Patents Examined by Benjamin E. Lanier
-
Patent number: 11182488Abstract: Systems for intelligent information protection based on detection of emergency events are disclosed. A computer program product includes: a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computing device to cause the computing device to: apply a safety tag to each of a plurality of data files; detect risk factors in a data stream indicating an unsafe situation; determine a risk score based on the risk factors; and in response to the risk score exceeding a predetermined threshold, perform a security action on each of the plurality of data files based on the safety tag applied to each file.Type: GrantFiled: November 28, 2018Date of Patent: November 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nadiya Kochura, Fang Lu, Darian Christian Shane Springer, Ivy Malao, Kevin R. Giles
-
Patent number: 11176246Abstract: In one example, an enclave pool is formed. The enclave pool may include a plurality of enclaves. Each enclave may have a private enclave key and a public enclave key. A shared enclave pool key may be generated from or otherwise based on the public enclave key of each enclave of the enclave pool. A first enclave may be allocated from the enclave pool to a first cryptlet. A payload of the first enclave is received. The payload of the first enclave may be signed with a first digital signature by the private enclave key of the first enclave. A payload of the second enclave may be received. The payload of the second enclave may be signed with a second digital signature by the private enclave key of the second enclave. The first digital signature and the second signature may be validated via the shared enclave pool key.Type: GrantFiled: November 25, 2019Date of Patent: November 16, 2021Assignee: Microsoft Technology Licensing, LLCInventor: John Marley Gray
-
Patent number: 11170105Abstract: Verifying authenticity of software updates is provided. An update executable and an update behavior profile corresponding to a software update are hashed using a cryptographic hash function. A hash of the update executable and the update behavior profile is signed using a private key to form a hashed update digital signature.Type: GrantFiled: February 28, 2019Date of Patent: November 9, 2021Assignee: International Business Machines CorporationInventors: Jia Jun Brandon Lum, Alaa S. Youssef
-
Patent number: 11163907Abstract: New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of the new tokenization tables is based on previous tokenization tables, which advantageously allows the generation process to be performed locally at the two endpoints independently of an external tokenization table provider. New tokenization tables can periodically be distributed to the endpoints as a new starting point for derivation.Type: GrantFiled: March 27, 2020Date of Patent: November 2, 2021Assignee: Protegrity CorporationInventors: Yigal Rozenberg, Ulf Mattsson
-
Patent number: 11153081Abstract: A method and apparatus includes a determining unit configured to determine whether a device entering a network should be allowed access and an executing unit configured to execute a configuration protocol between the registrar and the device and to a shared unique configuration key between the registrar and the device. If the device provides a privileged service, the configuration protocol enables the device to advertise the privileged service or if the device is a control point, the configuration protocol enables the device to advertise that it is able to control certain privileged services. The registrar also includes a controlling unit configured to obtain a controller key, if the registrar is to become controller of the new device and a service unit configured to execute a credential service that allows devices providing privileged services to delegate issuing of access control credentials to the registrar, wherein other devices may use the credential service to obtain credentials for privileged services.Type: GrantFiled: March 26, 2020Date of Patent: October 19, 2021Assignee: Conversant Wireless Licensing S.a r.l.Inventors: Kari Timo Juhani Kostiainen, Seamus Peter Moloney, Olli Antero Rantapuska
-
Patent number: 11153098Abstract: A system for recording a digitally signed assertion using an authorization token, includes a cryptographic evaluator designed and configured to receive a dataset and an authorization token. The authorization token includes a verification datum of a device-specific secret possessed by the cryptographic evaluator, a digital signature of a certificate authority generating the authorization token, and a secure temporal attribute. The cryptographic evaluator is configured to produce a secure proof using the device-specific secret. The cryptographic evaluator is configured to generate a first digitally signed assertion as a function of the dataset, the secure proof, and the authorization token. The cryptographic evaluator is configured to enter the first digitally signed assertion in at least an instance of a first temporally sequential listing.Type: GrantFiled: October 9, 2019Date of Patent: October 19, 2021Assignee: Ares Technologies, Inc.Inventor: Christian T Wentz
-
Patent number: 11132462Abstract: Various surgical hubs and data stripping methods are disclosed. The surgical hub comprises a processor and a memory coupled to the processor. The memory stores instructions executable by the processor to interrogate a modular device coupled to the processor via a modular communication hub. The modular device is a source of data sets that include patient identity data and surgical procedure data. The processor also executes instructions to: receive a data set from the modular device; discard the patient identity data and any portion of the surgical procedure data that identifies the patient from the data set; extract anonymous data from the data set and create an anonymized data set; and configure operation of the surgical hub or the modular device based on the anonymized data set.Type: GrantFiled: March 29, 2018Date of Patent: September 28, 2021Assignee: Cilag GmbH InternationalInventors: Frederick E. Shelton, IV, Jason L. Harris, David C. Yates
-
Patent number: 11120111Abstract: Techniques are described for user authentication based on correlation of multiple pulse signals that each describe an independently determined pulse pattern for an individual. Different measurements of an individual's pulse can be generated in response to a request from the individual to access a computing system, such as a kiosk. The different measurements can be generated independently of one another using different types of sensor devices. For example, a measurement can be made using a radar sensor to detect movements caused by the user's pulse, and another measurement can be made through analysis of video data. If the independently generated pulse patterns are sufficiently similar to each other (e.g., determined using machine learning or other techniques), a determination may be made that the individual is not attempting to spoof another individual, and access to the computing system can be granted based at least partly on the determination.Type: GrantFiled: December 11, 2018Date of Patent: September 14, 2021Assignee: Advanced New Technologies Co., Ltd.Inventors: Gregory Lee Storm, Reza R. Derakhshani
-
Patent number: 11115217Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.Type: GrantFiled: November 21, 2018Date of Patent: September 7, 2021Assignee: Avaya Inc.Inventors: Rifaat Shekh-Yusef, Gregory Pelton
-
Patent number: 11115402Abstract: In certain embodiments, first and second challenge responses may be obtained at a computer system from a client device respectively via first and second connections between the computer system and the client device. The challenge responses may each be generated based on a same private key stored in a secure local storage at the client device. Confirmation of identification information associated with an entity, to which the private key corresponds, may be obtained based on information obtained from the client device via the first connection. Information obtained from the client device via the second connection may be authenticated based on (i) the obtained confirmation via the first connection and (ii) verification of the first and second challenge responses obtained respectively via the first and second connections.Type: GrantFiled: July 23, 2019Date of Patent: September 7, 2021Assignee: UBS Business Solutions AGInventors: Simon Heimlicher, Alain Hiltgen
-
Patent number: 11115394Abstract: Embodiments provide methods, and systems for encrypting data for web aplication. A method includes receiving, by a server system, a cryptographic certificate including asymmetric key pair. The method includes generating a random value key that forms at least a part of a Content Encryption Key (CEK) to be generated by a web application. The method includes sending the random value key to a client device running the web application over a secure network communication channel for generating the CEK. The CEK is to be utilized for encrypting a content entered by a user of the web application on the client device and the CEK is encrypted using a public key of the asymmetric key pair for transmission over the secure network communication channel. Furthermore, the method includes translating, the CEK encrypted under public key to CEK encrypted under LMK using a private key being part of the asymmetric key pair.Type: GrantFiled: July 10, 2019Date of Patent: September 7, 2021Assignee: Mastercard International IncorporatedInventors: Rupesh Salgaonkar, Anup Yedalawar, Amit Paliwal, Abhinandan Patil, Rahul Prakash Kurde
-
Patent number: 11108566Abstract: A method and system are provided for transferring digital assets in a digital asset network. Network users can be centrally enrolled and screened for compliance. Standardized transfer processes and unique identifiers can provide a transparent and direct transfer process. Digital assets can include sufficient information for ensuring that a value will be provided, including one or more digital signatures, such that value can be made immediately available to recipients.Type: GrantFiled: November 22, 2019Date of Patent: August 31, 2021Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Mondo Jacobs, Ajith Thekadath, Lidia Daldoss, David Henstock
-
Patent number: 11095457Abstract: Systems and methods for tracking media file playback are provided. First, transaction data from a platform stream is received. The transaction data corresponds to a request to play a media file from an end user. Next, the transaction data is verified. Then, the verified transaction data is signed using a cryptographic signature. Next, it is determined whether the transaction data corresponds to a valid blockchain transaction. If the transaction data corresponds to a valid blockchain transaction, the valid blockchain transaction is recorded to a blockchain. Last, the transaction data and the cryptographic signature are transmitted to one or more validation nodes.Type: GrantFiled: August 30, 2019Date of Patent: August 17, 2021Assignee: Beatdapp Software Inc.Inventors: Pouria Assadipour, Andrew Batey
-
Patent number: 11095654Abstract: An approach is provided that enhances computer system security. In the approach, a set of users is authorized to be notified when any of a selected set of activities occurs on the user's account. When the system detects that one of the activities has occurred on the account, a notification is sent to the set of authorized users. The set of users may individually send a responsive security response to protect the user's account. Responsive to receiving the security response from one of the set of users, a security action is performed that is anticipated to protect the user's account.Type: GrantFiled: May 3, 2019Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Nataraj Nagaratnam, Kapil K. Singh
-
Patent number: 11057361Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.Type: GrantFiled: October 17, 2019Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Danny Harnik, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
-
Patent number: 11057427Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.Type: GrantFiled: October 31, 2019Date of Patent: July 6, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Jordan Wright, Jon Oberheide
-
Patent number: 11050729Abstract: A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g.Type: GrantFiled: November 19, 2019Date of Patent: June 29, 2021Assignee: Plaid Inc.Inventors: William Hockey, Michael Kelly
-
Patent number: 11044082Abstract: Systems and processes are described for establishing and using a secure channel. A shared secret may be used for authentication of session initiation messages as well as for generation of a private/public key pair for the session. A number of ways of agreeing on the shared secret are described and include pre-sharing the keys, reliance on a key management system, or via a token mechanism that uses a third entity to manage authentication, for example. In some instances, the third party may also perform endpoint selection by providing a particular endpoint along with the token. The particular cipher suite applied in a particular implementation may be configurable. The process is applicable to either implicit key confirmation (e.g., handshake negotiation) or explicit key confirmation (e.g., full negotiation).Type: GrantFiled: September 6, 2019Date of Patent: June 22, 2021Assignee: Amazon Technologies, Inc.Inventors: Allan Henry Vermeulen, Matthew John Campagna, Colm Gearóid MacCárthaigh
-
Patent number: 11042652Abstract: Various embodiments are generally directed to techniques for multi-domain memory encryption, such as with a plurality of cryptographically isolated domains, for instance. Some embodiments are particularly directed to a multi-domain encryption system that provides one or more of memory encryption, integrity, and replay protection services to a plurality of cryptographic domains. In one embodiment, for example, an apparatus may comprise a memory and logic for an encryption engine, at least a portion of the logic implemented in circuitry coupled to the memory. In various embodiments, the logic may receive a memory operation request associated with a data line of a set of data lines stored in a protected memory separate from the memory.Type: GrantFiled: September 3, 2019Date of Patent: June 22, 2021Assignee: INTEL CORPORATIONInventors: Siddhartha Chhabra, David M. Durham
-
Patent number: 11038908Abstract: The invention relates to digital cloud forensics. An embodiment of the present invention applies collection processes and tools to cloud infrastructure as a service to provide a more efficient and faithful representation of evidence. An embodiment of the present invention applies innovative concepts to retrospectively investigate ephemeral instances which may have long since terminated. This innovative process provides organizations a strategy to provide forensic investigations within either a public or private cloud environment.Type: GrantFiled: August 3, 2018Date of Patent: June 15, 2021Assignee: JPMorgan Chase Bank, N.A.Inventors: Michael P. Vega, James Regan, Matteo Michelini, Jean-Francois Legault