Patents Examined by C. Harris
-
Patent number: 12388842Abstract: Disclosed herein are systems and method for deduplicating malware scan attempts. In one exemplary aspect, a method may include: receiving, from a first computing device of a plurality of computing devices in a network, a first hash value of an object and a verdict of a malware scan performed on the object by the first computing device; storing the first hash value and the verdict in a shared verdict database; receiving, from a second computing device in the network, a verdict request including a second hash value; determining that the first hash value and the second hash value match; in response to determining the match, transmitting, to the second computing device, the verdict of the malware scan performed on the object by the first computing device, wherein the second computing device does not perform a redundant malware scan on the object.Type: GrantFiled: August 30, 2022Date of Patent: August 12, 2025Assignee: Cloud Linux Software, Inc.Inventors: Igor Seletskiy, Andrey Kucherov
-
Patent number: 12348523Abstract: A computer implemented method for granting access to secure resources, the method including receiving at a computer system from a secondary computing device, a ticket providing access parameters for a secure resource; receiving an access request for the secure resource from a verified user; confirming that the access request complies with the access parameters provided by the ticket; and generating an access token, the access token usable by the verified user for accessing the secure resource.Type: GrantFiled: April 1, 2022Date of Patent: July 1, 2025Assignee: Shopify Inc.Inventors: Edmond Cotterell, Guillaume Jacques, Nicholas Taylor
-
Patent number: 12346477Abstract: A system includes a processor and a memory accessible to the processor. The memory stores instructions that, when executed by the processor, cause the processor to determine a privacy policy score for one of an application and a website and provide the privacy policy score to a device.Type: GrantFiled: October 6, 2023Date of Patent: July 1, 2025Assignee: Early Warning Services, LLCInventor: Michael Cook
-
Patent number: 12335312Abstract: The source code of an HTML form can be analyzed to derive parameter rules that are subsequently enforced when apparent content of the HTML form is received. Such parameter rules can be drawn from client-side restrictions that are extracted from the HTML source, which are then enforced to prevent content violating the rules from reaching the backend. A proxy can sit between the application and the apparent browser. Dynamically generated HTML can be supported via a headless browser that mirrors HTML that would be present at a browser. Useful for preventing HTML form-based attacks and identifying clear cases of malicious HTML form requests.Type: GrantFiled: August 5, 2022Date of Patent: June 17, 2025Assignee: SAP SEInventors: Cedric Hebert, Merve Sahin
-
Patent number: 12326929Abstract: The disclosure provides computing platforms, systems, methods, and storage media for delivering contextual feedback to a user of a potential cybersecurity attack, such as a phishing attack. In an aspect, the disclosure provides: configuring, via a processor, a plurality of rules, each rule associated with an indicator of suspicious activity and a feedback snippet corresponding to the indicator; receiving, at the processor, a report of a potentially malicious electronic communication; triggering, at the processor, a rule of the plurality of rules based on the associated indicator and the report of the electronic communication; generating, at the processor, feedback comprising the feedback snippet associated with each triggered rule; automatically providing the feedback to the user.Type: GrantFiled: October 31, 2022Date of Patent: June 10, 2025Inventors: David Shipley, Sean Mcdougall
-
Patent number: 12321450Abstract: Some embodiments determine optimal trigger events for executing a malware-detecting artificial intelligence (AI) module by tracking a performance of the respective module over a lifetime of each software sample of a training corpus. Computational costs associated with the respective AI module may be substantially reduced by executing the respective module only sporadically, in response to detecting an occurrence of one of the identified trigger events. In some embodiments, a malware detector employs multiple AI modules, each having its own specific triggers. The choice of triggers may be updated at any time, without affecting other aspects of the malware detector.Type: GrantFiled: March 2, 2023Date of Patent: June 3, 2025Assignee: Bitdefender IPR Management Ltd.Inventors: Radu M. Portase, Botond Fulop, Gheorghe F. Hajmasan
-
Patent number: 12299166Abstract: An application programming interface (API) resident on a computer is provided that, upon receiving a message that a data set associated with an encounter experienced by a subject is available, causes a processor to read a structured file associated with the data set, the structured file having a set of records assigned to a subset of pre-defined fields and a location of one or more unstructured objects, the pre-defined fields being organized according to an ontology having at least records related to the subject, the encounter and the data set; and populate at least first and second independent and distinct relational databases using endpoints of the API. The first relational database excludes records associated with the subject and the encounter and the second relational database includes records associated with the subject and the encounter. The second relational database includes multiple tables that can be accessed by invoking the API.Type: GrantFiled: July 21, 2022Date of Patent: May 13, 2025Assignee: Translational Imaging Innovations, Inc.Inventors: Andrew J. Witchger, Jr., Robert C. Williams, Alexander E. Salmon, Maureen E. Tuffnell, Taylor M. Szeto, Tammy B. Carrea, Eric L. Buckland
-
Patent number: 12292972Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.Type: GrantFiled: April 7, 2022Date of Patent: May 6, 2025Inventor: Manbinder Pal Singh
-
Patent number: 12293008Abstract: One example discloses a security device, including: a bulk security capacitance, including a first endpoint and a second endpoint, and having, a first layer including a first set of conductive elements, the first endpoint, and the second endpoint; and a second layer including a second set of conductive elements; wherein the first set of conductive elements and the second set of conductive elements together form at least two bulk capacitors in series; wherein the first and second layers are separated by a distance; and wherein the first and second endpoints are configured to be coupled to a tamper detection circuit configured to detect a change in the bulk security capacitance.Type: GrantFiled: May 13, 2022Date of Patent: May 6, 2025Assignee: NXP USA, Inc.Inventors: Henri Verhoeven, Edwin Schapendonk, Oswald Moonen, Matheus Johannus Gerardus Lammers
-
Patent number: 12284295Abstract: The present application provides a consensus method for a blockchain, a consensus node, an electronic device, and a storage medium. The method includes: receiving a transaction request sent by an object, calculating a first hash value of executing the at least one transaction task by a consensus node, determining a second hash value according to the first hash value and the at least one transaction task, receiving third hash values broadcasted by other consensus nodes, and generating and adding to the blockchain a block containing the first hash value in response to the second hash value being the same as at least half of the third hash values.Type: GrantFiled: March 3, 2020Date of Patent: April 22, 2025Assignee: Jingdong Technology Information Technology Co., Ltd.Inventor: Shuang Zhang
-
Patent number: 12267343Abstract: Systems, methods, and related technologies for a risk driven planning and simulation tool for a computer network are described. A security risk is determined for each of a plurality of devices on a network. A network traffic map is presented to a display. The network traffic map shows network traffic between the plurality of devices and the security risk for each of the plurality of devices. Segmentation of one or more of the plurality of devices on the network is simulated and presented to the display with updates to the network traffic or updates to the security risk of some of the devices on the network.Type: GrantFiled: April 1, 2022Date of Patent: April 1, 2025Assignee: Forescout Technologies, Inc.Inventors: Eli Fainberg, Yafit Maor
-
Patent number: 12259958Abstract: Connected computing enables the use of highly diverse environments that support operating frameworks for contemporary civilization. But computing productivity and trustworthiness are undermined by such environments' largely inchoate organization. These environments and their identity infrastructures are fragmented, and unnecessarily unreliable, insecure, and insufficiently informative due to current computing entity (e.g., resource) identification infrastructure design, which lacks root identification reliability. Such reliability is enabled herein by a fundamentally accurate and authenticity ensuring, near-existential or existential quality, biometrically and liveness based, portable identification and provenance infrastructure. Such an infrastructure provides ubiquitously available identification information that can be used universally for identification processes.Type: GrantFiled: November 30, 2023Date of Patent: March 25, 2025Assignee: Advanced Elemental Technologies, Inc.Inventors: Victor Henry Shear, Timothy St. John Redmond, Jaisook Rho, Jason Ben Shear, Bruce Jason Tromberg, Robert George Wong
-
Patent number: 12242654Abstract: An electronic device includes circuitry and a memory storing computer-executable instructions that cause the circuitry to execute an application operating on a platform of the electronic device. The application includes a library, and the library controls whether to perform a predefined process, based on version information of the platform acquired from the platform.Type: GrantFiled: February 17, 2022Date of Patent: March 4, 2025Assignee: Ricoh Company, Ltd.Inventors: Yuuya Nakao, Hiroki Asakimori, Takuya Inoue
-
Patent number: 12242596Abstract: An electronic device, a trusted application calling method and apparatus, a device, and a medium are disclosed. Because a trusted application development platform is linked with native trusted applications respectively corresponding to multiple trusted execution environment operating systems (TEE OS), based on the trusted application development platform, a bytecode trusted application can be applicable to any TEE OS, and for different TEE OS hardware platforms, only one corresponding bytecode trusted application needs to be developed for one application. Moreover, the trusted application development platform and the byte code trusted application can be applied to electronic devices (terminals) of different TEE OSs.Type: GrantFiled: August 15, 2022Date of Patent: March 4, 2025Assignee: CHINA UNIONPAY CO., LTD.Inventors: Fen Zou, Chengqian Chen, Dingzhou Li, Xin Wang
-
Patent number: 12235955Abstract: Methods and systems for detecting attempted manipulation of a machine learning model via explanation poisoning are provided. The method includes: computing explanations based on outputs of the model that include information that relates to features that affect the output of the model with respect to the first data point; assigning labels to the explanations based on the features; generating an explanation ensemble that resides in an N-dimensional space, N being equal to a number of assigned labels plus one; determining a region within the N-dimensional space for which a subsequent introduction of data causes a subsequent explanation that does not relate to the features; and when the additional data is introduced to the determined region, generating an alert message for notifying a user that a likelihood of adverse manipulation of the model is high based on the additional data.Type: GrantFiled: January 13, 2023Date of Patent: February 25, 2025Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Allan Anzagira, Freddy Lecue, Daniele Magazzeni, Saumitra Mishra
-
Patent number: 12223087Abstract: Disclosed is a system for providing a personal information-based speech information processing service, and a system for providing a speech information processing service based on personal information protection, in which speech information including personal information is prevented from being fraudulently used in a cloud network or a public network, and personal information that needs to be protected is blocked not to be transmitted to/stored in/managed by a cloud service server regardless of a user's recognition.Type: GrantFiled: May 3, 2021Date of Patent: February 11, 2025Assignee: MindwareWorks Co., Ltd.Inventors: Jae In Lee, Hyun Sun Cho
-
Patent number: 12219066Abstract: An electronic device, server and method are disclosed. The electronic device includes a communication module, memory, and a processor. The processor implements one method, including executing authentication and registering of an external electronic device as a sharing target, receiving a selection of at least one service to be shared with the external electronic device, encrypting data including an user identification (ID) and a password associated with the at least one service in response to the selection, transmitting a request for sharing the encrypted data to a server through the communication module to allow the external electronic device to use the at least one service without exposure of the ID and the password, receiving a response to the transmitted request from the server through the communication module, and generating a notification indicating whether the ID and the password are successfully shared for the selected at least one service, based on the received response.Type: GrantFiled: December 23, 2021Date of Patent: February 4, 2025Assignee: Samsung Electronics Co., Ltd.Inventors: Shinyoung Na, Nahyeong Park, Wonseok Baek, Junsuk Oh
-
Patent number: 12212675Abstract: Discussed are a cross certification method and a certifying device to perform the method.Type: GrantFiled: July 27, 2021Date of Patent: January 28, 2025Assignee: LG ENERGY SOLUTION, LTD.Inventor: Junghyun Kwon
-
Patent number: 12212691Abstract: A method of operating a computer-controlled first device for establishing a secure data communication with a computer-controlled second device in a passenger transportation arrangement distributed control system includes: generating an encryption key including a public and private key pair; creating credentials (e.g. X.509 certificate) based on the generated encryption key; preparing a certificate signing request CSR and dispatching the CSR via a secured data communication path to a certificate authority CA that is based on a public key infrastructure PKI operated by the passenger transportation arrangement operator; receiving the certificate from the CA with a signature using a private key held secret by the operator; establishing the secure data communication with the second device by transmitting the credentials to the second device, wherein the second device accepts establishing the secure data communication upon verification of the signature of the credentials executed using a public key of the operator.Type: GrantFiled: February 8, 2021Date of Patent: January 28, 2025Assignee: INVENTIO AGInventor: Claudio Colombano
-
Patent number: 12206702Abstract: Aspects of the subject disclosure may include, for example, a device that has a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of performing a packet analysis of protocol data unit (PDU) headers of inbound Internet and non-Internet traffic; determining whether the PDU headers identify the presence of a quantum payload and/or via deep packet inspection; detecting a presence of attack vectors in the quantum payload responsive to a determination that the PDU headers identify the presence of the quantum payload, wherein the attack vectors originate from a quantum computer, and wherein the attack vectors are cryptanalytically relevant; generating an alert responsive to detecting the presence of the attack vectors; and isolating compromised network elements, sets of elements, and/or other network components and/or subsystems, and route traffic around the compromised network elements, sets ofType: GrantFiled: March 9, 2023Date of Patent: January 21, 2025Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLCInventors: Thomas J. Routt, Mark Stockert