Patents Examined by Anthony D Brown
-
Patent number: 12200484Abstract: A communication method and a communications device, where the communication method includes: When a user equipment roams from a first network to a second network, a first core network device receives a first request, where the first request is a user authentication request or an authentication data request, where the first request carries an authentication vector request indication, where the second network is a 5G standalone network, where the first network is a 5G non-standalone network, and where the first core network device is in the first network. The first core network device generates an authentication vector quintet based on the authentication vector request indication, where a 0th bit of an authentication management field in the authentication vector quintet is set to 1. The first core network device sends a response to the first request, where the response to the first request carries the authentication vector quintet.Type: GrantFiled: September 30, 2021Date of Patent: January 14, 2025Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Fei Li, Ruchuan Du
-
Patent number: 12192174Abstract: Embodiments described herein relate generally to network-based threat detection mechanisms. Specifically, embodiments described herein describe a communication mechanism that filters (e.g., allows or blocks) received communications according to an iterative security list.Type: GrantFiled: May 23, 2022Date of Patent: January 7, 2025Assignee: The Western Union CompanyInventor: Ricardo Ledezma Henry
-
Patent number: 12184643Abstract: A central entity can be in communication with a terminal and a plurality of authentication entities. The central entity can receive a token from the terminal and the central entity can decide to transmit the token to a subset of the plurality of authentication entities. The authentication entities which receive the token, can verify or authenticate the token and transmit an authentication message to the central entity. Based on the authentication messages, the central entity can transmit a message to the terminal indicating which authentication entities authenticated or verified the user and/or a request associated with the user.Type: GrantFiled: March 15, 2023Date of Patent: December 31, 2024Assignee: CAPITAL ONE SERVICES, LLCInventors: Jeremy Phillips, Joseph Goldstein
-
Patent number: 12184444Abstract: A building system including one or more memory devices configured to store instructions that cause one or more processors to store a graph data structure in a data storage device including a plurality of nodes representing a plurality of entities and a plurality of edges between the plurality of nodes representing a plurality of relationships between the plurality of entities, wherein the plurality of entities include a first entity representing one of a person, place, or piece of equipment of the building, wherein a second entity of the plurality of entities represents a software component, wherein the software component performs operations for the person, place, or piece of equipment of the building indicated by one or more edges of the plurality of edges relating the first entity to the second entity and cause the software component to execute and perform the operations for the person, place, or piece of equipment.Type: GrantFiled: October 13, 2023Date of Patent: December 31, 2024Assignee: JOHNSON CONTROLS TECHNOLOGY COMPANYInventors: Youngchoon Park, Sudhi Sinha
-
Patent number: 12177259Abstract: In an embodiment, a method automatically determines a networked data center architecture. In the method, a database describing capabilities of a data center provider is assembled. The database describes capabilities of a plurality of data centers of the data center provider. A specification of requirements for the networked data center architecture is received. The specification describes data processing and connectivity requirements of a customer of a data center provider. The database is searched to determine a solution including a plurality of connections and data center that satisfy the specification. Based on the searching, the solution is output as a recommendation to provide the networked data center architecture. In another embodiment, options for a networked data center architecture are visualized. In yet another embodiment, API calls are made to provision the networked data center architecture.Type: GrantFiled: November 8, 2023Date of Patent: December 24, 2024Assignee: DIGITAL PORPOISE, LLCInventors: Scott William Mills, Brooke James Mouland, Scott Michael Wallace, Okechukwu Ekene Keke, Brian Andrew Cade, Travis Duane Ewert
-
Patent number: 12177262Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: GrantFiled: March 28, 2024Date of Patent: December 24, 2024Assignee: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Patent number: 12177260Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: GrantFiled: March 28, 2024Date of Patent: December 24, 2024Assignee: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Patent number: 12170652Abstract: A packet transmission method and apparatus, and a computer storage medium, and relates to the field of communications technologies. A first device obtains service type information of an original packet. The first device generates an encapsulating security payload (ESP) packet of the original packet based on a target security association, where the ESP packet includes a packet header, an ESP header, a service type field, a first encrypted part, and an ESP authentication data field, and the service type field includes the service type information. The first device sends the ESP packet to a second device. The second device parses the service type field to obtain the service type information of the original packet. The second device performs a target operation on the ESP packet based on a service policy and the service type information of the original packet.Type: GrantFiled: February 15, 2022Date of Patent: December 17, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Chunning Wang
-
Patent number: 12158979Abstract: The technology disclosed herein enable consumer devices to verify the integrity of services running in trusted execution environments. An example method may include: establishing, by a computing device, a trusted execution environment for a service, wherein the trusted execution environment comprises an encrypted storage area; loading, by the computing device, data of the service into the trusted execution environment, wherein the data comprises executable data; detecting, by a computing device, a change of the trusted execution environment that is executing the service; generating, by the computing device, integrity data that represents a state of the trusted execution environment after the change; and transferring, by the computing device, the integrity data to another computing device.Type: GrantFiled: July 30, 2021Date of Patent: December 3, 2024Assignee: Red Hat, Inc.Inventors: Michael Hingston McLaughlin Bursell, Lilian Sturmann
-
Patent number: 12158935Abstract: A facial authentication apparatus comprises: a camera arranged at a position capable of facing an authentication object person and captures a face image of the authentication object person; a display arranged below the camera and displays the face image captured by the camera; a card reader arranged below the display and on a front side as seen from the authentication object person, and reads a card presented by the authentication object person; and a wall member(s) arranged so as to extend to at least a front end portion of the card reader from an upper end portion of the display.Type: GrantFiled: December 29, 2022Date of Patent: December 3, 2024Assignee: NEC CORPORATIONInventor: Takehiro Ichikawa
-
Patent number: 12153656Abstract: Biometric-based graded authentication provides a passive, graded authentication system, which uses face authentication to provide users access to their devices without requiring manual interaction with the lock screen. Biometric-based graded authentication permits users to categorize applications into various security bins based on their sensitivity. By doing so biometric-based graded authentication method grants access to different sensitivity applications, based on varying degrees of confidence in user authentication. Thus, allowing the device to be used even in adverse lighting conditions without hampering user experience. While the use of face authentication is used to discuss the system, biometric-based graded authentication as disclosed herein may be used with any confidence-based biometric system.Type: GrantFiled: November 10, 2021Date of Patent: November 26, 2024Assignee: ARIZONA BOARD OF REGENTS ON BEHALF OF THE UNIVERSITY OF ARIZONAInventors: Shravan Aras, Chris Gniady
-
Patent number: 12155648Abstract: A method including transmitting, by an infrastructure device to a user device, an invitation link to enable the user device to receive network services from the infrastructure device; transmitting, by the infrastructure device to the user device based at least in part on the user device activating the invitation link, seed information to be utilized by the user device to determine authentication information; receiving, by the infrastructure device from the user device during an active communication session, a user request related to an action to be performed regarding receiving the network services, the user request being signed based at least in part on utilizing a first portion of the authentication information; and enabling, by the infrastructure device, performance of the action regarding receiving the network services based at least in part on verifying that the communication session is currently active is disclosed. Various other aspects are contemplated.Type: GrantFiled: November 25, 2022Date of Patent: November 26, 2024Assignee: UAB 360 ITInventors: Dovydas Bespalovas, Mindaugas Valkaitis
-
Patent number: 12155649Abstract: A method including receiving, by a user device from an infrastructure device, an invitation link to enable the user device to receive network services from the infrastructure device; receiving, by the user device from the infrastructure device based on the user device activating the invitation link, seed information to be utilized by the user device to determine authentication information; transmitting, by the user device to the infrastructure device during an active communication session and based on determining the authentication information, a user request related to an action to be performed regarding receiving the network services, a portion of the user request being signed based on utilizing a first portion of the authentication information; and performing, by the user device, the action regarding receiving the network services based on a verification that the communication session is currently active is disclosed. Various other aspects are contemplated.Type: GrantFiled: November 25, 2022Date of Patent: November 26, 2024Assignee: UAB 360 ITInventors: Dovydas Bespalovas, Mindaugas Valkaitis
-
Patent number: 12143410Abstract: The technology disclosed relates to analysis of security posture of a cloud environment. In particular, the disclosed technology relates to a system and method for analysis of infrastructure posture of a cloud environment, that include detecting a triggering criterion corresponding to initiation of an update scan of the infrastructure posture of the cloud environment, and invoking an incremental change detector based on the triggering criterion. The incremental change detector is configured to scan the cloud environment and return a scan result that identifies one or more changes to a set of infrastructure assets in the cloud environment within a selected time period. A cloud infrastructure graph is updated based on the one or more changes to the set of infrastructure assets, wherein the cloud infrastructure graph defines nodes that represent resources in the cloud environment and edges, between the nodes, that represent relationships between the resources.Type: GrantFiled: October 4, 2023Date of Patent: November 12, 2024Assignee: Normalyze, Inc.Inventors: Mummoorthy Murugesan, Vivek Jeyakumar, Ravishankar Ganesh Ithal
-
Patent number: 12132739Abstract: A computer-implemented method includes: (i) receiving location information that represents a physical location of a user; (ii) receiving first sensor data that has been generated by a sensor on a client device of the user; (iii) in response to receiving the first sensor data, obtaining second sensor data that has been generated by a sensor on a sensor device and that represents an environmental condition of an area around the physical location; (iv) determining whether the first sensor data matches the second sensor data; and (v) in response to determining that the first sensor data matches the second sensor data, determining that the user is authentic.Type: GrantFiled: July 8, 2021Date of Patent: October 29, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: David Ash, Vlad Dabija, Shmuel Ur
-
Blockchain management platform for performing asset adjustment, cross sectional editing, and bonding
Patent number: 12132819Abstract: Aspects of the disclosure relate to processing systems for performing cross-sectional asset editing. A computing platform may receive permission to perform a first subset of event processing steps. The computing platform may delegate permission to an external event processor to perform a second subset of event processing steps and to an external resource management platform to perform a third subset of event processing steps. The computing platform may generate an element chain corresponding to the account. In response to receiving a request to process an event, the computing platform may add a sub-element to the element chain containing a fixed parameter corresponding to an expected value associated with the event and a variable parameter corresponding to an actual value associated with the event. In response to receiving a request to write the actual value to the element chain, the computing platform may modify the variable parameter of the sub-element accordingly.Type: GrantFiled: July 27, 2023Date of Patent: October 29, 2024Assignee: Bank of America CorporationInventors: Manu Kurian, Joseph Castinado -
Patent number: 12124573Abstract: An event processing method performed by a computing device is provided. The method may comprise receiving a plurality of events and generating a first event sequence in which the received events are sequentially arranged, determining first priorities for the events included in the first event sequence, using data output from a previously trained priority decision model, verifying the first priorities by comparing the first priorities with second priorities for the events included in the first event sequence, determining a feedback score for the first priorities based on results of the verification; and reinforcing the training of the priority decision model using the feedback score.Type: GrantFiled: January 24, 2024Date of Patent: October 22, 2024Assignee: KOREA INTERNET & SECURITY AGENCYInventors: Joon Hyung Lim, Tae Eun Kim, Ki Jong Son, Sae Woom Lee, Seul Ki Choi, Tae Hyeon Kim
-
Patent number: 12126594Abstract: A method for detecting fraudulent transactions entering a payment environment, the method comprising: receiving packets of a transaction from a network; reconstructing and framing the packets into respective transaction messages; decoding each transaction message into its respective fields; correlating the respective transaction messages into an end-to-end model of the transaction; applying one or more predefined rules to the respective fields to determine whether the transaction is fraudulent; when the transaction is determined to be fraudulent, determining one or more specified fields of the respective fields to use to selectively block, deny, or rate limit the transaction; selecting a corresponding predefined rule from a server rule base; storing the predefined rule in a transaction firewall rule base; and, applying the predefined rule to the transaction to selectively block, deny, or rate limit the transaction based on content of the one or more specified fields in the transaction.Type: GrantFiled: May 16, 2022Date of Patent: October 22, 2024Assignee: INETCO SYSTEMS LIMITEDInventor: Ugan Naidoo
-
Patent number: 12113642Abstract: A building system including one or more memory devices configured to store instructions that cause one or more processors to store a graph data structure in a data storage device including a plurality of nodes representing a plurality of entities and a plurality of edges between the plurality of nodes representing a plurality of relationships between the plurality of entities, wherein the plurality of entities include a first entity representing one of a person, place, or piece of equipment of the building, wherein a second entity of the plurality of entities represents a software component, wherein the software component performs operations for the person, place, or piece of equipment of the building indicated by one or more edges of the plurality of edges relating the first entity to the second entity and cause the software component to execute and perform the operations for the person, place, or piece of equipment.Type: GrantFiled: October 13, 2023Date of Patent: October 8, 2024Assignee: JOHNSON CONTROLS TECHNOLOGY COMPANYInventors: Youngchoon Park, Sudhi Sinha
-
Patent number: 12107851Abstract: An authentication system for granting access to an account associated with a user. An authenticator of the authentication system including a processor and a memory, the authenticator configured to: receive a request for authentication that identifies the user; access an authentication account associated with the user, wherein the authentication account indicates a smart device associated with the user; activate a control parameter of the smart device, wherein the control parameter may cause an effect in a media sample from the smart device; receive the media sample from the smart device and determine if the effect corresponding to the control parameter is observed in the media sample; and in response to a determination that the effect is not observed in the media sample, indicate that the request for authentication is a fraudulent request.Type: GrantFiled: March 13, 2023Date of Patent: October 1, 2024Assignee: United Services Automobile Association (USAA)Inventors: Carlos J P Chavez, Sacha Melquiades De'Angeli, Oscar Guerra, David M. Jones, Jr., Gregory Brian Meyer, Christopher Russell, Arthur Quentin Smith