Patents Examined by Venkat Perungavoor
  • Patent number: 11968212
    Abstract: The present embodiments relate to implementing change data on no-master NoSQL data stores. An optimized node can be identified from a plurality of NoSQL data storage nodes and a specialized node can be connected (e.g., collocated) to the optimized node. The specialized node can maintain change data capture (CDC) data provided by client nodes in a hash map that can be used as a point of truth for coordinating CDC data across the plurality of NoSQL data storage nodes. The plurality of NoSQL data storage nodes can identify and coordinate all read/write data obtained from multiple client devices in a geographically separated large-scale (e.g., planet scale) system to identify change data in a distributed data store. The specialized data can provide read data to devices in the large-scale system to reconcile inconsistencies in change data across nodes in the large-scale system.
    Type: Grant
    Filed: October 5, 2022
    Date of Patent: April 23, 2024
    Assignee: Oracle International Corporation
    Inventors: Pratibha Anjali Dohare, Jaime Ismael Rangel Martinez, Kessle Martin Hodgson
  • Patent number: 11954194
    Abstract: Embodiments described herein disclose methods and systems for encryption and decryption of data. In some implementations, an encryption and decryption system can protect private information of a user in documents with an artificial reality device. The encryption and decryption system can determine the portion of a document containing private information and encrypt that portion of the document. In some implementations, the encryption and decryption system can receive a document and identify the protected (e.g., encrypted) portion of the document. In some cases, the protected portion of the document can contain a security token that the encryption and decryption system can extract. The system can compare the security token to an authentication token associated with the user and determine whether the security and authentication token match. If the tokens match, the system can decrypt the protected portion of the document and display the decrypted data as a virtual object.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: April 9, 2024
    Assignee: United Services Automobile Association (USAA)
    Inventor: Huihui Wu
  • Patent number: 11956232
    Abstract: A multi-tenant authentication system facilitates packaging and installing of integrations for authentication services of system tenants. The integrations include cloud resources of one or more cloud services. In order to package an integration, the multi-tenant authentication system retrieves resource manifests for cloud resources from corresponding cloud services. The multi-tenant authentication system generates the resource manifests to describe the cloud resource and any dependencies of the cloud resource, and also generates a package manifest including instructions for using the resource manifests to install the corresponding integration. The multi-tenant authentication system further facilitates installation of integration packages for tenants of the multi-tenant authentication system. The multi-tenant authentication system communicates with cloud services associated with resource manifests to install corresponding cloud resources to consistently replicate integrations for different tenants.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: April 9, 2024
    Inventor: Mohamed Elsherif
  • Patent number: 11956246
    Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
    Type: Grant
    Filed: November 16, 2022
    Date of Patent: April 9, 2024
    Assignee: LendingClub Bank, National Association
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Patent number: 11956211
    Abstract: Systems, devices, and methods are discussed for limiting exposure of internal network operations beyond the boundary of a secure network.
    Type: Grant
    Filed: September 1, 2021
    Date of Patent: April 9, 2024
    Assignee: Fortinet, Inc.
    Inventors: Weining Wu, Kunal Marwah, Jinhai Yang, Xu Zheng
  • Patent number: 11947696
    Abstract: A system can receive, from user input, request data indicative of a request to create a file with a first filename. The system can, based on the request data, determining a second filename for the file. The system can store an association between the first filename and the second filename. The system can create the file in a file system with the second filename.
    Type: Grant
    Filed: July 16, 2021
    Date of Patent: April 2, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventor: Barbara Ballard
  • Patent number: 11936640
    Abstract: Some embodiments provide a method for providing a resource to a particular virtual private cloud that is deployed in a set of datacenters that host multiple virtual private clouds. At a resource issuer, the method receives a resource request from a particular machine deployed in the particular virtual private cloud, the resource request including a first set of cloud-specific data. The method obtains a cloud identifier for the particular machine from a registry service of the particular virtual private cloud that interacts with a datacenter-set cloud service that deploys machines in the datacenter set for different virtual private clouds. The method uses the obtained cloud identifier to obtain a second set of cloud-specific data for the particular machine from the datacenter-set cloud service. Upon determining that the first and second sets of cloud-specific data match, the method authenticates the particular machine and issues the resource for the particular machine.
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: March 19, 2024
    Assignee: VMware LLC
    Inventors: Chen Dar, Aran Bergman, Alex Markuze, Israel Cidon, Eyal Zohar, Igor Golikov
  • Patent number: 11934549
    Abstract: One or more implementations of the present specification provide an invoice access method and apparatus based on a blockchain, and an electronic device. The method includes: generating first ciphertext data by encrypting plaintext data of the target invoice based on a first key corresponding to an invoice issuer; generating second ciphertext data by encrypting the plaintext data of the target invoice based on a second key corresponding to an invoice receiver; adding the first ciphertext data and an user identifier of the invoice issuer to the blockchain as related to one another; and adding the second ciphertext data and an user identifier of the invoice receiver to the blockchain as related to one another.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: March 19, 2024
    Assignee: Advance New Technologies Co., Ltd.
    Inventors: Hansong Xiao, Ping Zhang, Wenhu Kan, Qin Liu, Liangrong Lin, Fuxi Deng, Yixiang Zhang, Rui Chen, Jinming Duan
  • Patent number: 11928239
    Abstract: Disclosed herein are various embodiments for a sensitive data management system. An embodiment operates by receiving an HTTP request for an interface. A plurality of tiles, including both tiles associated with sensitive data and non-sensitive data, are identified for display on the interface. An access profile associated with providing access to the sensitive data is identified, the access profile including one or more requirements, associated with the HTTP request. Request information in the HTTP request corresponding to the one or more requirements of the access profile is identified. The identified request information is compared to the one more requirements of the access profile. A determination is made whether the identified request information satisfies the one more requirements of the access profile based on the comparing. At least one of: the second tile or the first tile and the second tile are provided for display on the interface based on the determination.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: March 12, 2024
    Assignee: SAP SE
    Inventors: Setu Saxena, Akhilesh Kumar
  • Patent number: 11930009
    Abstract: A method including receiving, at a processor, credential requests for accessing the VPN environment from a first user device using a first interface and from a second user device using a second interface; transmitting, to the first user device, a first credential based at least in part on the first user device using the first interface; and transmitting, to the second user device, a second credential based at least in part on the second user device using the second interface, the first credential being different from the second credential. Various other aspects are contemplated.
    Type: Grant
    Filed: October 17, 2021
    Date of Patent: March 12, 2024
    Assignee: Oversec, UAB
    Inventor: Kazimieras Celiesius
  • Patent number: 11893105
    Abstract: User system authentication includes a service infrastructure system receiving, from the user system, an authentication request including a user account identifier, generating a first validation code by performing a hash algorithm on the user account identifier and a first timestamp associated with the authentication request, sending to an email account associated with the user account identifier, an email message including the first validation code, receiving from the user system, a verification code, in response to receiving the verification code, generating a second timestamp, validating the second timestamp, in response to determining that the second timestamp is valid, generating a second validation code by performing the hash algorithm on the user account identifier and the first timestamp associated with the authentication request, comparing the verification code and the second validation code, and authenticating the user system, in response to a determination that the verification code and the second v
    Type: Grant
    Filed: June 8, 2022
    Date of Patent: February 6, 2024
    Assignee: Oversec, UAB
    Inventor: Kazimieras Celiesius
  • Patent number: 11893122
    Abstract: A system can include: a plurality of processing Cores; a Package Interconnect communicatively coupled with the plurality of processing Cores; a Configurable LFSR PRV Generator Hardware Array means communicatively coupled with the Package Interconnect; a Galois Multiplication Hardware Accelerator means communicatively coupled with the Package Interconnect; an Extended Euclidian Algorithm Hardware Accelerator means communicatively coupled with the Package Interconnect; and a Fischer-Yates Shuffle Algorithm Hardware Accelerator means communicatively coupled with the Package Interconnect.
    Type: Grant
    Filed: June 2, 2021
    Date of Patent: February 6, 2024
    Inventor: William David Schwaderer
  • Patent number: 11888831
    Abstract: An Internet Key Exchange protocol message indicating a first Internet Protocol Security traffic flow is to be established via a first device is obtained at the first device. The Internet Key Exchange protocol message is forwarded from the first device to a second device. An encryption key used to transmit traffic via the first Internet Protocol Security Traffic flow is received at the first device from a key value store. The key value store is populated with the encryption key in response to the second device obtaining the Internet Key Exchange protocol message. A first data packet to be transmitted via the first Internet Protocol Security traffic flow is obtained at the first device. The first device provides the first data packet encrypted with the encryption key of the first Internet Protocol Security traffic flow.
    Type: Grant
    Filed: October 21, 2021
    Date of Patent: January 30, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Andree Toonk, Grzegorz Boguslaw Duraj, Alvin Sai Weng Wong, Kyle Mestery
  • Patent number: 11886571
    Abstract: An entity may generate digital account credentials when a new account is approved for generation by an authorizing entity that controls or issues new accounts. A user may contact an authorizing entity to open a new account with the authorizing entity. The authorizing entity may authenticate the user and may approve a new account to be generated for the user. The user may wish to conduct transactions immediately upon approval. However, the authorizing entity may not immediately generate a physical identification device along with an actual account identifier associated with the new account. An intermediary entity may generate digital account credentials for the new account immediately after the authorizing entity approves generation of the new account, provide the digital account credentials to the account holder, and process transactions using the digital account credentials.
    Type: Grant
    Filed: August 24, 2021
    Date of Patent: January 30, 2024
    Assignee: Visa International Service Association
    Inventors: Shoon Ping Wong, Justin Monk
  • Patent number: 11876800
    Abstract: A device may determine that a first link of the device is active. The device may determine whether a Media Access Control Security (MACsec) session is established on the first link. The device may selectively enable or disable a second link of the device based on determining whether the MACsec session is established on the first link.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: January 16, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Nimit Gupta, Alfa Prakash Puhan, Manish Galrani
  • Patent number: 11861028
    Abstract: Devices, systems, and methods for storing and managing sensitive information in a connected environment are provided. The system comprises a master controller and a sensitive information storage device (“SIS device”). The SIS device has an island that can be activated by user interaction with the SIS device. In general, the island is deactivated by default and when the island is deactivated, sensitive information that is stored on the SIS device cannot be accessed. Only when the island is activated by user interaction can the stored sensitive information be accessed.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: January 2, 2024
    Assignee: ELSI INC
    Inventor: Jerry Elford Wolverton
  • Patent number: 11853433
    Abstract: Systems and methods for using an application control prioritization index are disclosed.
    Type: Grant
    Filed: August 16, 2021
    Date of Patent: December 26, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Angelo Murano, Linda Sue Nelson
  • Patent number: 11843631
    Abstract: An endpoint in an enterprise network is monitored, and when a potential trigger for a distributed denial of service (DDoS) attack is followed by an increase in network traffic from the endpoint to a high reputation network address, the endpoint is treated as a DDoS service bot and isolated from the network until remediation can be performed.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: December 12, 2023
    Assignee: Sophos Limited
    Inventors: Karl Ackerman, Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray
  • Patent number: 11838330
    Abstract: A system and method are described for information extraction from network traffic traces that are both encrypted and non-encrypted. The system includes a client computer and a remote computer, where the client computer communicates data over a network. The client computer sets a session key log file environment variable, such that when the client computer launches a supported browser, a session key log file (KLF) is created, computer network traffic traces are captured by retrieving data from encrypted traffic, and the KLF and captured traffic are periodically transferred to a remote server. A remote computer performs traffic mining to analyze the captured traffic traces and extract sensitive pieces of information.
    Type: Grant
    Filed: May 16, 2018
    Date of Patent: December 5, 2023
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Ahmad Amro, Sultan Ahmad Almuhammadi
  • Patent number: 11838292
    Abstract: In one embodiment, a method is provided. The method includes receive, by a networking device, a request from a first computing device, to connect to the networking device. The method also includes creating a first network. The first network is one of a set of networks of the networking device. The first computing device is one of a set of computing devices that are connected to the network device. Each network of the set of networks is initially isolated from other networks of the set of networks when the network is created. Each network of the set of networks comprises a respective computing device of the set of computing devices. The method further includes assigning the first computing device to the first network.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: December 5, 2023
    Assignee: MASTERPEACE SOLUTIONS LTD.
    Inventors: Andrew Samuel Cohen, Daniel Curtis Weller, Thomas Wasyl Martz, Kevin Michael Yeich, Raemar Antwarn Horne, Tyler James Bryant