Patents Assigned to Security, Inc.
  • Publication number: 20230115278
    Abstract: Provision of a virtual secure cryptoprocessor (VSC) for a guest virtual machine (VM), part of a first guest, of a hypervisor of a computer system, includes (i) storing guest VM state and VSC state together in an encrypted virtual hard disk drive file, (ii) storing a decryption key in a sealed partition, of a second guest, sealed against a physical secure cryptoprocessor, (iii) based on verifying that a host computing environment of the computer system is in a trusted state and on booting the hypervisor thereon, unsealing the sealed partition of the second guest, the unsealing providing the decryption key, and decrypting the encrypted virtual hard disk drive file using the decryption key, where the decrypting decrypts the stored guest VM state for execution of the guest VM and decrypts the VSC state to provide the VSC for use by the guest VM.
    Type: Application
    Filed: March 31, 2020
    Publication date: April 13, 2023
    Applicant: Assured Information Security, Inc.
    Inventors: Richard TURNER, Joel UPHAM
  • Patent number: 11625486
    Abstract: In one aspect, a computerized-process for implementing Security Assessment For Enterprise (SAFE) Scoring Model include the step of generating a cybersecurity model by the following steps. The process determines a Governance Policy Score. The process determines a People Awareness Score. The process determines a Cybersecurity Architecture Score. The process determines an External Score. The process determines a Technology Score.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: April 11, 2023
    Assignee: SAFE Securities Inc.
    Inventors: Saket Modi, Nitin Aggarwal, Preetish Bajpai, Jyoti Yadav, Rohit Saini
  • Publication number: 20230107741
    Abstract: Disclosed are systems and methods including computing-processes executing machine-learning architectures implementing label distribution loss functions to improve age estimation performance and generalization. The machine-learning architecture includes a front-end neural network architecture defining a speaker embedding extraction engine of the machine-learning architecture, and a backend neural network architecture defining an age estimation engine of the machine-learning architecture. The embedding extractor is trained to extract low-level acoustic features of a speaker's speech, such as mel-frequency cepstral coefficients (MFCCs), from audio signals, and then extract a feature vector or speaker embedding vector that mathematically represents the low-level features of the speaker. The age estimator is trained to generate an estimated age for the speaker and a Gaussian probability distribution around the estimated age, by applying the various types of layers of the age estimator on the speaker embedding.
    Type: Application
    Filed: October 5, 2022
    Publication date: April 6, 2023
    Applicant: Pindrop Security, Inc.
    Inventors: Amruta SARAF, Elie KHOURY, Ganesh SIVARAMAN
  • Patent number: 11611482
    Abstract: Bandwidth throttling in a browser isolation environment is disclosed. A request is received from a client browser executing on a client device to connect with a remote resource. The browser isolation system provides a surrogate browser to facilitate communications between the client browser and the remote resource. A throttle is applied to a portion of content delivered to the client browser in response to the received request.
    Type: Grant
    Filed: June 11, 2021
    Date of Patent: March 21, 2023
    Assignee: Menlo Security, Inc.
    Inventors: Lionel Litty, Ji Feng, Gautam Altekar, Gary Steven Kratkin
  • Patent number: 11601493
    Abstract: Disclosed is a method and apparatus for performing steps to cause encoded information to be stored at a client device during a first network session between a server and the client device. To cause encoded information to be stored at a client device, the server first determines a set of network resource requests that encode the information. These network resource requests may include requests for one or more specific URLs and/or requests for one or more files. The server then causes the client device to initiate the network resource requests. The server may cause this initiation by, for example, redirecting the client device to the network resources. The client device initiating the network resource requests causes data representative of the network resource requests to be stored at the client device.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: March 7, 2023
    Assignee: RavenWhite Security, Inc.
    Inventors: Bjorn Markus Jakobsson, Ari Juels
  • Publication number: 20230068946
    Abstract: Disclosed techniques include integrated cybersecurity threat management. A plurality of network-connected cybersecurity threat protection applications is accessed. A plurality of heterogeneous log files is ingested, wherein the log files are generated by at least two of the cybersecurity threat protection applications. The plurality of heterogeneous log files that were ingested is evaluated to enable identification of cybersecurity threat protection application capabilities. Each of the plurality of log files is sorted. The sorting enables identification of cybersecurity threat protection elements among the plurality of log files. The cybersecurity threat protection elements that were identified are integrated. The integrated cybersecurity threat protection elements are evaluated. At least one response for cybersecurity threat management is generated, based on a result of the evaluating. The response is provided to a cybersecurity threat management entity.
    Type: Application
    Filed: October 31, 2022
    Publication date: March 2, 2023
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, Romans Bermans, David B. McKinley
  • Patent number: 11595429
    Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.
    Type: Grant
    Filed: March 2, 2021
    Date of Patent: February 28, 2023
    Assignee: 802 Secure, Inc.
    Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
  • Publication number: 20230041959
    Abstract: Systems and methods for sharing secrets including passwords, keys, and other confidential information used in computing environments. A secrets record generated at a secrets vault client device is encrypted using an application key associated with a computing environment. The encrypted secrets record is stored in the secrets vault server. The secrets vault client device configures a sharing client device and associated with an access token. The secrets vault client device hashes the access token and sends to the secrets vault server as a client identifier. The sharing client device performs a first-time authentication using a hashed access token with the secrets vault server. Upon successful authentication, the sharing client device requests secrets records from the secrets vault server using the client identifier.
    Type: Application
    Filed: December 27, 2021
    Publication date: February 9, 2023
    Applicant: Keeper Security, Inc.
    Inventors: Darren S. Guccione, Craig B. Lurey
  • Publication number: 20230037232
    Abstract: The present invention is directed to a deep neural network (DNN) having a triplet network architecture, which is suitable to perform speaker recognition. In particular, the DNN includes three feed-forward neural networks, which are trained according to a batch process utilizing a cohort set of negative training samples. After each batch of training samples is processed, the DNN may be trained according to a loss function, e.g., utilizing a cosine measure of similarity between respective samples, along with positive and negative margins, to provide a robust representation of voiceprints.
    Type: Application
    Filed: October 10, 2022
    Publication date: February 2, 2023
    Applicant: Pindrop Security, Inc.
    Inventors: Elie KHOURY, Matthew GARLAND
  • Patent number: 11570231
    Abstract: A network-accessible service provides an enterprise with a view of all identity and data activity in the enterprise's cloud accounts. The service enables distinct cloud provider management models to be normalized with centralized analytics and views across large numbers of cloud accounts. The service enables an enterprise to model all activity and relationships across cloud vendors, accounts and third party stores. Display views of this information preferably can pivot on cloud provider, country, cloud accounts, application or data store. Using a domain-specific query language, the system enables rapid interrogation of a complete and centralized data model of all data and identity relationships. User reports may be generated showing all privileges and data to which a particular identity has access. Similarly, data reports shown all entities having access to an asset can be generated.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: January 31, 2023
    Assignee: Sonrai Security Inc.
    Inventors: Ben Wuest, William Bird, Brad Peters, Albert Lockett
  • Publication number: 20230015189
    Abstract: A computer may train a single-class machine learning using normal speech recordings. The machine learning model or any other model may estimate the normal range of parameters of a physical speech production model based on the normal speech recordings. For example, the computer may use a source-filter model of speech production, where voiced speech is represented by a pulse train and unvoiced speech by a random noise and a combination of the pulse train and the random noise is passed through an auto-regressive filter that emulates the human vocal tract. The computer leverages the fact that intentional modification of human voice introduces errors to source-filter model or any other physical model of speech production. The computer may identify anomalies in the physical model to generate a voice modification score for an audio signal. The voice modification score may indicate a degree of abnormality of human voice in the audio signal.
    Type: Application
    Filed: September 26, 2022
    Publication date: January 19, 2023
    Applicant: Pindrop Security, Inc.
    Inventors: David Looney, Nikolay D. Gaubitch
  • Publication number: 20230014180
    Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
    Type: Application
    Filed: September 20, 2022
    Publication date: January 19, 2023
    Applicant: Pindrop Security, Inc.
    Inventors: John Cornwell, Terry Nelms, II
  • Patent number: 11552805
    Abstract: A form of the invention is applicable for use in conjunction with a security credential management system that produces and manages pseudonym digital certificates issued to vehicles and used by vehicles to establish trust in vehicle-to-vehicle communications, the security credential management system including a pseudonym certificate authority processor entity which issues pseudonym digital certificates to vehicles, a registration authority processor entity that validates, processes and forwards requests for pseudonym digital certificates to the pseudonym certificate authority processor entity, and a misbehavior authority processor entity that receives misbehavior reports from reporter vehicles that include information about the reporter vehicles and suspect misbehaving vehicles and is responsible for producing a list of revoked credentials; the pseudonym certificate processor entity and registration authority processor entity participating in producing linkage values to be contained within the issued pseudon
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: January 10, 2023
    Assignee: OnBoard Security, Inc.
    Inventors: Virendra Kumar, William Whyte, Abhishek Jain
  • Publication number: 20230007120
    Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner.
    Type: Application
    Filed: September 13, 2022
    Publication date: January 5, 2023
    Applicant: Pindrop Security, Inc.
    Inventor: Lance Douglas
  • Publication number: 20230005486
    Abstract: Embodiments include a computer executing voice biometric machine-learning for speaker recognition. The machine-learning architecture includes embedding extractors that extract embeddings for enrollment or for verifying inbound speakers, and embedding convertors that convert enrollment voiceprints from a first type of embedding to a second type of embedding. The embedding convertor maps the feature vector space of the first type of embedding to the feature vector space of the second type of embedding. The embedding convertor takes as input enrollment embeddings of the first type of embedding and generates as output converted enrolled embeddings that are aggregated into a converted enrolled voiceprint of the second type of embedding.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 5, 2023
    Applicant: Pindrop Security, Inc.
    Inventors: Tianxiang Chen, Elie Khoury
  • Patent number: 11540130
    Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: December 27, 2022
    Assignee: 802 Secure, Inc.
    Inventors: Konrad Grutzmacher, Clifford Fernandez
  • Publication number: 20220404453
    Abstract: Geolocating one or more emitters includes obtaining a set of lines of bearing (LOBs) indicative of location(s) of emitter(s), determining intersections of LOBs of the set and generating clusters informed by those intersections, assigning the LOBs of the set to cluster(s) based on proximity, identifying a cluster having the greatest number of assigned LOBs from the set; determining an emitter location area based on a best point estimate for the cluster, and indicating a location of an emitter as the emitter location area. Additional emitters can be located by removing from the set of LOBs those LOBs assigned to the identified cluster, and repeating aforementioned aspects. Initially, the set of LOBs can be selected from a larger collection as a representative subset thereof.
    Type: Application
    Filed: December 10, 2020
    Publication date: December 22, 2022
    Applicant: Assured Information Security, Inc.
    Inventor: Jason Eric SMITH
  • Publication number: 20220405401
    Abstract: Disclosed techniques include cybersecurity threat management using impact scoring. A plurality of cybersecurity threat protection applications is accessed. A first cybersecurity threat notification is received from one of the plurality of cybersecurity threat protection applications. An impact score is dynamically assigned to the first cybersecurity threat notification, wherein the assigning an impact score is based on information about a device for which the first cybersecurity threat notification was received. The impact score is weighted based on an evaluation of a user of the device for which the first cybersecurity threat notification was received. The weighting is further based on evaluation of device owners and evaluation of an asset. The information about a device and information about one or more users of the device comprise impact score metadata. The first cybersecurity threat notification is responded to, based on the impact score. The dynamically assigning includes the impact score metadata.
    Type: Application
    Filed: August 18, 2022
    Publication date: December 22, 2022
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, Romans Bermans, David B McKinley
  • Publication number: 20220392452
    Abstract: Disclosed are systems and methods including computing-processes executing machine-learning architectures extract vectors representing disparate types of data and output predicted identities of users accessing computing services, without express identity assertions, and across multiple computing services, analyzing data from multiple modalities, for various user devices, and agnostic to architectures hosting the disparate computing service. The system invokes the identification operations of the machine-learning architecture, which extracts biometric embeddings from biometric data and context embeddings representing all or most of the types of metadata features analyzed by the system. The context embeddings help identify a subset of potentially matching identities of possible users, which limits the number of biometric-prints the system compares against an inbound biometric embedding for authentication.
    Type: Application
    Filed: June 3, 2022
    Publication date: December 8, 2022
    Applicant: Pindrop Security, Inc.
    Inventors: Payas GUPTA, Elie KHOURY, Terry NELMS, II, Vijay BALASUBRAMANIYAN
  • Publication number: 20220392453
    Abstract: Disclosed are systems and methods including computing-processes executing machine-learning architectures extract vectors representing disparate types of data and output predicted identities of users accessing computing services, without express identity assertions, and across multiple computing services, analyzing data from multiple modalities, for various user devices, and agnostic to architectures hosting the disparate computing service. The system invokes the identification operations of the machine-learning architecture, which extracts biometric embeddings from biometric data and context embeddings representing all or most of the types of metadata features analyzed by the system. The context embeddings help identify a subset of potentially matching identities of possible users, which limits the number of biometric-prints the system compares against an inbound biometric embedding for authentication.
    Type: Application
    Filed: June 3, 2022
    Publication date: December 8, 2022
    Applicant: Pindrop Security, Inc.
    Inventors: Payas Gupta, Elie KHOURY, Terry Nelms, II, Vijay BALASUBRAMANIYAN