Patents Examined by Carl G. Colin
  • Patent number: 12373544
    Abstract: According to an embodiment, an information processing apparatus performs, in a case where an information processing program specified as an activation target is not an information processing program allowed in advance to be executed and included in a white list, execution restriction of the specified information processing program. Moreover, the information processing apparatus stops the execution restriction in accordance with a determination that the specified information processing program is an information processing program for forced stop.
    Type: Grant
    Filed: October 13, 2022
    Date of Patent: July 29, 2025
    Assignee: Toshiba Tec Kabushiki Kaisha
    Inventors: Yoshihiro Komatsubara, Yasuhiro Inagaki, Fumihiko Ikegami
  • Patent number: 12373553
    Abstract: Media, methods, and systems are disclosed for detecting anomalous API calls within a real-time data flow. A real-time data stream is received. The real-time data stream is filtered. A stored state is modified based on a log entry data element within the filtered real-time data stream. An API call associated with the modified stored state is detected to be anomalous. Finally, a remediation action is taken for the API call.
    Type: Grant
    Filed: September 17, 2021
    Date of Patent: July 29, 2025
    Assignee: Salesforce, Inc.
    Inventor: Stanislav Babourine
  • Patent number: 12361137
    Abstract: Cyber security testing with automated system message processing for input and result determination is disclosed, including issuing, by a test tool, a call to an authorized service; identifying, by the test tool, one or more system-level error messages generated after issuing the call; determining, by the test tool based on at least one first system-level error message, a missing input for the call to the authorized service; and reissuing, by the test tool, the call to the authorized service with the missing input.
    Type: Grant
    Filed: March 30, 2023
    Date of Patent: July 15, 2025
    Assignee: International Business Machines Corporation
    Inventors: Michael Page Kasper, Eric Rosenfeld, Bryan Childs, Diane Marie Stamboni, Joshua David Steen
  • Patent number: 12355790
    Abstract: This application discloses a data packet processing method performed by an electronic device. The data packet processing method includes: obtaining a target network data packet; generating data packet fingerprints of the target network data packet, the data packet fingerprints including a target traffic attribute fingerprint and a target traffic payload fingerprint; determining a type of the target network data packet according to an occurrence frequency of the target traffic payload fingerprint in a fingerprint database and the target traffic attribute fingerprint, the fingerprint database including historical traffic payload fingerprints of a plurality of historical network data packets; and blocking a network connection of the target network data packet when the type of the target network data packet is an abnormal type.
    Type: Grant
    Filed: November 21, 2022
    Date of Patent: July 8, 2025
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Hang Li, Liquan Nie, Fan Zeng, Keyun Luo
  • Patent number: 12353609
    Abstract: A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.
    Type: Grant
    Filed: October 21, 2021
    Date of Patent: July 8, 2025
    Assignee: DELL PRODUCTS L.P.
    Inventors: Chandrashekar Nelogal, James Peter Giannoules, Marcelo S. Saraiva, Karthikeyan Rajagopalan, Sanjeev S. Dambal, Sisir K. Dash, Sura Reddy
  • Patent number: 12346434
    Abstract: Attributes of snapshots are provided that ensure snapshot preservation and enable utilization of snapshots to be restricted. If a cyber intrusion event is detected, fence attributes are set on snapshots that were created after the time of the possible cyber intrusion event to restrict those snapshots from being used for cyber recovery until after the data contained in the snapshots has been validated. If a snapshot is selected for use, the fence attribute is checked and, if set, prevents the snapshot from being used until the data of the snapshot is validated. Additionally, keep attributes are set on snapshots that were created before the possible cyber intrusion event, to preserve those snapshots to prevent the snapshots from termination. If a snapshot is selected for termination, the keep attribute is checked, and if set, prevents the snapshot from being terminated until the keep attribute is reset.
    Type: Grant
    Filed: November 12, 2022
    Date of Patent: July 1, 2025
    Assignee: Dell Products, L.P.
    Inventors: Melissa Flynn, Evan Jones
  • Patent number: 12348637
    Abstract: Methods and systems are described herein for using cryptographic tokens that represent real-world items to enable those items to be used in different virtual worlds (e.g., game worlds). In particular, an object retrieval system may be used to retrieve a cryptographic token that encodes parameter data for an object to be used (e.g., displayed) within a plurality of computing platforms. The object retrieval system may determine (e.g., using a cryptographic signature) that the user is allowed to use the object and may then generate a set of parameters for representing the object with the particular computing platform requesting the object. The object retrieval system may then transmit the parameters to the requesting platform. The object retrieval system may perform the same operations for requests from other platforms, such that the object retrieval system may uniquely encode the parameters for the particular platforms.
    Type: Grant
    Filed: December 12, 2022
    Date of Patent: July 1, 2025
    Assignee: Capital One Services, LLC
    Inventors: Kevin Osborn, Imren Johar, Dennis Sean Brennan
  • Patent number: 12348540
    Abstract: Embodiments discussed herein include systems, devices, methods, and techniques to process data, generate one or more graphs, and utilize the one or more graphs to detect anomalies.
    Type: Grant
    Filed: August 19, 2021
    Date of Patent: July 1, 2025
    Assignee: Capital One Services, LLC.
    Inventors: Nahid Farhady Ghalaty, Vincent Pham, Lee Adcock, Ana Cruz
  • Patent number: 12339963
    Abstract: In some examples, a storage system intercepts a write request communicated over a network from a requester in a host system, the write request to write data of a data volume. The storage system determines whether the data of the write request matches a specified pattern. In response to determining that the data of the write request does not match the specified pattern, the storage system indicates that the write request from the requester in the host system has been corrupted by malware that has performed an unauthorized encryption on the data.
    Type: Grant
    Filed: May 10, 2022
    Date of Patent: June 24, 2025
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Joseph E. Algieri, Alex Veprinsky
  • Patent number: 12335721
    Abstract: A method of providing authentication at a communication device is provided. A primary authentication is run with a Trusted Non-3GPP Gateway Function TNGF node to obtain a TNGF Key (KTNGF). A re-authentication Root Key (rRK) is provided based on the TNGF key. A re-authentication Master Session Key (rMSK1) is derived based on the re-authentication Root Key. A security setup is performed with a Trusted Non-3GPP Access Point TNAP using the re-authentication Master Session Key. Related methods of performing authentication using a Trusted Non-3-GPP Gateway Function are also discussed.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: June 17, 2025
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Helena Vahidi Mazinani, Vesa Lehtovirta
  • Patent number: 12335400
    Abstract: A set of distance measurable encrypted feature vectors can be derived from any biometric data and/or physical or logical user behavioral data, and then using an associated deep neural network (“DNN”) on the output (i.e., biometric feature vector and/or behavioral feature vectors, etc.) an authentication system can determine matches or execute searches on encrypted data. Behavioral or biometric encrypted feature vectors can be stored and/or used in conjunction with respective classifications, or in subsequent comparisons without fear of compromising the original data. In various embodiments, the original behavioral and/or biometric data is discarded responsive to generating the encrypted vectors. In another embodiment, distance measurable or homomorphic encryption enables computations and comparisons on cypher-text without decryption of the encrypted feature vectors. Security of such privacy enabled embeddings can be increased by implementing an assurance factor (e.g.
    Type: Grant
    Filed: November 10, 2022
    Date of Patent: June 17, 2025
    Assignee: Private Identity LLC
    Inventor: Scott Edward Streit
  • Patent number: 12326931
    Abstract: One example method includes monitoring a data access pattern, registering a data access request directed to data, comparing metadata associated with the data access request to a rule, based on a result of the comparing, sending a trigger to a graph service, and using information in the trigger to generate a visual representation of the data access request, wherein the visual representation indicates an extent to which the data access request is considered to constitute a potential threat to the data.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: June 10, 2025
    Assignee: EMC IP Holding Company LLC
    Inventors: Ahmad Refaat Abdel Fadeel Ahmad El Rouby, Omar Abdulaal, Nicole Reineke, Joel Christner, Farida Shafik, Shary Beshara
  • Patent number: 12316665
    Abstract: Systems and methods include a computer-implemented method for presenting a model of cybersecurity. Questionnaire answers corresponding to individual components of each of three elements contributing to cybersecurity risk and maturity for a computer system are received by a four-dimensional cybersecurity assurance model application. Three scores corresponding to dimensions of cybersecurity assurance for the computer system are generated by the four-dimensional cybersecurity assurance model application using the questionnaire answers. A three-dimensional graph presenting a four-dimensional model of cybersecurity assurance for the computer system is generated by the four-dimensional cybersecurity assurance model application using the three scores and temporal information.
    Type: Grant
    Filed: February 11, 2022
    Date of Patent: May 27, 2025
    Assignee: Saudi Arabian Oil Company
    Inventors: John Gwilliams, Sultan Saadaldean Alsharif
  • Patent number: 12316603
    Abstract: Systems and methods for remote command access in a hybrid cloud to on-premises devices are described. An example method includes receiving, by a gateway service, a request for a connection between a remote support service agent and an on-premises device. The method further includes receiving, by the gateway service, consent from an authorized user associated with the on-premises device. The method further includes creating, by the gateway service, a first session with the on-premises device, where a scope of the consent is limited to the first session. The method further includes provisioning, by the gateway service, a device-specific hybrid connection endpoint for the first session. The method further includes forming, by the gateway service a secure session by binding the device-specific hybrid connection endpoint with a second session, the secure session allowing for transport of data and a set of commands based on a scope of the consent.
    Type: Grant
    Filed: December 30, 2021
    Date of Patent: May 27, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Faraz H. Qadri, Aniket A. Malatpure, Swapnil T. Ashtekar, Greeshma Vijayakumar, Shireen Anvarhusein Isab, Mohit Kumar Garg, Phani Prakash Boppana, Trivikram Somisetty
  • Patent number: 12277237
    Abstract: The present application discloses a method, system, and computer system for providing access to information stored on system for data storage. The method includes receiving a data request from a user, determining data corresponding to the data request, determining whether the user has requisite permissions to access the data, and in response to determining that the user has requisite permissions to access the data: determining a manner by which to provide access to the data, wherein the data comprises a filtered subset of stored data, and generating a token based at least in part on the user and the manner by which access to the data is to be provided.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: April 15, 2025
    Assignee: Databricks, Inc.
    Inventors: Matei Zaharia, David Lewis, Cheng Lian, Yuchen Huo, Ali Ghodsi
  • Patent number: 12271450
    Abstract: Methods, systems and security devices for rendering digital invisible ink, can involve representing an invisible item in a single color that is not discernable from white by a human eye, embedding the invisible item into white space of a digital document, and converting the invisible item into a visible item using a transform table that defines how to convert the single color of the invisible item so that the invisible item after a conversion to the visible item is discernable by the human eye.
    Type: Grant
    Filed: January 5, 2023
    Date of Patent: April 8, 2025
    Assignee: Xerox Corporation
    Inventor: Edward N. Chapman
  • Patent number: 12271505
    Abstract: Systems and methods for protecting and interacting with data in real time are described by the disclosed subject matter. A method includes monitoring a presentation of data by an application on a display and determining that a portion of the data is restricted. The method includes asking, in real time, the presentation of the portion of the data that is restricted.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: April 8, 2025
    Inventor: Aveek Kumar Mukherjee
  • Patent number: 12267433
    Abstract: A universal serial bus device, including: a main body; a connection portion attached to the main body; a processor; a storage portion storing a hash function executable by the processor, the hash function producing a hash value; a non-changing visual code on the main body, the visual code being readable by an optical scanner and corresponding to the hash function; and an electronic display configured to display the hash value.
    Type: Grant
    Filed: October 22, 2021
    Date of Patent: April 1, 2025
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, Carolina Garcia Delgado, Desilda Toska, Mauro Marzorati
  • Patent number: 12259964
    Abstract: Method, systems, and computer-readable media for securely executing a script on a computer appliance are disclosed. A script payload is obtained from a requesting entity via an interface of the computer appliance, the script payload comprising the script and script security data. Multiple authentication factors for the script are obtained from the script security data, the multiple authentication factors comprising at least some nested authentication factors, wherein a first one of the authentication factors is encapsulated within a second one of the authentication factors. A first validation is performed to authenticate the script and the first authentication factor based on the second authentication factor and to generate a validated first authentication factor. A second validation is performed to authenticate the script based on the validated first authentication factor. Responsive to the script being authenticated by the first and second validations, the script is executed on the computer appliance.
    Type: Grant
    Filed: October 27, 2021
    Date of Patent: March 25, 2025
    Inventors: Mortimer Hubin, Charles Desjardins, Jean Bouchard
  • Patent number: 12250537
    Abstract: Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices, thus concurrently maintaining individual data privacy and data provenance.
    Type: Grant
    Filed: November 8, 2022
    Date of Patent: March 11, 2025
    Assignee: QUALCOMM Incorporated
    Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Horn