Patents Examined by Catherine Thiaw
-
Patent number: 12047403Abstract: Introduced here are security management platforms configured to identify, assess, and monitor organizational vulnerability to security threats. By monitoring netflow data regarding the traffic traversing the Internet, a security management platform can identify security threats that would otherwise go undetected. Such action can be performed instead of, or in addition to, monitoring netflow data regarding the traffic traversing a local network (also referred to as an “internal network”) associated with an organization under examination. Thus, rather than monitor the traffic leaving public-facing Internet Protocol (IP) addresses residing on the local network, the security management platform can instead monitor traffic traversing the Internet and then filter the traffic to identify flows originating from the local network, flows destined for the local network, or any combination thereof.Type: GrantFiled: March 29, 2021Date of Patent: July 23, 2024Assignee: Palo Alto Networks, Inc.Inventors: Matthew Kraning, Gregory Heon, Pamela Toman
-
Patent number: 12047502Abstract: A user device may determine to back up a hardware key that is associated with a hardware component of the user device. The user device may determine that the user device has an operation key. The user device may retrieve the hardware key from a first data structure that is included in the user device and may encrypt, based on the operation key, the hardware key. The user device may process, after encrypting the hardware key, the hardware key to generate a hash value and may determine that the hash value is not included in a registry of the user device. The user device may transmit, based on determining that the hash value is not included in the registry, the encrypted hardware key to a server device to cause the hardware key to be backed up in a second data structure associated with the server device.Type: GrantFiled: May 5, 2021Date of Patent: July 23, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Rocco P. Demasi, Jason M. Iannelli, Ronald L. Bland, Michael J. McGuinness, Lori L Crimmins, Michael L. Bowman, Daniel J. Pfennig
-
Patent number: 12041091Abstract: A system and methods for automated Internet-scale vulnerability scanning and enhanced security profiling. The system utilizes a scheduler that directs web crawlers to scan domains retrieved from a database, interact with the contents of any retrieved web pages using fuzz testing, index and store the results of the scan, and provide the indexed results via an API for inclusion in cybersecurity scoring.Type: GrantFiled: April 30, 2021Date of Patent: July 16, 2024Assignee: QOMPLX LLCInventors: Alejandro Caceres, Tomas Fornara, Jason Crabtree, Richard Kelley, Andrew Sellers
-
Patent number: 12015707Abstract: A communication method and a related product are provided. The communication method includes: When UE switches from a source slice to a target slice mutually exclusive with the source slice, both the UE and a target AMF serving the target slice can obtain a first AMF key Kamf_new. The first AMF key Kamf_new is different from a second AMF key Kamf, and the second AMF key Kamf is a key of a source AMF serving the source slice. According to the application communication security and effectiveness are significantly improved_in a mutually exclusive slice switching scenario.Type: GrantFiled: July 20, 2021Date of Patent: June 18, 2024Assignee: Huawei Technologies Co., Ltd.Inventors: Juan Deng, Chengdong He
-
Patent number: 12013969Abstract: Embodiments of the present disclosure may provide a data clean room allowing secure data analysis across multiple accounts, without the use of third parties. Each account may be associated with a different company or party. The data clean room may provide security functions to safeguard sensitive information. For example, the data clean room may restrict access to data in other accounts. The data clean room may also restrict which data may be used in the analysis and may restrict the output. The overlap data may be anonymized to prevent sensitive information from being revealed.Type: GrantFiled: January 28, 2021Date of Patent: June 18, 2024Assignee: Snowflake Inc.Inventors: Rachel Frances Blum, Joshua James Chacona, Christian Kleinerman, Justin Langseth, William L. Stratton, Jr.
-
Patent number: 12015642Abstract: Methods, systems, and computer readable media for testing a system under test (SUT). A method includes sending a first test packet to the SUT over a communication link. The first test packet is associated with a layer 2 secure channel that is bound to an emulated network device. The method includes receiving a second test packet from the SUT over the communication link. The second test packet includes an unencrypted portion and an encrypted portion. The method includes forming a test identifier that uniquely identifies the layer 2 secure channel and the emulated network device using a subset of bits from a secure channel identifier in the unencrypted portion of the second test packet. The method includes decrypting the encrypted portion of the second test packet by finding a security key using the test identifier.Type: GrantFiled: February 12, 2021Date of Patent: June 18, 2024Assignee: KEYSIGHT TECHNOLOGIES, INC.Inventors: Debojyoti Roy, Pradosh Tapan Datta, Robert Brian Luking, Aymen Chebab
-
Patent number: 11941157Abstract: A computer implemented method for managing the scope of permissions granted by users to application that includes collecting a set of permissions for an application from an application provider publication; and collecting a process flow for functional steps of the application from a review of the application that is published on a product review type publication. The computer implemented method further includes dividing the functional steps of the application into a plurality of journeys, each of said plurality of journeys having a function associated with a stage of a functional step from a perspective of a user; and matching permissions from the set of permissions for each journey of said plurality of journeys to provide matched permissible permissions to journeys stored in a customer journey store.Type: GrantFiled: December 16, 2020Date of Patent: March 26, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hao Chun Hung, Po-Cheng Chiu, Tsai-Hsuan Hsieh, Cheng-Lun Yang, Chiwen Chang, Shin Yu Wey
-
Patent number: 11930041Abstract: A generalized localization system based on a physical layer aided spoofing signal attacks detection and an identification verification for hybrid heterogeneous networks including aerial and terrestrial communication systems is provided. The generalized localization system includes: a data preprocessing and separation block, a parameter extraction block, a local localization engine, a reliability assessment and trust management block, a location based anomaly detector block and a global fusion center.Type: GrantFiled: September 17, 2019Date of Patent: March 12, 2024Assignees: ISTANBUL TEKNIK UNIVERSITESI, GEBZE TEKNIK UNIVERSITESIInventors: Saliha Buyukcorak, Gunes Zeynep Karabulut Kurt
-
Patent number: 11924211Abstract: The invention relates to a device and a method for authenticating a user utilizing an internet access client (10) for accessing remote resources of a computer infrastructure, said access comprising a first authentication (130) of the internet access client (10) and a second authentication (140) of the user of the internet access client (10). The method includes sending (132), to a token security module (21), by the internet access client (10), a client certificate (220), said client certificate (220) being associated with items of identification information of the internet access client (10); and receiving (133), by the internet access client (10), an authentication token (210) generated by the token security module when the client certificate (220) sent has been verified by the token security module.Type: GrantFiled: June 2, 2021Date of Patent: March 5, 2024Assignee: BULL SASInventor: Christophe Guionneau
-
Patent number: 11924213Abstract: A user permission system manages and regulates access to secure data at one or more third-party data sites. The system may provide access to one or more databases or other data structures based on user authentication and access rules that have been established, such as by a user associated with the data being accessed at the third party data store. Access may be provided via an API to the third-party data site, along with access credentials of a user with data stored with the third-party data site, allowing the system to access data on behalf of the user.Type: GrantFiled: January 18, 2022Date of Patent: March 5, 2024Assignee: ConsumerInfo.com, Inc.Inventors: Michelle Felice-Steele, Michele Raneri, Paul DeSaulniers, Joe Manna, Jeff Softley, Srikumar Puthupadi Kanthadai, Aga Dzhafar Hady Ogiu Dzhafarov, Pat Finneran, Donna Meryl Smith, Gregory Lennox Wright, Marizette Galvez, Ujjayan Banerjee, Ravi Devesetti, Shivakumar Ramanathan, Mukeshkumar G. Patel
-
Patent number: 11910197Abstract: A service processing method includes receiving, by a mobile phone, a first identifier from a head device of a vehicle after the head device receives a trigger request to perform a vehicle door opening service, determining, by the mobile phone based on the first identifier, to perform authentication, indicating, by the mobile phone, the head device to perform the vehicle door opening service when the authentication succeeds, or determining, by the mobile phone based on the first identifier, not to perform the authentication, and sending, by the mobile phone, location information of the mobile phone, and an indication that indicating a location of the mobile phone and a location of the head device are normal to the head device.Type: GrantFiled: September 7, 2018Date of Patent: February 20, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Zhuofei Li
-
Patent number: 11888891Abstract: A method for creating a heuristic rule to identify Business Email Compromise (BEC) attacks includes filtering text of received email messages, using a first classifier, to extract one or more terms indicative of a BEC attack from the text of the received email messages. One or more n-grams are generated, using the first classifier, based on the extracted terms. A vector representation of the extracted terms is generated, using a second classifier, based on the generated one or more n-grams. The second classifier includes a logit model. A weight coefficient is assigned to each of the one or more extracted terms based on an output of the trained logit model. A higher weight coefficient indicates higher relevancy to BEC attack of the corresponding term. A heuristic rule associated with the BEC attack is generated by combining the weight coefficients of a combination of the one or more extracted terms.Type: GrantFiled: September 13, 2021Date of Patent: January 30, 2024Assignee: AO Kaspersky LabInventors: Roman A. Dedenok, Nikita D. Benkovich, Dmitry S Golubev, Yury G. Slobodyanuk
-
Patent number: 11888874Abstract: Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application. An application signature generator preprocesses the raw data packets from the intercepted network traffic by tokenizing the data packets and then weighting each token according to its importance for application identification. The weighted features for each data packet are clustered using an unsupervised learning model, and the resulting clusters are iteratively refined and re-clustered using a proximity score between the clusters and feature vectors for key tokens for the target application. The application signature generator generates a signature for the clusters corresponding to the target application which the application firewall implements for filtering network traffic.Type: GrantFiled: October 31, 2022Date of Patent: January 30, 2024Assignee: Palo Alto Networks, Inc.Inventor: Stefan Achleitner
-
Patent number: 11882113Abstract: The disclosed technology is generally directed to web authentication. In one example of the technology, authentication of a broker is obtained with an identity provider. Obtaining the authentication includes at least communication between the broker and a top-level frame and communication between the broker and the identity provider. The broker is executing in a descendant frame of the top-level frame. The top-level frame and the broker are hosted on different domains. At the broker, from an embedded application that is executing on another descendant frame of the top-level frame, a token request is received. Via the broker, a token is requested from the identity provider. The token is associated with an authorization of secure delegated remote access of at least one resource by the embedded application. At the broker, from the identity provider, the token is received. Via the broker, the token is provided to the embedded application.Type: GrantFiled: June 29, 2021Date of Patent: January 23, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Hirsch Patrick Singhal, Pavel Michailov, Jason Donchey Nutter, Adrian Frei, William Alden Bartlett, Thomas Lyle Norling, Prithviraj Sanjeev Kanherkar
-
Patent number: 11863685Abstract: A request for a transaction between a client system and a server system may be processed. The transaction may be associated with transmission of data between the client system and the server system. The data may be encrypted using a transient encryption key to form encrypted data. The transient encryption key may be a synced-clock random number configured to automatically change when a designated time interval elapses. The encrypted data may be transmitted between the client system and the server system.Type: GrantFiled: May 26, 2022Date of Patent: January 2, 2024Assignee: Salesforce, Inc.Inventors: Prashanth Kannan, Prabhjot Singh
-
Patent number: 11847197Abstract: A computer-implemented method includes: receiving a request for associating a first index of privileges and permissions with an identity token, the first index specifically encoding the privileges and permissions of a first subscriber in accessing transactional data of the requester, the request including the identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process; in response to determining that the identity token is valid and verifying that the requester is the person identified by the identity token, associating the first index of privileges and permissions of the first subscriber with the identity token; and providing the identity token associated with the first index of privileges and permissions of the first subscriber, the identity token enabling the first subscriber to access transactional data of the requester in accordance with the first index of privileges and permissions.Type: GrantFiled: June 25, 2021Date of Patent: December 19, 2023Assignee: Idemia Identity & Security USA LLCInventor: Margaret Bouse
-
Patent number: 11848966Abstract: A system and method for analyzing integrated operational technology and information technology systems with sufficient granularity to predict their behavior with a high degree of accuracy. The system and method involve creating high-fidelity models of the operational technology and information technology systems using one or more cyber-physical graphs, performing parametric analyses of the models to identify key components, scaling the parametric analyses of the models to analyze the key components at a greater level of granularity, and iteratively improving the models testing them against in-situ data from the real-world systems represented by the high-fidelity models.Type: GrantFiled: April 30, 2021Date of Patent: December 19, 2023Assignee: QOMPLX, INC.Inventors: Jason Crabtree, Andrew Sellers
-
Patent number: 11838755Abstract: According to an exemplary embodiment of the present disclosure, a computer program stored in a computer readable storage medium is disclosed. The computer program includes commands which cause a processor of a control device to execute steps below, the steps including: acquiring International Mobile Station Identity (IMSI) related to a Subscriber Identity Module (SIM) and location information of a controlled device from the controlled device; calculating a hash value obtained by hashing the IMSI by using a hash function; generating first signature data in which the hash value and the location information are encrypted with a private key of the control device by using an asymmetric key algorithm; generating first encryption data obtained by encrypting the first signature data with a public key of a home subscriber server by using the asymmetric key algorithm; and transmitting a connection request message including the first encryption data to the home subscriber server.Type: GrantFiled: May 24, 2021Date of Patent: December 5, 2023Assignee: Korea University Research and Business FoundationInventors: Dayoung Kang, Jin-Young Choi
-
Patent number: 11831768Abstract: A mechanism to share cryptographic material across entities that may not have a direct trust relationship between or among each other, or no network connectivity, or some combination thereof, but where participating entities do share a trust relationship (or trusted connection(s)) with a common entity, sometimes referred to herein as a “conduit” entity. This technique enables such entities to leverage their trust relationship with a common “conduit” entity to share cryptographic material between or among themselves.Type: GrantFiled: March 15, 2021Date of Patent: November 28, 2023Assignee: Akamai Technologies, Inc.Inventors: Rupinder Gill, Punit Kandoi, Venukrishna Prasad, Seetharama Ayyadevara
-
Patent number: 11831682Abstract: A system and method for a highly scalable distributed connection interface for data capture from multiple network service sources. The connection interface is designed to enable simple to initiate, performant and highly available input/output from a large plurality of external networked service's and application's application programming interfaces (API) to the modules of an integrated predictive business operating system. To handle the high volume of information exchange, the connection interface is distributed and designed to be scalable and self-load-balancing. The connection interface possesses robust expressive scripting capabilities that allow highly specific handling rules to be generated for the routing, transformation, and output of data within the business operating system.Type: GrantFiled: October 20, 2020Date of Patent: November 28, 2023Assignee: QOMPLX LLCInventors: Jason Crabtree, Angadbir Salaria, Andrew Sellers, Marian Trnkus