Patents Examined by Trong H Nguyen
  • Patent number: 11720681
    Abstract: An example method of generating an execution profile of a firmware module comprises: receiving an execution trace of a firmware module comprising a plurality of executable instructions, wherein the execution trace comprises a plurality of execution trace records, wherein each execution trace record of the plurality of execution trace records indicates a successful execution of an executable instruction identified by a program counter (PC) value; retrieving a first execution trace record of the plurality of execution trace records, wherein the first execution trace record comprises a first PC value; identifying a first executable instruction referenced by the first PC value; identifying a firmware function containing the first executable instruction; incrementing a cycle count for the firmware function by a number of cycles associated with the first executable instruction; and generating, using the cycle count, an execution profile of the firmware module.
    Type: Grant
    Filed: October 2, 2020
    Date of Patent: August 8, 2023
    Assignee: Micron Technology, Inc.
    Inventors: Yun Li, Harini Komandur Elayavalli, Mark Ish
  • Patent number: 11714898
    Abstract: Embodiments provide automated security scanning of incoming images for use in creating containers such as a Virtual Machines. Based upon attribute(s) of metadata of the incoming image, a security engine chooses from amongst stored scripts for mounting and execution by installation logic. Such scripts can relate to the scanning itself, and/or pre-scanning considerations (such as scan frequency). In one example, the meta data attribute identifies a relevant Operating System (OS) of the incoming image. Other meta data attributes such as •scan frequency, •most recent passed scan, •log information, and •contact information (for issuance of a possible alert), may also be considered as part of the processing of an incoming image. Embodiments may enhance security by avoiding introduction of vulnerabilities through image instantiation. Embodiments may also impart flexibility to conserve resources by selectively scanning according to a frequency and/or date of last successful passage of the image.
    Type: Grant
    Filed: August 20, 2021
    Date of Patent: August 1, 2023
    Assignee: SAP SE
    Inventors: Andreas Meier, Thomas Grimmeisen
  • Patent number: 11709922
    Abstract: Data is received as part of an authentication procedure to identify a user. Such data characterizes a user-generated biometric sequence that is generated by the user interacting with at least one input device according to a desired biometric sequence. Thereafter, using the received data and at least one machine learning model trained using empirically derived historical data generated by a plurality of user-generated biometric sequences (e.g., historical user-generated biometric sequences according to the desired biometric sequence, etc.), the user is authenticated if an output of the at least one machine learning model is above a threshold. Data can be provided that characterizes the authenticating. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: July 25, 2023
    Assignee: Cylance Inc.
    Inventors: Garret Florian Grajek, Jeffrey Lo, Homer Valentine Strong, Wulun Dai
  • Patent number: 11700121
    Abstract: Techniques for securing access to protected resources are provided. In the method and apparatus, an access key and proof of successful completion of a first authentication is obtained in connection to a request. The proof of completion of the first authentication and the access key are verified. The access key is then used to generate a determination that information in the access key indicates that a second authentication was successfully completed prior to allowing the request to be fulfilled.
    Type: Grant
    Filed: September 13, 2019
    Date of Patent: July 11, 2023
    Assignee: Amazon Technologies, Inc.
    Inventor: Daniel Morgan Harris
  • Patent number: 11700244
    Abstract: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, receiving user request for the policy operation, determining one or more of a node, group, client, or user associated with the user request, determining the policies associated with the one or more of the node, group, client, or user based on priority, and evaluating at least one key attribute of an encryption key based, at least in part, on the policies.
    Type: Grant
    Filed: December 4, 2020
    Date of Patent: July 11, 2023
    Assignee: Fornetix LLC
    Inventors: Stephen Edwards, Gary C. Gardner, Charles White
  • Patent number: 11698995
    Abstract: An integrated-circuit device comprises a processor, a peripheral component, a bus system, connected to the processor and to the peripheral component, and configured to carry bus transactions; and hardware filter logic. The bus system is configured to carry security-state signals for distinguishing between secure and non-secure bus transactions. The peripheral component comprises a register interface, accessible over the bus system, and comprising a hardware register and a direct-memory-access (DMA) controller for initiating bus transactions on the bus system. The peripheral component supports a secure-in-and-non-secure-out state in which the hardware filter logic is configured to prevent non-secure bus transactions from accessing the hardware register of the peripheral component, but to allow secure bus transactions to access the peripheral component.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: July 11, 2023
    Assignee: Nordic Semiconductor ASA
    Inventors: Ronan Barzic, Berend Dekens, Frank Aune, Anders Nore
  • Patent number: 11687646
    Abstract: A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.
    Type: Grant
    Filed: August 14, 2020
    Date of Patent: June 27, 2023
    Assignee: Dellfer, Inc.
    Inventors: Brian H. Pescatore, James Blaisdell, Xonia Ivonne McLaughlin, Chetin Ersoy, Kenneth J. Wante
  • Patent number: 11689547
    Abstract: To detect information relating to the threat appropriately, based on an appearance tendency of information related to a threat in security. Information analysis system includes: an information storing unit that stores reference information acquired from an information source; and an information analysis unit that analyzes an appearance tendency of first phrase information that is included in the reference information acquired at chronologically different timings and that represents a phrase related to security and extracts reference information including the first phrase information the appearance tendency of which has changed from the information storing unit.
    Type: Grant
    Filed: December 13, 2016
    Date of Patent: June 27, 2023
    Assignee: NEC CORPORATION
    Inventor: Masaru Kawakita
  • Patent number: 11675910
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; converting the security related activity to entity behavior catalog data, the entity behavior catalog providing an inventory of entity behaviors; and, accessing an entity behavior catalog based upon the entity behavior catalog data; and performing a security operation via a security system, the security operation using the entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: June 13, 2023
    Assignee: Forcepoint LLC
    Inventors: Alan Ross, Raffael Marty, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
  • Patent number: 11675901
    Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; and instructions encoded within the memory to instruct the processor to: receive a client event report, the client event report including an operating system event trace for an attempt to exploit a patched vulnerability, and first feature data for a malware object that made the attempt; receive second feature data for an unknown object; compare the first feature data to the second feature data; and if the second feature data match the first feature data above a threshold, convict the unknown object as malware.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: June 13, 2023
    Assignee: McAfee, LLC
    Inventors: Amit Kumar, Prashanth Palasamudram Ramagopal, German Lancioni
  • Patent number: 11657145
    Abstract: A containerisation orchestrator (26) is controlled by an analysis system (20, 21, 22) which assesses an application and a device for compatibility to have a candidate application installed on the device using the orchestrator. The analysis includes an assessment of the vulnerability of the installed application to failure or malicious attack, and a risk assessment of the consequences of such an event. The candidate containerised configuration (20) for the application is also assessed for compatibilities and vulnerabilities.
    Type: Grant
    Filed: October 25, 2018
    Date of Patent: May 23, 2023
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Claudia Cristina, Simon Beddus, Fadi El-Moussa
  • Patent number: 11652646
    Abstract: Systems and methods for key management. An aspect of the disclosure provides for a key management system including an authenticating function, a key-management function, and at least one function. The system provides for separation of authentications and key-management functions. The authenticating function configured for receiving an authentication request associated with a terminal device (TD), authenticating the request, and sending an authentication response to the at least one function. The key-management function configured for receiving a key request associated with the TD, generating a key according to the key request, and sending the key to the at least one function. The at least one function configured for receiving a request for service, sending, to the authenticating function, the authentication request, and receiving, from the authenticating function, the authenticating response.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: May 16, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bidi Ying, Xu Li
  • Patent number: 11647389
    Abstract: According to one aspect disclosed herein, a provider device can receive, from a requester device, a network access request requesting, on behalf of the requester device, access to a Wi-Fi network associated with a network provider and provided, at least in part, by a network device. In response, the provider device can prompt the network provider to accept or deny the requester device access to the Wi-Fi network. The provider device can receive input indicating that the network provider accepts the network access request, and in response to the input, can create a network access package that includes a secure network access configuration to be utilized by the network device to establish, at least in part, a secure connection with the requester device to provide the requester device access to the Wi-Fi. The provider device can encrypt the network access package to create an encrypted network access package.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: May 9, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Roque Rios, III, Luis Ramos, James Gordon Beattie, Jr.
  • Patent number: 11636198
    Abstract: An electronic device for receiving and seamlessly providing cybersecurity analyzer updates and concurrent management systems for detecting cybersecurity threats including a processor and a memory communicatively coupled to the processor. The memory stores an analyzer logic to generate a first analyzer configured to receive a suspicious object for threat evaluation, an inspection logic to manage a first queue of suspicious objects for threat evaluation to the first analyzer, and an update logic to receive updated cybersecurity analytics content data. The analyzer logic receives updated cybersecurity analytics content data and can generate a second analyzer that incorporates at least a portion of the parsed updated cybersecurity analytics content data.
    Type: Grant
    Filed: February 20, 2020
    Date of Patent: April 25, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventors: Neeraj Kulkarni, Robert M. Beard, Jr., Robin Caron
  • Patent number: 11630915
    Abstract: Methods, systems, and devices for leveraging data already collected on a user in a secure and private manner, in particular to verify user credentials for third parties. The methods, systems, and devices innovate beyond traditional security and privacy platforms in computer systems by processing the data to create a useable metric for the purposes of the third parties, in which the useable metric preserves the security and privacy of the underlying data.
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: April 18, 2023
    Assignee: Capital One Services, LLC
    Inventors: Ya Liu, Matthew Carson
  • Patent number: 11621949
    Abstract: Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.
    Type: Grant
    Filed: September 2, 2022
    Date of Patent: April 4, 2023
    Assignee: Visa International Service Association
    Inventors: Quan Wang, Kelvan Howard, Jerry Wald
  • Patent number: 11616811
    Abstract: Phishing attacks attempt to solicit valuable information such as personal information, account credentials, and the like from human users by disguising a malicious request for information as a legitimate inquiry, typically in the form of an electronic mail or similar communication. By tracking a combination of outbound web traffic from an endpoint and inbound electronic mail traffic to the endpoint, improved detection of phishing attacks or similar efforts to wrongly obtain sensitive information can be achieved.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: March 28, 2023
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, Karl Ackerman, James Douglas Bean, Kenneth D. Ray, Daniel Stutz
  • Patent number: 11606376
    Abstract: CAN bus signal format inference includes: extracting candidate signals from training CAN bus message traffic; defining one or more signals, each signal being a candidate signal that matches structural characteristics of a matching data type and each signal being assigned the matching data type; and generating an inferred CAN bus protocol with which the defined one or more signals conform. Signals are extracted from CAN bus message traffic using the inferred CAN bus protocol, an anomaly in an extracted signal is detected, and an alert is generated indicating the detected anomaly. In another aspect, a transport protocol (TP) signal is extracted and analyzed to determine a fraction of the TP signal that matches opcodes of a machine language instruction set, and an anomaly is detected based at least in part on the determined fraction exceeding an opcode anomaly threshold.
    Type: Grant
    Filed: July 22, 2020
    Date of Patent: March 14, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Colin Wee, Ian LoVerde, Douglas A. Thornton
  • Patent number: 11606372
    Abstract: Techniques are disclosed for mitigating against malicious login attempts. In some examples, a computer system receives a plurality of login attempts to the system, the plurality of login attempts being originated from an Internet Protocol (IP) subnet. The computer system determines a ratio of successful login attempts to unsuccessful login attempts of the plurality of login attempts. Then, in response to determining that the ratio of a number of successful login attempts to total login attempts is below a predetermined threshold, the computer system denies a future login attempt to the system that is associated with the IP subnet for a first time period.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: March 14, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Brett C. Peppe
  • Patent number: 11593714
    Abstract: A computer system is provided. The computer system includes a memory, a network interface, and a processor coupled to the memory and the network interface. The processor is configured to receive a response to a request to verify whether an ostensible client of a service is actually a client or a bot, the response including an indicator of whether the ostensible client is a client or a bot; receive information descriptive of interoperations between the ostensible client and the service that are indicative of whether the ostensible client is a client or a bot; and train a plurality of machine learning classifiers using the information and the indicator to generate a next generation of the plurality of machine learning classifiers.
    Type: Grant
    Filed: June 19, 2020
    Date of Patent: February 28, 2023
    Assignee: Citrix Systems, Inc.
    Inventors: Aman Agrawal, Josephine Suganthi Joseph Leo, Kasirao Velugu, Praveen Dandin, Rama Rao Katta, Ratnesh Singh Thakur, Seth Kenneth Keith, Rakesh Thangellapalli