Patents Examined by Benjamin Kaplan
-
Patent number: 11729220Abstract: A method includes receiving, at an access node of a local network, a connection request from a device and in response to the connection request, establishing a connection with an identity provider. The device, the access node, the local network, and the identity provider are members of an identity federation. The method further includes receiving an indication that the device previously violated a network policy of a network different from the local network and after the device is authenticated with the identity provider, determining, by the access node and based on the indication, whether to allow the device to communicate over the access node.Type: GrantFiled: April 19, 2021Date of Patent: August 15, 2023Assignee: Cisco Technology, Inc.Inventors: Robert E. Barton, Bart A. Brinckman, Jerome Henry, Carlos M. Pignataro, Nagendra Kumar Nainar, Matthew MacPherson
-
Patent number: 11722472Abstract: One example method includes correlating trust scoring with authentication levels. Trust scores are protected in a computing system such that devices can be validated. Authentication levels are based on the verified trust scores.Type: GrantFiled: December 31, 2020Date of Patent: August 8, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Mohamed Sohail, Robert A. Lincourt, Said Tabet
-
Patent number: 11711256Abstract: Methods, systems, and devices are described for orchestrating server management in a modern IT network. The described techniques may be implemented to manage any number of networked severs, whether local, remote, or both. Server orchestration may leverage a central, cloud-based management system and/or one or more autonomous agents installed on servers with the network. The autonomous agents may each be registered with the supervisory server and may have awareness of one another.Type: GrantFiled: February 5, 2021Date of Patent: July 25, 2023Assignee: JumpCloud, Inc.Inventors: Rajat Bhargava, James Brown, Christopher Marie
-
Patent number: 11711401Abstract: System and methods of brokering trust across multiple Authentication and Authorization methods in a multi-domain, multi-operator, private and public cloud networks are identified. A Digital Trust Broker (DTB) is disclosed that brokers trust between infrastructure authentication methods that use digital certificates (PKI) and operator/enterprise Authentication/Authorization methods through interaction with multiple operator/service provider control and management platforms. The Digital Trust Broker interacts with vendor management and security platforms for associating device manufacturing, assembly, supply-chain, and logistics attributes for assuring trust of compute, network, storage and other system components that a high security enterprise or service provider acquires and installs in their networks. Additionally, methods of generating enhanced certificates for secure network slices and other Cloud and SDN hosted virtual network functions as trust assured services are also disclosed.Type: GrantFiled: February 24, 2022Date of Patent: July 25, 2023Assignee: SecureGInventors: Carlos Solari, Surya Kumar Kovvali, Kevin Riley
-
Patent number: 11706256Abstract: A client application establishes a connection between the client application and an origin server over one or more networks. The application generates a request to establish a secure session with the origin server over the connection. The request includes information, in a header of the request, that flags traffic sent during the secure session to a network of the one or more networks as subject to one or more optimizations performed by the network. Subsequent to establishing the secure session, the application encrypts the traffic in accordance with the secure session and sends the traffic to the origin server over the connection, subject to the one or more optimizations. The infrastructure service applies the one or more optimizations to the traffic as it passes through the edge network to the origin server.Type: GrantFiled: June 14, 2021Date of Patent: July 18, 2023Assignee: Fastly, Inc.Inventors: Sean Leach, Artur Bergman
-
Patent number: 11704424Abstract: An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller based on the unique identifier. Other embodiments are disclosed and claimed.Type: GrantFiled: July 27, 2021Date of Patent: July 18, 2023Assignee: Intel CorporationInventors: Francesc Guim Bernat, Mark Schmisseur, Kshitij Doshi, Kapil Sood, Tarun Viswanathan
-
Patent number: 11695745Abstract: A third-party server, delegated by organizations to manage application environment, may maintain a plurality of guided workflow plans. At least one of the guided workflow plans may include one or more steps associated with setting up an interaction control policy. The third-party server may receive an interaction report associated with the organization. The interaction report may include metadata of one or more devices that interacted with other devices. The third-party server may identify a particular device to which existing interaction control policies of the organization are inapplicable. The third-party server may search for additional out-of-band information of the particular device using the metadata in the interaction report. The third-party server may select an applicable guided workflow plan for setting up an applicable interaction control policy for the particular device. A guided workflow may be presented via a graphical user interface according to the applicable guided workflow plan.Type: GrantFiled: July 9, 2021Date of Patent: July 4, 2023Assignee: ValiMail Inc.Inventors: Seth Joshua Blank, Ashley Duane Wilson, Peter Martin Goldstein, Jack William Abbott, Robert Benjamin Barclay
-
Patent number: 11695776Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.Type: GrantFiled: February 16, 2021Date of Patent: July 4, 2023Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
-
Patent number: 11683342Abstract: Techniques are described for detecting and attributing automatic unauthorized redirects originating from executable code contained within an advertisement hosted within a web page or application displayed on an end user's mobile or desktop computing devices.Type: GrantFiled: October 28, 2020Date of Patent: June 20, 2023Assignee: Ad Lightning Inc.Inventors: Drake Callahan, Doug Britsch
-
Patent number: 11683333Abstract: An example network security and threat assessment system is configured to determine, based on one or more events that have occurred during execution of one or more applications, a potential security vulnerability of a target computing system, where the one or more events correspond to a node represented in the hierarchical risk model. The system is further configured to identify, based on a mapping of the node represented in the hierarchical risk model to a node represented in a hierarchical game tree model, one or more actions that are associated with the potential security vulnerability and that correspond to the node represented in the hierarchical game tree model, and to output, for display in a graphical user interface, a graphical representation of the potential security vulnerability and the one or more actions associated with the potential security vulnerability.Type: GrantFiled: December 4, 2020Date of Patent: June 20, 2023Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Christopher Dominessy, Scott Aloisio, Robert A. Joyce
-
Patent number: 11683344Abstract: This disclosure relates to systems and methods for managing connected devices and associated network connections. In certain embodiments, trust, privacy, safety, and/or security of information communicated between connected devices may be established in part through use of security associations and/or shared group tokens. In some embodiments, these security associations may be used to form an explicit private network associated with the user. A user may add and/or manage devices included in the explicit private network through management of various security associations associated with the network's constituent devices.Type: GrantFiled: December 14, 2020Date of Patent: June 20, 2023Assignee: Intertrust Technologies CorporationInventors: David P. Maher, Gilles Boccon-Gibod
-
Patent number: 11677763Abstract: Methods, computer-readable media, software, and apparatuses may assist in proactively warning a consumer they are a victim or possible target of a cyber-attack or cyber-threat. To discover whether a consumer may be a victim, the methods, computer-readable media, software, and apparatuses will monitor the Surface Web, Deep Web, and Dark Web for potential cyber-threats and cyber-attacks. If one is discovered, the methods, computer-readable media, software, and apparatuses will compare the criteria of victims of targeted in the cyber-attack and compare that criteria with consumer profiles. If a consumer profile matches the criteria, the methods, computer-readable media, software, and apparatuses will notify the consumer of the threat.Type: GrantFiled: January 14, 2021Date of Patent: June 13, 2023Assignee: ALLSTATE INSURANCE COMPANYInventors: Jason D. Park, John S. Parkinson
-
Patent number: 11665194Abstract: In one embodiment, a device in a network receives an attack mitigation request regarding traffic in the network. The device causes an assessment of the traffic, in response to the attack mitigation request. The device determines that an attack detector associated with the attack mitigation request incorrectly assessed the traffic, based on the assessment of the traffic. The device causes an update to an attack detection model of the attack detector, in response to determining that the attack detector incorrectly assessed the traffic.Type: GrantFiled: August 5, 2021Date of Patent: May 30, 2023Assignee: Cisco Technology, Inc.Inventors: K. Tirumaleswar Reddy, Daniel G. Wing, Blake Harrell Anderson, David McGrew
-
Patent number: 11663510Abstract: Systems, apparatuses, methods, and computer program products are disclosed for quantum entanglement authentication (QEA). An example method includes generating, at a first computing device, a first number based on a subset of a first set of entangled quantum particles comprised by a quantum authentication device and associated with the first computing device. Each entangled quantum particle in the first set of entangled quantum particles may be entangled with a respective entangled quantum particle in a second set of entangled quantum particles associated with a second computing device. The example method further includes transmitting an electronic identification of the subset of the first set of entangled quantum particles to the second computing device.Type: GrantFiled: November 26, 2019Date of Patent: May 30, 2023Assignee: Wells Fargo Bank, N.A.Inventors: Robert L. Carter, Jr., Bradford A. Shea, M. Erik Meinholz, Jeff J. Stapleton, Peter Bordow, Pierre Arbajian
-
Patent number: 11658988Abstract: A cyber-physical system may have a plurality of system nodes including a plurality of monitoring nodes each generating a series of current monitoring node values over time that represent current operation of the cyber-physical system. According to some embodiments, a watermarking computer platform may randomly inject a watermarking signal into an injection subset of the system nodes. The watermarking computer platform may then receive current monitoring node values over time and generate a current watermarking feature vector based on the current monitoring node values. The watermarking computer platform might comprise a dedicated watermarking abnormality detection platform or a unified abnormality detection platform (e.g., that also uses data-drive feature vectors). The injection subset may be associated with a randomly selected subset of the system nodes and/or magnitudes of watermarking signals that are randomly selected.Type: GrantFiled: September 9, 2021Date of Patent: May 23, 2023Assignee: GENERAL ELECTRIC COMPANYInventors: Masoud Abbaszadeh, Justin John, Austars Raymond Schnore, Jr.
-
Patent number: 11652807Abstract: Provided is a computing device of a group based communication system configured to securely validate a client device associated with a group-based communication interface user. An example computing device is configured to identify a validating request transmitted from the client device. If a validating request is identified, the example computing device will transmit a temporary device code to the client device associated with the group-based communication interface user and an e-mail code to an e-mail address associated with a user profile associated with the group-based communication interface user. The example computing device also stores the codes transmitted. The example computing device then receives a confirmation exchange from the client device and determines whether the confirmation exchange satisfies client device validation parameters.Type: GrantFiled: December 21, 2020Date of Patent: May 16, 2023Assignee: Salesforce, Inc.Inventors: Chase Rutherford-Jenkins, Graham Hicks, Lorilyn McCue, Alireza Takhtravanchi, Samuel Wolfand, Faisal Yaqub
-
Patent number: 11652837Abstract: An access analysis system obtains data about user requests to access particular applications, such as identifiers of the particular user and application involved, the time of the request, and (optionally) additional contextual data, and uses that data to generate user access distributions that quantify the distribution of a given user's requests to access applications over time. After one or more distributions have been generated for a particular user, when that user submits a new access request for an application, the access analysis system can compare the request to the previously-generated access distributions to determine whether (or to what degree) the request is anomalous. If the request is sufficiently non-anomalous, it can be granted with little or no additional actions required by the user or the user's device; if, however, the request is sufficiently anomalous, it can be denied, or additional information—such as additional user authentication factors—can be required.Type: GrantFiled: January 29, 2021Date of Patent: May 16, 2023Assignee: Okta, Inc.Inventor: Gautam Borah
-
Patent number: 11644958Abstract: A system and method for investigating trust scores. A trust score is calculated based on peer transfers, a graphical user interface displays actuatable elements associated with a first peer transfer from the peer transfers, in response to receiving an indication the first actuatable element has been actuated, recalculating the trust score without the first peer transfer.Type: GrantFiled: October 20, 2020Date of Patent: May 9, 2023Assignee: PAYPAL, INC.Inventors: Alex Grigoryan, Avinash Gangadharan, Akshay Peshave, Michael Morgan, Rhys Howell
-
Patent number: 11632363Abstract: Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.Type: GrantFiled: October 25, 2021Date of Patent: April 18, 2023Assignee: TruePic Inc.Inventors: Jason Lyons, Craig Stack, Francis Lyons, Jeffrey McGregor
-
Patent number: 11616770Abstract: A method may include receiving, from a user device, a registration request that includes a subscription concealed identifier (SUCI), identifying a network element to decode the SUCI and forwarding the SUCI to the identified network element. The method may also include decoding the SUCI to identify a subscription permanent identifier (SUPI), identifying a unified data management (UDM) device associated with the SUPI and transmitting an authentication request to the identified UDM device to obtain authentication information associated with the user device. The method may further include receiving the authentication information and authenticating the user device based on the received authentication information.Type: GrantFiled: October 16, 2020Date of Patent: March 28, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: Sudhakar Reddy Patil, Lixia Yan, James Mathison