Patents Examined by Catherine Thiaw
-
Patent number: 11228453Abstract: Devices, systems, and methods for preparing an electronic lock controller to obtain a digital certificate that verifies authenticity of the electronic lock controller are provided. The method involves physically marking an electronic lock controller with a mark containing digitally signed lock information. The digitally signed lock information includes a hardware identifier, and is digitally signed at a server using a private key of the server. The method further involves loading the electronic lock controller with self-provisioning instructions to cause the electronic lock controller to obtain a digital certificate that includes the public key of the electronic lock controller and the hardware identifier, the digital certificate having been signed by a private key of the server.Type: GrantFiled: December 4, 2019Date of Patent: January 18, 2022Assignee: SERA4 LTD.Inventors: Jerod D. Klink, Konrad Hammel, Denis Margine
-
Patent number: 11218510Abstract: A system and method for comprehensive cybersecurity threat assessment of software applications based on the totality of vulnerabilities from all levels of the software supply chain. The system and method comprising analyzing the code and/or operation of a software application to determine components comprising the software, identifying the source of such components, determining vulnerabilities associated with those components, compiling a list of such components, creating a directed graph of relationships between the components and their sources, and evaluating the overall threat associated with the software application based its software supply chain vulnerabilities.Type: GrantFiled: April 22, 2020Date of Patent: January 4, 2022Assignee: QOMPLX, Inc.Inventors: Jason Crabtree, Andrew Sellers
-
Patent number: 11212296Abstract: Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: receiving a request to validate at least one statement about a user; identifying, from the request, a reference to a distributed ledger, the reference comprising an identifier for the distributed ledger and an identifier for a transaction recorded on the distributed ledger; identifying, based at least in part on the identifier for the distributed ledger, at least one node of a network of nodes managing the distributed ledger; and communicating with the at least one node to validate the at least one statement about the user.Type: GrantFiled: March 8, 2019Date of Patent: December 28, 2021Assignee: Cambridge Blockchain, Inc.Inventors: Alex Oberhauser, Matthew Commons
-
Patent number: 11206250Abstract: A coordination support system includes circuitry configured to: accept login information including user identification information and coordination identification information of a coordination process to be executed from a device; determine whether coordination setting for execution of the coordination process identified by the coordination identification information is configured; store an authentication ticket and a temporary token in association with each other based on a determination that the coordination setting is not configured, the authentication ticket indicating authentication of use of a function of the service providing apparatus executing the coordination process, and the temporary token indicating permission of use of the service providing apparatus; and transmit setting information including address information and the temporary token to a destination indicted by a communication address of a user identified by the user identification information, the address information indicating a storage loType: GrantFiled: March 17, 2019Date of Patent: December 21, 2021Assignee: RICOH COMPANY, LTD.Inventor: Seiichi Kondo
-
Patent number: 11184401Abstract: A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.Type: GrantFiled: February 17, 2020Date of Patent: November 23, 2021Assignee: QOMPLX, Inc.Inventors: Jason Crabtree, Andrew Sellers
-
Patent number: 11176059Abstract: In one embodiment, an apparatus comprises a processor to read a data line from memory in response to a read request from a VM. The data line comprises encrypted memory data. The apparatus also comprises a memory encryption circuit in the processor. The memory encryption circuit is to use an address of the read request to select an entry from a P2K table; obtain a key identifier from the selected entry of the P2K table; use the key identifier to select a key for the read request; and use the selected key to decrypt the encrypted memory data into decrypted memory data. The processor is further to make the decrypted memory data available to the VM. The P2K table comprises multiple entries, each comprising (a) a key identifier for a page of memory and (b) an encrypted address for that page of memory. Other embodiments are described and claimed.Type: GrantFiled: March 27, 2020Date of Patent: November 16, 2021Assignee: Intel CorporationInventors: David M. Durham, Siddhartha Chhabra, Amy L. Santoni, Gilbert Neiger, Barry E. Huntley, Hormuzd M. Khosravi, Baiju V. Patel, Ravi L. Sahita, Gideon Gerzon, Ido Ouziel, Ioannis T. Schoinas, Rajesh M. Sankaran
-
Patent number: 11159580Abstract: Systems are provided for anonymously tracking and/or analysing Web-based flow or movement of individual subjects and/or objects. In particular, there is provided a system for enabling anonymous estimation of the amount and/or flow of individuals, in a population moving and/or coinciding between two or more Web-based subject states. The system receives identifying data from two or more individuals; generates, online and by one or more processors, an anonymized identifier for each individual; and stores: the anonymized identifier of each individual together with data representing a Web-based subject state; and/or a skew measure of such an anonymized identifier.Type: GrantFiled: December 15, 2020Date of Patent: October 26, 2021Assignee: BRILLIANCE CENTER BVInventor: Leonard Kåberg Johard
-
Patent number: 11153331Abstract: The disclosed teachings include a computer-implemented method a computer-implemented method for identifying a data breach. The method includes monitoring movement of data over a computer network in real-time or near real-time relative to at least one of a user, a device, or a software application, comparing the monitored movement of the data to a baseline movement of the data over the computer network in real-time or near real-time relative to at least one of the user, the device, or the software application, and identifying an ongoing data breach in real-time or near real-time based on the comparison. The identified ongoing data breach indicates a relationship between the data and at least one of the user, the device, and the software application.Type: GrantFiled: April 24, 2018Date of Patent: October 19, 2021Assignee: HeFei HoloNet Security Technology Co.. Ltd.Inventors: Feng Zou, Chunqing Cheng, Sheng Li
-
Patent number: 11140195Abstract: An endpoint in an enterprise network is configured to respond to internal and external detections of compromise in a manner that permits the endpoint to cooperate with other endpoints to secure the enterprise network. For example, the endpoint may be configured to self-isolate when local monitoring detects a compromise on the endpoint, and to respond to an external notification of compromise of another endpoint by restricting communications with that other endpoint.Type: GrantFiled: April 4, 2018Date of Patent: October 5, 2021Assignee: Sophos LimitedInventors: Moritz Daniel Grimm, Daniel Stutz, Andrew J. Thomas, Kenneth D. Ray
-
Patent number: 11113396Abstract: Aspects of the present disclosure are generally directed to electronic computer implemented methods of data communication. Steps include receiving a data payload including an originating node attribute, a security ranking index attribute and at least one data element associated with a computer readable record. In another step, a method includes electronically sampling the data payload including the at least one data element and determining a value of the security ranking index attribute; In yet another step, a method includes electronically processing an injectable tracking attribute into the data payload. In a further step, a method includes electronically routing the digital record data payload including the originating node attribute, the injectable tracking attribute and the at least one data element associated.Type: GrantFiled: February 22, 2019Date of Patent: September 7, 2021Inventors: Manu Kurian, Jo-Ann Taylor
-
Patent number: 11086979Abstract: A security system comprises a personal digital key (PDK), a reader and a computing device. The PDK is a portable, personal transceiver that includes a controller and one or more passwords or codes. The computing device includes a detection engine, vault storage and a set up module. The detection engine detect events relating to the access of any files and third-party systems by the computing device and receives information from the reader as to whether the PDK is present/linked. The detection engine controls whether a user is able to access any of the functionality provided by the computing device based upon whether the PDK is in communication with the reader or not. The present invention also includes a number of methods such as a method for initializing the security system, a method for setting up a computing device, and a method for controlling access to computing resources.Type: GrantFiled: November 1, 2019Date of Patent: August 10, 2021Assignee: Proxense, LLCInventor: John J. Giobbi
-
Patent number: 11076296Abstract: A method of authenticating access of an electronic device to an application server based on a subscriber identity module (SIM) associated with the electronic device. The method receiving an authentication challenge from an application executing on the device by a SIM application toolkit (SAT) executing on the device, transmitting a random number and an authentication value of the challenge to a SIM of the device by the SAT, receiving a response from the SIM by the SAT, transmitting an authentication response to the application by the SAT, where the authentication response comprises the response received from the SIM, generating an application key by the SAT based at least in part on the response received from the SIM, and transmitting the application key to the application by the SAT, whereby the application executing on the electronic device establishes a communication session with an application server via an access communication network.Type: GrantFiled: May 13, 2019Date of Patent: July 27, 2021Assignee: Sprint Communications Company L.P.Inventors: Nishi Kant, Lyle W. Paczkowski, Ivo Rook
-
Patent number: 11057436Abstract: A system is provided that includes one or more computing servers and a processing circuit for analyzing data transactions of the computing servers. Each of the computing servers is configured to provide respective services to remote users. The processing circuit is configured to analyze data transactions of at least one of the computing servers, which is associated with a user account. A security policy of the user account includes conditions that are indicative of unauthorized access when the conditions are satisfied by various characteristics of the analyzed data transactions. The processing circuit is configured to determine a threat level as function of the characteristics of the data transactions and the conditions of the security policy. In response to the threat level exceeding a first threshold level indicated in the security policy of the user account, the processing circuit performs an action for the user account that is associated with the first threshold level.Type: GrantFiled: September 16, 2019Date of Patent: July 6, 2021Assignee: 8x8, Inc.Inventors: Bryan Martin, Zhishen Liu, Qing Zhao
-
Patent number: 11055391Abstract: A computer-implemented method includes: receiving a request for associating a first index of privileges and permissions with an identity token, the first index specifically encoding the privileges and permissions of a first subscriber in accessing transactional data of the requester, the request including the identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process; in response to determining that the identity token is valid and verifying that the requester is the person identified by the identity token, associating the first index of privileges and permissions of the first subscriber with the identity token; and providing the identity token associated with the first index of privileges and permissions of the first subscriber, the identity token enabling the first subscriber to access transactional data of the requester in accordance with the first index of privileges and permissions.Type: GrantFiled: November 7, 2019Date of Patent: July 6, 2021Assignee: Idemia Identity & Security USA LLCInventor: Margaret Bouse
-
Patent number: 11050739Abstract: Systems and methods for weak authentication data reinforcement are described. In some embodiments, a request to authenticate a user is received. A user password is determined to be a weak password. The user is verified to be human by initiating a human verification process. In response to verifying that the user is human, an option is provided to replace the weak password with a strong password.Type: GrantFiled: March 23, 2020Date of Patent: June 29, 2021Assignee: eBay Inc.Inventor: Mark C. Lee
-
Patent number: 11032323Abstract: A system and method for analyzing integrated operational technology and information technology systems with sufficient granularity to predict their behavior with a high degree of accuracy. The system and method involve creating high-fidelity models of the operational technology and information technology systems using one or more cyber-physical graphs, performing parametric analyses of the models to identify key components, scaling the parametric analyses of the models to analyze the key components at a greater level of granularity, and iteratively improving the models testing them against in-situ data from the real-world systems represented by the high-fidelity models.Type: GrantFiled: February 3, 2020Date of Patent: June 8, 2021Assignee: QOMPLX, INC.Inventors: Jason Crabtree, Andrew Sellers
-
Patent number: 11025674Abstract: A system and method for generating comprehensive security profiles and ratings for organizations that takes into account the organization's infrastructure and operations in generating the profile, and the context and purpose of the rating to be generated related to the profile. The system and method may further comprise gathering data about the totality of the organization's infrastructure and operations, generating a cybersecurity profile using active and passive internal and external reconnaissance of the organization to determine cybersecurity vulnerabilities and potential impacts to the business in light of the information gathered about the organization's infrastructure and operations, and generating cybersecurity scores and ratings that take into account all of the above information, plus the context and purpose of the score or rating to be generated based on the cybersecurity profile.Type: GrantFiled: January 30, 2020Date of Patent: June 1, 2021Assignee: QOMPLX, INC.Inventors: Jason Crabtree, Andrew Sellers, Richard Kelley
-
Patent number: 10992681Abstract: An authentication device that includes a memory operable to store a behavior signature for a user and a distributed ledger comprising information for a private blockchain and a semi-private blockchain associated with the user. The network device further includes an authentication engine implemented by a processor. The authentication engine is configured to receive an authentication request for a network resource and to determine a resource classification type based on the network resource. The authentication engine is further configured to identify one of the private blockchain and the semi-private blockchain based on the resource classification type and to extract data from one or more blocks in the identified blockchain. The authentication engine is further configured to determine at least a portion of the extracted data matches the stored behavior signature for the user and to provide access to the network resource in response to the determination.Type: GrantFiled: February 27, 2019Date of Patent: April 27, 2021Assignee: Bank of America CorporationInventor: Manu J. Kurian
-
Patent number: 10986079Abstract: The present disclosure is directed to a novel system for using unique device and user identifiers to perform authentication of a user, device, and/or transaction. In particular, the system may use a heterogeneous blockchain system comprising a series of non-uniform blockchain nodes that may differ in functionality and/or positions of hierarchy. Said non-uniform nodes may further be organized into groups and/or subgroups with custom weight inputs/outputs which alter the degree to which the nodes, groups, and/or subgroups influence the blockchain consensus. In this way, the system increases the security of device authentication by helping to prevent the use of device hijacking methods that circumvent conventional authentication practices.Type: GrantFiled: December 6, 2018Date of Patent: April 20, 2021Assignee: Bank of America CorporationInventor: Eren Kursun
-
Patent number: 10986090Abstract: Disclosed herein are methods, systems, and processes for facilitating security orchestration, automation, and response (SOAR) in cybersecurity computing environments that use biometric data or implement biometric data gathering. An instruction is periodically transmitted to a protected computing device to perform a security scanning operation that captures biometric data generated from a biometric device associated with the protected computing device. The biometric data received from the protected computing device includes a biometric identity of a trusted user or an untrusted user. A security database is accessed to determine whether the biometric identity matches a stored biometric identity of the trusted user.Type: GrantFiled: May 20, 2019Date of Patent: April 20, 2021Assignee: Rapid7, Inc.Inventors: Jared Frankston, Barry Curran, Luke Milby, Ashwin Anand