Patents Examined by Victor Lesniewski
  • Patent number: 11973863
    Abstract: A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: April 30, 2024
    Assignee: Network-1 Technologies, Inc.
    Inventor: John A. Nix
  • Patent number: 11966494
    Abstract: Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.
    Type: Grant
    Filed: November 24, 2021
    Date of Patent: April 23, 2024
    Assignee: GOOGLE LLC
    Inventors: Sandro Feuz, Sammy El Ghazzal
  • Patent number: 11960592
    Abstract: Methods, systems, and apparatuses are described herein for improving the security of personal information by preventing attempts at gleaning personal information from authentication questions. A computing device may receive a request for access to an account associated with a user. The request may comprise candidate authentication information. Based on comparing the candidate authentication information with the account data, the computing device may generate a synthetic authentication question. The synthetic authentication question may be generated as if the candidate authentication information is valid. A response to the synthetic authentication question may be received, and the request for access to the account may be denied.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: April 16, 2024
    Assignee: Capital One Services, LLC
    Inventors: Tyler Maiman, Viraj Chaudhary, Samuel Rapowitz, Daniel Miller, David Septimus, Joshua Edwards
  • Patent number: 11930364
    Abstract: A method, apparatus, and system are provided for verifying a location of data stored on at least one storage device within at least one cell area served by at least one network node of a wireless communication network. In one embodiment, a location assurance gateway is provided with a communication interface and processing circuitry, the processing circuitry configured to cause the communication interface to communicate with the at least one network node of the wireless communication network for location information associated with the at least one cell area, the location information associated with the at least one cell area being used to verify a location of the data stored on the at least one storage device.
    Type: Grant
    Filed: February 5, 2018
    Date of Patent: March 12, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventor: Bate Jellema
  • Patent number: 11907366
    Abstract: The technology disclosed teaches incident-driven and user-targeted data loss prevention that includes a CASB controlling infiltration via cloud-based services storing documents in use by organization users, by monitoring manipulation of the documents. The CASB identifies the cloud-based services that the particular user has access to and at least one document location on the cloud-based services to inspect for sensitive documents, in response to receiving an indication that user credentials have been compromised. The CASB performs deep inspection of documents identified as stored at the location and detects at least some sensitive documents. Based on the detected sensitive documents, the CASB determines an exposure for the organization due to the particular user.
    Type: Grant
    Filed: July 22, 2022
    Date of Patent: February 20, 2024
    Assignee: Netskope, Inc.
    Inventor: Krishna Narayanaswamy
  • Patent number: 11902329
    Abstract: A system for managing security on a cloud management platform portal (CMPP (1)), the system comprising a set of routines (scripts) which are executed on a computing device or processor allowing the cloud management platform portal to contact a cloud automation service (CAS (4)) so as to provision services to a customer, and a ServiceNow (2) (SNOW) application comprising at least one of a set of routines comprising at least one of certain specified network Standard Service Requests and/or network activity Standard Service Requests.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: February 13, 2024
    Assignee: AGARIK SAS
    Inventors: Konrad Clapa, Olena Zhuk
  • Patent number: 11895143
    Abstract: Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of previously implemented actions. In one example, an advisement system identifies a security incident for an asset in the computing environment, and obtains enrichment information for the incident. Based on the enrichment information a rule set and associated recommended security actions are identified for the incident. Once the recommended security actions are identified, a subset of the action recommendations are organized based on previous action implementations in the computing environment, and the subset is provided to an administrator for selection.
    Type: Grant
    Filed: May 20, 2021
    Date of Patent: February 6, 2024
    Assignee: Splunk Inc.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 11853411
    Abstract: There are provided systems and methods for user specific error detection for accepting authentication credential errors. A service provider, such as an authentication server and/or transaction processor, may require credentials for a user to utilize a specific service, such as an account and account services. The user may establish an authentication credential, such as a password or other secret, that allows the user to use the account. The user may then attempt to utilize the credentials with the service provider but may perform a typo in entering the authentication credential. The service provider may reject an authentication of the user but may allow the user to reenter the authentication credential. If the user correctly enters the authentication credential at this stage, the service provider may perform analysis of the incorrect and correct authentication credential to determine whether to allow the incorrect authentication credential for future authentications.
    Type: Grant
    Filed: April 17, 2020
    Date of Patent: December 26, 2023
    Assignee: PAYPAL, INC.
    Inventor: George Chen Kaidi
  • Patent number: 11822641
    Abstract: Systems and methods are disclosed for establishing controlled remote access to debug logs. An example method may comprise: receiving, by a first computing device, from a second computing device, an encrypted file comprising a debug log; running, within a trusted execution environment of the first computing device, a log access application; sending, to the second computing device, a request for access to the debug log by the log access application, wherein the request comprises a validation measurement generated by the trusted execution environment with respect to the log access application; receiving, from the second computing device, an access key; and accessing the debug log using the access key.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: November 21, 2023
    Assignee: Red Hat, Inc.
    Inventors: Michael Tsirkin, Andrea Arcangeli, Michael Hingston Mclaughlin Bursell
  • Patent number: 11824886
    Abstract: A method includes receiving a scan request requesting to scan a set of network-connected assets designated for a network scan. For each respective network-connected asset, the method includes scanning, at a network security scanner using a first scanning privilege level, the respective network-connected asset. The method includes determining, based on the scan using the first scanning privilege level, whether the respective network-connected asset has a vulnerability. In response, the method includes scanning, at the network security scanner using a second scanning privilege level, the respective network-connected asset. The second scanning privilege level defines a lower level of access the network security scanner has than the first scanning privilege level. The method includes determining, based on the scans, an exposure level of the vulnerability. The method includes reporting the exposure level of the vulnerability to a user of the respective network-connected asset.
    Type: Grant
    Filed: April 29, 2021
    Date of Patent: November 21, 2023
    Assignee: Google LLC
    Inventors: Sebastian Lekies, Jean-Baptiste Cid
  • Patent number: 11797674
    Abstract: The present disclosure discloses a method, apparatus, device, and storage medium for defending against attacks, which relate to the technical field of information security, and can be used in intelligent traffic or an autonomous driving scenario. The specific implementation solution is: acquiring an instruction set including at least one instruction for controlling vehicle state; comparing each instruction in the instruction set with at least one attack instruction in an attack behavior knowledge base respectively to determine a maximum similarity value corresponding to each instruction; and determining the type of the instruction and of the processing tactics for the instruction according to the maximum similarity value corresponding to each instruction and a preset similarity range.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: October 24, 2023
    Assignee: APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECHNOLOGY CO., LTD.
    Inventor: Zhiyang Cui
  • Patent number: 11790114
    Abstract: Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.
    Type: Grant
    Filed: August 3, 2021
    Date of Patent: October 17, 2023
    Assignee: GOOGLE LLC
    Inventors: Sandro Feuz, Sammy El Ghazzal
  • Patent number: 11784993
    Abstract: Techniques are described for providing an application programming interface (API) architecture that is capable of supporting cross-site request forgery (CSRF) protection with an attribute flag in a cookie, for client devices that utilize a stateless user session to interface with an API gateway. A client device may transmit session requests received by an API gateway. The API gateway may generate a session, and a cookie including session properties associated with the session. The cookie may further include the attribute flag associated with a CSRF token. By transmitting the cookie with the attribute flag to the client device, the client device may receive and insert the cookie into subsequent requests to indicate a requirement that the subsequent requests be accompanied by the CSRF token. In this way, the API gateway may utilize the attribute flag indicating the requirement for the CSRF token to protect the client device from malicious attacks.
    Type: Grant
    Filed: March 16, 2021
    Date of Patent: October 10, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Iain Maclachlan Hamilton, Kousik Nandy
  • Patent number: 11750599
    Abstract: The present invention discloses a method and a server for authentication adaptive to a secured application. The method comprising encrypting a part of continuous streams of random real-time data using a user's public key to form a first encrypted data when the request is received from a first entity, transmitting the first encrypted data to the first entity, wherein the first entity communicates the first encrypted data to a second entity, receiving a second encrypted data from the second entity, wherein the second encrypted data is created by decrypting the first encrypted data using a user's private key and encrypting the decrypted data using the user's private key, authenticating the second encrypted data received from the second entity by comparing data decrypted from the second encrypted data with the part of continuous streams of random real-time data stored in the authentication server and initiating action based on authentication.
    Type: Grant
    Filed: August 13, 2020
    Date of Patent: September 5, 2023
    Assignee: Wipro Limited
    Inventors: Naveen Kumar Jeyachandrasekar, Kaki Sai Kiran
  • Patent number: 11736509
    Abstract: The technology disclosed relates to simulating spread of a malware in cloud applications. In particular, the technology disclosed relates to accessing sharing data for files shared between users via sync and share mechanisms of cloud applications, tracing connections between the users by traversing a directed graph constructed based on the sharing data, and simulating spread of a malware based on the traced connections to simulate user exposure to, infection by, and transmission of the malware. The connections are created as a result of syncing and sharing the files via the sync and share mechanisms. The malware is spread by syncing and sharing of infected ones of the files via the sync and share mechanisms.
    Type: Grant
    Filed: December 2, 2020
    Date of Patent: August 22, 2023
    Assignee: Netskope, Inc.
    Inventors: Sean Hittel, Ravindra K. Balupari
  • Patent number: 11728995
    Abstract: A reward points transfer system and process using blockchain is disclosed. Transaction account issuers may write reward transfer messages to the blockchain to initiate a transfer of reward points for a transaction account holders account to one or more rewards partners. Rewards partners may retrieve the reward transfer messages from the blockchain, and write a reward transfer response message to the blockchain to confirm receipt of the reward points transfer and to update the status of the transfer. The transaction account issuers and rewards partners may encrypt the messages and generate hashes based on the messages prior to writing to the blockchain, to ensure that the messages are not tampered with during the transfer process.
    Type: Grant
    Filed: April 9, 2018
    Date of Patent: August 15, 2023
    Assignee: American Express Travel Related Services Company, Inc.
    Inventor: Vasudevan Swamidurai
  • Patent number: 11722891
    Abstract: In given user equipment seeking access to a first communication network (e.g., 5G network), wherein the given user equipment comprises a subscriber identity module (e.g., USIM) configured for a second communication network, and wherein the second communication network is a legacy network with respect to the first communication network (e.g., legacy 4G network), a method includes: initiating an authentication procedure with at least one network entity of the first communication network and selecting an authentication method to be used during the authentication procedure; and participating in the authentication procedure with the at least one network entity using the selected authentication method and, upon successful authentication, the given user equipment obtaining a set of keys to enable the given user equipment to access the first communication network.
    Type: Grant
    Filed: April 4, 2019
    Date of Patent: August 8, 2023
    Assignee: Nokia Technologies Oy
    Inventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi
  • Patent number: 11722306
    Abstract: A method for strong authentication of an individual by a server and a connected client device, the client device having a candidate biometric data of the individual and an image from an identity document representing at least one photograph of the individual and one optical reader data visible on the identity document. A cryptographic footprint includes extracting, by analysis of the acquired image and the optical reader data, calculating a first data decoded by application of a decoding process to the candidate information and to a first encoded data, such that the first decoded data matches first random data if the candidate information matches a reference information representative of the appearance of the photograph, verifying that a cryptographic footprint of a first concatenation of the extracted optical reader data and the decoded data coincides with the first cryptographic footprint, and a reference biometric data and the candidate biometric data match.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: August 8, 2023
    Assignee: Idemia identity & Security France
    Inventor: Sébastien Bahloul
  • Patent number: 11704436
    Abstract: Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.
    Type: Grant
    Filed: November 24, 2021
    Date of Patent: July 18, 2023
    Assignee: GOOGLE LLC
    Inventors: Sandro Feuz, Sammy El Ghazzal
  • Patent number: 11689560
    Abstract: A network management system is configured to detect one or more malicious activities at one or more devices connected to a network. The network management system is configured to determine a malware root of the one or more malicious activities and generate a network-wide indicating a hierarchical relationship between the malicious activities spawned by the malware root and the malware root. The malicious activities spawned by the malware root represented in the network-wide malware include the one or more malicious activities and include a plurality of malicious activities spawned across a plurality of devices connected to the network.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: June 27, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Michal Garcarz, Piotr Kupisiewicz, Paweł Tybinka