Patents Examined by Thong P Truong
  • Patent number: 11663331
    Abstract: A computer-implemented method, a computer program product, and a computer system for creating malware domain sinkholes by domain clustering. The computer system clusters malware domains into domain clusters. The computer system collects domain metrics in the domain clusters. The computer system sorts clustered malware domains in the respective ones of the domain clusters, based on the domain metrics. The computer system selects, from the clustered malware domains in the respective ones of the domain clusters, a predetermined number of top domains as candidates of respective domain sinkholes, wherein the respective domain sinkholes are created for the respective ones of the domain clusters.
    Type: Grant
    Filed: February 10, 2020
    Date of Patent: May 30, 2023
    Assignee: International Business Machines Corporation
    Inventors: Cheng-Ta Lee, Bo-Yu Kuo, Gideon Zenz, Andrii Iesiev, Jacobus P. Lodewijkx
  • Patent number: 11652662
    Abstract: Systems, apparatuses, and methods to accelerate classification of malicious activity by an intrusion detection system are provided. An intrusion detection system can speculate on classification of labels in a random forest model based on temporary and incomplete set of features. Additionally, an intrusion detection system can classify malicious context based on a set of committed nodes in the random forest model.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: May 16, 2023
    Assignee: Intel Corporation
    Inventors: Marcio Juliato, Shabbir Ahmed, Qian Wang, Christopher Gutierrez, Vuk Lesi, Manoj Sastry
  • Patent number: 11637718
    Abstract: In a relay device, a transmitting/receiving unit of an ECU relay receives data. A first counter value is incremented if an amount of data received by the transmitting/receiving unit per unit time exceeds a first threshold. A second counter value is incremented if the amount of data received by the transmitting/receiving unit per unit time exceeds a second threshold. The second threshold is greater than the first threshold. A control unit of a bus relay repeatedly monitors the first counter value. If the first counter value is incremented, the control unit shortens a cycle with which the second counter value is monitored.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: April 25, 2023
    Assignees: AutoNetworks Technologies, Ltd., Sumitomo Wiring Systems, Ltd., Sumitomo Electric Industries, Ltd.
    Inventors: Hiroshi Tateishi, Hiroshi Ueda, Ryo Tanaka, Tetsuya Noda, Shogo Kamiguchi
  • Patent number: 11630893
    Abstract: The present invention relates to an improved method of providing identification of a user or authentication of a user's identity. More particularly, the present invention relates to an improved method of providing identification of a user or authentication of a user's identity using conditional behavioural biometrics. The present invention seeks to provide an enhanced method of authenticating and/or identifying a user identity using conditional behavioural biometrics.
    Type: Grant
    Filed: January 13, 2022
    Date of Patent: April 18, 2023
    Assignee: BIOCATCH LTD.
    Inventors: Alesis Novik, Andrius Sutas
  • Patent number: 11616771
    Abstract: Systems and methods are disclosed for accessing protected data. A computing device may have a secured stared storage accessible by two or more applications operating on the mobile device. The computing device may obtain a first token from an authorization service to verify user identity for a first application. The first token may be stored in the shared storage area, and be accessible to one or more applications sharing the storage space. In response to a user attempt to access a web service using a second application, the user identity may be verified using the first token. The authorization service may verify user credentials, and send a second token to the computing device. The second token may be a proxy ticket authorizing access and exchange of protected data between the second application and a web service. The second token may also be stored in the secure storage area.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: March 28, 2023
    Assignee: TRANSFORM SR BRANDS LLC
    Inventors: Eui Chung, Jen-Hao Yang, Bharath Sridharan, Jim Pier
  • Patent number: 11606366
    Abstract: In one embodiment, a sender node in a serial network identifies a message identifier for a packet to be sent by the sender node. The sender node selects a cyclical redundancy check (CRC) initialization vector associated with the message identifier. The sender node generates a CRC value for the packet, based on the selected initialization vector. The sender node sends the packet via the serial network. The sent packet includes the message identifier and the generated CRC value. In turn, a receiver node that receives the packet uses the generated CRC value to authenticate the sender node.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: March 14, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Yaron Sella, Kevin Holcomb, Raghuram S. Sudhaakar
  • Patent number: 11599638
    Abstract: A game engine sensor of a computing device executing an operating system receives first data from the operating system that represents occurrence of a monitored event. The game engine sensor sends second data corresponding to the monitored event to a game engine logic controller. A first logic block of the game engine logic controller determines, based on the second data and third data representing a system state of the computing device, that a first predicate condition is satisfied. A second logic block of the game engine logic controller determines, based on the second data and the third data, that a second predicate condition is satisfied. A computer security threat is detected based on the first and second predicate conditions being satisfied, and at least one game engine actuator is instructed to perform at least one action responsive to the computer security threat.
    Type: Grant
    Filed: August 6, 2019
    Date of Patent: March 7, 2023
    Assignee: JAMF Software, LLC
    Inventors: Jonathan Allan Malm, Joshua Howard Stein, Patrick Nathaniel Wardle
  • Patent number: 11599608
    Abstract: The embodiment of the disclosure provides an unlocking control method and related products. The method includes: acquiring an environmental parameter; acquiring first biometric information; determining a first biometric control parameter and second biometric control information corresponding to the environmental parameter; performing a first biometric recognition on the first biometric information according to the first biometric control parameter; when the first biometric information is recognized, acquiring second biometric information and performing a second biometric recognition on the second biometric information according to the second biometric control information; performing a next unlocking process when the second biometric information is recognized. Thus, control parameters of recognition processes can be set suitable for the environment, and recognition processes are controlled based on these control parameters, thereby improving the pass rate and the efficiency of the multi-biometric recognition.
    Type: Grant
    Filed: June 13, 2018
    Date of Patent: March 7, 2023
    Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Yibao Zhou, Haiping Zhang
  • Patent number: 11595422
    Abstract: A method for use in a network communication system including a plurality of electronic controllers that communicate with each other via a bus in accordance with a Controller Area Network (CAN) protocol determines whether or not content of a predetermined field in a frame which has started to be transmitted meets a predetermined condition indicating fraud. In a case where the content of the predetermined field meets the predetermined condition, a frame including predetermined consecutive dominant bits for notifying an anomaly is transmitted before an end of the frame is transmitted. A number of times the frame including the predetermined consecutive dominant bits is transmitted is recorded for each identifier (ID) represented by content of an ID field included in a plurality of frames which has been transmitted. A malicious electronic controller is determined in accordance with the number of times recorded for each ID.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: February 28, 2023
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yoshihiro Ujiie, Hideki Matsushima, Tomoyuki Haga, Manabu Maeda, Yuji Unagami, Takeshi Kishikawa
  • Patent number: 11575691
    Abstract: Systems, methods, and computer-readable storage media for improved data comparison, particularly when scanning large amounts of data for particular conditions or configurations. With respect to cyber-security, this improvement takes the form of receiving a plurality of threat conditions for cyber threats against a networked computer device; identifying commonalities among the plurality of threat conditions by comparing each threat condition in the plurality of threat conditions against the plurality of threat conditions; generating, based on the commonalities, a hierarchy for scanning of the cyber threats; and scanning for the cyber threats according to the hierarchy.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: February 7, 2023
    Assignee: TRINITY CYBER, LLC
    Inventors: Stephen Ryan, Stefan Baranoff, John Searles
  • Patent number: 11570189
    Abstract: A system for simultaneously testing whether a plurality of electronic devices connected via a communication network correctly handle exceptions. The system includes a communication network, and a plurality of electronic devices and a testing device connected via the communication network. The testing device includes an electronic processor. The electronic processor is configured to send a first status query message to the plurality of electronic devices, send fuzzed data to one or more of the plurality of electronic devices, and send a second status query message to the plurality of the electronic devices. The electronic processor is also configured to, for each electronic device that responds to the first status query message with a valid response and responds to the second status query message with an invalid response or fails to respond to the second status query message, record the electronic device in a failure log.
    Type: Grant
    Filed: December 6, 2019
    Date of Patent: January 31, 2023
    Assignee: Robert Bosch GmbH
    Inventors: John McShane, Timothy S. Arntson, Lena Jokanovic, Frederic W. Brosch, Norbert M. Fabritius
  • Patent number: 11546353
    Abstract: Methods, systems, and apparatus for a threat detection system. The threat detection system includes a threat forensics platform. The threat forensics platform includes a memory. The memory is configured to store a baseline model of controller area network (CAN) data. The threat forensics platform includes a processor coupled to the memory. The processor is configured to obtain CAN data including multiple messages. The processor is configured to compare the CAN data including the multiple messages with the baseline model. The processor is configured to determine a threat score for the CAN data based on the comparison and determine that there is a threat within the CAN data based on the threat score. The processor is configured to provide an indication that there is the threat to a driver of a vehicle or to a service provider.
    Type: Grant
    Filed: July 18, 2019
    Date of Patent: January 3, 2023
    Assignee: TOYOTA MOTOR NORTH AMERICA, INC.
    Inventors: Sachin J. Ahire, Ryan Wiesenberg
  • Patent number: 11522873
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting network attacks. One of the methods includes obtaining input data associated with a plurality of accounts associated with a particular entity; extracting features from the input data; performing unsupervised attack ring detection using the extracted features, wherein the unsupervised attack ring detection identifies suspicious clusters of accounts that have strong similarity or correlations in the high dimensional feature space; and generating an output for the detected attack rings.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: December 6, 2022
    Assignee: DataVisor, Inc.
    Inventors: Kuanyu Chu, Hongyu Cui, Arthur Meng, Zhong Wu, Yunfeng Xi, Yinglian Xie, Ting-Fang Yen, Fang Yu
  • Patent number: 11522878
    Abstract: Provided is a CAN communication based abnormal message detection method including obtaining reception times of reception messages; a reception filtering operation for performing a period calculation for comparing a difference between reception times of reception messages having the same message ID and a reference period of the corresponding message ID; an abnormal message detecting operation for determining the reception messages as abnormal messages when, as a result of the period calculation, the difference between the reception times is smaller than the reference period and determining the reception messages as normal messages when the difference between the reception times is greater than the reference period; and a blocking operation for blocking the abnormal messages.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: December 6, 2022
    Assignee: FESCARO CO., LTD.
    Inventors: Seok Min Hong, Hyun Jeong Lee
  • Patent number: 11514172
    Abstract: A method and system for security flow analysis of application code comprising: detecting data flows in a code base; and extracting an information flow, comprising determining a primary data flow by identifying a data flow that contains exposed data, and extending the primary data flow through descriptor data flows, wherein the descriptor data flows are associated with the set of data tracked by the primary data flow; wherein the information flow is a high level flow description that exposes the application code vulnerabilities based on the primary data flow and all associated descriptor data flows.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: November 29, 2022
    Assignee: Grabango Co.
    Inventors: Fabian Yamaguchi, Markus Lottmann, Niko Schmidt, Vlad A Ionescu, Chetan Conikee
  • Patent number: 11507643
    Abstract: At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: November 22, 2022
    Assignee: Intel Corporation
    Inventors: Malini K. Bhandaru, Kapil Sood, Christian Maciocco, Isaku Yamahata, Yunhong Jiang
  • Patent number: 11502998
    Abstract: Methods for provisioning and managing Internet-of-Things (IoT) devices over a network using device based tunneled nodes are provided. In one aspect, a method includes receiving, by a first network device in a network, data originated from an Internet-of-Things (IoT) device; identifying a device type of the IoT device by analyzing data packets of the received data; obtaining, by the first network device, a device profile for the IoT device, wherein the device profile is used for provisioning the IoT device to access the network; and provisioning the IoT device using the device profile, wherein the provisioning includes at least one of (1) identifying a tunneling attribute in the device profile; and (2) identifying a constrained application protocol (CoAP) parameter in the device profile, wherein the CoAP parameter is used to zero touch provision one or more device attributes of the IoT device. Systems and machine-readable media are also provided.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: November 15, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sivasankaran Nagarajan, Sudhir kumar Chimakurthy, Feroz Ahmed
  • Patent number: 11503045
    Abstract: A cyber-physical system may have monitoring nodes that generate a series of current monitoring node values over time that represent current operation of the system. A hierarchical abnormality localization computer platform accesses a multi-level hierarchy of elements, and elements in a first level of the hierarchy are associated with elements in at least one lower level of the hierarchy and at least some elements may be associated with monitoring nodes. The computer platform may then determine, based on feature vectors and a decision boundary, an abnormality status for a first element in the highest level of the hierarchy. If the abnormality status indicates an abnormality, the computer platform may determine an abnormality status for elements, associated with the first element, in at least one level of the hierarchy lower than the level of the first element. These determinations may be repeated until an abnormality is localized to a monitoring node.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: November 15, 2022
    Assignee: General Electric Company
    Inventors: Masoud Abbaszadeh, Walter Yund, Daniel Francis Holzhauer
  • Patent number: 11496493
    Abstract: Systems and methods for implementing dynamic graph analysis (DGA) to detect anomalous network traffic are provided. The method includes processing communications and profile data associated with multiple devices to determine dynamic graphs. The method includes generating features to model temporal behaviors of network traffic generated by the multiple devices based on the dynamic graphs. The method also includes formulating a list of prediction results for sources of the anomalous network traffic from the multiple devices based on the temporal behaviors.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: November 8, 2022
    Inventors: LuAn Tang, Jingchao Ni, Wei Cheng, Haifeng Chen, Dongjin Song, Bo Zong, Wenchao Yu
  • Patent number: 11496491
    Abstract: A fraud detecting method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network includes detecting whether a state of a vehicle satisfies a first condition or a second condition, and switching, upon detecting that the state of the vehicle satisfies the first condition or the second condition, an operation mode of a fraud-sensing electronic control unit connected to the network between a first mode in which a first type of detecting process for detecting a fraudulent message in the network is performed and a second mode in which the first type of detecting process is not performed.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: November 8, 2022
    Assignee: PANASONIC IN TEI IECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Manabu Maeda, Hideki Matsushima, Tomoyuki Haga, Yuji Unagami, Yoshihiro Ujiie, Takeshi Kishikawa