.Type: GrantFiled: August 4, 2021Date of Patent: April 23, 2024Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
-
Patent number: 11934522Abstract: A system for detecting malicious operation of a building system includes a power characteristic input connected to a plurality of power characteristic sensors, a processor and a memory. The memory stores instructions for operating at least a physics model detection, a machine learning model detection and a combination module. The physics model detection includes multiple predefined expected power characteristics and is configured to detect an anomaly when at least one power characteristic received at the power characteristic input deviates from a corresponding predefined expected power characteristic of the predefined expected power characteristics. The machine learning model includes a machine learning system configured to learn a set of expected normal power characteristics and detect the anomaly when at least one power characteristic received at the power characteristic input deviates from the learned set of expected normal power characteristics.Type: GrantFiled: August 27, 2019Date of Patent: March 19, 2024Assignee: Carrier CorporationInventors: Devu Manikantan Shila, Lingyu Ren, Mahmoud El Chamie, Fragkiskos Koufogiannis
-
Patent number: 11921842Abstract: In an approach for multifactor authorization on hardware calls of resources, a processor receives a request for a hardware resource from a plurality of hardware resources being monitored. A processor calculates a risk level associated with the hardware resource of the request based on a respective risk level data repository. A processor, in response to a determination the risk level requires multifactor authorization, determines that a user associated with the request is logged in. A processor identifies a mechanism used by the user to log in. A processor determines whether a challenge associated with the multifactor authorization based on the mechanism is successful. A processor, in response to a determination the challenge associated with the multifactor authorization is successful, enables access to the hardware resource of the request.Type: GrantFiled: June 14, 2021Date of Patent: March 5, 2024Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista
-
Patent number: 11924228Abstract: A method includes enabling a messaging server and providing credentials for the messaging server. A computing system is enabled and a malware application is received by the computing system. The malware application is executed by the computing system. The credentials are rendered accessible to the malware application via the computing system, and the malware application is enabled to transmit the credentials via network transmission from the computing system to a computer. An actor is enabled to access the messaging server over a network in response to the actor applying the credentials, and a first electronic message transmitted by the actor is received by the messaging server, the first electronic message including first content.Type: GrantFiled: June 23, 2021Date of Patent: March 5, 2024Assignee: Avast Software s.r.o.Inventors: Jakub K{hacek over (r)}oustek, Luká{hacek over (s)} Zobal
-
Patent number: 11924327Abstract: Systems and methods of protecting data in a message for communication from a sender to a receiver, the sender and receiver sharing a secret including splitting the message into a number of ordered message blocks, the order being a proper order such that an aggregation of the blocks in the proper order constitutes the message; generating an encoded indication of a position of the block in the proper order of blocks, the encoding being reversible and based on at least a hash value for the block, a secret shared between the sender and the receiver, and a position of the block in the proper order; communicating the blocks and the encoded indications to the receiver, the blocks being communicated in an order different to the proper order so as to obfuscate the message, such that the blocks can be reassembled by the receiver in the proper order on the basis of the shared secret.Type: GrantFiled: December 18, 2019Date of Patent: March 5, 2024Assignee: British Telecommunications Public Limited CompanyInventors: Fadi El-Moussa, Fabio Giubilo
-
Patent number: 11916927Abstract: A system and method for accelerating a disposition of a digital dispute event includes routing a digital dispute event to one of a plurality of distinct machine learning-based dispute scoring models; computing, by the one of the plurality of distinct machine learning-based dispute scoring models, a preliminary machine learning-based dispute inference based on one or more features extracted from the digital dispute event, wherein the preliminary machine learning-based dispute inference relates to a probability of the subscriber prevailing against the digital dispute event based on each piece of evidence data of a service-proposed corpus of evidence data being available to include in a dispute response artifact; and generating the dispute response artifact based on the digital dispute event, wherein the generating includes installing one or more obtainable pieces of evidence data associated with the digital event into one or more distinct sections of the dispute response artifact.Type: GrantFiled: November 7, 2022Date of Patent: February 27, 2024Assignee: Sift Science, Inc.Inventors: Eric St. Pierre, Alex Forbess
-
Patent number: 11899822Abstract: A system for providing private, secure travel is provided. The system may include a transceiver. The transceiver may be operable to receive and transmit communication from and to a plurality of travelers and a plurality of service providers. The system may include an itinerary booking module. The itinerary booking module may process itinerary communications received from the plurality of travelers. The itinerary booking module may determine a plurality of legs included in each received itinerary. The itinerary booking module may book, via the transceiver, at least one service provider for each leg of each itinerary. The system may include a unique identifier generator. The unique identifier generator may generate a unique identifier for each of the plurality of travelers.Type: GrantFiled: July 21, 2020Date of Patent: February 13, 2024Assignee: Bank of America CorporationInventors: Vijaya L. Vemireddy, Kevin A. Delson
-
Patent number: 11893108Abstract: A method for accessing one or more service processes of service includes executing at least one service enclave and executing an enclave sandbox that wraps the at least one service enclave. The at least one service enclave provides an interface to the one or more service processes. The enclave sandbox is configured to establish an encrypted communication tunnel to the at least one service enclave interfacing with the one or more service processes, and communicate program calls to/from the one or more service processes as encrypted communications through the encrypted communication tunnel.Type: GrantFiled: December 31, 2022Date of Patent: February 6, 2024Assignee: Google LLCInventors: Nicolas Lidzborski, Jonathon Giffin
-
Patent number: 11886618Abstract: Systems and processes for improved processing of biometric data may include a hash controller including a processor, a server, and a registry. The hash controller can receive biometric information, such as a biometric scan, and apply an EGH transformation to convert the biometric information into an irreversible, unlinkable, and revocable EgHash. The EGH transformation can include blending biometric information with non-biometric information and permuting the biometric representation for additional security. The permuted biometric representation can be projected based on a randomly generated matrix and the output permuted to obtain an EgHash. The resultant EgHash can be lossy such that the EGH transform causes an irreversible loss of biometric information between the original biometric information and the EgHash. The EgHash can be compared and retrieved at speed and scale by the processor to support operations including, but not limited to, verification, identification, and database deduplication.Type: GrantFiled: March 23, 2022Date of Patent: January 30, 2024Assignee: T Stamp Inc.Inventors: Norman Hoon Thian Poh, Gareth Neville Genner
-
Patent number: 11861043Abstract: Systems and processes for improved processing of biometric data may include a hash controller including a processor, a server, and a registry. The hash controller can receive biometric information, such as a biometric scan, and apply an EGH transformation to convert the biometric information into an irreversible, unlinkable, and revocable EgHash. The EGH transformation can include blending biometric information with non-biometric information and permuting the biometric representation for additional security. The permuted biometric representation can be projected based on a randomly generated matrix and the output permuted to obtain an EgHash. The resultant EgHash can be lossy such that the EGH transform causes an irreversible loss of biometric information between the original biometric information and the EgHash. The EgHash can be compared and retrieved at speed and scale by the processor to support operations including, but not limited to, verification, identification, and database deduplication.Type: GrantFiled: March 23, 2022Date of Patent: January 2, 2024Assignee: T STAMP INC.Inventors: Norman Hoon Thian Poh, Gareth Neville Genner
-
Patent number: 11861346Abstract: A method for enhancing dialog systems is disclosed herein. The method comprises maintaining an online marketplace that may include a plurality of dialog system extension elements. Each of the plurality of dialog system extension elements may include at least one of a dialog system plugin, a dialog system add-on, a dialog system update, and a dialog system upgrade. The method may further include receiving a selection of one of the plurality of dialog system extension elements from a software developer. The software developer may be associated with a dialog system. The method may continue with associating the one of the plurality of dialog system extension elements with the dialog system of the software developer.Type: GrantFiled: April 26, 2021Date of Patent: January 2, 2024Assignee: GOOGLE LLCInventors: Ilya Gennadyevich Gelfenbeyn, Artem Goncharuk, Pavel Aleksandrovich Sirotin
-
Patent number: 11856014Abstract: Methods and systems are described herein for detecting anomalous access to system resources. An anomaly detection system may access system events from one or more computing devices and may generate entries from the system events. Each entry may include a corresponding timestamp indicating a time when a corresponding system event occurred, a corresponding user identifier indicating a user account within a computing environment associated with the corresponding system event, a corresponding location identifier indicating a location within the computing environment, and a corresponding action identifier indicating an action that the user account performed with respect to the location or an object within the computing environment. The generated entries may be aggregated and input into an anomaly detection model to obtain anomalous activity identified by the model.Type: GrantFiled: April 23, 2021Date of Patent: December 26, 2023Assignee: Capital One Services, LLCInventors: Sarvani Kare, Vannia Gonzalez Macias, Farshid Marbouti, Stephen Fletcher, Boshika Tara, Patrick Sofo, Urvish Patel
-
Patent number: 11855992Abstract: Service-to-service role mapping systems and methods are disclosed herein. An example role mapping service is positioned between a directory service and a search engine service, the directory service managing user information and permissions for users, the role mapping service mapping one or more search engine service roles to a user based on the user information and permissions received from the directory service.Type: GrantFiled: January 19, 2021Date of Patent: December 26, 2023Assignee: ELASTICSEARCH B.V.Inventor: Clinton Gormley
-
Patent number: 11849028Abstract: This disclosure relates generally to method and system for secure IoT device onboarding using a blockchain network. Internet of Things (IoT) device onboarding is a challenging problem as it needs to be securely connected to its actual final owner, with minimal manual intervention. Onboarding provides provisioning the IoT devices with credentials for accessing a network resource and assigning appropriate permissions. The present disclosure establishes a mutual authentication between at least one IoT device from the one or more IoT devices and a TIMS. Further, based on the verified authentication the TIMS enables the device to identify its current owner using a blockchain network. Further, the IoT device authenticating parameter is computed for authentication of the TIMS with at least one IoT device from the one or more IoT devices.Type: GrantFiled: November 17, 2021Date of Patent: December 19, 2023Inventors: Sumanta Sarkar, Habeeb Basha Syed, Vinayak Kumar Charaka
-
Patent number: 11809611Abstract: The present disclosure relates to devices and methods for protecting data from physical attacks. The devices and methods may establish an encryption protocol to encrypt data transmitted over a bus to one or more removable devices in communication with a computer device. The devices and methods may use the encryption protocol to communicate with the removal devices and perform storage requests at the removal devices. The devices and methods may also perform another layer of encryption on the data stored at the removal devices using a data at rest key stored on the removal devices.Type: GrantFiled: February 24, 2020Date of Patent: November 7, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Gerardo Diaz-Cuellar, Venkata Subrahmanyam Raman
-
Patent number: 11791978Abstract: Disclosed herein is a method of accessing a cache, the method comprising: mapping respective physical line addresses (PLAs) of a plurality of PLAs to respective cache locations of a plurality of cache locations in a cache, each PLA of the plurality of PLAs having an associated memory line; encrypting, with a block cipher using a first key, a first PLA of the plurality of PLAs to provide a first encrypted line address (ELA), the first ELA having an associated first encrypted cache location; upon receiving a request to access a first memory line associated with the first PLA, encrypting, using the first key, the first PLA into the first ELA to determine the associated first encrypted cache location; and accessing the first encrypted cache location. Also disclosed herein are systems for implementing the same.Type: GrantFiled: August 29, 2019Date of Patent: October 17, 2023Assignee: Georgia Tech Research CorporationInventor: Moinuddin Qureshi
-
Patent number: 11782714Abstract: A method comprises receiving a current instruction for metadata processing performed in a metadata processing domain that is isolated from a code execution domain including the current instruction. The method further comprises determining, by the metadata processing domain in connection with metadata for the current instruction, whether to allow execution of the current instruction in accordance with a set of one or more policies. The one or more policies may include a set of rules that enforces execution of a complete sequence of instructions in a specified order from a first instruction of the complete sequence to a last instruction of the complete sequence. The metadata processing may be implemented by a metadata processing hierarchy comprising a control module, a masking module, a hash module, a rule cache lookup module, and/or an output tag module.Type: GrantFiled: July 15, 2020Date of Patent: October 10, 2023Assignee: THE CHARLES STARK DRAPER LABORATORY, INC.Inventor: Andre′ DeHon
-
Patent number: 11770700Abstract: Various embodiments relate to a method and system for resuming a secure communication session with a server by a device, including: sending a message to the server requesting the resumption of a secure communication session; receiving from the server a server identifier, a server nonce, and a salt; determining that the device has a shared key with the server based upon the server identifier; determining that the received salt is valid; calculating a salted identifier based upon the shared key and the salt; sending the salted identifier to the server; and resuming the secure communication session with the server.Type: GrantFiled: June 28, 2022Date of Patent: September 26, 2023Assignee: NXP B.V.Inventors: Marcel Medwed, Stefan Lemsitzer
-
Patent number: 11770401Abstract: Computer-implemented methods are provided herein for quantifying correlated risk in a network of a plurality of assets having at least one dependency, where each asset belongs to at least one entity. The method includes generating a dependency graph based on relationships between the assets, at least one dependency, and at least one entity, and executing a plurality of Monte Carlo simulations over the dependency graph. Executing a plurality of Monte Carlo simulations includes generating a seed event in the dependency graph, where the seed event has a probability distribution, and propagating disruption through the dependency graph based on the seed event. The method further includes assessing loss for each of the assets, and aggregating losses for two or more assets to determine correlated risk in the network.Type: GrantFiled: February 19, 2021Date of Patent: September 26, 2023Assignee: BitSight Technologies, Inc.Inventors: Ethan Geil, Marc Light