Patents Examined by Victor Lesniewski
-
Patent number: 11973863Abstract: A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.Type: GrantFiled: February 24, 2021Date of Patent: April 30, 2024Assignee: Network-1 Technologies, Inc.Inventor: John A. Nix
-
Patent number: 11966494Abstract: Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.Type: GrantFiled: November 24, 2021Date of Patent: April 23, 2024Assignee: GOOGLE LLCInventors: Sandro Feuz, Sammy El Ghazzal
-
Patent number: 11960592Abstract: Methods, systems, and apparatuses are described herein for improving the security of personal information by preventing attempts at gleaning personal information from authentication questions. A computing device may receive a request for access to an account associated with a user. The request may comprise candidate authentication information. Based on comparing the candidate authentication information with the account data, the computing device may generate a synthetic authentication question. The synthetic authentication question may be generated as if the candidate authentication information is valid. A response to the synthetic authentication question may be received, and the request for access to the account may be denied.Type: GrantFiled: June 29, 2021Date of Patent: April 16, 2024Assignee: Capital One Services, LLCInventors: Tyler Maiman, Viraj Chaudhary, Samuel Rapowitz, Daniel Miller, David Septimus, Joshua Edwards
-
Patent number: 11930364Abstract: A method, apparatus, and system are provided for verifying a location of data stored on at least one storage device within at least one cell area served by at least one network node of a wireless communication network. In one embodiment, a location assurance gateway is provided with a communication interface and processing circuitry, the processing circuitry configured to cause the communication interface to communicate with the at least one network node of the wireless communication network for location information associated with the at least one cell area, the location information associated with the at least one cell area being used to verify a location of the data stored on the at least one storage device.Type: GrantFiled: February 5, 2018Date of Patent: March 12, 2024Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventor: Bate Jellema
-
Patent number: 11907366Abstract: The technology disclosed teaches incident-driven and user-targeted data loss prevention that includes a CASB controlling infiltration via cloud-based services storing documents in use by organization users, by monitoring manipulation of the documents. The CASB identifies the cloud-based services that the particular user has access to and at least one document location on the cloud-based services to inspect for sensitive documents, in response to receiving an indication that user credentials have been compromised. The CASB performs deep inspection of documents identified as stored at the location and detects at least some sensitive documents. Based on the detected sensitive documents, the CASB determines an exposure for the organization due to the particular user.Type: GrantFiled: July 22, 2022Date of Patent: February 20, 2024Assignee: Netskope, Inc.Inventor: Krishna Narayanaswamy
-
Patent number: 11902329Abstract: A system for managing security on a cloud management platform portal (CMPP (1)), the system comprising a set of routines (scripts) which are executed on a computing device or processor allowing the cloud management platform portal to contact a cloud automation service (CAS (4)) so as to provision services to a customer, and a ServiceNow (2) (SNOW) application comprising at least one of a set of routines comprising at least one of certain specified network Standard Service Requests and/or network activity Standard Service Requests.Type: GrantFiled: December 16, 2020Date of Patent: February 13, 2024Assignee: AGARIK SASInventors: Konrad Clapa, Olena Zhuk
-
Patent number: 11895143Abstract: Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of previously implemented actions. In one example, an advisement system identifies a security incident for an asset in the computing environment, and obtains enrichment information for the incident. Based on the enrichment information a rule set and associated recommended security actions are identified for the incident. Once the recommended security actions are identified, a subset of the action recommendations are organized based on previous action implementations in the computing environment, and the subset is provided to an administrator for selection.Type: GrantFiled: May 20, 2021Date of Patent: February 6, 2024Assignee: Splunk Inc.Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
-
Patent number: 11853411Abstract: There are provided systems and methods for user specific error detection for accepting authentication credential errors. A service provider, such as an authentication server and/or transaction processor, may require credentials for a user to utilize a specific service, such as an account and account services. The user may establish an authentication credential, such as a password or other secret, that allows the user to use the account. The user may then attempt to utilize the credentials with the service provider but may perform a typo in entering the authentication credential. The service provider may reject an authentication of the user but may allow the user to reenter the authentication credential. If the user correctly enters the authentication credential at this stage, the service provider may perform analysis of the incorrect and correct authentication credential to determine whether to allow the incorrect authentication credential for future authentications.Type: GrantFiled: April 17, 2020Date of Patent: December 26, 2023Assignee: PAYPAL, INC.Inventor: George Chen Kaidi
-
Patent number: 11822641Abstract: Systems and methods are disclosed for establishing controlled remote access to debug logs. An example method may comprise: receiving, by a first computing device, from a second computing device, an encrypted file comprising a debug log; running, within a trusted execution environment of the first computing device, a log access application; sending, to the second computing device, a request for access to the debug log by the log access application, wherein the request comprises a validation measurement generated by the trusted execution environment with respect to the log access application; receiving, from the second computing device, an access key; and accessing the debug log using the access key.Type: GrantFiled: April 29, 2020Date of Patent: November 21, 2023Assignee: Red Hat, Inc.Inventors: Michael Tsirkin, Andrea Arcangeli, Michael Hingston Mclaughlin Bursell
-
Patent number: 11824886Abstract: A method includes receiving a scan request requesting to scan a set of network-connected assets designated for a network scan. For each respective network-connected asset, the method includes scanning, at a network security scanner using a first scanning privilege level, the respective network-connected asset. The method includes determining, based on the scan using the first scanning privilege level, whether the respective network-connected asset has a vulnerability. In response, the method includes scanning, at the network security scanner using a second scanning privilege level, the respective network-connected asset. The second scanning privilege level defines a lower level of access the network security scanner has than the first scanning privilege level. The method includes determining, based on the scans, an exposure level of the vulnerability. The method includes reporting the exposure level of the vulnerability to a user of the respective network-connected asset.Type: GrantFiled: April 29, 2021Date of Patent: November 21, 2023Assignee: Google LLCInventors: Sebastian Lekies, Jean-Baptiste Cid
-
Patent number: 11797674Abstract: The present disclosure discloses a method, apparatus, device, and storage medium for defending against attacks, which relate to the technical field of information security, and can be used in intelligent traffic or an autonomous driving scenario. The specific implementation solution is: acquiring an instruction set including at least one instruction for controlling vehicle state; comparing each instruction in the instruction set with at least one attack instruction in an attack behavior knowledge base respectively to determine a maximum similarity value corresponding to each instruction; and determining the type of the instruction and of the processing tactics for the instruction according to the maximum similarity value corresponding to each instruction and a preset similarity range.Type: GrantFiled: December 17, 2020Date of Patent: October 24, 2023Assignee: APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECHNOLOGY CO., LTD.Inventor: Zhiyang Cui
-
Patent number: 11790114Abstract: Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.Type: GrantFiled: August 3, 2021Date of Patent: October 17, 2023Assignee: GOOGLE LLCInventors: Sandro Feuz, Sammy El Ghazzal
-
Patent number: 11784993Abstract: Techniques are described for providing an application programming interface (API) architecture that is capable of supporting cross-site request forgery (CSRF) protection with an attribute flag in a cookie, for client devices that utilize a stateless user session to interface with an API gateway. A client device may transmit session requests received by an API gateway. The API gateway may generate a session, and a cookie including session properties associated with the session. The cookie may further include the attribute flag associated with a CSRF token. By transmitting the cookie with the attribute flag to the client device, the client device may receive and insert the cookie into subsequent requests to indicate a requirement that the subsequent requests be accompanied by the CSRF token. In this way, the API gateway may utilize the attribute flag indicating the requirement for the CSRF token to protect the client device from malicious attacks.Type: GrantFiled: March 16, 2021Date of Patent: October 10, 2023Assignee: Cisco Technology, Inc.Inventors: Iain Maclachlan Hamilton, Kousik Nandy
-
Patent number: 11750599Abstract: The present invention discloses a method and a server for authentication adaptive to a secured application. The method comprising encrypting a part of continuous streams of random real-time data using a user's public key to form a first encrypted data when the request is received from a first entity, transmitting the first encrypted data to the first entity, wherein the first entity communicates the first encrypted data to a second entity, receiving a second encrypted data from the second entity, wherein the second encrypted data is created by decrypting the first encrypted data using a user's private key and encrypting the decrypted data using the user's private key, authenticating the second encrypted data received from the second entity by comparing data decrypted from the second encrypted data with the part of continuous streams of random real-time data stored in the authentication server and initiating action based on authentication.Type: GrantFiled: August 13, 2020Date of Patent: September 5, 2023Assignee: Wipro LimitedInventors: Naveen Kumar Jeyachandrasekar, Kaki Sai Kiran
-
Patent number: 11736509Abstract: The technology disclosed relates to simulating spread of a malware in cloud applications. In particular, the technology disclosed relates to accessing sharing data for files shared between users via sync and share mechanisms of cloud applications, tracing connections between the users by traversing a directed graph constructed based on the sharing data, and simulating spread of a malware based on the traced connections to simulate user exposure to, infection by, and transmission of the malware. The connections are created as a result of syncing and sharing the files via the sync and share mechanisms. The malware is spread by syncing and sharing of infected ones of the files via the sync and share mechanisms.Type: GrantFiled: December 2, 2020Date of Patent: August 22, 2023Assignee: Netskope, Inc.Inventors: Sean Hittel, Ravindra K. Balupari
-
Patent number: 11728995Abstract: A reward points transfer system and process using blockchain is disclosed. Transaction account issuers may write reward transfer messages to the blockchain to initiate a transfer of reward points for a transaction account holders account to one or more rewards partners. Rewards partners may retrieve the reward transfer messages from the blockchain, and write a reward transfer response message to the blockchain to confirm receipt of the reward points transfer and to update the status of the transfer. The transaction account issuers and rewards partners may encrypt the messages and generate hashes based on the messages prior to writing to the blockchain, to ensure that the messages are not tampered with during the transfer process.Type: GrantFiled: April 9, 2018Date of Patent: August 15, 2023Assignee: American Express Travel Related Services Company, Inc.Inventor: Vasudevan Swamidurai
-
Patent number: 11722891Abstract: In given user equipment seeking access to a first communication network (e.g., 5G network), wherein the given user equipment comprises a subscriber identity module (e.g., USIM) configured for a second communication network, and wherein the second communication network is a legacy network with respect to the first communication network (e.g., legacy 4G network), a method includes: initiating an authentication procedure with at least one network entity of the first communication network and selecting an authentication method to be used during the authentication procedure; and participating in the authentication procedure with the at least one network entity using the selected authentication method and, upon successful authentication, the given user equipment obtaining a set of keys to enable the given user equipment to access the first communication network.Type: GrantFiled: April 4, 2019Date of Patent: August 8, 2023Assignee: Nokia Technologies OyInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi
-
Patent number: 11722306Abstract: A method for strong authentication of an individual by a server and a connected client device, the client device having a candidate biometric data of the individual and an image from an identity document representing at least one photograph of the individual and one optical reader data visible on the identity document. A cryptographic footprint includes extracting, by analysis of the acquired image and the optical reader data, calculating a first data decoded by application of a decoding process to the candidate information and to a first encoded data, such that the first decoded data matches first random data if the candidate information matches a reference information representative of the appearance of the photograph, verifying that a cryptographic footprint of a first concatenation of the extracted optical reader data and the decoded data coincides with the first cryptographic footprint, and a reference biometric data and the candidate biometric data match.Type: GrantFiled: May 19, 2020Date of Patent: August 8, 2023Assignee: Idemia identity & Security FranceInventor: Sébastien Bahloul
-
Patent number: 11704436Abstract: Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.Type: GrantFiled: November 24, 2021Date of Patent: July 18, 2023Assignee: GOOGLE LLCInventors: Sandro Feuz, Sammy El Ghazzal
-
Patent number: 11689560Abstract: A network management system is configured to detect one or more malicious activities at one or more devices connected to a network. The network management system is configured to determine a malware root of the one or more malicious activities and generate a network-wide indicating a hierarchical relationship between the malicious activities spawned by the malware root and the malware root. The malicious activities spawned by the malware root represented in the network-wide malware include the one or more malicious activities and include a plurality of malicious activities spawned across a plurality of devices connected to the network.Type: GrantFiled: November 25, 2019Date of Patent: June 27, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Michal Garcarz, Piotr Kupisiewicz, Paweł Tybinka