Patents Examined by Canh Le
-
Patent number: 12212580Abstract: An ingress server is operable to perform, through a multi-list evaluator, two different validations: one utilizes a sender network address of a sender's server to determine whether to trust, accept, or reject a connection and one utilizes a domain of a sender email address from an envelope to determine whether to accept or reject a message. The multi-list evaluator may perform the validations in two phases. If a connection can be trusted, the connection is accepted and any message over the connection (in a single session) is accepted and no further validation is necessary. Further, in both phases, the multi-list evaluator can utilize a whitelist maintained by the ingress server to override a blacklist provided by a blacklist supplier. This override can reduce false-positives and drastically reduce delays usually associated with correcting false-positives and improve system throughput.Type: GrantFiled: August 9, 2021Date of Patent: January 28, 2025Assignee: OPEN TEXT HOLDINGS, INC.Inventor: Amitava Dutta
-
Patent number: 12192358Abstract: A technology is described for device communication with computing regions. An example method may include receiving at a first computing region a request for a computing resource. In response to receiving the request, a device associated with the request may be authenticated using authentication credentials for the device. An identity token that indicates permission for the device to access the computing resource in a second computing region may be generated and the identity token and instructions to connect to the second computing region may be provided to the device. The device may present the identity token to the second computing region in order to access the computing resource in the second computing region.Type: GrantFiled: September 17, 2021Date of Patent: January 7, 2025Assignee: Amazon Technologies, Inc.Inventor: Rameez Loladia
-
Information output device, camera, information output system, information output method, and program
Patent number: 12177191Abstract: An information output device includes: a first output unit that outputs acquired information acquired by a sensor; and a second output unit that converts personal information included in the acquired information into attribute information from which identification of an individual is impossible, and outputs the attribute information.Type: GrantFiled: December 6, 2021Date of Patent: December 24, 2024Assignee: NEC CORPORATIONInventor: Akira Kato -
Patent number: 12177206Abstract: Disclosed is an electronic device including: a communication circuit set to communicate with at least one authentication server for providing an identification authentication service; and a processor, wherein the processor is set to: transmit, to the at least one authentication server, first identifying information corresponding to an object to which identification information is to be provided and second identifying information corresponding to the electronic device; receive, from the at least one authentication server, information about a first item among a plurality of items of the identification information, the information about the first item being determined at least partially on the basis of the first identifying information and the second identifying information; and display, through the display, information corresponding to a first value related to the first item among the plurality of items of the identification information in response to a successful user authentication.Type: GrantFiled: September 16, 2019Date of Patent: December 24, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Gawon Lee, Eunyoung Kwon, Dasom Lee, Taeckki Lee, Daehaeng Cho
-
Patent number: 12165750Abstract: Provided is a method and system for collecting clinical trial data based on blockchain, and the method of collecting clinical trial data based on blockchain includes the steps of: receiving the clinical trial data from a researcher terminal; requesting verification of the received clinical trial data from a verification node; performing consensus verification on a verification result when the verification result according to the verification request is received from the verification node; and propagating the clinical trial data to the verification node according to a result of the consensus verification, performed by a platform.Type: GrantFiled: January 11, 2022Date of Patent: December 10, 2024Assignee: JNPMEDI INC.Inventor: Young Yong Park
-
Patent number: 12160734Abstract: To provide a limited access service to one or more applications, for example V2E applications, one or more preconfigured credentials in a user device a vehicle is equipped with are used by a base station to authenticate, from an application server, for example a V2E application server, the user device. If the authentication succeeds, a limited access service is granted.Type: GrantFiled: July 31, 2018Date of Patent: December 3, 2024Assignee: Nokia Technologies OyInventors: Vinh Van Phan, Ling Yu, Hannu Petri Hietalahti
-
Patent number: 12137121Abstract: A distributed security system includes a plurality of content processing nodes that are located external to a network edge of an enterprise and located external from one of a computer device and a mobile device associated with a user, and a content processing node is configured to monitor a content item that is sent from or requested by the external system; classify the content item via a plurality of data inspection engines that utilize policy data and threat data; and one of distribute the content item, preclude distribution of the content item, allow distribution of the content item after a cleaning process, or perform threat detection on the content item, based on classification by the plurality of data inspection engines; and an authority node communicatively coupled to the plurality of content processing nodes and configured to provide the policy data and the threat data for threat classification.Type: GrantFiled: May 25, 2022Date of Patent: November 5, 2024Assignee: Zscaler, Inc.Inventors: Kailash Kailash, Shashidhara Mysore Nanjundaswamy, Amarnath Mullick, Jose Kolenchery Rappel
-
System and method to detect domain generation algorithm malware and systems infected by such malware
Patent number: 12099603Abstract: Systems and methods for detection of domain generated algorithms (DGA) and their command and control (C&C) servers are disclosed. In one embodiment, such an approach includes examining DNS queries for DNS resolution failures, and monitoring certain set of parameters such as number of levels, length of domain name, lexical complexity, and the like for each failed domain. These parameters may then be compared against certain thresholds to determine if the domain name is likely to be part of a DGA malware. Domain names identified as being part of a DGA malware may then be grouped together. Once a DGA domain name has been identified, activity from that domain name can be monitored to detect successful resolutions from the same source to see if any of the successful domain resolutions match these parameters. If they match specific thresholds, then the domain is determined to be a C&C server of the DGA malware and may be identified as such.Type: GrantFiled: January 31, 2019Date of Patent: September 24, 2024Assignee: McAfee, LLCInventors: Neeraj Thakar, Praveen Kumar Amritaluru, Vikas Taneja -
Patent number: 12099613Abstract: A method, computer program product, and computer system for repairing a Dockerfile. Library versions containing initial version numbers of libraries are extracted from the Dockerfile. A Monte Carlo tree search (MCTS) is executed, using the extracted library versions as input, which generates a tree that includes multiple levels populated with noses. Each node in a level represents the generic library name of a library version in the Dockrerfile and an associated randomly selected version number. At least one of the randomly selected version numbers associated with at least one node in a level differs from the initial version number associated with a versionf. A best successful installation path is selected from the at least one successful installation path. The Dockerfile is repaired by inserting randomly selected version numbers into Dockerfile as replacements for some of the initial version numbers.Type: GrantFiled: September 16, 2021Date of Patent: September 24, 2024Assignee: International Business Machines CorporationInventors: Xiang Yu Yang, Yong Wang, Zhong Fang Yuan, Deng Xin Luo, Ye Wang, Zhi Yong Jia
-
Patent number: 12088630Abstract: A method including receiving, by a security device from a network device, an initial security instruction set including a plurality of initial security instructions associated with operation of the security device; receiving, by the security device from the network device, an event signal associated with the security device carrying out a network-facing operation; transmitting, by the security device to the network device based on receiving the event signal, a security instruction associated with the security device carrying out the network-facing operation, the security instruction being from among the plurality of initial security instructions; receiving, by the security device from the network device based on transmitting the security instruction, communication information to enable the security device to carry out the network-facing operation; and carrying out, by the security device, the network-facing operation based on utilizing the communication information is disclosed.Type: GrantFiled: August 9, 2022Date of Patent: September 10, 2024Assignee: UAB 360 ITInventors: Aleksandr {hacek over (S)}ev{hacek over (c)}enko, Justas Rafanavi{hacek over (c)}ius
-
Patent number: 12086806Abstract: A method for authenticating an individual for login to a server computer includes receiving at the server computer data for a first authentication image from an electronic computing device. First attributes are identified of one or more similar geometrical shapes from the data for the first authentication image. A determination is made as to whether the first attributes of the one or more similar geometrical shapes from the data for the first authentication image correspond to second attributes from a second authentication image accessible on or by the server computer. When the first attributes correspond to the second attributes, the individual is authenticated on the server computer.Type: GrantFiled: June 15, 2022Date of Patent: September 10, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Rameshchandra Bhaskar Ketharaju, Hemakumar Madabathula, Aditya Kishore Jonnalagadda, Saipavan K. Cherala, Ramanathan Ramanathan
-
Patent number: 12088629Abstract: A method including transmitting, by a network device to a security device, an initial security instruction set including a plurality of initial security instructions; transmitting, by the network device to the security device based on transmitting the initial security instruction set, an event signal associated with the security device carrying out a network-facing operation; transmitting, by the security device to the network device based on receiving the event signal, a security instruction associated with the security device carrying out the network-facing operation, the security instruction being from among the plurality of initial security instructions; translating, by the network device, the security instruction into a host instruction to be executed by the network device; and receiving, by the security device from the network device based on transmitting the security instruction, communication information to enable the security device to carry out the network-facing operation is disclosed.Type: GrantFiled: August 9, 2022Date of Patent: September 10, 2024Assignee: UAB 360 ITInventors: Aleksandr Ŝevĉenko, Justas Rafanaviĉius
-
Patent number: 12074886Abstract: The system and method disclosed performs entity authentication through identification proofing. A relying party such as a corporation or other type of entity having a secure website, computer network and secure facility working a risk engine can determine the authenticity, validation and verification during registration of a user entity. The identification proofing is integrated with a risk engine. The risk engine is capable of using bio-behavior based information which may be continuously monitored.Type: GrantFiled: June 12, 2023Date of Patent: August 27, 2024Assignee: SecureAuth CorporationInventors: Shahrokh Shahidzadeh, Frank Stefan Ulbrich
-
Patent number: 12074901Abstract: Systems, methods, and software described herein provide for validating security actions before they are implemented in a computing network. In one example, a computing network may include a plurality of computing assets that provide a variety of different operations. During the operations of the network, administration systems may generate and provide security actions to prevent or mitigate the effect of a security threat on the network. However, prior to implementing the security actions within the network, computing assets may exchange security parameters with the administration systems to verify that the security actions are authentic.Type: GrantFiled: March 2, 2023Date of Patent: August 27, 2024Assignee: Splunk Inc.Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
-
Patent number: 12072962Abstract: The present disclosure relates to a method for authenticating a user. The method comprises recording image data of the user and deriving at least one first facial feature of the user's face and at least one first gesture feature of one or more gestures of the user from the image data. The method further provides for determining a degree of access of the user to data depending on whether the first gesture feature corresponds to at least one predetermined second gesture feature and whether the first facial feature corresponds to at least one predetermined second facial feature.Type: GrantFiled: May 24, 2021Date of Patent: August 27, 2024Assignee: SONY SEMICONDUCTOR SOLUTIONS CORPORATIONInventors: Lev Markhasin, Bi Wang
-
Patent number: 12069040Abstract: Various systems and methods of establishing and providing credential dependency information in RESTful transactions are described. In an example, accessing credential resource dependencies may be performed by a credential management service (CMS) or other server, with operations including: receiving a request for a credential resource in a Representation State Transfer (RESTful) communication; identifying the credential resource which has a credential path that indicates a dependency associated with a credential; identifying dependency characteristics of the credential resource, based on the dependency; populating the credential resource to include a dependent credential, based on the dependency characteristics; and transmitting the populated credential resource in response to the request.Type: GrantFiled: September 28, 2018Date of Patent: August 20, 2024Assignee: Intel CorporationInventor: Ned M. Smith
-
Patent number: 12052223Abstract: A network device identifies an Internet Protocol Security (IPsec) tunnel that connects the network device to a remote device and determines that dead peer detection (DPD) is enabled at the network device. The network device receives a first DPD request message from the remote device via the IPsec tunnel, and sends a first DPD response message to the remote device via the IPsec tunnel. The network device determines that a workload of the network device satisfies a threshold amount, and sends one or more encapsulating security payload (ESP) packets that include traffic flow confidentiality (TFC) payload data to the remote device via the IPsec tunnel. The network device determines that the workload of the network device does not satisfy the threshold amount. The network device receives a second DPD request message from the remote device and sends a second DPD response message to the remote device via the IPsec tunnel.Type: GrantFiled: April 19, 2021Date of Patent: July 30, 2024Assignee: Juniper Networks, Inc.Inventors: Naresh Chand, Ranjan Sinha
-
Patent number: 12039047Abstract: Systems and methods for detecting malicious activity in a computer system. One or more graphs can be generated based on information objects about the computer system and relationships between the information objects, where the information objects are vertices in the graphs and the relationships are edges in the graphs. Comparison of generated graphs to existing graphs can determine a likelihood of malicious activity.Type: GrantFiled: October 21, 2021Date of Patent: July 16, 2024Assignee: AO KASPERSKY LABInventors: Igor I. Soumenkov, Sergey Y. Golovanov
-
Patent number: 12028329Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, a command is transmitted causing a client device to present a workflow action to perform. A user command to perform the workflow action is identified using the client device. Authentication data including user credentials and a navigation action for a visual user interface is identified. The user credentials are transmitted to the network service and an emulation of the navigation action is performed. A command that performs the workflow action is transmitted to the network service.Type: GrantFiled: February 16, 2022Date of Patent: July 2, 2024Assignee: VMware LLCInventors: Daniel E. Zeck, David Shaw, Robert Worsnop, John Ryan Bard
-
Patent number: 12015612Abstract: In one embodiment, a charm application enables user devices to communicate via physical charms. Upon receiving, from a first user device, a read request that is associated with the physical charm, the charm application identifies a message and an authorization list that are associated with the physical charm and previously received from a second user device. The charm application then determines whether a first user associated with the first user device is authorized to read the message based on the authorization list. If the first user is authorized to read the message, then the charm application transmits the message to the first user device. Notably, each physical charm may be exchanged between any number of users, but only read by authorized users via a user device. Accordingly, user devices may communicate private messages including any type of data with other user devices irrespective of whether technical infrastructures are accessible.Type: GrantFiled: August 25, 2017Date of Patent: June 18, 2024Assignee: DISNEY ENTERPRISES, INC.Inventors: Michael Goslin, Larra Paolilli, Katherine M. Bassett, Janice Rosenthal