Patents Examined by Benjamin E. Lanier
  • Patent number: 11182488
    Abstract: Systems for intelligent information protection based on detection of emergency events are disclosed. A computer program product includes: a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computing device to cause the computing device to: apply a safety tag to each of a plurality of data files; detect risk factors in a data stream indicating an unsafe situation; determine a risk score based on the risk factors; and in response to the risk score exceeding a predetermined threshold, perform a security action on each of the plurality of data files based on the safety tag applied to each file.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: November 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nadiya Kochura, Fang Lu, Darian Christian Shane Springer, Ivy Malao, Kevin R. Giles
  • Patent number: 11176246
    Abstract: In one example, an enclave pool is formed. The enclave pool may include a plurality of enclaves. Each enclave may have a private enclave key and a public enclave key. A shared enclave pool key may be generated from or otherwise based on the public enclave key of each enclave of the enclave pool. A first enclave may be allocated from the enclave pool to a first cryptlet. A payload of the first enclave is received. The payload of the first enclave may be signed with a first digital signature by the private enclave key of the first enclave. A payload of the second enclave may be received. The payload of the second enclave may be signed with a second digital signature by the private enclave key of the second enclave. The first digital signature and the second signature may be validated via the shared enclave pool key.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: November 16, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: John Marley Gray
  • Patent number: 11170105
    Abstract: Verifying authenticity of software updates is provided. An update executable and an update behavior profile corresponding to a software update are hashed using a cryptographic hash function. A hash of the update executable and the update behavior profile is signed using a private key to form a hashed update digital signature.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: November 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jia Jun Brandon Lum, Alaa S. Youssef
  • Patent number: 11163907
    Abstract: New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of the new tokenization tables is based on previous tokenization tables, which advantageously allows the generation process to be performed locally at the two endpoints independently of an external tokenization table provider. New tokenization tables can periodically be distributed to the endpoints as a new starting point for derivation.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: November 2, 2021
    Assignee: Protegrity Corporation
    Inventors: Yigal Rozenberg, Ulf Mattsson
  • Patent number: 11153081
    Abstract: A method and apparatus includes a determining unit configured to determine whether a device entering a network should be allowed access and an executing unit configured to execute a configuration protocol between the registrar and the device and to a shared unique configuration key between the registrar and the device. If the device provides a privileged service, the configuration protocol enables the device to advertise the privileged service or if the device is a control point, the configuration protocol enables the device to advertise that it is able to control certain privileged services. The registrar also includes a controlling unit configured to obtain a controller key, if the registrar is to become controller of the new device and a service unit configured to execute a credential service that allows devices providing privileged services to delegate issuing of access control credentials to the registrar, wherein other devices may use the credential service to obtain credentials for privileged services.
    Type: Grant
    Filed: March 26, 2020
    Date of Patent: October 19, 2021
    Assignee: Conversant Wireless Licensing S.a r.l.
    Inventors: Kari Timo Juhani Kostiainen, Seamus Peter Moloney, Olli Antero Rantapuska
  • Patent number: 11153098
    Abstract: A system for recording a digitally signed assertion using an authorization token, includes a cryptographic evaluator designed and configured to receive a dataset and an authorization token. The authorization token includes a verification datum of a device-specific secret possessed by the cryptographic evaluator, a digital signature of a certificate authority generating the authorization token, and a secure temporal attribute. The cryptographic evaluator is configured to produce a secure proof using the device-specific secret. The cryptographic evaluator is configured to generate a first digitally signed assertion as a function of the dataset, the secure proof, and the authorization token. The cryptographic evaluator is configured to enter the first digitally signed assertion in at least an instance of a first temporally sequential listing.
    Type: Grant
    Filed: October 9, 2019
    Date of Patent: October 19, 2021
    Assignee: Ares Technologies, Inc.
    Inventor: Christian T Wentz
  • Patent number: 11132462
    Abstract: Various surgical hubs and data stripping methods are disclosed. The surgical hub comprises a processor and a memory coupled to the processor. The memory stores instructions executable by the processor to interrogate a modular device coupled to the processor via a modular communication hub. The modular device is a source of data sets that include patient identity data and surgical procedure data. The processor also executes instructions to: receive a data set from the modular device; discard the patient identity data and any portion of the surgical procedure data that identifies the patient from the data set; extract anonymous data from the data set and create an anonymized data set; and configure operation of the surgical hub or the modular device based on the anonymized data set.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: September 28, 2021
    Assignee: Cilag GmbH International
    Inventors: Frederick E. Shelton, IV, Jason L. Harris, David C. Yates
  • Patent number: 11120111
    Abstract: Techniques are described for user authentication based on correlation of multiple pulse signals that each describe an independently determined pulse pattern for an individual. Different measurements of an individual's pulse can be generated in response to a request from the individual to access a computing system, such as a kiosk. The different measurements can be generated independently of one another using different types of sensor devices. For example, a measurement can be made using a radar sensor to detect movements caused by the user's pulse, and another measurement can be made through analysis of video data. If the independently generated pulse patterns are sufficiently similar to each other (e.g., determined using machine learning or other techniques), a determination may be made that the individual is not attempting to spoof another individual, and access to the computing system can be granted based at least partly on the determination.
    Type: Grant
    Filed: December 11, 2018
    Date of Patent: September 14, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Gregory Lee Storm, Reza R. Derakhshani
  • Patent number: 11115217
    Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: September 7, 2021
    Assignee: Avaya Inc.
    Inventors: Rifaat Shekh-Yusef, Gregory Pelton
  • Patent number: 11115402
    Abstract: In certain embodiments, first and second challenge responses may be obtained at a computer system from a client device respectively via first and second connections between the computer system and the client device. The challenge responses may each be generated based on a same private key stored in a secure local storage at the client device. Confirmation of identification information associated with an entity, to which the private key corresponds, may be obtained based on information obtained from the client device via the first connection. Information obtained from the client device via the second connection may be authenticated based on (i) the obtained confirmation via the first connection and (ii) verification of the first and second challenge responses obtained respectively via the first and second connections.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: September 7, 2021
    Assignee: UBS Business Solutions AG
    Inventors: Simon Heimlicher, Alain Hiltgen
  • Patent number: 11115394
    Abstract: Embodiments provide methods, and systems for encrypting data for web aplication. A method includes receiving, by a server system, a cryptographic certificate including asymmetric key pair. The method includes generating a random value key that forms at least a part of a Content Encryption Key (CEK) to be generated by a web application. The method includes sending the random value key to a client device running the web application over a secure network communication channel for generating the CEK. The CEK is to be utilized for encrypting a content entered by a user of the web application on the client device and the CEK is encrypted using a public key of the asymmetric key pair for transmission over the secure network communication channel. Furthermore, the method includes translating, the CEK encrypted under public key to CEK encrypted under LMK using a private key being part of the asymmetric key pair.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: September 7, 2021
    Assignee: Mastercard International Incorporated
    Inventors: Rupesh Salgaonkar, Anup Yedalawar, Amit Paliwal, Abhinandan Patil, Rahul Prakash Kurde
  • Patent number: 11108566
    Abstract: A method and system are provided for transferring digital assets in a digital asset network. Network users can be centrally enrolled and screened for compliance. Standardized transfer processes and unique identifiers can provide a transparent and direct transfer process. Digital assets can include sufficient information for ensuring that a value will be provided, including one or more digital signatures, such that value can be made immediately available to recipients.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: August 31, 2021
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Mondo Jacobs, Ajith Thekadath, Lidia Daldoss, David Henstock
  • Patent number: 11095457
    Abstract: Systems and methods for tracking media file playback are provided. First, transaction data from a platform stream is received. The transaction data corresponds to a request to play a media file from an end user. Next, the transaction data is verified. Then, the verified transaction data is signed using a cryptographic signature. Next, it is determined whether the transaction data corresponds to a valid blockchain transaction. If the transaction data corresponds to a valid blockchain transaction, the valid blockchain transaction is recorded to a blockchain. Last, the transaction data and the cryptographic signature are transmitted to one or more validation nodes.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: August 17, 2021
    Assignee: Beatdapp Software Inc.
    Inventors: Pouria Assadipour, Andrew Batey
  • Patent number: 11095654
    Abstract: An approach is provided that enhances computer system security. In the approach, a set of users is authorized to be notified when any of a selected set of activities occurs on the user's account. When the system detects that one of the activities has occurred on the account, a notification is sent to the set of authorized users. The set of users may individually send a responsive security response to protect the user's account. Responsive to receiving the security response from one of the set of users, a security action is performed that is anticipated to protect the user's account.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: August 17, 2021
    Assignee: International Business Machines Corporation
    Inventors: Nataraj Nagaratnam, Kapil K. Singh
  • Patent number: 11057361
    Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.
    Type: Grant
    Filed: October 17, 2019
    Date of Patent: July 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Danny Harnik, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
  • Patent number: 11057427
    Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: July 6, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jordan Wright, Jon Oberheide
  • Patent number: 11050729
    Abstract: A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 29, 2021
    Assignee: Plaid Inc.
    Inventors: William Hockey, Michael Kelly
  • Patent number: 11044082
    Abstract: Systems and processes are described for establishing and using a secure channel. A shared secret may be used for authentication of session initiation messages as well as for generation of a private/public key pair for the session. A number of ways of agreeing on the shared secret are described and include pre-sharing the keys, reliance on a key management system, or via a token mechanism that uses a third entity to manage authentication, for example. In some instances, the third party may also perform endpoint selection by providing a particular endpoint along with the token. The particular cipher suite applied in a particular implementation may be configurable. The process is applicable to either implicit key confirmation (e.g., handshake negotiation) or explicit key confirmation (e.g., full negotiation).
    Type: Grant
    Filed: September 6, 2019
    Date of Patent: June 22, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Allan Henry Vermeulen, Matthew John Campagna, Colm Gearóid MacCárthaigh
  • Patent number: 11042652
    Abstract: Various embodiments are generally directed to techniques for multi-domain memory encryption, such as with a plurality of cryptographically isolated domains, for instance. Some embodiments are particularly directed to a multi-domain encryption system that provides one or more of memory encryption, integrity, and replay protection services to a plurality of cryptographic domains. In one embodiment, for example, an apparatus may comprise a memory and logic for an encryption engine, at least a portion of the logic implemented in circuitry coupled to the memory. In various embodiments, the logic may receive a memory operation request associated with a data line of a set of data lines stored in a protected memory separate from the memory.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: June 22, 2021
    Assignee: INTEL CORPORATION
    Inventors: Siddhartha Chhabra, David M. Durham
  • Patent number: 11038908
    Abstract: The invention relates to digital cloud forensics. An embodiment of the present invention applies collection processes and tools to cloud infrastructure as a service to provide a more efficient and faithful representation of evidence. An embodiment of the present invention applies innovative concepts to retrospectively investigate ephemeral instances which may have long since terminated. This innovative process provides organizations a strategy to provide forensic investigations within either a public or private cloud environment.
    Type: Grant
    Filed: August 3, 2018
    Date of Patent: June 15, 2021
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: Michael P. Vega, James Regan, Matteo Michelini, Jean-Francois Legault