Patents Examined by Brian F Shaw
-
Patent number: 11703933Abstract: Examples described herein provide for a first core to map a measurement of packet processing activity and operating parameters so that a second core can access the measurement of packet processing activity and potentially modify an operating parameter of the first core. The second core can modify operating parameters of the first core based on the measurement of packet processing activity. The first and second cores can be provisioned on start-up with a common key. The first and second cores can use the common key to encrypt or decrypt measurement of packet processing activity and operating parameters that are shared between the first and second cores. Accordingly, operating parameters of the first core can be modified by a different core while providing for secure modification of operating parameters.Type: GrantFiled: January 20, 2020Date of Patent: July 18, 2023Assignee: Intel CorporationInventors: Liang Ma, Weigang Li, Madhusudana Raghupatruni, Hongjun Ni, Xuekun Hu, Changzheng Wei, Chris MacNamara, John J. Browne
-
Patent number: 11700530Abstract: A system and method includes receiving, via a fiber optic cable, an analog fiber optic signal that preserves native radio frequency (RF) energy characteristics of at least one first RF signal associated with at least one wireless device, and converting, by a light-to-RF converter, the received analog fiber optic signal into at least one second RF signal. The system and method can further comprise analyzing, by a processor, the at least one second RF signal and generating, by the processor, at least one digital signature associated with the at least one wireless device, respectively, based on the analysis of the at least one second RF signal. The system and method yet further comprise determining, by the processor, if the at least one wireless device associated with the at least one digital signature, respectively, is one of an authorized device and an unauthorized device.Type: GrantFiled: September 21, 2020Date of Patent: July 11, 2023Assignee: Cogitari, Inc.Inventors: Michael David Bishop, Gerhardus Hermanus Heerink
-
Patent number: 11698965Abstract: A computer-implemented method includes monitoring file access activity and generating an audit log based on the file access activity. The method also includes collecting samples of file usage activity, running a pattern recognition algorithm on the samples of the file usage activity for detecting malware activity, and, in response to detecting malware activity, restoring at least one file based on the audit log. A computer program product includes one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media. The program instructions include program instructions to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: GrantFiled: April 9, 2020Date of Patent: July 11, 2023Assignee: International Business Machines CorporationInventors: M Corneliu Constantinescu, Frank Schmuck, Deepavali M. Bhagwat
-
Patent number: 11689579Abstract: A session management function of a 5G system receives information that a secondary authentication is to be done for a given user equipment for authorising user equipment to use a data network; and responsively to the received information, communicates with the data network and receives from the data network an indication; and allows a 5G access to the user equipment so that the user equipment can communicate with the data network according to the indication either without cryptographic protection or with cryptographic protection depending on the indication.Type: GrantFiled: August 2, 2019Date of Patent: June 27, 2023Assignee: Nokia Technologies OyInventors: Peter Schneider, Anja Jerichow
-
Patent number: 11681824Abstract: A user provides retailer-specific consents for access and use to private/sensitive information of the user. The private/sensitive information is centrally stored in a privacy vault. Retail services (retailer) that the user subscribes to are provided a user-specific and consent-specific token representing the user and consents to usage of specific private/sensitive information of the user. When the retailer has a need for user-specific private/sensitive information, the retailer presents the user-specific and consent-specific token to the privacy vault. Assuming, the retailer was given access to the requested private/sensitive information defined in the token, the privacy results returns the requested information to the retailer; otherwise, an unauthorized message is returned from the privacy vault to the retailer. The user defines the consents to each retailer and a record of the consents is maintained in the privacy vault.Type: GrantFiled: August 27, 2021Date of Patent: June 20, 2023Assignee: NCR CorporationInventors: Nir Veltman, Jason Patterson, Mikhail Romanovich Shapirov, Nilesh Sharma, Joseph Arnold White
-
Patent number: 11657183Abstract: A method for providing restricted access to hardware component interfaces of a network device by one or more software components of the network device, wherein an access to a hardware component interface requested by a software component is permitted by a mandatory access control, MAC, mechanism implemented as part of the network device's operating system on the basis of a MAC security policy including access rights defined as access relations between software component security labels assigned to software component types and hardware component interface security labels assigned to hardware component interface types.Type: GrantFiled: October 18, 2018Date of Patent: May 23, 2023Inventors: Rainer Falk, Christian Peter Feist, Johannes Zwanzger
-
Patent number: 11647042Abstract: Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction with the second access device accordingly.Type: GrantFiled: November 28, 2018Date of Patent: May 9, 2023Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Brian Sullivan, Quan Wang, Yuexi Chen, Christian Aabye, Christian Flurscheim, Pasan Hapuarachchi
-
Patent number: 11645368Abstract: Systems and methods for restricting content inserted into information resources are provided herein. A computing device can identify a content element included in an information resource. The computing device can identify a bit stream corresponding to the content element included in the information resource. The computing device can hash the identified bit stream to generate an element identifier corresponding to the content element. The computing device can access a restricted content database using the element identifier. The computing device can modify, responsive to finding the element identifier in the restricted content database, the presentation of the content element on the information resource in accordance with the content restriction policy.Type: GrantFiled: January 24, 2017Date of Patent: May 9, 2023Assignee: GOOGLE LLCInventors: Matthew Burriesci, Harrison Gordon
-
Patent number: 11638151Abstract: A method and device for retransmitting data are provided. The method includes: receiving, by a first device, on a DRB, a first PDCP PDU transmitted by a second device; performing, by the first device, on a PDCP layer, an IP verification for the first PDCP PDU; transmitting, by the first device, a PDCP status report to the second device when the IP verification for the first PDCP PDU is failed and a trigger condition is met, where the triggering condition is used for triggering the first device to transmit the PDCP status report to the second device. Thus, it can be ensured that the first PDCP PDU transmitted by the second device is received on the DRB again by the first device when the IP verification for the first PDCP PDU is failed, thereby effectively solving the problem of data packet loss caused by a failure of IP verification.Type: GrantFiled: May 7, 2020Date of Patent: April 25, 2023Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.Inventor: Hai Tang
-
Patent number: 11621842Abstract: A method provides an origin certificate that can be issued as a digital certificate online. The method includes receiving an origin digital certificate and an encrypted client device private key from an offline certificate authority wherein the client device private key is encrypted according to a private key encryption key PrKEK. The method further includes receiving from the client device, a request for a client device digital certificate and the encrypted client device private key, selecting a digital certificate template for the client device, the digital certificate template having attributes that vary according to the client devices, building the client device digital certificate from the origin digital certificate and the selected digital certificate template, signing the client device digital certificate with an online certificate authority signing key, and transmitting the signed client device digital certificate and the encrypted device private key.Type: GrantFiled: March 23, 2021Date of Patent: April 4, 2023Assignee: ARRIS Enterprises LLCInventors: Alexander Medvinsky, Eric J. Sprunk, Xin Qiu, Paul Moroney
-
Patent number: 11601455Abstract: A system comprises an enterprise network system and engine. The engine has a discovery module coupled to a switch device, an AI and machine learning based monitoring and detection module coupled to the switch device, and a remediation module coupled to the switch device. The remediation module is configured to initiate a remediation process based upon the detection of at least one of the anomalies from the flow of data.Type: GrantFiled: July 29, 2020Date of Patent: March 7, 2023Assignee: AKITRA, INC.Inventors: Naveen S. Bisht, Kanna Rajan
-
Patent number: 11601258Abstract: Example selector derived encryption methods and systems include creating a hashed and encrypted database, as well as performing a query against the hashed and encrypted database using an encrypted selector exchange protocol to prevent the exposure of extraneous data from the hashed and encrypted database.Type: GrantFiled: October 8, 2020Date of Patent: March 7, 2023Assignee: Enveil, Inc.Inventor: Ryan Carr
-
Patent number: 11601450Abstract: The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of suspicious messages, and furthermore, to a network for distributing information about detected phishing attacks.Type: GrantFiled: October 11, 2021Date of Patent: March 7, 2023Assignee: Cofense IncInventors: Aaron Higbee, Rohyt Belani, Scott Greaux, William Galway, Douglas Hagen
-
Patent number: 11595427Abstract: A system for determining an entity's security rating may include a ratings engine and a security database. The security database may include a manifest and a distributed index containing security records. Each of the security records may have a key (e.g., a network identifier of a network asset) and a value (e.g., security information associated with the network asset identified by the key). The keyspace may be partitioned into multiple key ranges. The manifest may contain references to segments of the distributed index. Each segment may be associated with a key range and may index a group of security records having keys within the key range. The manifest and the segments may be stored in an object storage system. The ratings engine may determine the security rating of an entity based on security records of the entity's network assets, which may be retrieved from the database.Type: GrantFiled: December 23, 2020Date of Patent: February 28, 2023Assignee: BitSight Technologies, Inc.Inventors: Ethan Geil, Bryan Turcotte
-
Patent number: 11586747Abstract: A method for setting a permission to view an operation record based on a time range is disclosed in the present invention, including: selecting a grantee; setting one or more viewed objects for each grantee, wherein said grantee and said viewed object are the same type as a role, a user, and an employee; and setting a viewing-permission time range for each grantee, wherein said grantee obtains the permission to view the operation records of its corresponding viewed object within the viewing-permission time range of the grantee.Type: GrantFiled: August 13, 2018Date of Patent: February 21, 2023Assignee: CHENGDU QIANNIUCAO INFORMATION TECHNOLOGY CO., LTD.Inventor: Dazhi Chen
-
Patent number: 11564101Abstract: In one example, a method comprises: receiving, at a gateway of a Controller Area Network (CAN) bus on a vehicle and via at least one of a wireless interface or a wired interface of the vehicle, a plurality of messages targeted at electronic control units (ECU) on the CAN bus; generating one or more input vectors based on the plurality of messages; generating, using one or more machine learning models, an output vector based on each of the one or more input vectors, each input vector having the same number of elements as the corresponding output vector; generating one or more comparison results between each of the one or more input vectors and the corresponding output vector; and based on the one or more comparison results, performing one of: allowing the plurality of messages to enter the CAN bus or preventing the plurality of messages from entering the CAN bus.Type: GrantFiled: July 31, 2020Date of Patent: January 24, 2023Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Hao Fu, Shray Kapoor
-
Patent number: 11562069Abstract: A plurality of blocks of a first storage device are monitored. The first storage device is related to a computer system. A subset of blocks of the plurality a compared to a first storage signature of the first storage device. Based on the comparing of the subset of blocks to the first storage signature, a security anomaly is determined on the computer system. In response to the security anomaly, a security action is performed. The security action is related to the computer system.Type: GrantFiled: July 10, 2020Date of Patent: January 24, 2023Assignee: KYNDRYL, INC.Inventors: Abdul Kareem Lakkundi, Siddalinga Aradhya, Santosh Kulkarni
-
Patent number: 11563717Abstract: A generation method includes identifying, as paths that are abstraction candidates, dynamically generated paths among paths in a profile that is used to determine whether each request to a server is an attack, and counting numbers of path variations corresponding to the respective paths that are abstraction candidates, and abstracting paths contained in the profile when a number of variations counted at the counting satisfies a certain condition, by processing circuitry.Type: GrantFiled: April 15, 2019Date of Patent: January 24, 2023Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Kunio Miyamoto, Shingo Orihara, Yuta Iwaki, Yo Kanemoto, Yuichi Murata
-
Patent number: 11546767Abstract: A method performed by a system includes instantiating a vulnerability-risk-threat (VRT) service for a security edge protection proxy (SEPP) element of a 5G telecommunications network. The system intercepts and parameterizes network traffic of the SEPP element to identify network functions (NFs) or associated services that requires cybersecurity protection and selects security resources for protecting the identified NFs or associated services. The system prioritizes an NF or associated service that is most frequently used (MFU) or most recently used (MRU) and then allocates the security resources in accordance with the prioritization.Type: GrantFiled: January 21, 2021Date of Patent: January 3, 2023Assignee: T-Mobile USA, Inc.Inventors: Venson Shaw, Gaviphat Lekutai
-
Patent number: 11546153Abstract: Embodiments are direct to monitoring communication between computers may be using network monitoring computers (NMCs). Network packets that are communicated between the computers may be captured and stored in a data store. If the NMCs identify a secure communication session established between two computers, the NMCs may obtain key information that corresponds to the secure communication session that includes a session key that may be provided by a key provider. Correlation information associated with the secure communication session may be captured by the NMCs. The correlation information may include tuple information associated with the secure communication session. And, the key information and the correlation information may be stored in a key escrow. The key information may be indexed in the key escrow using the correlation information.Type: GrantFiled: November 8, 2019Date of Patent: January 3, 2023Assignee: ExtraHop Networks, Inc.Inventors: Benjamin Thomas Higgins, Charlotte Ching-Hsing Tan, Jesse Abraham Rothstein