Patents Examined by Amare F Tabor
-
Patent number: 12124564Abstract: A secure, modular multi-tenant machine learning platform is configured to: receive untrusted code supplied by a first tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies a set of one or more security requirements; responsive to determining that the untrusted code satisfies the security requirement(s): deploy the untrusted code to a runtime execution environment; deploy a machine learning model associated with the first tenant to the runtime execution environment, the untrusted code being configured to perform one or more functions using the machine learning model; receive a set of untrusted code supplied by a second tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies the security requirement(s); and responsive to determining that the untrusted code does not satisfy the security requirement(s): refraining from deploying the untrusted code to a runtime execution environment.Type: GrantFiled: July 21, 2022Date of Patent: October 22, 2024Assignee: Oracle International CorporationInventors: Madalasa Venkataraman, Paul Deepakraj Retinraj, Pradeep Sanchana, Rohit Sukumaran, Oleksandr Khimich
-
Patent number: 12124610Abstract: Systems and methods for anonymizing data are provided herein. A network node can receive privacy constraints from a data owner and utility requirements from at least one data processor. An anonymization mechanism can be selected for each data attribute in a data set, based on its specified privacy constraint and/or utility requirement, from the available anonymization mechanism(s) appropriate for its associated attribute type.Type: GrantFiled: April 29, 2020Date of Patent: October 22, 2024Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
-
Patent number: 12118104Abstract: A method of secure data transfer and storage using ae storage device storing encrypted information. The method uses a host that stores and transfers encrypted sensitive information and a customer that desires the information to be securely stored. The customer chooses a unique encryption code to encrypt sensitive information and uploads the information to a host. Then the host transfers the information to the storage device. Connections between the host and customer are intermittent and done so the storage device remains isolated from networks outside of the host.Type: GrantFiled: December 3, 2021Date of Patent: October 15, 2024Inventor: Patrick Scott Heller
-
Patent number: 12118874Abstract: A total property security system may be implemented to conduct security and surveillance operations. The system includes security operations centers that are connected to one or more sensors and vehicles for collecting and transmitting surveillance data to a database hosted on cloud services. The collected surveillance data is analyzed in order to automatically deploy security measures and/or recommend courses of action using a rules engine that can be configured to client-specific or user-specific security needs. The cloud services can provide a set of application program interface services that can act on the surveillance operations center. Sensor fusion data and other surveillance data can be also transmitted to vetted monitoring service providers on a subscription basis to provide physical security services to the area within the property perimeter. During the subscription period, the selected monitoring service providers can obtain time-based encryption token for accessing surveillance data.Type: GrantFiled: May 17, 2021Date of Patent: October 15, 2024Inventor: Matias Klein
-
Patent number: 12105863Abstract: A method, system, and device for using an interface controller to validate and authenticate controller code for a commodity device to be included within a computer system (e.g., a power supply) are provided. In one example, a commodity device controller includes dynamic memory for control software (e.g., control code to control operation of the commodity device) that may be validated (and/or updated) using an interface controller. The interface controller may perform this update/validation at startup (or run-time) to ensure secure control over aspects of the computer device including the commodity device control code. If a security risk is detected it may be mitigated in various ways, including disabling of the commodity device. Control code provided by third-parties (e.g., supplier of commodity device) may be validated and secured using disclosed techniques.Type: GrantFiled: July 29, 2019Date of Patent: October 1, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Stewart Gavin Goodson, II, Daniel Humphrey, Robin Kelley Schrader
-
Patent number: 12105829Abstract: A remote browsing session is initiated between a remote browser client executing on a client device and a remote browser host executing on a remote browser server. The remote browser host receives from the client device, encrypted remote browser data of remote browser data that affects the remote browser session. The remote browser client does not have access to a decryption key for the encrypted remote browser data. The encrypted remote browser data is decrypted to reveal the remote browser data. The remote browser host is configured with the remote browser data. The remote browser host manages updates to the remote browser data during the remote browsing session. Periodically, updates to the remote browser data are encrypted and transmitted to the remote browser client for storage.Type: GrantFiled: May 16, 2023Date of Patent: October 1, 2024Assignee: CLOUDFLARE, INC.Inventors: Joshua Thomas Claeys, Benjamin Buzbee, Pierre Cauchois, Killian Koenig, Trevor Sundberg
-
Patent number: 12101298Abstract: An electronic device according to an embodiment includes a memory storing instructions, a global positioning system (GPS) receiver, a communication circuit, and a processor. The processor, when executing the instructions, is configured to establish a connection with a public access point (AP) to communicate with an external electronic device, obtain location information of the electronic device, maintain a state of mode for a VPN in an inactive state, based on transmitting information distinct from the location information, on a condition that the number of a plurality of electronic devices located within a reference distance from the public AP is less than a reference value, and switch the state of mode for VPN mode from the inactive state to an active state, based on transmitting the information on a condition that the number of the plurality of electronic devices is equal to or greater than the reference value.Type: GrantFiled: June 23, 2022Date of Patent: September 24, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Dongwon Seo, Seonghan Park, Jaehoon Jung
-
Patent number: 12074879Abstract: This disclosure describes techniques that include assessing trust in a computer network. In one example, this disclosure describes a method that includes determining a level of trust that a first network entity has for a second network entity; determining a level of trust that the second network entity has for a third network entity; determining that the first network entity is separated from the third network entity by the second network entity; determining, based on the level of trust that the first network entity has for the second network entity and further based on the level of trust that the second network entity has for the third network entity, a level of trust that the first network entity has for the third network entity; and enabling, based on the level of trust that the first network entity has for the third network entity, the first network entity to perform an operation with the third network entity.Type: GrantFiled: September 14, 2021Date of Patent: August 27, 2024Assignee: Juniper Networks, Inc.Inventors: Charles Damian O'Neill, Kieran Gerald McPeake, Simon James, Hayden Paul Shorter
-
Patent number: 12069033Abstract: A method for processing telegrams in an automation network provides a master subscriber to at least partially encrypt and output telegrams, respectively, to another subscriber. The other subscriber comprises an input port, a receiving logic connected to the input port, a decryption unit connected to the receiving logic, and a processing unit connected to the decryption unit and the receiving logic. The receiving logic is configured, when a telegram at least partially encrypted by the master subscriber is present at the input port, to forward an encrypted portion of the telegram to the decryption unit. The decryption unit is configured to decrypt the encrypted portion of the telegram with a key, and to forward the encrypted portion to the processing unit for processing. If an unencrypted telegram is present at the input port, the receiving logic is configured to forward the unencrypted telegram to the processing unit for processing.Type: GrantFiled: March 3, 2022Date of Patent: August 20, 2024Assignee: Beckhoff Automation GmbHInventors: Holger Büttner, Dirk Janssen, Erik Vonnahme, Hans Beckhoff, Thomas Rettig, Thorsten Bunte, Johannes Beckhoff
-
Patent number: 12069168Abstract: A passive continuous variable quantum key distribution scheme, where Alice splits the output of a thermal source into two beams, measures one locally and transmits the other mode to Bob after applying attenuation. A secure key can be established based on measurements of the two beams without the use of a random number generator or an optical modulator.Type: GrantFiled: February 21, 2022Date of Patent: August 20, 2024Assignee: UT-Battelle, LLCInventors: Bing Qi, Philip G. Evans, Warren P. Grice
-
Patent number: 12063314Abstract: A security event management system for an electronic connected network includes a public key infrastructure subsystem configured to generate a security ID for a connected device accessing the network, a digital ledger, a trigger list in operable communication with the digital ledger, and an event manager configured to (i) subscribe to the trigger list by defining at least one reportable event of which the trigger list is to advise the event manager, and (ii) receive a notification from the trigger list upon validation of the at least one reportable event behind the digital ledger.Type: GrantFiled: July 10, 2023Date of Patent: August 13, 2024Assignee: Cable Television Laboratories, Inc.Inventors: Steven J. Goeringer, Brian A. Scriber, Massimiliano Pala
-
Patent number: 12058257Abstract: Embodiments of the present disclosure relate to a data storage method, a data read method, an electronic device, and a computer program product. The data storage method includes: acquiring identifiers of a predetermined number of trusted nodes, the predetermined number being associated with a secret sharing scheme to be used; generating a predetermined number of shared portion sets from input data by using the identifiers respectively as parameters of the secret sharing scheme; and respectively storing the predetermined number of shared portion sets in the predetermined number of trusted nodes according to a correspondence relationship between the predetermined number of shared portion sets and the predetermined number of trusted nodes. With the technical solution of the present disclosure, input data can be efficiently protected with trusted nodes by using a secret sharing scheme, and the confidentiality and integrity of the input data can be guaranteed.Type: GrantFiled: February 18, 2022Date of Patent: August 6, 2024Assignee: Dell Products L.P.Inventors: Jinpeng Liu, Chao Chen, Yongjun Shi, Zhen Jia
-
Patent number: 12050720Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.Type: GrantFiled: January 11, 2021Date of Patent: July 30, 2024Assignee: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Patent number: 12045366Abstract: With respect to an information processing device which anonymizes data composed of records including one or more items through statistical processing, the information processing device includes a memory, and a processor configured to classify respective records constituting the data into one or more first sets, based on masking target items, a dictionary, and a selected hierarchy level indicating a hierarchy level selected in the tree structure for each of the masking target items, classify the respective records into one or more second sets with respect to a number of records belonging to each of the one or more first sets, and calculate a number of records of each of the one or more second sets and a ratio of records belonging to each of the one or more second sets to the records, and display the ratio in each hierarchy level of each of the masking target items.Type: GrantFiled: May 21, 2019Date of Patent: July 23, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventor: Yoshiyuki Mihara
-
Patent number: 12047357Abstract: Embodiments described herein are generally directed to a transparent and adaptable mechanism for performing secure application communications through sidecars. In an example, a set of security features is discovered by a first sidecar of a first microservice of multiple microservices of an application. The set of security features are associated with a device of multiple devices of a set of one or more host systems on which the first microservice is running. Information regarding the set of discovered security features is made available to the other microservices by the first sidecar by sharing the information with a discovery service accessible to all of the microservices. A configuration of a communication channel through which a message is to be transmitted from a second microservice to the first microservice is determined by a second sidecar of the second microservice by issuing a request to the discovery service regarding the first microservice.Type: GrantFiled: December 20, 2021Date of Patent: July 23, 2024Assignee: Intel CorporationInventors: Cesar Martinez-Spessot, Marcos Carranza, Lakshmi Talluru, Mateo Guzman, Francesc Guim Bernat, Karthik Kumar, Rajesh Poornachandran, Kshitij Arun Doshi
-
Patent number: 12045342Abstract: An information processing device (10) includes an anomaly receiving means (11) for receiving an anomaly detected by a monitoring device installed in a control system, a collating means (12) for receiving the anomaly from the anomaly receiving means (11), making a first determination to determine whether the anomaly matches each of predetermined collating conditions for collating an event contained in an attack procedure and the anomaly, and when the first determination results in a match, making a further second determination to determine whether an event contained in each of predefined attack procedures matches the collating condition determined to match the anomaly, and when the second determination results in a match, specifying an attack procedure containing the event, and an extracting means (13) for extracting an event matching a predetermined extraction condition from the specified attack procedure.Type: GrantFiled: October 28, 2019Date of Patent: July 23, 2024Assignee: NEC CORPORATIONInventor: Masafumi Watanabe
-
Patent number: 12039089Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.Type: GrantFiled: May 1, 2023Date of Patent: July 16, 2024Assignee: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Patent number: 12041181Abstract: An apparatus comprises a processing device configured to obtain, at a given one of a plurality of computing sites in a supply chain associated with a given computing device, one or more component verification data records associated with the given computing device. The component verification data records are obtained from a distributed ledger maintained by the plurality of computing sites in the supply chain. The component verification data records characterize provisioning actions performed on the given computing device by computing sites in the supply chain. The processing device is also configured to generate component verification data characterizing a current configuration of hardware and software components of the given computing device.Type: GrantFiled: March 9, 2022Date of Patent: July 16, 2024Assignee: Dell Products L.P.Inventor: Jeroen Diederik Cornelis Antonius Mackenbach
-
Patent number: 12041050Abstract: A method for authenticating a device based on a wireless power transmission signal includes receiving, at an authenticating device, a wireless power transmission signal for authentication of a user device attempting to accessing a resource, where the wireless power transmission signal includes a unique identifier for the user device. The method further includes translating, at the authenticating device, the wireless power transmission signal, wherein the unique identifier for the user device is embedded in the wireless power transmission signal as a bit representation. In response to authenticating the user device based on a translated wireless power transmission signal, the method further includes granting, the user device, access to the resource.Type: GrantFiled: February 16, 2022Date of Patent: July 16, 2024Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Shailendra Moyal, Venkata Vara Prasad Karri, Sarbajit K Rakshit
-
Patent number: 12034765Abstract: Off-the-shelf computing systems, even in the presence of malware infecting those computing systems, are used to access securely other network computing systems—Secured sites. The use may take shape in various ways and the potential use of two, three, or more computing systems is described. The use in a malware-infected environment is advantageous and exposes hacking attempts in real-time.Type: GrantFiled: November 5, 2023Date of Patent: July 9, 2024Inventor: Mordecai Barkan