Patents Examined by Chao Wang
  • Patent number: 12373552
    Abstract: A fraud detection system obtains a number of known fraudulent end-user profiles and/or otherwise undesirable end-user profiles. Using statistical analysis techniques that include clustering the end-user profiles by attributes and attribute values and/or combinations of attributes and attribute values, the fraud detection system identifies on a continuous, periodic, or aperiodic basis those attribute values and/or attribute value combinations that appear in fraudulent or otherwise undesirable end-user profiles. Using this data, the fraud detection system generates one or more queries to identify those end-user profiles having attribute values or combinations of attribute values that likely indicate a fraudulent or otherwise undesirable end-user profile.
    Type: Grant
    Filed: March 29, 2024
    Date of Patent: July 29, 2025
    Assignee: PLENTYOFFISH MEDIA ULC
    Inventors: Thomas Levi, Steve Oldridge
  • Patent number: 12353593
    Abstract: The present disclosure provides a method, a device, and a system for protecting privacy. The method for protecting privacy includes: acquiring video information collected by a camera; performing video segmentation processing on the video information to obtain an original video frame; detecting whether the original video frame comprises privacy information; masking an area comprising the privacy information in the original video frame to generate a masked frame under a condition that the original video frame comprises the privacy information, and taking the masked frame as an output video frame; and taking the original video frame as the output video frame under a condition that the original video frame does not comprise the privacy information.
    Type: Grant
    Filed: May 25, 2021
    Date of Patent: July 8, 2025
    Assignees: BEIJING WODONG TIANJUN INFORMATION TECHNOLOGY CO., LTD., BEIJING JINGDONG SHANGKE INFORMATION TECHNOLOGY CO., LTD.
    Inventors: Hongyu Li, Zuojun Shen
  • Patent number: 12339957
    Abstract: Systems, methods, and other embodiments described herein relate to monitoring for unauthorized access to an electronic device. In one embodiment, a method includes acquiring a fault status about observed anomalies within a device. The observed anomalies relating to unauthorized access to the device. The method includes analyzing the fault status to identify whether the fault status satisfies a fault threshold. The method includes activating a response when the fault status satisfies the fault threshold indicating the presence of the unauthorized access.
    Type: Grant
    Filed: March 8, 2022
    Date of Patent: June 24, 2025
    Assignee: Denso Corporation
    Inventors: Ameer Kashani, Gopalakrishnan Iyer
  • Patent number: 12333001
    Abstract: Mitigation of return stack buffer side channel attacks in a processor. Detecting a side channel attack or a fault in a return from a function call in the processor includes receiving a return exception level indication (or e.g., a return security level indication) indicating the exception level associated with the return and comparing the exception level associated with the return to the exception level (or security level) associated with the return address. The return exception level indicator may be received in conjunction with a return indication. The processing circuit accesses the first entry of the return stack buffer, which indicates the return address of the function call, and also accesses an exception level associated with the return address. The processing circuit compares the exception level associated with the return address to the exception level associated with the return to determine whether to use the return address in a prediction of instruction flow.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: June 17, 2025
    Assignee: Ampere Computing LLC
    Inventors: Benjamin Crawford Chaffin, Bret Leslie Toll, Michael Stephen Chin
  • Patent number: 12287870
    Abstract: The present invention relates to a security policy and audit log two-way inquiry, collation, and tracking system and method capable of effectively inquiring and confirming various pieces of log information generated due to setting and change of various security policies, and capable of inquiring and confirming a security policy related to log information based on the collected log information. According to the present invention, it is possible to inquire, collate, and track logs generated and recorded by the various security policies, it is possible to inquire, collate, and track the security policy applied to the collected log, and it is possible to inquire, collate, and track the security policy and the log in two ways and in real time.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: April 29, 2025
    Assignee: SECUVE.CO., LTD.
    Inventors: Ki Yoong Hong, Kyu Ho Lee, Sung Geun Lee, Joo Yang Son, Jong Man Song
  • Patent number: 12277230
    Abstract: A method for symbolic analysis of a software program is described. The method comprises constructing a control flow graph (CFG), for a software program procedure, the CFG comprising nodes representing basic blocks reachable within the software program procedure, the basic blocks represented as respective functions from a first machine state on entry to a said basic block to a second machine state on exit from that basic block. The method further describes simplifying the CFG to a single node representing the software program procedure as a function from an input machine state on entry to the software program procedure to an output machine state on exit from the software program procedure, comparing said function to a rule set identifying vulnerabilities based on effects on the machine state; and determining a vulnerability within the software program procedure based on the comparing.
    Type: Grant
    Filed: February 4, 2021
    Date of Patent: April 15, 2025
    Assignee: BlackBerry Limited
    Inventors: William James McCourt, Niall Fitzgibbon, Benjamin John Godwood, Paul Compton Hirst
  • Patent number: 12271470
    Abstract: According to one embodiment, an Information Handling System (IHS) includes a memory to store a secure event log associated with one or more attributes of the IHS, and computer-executable code to obtain a system time from a system clock of the IHS, obtain a network time from a network time protocol (NTP) server, and compare the system time against the network time. When the obtained system time does not match the obtained network time, set a system clock attack chain vector in the secure event log and generate an Indicator of Attack (IoA) report based at least in part, on the system clock attack chain vector.
    Type: Grant
    Filed: March 3, 2022
    Date of Patent: April 8, 2025
    Assignee: Dell Products, L.P.
    Inventors: Marc N. McGarry, Nizar A. Basan, Weiqing Cai
  • Patent number: 12273456
    Abstract: Examples described herein include systems and methods for authenticating a voice-activated device. An example method can include receiving, at an application server, a request from a user device to authenticate the voice-activated device. The application server can provide a first temporary key and session ID to the user device. The method can further include communicating the first temporary key from the user device to the voice-activated device, such as by reading it aloud or having the user device communicate the key in some manner. The voice-activated device can then provide the key to the application server, which generates a second temporary key and sends it back to the voice-activated device. The second temporary key can then be transferred to the user device, which closes the loop by providing the key back to the application server. The application server can then authenticate and provide access to the voice-activated device.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: April 8, 2025
    Assignee: Omnissa, LLC
    Inventor: Rohit Pradeep Shetty
  • Patent number: 12259967
    Abstract: DLL hooks are protected by mapping the starting address of the new executable to a sample of the former executable. Attempts to read the starting address are responded to with the sample of the former executable. Attempts to write to the starting address are responded to with confirmation of success without actually writing data. Debuggers are detected upon launch or by evaluating an operating system. A component executing in the kernel denies debugging privileges to prevent inspection and modification of DLL hooks.
    Type: Grant
    Filed: December 28, 2023
    Date of Patent: March 25, 2025
    Assignee: SentinelOne, Inc.
    Inventors: Anil Gupta, Harinath Vishwanath Ramchetty
  • Patent number: 12248602
    Abstract: Methods, apparatus, systems, and articles of manufacture for orchestrating personal protection across digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to monitor digital assets associated with a protection threat surface to detect a protection event, determine one or more protection vectors associated with the digital assets in response to detecting the protection event, the one or more protection vectors including one or more values corresponding to an impact of the protection event on an overall protection posture associated with the protection threat surface, and determine protection remediation action for the digital assets based on the one or more protection vectors.
    Type: Grant
    Filed: August 27, 2021
    Date of Patent: March 11, 2025
    Assignee: MCAFEE, LLC
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Sandeep Swastik, Piyush Pramod Joshi, Samrat Chitta, Partha Sarathi Barik
  • Patent number: 12229314
    Abstract: A method, a system, and a computer program product for generating a refined synthetic data from one or more sources of data. One or more source data are received from one or more data sources. One or more encoded source data are generated from the one or more source data. A synthetic data is generated by decoding one or more encoded source data. One or more variables in the synthetic data are selected and one or more predetermined identifiability values and one or more predetermined anonymity values are associated with them. The generated synthetic data including the selected variables is decoded using associated one or more predetermined identifiability values and one or more predetermined anonymity values. The decoded synthetic data is outputted.
    Type: Grant
    Filed: May 7, 2022
    Date of Patent: February 18, 2025
    Assignee: FAIR ISAAC CORPORATION
    Inventors: Christopher Allan Ralph, Gerald Fahner
  • Patent number: 12229253
    Abstract: A system on a chip comprising a set of one-time programmable memory elements that comprises a first valid configuration; a second valid configuration; and a plurality of invalid configurations. The system on a chip also comprises a programming indicator initially comprising a first value and configured to be permanently set to a second value. The system on a chip further comprises a decoder circuit in communication with the set of one-time programmable memory elements to determine whether the set of one-time programmable memory elements is in the first valid configuration, the second valid configuration, or any one of the plurality of invalid configurations. The decoder circuit generates a threat-detection signal when the set of one-time programmable memory elements is in any of the plurality of invalid configurations when the programming indicator is permanently set to the second value.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: February 18, 2025
    Assignees: STMicroelectronics International N.V., STMicroelectronics (Alps) SAS
    Inventors: Asif Rashid Zargar, Gilles Eyzat, Charul Jain
  • Patent number: 12225009
    Abstract: Authorization and delivery of content may employ uniform resource signing packages. A uniform resource signing package may comprise access parameters for a content item, user, and/or device, and may be sent to the client as a uniform resource query parameter. The client may include the uniform resource signing package in future requests associated with the content item.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: February 11, 2025
    Assignee: Comcast Cable Communications, LLC
    Inventors: Kyong Park, Jason Burgess, Garey Hassler, Greg Rutz
  • Patent number: 12216759
    Abstract: Examples of the present disclosure describe systems and methods for discrete processor feature behavior collection and analysis. In aspects, a monitoring utility may initialize a set of debugging and/or performance monitoring feature sets for a microprocessor. When the microprocessor receives from software content a set of instructions that involves the loading of a set of modules or code segments, the set of modules or code segments may be evaluated by the monitoring utility. The monitoring utility may generate a process trace of the loaded set of modules or code segments. Based on the process trace output, various execution paths may be reconstructed in real-time. The system and/or API calls made by the microprocessor may then be compared to the process trace output to quickly observe the interaction between the software content and the operating system of the microprocessor.
    Type: Grant
    Filed: November 17, 2023
    Date of Patent: February 4, 2025
    Assignee: OPEN TEXT INC.
    Inventor: Eric Klonowski
  • Patent number: 12182270
    Abstract: A method includes providing a cybersecurity risk model for cybersecurity and process risk modeling of assets in an industrial control system (ICS) including process controllers connected together by a communications network coupled by I/O devices to field devices coupled to processing equipment. The assets are configured together to implement a process. The risk model processes input data including event path data including event paths leading to a cybersecurity hazard and ?1 process hazard, exposure data for the cybersecurity and process hazard, and consequence data for the cybersecurity and the process hazard including a severity of failure, the risk model outputting functional consequences of failure of the cybersecurity and the process hazard, and a likelihood of failure for the hazards. A risk analysis engine processes the functional consequences and likelihood of failures for the cybersecurity and process hazard, and generates outputs including a quantified risk for the cybersecurity and process hazard.
    Type: Grant
    Filed: September 17, 2021
    Date of Patent: December 31, 2024
    Assignee: Honeywell International Inc.
    Inventors: Sinclair Howard Koelemij, Sema Tutucu
  • Patent number: 12174964
    Abstract: Embodiments described herein provide for performing a risk assessment. A computer identifies and stores heterogeneous events between a user and a provider system in which the user interacts with an account. The computer may store the heterogeneous events in a table. The stored event information normalizes the events associated with an account. The computer may determine static risk contributions associated with the event information of the account and store the static risk contributions in the table. The computer groups the static risk contributions into predetermined groups. The static risk contributions in each group are converted into dynamic risk contributions. The dynamic risk contributions of each group are aggregated, and the aggregate value of the dynamic risk contributions are fed to a machine learning model. The machine learning model determines a risk score associated with the account.
    Type: Grant
    Filed: January 27, 2021
    Date of Patent: December 24, 2024
    Assignee: Pindrop Security, Inc.
    Inventors: Hung Wei Tseng, Kailash Patil
  • Patent number: 12158950
    Abstract: Described herein are technologies related to generation of a summary of a function in binary code for review by an analyst. A first sequence to sequence model is configured to receive binary code (or a derivative thereof) and translate the binary code to an intermediate representation of the binary code, wherein the intermediate representation approximates source code for the binary code. A second sequence to sequence model is configured to receive the intermediate representation of the binary code and translate the intermediate representation to a human-readable summary of the binary code.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: December 3, 2024
    Assignee: National Technology & Engineering Solutions of Sandia, LLC
    Inventors: Jina Lee, Christopher B. Harrison, Michael Bierma, Kina Kincher-Winoto, David Kavaler
  • Patent number: 12158951
    Abstract: What is provided is a method of generating a minimal forensic image of a target dataset to reduce upload demand. The method includes storing a set of criteria in an investigator device, wherein the set of criteria determines target data files of the target dataset which are to be included in the minimal forensic image, and wherein the set of criteria includes a plurality of file types and at least a first upload format for each file type in the plurality of file types, locating the target data files of the plurality of file types in the target dataset using the set of criteria, storing a representation of each target data file in the minimal forensic image in an MFI upload format determined according to the set of criteria, and transferring the minimal forensic image to a cloud server.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: December 3, 2024
    Assignee: Magnet Forensics Inc.
    Inventor: Jad John Saliba
  • Patent number: 12153667
    Abstract: Security automation, such as penetration testing or security hardening, is performed using robotic process automation (RPA) by directly connecting one or more robots into an operating system of a platform. The one or more robots execute a workflow to simulate the penetration testing of the operating system to identify malicious activity or vulnerable configurations within the operating system. The one or more robots also generate a report for the user identifying the malicious activity, misconfigurations or vulnerabilities within the environment.
    Type: Grant
    Filed: December 18, 2020
    Date of Patent: November 26, 2024
    Assignee: UiPath, Inc.
    Inventor: Alexandru Razvan Caciulescu
  • Patent number: 12141270
    Abstract: Methods, apparatus, systems, and articles of manufacture for comprehensive user-centric protection of digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to identify digital assets associated with a protection threat surface, detect protection events corresponding to threats associated with the digital assets, and determine protection vectors associated with the digital assets based on the protection events, the protection vectors corresponding to protection capabilities associated with the digital assets.
    Type: Grant
    Filed: August 27, 2021
    Date of Patent: November 12, 2024
    Assignee: McAfee, LLC
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Pravat Lall, Jitesh Dattani, Samrat Chitta