Patents Examined by Bassam Noaman
-
Patent number: 11050789Abstract: Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. A system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.Type: GrantFiled: June 15, 2017Date of Patent: June 29, 2021Assignee: Palo Alto Networks, Inc.Inventors: Sachin Verma, Leonid Burakovsky, Jesse C. Shu, Chang Li
-
Patent number: 11044764Abstract: A mobile computing device includes one or more interfaces to connect to one or more devices, and one or more processing devices, connected with the one or more interfaces. The one or more processing devices are to establish a first wireless connection with a first device. The first device lacks resources to connect to a cloud service directly. The one or more processing devices are also to receive data from the first device, provide the data to the cloud service, and in response to detecting a migration condition, disconnect the first wireless connection to allow establishment of a second wireless connection between the first device and a second device such that the second device receives subsequent data from the first device and provides the subsequent data to the cloud service.Type: GrantFiled: October 31, 2017Date of Patent: June 22, 2021Assignee: Ayla Networks, Inc.Inventors: Daniel J. Myers, III, Peter Hunt, Pankaj K. Gupta, Yipei Wang
-
Patent number: 11043299Abstract: Systems, methods, and software can be used to reduce network security risks in a medical care network. In some aspects, a method includes detecting, at a medical equipment monitor located in a network, an electronic device that is connected to the network; determining, by the medical equipment monitor, that the electronic device comprises a medical equipment; associating, by the medical equipment monitor, a security profile with the medical equipment, wherein the security profile includes one or more security parameters; detecting, by the medical equipment monitor, a conflict between a data transmission activity from the medical equipment and at least one security parameter in the security profile; and in response to detecting the conflict, transmitting, from the medical equipment monitor, a notification of the conflict to a medical equipment controller.Type: GrantFiled: October 31, 2017Date of Patent: June 22, 2021Assignee: BlackBerry LimitedInventor: Nader Saad Henein
-
Patent number: 11038905Abstract: Techniques for identifying attack behavior based on scripting language activity are disclosed. A security monitoring system generates a behavior profile for a first client device based on scripting language commands included in a first set of raw machine data received from the first client device, where the first client device is coupled to a network, and the first set of raw machine data is associated with network traffic received by or transmitted from the first client device. The security monitoring system analyzes a second set of raw machine data received from the first client device, where the second set of raw machine data is associated with subsequent network traffic received by or transmitted from the first client device. The security monitoring system detects an anomaly in the second set of raw machine data based on the behavior profile, and initiates a mitigation action in response to detecting the anomaly.Type: GrantFiled: January 25, 2017Date of Patent: June 15, 2021Assignee: SPLUNK, INC.Inventors: Joseph Auguste Zadeh, Rodolfo Soto, Madhupreetha Chandrasekaran, Yijiang Li
-
Patent number: 11025992Abstract: A system for validating an authorization request to facilitate controlling access to content or computer commands, in which the access is requested by multiple entities operated on discrete computing environments. The techniques make use of a system including a switchboard and a rule engine that collect parameter sets required for validation from the entities and dynamically generate a lock and key combination based on the collected parameter sets. The key of the lock and key combination allows the system to validate each entity independently regardless of the required parameters specified in the lock and key combination.Type: GrantFiled: September 16, 2015Date of Patent: June 1, 2021Assignee: TOUCHSTREAM TECHNOLOGIES, INC.Inventor: David Strober
-
Patent number: 11012452Abstract: The disclosed computer-implemented method for establishing restricted interfaces for database applications may include analyzing, by a computing device, query behavior of an application for query requests from the application to a remote database in a computer system and identifying, based on the analysis, an expected query behavior for the application. The method may include establishing, between the application and the remote database, a restricted interface. The method may include receiving, at the restricted interface, a query request from the application to the remote database and limiting, by the restricted interface, the query request from the application to the remote database based on the expected query behavior. The method may include determining, by checking the query request against the expected query behavior, that the query request is anomalous query behavior and performing a security action with respect to the computer system.Type: GrantFiled: January 9, 2018Date of Patent: May 18, 2021Assignee: NortonLifeLock, Inc.Inventors: Daniel Kats, Daniel Marino
-
Patent number: 11005872Abstract: A technique includes acquiring a plurality of records, each record having a corresponding number of attributes determining, based on local density measurements for numeric and normally distributed attribute value frequency measure for categorical attributes tags in the training portion of the plurality of records which is then used in probabilistic classifier for anomaly detection. A second set of implementations is proposed using ensemble method of combining deep learning algorithms for the same.Type: GrantFiled: May 31, 2019Date of Patent: May 11, 2021Assignee: GURUCUL SOLUTIONS, LLCInventors: Nilesh Dherange, Saryu Nayyar, Naveen Vijayaraghavan, Puneet Gajria, Alexey Varganov
-
Patent number: 10999734Abstract: Disclosed are systems and methods for passively authenticating users of a native application running on a mobile communications device. The user may be applying for a service, product, access, etc. from a provider computing system. A unique device identifier of the device may be acquired and provided to a first computing system. A mobile telephone number associated with the device may be received at the device. User information may be accepted from the user via a user interface of the device for entry into a set of fields. The mobile telephone number may be verified by determining, via a second computing system that is different from the first computing system, that the mobile telephone number is associated with the user information. The service/product/access for the user may be approved in response to verification of the mobile telephone number. The user may be authenticated without challenge questions.Type: GrantFiled: September 28, 2018Date of Patent: May 4, 2021Assignee: Wells Fargo Bank, N.A.Inventors: Ryan S. Alexander, Lei Han, Prafullata Diwate
-
Patent number: 10992462Abstract: A concealed-decision-tree computation system includes a user apparatus and 0th to (n?1)-th server apparatuses, where n is a predetermined positive integer. The user apparatus secret-shares data D into n shares [D]j (j=0, . . . , n?1) and sends the n shares [D]j (j=0, . . . , n?1) to the 0th to (n?1)-th server apparatuses, respectively. The 0th to (n?1)-th server apparatuses use the n shares [D]j (j=0, n?1) to perform secret cooperation computation to obtain n shares [out]0, . . . , [out]n-1 of a value “out” corresponding to the data D in a predetermined decision tree and send the n shares [out]0, . . . , [out]n-1 to the user apparatus. The user apparatus uses at least k shares out of the n received shares [out]0, . . . , [out]n-1 to restore the value “out” corresponding to the data D in the predetermined decision tree, where k is a predetermined integer equal to or smaller than n.Type: GrantFiled: January 13, 2017Date of Patent: April 27, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Ryo Kikuchi, Koki Hamada
-
Patent number: 10990658Abstract: A user verification apparatus may perform user verification using multiple biometric verifiers. The user verification apparatus may set a termination stage of one or more biometric verifiers. Multiple biometric verifiers may be used to generate outputs, for which separate termination stages are set to establish a particular combination of set termination stages associated with the multiple biometric verifiers, and the user verification apparatus may fuse outputs of the biometric verifiers based on the particular combination of set termination stages. The user verification apparatus may verify a user based on a result of the fusing, and an unlocking command signal may be generated based on the verifying. The unlocking command signal may be generated to selectively grant access, to the verified user, to one or more elements of a device. The device may be a vehicle.Type: GrantFiled: April 17, 2017Date of Patent: April 27, 2021Assignee: Samsung Electronics Co., Ltd.Inventors: Sungjoo Suh, Seungju Han, Jae-Joon Han, Chang Kyu Choi
-
Patent number: 10986070Abstract: To make high-level copyright protection of transmission audio data possible. Audio data is sequentially transmitted to a reception side via a predetermined transmission channel for each unit audio data. Audio data to be transmitted is encrypted, and encryption information indicating that the audio data has been encrypted is added to the audio data. For example, the encryption information is added using a predetermined bit area of a channel status of each block that is configured every predetermined number of unit audio data pieces.Type: GrantFiled: September 16, 2015Date of Patent: April 20, 2021Assignee: SONY CORPORATIONInventor: Gen Ichimura
-
Patent number: 10972281Abstract: A system and a method for document information authenticity verification for applications including verifying the authenticity of information of statements of attainment of course documentation issued by registered training organisations, verification of travel documents and other sensitive documents requiring authenticity verification of documents issued by law firms, accountancy firms, governmental institutions and the like, the method comprises a verification record creation stage comprising: receiving document content metadata from a document; generating a metadata hash using the document content metadata; creating a blockchain transaction comprising the metadata hash; and generating computer readable data encoding the metadata hash; updating the document with the computer readable data and a document verification stage comprising: receiving the document; extracting the metadata hash from the computer readable data; and identifying the metadata hash within blockchain transactions of the blockchain to veriType: GrantFiled: February 7, 2017Date of Patent: April 6, 2021Inventors: Guy Scott, Lindsay Moloney
-
Patent number: 10958626Abstract: Embodiments of the invention are directed to systems, methods and computer program products for end to end encryption on a network without using certificates. The system utilizes a correlation between two quantum particles that are entangled. In this way, data may be encrypted with the particles and transmitted to end users. Since the particles are forced to behave the same way even if they are separated, the data associated with the particles is not able to be breached. In the application encryption processing, that means the particles are not hackable and the encryption is always true and accurate. In this way, verification of application encryption occurs via particle measurement by leveraging the fact that that there is only one sender and one receiver, because they are of the same particle computation or physical end-point, instead of current encryption relying on logical end-points.Type: GrantFiled: July 25, 2018Date of Patent: March 23, 2021Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Charles Russell Kendall
-
Patent number: 10938568Abstract: An image product is manufactured from a digital video work by an apparatus and via a process. An object in the digital image work is detected, and the object is recognized. Metadata is assigned to the recognized object. A cryptographic hash of the object metadata is generated via a cryptographic hashing algorithm, and the cryptographic hash is written to a node of a transaction processing network.Type: GrantFiled: May 23, 2019Date of Patent: March 2, 2021Assignee: Eight Plus Ventures, LLCInventors: Christoph Bertsch, Rodney Lake, Douglas Sturgeon, Anthony Sziklai
-
Patent number: 10936383Abstract: An existing application processing on a client device initiates a function to provide a hard coded credential to a remote target application for purposes of logging into and gaining access to the remote target application. A hook to the function causes an agent to be activated, the agent dynamically contacts a credential vault to obtain a randomly generated credential for access to the remote target application. The hook injects the randomly generated credential over the hard coded credential supplied by the existing application and the function is initiated. The function logs into the target application using the randomly generated credential providing the existing application access to the remote target application. The hard coded credential is bypassed by the randomly generated credential.Type: GrantFiled: May 24, 2017Date of Patent: March 2, 2021Assignee: Micro Focus Software Inc.Inventor: Gulshan Govind Vaswani
-
Patent number: 10924463Abstract: A method, a device and a program are provided for processing data. The method is implemented within an intermediary module. The data is transmitted between a customer module and a server module connected through a communications network. The method includes: receiving, from one among the customer and server modules, an intermediation request identifying an operation of intermediation to be performed relative to a stream of encrypted data exchanged between the customer module and the server module; and processing relative to said encrypted data as a function of said operation of intermediation.Type: GrantFiled: October 28, 2015Date of Patent: February 16, 2021Assignee: ORANGEInventors: Emile Stephan, Nathalie Omnes
-
Patent number: 10911447Abstract: An application error detection platform computer processor may monitor execution of an application for a customer and determine that an application error has occurred. Responsive to the determination that an application error has occurred, an error fingerprint creation platform computer processor may access a stack trace representing execution of the application when the application error occurred. An error fingerprint associated with the occurrence of the application error may then be determined by applying a hash function (e.g., SHA-1) to information contained in the stack trace. Electronic records including an indication of the error fingerprint may then be received by and stored in an application error log data store. The application error log data store may then be searched for duplicate error fingerprints to facilitate application error resolution.Type: GrantFiled: October 12, 2017Date of Patent: February 2, 2021Assignee: SAP SEInventors: Paul Coffey, Hao Weng, Jiayi Chen, Na Zhang
-
Patent number: 10897457Abstract: Methods and apparatus, including computer program products, implementing and using techniques for processing of data in an intermediary server. Data is received from an Internet of Things (IoT) enabled device. The data includes a readable header and an encrypted payload. An opaque algorithm is selected to process the payload, based on information contained in the header of the data. The selected opaque algorithm processes the encrypted payload of the data, wherein the opaque algorithm is invisible to the intermediary server. The processing includes: decrypting the encrypted payload, applying the opaque algorithm to the decrypted payload, and encrypting the results from processing the decrypted payload by the opaque algorithm. A new readable header is added to the encrypted results. The data, including the new readable header and the encrypted results, is forwarded to a different server, based on the information in the new readable header.Type: GrantFiled: April 17, 2017Date of Patent: January 19, 2021Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Hari H. Madduri
-
Patent number: 10887348Abstract: A network security service is provided to detect various intermediaries to a network connection between a client and a destination service, such as a man-in-the-middle (MITM). The network security service may obtain session feature information indicating attributes of the network connection. Based at least in part on the session feature information the network security service may detect an intermediary and perform a security measure.Type: GrantFiled: August 4, 2017Date of Patent: January 5, 2021Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Peter Zachary Bowen
-
Secure in-band upgrade using key revocation lists and certificate-less asymmetric tertiary key pairs
Patent number: 10855462Abstract: A method includes securely booting a device using a bootloader, where the bootloader is digitally signed using a first cryptographic key associated with the bootloader. The method also includes executing one or more kernel or user applications using the device, where the one or more kernel or user applications are digitally signed using one or more second cryptographic keys associated with the one or more kernel or user applications. In addition, the method includes using an in-band channel to update or replace the first cryptographic key.Type: GrantFiled: June 5, 2017Date of Patent: December 1, 2020Assignee: Honeywell International Inc.Inventors: Harshal S. Haridas, Michal Hojsik, Jiri Findejs, Lukas Pohanka