Patents Examined by Aubrey H. Wyszynski
  • Patent number: 11601473
    Abstract: In some examples, a system receives input information relating to a security level for an information technology (IT) stack comprising a plurality of layers including a hardware layer and a software layer, where the input information is technology and product agnostic. The system discovers components of the plurality of layers of the IT stack, accesses a knowledge base that maps the security level and the discovered components to configuration instructions relating to security controls, and configures the IT stack with the security controls using the configuration instructions.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: March 7, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Suhas Shivanna, Sridhar Bandi, Yelaka Surya Prakash, Shiva R. Dasari
  • Patent number: 11601282
    Abstract: A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.
    Type: Grant
    Filed: October 26, 2020
    Date of Patent: March 7, 2023
    Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
    Inventors: Matthew Lewis Floyd, Leroy Luther Smith, Jr., Brittney Benzio, Nathan Barnard, Shannon Marie Lowry
  • Patent number: 11601438
    Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: March 7, 2023
    Assignee: Fortinet, Inc.
    Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
  • Patent number: 11595400
    Abstract: An information processing system includes: a first authentication unit that authenticates a user by a first method; a first providing unit that provides a service to the user authenticated by the first authentication unit; a second authentication unit that authenticates a user by a second method; and a second providing unit that provides a service to the user authenticated by the second authentication unit and also provides a service to the user authenticated by the first authentication unit in a case where the first method satisfies a condition determined according to the second method.
    Type: Grant
    Filed: July 16, 2020
    Date of Patent: February 28, 2023
    Assignee: FUJIFILM Business Innovation Corp.
    Inventor: Junya Kato
  • Patent number: 11595401
    Abstract: A method for workload security rings that includes receiving a plurality of workloads, each associated with respective security criteria and scheduled for execution on a distributed computing system divided into a plurality of security rings each associated with a respective subset of computing devices of the distributed computing system that is physically isolated from the other security rings. For each respective workload, the method includes determining, using the respective security criteria, a security level of the respective workload and identifying, using the security level of the respective workload, one or more of the plurality of security rings that are eligible for executing the respective workload. The method also includes executing the respective workload on one or more computing devices selected from one of the respective subsets of computing devices associated with the identified one or more of the plurality of security rings eligible for executing the respective workload.
    Type: Grant
    Filed: April 10, 2021
    Date of Patent: February 28, 2023
    Assignee: Google LLC
    Inventors: Rainer Wolafka, Aaron Joyner, Ken Stillson, Michael Czapinski
  • Patent number: 11595379
    Abstract: This disclosure describes a computer implemented method for receiving authentication credentials identifying a user; identifying computing systems for which the user is authorized access to; and transmitting tokens granting access to the identified computing systems. In some embodiments, no two tokens of the transmitted tokens grants access to the same one of the identified computing systems. The user typically has access to a management tool configured to manage the transmission of the received tokens to the corresponding computing systems, thereby granting the user the ability to have seamless access to any of the computing systems associated with the user's authenticated identity.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: February 28, 2023
    Assignee: VMware, Inc.
    Inventors: Michal A. Jankowski, Mark Johnson, Fanny Strudel, Zachary James Shepherd
  • Patent number: 11586765
    Abstract: Disclosed herein is a storage platform for managing privacy compliance in an organization. The storage platform comprises a plurality of storage servers and at least one storage controller. The at least one storage controller receives user data from a user associated with the organization and splits the user data into a plurality of data chunks. Further, each data chunk of the plurality of data chunks are stored on a separate storage server selected from the plurality of storage servers. Also, each of the plurality of data chunks are encrypted using encryption keys stored on a distributed ledger. Thereafter, an authentication token corresponding to the stored user data is generated and provided to the user to enable the user to securely share the stored user data with the organization.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: February 21, 2023
    Assignee: OCHAIN, LLC
    Inventor: Saswata Basu
  • Patent number: 11586742
    Abstract: The present disclosure provides a data processing method, a data processing device, and a computer readable storage medium. The data processing method includes: determining an encryption key according to first data; encrypting second data with the encryption key; and storing the first data in association with the encrypted second data.
    Type: Grant
    Filed: April 13, 2018
    Date of Patent: February 21, 2023
    Assignee: BOE TECHNOLOGY GROUP CO., LTD.
    Inventor: Zhenglong Li
  • Patent number: 11563777
    Abstract: A network intrusion system for a protected network includes a ruleset module configured to receive metadata for rules. The metadata describes, for each of the rules, a set of associated network vulnerabilities. The ruleset module is configured to access vulnerability information describing a set of cumulative vulnerabilities that each is present in at least one network device within the protected network. The network intrusion system includes a rule management module configured to, for each rule of the plurality of rules: identify the set of associated network vulnerabilities described by the metadata for the rule, determine whether there is a match between any of the set of associated network vulnerabilities and the set of cumulative vulnerabilities, and, in response to determining that there is no match, transmit a first command signal to a network security module. The first command signal instructs the network security module to disable the rule.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: January 24, 2023
    Assignee: TD Ameritrade IP Company, Inc.
    Inventors: Brandon William Scherer, John Scott Kula
  • Patent number: 11563778
    Abstract: A user of a client device accesses a service provided by a server computer. The server computer gathers data about the user. The data gathered may be kept private by the server computer, shared only with other computers and users owned by the same entity, shared with selected third parties, or made public. The server computer provides a privacy policy document that describes how the data gathered is used. A privacy server analyzes the privacy policy document and, based on the analysis, generates a privacy score. The privacy score or an informational message selected based on the privacy score are provided to the client device. In response, the client device presents the privacy score or the informational message to the user. In this way, the user is informed of privacy risks that result from accessing the server computer.
    Type: Grant
    Filed: October 15, 2020
    Date of Patent: January 24, 2023
    Assignee: IDENTITY THEFT GUARD SOLUTIONS, INC.
    Inventors: Brent VanLoo, Christopher Semke, Doug Pollack
  • Patent number: 11558395
    Abstract: Techniques for ensuring the security of cognitive insights are disclosed. A request to generate a cognitive insight is received from a requestor. The requestor is associated with a requestor data security level. The cognitive insight is generated using a first machine learning model and a plurality of data sources, each data source associated with a respective data security level. An insight data security level for the generated cognitive insight is identified based on the insight and the plurality of data sources. A first data security level associated with a data source of the plurality of data sources is modified, based on the identified insight data security level. It is determined, based on the requestor data security level and the insight data security level, that the requestor is authorized to access the generated insight. In response the generated insight is provided to the requestor.
    Type: Grant
    Filed: May 6, 2020
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventor: Shailaja Mallya
  • Patent number: 11550692
    Abstract: A method may include receiving an event from an event source. The event may correspond to event data. The event source may be a container executing an image. The image may correspond to image metadata including attributes describing the image. The method may further include combining the event data with the image metadata to obtain enriched data, detecting, using the enriched data, a deviation from a policy, and in response to detecting the deviation from the policy, performing an action to enforce the policy.
    Type: Grant
    Filed: November 29, 2019
    Date of Patent: January 10, 2023
    Assignee: Intuit Inc.
    Inventors: Amit Shriram Kalamkar, Edward Kihyen Lee
  • Patent number: 11528124
    Abstract: Various embodiments relate to a method for securely comparing a first polynomial represented by a plurality of arithmetic shares and a second compressed polynomial represented by a bitstring where the bits in the bitstring correspond to coefficients of the second polynomial, including: performing a first masked shift of the shares of the coefficients of the first polynomial based upon the start of the interval corresponding to the compressed coefficient of the second polynomial and a modulus value; performing a second masked shift of the shares of the coefficients of the first polynomial based upon the end of the interval corresponding to the compressed coefficient of the second polynomial; bitslicing the most significant bit of the first masked shift of the shares coefficients of the first polynomial; bitslicing the most significant bit of the second masked shift of the shares coefficients of the first polynomial; and combining the first bitsliced bits and the second bitsliced bits using an AND function to p
    Type: Grant
    Filed: April 7, 2021
    Date of Patent: December 13, 2022
    Assignee: NXP B.V.
    Inventors: Marc Gourjon, Joppe Willem Bos, Joost Roland Renes, Tobias Schneider, Christine van Vredendaal
  • Patent number: 11516239
    Abstract: System, device, and method of adaptive network protection for managed Internet-of-Things (IoT) services. A network traffic monitoring unit monitors data traffic, operations-and-management traffic, and control messages, that relate to cellular communication between an IoT device and a core cellular network. An IoT grouping unit groups multiple IoT devices into a particular IoT group. A baseline behavior determination unit determines a Regular Baseline Cellular Communication Behavior (RBCCB) profile that characterizes the cellular communications that are outgoing from and incoming to each member of the particular IoT group. An outlier detector subsequently detects that a particular IoT device of that particular IoT group, exhibits cellular traffic characteristics that are abnormal relative to the RBCCB profile that was characterized for that particular IoT group.
    Type: Grant
    Filed: November 4, 2020
    Date of Patent: November 29, 2022
    Assignee: ALLOT LTD.
    Inventors: Nimrod Dezent, Itai Ephraim Zilbershtein, Asaf Shahar
  • Patent number: 11503076
    Abstract: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.
    Type: Grant
    Filed: July 20, 2020
    Date of Patent: November 15, 2022
    Assignee: Fornetix LLC
    Inventors: Charles White, Joseph Brand, Stephen Edwards
  • Patent number: 11496284
    Abstract: Techniques are provided for detection of unauthorized encryption in a storage system using key length evaluation. One method comprises determining a key length of an encryption key used to encrypt data associated with one or more write commands in a storage system; evaluating the key length relative to an expected key length; and performing one or more automated remedial actions, such as generating an alert notification, in response to the key length being different than the expected key length. A count of a number of write operations in a given folder can be compared to a number of files in the given folder and an alert notification can be generated in response to the count of the number of write operations in the given folder having a same value as the number of files in the given folder.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: November 8, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Yevgeni Gehtman, Maxim Balin, Tomer Shachar
  • Patent number: 11481480
    Abstract: A device authenticates a request to verify a user. The device accesses a face image that depicts a face of the person and includes a characteristic noise pattern inserted by a camera of the device. The device also accesses a geolocation at which the device captured the face image and inputs the face image and the geolocation into an artificial intelligence engine that outputs a face score, a device score, and a location score. The device next submits the request with the scores to a server machine and obtains an authentication score from the server machine. The device then presents an indication that the request to verify the person is authentic based on a comparison of the obtained authentication score to a threshold authentication score.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: October 25, 2022
    Assignee: Callsign Inc.
    Inventors: Gabriel Dominguez Conde, Yogesh Kumar Jitendra Patel, Peter Alexander Foster
  • Patent number: 11456854
    Abstract: A cryptographic module is switchable between a key-input mode and a data-input mode. In the key-input mode, the cryptographic module receives key data, key length information and first input data, combines an amount of the key data corresponding to the key length information with the first input data to produce combined data, wherein a key-influenced length of the combined data is the shortest length of the combined data that contains every data bit of the combined data whose value depends on the key data. It performs a cryptographic operation on the combined data to generate first output data and does not output any of the first output data until after the cryptographic operation has been applied to all of the key-influenced length of the combined data.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: September 27, 2022
    Assignee: Nordic Semiconductor ASA
    Inventors: Kauko Kutti, Jarmo Veikkola, Marko Winblad
  • Patent number: 11451515
    Abstract: Techniques managing access rules are provided. Access rules and their associated profiles are determined for evaluation. A triggering rate or a triggering percentage can be used to indicate efficacy of the rule. Recommendations can be provided based on a triggering percentage difference of the rule during a predetermined period of time. The recommendations can be provided in an interactive user interface.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: September 20, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Benjamin Scott Boding, Christopher Holmes, Cory Siddens, Henry Wong
  • Patent number: 11438384
    Abstract: An aggregated networking device subsystem station move control system includes first and second aggregated networking devices connected via an ICL. The first aggregated networking device receives a MAC address from the second aggregated networking device that was learned on an orphan port that has port security enabled and a station-move-deny configuration, and generates a static MAC address entry in its MAC address table that associates the MAC address with the ICL. The static MAC address entry causes data packets received on non-ICL ports on the first aggregated networking device that include the MAC address to generate a static MAC move violation. The first aggregated networking device also programs rule(s) that, in response to data packets being received on its non-ICL ports that have port security disabled and generating a static MAC move violation, causes the association of the MAC address with that non-ICL port.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: September 6, 2022
    Assignee: Dell Products L.P.
    Inventors: Saye Balasubramaniam Subramanian, Damodharan Sreenivasagaperumal