Patents Examined by Amare F Tabor
-
Patent number: 12045366Abstract: With respect to an information processing device which anonymizes data composed of records including one or more items through statistical processing, the information processing device includes a memory, and a processor configured to classify respective records constituting the data into one or more first sets, based on masking target items, a dictionary, and a selected hierarchy level indicating a hierarchy level selected in the tree structure for each of the masking target items, classify the respective records into one or more second sets with respect to a number of records belonging to each of the one or more first sets, and calculate a number of records of each of the one or more second sets and a ratio of records belonging to each of the one or more second sets to the records, and display the ratio in each hierarchy level of each of the masking target items.Type: GrantFiled: May 21, 2019Date of Patent: July 23, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventor: Yoshiyuki Mihara
-
Patent number: 12045342Abstract: An information processing device (10) includes an anomaly receiving means (11) for receiving an anomaly detected by a monitoring device installed in a control system, a collating means (12) for receiving the anomaly from the anomaly receiving means (11), making a first determination to determine whether the anomaly matches each of predetermined collating conditions for collating an event contained in an attack procedure and the anomaly, and when the first determination results in a match, making a further second determination to determine whether an event contained in each of predefined attack procedures matches the collating condition determined to match the anomaly, and when the second determination results in a match, specifying an attack procedure containing the event, and an extracting means (13) for extracting an event matching a predetermined extraction condition from the specified attack procedure.Type: GrantFiled: October 28, 2019Date of Patent: July 23, 2024Assignee: NEC CORPORATIONInventor: Masafumi Watanabe
-
Patent number: 12041181Abstract: An apparatus comprises a processing device configured to obtain, at a given one of a plurality of computing sites in a supply chain associated with a given computing device, one or more component verification data records associated with the given computing device. The component verification data records are obtained from a distributed ledger maintained by the plurality of computing sites in the supply chain. The component verification data records characterize provisioning actions performed on the given computing device by computing sites in the supply chain. The processing device is also configured to generate component verification data characterizing a current configuration of hardware and software components of the given computing device.Type: GrantFiled: March 9, 2022Date of Patent: July 16, 2024Assignee: Dell Products L.P.Inventor: Jeroen Diederik Cornelis Antonius Mackenbach
-
Patent number: 12041050Abstract: A method for authenticating a device based on a wireless power transmission signal includes receiving, at an authenticating device, a wireless power transmission signal for authentication of a user device attempting to accessing a resource, where the wireless power transmission signal includes a unique identifier for the user device. The method further includes translating, at the authenticating device, the wireless power transmission signal, wherein the unique identifier for the user device is embedded in the wireless power transmission signal as a bit representation. In response to authenticating the user device based on a translated wireless power transmission signal, the method further includes granting, the user device, access to the resource.Type: GrantFiled: February 16, 2022Date of Patent: July 16, 2024Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Shailendra Moyal, Venkata Vara Prasad Karri, Sarbajit K Rakshit
-
Patent number: 12039089Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.Type: GrantFiled: May 1, 2023Date of Patent: July 16, 2024Assignee: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Patent number: 12034767Abstract: An AI adversary red team configured to pentest email and/or network defenses implemented by a cyber threat defense system used to protect an organization and all its entities. AI model(s) trained with machine learning on contextual knowledge of the organization and configured to identify data points from the contextual knowledge including language-based data, email/network connectivity and behavior pattern data, and historic knowledgebase data. The trained AI models cooperate with an AI classifier in producing specific organization-based classifiers for the AI classifier. A phishing email generator generates automated phishing emails to pentest the defense systems, where the phishing email generator cooperates with the AI models to customize the automated phishing emails based on the identified data points of the organization and its entities. The customized phishing emails are then used to initiate one or more specific attacks on one or more specific users associated with the organization and its entities.Type: GrantFiled: February 26, 2021Date of Patent: July 9, 2024Assignee: Darktrace Holdings LimitedInventors: Maximilian Florian Thomas Heinemeyer, Stephen James Pickman, Carl Joseph Salji
-
Patent number: 12034765Abstract: Off-the-shelf computing systems, even in the presence of malware infecting those computing systems, are used to access securely other network computing systems—Secured sites. The use may take shape in various ways and the potential use of two, three, or more computing systems is described. The use in a malware-infected environment is advantageous and exposes hacking attempts in real-time.Type: GrantFiled: November 5, 2023Date of Patent: July 9, 2024Inventor: Mordecai Barkan
-
Patent number: 12034755Abstract: Computer software that assesses risks for security threat events by that performing the following operations: (i) receiving information pertaining to a managed asset; (ii) identifying, based, at least in part, on the received information: a threat to the managed asset and, one or more corresponding security controls for mitigating the threat, the security controls having associated control criteria; (iii) utilizing a risk assessment engine to calculate a risk value for the threat based, at least in part, on the received information; (iv) calculating a certainty factor for the threat based, at least in part, on a measure of belief associated with the control criteria; and (v) performing a computer-based remediation action based, at least in part, on the risk value and the certainty factor.Type: GrantFiled: March 18, 2021Date of Patent: July 9, 2024Assignee: International Business Machines CorporationInventor: Douglas F Egan
-
Patent number: 12028333Abstract: A method for variable length decoding, the method including: receiving, in a default word length mode, at least one first data word having a default first word length; combining the received at least one first data word as a first portion of data; receiving, after the at least one first data word, a transition word indicative of transitioning to a variable word length mode; receiving, after the transition word, a first word length word indicative of a second word length; receiving, after the first word length word, at least one second data word having the second word length; and combining the received at least one second data word as a second portion of the data.Type: GrantFiled: February 9, 2021Date of Patent: July 2, 2024Assignee: Kara Partners LLCInventors: Brian Penny, Desmond Penny
-
Patent number: 12021848Abstract: Systems, methods, and apparatus for satellite operations with a secure enclave for secure hosted payload operations are disclosed. In one or more embodiments, a disclosed method for payload operations comprises receiving, by a command receiver on a vehicle (e.g., a satellite), host commands from a host spacecraft operations center (SOC). The method further comprises reconfiguring a host payload on the vehicle according to the host commands. Also the method comprises transmitting, by a telemetry transmitter on the vehicle, host payload telemetry to the host SOC. In addition, the method comprises receiving, by a payload antenna on the vehicle, hosted commands from a secure enclave of the host SOC. Additionally, the method comprises reconfiguring a hosted payload on the vehicle according to the hosted commands. Further, the method comprises transmitting, by the payload antenna, host payload data, hosted payload data, and hosted telemetry to the secure enclave of the host SOC.Type: GrantFiled: May 10, 2023Date of Patent: June 25, 2024Assignee: The Boeing CompanyInventors: Robert J. Winig, Yi-Feng J. Chen
-
Patent number: 12019765Abstract: According to an embodiment, a cryptographic processing device is described comprising a memory configured to store a first operand and a second operand and a cryptographic processor configured to determine, for cryptographically processing the data, the product of the first operand with the second operand by determining, for each result word index in a result word index range, a result data word for the result word index by accumulating products of sums of words of the first operand and the second operand and subtracting excess terms.Type: GrantFiled: December 13, 2021Date of Patent: June 25, 2024Assignee: Infineon Technologies AGInventor: Erich Wenger
-
Patent number: 12021863Abstract: A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is adapted to be unreadable and unmodifiable by the chip or a chip reader. The chip also includes a comparator for providing an indicator of whether given input matches the second authentication code. The chip also includes an authentication circuit that is operable to read the first authentication code from the first memory region, present the first authentication code to the comparator, and in response to receiving an indicator from the comparator indicating that the first and second authentication codes match, unlock at least one of (i) a communication interface of the chip to allow data to be transmitted therethrough to a chip reader and (ii) a third memory region of the chip to allow data to be read therefrom.Type: GrantFiled: April 18, 2022Date of Patent: June 25, 2024Assignee: CARDEX SYSTEMS INC.Inventors: Dennis Bernard Van Kerrebroeck, Craig Michael Horn, Bernard Marie-Andre Van Kerrebroeck
-
Patent number: 12003660Abstract: The invention relates to processes and systems for using Web Real-Time Communications (RTC) to connect and communicate with devices used in an Internet of Things (IoT) framework, and devices made for the same.Type: GrantFiled: December 31, 2021Date of Patent: June 4, 2024Assignee: AVILA TECHNOLOGY, LLCInventor: Robert Bernardi
-
Patent number: 11991212Abstract: A system and method for optimizing a defense model using available security capabilities are provided. The method includes obtaining a defense model and an optimal security application implementation associated with the defense model; evaluating available security capabilities deployed in an enterprise environment to determine a plurality of variant security applications implementing the defense model; determining a quality score for each of the plurality of the variant security applications; selecting, from the plurality of variant security applications, a variant security application having a highest quality score; and executing the selected variant security application.Type: GrantFiled: October 19, 2022Date of Patent: May 21, 2024Assignee: Cybereason Inc.Inventors: Rami Cohen, Avi Chesla
-
Patent number: 11991078Abstract: Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.Type: GrantFiled: February 7, 2023Date of Patent: May 21, 2024Assignee: Eluvio, Inc.Inventors: Serban Simu, Michelle Munson
-
Patent number: 11979382Abstract: A method including configuring a VPN server to utilize a first exit IP address to transmit a query to a host device for requesting data of interest; configuring the VPN server to determine that the host device has blocked the first exit IP address; configuring the VPN server to establish, based on determining that the host device has blocked the first exit IP address, a secure connection with a secondary server to enable communication of encrypted information; and configuring the VPN server to transmit, to the secondary server over the secure connection, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to transmit a second query to request the data of interest based on utilizing a second exit IP address, different from the first exit IP address is disclosed. Various other aspects are contemplated.Type: GrantFiled: October 5, 2022Date of Patent: May 7, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, Darius Simanel
-
Patent number: 11979380Abstract: A method including determining, by a VPN server based on requesting data of interest from a host device, that the host device has declined to provide the data of interest to the VPN server; verifying, by the VPN server, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; establishing, by the VPN server based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information between the VPN server and the secondary server; and transmitting, by the VPN server to the secondary server over the secure connection, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.Type: GrantFiled: October 5, 2022Date of Patent: May 7, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, Darius Simanel
-
Patent number: 11979381Abstract: A method including configuring a VPN server to determine, based on requesting data of interest from a host device, that the host device has declined to provide the data of interest; configuring the VPN server to verify, based on determining that the host device has declined to provide the data of interest, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; configuring the VPN server to establish, based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information; and configuring the VPN server to transmit, to the secondary server, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.Type: GrantFiled: October 5, 2022Date of Patent: May 7, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, Darius Simanel
-
Patent number: 11979412Abstract: Techniques to facilitate verification of in-situ network telemetry data of data packet of data traffic of packet-switched networks are described herein. A technique described herein includes a network node obtaining a data packet of data traffic of a packet-switched network. The data packet includes an in-situ network telemetry block. The network node obtains telemetry data and cryptographic key. The cryptographic key confidentially identifies the network node. The node encrypts at least a portion of the telemetry data based on the cryptographic key to produce signed telemetry data and updates telemetry-data entry of the in-situ network telemetry block. The telemetry data and signed telemetry data is inserted into the telemetry-data entry. The node forwards the data packet with the updated telemetry-data entry to another network node of the packet-switched network.Type: GrantFiled: May 9, 2023Date of Patent: May 7, 2024Assignee: Cisco Technology, Inc.Inventors: Shwetha Subray Bhandari, Santhosh N, Rakesh Reddy Kandula, Saiprasad Reddy Muchala, Frank Brockners
-
Patent number: 11968187Abstract: Systems, methods, and apparatus for a MILS HPC, data storage system (DSS) system architecture that incorporates a multi-crypto module (MCM) to provide end-to-end multi-independent level security (MILS) protection. Configuration of each MCM enables a high performance computing (HPC) resource to compute different security domains with the associated security level keys from a key/node manager. The HPC resource can be dynamically re-allocated to different security level domain(s) by the key/node manager. In one embodiment, the DSS stores encrypted data regardless of the domains.Type: GrantFiled: October 21, 2021Date of Patent: April 23, 2024Assignee: SECTURION SYSTEMS, INC.Inventors: Richard J. Takahashi, Timothy Paul Abel, Benjamin Kirk Nielson