Patents Examined by Chao Wang
-
Patent number: 12373552Abstract: A fraud detection system obtains a number of known fraudulent end-user profiles and/or otherwise undesirable end-user profiles. Using statistical analysis techniques that include clustering the end-user profiles by attributes and attribute values and/or combinations of attributes and attribute values, the fraud detection system identifies on a continuous, periodic, or aperiodic basis those attribute values and/or attribute value combinations that appear in fraudulent or otherwise undesirable end-user profiles. Using this data, the fraud detection system generates one or more queries to identify those end-user profiles having attribute values or combinations of attribute values that likely indicate a fraudulent or otherwise undesirable end-user profile.Type: GrantFiled: March 29, 2024Date of Patent: July 29, 2025Assignee: PLENTYOFFISH MEDIA ULCInventors: Thomas Levi, Steve Oldridge
-
Patent number: 12353593Abstract: The present disclosure provides a method, a device, and a system for protecting privacy. The method for protecting privacy includes: acquiring video information collected by a camera; performing video segmentation processing on the video information to obtain an original video frame; detecting whether the original video frame comprises privacy information; masking an area comprising the privacy information in the original video frame to generate a masked frame under a condition that the original video frame comprises the privacy information, and taking the masked frame as an output video frame; and taking the original video frame as the output video frame under a condition that the original video frame does not comprise the privacy information.Type: GrantFiled: May 25, 2021Date of Patent: July 8, 2025Assignees: BEIJING WODONG TIANJUN INFORMATION TECHNOLOGY CO., LTD., BEIJING JINGDONG SHANGKE INFORMATION TECHNOLOGY CO., LTD.Inventors: Hongyu Li, Zuojun Shen
-
Patent number: 12339957Abstract: Systems, methods, and other embodiments described herein relate to monitoring for unauthorized access to an electronic device. In one embodiment, a method includes acquiring a fault status about observed anomalies within a device. The observed anomalies relating to unauthorized access to the device. The method includes analyzing the fault status to identify whether the fault status satisfies a fault threshold. The method includes activating a response when the fault status satisfies the fault threshold indicating the presence of the unauthorized access.Type: GrantFiled: March 8, 2022Date of Patent: June 24, 2025Assignee: Denso CorporationInventors: Ameer Kashani, Gopalakrishnan Iyer
-
Patent number: 12333001Abstract: Mitigation of return stack buffer side channel attacks in a processor. Detecting a side channel attack or a fault in a return from a function call in the processor includes receiving a return exception level indication (or e.g., a return security level indication) indicating the exception level associated with the return and comparing the exception level associated with the return to the exception level (or security level) associated with the return address. The return exception level indicator may be received in conjunction with a return indication. The processing circuit accesses the first entry of the return stack buffer, which indicates the return address of the function call, and also accesses an exception level associated with the return address. The processing circuit compares the exception level associated with the return address to the exception level associated with the return to determine whether to use the return address in a prediction of instruction flow.Type: GrantFiled: August 4, 2021Date of Patent: June 17, 2025Assignee: Ampere Computing LLCInventors: Benjamin Crawford Chaffin, Bret Leslie Toll, Michael Stephen Chin
-
Patent number: 12287870Abstract: The present invention relates to a security policy and audit log two-way inquiry, collation, and tracking system and method capable of effectively inquiring and confirming various pieces of log information generated due to setting and change of various security policies, and capable of inquiring and confirming a security policy related to log information based on the collected log information. According to the present invention, it is possible to inquire, collate, and track logs generated and recorded by the various security policies, it is possible to inquire, collate, and track the security policy applied to the collected log, and it is possible to inquire, collate, and track the security policy and the log in two ways and in real time.Type: GrantFiled: March 21, 2019Date of Patent: April 29, 2025Assignee: SECUVE.CO., LTD.Inventors: Ki Yoong Hong, Kyu Ho Lee, Sung Geun Lee, Joo Yang Son, Jong Man Song
-
Patent number: 12277230Abstract: A method for symbolic analysis of a software program is described. The method comprises constructing a control flow graph (CFG), for a software program procedure, the CFG comprising nodes representing basic blocks reachable within the software program procedure, the basic blocks represented as respective functions from a first machine state on entry to a said basic block to a second machine state on exit from that basic block. The method further describes simplifying the CFG to a single node representing the software program procedure as a function from an input machine state on entry to the software program procedure to an output machine state on exit from the software program procedure, comparing said function to a rule set identifying vulnerabilities based on effects on the machine state; and determining a vulnerability within the software program procedure based on the comparing.Type: GrantFiled: February 4, 2021Date of Patent: April 15, 2025Assignee: BlackBerry LimitedInventors: William James McCourt, Niall Fitzgibbon, Benjamin John Godwood, Paul Compton Hirst
-
Patent number: 12271470Abstract: According to one embodiment, an Information Handling System (IHS) includes a memory to store a secure event log associated with one or more attributes of the IHS, and computer-executable code to obtain a system time from a system clock of the IHS, obtain a network time from a network time protocol (NTP) server, and compare the system time against the network time. When the obtained system time does not match the obtained network time, set a system clock attack chain vector in the secure event log and generate an Indicator of Attack (IoA) report based at least in part, on the system clock attack chain vector.Type: GrantFiled: March 3, 2022Date of Patent: April 8, 2025Assignee: Dell Products, L.P.Inventors: Marc N. McGarry, Nizar A. Basan, Weiqing Cai
-
Patent number: 12273456Abstract: Examples described herein include systems and methods for authenticating a voice-activated device. An example method can include receiving, at an application server, a request from a user device to authenticate the voice-activated device. The application server can provide a first temporary key and session ID to the user device. The method can further include communicating the first temporary key from the user device to the voice-activated device, such as by reading it aloud or having the user device communicate the key in some manner. The voice-activated device can then provide the key to the application server, which generates a second temporary key and sends it back to the voice-activated device. The second temporary key can then be transferred to the user device, which closes the loop by providing the key back to the application server. The application server can then authenticate and provide access to the voice-activated device.Type: GrantFiled: October 21, 2019Date of Patent: April 8, 2025Assignee: Omnissa, LLCInventor: Rohit Pradeep Shetty
-
Patent number: 12259967Abstract: DLL hooks are protected by mapping the starting address of the new executable to a sample of the former executable. Attempts to read the starting address are responded to with the sample of the former executable. Attempts to write to the starting address are responded to with confirmation of success without actually writing data. Debuggers are detected upon launch or by evaluating an operating system. A component executing in the kernel denies debugging privileges to prevent inspection and modification of DLL hooks.Type: GrantFiled: December 28, 2023Date of Patent: March 25, 2025Assignee: SentinelOne, Inc.Inventors: Anil Gupta, Harinath Vishwanath Ramchetty
-
Patent number: 12248602Abstract: Methods, apparatus, systems, and articles of manufacture for orchestrating personal protection across digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to monitor digital assets associated with a protection threat surface to detect a protection event, determine one or more protection vectors associated with the digital assets in response to detecting the protection event, the one or more protection vectors including one or more values corresponding to an impact of the protection event on an overall protection posture associated with the protection threat surface, and determine protection remediation action for the digital assets based on the one or more protection vectors.Type: GrantFiled: August 27, 2021Date of Patent: March 11, 2025Assignee: MCAFEE, LLCInventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Sandeep Swastik, Piyush Pramod Joshi, Samrat Chitta, Partha Sarathi Barik
-
Patent number: 12229314Abstract: A method, a system, and a computer program product for generating a refined synthetic data from one or more sources of data. One or more source data are received from one or more data sources. One or more encoded source data are generated from the one or more source data. A synthetic data is generated by decoding one or more encoded source data. One or more variables in the synthetic data are selected and one or more predetermined identifiability values and one or more predetermined anonymity values are associated with them. The generated synthetic data including the selected variables is decoded using associated one or more predetermined identifiability values and one or more predetermined anonymity values. The decoded synthetic data is outputted.Type: GrantFiled: May 7, 2022Date of Patent: February 18, 2025Assignee: FAIR ISAAC CORPORATIONInventors: Christopher Allan Ralph, Gerald Fahner
-
Patent number: 12229253Abstract: A system on a chip comprising a set of one-time programmable memory elements that comprises a first valid configuration; a second valid configuration; and a plurality of invalid configurations. The system on a chip also comprises a programming indicator initially comprising a first value and configured to be permanently set to a second value. The system on a chip further comprises a decoder circuit in communication with the set of one-time programmable memory elements to determine whether the set of one-time programmable memory elements is in the first valid configuration, the second valid configuration, or any one of the plurality of invalid configurations. The decoder circuit generates a threat-detection signal when the set of one-time programmable memory elements is in any of the plurality of invalid configurations when the programming indicator is permanently set to the second value.Type: GrantFiled: June 7, 2021Date of Patent: February 18, 2025Assignees: STMicroelectronics International N.V., STMicroelectronics (Alps) SASInventors: Asif Rashid Zargar, Gilles Eyzat, Charul Jain
-
Patent number: 12225009Abstract: Authorization and delivery of content may employ uniform resource signing packages. A uniform resource signing package may comprise access parameters for a content item, user, and/or device, and may be sent to the client as a uniform resource query parameter. The client may include the uniform resource signing package in future requests associated with the content item.Type: GrantFiled: September 28, 2018Date of Patent: February 11, 2025Assignee: Comcast Cable Communications, LLCInventors: Kyong Park, Jason Burgess, Garey Hassler, Greg Rutz
-
Patent number: 12216759Abstract: Examples of the present disclosure describe systems and methods for discrete processor feature behavior collection and analysis. In aspects, a monitoring utility may initialize a set of debugging and/or performance monitoring feature sets for a microprocessor. When the microprocessor receives from software content a set of instructions that involves the loading of a set of modules or code segments, the set of modules or code segments may be evaluated by the monitoring utility. The monitoring utility may generate a process trace of the loaded set of modules or code segments. Based on the process trace output, various execution paths may be reconstructed in real-time. The system and/or API calls made by the microprocessor may then be compared to the process trace output to quickly observe the interaction between the software content and the operating system of the microprocessor.Type: GrantFiled: November 17, 2023Date of Patent: February 4, 2025Assignee: OPEN TEXT INC.Inventor: Eric Klonowski
-
Patent number: 12182270Abstract: A method includes providing a cybersecurity risk model for cybersecurity and process risk modeling of assets in an industrial control system (ICS) including process controllers connected together by a communications network coupled by I/O devices to field devices coupled to processing equipment. The assets are configured together to implement a process. The risk model processes input data including event path data including event paths leading to a cybersecurity hazard and ?1 process hazard, exposure data for the cybersecurity and process hazard, and consequence data for the cybersecurity and the process hazard including a severity of failure, the risk model outputting functional consequences of failure of the cybersecurity and the process hazard, and a likelihood of failure for the hazards. A risk analysis engine processes the functional consequences and likelihood of failures for the cybersecurity and process hazard, and generates outputs including a quantified risk for the cybersecurity and process hazard.Type: GrantFiled: September 17, 2021Date of Patent: December 31, 2024Assignee: Honeywell International Inc.Inventors: Sinclair Howard Koelemij, Sema Tutucu
-
Patent number: 12174964Abstract: Embodiments described herein provide for performing a risk assessment. A computer identifies and stores heterogeneous events between a user and a provider system in which the user interacts with an account. The computer may store the heterogeneous events in a table. The stored event information normalizes the events associated with an account. The computer may determine static risk contributions associated with the event information of the account and store the static risk contributions in the table. The computer groups the static risk contributions into predetermined groups. The static risk contributions in each group are converted into dynamic risk contributions. The dynamic risk contributions of each group are aggregated, and the aggregate value of the dynamic risk contributions are fed to a machine learning model. The machine learning model determines a risk score associated with the account.Type: GrantFiled: January 27, 2021Date of Patent: December 24, 2024Assignee: Pindrop Security, Inc.Inventors: Hung Wei Tseng, Kailash Patil
-
Patent number: 12158950Abstract: Described herein are technologies related to generation of a summary of a function in binary code for review by an analyst. A first sequence to sequence model is configured to receive binary code (or a derivative thereof) and translate the binary code to an intermediate representation of the binary code, wherein the intermediate representation approximates source code for the binary code. A second sequence to sequence model is configured to receive the intermediate representation of the binary code and translate the intermediate representation to a human-readable summary of the binary code.Type: GrantFiled: January 21, 2021Date of Patent: December 3, 2024Assignee: National Technology & Engineering Solutions of Sandia, LLCInventors: Jina Lee, Christopher B. Harrison, Michael Bierma, Kina Kincher-Winoto, David Kavaler
-
Patent number: 12158951Abstract: What is provided is a method of generating a minimal forensic image of a target dataset to reduce upload demand. The method includes storing a set of criteria in an investigator device, wherein the set of criteria determines target data files of the target dataset which are to be included in the minimal forensic image, and wherein the set of criteria includes a plurality of file types and at least a first upload format for each file type in the plurality of file types, locating the target data files of the plurality of file types in the target dataset using the set of criteria, storing a representation of each target data file in the minimal forensic image in an MFI upload format determined according to the set of criteria, and transferring the minimal forensic image to a cloud server.Type: GrantFiled: July 26, 2021Date of Patent: December 3, 2024Assignee: Magnet Forensics Inc.Inventor: Jad John Saliba
-
Patent number: 12153667Abstract: Security automation, such as penetration testing or security hardening, is performed using robotic process automation (RPA) by directly connecting one or more robots into an operating system of a platform. The one or more robots execute a workflow to simulate the penetration testing of the operating system to identify malicious activity or vulnerable configurations within the operating system. The one or more robots also generate a report for the user identifying the malicious activity, misconfigurations or vulnerabilities within the environment.Type: GrantFiled: December 18, 2020Date of Patent: November 26, 2024Assignee: UiPath, Inc.Inventor: Alexandru Razvan Caciulescu
-
Patent number: 12141270Abstract: Methods, apparatus, systems, and articles of manufacture for comprehensive user-centric protection of digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to identify digital assets associated with a protection threat surface, detect protection events corresponding to threats associated with the digital assets, and determine protection vectors associated with the digital assets based on the protection events, the protection vectors corresponding to protection capabilities associated with the digital assets.Type: GrantFiled: August 27, 2021Date of Patent: November 12, 2024Assignee: McAfee, LLCInventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Pravat Lall, Jitesh Dattani, Samrat Chitta