Patents Examined by Tri M Tran
-
Patent number: 11856022Abstract: The technology disclosed intercepts a webpage rendered by a server in response to a user action executed on a client. The technology disclosed analyzes one or more images of the webpage and determines that a particular hosted service is represented by the images. It analyzes one or more fields of the webpage and determines that the fields elicit confidential information. The technology disclosed intercepts a request generated by the client in response to another user action providing the confidential information via the fields. The technology disclosed analyses the request and determines that the confidential information is being exfiltrated to an unsanctioned resource. This determination is made by comparing a resource address in the request with one or more sanctioned resource addresses used by the particular hosted service. The technology disclosed determines that the webpage is effectuating a phishing attack and blocks transmission of the confidential information to the unsanctioned resource.Type: GrantFiled: January 25, 2021Date of Patent: December 26, 2023Assignee: Netskope, Inc.Inventor: Krishna Narayanaswamy
-
Patent number: 11824888Abstract: An apparatus and method for assessing security risk for digital resources are described. The apparatus includes at least a processor and a memory communicatively coupled to the at least a processor. The memory includes instructions configuring the at least a processor to receive digital resource data about a plurality of digital resources in a digital environment, calculate a resource significance score for each digital resource based on the digital resource data, determine at least one critical resource as a function of the resource significance score, and analyze a digital security risk associated with the at least one critical resource.Type: GrantFiled: December 1, 2022Date of Patent: November 21, 2023Assignee: Second Sight Data Discovery, Inc.Inventors: Reuben Vandeventer, David Imrem
-
Patent number: 11816218Abstract: Example methods are provided to use a guest monitoring mode (GMM) module in a hypervisor to monitor for attempts to maliciously modify operating system (OS) kernel objects in a virtualized computing environment. A created OS kernel object is migrated to a memory space where the GMM module can detect an attempt to modify the OS kernel object. The GMM module uses reference information to determine whether the modification is authorized by trusted OS kernel code or is being attempted by malicious code.Type: GrantFiled: July 26, 2020Date of Patent: November 14, 2023Assignee: VMWARE, INC.Inventors: Prasad Sharad Dabak, Leena Shuklendu Soman
-
Patent number: 11816248Abstract: A distributed database generates a cross reference table that cross references a first dataset from a first database account and a second dataset from a second database account. The distributed database receives a query directed to a combination of the first and second datasets, and generates an interim table in the first database account by applying the query to the cross reference table and the first dataset. The distributed database generates results data in the second database account by applying the query to the interim table and the second dataset, and stores the results data in the first database account.Type: GrantFiled: January 31, 2023Date of Patent: November 14, 2023Assignee: Snowflake Inc.Inventors: Rachel Frances Blum, Justin Langseth, Michael Earle Rainey
-
Patent number: 11816239Abstract: Techniques described herein can allow users to share cached results of an original query with other users while protecting sensitive information. The techniques described herein can check whether the other users have access to the underlying data queried before allowing those users to see the stored query results. That is, the system may perform privilege checks on the shared users before giving them access to the stored query results but without having to re-run the original query.Type: GrantFiled: October 21, 2022Date of Patent: November 14, 2023Assignee: Snowflake Inc.Inventors: Damien Carru, Thierry Cruanes, Subramanian Muralidhar, Nicola Dan Onose, Ryan Michael Thomas Shelly, Brian Smith, Jaeyun Noh
-
Patent number: 11809561Abstract: A system and method for identifying a compromised controller using an intentional error are provided. The method, performed by an electronic device in a controller area network (CAN), for identifying a compromised electronic control unit (ECU) that transmits an attack message on a CAN bus in a periodic transmission cycle. The method includes, in response to detecting the attack message, transitioning a first ECU among a plurality of ECUs connected to the CAN bus to a bus-off state intentionally, and determining whether the first ECU is the compromised ECU based at least in part on a time, which is predicted from recovery parameters related to the first ECU, for when the first ECU resumes transmission of a CAN message and a time when the attack message is redetected on the CAN bus.Type: GrantFiled: April 14, 2021Date of Patent: November 7, 2023Assignees: Hyundai Motor Company, Kia Corporation, Korea University Research and Business FoundationInventors: Dong Hoon Lee, Wonsuk Choi, Kyungho Joo, Seyoung Lee, Aram Cho
-
Patent number: 11811818Abstract: An apparatus and method for determining a risk associated with a cyber-attack are provided. The apparatus includes a processor and a memory communicatively coupled to the at least a processor. The memory contains instructions configuring the at least a processor to receive a cyber profile associated with a digital environment. The processor is further configured to receive risk assessment category data associated with the cyber profile and determine a digital environment risk record based on the risk assessment category data. In addition, the processor is configured to generate a user interface data structure configured to display the determined risk record.Type: GrantFiled: October 11, 2022Date of Patent: November 7, 2023Assignee: Second Sight Data Discovery, Inc.Inventors: Reuben Vandeventer, David Imrem
-
Patent number: 11809562Abstract: A method of detecting unauthorized code modification within a kernel of a computer system comprising performing a first measurement of the kernel in a kernel location, by a measurement tool executing on the computer system and storing the first measurement in a storage location. Initiating the measurement tool in response to a trigger event to perform a second measurement of the kernel. Comparing the second measurement, of the kernel, to a first measurement, of the kernel, by the measurement tool to determine a comparison value. Initiating a monitoring tool, executing on the computer system, in response to the comparison value exceeding a threshold value.Type: GrantFiled: June 29, 2021Date of Patent: November 7, 2023Assignee: T-Mobile Innovations LLCInventor: Lyle W. Paczkowski
-
Patent number: 11805098Abstract: A communication system (1) includes a terminal information acquisition unit configured to acquire version information of an OS of a terminal (10), a comparison unit configured to compare a version of the OS of the terminal (10) acquired by the terminal information acquisition unit with a latest version of the corresponding OS, and a setting unit configured to set, when the version of the OS of the terminal (10) is not the latest version, a path along which traffic of the terminal (10) passes through a security appliance (5), and set, when the version of the OS of the terminal (10) is the latest version, a path along which the traffic of the terminal (10) does not pass through the security appliance (5).Type: GrantFiled: August 9, 2019Date of Patent: October 31, 2023Assignee: Nippon Telegraph and Telephone CorporationInventors: Shinya Kawano, Hiroaki Sato, Hideo Tsuchiya, Akihiro Okada
-
Patent number: 11803639Abstract: Examples disclosed herein relate to integrity monitoring of a computing system using a kernel that can update its own code. Trust of state information is verified. Kernel code and module code are loaded into memory that is accessible to a device separate from a processor that loads the kernel code and module code. A measurement module is verified and loaded into memory. The state information can correspond to multiple symbols. The measurement module can measure the state information corresponding to each of the respective symbols to generate a set of initial measurements. The set of initial measurements can be provided to a device for integrity monitoring. The device is to compare a current measurement with an initial measurement to determine if a potential violation occurred. The device is to use a representation of a jump table to determine whether the potential violation is a violation.Type: GrantFiled: April 16, 2021Date of Patent: October 31, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Geoffrey Ndu, Theofrastos Koulouris, Nigel Edwards
-
Patent number: 11805151Abstract: Embodiments of the present disclosure provide a first set of methods, computer-readable media, and system configured for: receiving a configuration for a domain name system (DNS) to log all queries; publishing a customized sender policy framework (SPF) policy to the DNS, the customized SPF policy comprising a macro-endowed mechanism; logging a plurality of received SPF customized queries; accessing a log comprising the plurality of received SPF customized queries; extracting data from each of the received SPF customized queries, the data being populated by the macro mechanism associated with the SPF customized query; populating a datastore with extracted data comprising at least one of the following: a username, a IP address, and a domain, as extracted from each received SPF customized query; and providing, based on the extracted data, an indication of outbound emails sent from the domain. In various embodiments, email authorizations and restrictions may be based thereon.Type: GrantFiled: August 28, 2020Date of Patent: October 31, 2023Assignee: Fraudmarc Inc.Inventors: Keith Wayne Coleman, Richard Duncan
-
Patent number: 11797676Abstract: An anti-malware application can emulate a suspicious program in a sandbox environment and retrieve any exception handlers the suspicious program attempts to register with the operation system. When the suspicious program triggers an exception, the anti-malware application can save a current context of the suspicious program being emulated. To emulate the handling of the exception, the anti-malware application can validate an exception handler chain including one or more exception handlers added by the suspicious program. The anti-malware application can then select and emulate an exception handler based on the saved context of the suspicious program at the time the exception was triggered. If the first exception handler is successful at resolving the exception, the anti-malware application can then save an updated post-exception context and continue emulation of the suspicious program based on the result of the first exception handler.Type: GrantFiled: August 25, 2021Date of Patent: October 24, 2023Assignee: Malwarebytes Inc.Inventor: Jason Neal Raber
-
Patent number: 11785016Abstract: In representative embodiments, a digital assistant is extended by service activities. A service activity executes as a service as part of the digital assistant. A service activity specifies a set of user data to be provided when invoked, at least one insight used to invoke the service activity in a proactive way and at least one intent used to invoke the service activity in a reactive way, and executable code that is executed when the service activity is invoked. A development environment provides templates to ease development of service activities. Service activities in development can be deployed alongside production services with access to service activities in development restricted to a set of authorized users.Type: GrantFiled: January 12, 2021Date of Patent: October 10, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Ajoy Nandi, Zain Aziz
-
Patent number: 11757938Abstract: A system, method and computer-readable medium for data protection simulation and optimization in a computer network, including grouping data stored in data stores in the computer network into groupings according to an architectural or a conceptual attributes, storing, current values of risk metrics for each grouping, each of the metrics corresponding to sensitive domains, receiving a risk reduction goal corresponding to at least one risk metric in the risk metrics, the at least one risk metric corresponding to at least one sensitive domain in the sensitive domains, determining a simulated value of the at least one risk metric for each grouping in the groupings by simulating application of a protection mechanism to sensitive data in each corresponding data store, the sensitive data corresponding to the at least one sensitive domain, and ranking the groupings based on the at least one simulated value of the at least one risk metric for each grouping.Type: GrantFiled: June 25, 2020Date of Patent: September 12, 2023Assignee: Informatica LLCInventors: Gregorio Convertino, Tianyi Li, Gary Patterson, Ranjeet Kumar Tayi, Shima Kazerooni
-
Patent number: 11748480Abstract: Anomalous control and data flow paths in a program are determined by machine learning the program's normal control flow paths and data flow paths. A subset of those paths also may be determined to involve sensitive data and/or computation. Learning involves collecting events as the program executes, and associating those event with metadata related to the flows. This information is used to train the system about normal paths versus anomalous paths, and sensitive paths versus non-sensitive paths. Training leads to development of a baseline “provenance” graph, which is evaluated to determine “sensitive” control or data flows in the “normal” operation. This process is enhanced by analyzing log data collected during runtime execution of the program against a policy to assign confidence values to the control and data flows. Using these confidence values, anomalous edges and/or paths with respect to the policy are identified to generate a “program execution” provenance graph associated with the policy.Type: GrantFiled: December 22, 2020Date of Patent: September 5, 2023Assignee: Arkose Labs Holdings, Inc.Inventors: Suresh Chari, Ashish Kundu, Ian Michael Molloy, Dimitrios Pendarakis
-
Management of recipient credentials leveraging private keys on keystores read by provisioned devices
Patent number: 11736290Abstract: The disclosed technology teaches a method for managing user access to one of a set of decentralized networked nodes that share a private permissioned blockchain data structure or a decentralized personal ledger, to which access has been limited to users authorized by one of the set of decentralized networked nodes.Type: GrantFiled: November 7, 2022Date of Patent: August 22, 2023Assignee: LedgerDomain Inc.Inventors: Victor Bovee Dods, Benjamin James Taylor, Benjamin Gregory Nichols -
Patent number: 11716324Abstract: Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request comprising authentication credentials and a first location from a first location-aware device; receiving a second location from a second location-aware device associated with the authentication credentials; and upon determining that the first location and second location are within a pre-determined distance, authenticating the authentication credentials.Type: GrantFiled: November 3, 2020Date of Patent: August 1, 2023Assignee: Verizon Patent and Licensing Inc.Inventor: El-Amine M. Raounak
-
Patent number: 11716195Abstract: The present application describes a method, system, and non-transitory computer-readable medium for exchanging encrypted communications using hybrid encryption. According to the present disclosure, a first device receives an encrypted communication from a second device. The encrypted communication includes a first encrypted secret, a second encrypted secret, a first signature, and a second signature. The first device verifies the first signature and the second signature, and, when the first and second signatures are valid, decrypts the first encrypted secret using a first encryption algorithm and the second encrypted secret using a second encryption algorithm. The first device combines the first decrypted secret and the second decrypted secret to recover a first communication and provides the first communication to a user of the first device.Type: GrantFiled: October 22, 2020Date of Patent: August 1, 2023Assignee: Amazon Technologies, Inc.Inventor: Joël Alwen
-
Patent number: 11709920Abstract: A facility management system comprises a server, a biometric identification unit, and a processing circuit. The server is configured to store a list of registered users, and biometric information and access rights pertaining to each registered users. The biometric identification unit is associated with the building equipment. The biometric identification unit is enabled to facilitate a user desiring access to the associated building equipment to scan at least one biometric parameter, and subsequent to scanning of the biometric parameter the biometric identification unit is configured to generate a scanned biometric information.Type: GrantFiled: April 22, 2020Date of Patent: July 25, 2023Assignee: Johnson Controls Tyco IP Holdings LLPInventors: Leyla Mousavi, Scott G. Ambelang
-
Patent number: 11706240Abstract: Techniques for providing dynamic resource implementation prioritization for a network are provided. In one embodiment, a method includes determining a user of a selected device and assigning a user value based on the user's identity. The method includes determining related devices on the network by evaluating user behavior information to identify devices in the network that are in communication with the selected device. The method includes calculating a composite device value based on a value of the selected device, the user value, and values of the related devices. The method includes determining a probability factor for potential security vulnerabilities affecting the selected device and calculating a risk score based on the composite device value and the probability factor. Security measures may be implemented based on a comparison of the calculated risk score for the selected device with a plurality of risk scores for other devices in the network.Type: GrantFiled: October 12, 2020Date of Patent: July 18, 2023Assignee: CISCO TECHNOLOGY, INC.Inventor: Travis Sugarbaker