Patents Examined by Syed A Zaidi
  • Patent number: 11516223
    Abstract: Technologies are described for authenticating a sender identity of an online message. For example, an online message having a purported sender identity can be obtained. Various features can then be extracted from the message, including stylometric features, origin location features, attached file features for any files attached to the message, and embedded URL features. The extracted features can then be compared to a sender profile for a known sender identity matching the purported sender identity, or to one or more sender profiles for recognized suspicious senders if the purported sender identity does not match a known sender identity. The sender profile for a given sender identity can include features extracted from one or more messages previously sent by the sender identity. A global risk score for the message indicating a likelihood that the purported sender identity is inauthentic can be determined based at least in part upon the comparison.
    Type: Grant
    Filed: August 20, 2020
    Date of Patent: November 29, 2022
    Assignee: UVic Industry Partnerships Inc.
    Inventors: Issa Traore, Marcelo Luiz Brocardo
  • Patent number: 11501015
    Abstract: A secure machine learning system of a database system can be implemented to use secure shared data to train a machine learning model. To manage the model, a first user of the database can share data in an encrypted view with a second user of the database, and further share one or more functions of an application that accesses the data while the data is encrypted. The second user can access functions of the application and can call the functions to generate a trained machine learning model and further generate machine learning outputs (e.g., predictions) from the trained model.
    Type: Grant
    Filed: December 16, 2021
    Date of Patent: November 15, 2022
    Assignee: Snowflake Inc.
    Inventors: Monica J. Holboke, Justin Langseth, Stuart Ozer, William L. Stratton, Jr.
  • Patent number: 11501017
    Abstract: In a computer system (1), generated (S2) is a visual code which encodes reference information for identifying a data object linked to a person. Using a camera of a mobile communication device (2), the reference information encoded in the visual code is captured from a visual representation of the visual code and stored (S5) in the mobile communication device (2). In the mobile communication device (2), generated (S8) is a data package which includes the captured reference information and an image (23) of a document (4) of the person. The data package is transferred (S9) from the mobile communication device (2) to the computer system (1). In the computer system (1), the image of the document (4) is stored (S11) linked to the data object (10), defined by the reference information received in the data package.
    Type: Grant
    Filed: March 13, 2018
    Date of Patent: November 15, 2022
    Assignee: RINGLER INFORMATIK AG
    Inventor: Marcel Ringler
  • Patent number: 11494484
    Abstract: The disclosed embodiments disclose techniques for leveraging instrumentation capabilities to enable monitoring services. During operation, an operating system kernel is instrumented to associate a sub-program with a target operation. Upon receiving a request from an application to perform the target operation, the operating system kernel executes the sub-program with kernel privileges in the process context of the application. The sub-program analyzes the memory space associated with the application to extract a desired data value. This extracted data value is returned to at least one of a specified target process or target location.
    Type: Grant
    Filed: February 19, 2020
    Date of Patent: November 8, 2022
    Assignee: Nubeva, Inc.
    Inventors: Greig W. Bannister, Randy Yen-pang Chou
  • Patent number: 11487896
    Abstract: The present disclosure describes techniques that facilitate a Secure Data Processing (SDP) Network that is configured isolating sensitive data from exposure to a client workstation and a connected web server and application server. Specifically, a secure communications server of the SDP network is described that can interact with a secure input device or a secure plug-in component at the client workstation to receive a set of data associated with the sensitive data. The set of data may correspond to devalued data received via a secure input device or the set of data may be received as sensitive data via a hosted webpage invoked by the secure communications server. The secure communications server may establish a secure communications path with a tokenization server for receipt of a token that represents the sensitive data. The token may then be used by at least the application server to initiate the transaction.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: November 1, 2022
    Assignee: Bright Lion, Inc.
    Inventors: Lawrence B. Lebel, Brian D. Tawney
  • Patent number: 11481505
    Abstract: A cloud computing platform, a method of operating a cloud computing platform, and a private business entity network are provided herein. In one embodiment, the cloud computing platform includes: (1) a consolidated data reservoir configured to store saved data collected by a business entity, (2) an application layer having an infrastructure for developing and running applications, including at least one customer application of a customer of the business entity, and (3) a service layer configured to control access of the customer application to the saved data and allow the customer application to execute proprietary algorithms of the business entity.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: October 25, 2022
    Assignee: Halliburton Energy Services, Inc.
    Inventor: Nathan P. Leach
  • Patent number: 11475158
    Abstract: Disclosed is a method of building a customized deep learning (DL) stack classifier to detect organization sensitive data in images, referred to as image-borne organization sensitive documents, and protecting against loss of the image-borne organization sensitive documents, including distributing a trained feature map extractor stack with stored parameters to an organization, under the organization's control, configured to allow the organization to extract from image-borne organization sensitive documents, feature maps that are used to generate updated DL stacks, without the organization forwarding images of organization-sensitive training examples, and to save non invertible feature maps derived from the images, and ground truth labels for the image.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: October 18, 2022
    Assignee: Netskope, Inc.
    Inventors: Yi Zhang, Dong Guo, Yihua Liao, Siying Yang, Krishna Narayanaswamy
  • Patent number: 11470084
    Abstract: A method and system for performing query analysis are described. The method and system include receiving a query for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the query and is data agnostic. The method and system also include providing the query from the dispatcher to the data source and to the service as well as analyzing the query using the service.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: October 11, 2022
    Assignee: Cyral Inc.
    Inventors: Manav Ratan Mital, Srinivas Nageswarrao Vadlamani, Pramod Chandraiah
  • Patent number: 11463404
    Abstract: Embodiments disclosed herein provide systems and methods for quarantining communications at a network edge by routing traffic through a specialized network edge system. In a particular embodiment a method provides, identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system. The method further provides receiving first information about first network traffic received at a first network edge system for a communication network. In response to determining, based on the first information, that the first network traffic satisfies the criteria, the method provides routing the first network traffic through the specialized network edge system.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: October 4, 2022
    Assignee: Avaya Inc.
    Inventors: Joel M. Ezell, Manish Chatterjee, Biswajyoti Pal
  • Patent number: 11456879
    Abstract: Provided is a method for secure processing of an authorization verification request from a unit requesting authorization verification, the authorization verification request being included in a transaction of a block chain, wherein a registration entity performs a check on a block chain data structure and on the transaction protected by the block chain and, in the event of a successful check, forwards the authorization verification request to a certification entity. The authorization verification request is included in a transaction and the registration entity performs a check on a block chain data structure and on the transaction. The transaction and the authorization verification request are protected by the block chain. In particular, the authorization verification request can no longer be altered retrospectively and information that has been transmitted to the registration entity within the context of the authorization verification request is stored in the block chain and protected against manipulation.
    Type: Grant
    Filed: July 4, 2017
    Date of Patent: September 27, 2022
    Inventor: Rainer Falk
  • Patent number: 11455385
    Abstract: Authentication tokens, systems, and methods are described. An illustrative method is disclosed to include receiving an electronic file including a digital image, receiving biometric information that is associated with a person, modifying the electronic file with the biometric information such that one or more pixels in the digital image are replaced with the biometric information, and storing the modified electronic file as a digital authentication token to be used in connection with authorized publications of original digital work.
    Type: Grant
    Filed: December 20, 2021
    Date of Patent: September 27, 2022
    Assignees: Nant Holdings IP, LLC, ImmunityBio, Inc.
    Inventors: Luna Witchey, John Zachary Sanborn, Patrick Soon-Shiong, Nicholas James Witchey
  • Patent number: 11442789
    Abstract: A method and a system for securely applying proprietary software functions of software sources to proprietary data of a population of users are disclosed. The proprietary data of a user is not exposed to software sources, and the proprietary software of a software source is not accessible to users. A collaboration software module, placed in at least one cloud, is configured to establish, and continually update, a data structure holding task permissions from grantors to grantees, a grantor being a software source or a user, and a grantee is also a software source or a user. The collaboration software module of a cloud applies software function of a software source, communicatively coupled to the cloud, to proprietary data of an originating user, communicatively coupled to the same cloud, to produce a requisite result which is only accessible to the originating user or any grantees of the originating user (the grantor).
    Type: Grant
    Filed: September 9, 2021
    Date of Patent: September 13, 2022
    Assignee: AFFINIO INC.
    Inventor: Stephen James Frederic Hankinson
  • Patent number: 11436323
    Abstract: During operation, the system obtains a training dataset during a training mode, wherein the training dataset includes counts of actions performed by users while operating applications in the computer system. Next, the system uses the training dataset to produce corresponding per-action datasets. The system then cleanses the training dataset based on counts of actions in the per-action datasets to produce a cleansed training dataset, and uses the cleansed training dataset to produce corresponding per-user datasets. Next, the system trains per-user models based on the per-user datasets to detect anomalous actions of users. The system then obtains a surveillance dataset during a surveillance mode, wherein the surveillance dataset includes counts of actions performed by users while operating applications in the computer system. Next, the system uses the trained per-user models to detect anomalous actions in the surveillance dataset. Finally, when an anomalous action is detected, the system triggers an alert.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: September 6, 2022
    Assignee: Oracle International Corporation
    Inventors: Aleksey M. Urmanov, Alan Paul Wood
  • Patent number: 11436599
    Abstract: Implementations of the present specification provide a blockchain-based identity verification method and related hardware. The method includes: An agent client generates an identity verification request based on identity verification input information of a business platform, the identity verification input information indicating an identity verification parameter for identity verification and an identity verification platform that executes the identity verification. The agent client sends the identity verification request to the identity verification platform. The identity verification platform performs identity verification on the identity verification parameter to obtain a result of the identity verification. The identity verification platform submits a transaction including a verifiable credential of a result of the identity verification to a blockchain.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: September 6, 2022
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yawen Wei, Peng Qiu, Yin Dong, Yang Liu, Xiaobo Zhang, Pei Xu, Zhiwei Wang
  • Patent number: 11429744
    Abstract: An information management device includes a memory and a processor configured to receive an access request to information related to individual, the access request including designation of a first data table including first information related to the individual and a second data table including second information related to the individual, perform, in accordance with whether the first data table and the second data table include a same key, determination of whether the individual is identified based on a combination of the first information and the second information to be included in a response to the access request, and perform a stop of output of the response when it is determined that the individual is identified based on the combination.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: August 30, 2022
    Assignee: FUJITSU LIMITED
    Inventor: Kazuhiro Taniguchi
  • Patent number: 11431740
    Abstract: Embodiments include a computing device with a memory and a processor configured to perform operations including computing a cybersecurity and privacy (CS&P) framework profile (or risk factor) for a cybersecurity program implemented by an enterprise, computing a CS&P maturity level (or maturity factor) for the cybersecurity program, determining an integrated result for the cybersecurity program based at least in part on a combination of the CS&P framework profile and the maturity factor.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: August 30, 2022
    Assignee: Criterion Systems, Inc.
    Inventors: Robert Carl Heckman, Daniel Keith Chandler
  • Patent number: 11431747
    Abstract: A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence. In some implementations, some or all messages (email, text messages, VoIP calls) in a campaign after the first simulated phishing email, text message, or call may be used to direct the user to open the first simulated phishing email or text message, or to open the latest simulated phishing email or text message. In some implementations, simulated phishing emails, text messages, or phone calls of a campaign may be intended to lure the user to perform a different requested action, such as selecting a hyperlink in an email or text message, or returning a voice call.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: August 30, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
  • Patent number: 11425157
    Abstract: A method, apparatus, and system provide the ability to act on cyber risks and reduce cyber attacks. System characteristics and system information for a cyber system are gathered. The system characteristics and system information are pre-processed to identify vulnerabilities that are relevant to the cyber system. A system model of a cyber environment is generated for the cyber system. One or more features are converted from cyber threat reports to one or more semantically relevant queries over the system model. The system model is reasoned over to generate one or more answers relevant to the one or more semantically relevant queries. Attack models are executed over the system model to generate actionable intelligence and reduce cyber attacks.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: August 23, 2022
    Assignee: CALIFORNIA INSTITUTE OF TECHNOLOGY
    Inventors: Kymie Tan, Jeremy L. Pecharich, Arun A. Viswanathan, Marc I. Pomerantz, Deniz E. Celik, Bryan Johnson, Brian Wright
  • Patent number: 11425560
    Abstract: A communication system for a working machine includes a communication device disposed on the working machine, and a mobile terminal to be connected to the communication device. The communication device transmits a service universal unique identifier (UUID) to the mobile terminal. The mobile terminal transmits unique information to the communication device. The communication device issues connection request to the mobile terminal after receiving the unique information. The mobile terminal requests transmission of authentication information after issuing the connection request, the authentication information being used for paring. The communication device transmits the authentication information to the mobile terminal in response to the request. And, the mobile terminal judges whether the paring is established based on the authentication information, and executes a program based on the service universal unique identifier (UUID) when the paring is established.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: August 23, 2022
    Assignee: KUBOTA CORPORATION
    Inventors: Ryosuke Kinugawa, Keisuke Egashira, Keisuke Miura
  • Patent number: 11409903
    Abstract: Method, system and product for performing private and non-private tasks in Augmented Reality (AR) systems. A privacy policy of a user using an AR device is obtained. A frame sensor is utilized to obtain frames for processing. An overlay display for the frame is generated. The overlay display is generated based on an execution of a non-private task on a non-trusted device and based on an execution of a private task on a trusted device. The private task and the non-private task are determined based on the privacy policy. The overlay display is displayed by an AR device.
    Type: Grant
    Filed: October 10, 2019
    Date of Patent: August 9, 2022
    Assignee: SHMUEL UR INNOVATION LTD
    Inventors: Ziv Glazberg, Shmuel Ur