Multiple Computer Communication Using Cryptography Patents (Class 713/150)
  • Patent number: 11943341
    Abstract: Example methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to implement contextual key management for data encryption are disclosed. Example apparatus disclosed are to determine whether a key mapping is associated with a combination of two or more context rules defined for a set of context values associated with input data to be encrypted. Disclosed example apparatus are also to, in response to a determination that no key mapping is associated with the combination of two or more context rules, map a key identifier to the combination of two or more context rules and generate a key corresponding to the key identifier. Disclosed example apparatus are further to encrypt the input data based on the key to obtain encrypted data.
    Type: Grant
    Filed: April 5, 2021
    Date of Patent: March 26, 2024
    Assignee: McAfee, LLC
    Inventors: Mark Ian Gargett, Shashank Visweswara, Wayne Helm Gibson, David Paul Webb
  • Patent number: 11941157
    Abstract: A computer implemented method for managing the scope of permissions granted by users to application that includes collecting a set of permissions for an application from an application provider publication; and collecting a process flow for functional steps of the application from a review of the application that is published on a product review type publication. The computer implemented method further includes dividing the functional steps of the application into a plurality of journeys, each of said plurality of journeys having a function associated with a stage of a functional step from a perspective of a user; and matching permissions from the set of permissions for each journey of said plurality of journeys to provide matched permissible permissions to journeys stored in a customer journey store.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: March 26, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hao Chun Hung, Po-Cheng Chiu, Tsai-Hsuan Hsieh, Cheng-Lun Yang, Chiwen Chang, Shin Yu Wey
  • Patent number: 11943348
    Abstract: Cryptographic techniques are disclosed which employ at least a five-pass protocol (5PP) for a cryptographic exchange of a secret data matrix between two computer systems. This 5PP approach improves the functioning of the computer systems by making their encrypted communications more resistant to potential quantum computing-based attacks while still resisting brute-force attacks by eavesdroppers. For example, the 5PP approach can be used to improve public-key cryptography. The system may comprise a first computer system and a second computer system, where a secret data matrix is known by the first computer system but is not shared with the second computer system in unobscured form.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: March 26, 2024
    Assignee: Q-Net Security, Inc.
    Inventors: Jeremiah Cox O'Driscoll, Jerome R. Cox, Jr.
  • Patent number: 11921912
    Abstract: Inter-chip communication data in an Internet-of-Things (IoT) device is manipulated and analyzed to identify and remediate security vulnerabilities. Inter-chip communication data in the IoT device is captured. Communication direction, address format, flow control, communication timing, and communication structure associated with the inter-chip communication data is identified. Based on the foregoing identification(s), portions of the inter-chip communication data that require modification are identified so that that inter-chip communication data can be replayed. Based on the modification and the replaying, security vulnerabilities in the IoT device are identified and remediated.
    Type: Grant
    Filed: February 14, 2022
    Date of Patent: March 5, 2024
    Assignee: Rapid7, Inc.
    Inventors: Deral Heiland, Matthew Kienow, Pearce Barry
  • Patent number: 11902276
    Abstract: Disclosed are various approaches for providing a virtual badge credential to a user's device that is enrolled with a management service as a managed device. Upon authentication of a user's identity via an identity provider, a virtual badge credential can be provided to an application on the client device. The virtual badge credential can be presented by the client device to access control readers to gain access to physical resources, such as doors and buildings, that are secured by the access control readers.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: February 13, 2024
    Assignee: VMware, Inc.
    Inventors: Gerard Murphy, Anantha Kalyan Kumar Mulampaka, Divyankitha Mahesh Urs, Yijia Zhao
  • Patent number: 11893509
    Abstract: A method and apparatus for certification of facts introduces a certifier and a fact certificate into the fact-exchange cycle that enables parties to exchange trustworthy facts. Certification is provided to a fact presenter during the first part of the fact-exchange cycle, and verification is provided to the fact receiver during the last part of the cycle. To request a certification, a fact presenter presents the Certifier with a fact. In return, the certifier issues a fact certificate, after which the fact presenter presents the fact certificate to the fact receiver instead of presenting the fact itself. The receiver inspects the received certificate in order to evaluate the fact's validity and trustworthiness. For some facts and notions of verification, the certificate is sufficient and its inspection does not require any communication. For others, the receiver requests a verification service from the Certifier in order to complete the verification.
    Type: Grant
    Filed: December 2, 2021
    Date of Patent: February 6, 2024
    Assignee: Factify
    Inventors: David Leigh Donoho, Matan Gavish
  • Patent number: 11888886
    Abstract: A cyber security risk assessment system is described. In an example implementation, the system may generate an input feature space including data associated with a computing system by collecting the data from a plurality of computer sources. The system may compute a likelihood of data-security breach incidents based on the input feature space using a first computer model, recognize events based on the input feature space using a second computer model, and determine a severity of the data-security breach incident or the event using a third computer model. In some instances, the system may generate risk factor scores based on the determined severity, data-security breach incident, and the event, where the risk factor scores indicate a computer security risk of a certain computer security aspect of the computing system. The system may then perform an action based on the risk factor scores.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: January 30, 2024
    Assignee: Cowbell Cyber, Inc.
    Inventors: Jagannath Y. Kudale, Rajeev Gupta, Prabhakar Reddy, Vaidehi Kedlaya, Harikrishna Prabhu, Nikita Nalawade
  • Patent number: 11886851
    Abstract: Methods, systems, and computer program products for flexible virtualization system deployment into different cloud computing environments. A set of floating licenses to virtualization system software components is established. The set of floating licenses are configured to permit usage of the virtualization system software components on different cloud computing infrastructures. Workload parameters of a workload to be deployed to one of the different cloud computing infrastructures is considered with respect to cloud attributes corresponding to the different cloud computing infrastructures. One or more candidate target cloud computing infrastructures are selected based upon a comparison between workload attributes of a computing workload and cloud attributes of the candidate target cloud computing infrastructures. Virtualization system software components are deployed into the selected target cloud computing infrastructures.
    Type: Grant
    Filed: November 11, 2022
    Date of Patent: January 30, 2024
    Assignee: Nutanix, Inc.
    Inventors: Mohan Maturi, Nitin Parab, Vidhi Taneja, Binny Sher Gill
  • Patent number: 11888974
    Abstract: Various embodiments relate to a method of receiving an original message, share-holder list, and threshold amount. The original message is tokenized resulting in a tokenized message. A plurality of shares are generated from the tokenized message using a message sharing algorithm of a secret sharing scheme. Each of the plurality of shares is signcrypted using a public key and a private key associated with the shared secret provider computing system and a public key of a respective one of the share-holders included in the share-holders list, resulting in a plurality of signcrypted shares. The plurality of signcrypted shares is distributed to the respective ones of the share-holders according to the public key used to signcrypt the respective signcrypted share. The authenticity and data integrity of the first share of the plurality of signcrypted shares can be determined by using the public key associated and a public/private key pair associated with the share-holder.
    Type: Grant
    Filed: September 3, 2021
    Date of Patent: January 30, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
  • Patent number: 11888979
    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). In accordance with an aspect of the present disclosure, a method of transmitting data in a device to device communication system is provided. The method includes determining whether a security feature is applied to one or more packet data convergence protocol (PDCP) data units, configuring the one or more PDCP data units based on the determined result, and transmitting the one or more PDCP data units to one or more receiving user equipments (UEs).
    Type: Grant
    Filed: March 8, 2021
    Date of Patent: January 30, 2024
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Anil Agiwal, Rajavelsamy Rajadurai, Young-Bin Chang
  • Patent number: 11876788
    Abstract: The present invention pertains to a method and system for preventing unauthorized access via signal interception and hacking to a user's secure mobile device. One embodiment of the system further comprises an encryption server in communication with the secure mobile device, a clear server in communication with a clear mobile device, and a termination gateway in connection with secure and clear POTS phones on the PSTN. The termination gateway communicates with the clear and encryption servers by IP tunneling. The system enables universal access between secure and non-secure packet-switched phone lines, operating via the Internet, and clear and secure circuit-switched phone lines operating on the PSTN.
    Type: Grant
    Filed: August 16, 2021
    Date of Patent: January 16, 2024
    Assignee: Assac (S.Z.) Networks Israel Ltd.
    Inventors: Shimon Zigdon, Shabtai Dvir, Eyal Tzur, Benny Epand
  • Patent number: 11870800
    Abstract: A cyber security risk assessment system is described. In an example implementation, the system may generate an input feature space including data associated with a computing system by collecting the data from a plurality of computer sources. The system may compute a likelihood of data-security breach incidents based on the input feature space using a first computer model, recognize events based on the input feature space using a second computer model, and determine a severity of the data-security breach incident or the event using a third computer model. In some instances, the system may generate risk factor scores based on the determined severity, data-security breach incident, and the event, where the risk factor scores indicate a computer security risk of a certain computer security aspect of the computing system. The system may then perform an action based on the risk factor scores.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: January 9, 2024
    Assignee: Cowbell Cyber, Inc.
    Inventors: Jagannath Y. Kudale, Rajeev Gupta, Prabhakar Reddy, Vaidehi Kedlaya, Harikrishna Prabhu, Nikita Nalawade
  • Patent number: 11870890
    Abstract: A system can control access to encrypted data shared by a group of users by the use of a vault key that is associated with a group of users. The encrypted data can include encrypted secret data generated from the secret data using a secret key, an encrypted secret key can be generated from the secret key by the use of a vault key, and an encrypted vault key generated from the vault key by the use of a public key associated with a user of the group of users. The system can allow users to store and access the encrypted data only if the user is a current member of the group. The system can verify the user's membership status from a group manager, such as a system managing a channel or chat session. Users added to the group are also granted permission to grant access to new users.
    Type: Grant
    Filed: July 12, 2022
    Date of Patent: January 9, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Alexander Weiss, Eric Scott Albright, Dustyn J. Tubbs, Paresh Lukka, Andrew V. Spiziri, Lawrence Fubini Waldman
  • Patent number: 11856095
    Abstract: An apparatus for validating user data includes a resource data storage system that stores data identifiers, data entries, and authorization sets. Resource data storage system may use an immutable sequential listing to store data. Resource data system may be used to evaluate and fulfill an authorization transfer request, in which, a user may request to transfer an authorization set with a lost identifier to a known identifier. User may be requested to commit to a user secret to validate user identity.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: December 26, 2023
    Assignee: MY JOB MATCHER, INC.
    Inventors: Arran Stewart, Steve O'Brien
  • Patent number: 11848949
    Abstract: The technology discloses a method applied by a policy manager to a cloud-based security system that unifies functions of access control and traffic inspection, threat detection and activity contextualization on inspectable and non-inspectable traffic, with a data manager coupled to the policy manager storing a superset of fields used to specify security policies across the cloud-based unified functions, including common fields shared by two or more of the functions.
    Type: Grant
    Filed: January 30, 2021
    Date of Patent: December 19, 2023
    Assignee: Netskope, Inc.
    Inventors: Amit Ganesh Datar, Kartik Subbanna, Kand Ly
  • Patent number: 11843580
    Abstract: A method for automatically managing a platform firewall using a network function (NF) repository function (NRF) or service communication proxy (SCP) includes receiving message relating to registering, updating, or deregistering an NF profile in an NF profiles database separate from a platform firewall. The method further includes determining that the registering, updating, or deregistering of the NF profile requires a change to a firewall rules configuration of the platform firewall. The method further includes, in response to determining that the registering, updating, or deregistering of the NF profile requires a change to the firewall rules configuration of the platform firewall, automatically updating, by the NRF or SCP, the firewall rules configuration of the platform firewall.
    Type: Grant
    Filed: May 4, 2021
    Date of Patent: December 12, 2023
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Jay Rajput, Virendra Singh, Ankit Srivastava
  • Patent number: 11838280
    Abstract: A detection device which is suitable for receiving a service within a network assembly is provided, having the following: means for providing cryptographic security at or above the transport level of the communication protocol levels which can be used in the network assembly for at least one first existing communication connection between the detection device and a network access device which is arranged in the network assembly and which can be used to monitor data detected by the detection device and/or control an additional device within the network assembly using the data detected by the detection device, means for generating and/or determining network access configuration data for at least one additional second communication connection, which is to be cryptographically secured below the transport level, between the detection device and the network access device, means for providing the generated and/or determined network access configuration data to the network access device.
    Type: Grant
    Filed: July 27, 2022
    Date of Patent: December 5, 2023
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Rainer Falk, Steffen Fries
  • Patent number: 11831626
    Abstract: An information processing system includes a first device and a second device. The first device generates first encrypted data by applying a first encryption with respect to the original data stored in a shared storage area, and causing the first encrypted data to be stored in the shared storage area. The second device generates second encrypted data by applying a second encryption with respect to the first encrypted data stored in the shared storage area, and causes the second encrypted data to be stored in the shared storage area. The first device deletes the original data and the first encrypted data from the shared storage area.
    Type: Grant
    Filed: October 21, 2022
    Date of Patent: November 28, 2023
    Assignee: L&I Inc.
    Inventor: Shinichi Kondo
  • Patent number: 11816499
    Abstract: Systems, software, and methods for evaluating the scope of computer system changes related to automatic migration from one set of computing hardware to another provide methods and techniques that include evaluations for compliance with one or more policies prior to implementation, and then sequence and automate the migration tasks. A domain-specific language describes activity specifications and asset metadata, which is then used to generate interdependent activities in a project workstream on the basis of stored expert knowledge embedded in knowledge templates. Disaster recovery and “what-if” migration scenarios are tested in order to test and compare options of one or more proposed infrastructure changes.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: November 14, 2023
    Assignee: Transitional Data Services, Inc.
    Inventors: Craig MacFarlane, Allison Layona Martin
  • Patent number: 11812272
    Abstract: The disclosed computer-implemented method for utilizing user identity notifications to protect against potential privacy attacks on mobile devices may include (i) monitoring a mobile computing device to detect one or more user interactions by a current user, (ii) identifying the current user of the mobile computing device, (iii) determining that the current user is a potentially malicious user associated with one or more privacy-invasive applications installed on the mobile computing device, and (iv) performing a security action that protects a benign user of the mobile computing device against an attack initiated by the potentially malicious user associated with the privacy-invasive applications. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: November 7, 2023
    Assignee: GEN DIGITAL INC.
    Inventors: Kevin Roundy, Acar Tamersoy, Yufei Han, Anil Sharma, Arif Shaikh
  • Patent number: 11811950
    Abstract: A system that provides responses to requests obtains a key that is used to digitally sign the request. The key is derived from information that is shared with a requestor to which the response is sent. The requestor derives, using the shared information, derives a key usable to verify the digital signature of the response, thereby enabling the requestor to operate in accordance with whether the digital signature of the response matches the response.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: November 7, 2023
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Eric Jason Brandwine
  • Patent number: 11809170
    Abstract: An industrial automation system device includes: a secure communication processing unit for communicating securely with a further trusted industrial automation system device; and a pre-shared secret module including a pre-shared secret, the pre-shared secret including shared asymmetric key pair generation data. The secure communication processing unit: derives a shared asymmetric key pair including a shared secret key and a shared public key from the shared asymmetric key pair generation data, derives a shared certificate including the shared public key, signs the shared certificate with the derived shared secret key, and generates a device asymmetric key pair including a device secret key and a device public key.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: November 7, 2023
    Assignee: ABB Schweiz AG
    Inventors: Soeren Finster, Florian Kohnhaeuser
  • Patent number: 11799670
    Abstract: A framework is provided that assigns a digital certificate to each VM-based control plane element and computing node (i.e., worker VM) of a workload orchestration platform implemented in a virtualized environment, where the digital certificate is signed by a trusted entity and provides cryptographic proof that the control plane element/worker VM has been successfully attested by that trusted entity using hardware-based attestation. Each control plane element/worker VM is configured to verify the digital certificates of other platform components prior to communicating with those components. With these digital certificates in place, when an end-user submits to the platform's front-end control plane element a new workload for deployment, the end-user can verify the digital certificate of the front-end control plane element in order to be assured that the workload will be deployed and executed by the platform in a secure manner.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: October 24, 2023
    Assignee: VMware, Inc.
    Inventors: Abhishek Srivastava, David Dunn, Jesse Pool, Adrian Drzewiecki
  • Patent number: 11792270
    Abstract: Systems herein allow an administrator to efficiently enroll computing devices into a mobile device management system, even when those computing devices are offline and not connected to the system. A management server can include a console that allows the administrator to enroll an offline computing device by selecting an offline enrollment option on a registration record. This option can cause the management server to create a device record, indicating the computing device is enrolled. The management server can also create and save a provisioning file onto a storage device, such as a USB drive. Assets, such as graphics and applications, specified by the device record are also saved onto the storage device. The storage device can be physically connected to the computing device, at which point the provisioning file guides automatic installation of the assets and implementation of device settings and compliance rules specified by the device record.
    Type: Grant
    Filed: May 3, 2022
    Date of Patent: October 17, 2023
    Assignee: VMware, Inc.
    Inventors: Adarsh Jain, Kalyan Regula, Prasad Sawant, Ravishankar Chamarajnagar, Michael Jones, Hai James Le
  • Patent number: 11792228
    Abstract: Methods, systems, and computer readable media for network security are described. In some implementations, security tasks and roles can be allocated between an endpoint device and a firewall device based on tag information sent from the endpoint, the tag information including one or more characteristics of a traffic flow, information of resource availability, and/or reputation of a process associated with a traffic flow.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: October 17, 2023
    Assignee: Sophos Limited
    Inventors: Andy Thomas, Nishit Shah, Daniel Stutz
  • Patent number: 11790109
    Abstract: Technology is disclosed for improving user privacy and providing user control over user-activity data collected from personal computing devices (i.e., user devices). User devices may be configured to operate in a private mode that enables a user to control, for example, which aspects of user-activity data are provided to applications and services running on their user device; to obscure or modify aspects of user-activity data so that certain applications and services, which may require this information to operate, may still function, but that the obscured information provided to these applications and services preserves user privacy or no longer may be used to identify the user; or to remove evidence of user-activity data created, monitored, reported, or otherwise collected by or on the user device while the user is operating their user device in the private mode setting.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: October 17, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Dikla Dotan-Cohen, Haim Somech, Hadas Bitran, Ido Priness
  • Patent number: 11789716
    Abstract: An electronic apparatus includes: a processor configured to execute a firmware program and a monitor program exclusively, switch between multiple operation modes, and start up the firmware program according to the monitor program; and nonvolatile memory which includes, storage regions for a plurality of firmware programs, a signature table that holds signatures of the firmware programs individually stored in the storage regions or a signature of a firmware program including an identification number of an update notification used for update, a firmware program storage for information specifying a firmware program selected to be executed, a first storage that holds an execution result of a firmware program selected in accordance with the monitor program, a second storage that holds the update notification acquired by the execution of the firmware program, and a third storage that holds a maximum identification number of firmware programs that have been executed.
    Type: Grant
    Filed: September 13, 2021
    Date of Patent: October 17, 2023
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Shinnosuke Yamaoka, Mikio Hashimoto, Ryuiti Koike
  • Patent number: 11791987
    Abstract: A device may receive content data from a content provider, the content data including: data identifying content, and data for verifying that the content has not changed. The device may access a blockchain associated with the content data, the blockchain including validation information specifying instructions for validating the content. In addition, the device may perform, based on the validation information, validation of the content to determine a measure of confidence that the content is accurate and store results of the validation in the blockchain as a transaction. Based on the validation results, the device may perform an action.
    Type: Grant
    Filed: October 15, 2021
    Date of Patent: October 17, 2023
    Assignee: Capital One Services, LLC
    Inventor: Pamela Rice
  • Patent number: 11783831
    Abstract: A user may access multiple virtual assistants via a voice-enabled device. The device may receive a command from the user, detect a wakeword corresponding to one of the assistants, and send audio data to a command processing system corresponding to the selected assistant. The device transmits encrypted audio data to one or more systems and, upon detecting a wakeword or wake command corresponding to one of the systems, the device may provide an encryption key to that particular system. The system may decrypt and process the audio data without additional latency introduced by having to wait for the audio data to arrive.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: October 10, 2023
    Assignee: Amazon Technologies, Inc.
    Inventors: Philippe Andre Lantin, Ori Neidich, David Berol
  • Patent number: 11783253
    Abstract: Systems and methods for effectuating sets of automated actions within and/or outside a collaboration environment based on trigger events occurring within and/or outside the collaboration environment are disclosed.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: October 10, 2023
    Assignee: Asana, Inc.
    Inventors: Eric Seth Pelz, Micah Hanan Fenner, Abigail Lorean Kelly, Cvetomir I. Cankov, Alexander Thomas Ryan, Adrian Van Yen, John Wesley Graham, Anna Marie Clifton, Lili Jiang Rachowin, Sika Gasinu
  • Patent number: 11777713
    Abstract: Aspects of the disclosure relate to processing systems for performing cross-sectional asset editing. A computing platform may receive permission to perform a first subset of event processing steps. The computing platform may delegate permission to an external event processor to perform a second subset of event processing steps and to an external resource management platform to perform a third subset of event processing steps. The computing platform may generate an element chain corresponding to the account. In response to receiving a request to process an event, the computing platform may add a sub-element to the element chain containing a fixed parameter corresponding to an expected value associated with the event and a variable parameter corresponding to an actual value associated with the event. In response to receiving a request to write the actual value to the element chain, the computing platform may modify the variable parameter of the sub-element accordingly.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: October 3, 2023
    Assignee: Bank of America Corporation
    Inventors: Manu Kurian, Joseph Castinado
  • Patent number: 11775332
    Abstract: Systems and methods for memory isolation are provided. The methods include receiving a request to write a data line to a physical memory address, where the physical memory address includes a key identifier, selecting an encryption key from a key table based on the key identifier of the physical memory address, determining whether the data line is compressible, compressing the data line to generate a compressed line in response to determining that the data line is compressible, where the compressed line includes compression metadata and compressed data, adding encryption metadata to the compressed line, where the encryption metadata is indicative of the encryption key, encrypting a part of the compressed line with the encryption key to generate an encrypted line in response to adding the encryption metadata, and writing the encrypted line to a memory device at the physical memory address. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 22, 2021
    Date of Patent: October 3, 2023
    Assignee: INTEL CORPORATION
    Inventors: David M. Durham, Siddhartha Chhabra, Michael E. Kounavis
  • Patent number: 11777912
    Abstract: A middleware system and corresponding methods are described whereby data communications, either inter-device or intra-device, are coordinated using a set of cryptographic identifiers that correspond to computing elements, such as interfaces, methods, parameters, classes, among others. The cryptographic identifiers are coupled to data messages being sent across the middleware system and processed to indicate adherence to protocol standards and/or to cause transformation of the data messages such that the receiver receives a data message adhering to their acceptable protocol standards.
    Type: Grant
    Filed: May 27, 2021
    Date of Patent: October 3, 2023
    Assignee: STEP SOFTWARE INC.
    Inventors: James Leo Freeman, Robert Jan Nijkamp
  • Patent number: 11777915
    Abstract: A network device may decrypt a record received from a source device and associated with an encrypted session. The network device may process the decrypted record. The network device may encrypt the record to generate an encrypted payload. The network device may store an entry in a retransmission mapping that includes a decryption key used to decrypt the record and an encryption key used to encrypt the record. The network device may transmit the encrypted payload in a first TCP packet toward the destination device. The network device may receive retransmitted data and may determine, based on the record entry, that the retransmitted data is associated with the record. The network device may decrypt, using the decryption key, the retransmitted data and may re-encrypt, using the encryption key, the decrypted record. The network device may transmit, toward the destination device, the encrypted payload in a second TCP packet.
    Type: Grant
    Filed: December 27, 2021
    Date of Patent: October 3, 2023
    Assignee: Juniper Networks, Inc.
    Inventor: Rajeev Chaubey
  • Patent number: 11770433
    Abstract: A method and apparatus include including, in a moving pictures experts group (MPEG) dynamic adaptive streaming over hypertext transfer protocol (DASH) media presentation description (MPD) file, an initialization presentation element that identifies an initialization presentation and one or more initialization groups included in the initialization presentation. An initialization group element that identifies an initialization group and one or more initialization sets included in the initialization group is included in the MPD file. An initialization set element that identifies an initialization set is included in the MPD file. The MPD file is transmitted to a client device.
    Type: Grant
    Filed: November 30, 2022
    Date of Patent: September 26, 2023
    Assignee: TENCENT AMERICA LLC
    Inventor: Iraj Sodagar
  • Patent number: 11763005
    Abstract: A computer implemented method to generate training data for a machine learning algorithm for determining security vulnerabilities of a virtual machine (VM) in a virtualized computing environment is disclosed. The machine learning algorithm determines the vulnerabilities based on a vector of configuration characteristics for the VM.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: September 19, 2023
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Mark Shackleton, Fadi El-Moussa
  • Patent number: 11765228
    Abstract: Systems and methods implemented by a network element include executing a virtual machine that processes and manages a first Blockchain; communicating with a plurality of nodes in the network, each being part of a peer-to-peer network that manages the first Blockchain, wherein at least one node of the plurality of nodes one of i) operates at a different network layer and ii) utilizes a different protocol for communication, from the network element; and performing one or more applications utilizing the first Blockchain.
    Type: Grant
    Filed: February 16, 2021
    Date of Patent: September 19, 2023
    Assignee: Ciena Corporation
    Inventor: Shvetal Shah
  • Patent number: 11763029
    Abstract: A data platform creates an application in a data-provider account, where the application includes one or more application programming interfaces (APIs) corresponding to one or more underlying code blocks. The data platform shares homomorphically encrypted provider data with the application in the data-provider account. The data platform installs, in a data-consumer account, an application instance of the application. The data platform shares homomorphically encrypted consumer data with the application instance in the data-consumer account. The data platform invokes one or more of the APIs of the application instance to execute respective associated underlying code blocks, which are not visible to the data-consumer account, and which operate on the shared homomorphically encrypted provider data and the shared homomorphically encrypted consumer data. The data platform saves homomorphically encrypted output of the one or more respective associated underlying code blocks locally within the data-consumer account.
    Type: Grant
    Filed: January 31, 2023
    Date of Patent: September 19, 2023
    Assignee: Snowflake Inc.
    Inventors: Artin Avanes, Thierry Cruanes, Monica J. Holboke, Allison Waingold Lee, Subramanian Muralidhar, David Schultz
  • Patent number: 11763309
    Abstract: A system and method for maintaining a fraud risk profile in a fraud risk engine are described. In a method conducted at a remote server, a payload from a secure mobile application executing on a user mobile device associated with a user is received. The payload including contextual data having been obtained by the secure mobile application and a trust indicator linked to the contextual data. Validity of the contextual data is confirmed by verifying the trust indicator. If the trust indicator is verified, the contextual data is input into a fraud risk engine as truth data. The fraud risk engine maintains a fraud risk profile associated with the user. The fraud risk profile is usable by the fraud risk engine in evaluating a fraud risk associated with an activity associated with the user.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: September 19, 2023
    Assignee: ENTERSEKT INTERNATIONAL LIMITED
    Inventors: Dewald de Ridder Nolte, Gerhard Gysbert Oosthuizen, Daniël Deetlefs Bester
  • Patent number: 11758393
    Abstract: Various disclosed embodiments include illustrative apparatuses, methods, and program products. In an illustrative embodiment, an apparatus includes a processor, a network interface, and a memory that stores code executable by the processor. The code receives signed keys from a computing device over a network via the network interface. The signed keys include a key signed by a mobile device associated with the computing device and the signed keys were generated responsive to a first key agreement protocol configured to provide one of forward secrecy protection and time-based expiration. The code authenticates the received signed keys responsive to prior knowledge of public keys associated with at least one of the computing device and the mobile device according to a second key agreement protocol configured to provide one of forward secrecy protection and time-based expiration and code that initiates a communication between the processor and the device responsive to the received signed keys being authenticated.
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: September 12, 2023
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Igor Stolbikov, John M. Petersen, Gary D. Cudak, Nathan Peterson
  • Patent number: 11757862
    Abstract: Aspects of the disclosure relate to a system and method for cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices. The system may comprise a plurality of chains, such as an identity chain and an activity chain. In some aspects, identity data associated with a user may be used to generate an identity token for the user. The identity token may be transmitted to a plurality of computing devices for verification. Based on a verification of the identity token, the identity token may be stored in the identity chain. A request to perform an activity may also be received, and identity data associated with the user may be received in order to authenticate the user. The computing device may generate, based on the received identity data, an identity token for the user. The identity token may be compared to the identity token stored in the identity chain, and the user may be authenticated based on the comparison.
    Type: Grant
    Filed: July 19, 2022
    Date of Patent: September 12, 2023
    Assignee: ALLSTATE INSURANCE COMPANY
    Inventors: Howard Hayes, Jason D. Park, John S. Parkinson
  • Patent number: 11750590
    Abstract: An access management system (AMS) is disclosed that includes SSO capabilities for providing users secure access to protected resources within an enterprise using encryption keys generated by a client application. The AMS receives a request from a client application for a user to access a protected resource. In certain examples, the request comprises a client application identifier, a session identifier and a client public encryption key. The AMS determines if the session identifier points to a valid session and upon determining that the session identifier corresponds to a valid session, transmits information associated with the valid session to the client application. In certain examples, the information associated with the valid session is encrypted using the client public encryption key. Based on information associated with the valid session received from the client application, the AMS determines whether to grant or deny a user access to a protected resource within the enterprise.
    Type: Grant
    Filed: February 7, 2022
    Date of Patent: September 5, 2023
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Nagaraj Pattar, Pruthvithej Ramesh Kumar
  • Patent number: 11748502
    Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: September 5, 2023
    Assignee: Dell Products L.P.
    Inventors: Amy Christine Nelson, Chooi Peng Low
  • Patent number: 11748089
    Abstract: An example method of upgrading a host in a cluster under management of a lifecycle manager in a virtualized computing system includes: receiving, from the lifecycle manager at a host in the cluster being upgraded, a desired software specification for a hypervisor of the host; determining, by the host, a list of required software installation bundles (SIBs) to satisfy the desired software specification; identifying a neighboring host in the cluster for the host; downloading, from the neighboring host to the host, at least at portion of the required SIBs; and executing an upgrade of the hypervisor in the host using the required SIBs.
    Type: Grant
    Filed: February 7, 2022
    Date of Patent: September 5, 2023
    Assignee: VMware, Inc.
    Inventors: Aravinda Haryadi, Mukund Gunti, Ritesh Ranjan, Dipesh Kumar, Yuedong Mu, Geoffrey Blair Fritz
  • Patent number: 11727155
    Abstract: Computer code embedded in an electronic component (e.g., a processor, a sensor, etc.) of a medical device, such as a dialysis machine, can be authenticated by comparing a metadata signature derived from the computer code of the electronic component to a key derived from a pre-authenticated code associated with the electronic component. The metadata signature can be derived by running an error-check/error-correct algorithm (e.g., SHA256) on the computer code of the electronic component. A use of the metadata signature enables detection of any unauthorized changes to the computer code as compared to the pre-authenticated code.
    Type: Grant
    Filed: August 11, 2021
    Date of Patent: August 15, 2023
    Assignee: Fresenius Medical Care Holdings, Inc.
    Inventors: Norbert Leinfellner, Joseph Edwin Inase Manakkil, Paolo Pochendorfer
  • Patent number: 11722519
    Abstract: A technique to stop lateral movement of ransomware between endpoints in a VLAN is disclosed. A security appliance is set as the default gateway for intra-LAN communication. Message traffic from compromised endpoints is detected. Attributes of ransomware may be detected in the message traffic, as well as attempts to circumvent the security appliance. Compromised devices may be quarantined.
    Type: Grant
    Filed: November 8, 2022
    Date of Patent: August 8, 2023
    Assignee: AIRGAP NETWORKS INC.
    Inventors: Ritesh R. Agrawal, Vinay Adavi, Satish M. Mohan
  • Patent number: 11716201
    Abstract: A method for maintaining a log of events in a shared computing environment is provided. One example of the disclosed method includes receiving one or more data streams from the shared computing environment that include transactions conducted in the shared computing environment by a first entity and a second entity that is different from the first entity. The method further includes creating a first blockchain entry for a first transaction conducted in the shared computing environment for the first entity, creating a second blockchain entry for a second transaction conducted in the shared computing environment for the second entity, where the second blockchain entry includes a signature that points to the first blockchain entry, and then causing the first and second blockchain entries to be written to a common blockchain data structure in a database that is made accessible to both the first entity and the second entity.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: August 1, 2023
    Assignee: ASSA ABLOY AB
    Inventor: Krzysztof Fabjański
  • Patent number: 11689364
    Abstract: Embodiments of the present invention provide systems and techniques for changing cryptographic keys in high-frequency transaction environments to mitigate service disruptions or loss of transactions associated with key maintenance. In various embodiments, a server device can employ a working key encrypted with a first master key to decrypt messages being communicated from a client device, whereby each message is encrypted with a first cryptogram that was generated based on the working key encrypted with the first master key. While the working key encrypted with the first master key is being employed, the server device can generate a notification including a second cryptogram generated based on the working key encrypted with a second master key for transmission to the client device. The transmitted notification can cause the client device to encrypt the messages being communicated with the second cryptogram.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: June 27, 2023
    Assignee: ITS, Inc.
    Inventors: Terry Dooley, Thomas Sherrard, Shane Van Waardhuizen, Manish Nathwani, Craig F. Branch
  • Patent number: 11683182
    Abstract: A method, a computer program product, and a system for embedding a message in a random value. The method includes generating a random value and applying a hash function to the random value to produce a hash value. Starting with the hash value, the method further includes reapplying the hash function in an iterative or recursive manner, with a new hash value produced by the hash function acting as an initial value that is applied to the hash function for a next iteration, until a bit sequence representing a message is produced in a message hash value. The method further includes utilizing the message hash value as a new random value that can be used by an encryption algorithm.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: June 20, 2023
    Assignee: International Business Machines Corporation
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Matthew Green, Stephen J. McKenzie, Michael James Thomas
  • Patent number: 11677723
    Abstract: Systems and methods directed to a third-party gateway that controls egress traffic from Internet Data Centers (IDC) and/or Virtual Private Clouds (VPC) are described. When egress traffic reaches the third-party gateway, a forward proxy may obtain a service identified or otherwise associated with the source IP address and port. Once, the service is identified, the third-party gateway may obtain a configuration rule specified by a rule manager to determine if the service is allowed to access the destination host(s). If the destination host is approved for the service, the forward proxy may send the traffic to the internet. If the destination host is not approved for the service, the forward proxy may block or otherwise drop the respective communication. In some examples, one or more auditors or auditing agencies may access essential information from the third-party gateway to view egress traffic logs and verify egress traffic approved destinations.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: June 13, 2023
    Assignee: BEIJING BYTEDANCE NETWORK TECHNOLOGY CO., LTD.
    Inventors: Jialin Wang, Fangfei Chen, Kaitong Guo, Yi Cao, Pangyang Chu