Patents Assigned to Security, Inc.
  • Publication number: 20240363119
    Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. Embodiments include systems and methods for detecting fraudulent presentation attacks using multiple functional engines that implement various fraud-detection techniques, to produce calibrated scores and/or fused scores. A computer may, for example, evaluate the audio quality of speech signals within audio signals, where speech signals contain the speech portions having speaker utterances.
    Type: Application
    Filed: April 25, 2024
    Publication date: October 31, 2024
    Applicant: Pindrop Security, Inc.
    Inventors: Elie KHOURY, Ganesh SIVARAMAN, Tianxiang CHEN, Nikolay GAUBITCH, David LOONEY, Amit GUPTA, Vijay BALASUBRAMANIYAN, Nicholas KLEIN, Anthony STANKUS
  • Publication number: 20240363123
    Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. Embodiments include systems and methods for detecting fraudulent presentation attacks using multiple functional engines that implement various fraud-detection techniques, to produce calibrated scores and/or fused scores. A computer may, for example, evaluate the audio quality of speech signals within audio signals, where speech signals contain the speech portions having speaker utterances.
    Type: Application
    Filed: April 25, 2024
    Publication date: October 31, 2024
    Applicant: Pindrop Security, Inc.
    Inventors: Elie KHOURY, Ganesh SIVARAMAN, Tianxiang CHEN, Nikolay GAUBITCH, David LOONEY, Amit GUPTA, Vijay BALASUBRAMANIYAN, Nicholas KLEIN, Anthony STANKUS
  • Publication number: 20240363125
    Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. Embodiments include systems and methods for detecting fraudulent presentation attacks using multiple functional engines that implement various fraud-detection techniques, to produce calibrated scores and/or fused scores. A computer may, for example, evaluate the audio quality of speech signals within audio signals, where speech signals contain the speech portions having speaker utterances.
    Type: Application
    Filed: April 25, 2024
    Publication date: October 31, 2024
    Applicant: Pindrop Security, Inc.
    Inventors: Elie KHOURY, Ganesh SIVARAMAN, Tianxiang CHEN, Nikolay GAUBITCH, David LOONEY, Amit GUPTA, Vijay BALASUBRAMANIYAN, Nicholas KLEIN, Anthony STANKUS
  • Patent number: 12131230
    Abstract: A method includes, as part of establishing a feature merging threshold (?) for determining equivalence between two features, selecting a set of candidate ? values, partitioning training data into a plurality of groups, establishing a model W? for each ? value of the set of candidate ? values, iteratively performing: selecting a next group of training data of the plurality of groups of training data; adding the selected next group of training data to a training set; and for each ? value in the set of candidate ? values: training the W? for the ? value using the training set, and evaluating a size of W?, the size comprising a number of features included in the model, and choosing the feature merging threshold ? based on the iteratively performing.
    Type: Grant
    Filed: August 4, 2020
    Date of Patent: October 29, 2024
    Assignee: Assured Information Security, Inc.
    Inventors: Daniel Scofield, Craig Miles
  • Publication number: 20240355322
    Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. The server applies an NLP engine to transcribe call audio and analyze the text for anomalous patterns to detect synthetic speech. Additionally or alternatively, the server executes a voice “liveness” detection system for detecting machine speech, such as synthetic speech or replayed speech. The system performs phrase repetition detection, background change detection, and passive voice liveness detection in call audio signals to detect liveness of a speech utterance. An automated model update module allows the liveness detection model to adapt to new types of presentation attacks, based on the human provided feedback.
    Type: Application
    Filed: November 9, 2023
    Publication date: October 24, 2024
    Applicant: Pindrop Security, Inc.
    Inventors: Umair Altaf, Sai Pradeep Peri, Lakshay Phatela, Payas Gupta, Yitao Sun, Svetlana Afanaseva, Kailash Patil, Elie Khoury, Bradley Magnetta, Vijay Balasubramaniyan, Tianxiang Chen
  • Patent number: 12124568
    Abstract: Malware prevention and remediation is provided by monitoring actions performed by processes and maintaining indications of which processes are trusted; selectively presenting canary files to these processes, which includes presenting the canary files to processes not indicated as being trusted and hiding the canary files from processes indicated as being trusted, and where the monitoring includes monitoring for access of canary files with change privileges; scoring each of the processes based on the actions performed, including any access of canary files with change privileges, which scoring produces a malice score for each process; and automatically terminating any process for which its malice score indicates at least a threshold level of malice in the execution of the process.
    Type: Grant
    Filed: April 20, 2021
    Date of Patent: October 22, 2024
    Assignee: Assured Information Security, Inc.
    Inventors: Sean Laplante, Patrick McHarris
  • Patent number: 12120263
    Abstract: According to an embodiment of the disclosure, a toll-free telecommunications validation system determines a confidence value that an incoming phone call to an enterprises' toll-free number is originating from the station it purports to be, i.e.
    Type: Grant
    Filed: March 20, 2023
    Date of Patent: October 15, 2024
    Assignee: Pindrop Security, Inc.
    Inventors: MohammedAli Merchant, Matthew Williams, Tim Prugar
  • Patent number: 12113810
    Abstract: An autonomic incident response system (AIRS) that can be used within any cyber system (computing systems, network devices, applications, cyber-physical systems, data, and files). If a cyber system is attacked, the cyberattack pattern type can be seamlessly identified by the AIRS along with the method used to launch the attack, the vulnerability that was exploited, the impact and consequence of the attack, and finally the recovery actions that can be taken automatically or semi-automatically to stop the attack or mitigate its impact on cyber system operations.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: October 8, 2024
    Assignee: 802 Secure, Inc.
    Inventor: Salim Hariri
  • Patent number: 12107867
    Abstract: Predictive rendering (also referred to herein as speculative rendering) is disclosed. The predictive rendering is performed by an endpoint browser in response to a user input made by a user. The predictive rendering is verified using a surrogate browser that is executed on a remote server. The verification can be performed asynchronously.
    Type: Grant
    Filed: June 20, 2023
    Date of Patent: October 1, 2024
    Assignee: Menlo Security, Inc.
    Inventors: Ji Feng, Gautam Altekar, Yang Yu
  • Publication number: 20240323270
    Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
    Type: Application
    Filed: May 31, 2024
    Publication date: September 26, 2024
    Applicant: Pindrop Security, Inc.
    Inventors: Nick Gaubitch, Scott Strong, John Cornwell, Hassan Kingravi, David Dewey
  • Patent number: 12099615
    Abstract: Disclosed are methods, systems and non-transitory computer readable memory for container image or host deduplication in vulnerability management systems. For instance, a method may include: obtaining source data from at least one source, wherein the source data includes a plurality of assets and/or findings; extracting data bits for each asset or finding from the source data; determining a first asset or finding concerns a first container image or first host based on the data bits for the first asset or finding; in response to determining the first asset or finding concerns the first container image or first host, obtaining a container image dataset or a search structure; determining whether the data bits match any of the plurality of sets of values of the container image dataset or the search structure; and, based on a match result, generating or updating records for the first container image or the first host.
    Type: Grant
    Filed: February 1, 2024
    Date of Patent: September 24, 2024
    Assignee: Nucleus Security, Inc.
    Inventor: Gil Azaria
  • Patent number: 12099864
    Abstract: A formally verified trusted computing base with active security and policy enforcement is described. The formally verified trusted computing base includes a formally verified microkernel and multiple formally verified hyper-processes including a virtual machine monitor (VMM), virtual machine introspection (VMI), policy enforcers including an active security policy enforcer (ASPE), and a virtual switch. The active security and policy enforcement continuously monitors for semantic behavior detection or policy violations and enforces the policies at the virtualization layer. Further, policies can be attached to the network layer to provide granular control of the communication of the computing device.
    Type: Grant
    Filed: September 12, 2022
    Date of Patent: September 24, 2024
    Assignee: BlueRock Security, Inc.
    Inventors: Osman Abdoul Ismael, Ashar Aziz, Jonas Pfoh
  • Patent number: 12095790
    Abstract: Methods and systems for threat monitoring and analysis are disclosed. Data is collected, over a protected network, from a data stream provided by at least one data source connecting to the protected network. Machine learning (ML) models are trained for the data stream utilizing the collected data. The ML models include a first ML model to establish a baseline value, an allowed threshold value range, and a threshold value for the data from the data source, and a second ML model to identify outlier data. The outlier data is outside of the allowed threshold value range from the baseline value and exceeds the threshold value in the data stream. The ML models are used to determine whether one or more anomalies indicating a cyber threat exist within the collected data. Responsive to determining that the anomalies exist, it is determined whether to provide a response action.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: September 17, 2024
    Assignee: 802 Secure, Inc.
    Inventors: Ashok Madanahalli, Konrad Grutzmacher, Garry Drummond
  • Patent number: 12088597
    Abstract: A method for monitoring endpoint devices affiliated with a computer network includes: for each security technology, accessing a set of objects generated by the security technology during a time interval and representing characteristics endpoint devices configured with the security technology, partitioning object groups representing individual endpoint devices, and aggregating characteristics represented in each object group into an endpoint device container associated with the security technology and containing identifying data and status data representing one endpoint device; identifying a first subset of endpoint devices configured with first and second security technologies based on correspondence between data contained endpoint device containers associated with the first and second security technologies; and identifying a second subset of endpoint devices configured with the first security technology and excluding the second security technology based on absence of correspondence between data contained in
    Type: Grant
    Filed: March 31, 2023
    Date of Patent: September 10, 2024
    Assignee: Sevco Security, Inc.
    Inventors: Jeffrey J. Guy, Greg Fitzgerald, Jeremiah Clark, Dean Mekkawy, Nevins Bartolomeo, Jim LoRusso, Nick Murdock, Allen Saunders, Jacob Hackett
  • Patent number: 12087319
    Abstract: Embodiments described herein provide for end-to-end joint determination of degradation parameter scores for certain types of degradation. Degradation parameters include degradation describing additive noise and multiplicative noise such as Signal-to-Noise Ratio (SNR), reverberation time (T60), and Direct-to-Reverberant Ratio (DRR). Various neural network architectures are described such that the inherent interplay between the degradation parameters is considered in both the degradation parameter score and degradation score determination. The neural network architectures are trained according to computer generated audio datasets.
    Type: Grant
    Filed: October 23, 2020
    Date of Patent: September 10, 2024
    Assignee: Pindrop Security, Inc.
    Inventors: David Looney, Nikolay Gaubitch
  • Publication number: 20240267459
    Abstract: Disclosed are systems and methods including processes executed by a server that executes software routines for machine-learning architectures that receive call-invite messages containing data from a terminating carrier. The server a caller ANI and types of call data. The server further requests data from a telephony database. The server applies and executes the software programming of the machine-learning architecture on the call data (from the terminating carrier) and the portability data (from the telephony database) to generate risk scores. The server stores the data and the risk scores into a request database, until a provider server requests the risk scores in a threat assessment request. The server returns a threat assessment message to the provider server in response to the threat assessment request. The threat assessment message includes information about the caller or caller device, and the risk scores, but not the caller ANI.
    Type: Application
    Filed: January 16, 2024
    Publication date: August 8, 2024
    Applicant: Pindrop Security, Inc.
    Inventor: MohammedAli MERCHANT
  • Patent number: 12058593
    Abstract: Provided are a driving negotiation method and apparatus for supporting stability against a blind spot, an unexpected situation, etc. and a rapid judgment and response of an autonomous vehicle in various driving environments. The driving negotiation apparatus includes a wireless communication module configured to support vehicle to everything (V2X) communication and at least one processor connected to the wireless communication module. The at least one processor receives a cooperative request message from a first vehicle, broadcasts a cooperative request message and additional information required for a negotiation to surrounding vehicles, receives a cooperative response message from at least one second vehicle among the surrounding vehicles, and transmits a message indicating that the negotiation is possible or impossible to the first vehicle on the basis of the cooperative response message.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: August 6, 2024
    Assignees: Penta Security Inc., Autocrypt Co., Ltd.
    Inventors: Keon Yun, Myung Woo Chung, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
  • Patent number: 12058140
    Abstract: Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
    Type: Grant
    Filed: February 3, 2022
    Date of Patent: August 6, 2024
    Assignee: RavenWhite Security, Inc.
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 12058170
    Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: August 6, 2024
    Assignee: Shape Security, Inc.
    Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Publication number: 20240249728
    Abstract: The present invention is directed to a deep neural network (DNN) having a triplet network architecture, which is suitable to perform speaker recognition. In particular, the DNN includes three feed-forward neural networks, which are trained according to a batch process utilizing a cohort set of negative training samples. After each batch of training samples is processed, the DNN may be trained according to a loss function, e.g., utilizing a cosine measure of similarity between respective samples, along with positive and negative margins, to provide a robust representation of voiceprints.
    Type: Application
    Filed: January 25, 2024
    Publication date: July 25, 2024
    Applicant: Pindrop Security, Inc.
    Inventors: Elie KHOURY, Matthew GARLAND