Patents Examined by Chi D Nguy
-
Patent number: 12218940Abstract: Systems and methods are disclosed for online authentication of online attributes. One method includes receiving an authentication request from a rely party, the authentication request including identity information to be authenticated and credential information to be authenticated; determining whether a user account is associated with the received identity information by accessing an internal database; accessing user data of the user account determined to be associated with received identity information; determining authentication data to obtained from a user associated with the user account based on the user data of the user account and the credential information to be authenticated; transmitting a request for authentication data; receiving authentication data associated with the user; transmitting authentication data associated with the user; and receiving an authentication result from the verification data source server for the user associated with authentication data.Type: GrantFiled: May 12, 2023Date of Patent: February 4, 2025Assignee: ID.me, Inc.Inventors: Blake Hall, Tanel Suurhans
-
Patent number: 12212567Abstract: Systems and methods are disclosed for online authentication of online attributes. One method includes receiving an authentication request from a rely party, the authentication request including identity information to be authenticated and credential information to be authenticated; determining whether a user account is associated with the received identity information by accessing an internal database; accessing user data of the user account determined to be associated with received identity information; determining authentication data to obtained from a user associated with the user account based on the user data of the user account and the credential information to be authenticated; transmitting a request for authentication data; receiving authentication data associated with the user; transmitting authentication data associated with the user; and receiving an authentication result from the verification data source server for the user associated with authentication data.Type: GrantFiled: June 30, 2023Date of Patent: January 28, 2025Assignee: ID.me, Inc.Inventors: Blake Hall, Tanel Suurhans
-
Patent number: 12212550Abstract: Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.Type: GrantFiled: August 31, 2022Date of Patent: January 28, 2025Assignee: Palo Alto Networks, Inc.Inventors: Ashwath Sreenivasa Murthy, Prabhakar M V B R Mangam, Shriram S. Jandhyala, Qiuming Li, Yongjie Yin
-
Patent number: 12206781Abstract: A method, system and apparatus of for validating uniqueness of a non-disclosed element of data, including in response to receiving a plurality of elements, generating an index of the plurality of elements of data received from a data store to create uniquely indexed data, generating filters from the index, generating a hash tree for the uniquely indexed data using the index, and validating a unique element of data from the hash tree and filters.Type: GrantFiled: September 11, 2019Date of Patent: January 21, 2025Assignee: International Business Machines CorporationInventor: Jeronimo Irazabal
-
Patent number: 12149929Abstract: In a case where a predetermined operation is received from a user, if a signal compliant with the DPP standard is received, a communication parameter sharing process is executed by a method compliant with the DPP standard, whereas if a signal compliant with another standard is received, the communication parameter sharing process is executed by a method compliant with the other standard.Type: GrantFiled: May 21, 2021Date of Patent: November 19, 2024Assignee: Canon Kabushiki KaishaInventor: Hideaki Tachibana
-
Patent number: 12118094Abstract: A power machine (200) can be configured to operate in one or more startup modes during startup processes (300), including during startup processes (310) for displays (286) or other input devices. Access to power machine functionality, including access only to limited power machine functionality, can be enabled during the startup processes (300) according to permissions (332) of the startup mode.Type: GrantFiled: June 29, 2020Date of Patent: October 15, 2024Assignee: Doosan Bobcat North America, Inc.Inventors: Jim Breuer, Monte Spadgenske, Mike Fitzgerald, Jason Magnuson
-
Patent number: 12111894Abstract: Systems and methods are provided for controlling display of a workspace. The system includes logic to establish a first level authorization at a display client enabling access to a workspace data set. The workspace data set can have a plurality of entries identifying respective digital assets and locations in the workspace for graphical objects representing the respective digital assets. The plurality of entries can include a particular entry identifying a particular digital asset requiring a second level authorization. The system includes logic to render, for the particular entry, a placeholder graphical object and a prompt. The system includes logic to detect user input indicating selection of the prompt, and in response executing a protocol to establish the second level authorization. Upon establishment of the second level authorization the placeholder graphical object is replaced with a second graphical object to reveal content of the particular digital asset.Type: GrantFiled: March 12, 2021Date of Patent: October 8, 2024Assignee: Haworth, Inc.Inventors: Steven Churchill, Rupen Chanda, Jingqi Ao, Madhuvanthi Guruprasad
-
Patent number: 12058136Abstract: A system and method for securely sharing metadata among virtualized network functions (VNFs) disposed within a cluster of host computers includes a distributed forwarding and metadata sharing (DFMS) framework that forwards received data packets and provides remote direct memory access (RDMA) enabled sharing of secured metadata among the VNFs from more than one host computer in the cluster of host computers, and a DFMS controller that resides in the cluster of host computers as a VNF and registers VNFs in the cluster to at least one group of VNFs in the cluster and assigns access rights to the metadata of VNFs within respective groups of VNFs in the cluster. In operation, each registered VNF in a group in the cluster uses RDMA requests to access the metadata for other registered VNFs in the group in the cluster to which the each registered VNF in the group has access rights.Type: GrantFiled: April 9, 2021Date of Patent: August 6, 2024Assignee: Huawei Technologies Co., Ltd.Inventors: Hang Shi, Yinghua Ye, Yewei Tang
-
Patent number: 12047501Abstract: The present invention relates to a cryptographic protocol, and a system for implementing said protocol, for providing overt ledger secured key escrow access to encrypted data. The invention uses a plurality of trustee systems, each holding a secret share of a secret, to validate requests for the secret from authorised third parties. When a valid request is made, each trustee system publishes its secret share to a ledger. The secret shares can be combined to reveal the encryption key only by the authorised third party. Requests for the encryption key, and the responses by the trustee systems, can be accessed by the owner of the encryption key to identify the requesting third party and to have proof that the key has been revealed to the third party.Type: GrantFiled: June 1, 2018Date of Patent: July 23, 2024Assignee: ROLAND TEGEDERInventor: Roland Tegeder
-
Patent number: 12047356Abstract: A method of tokenizing sensitive data from a terminal device includes receiving, a connection request comprising a hardware serial number associated with a terminal device and validating the hardware serial number associated with the terminal device. The method includes sending a command to a terminal device that causes the terminal device to display a prompt for sensitive data associated with a user interacting with the terminal device and receiving an encrypted data packet from the terminal device. The encrypted data packet includes the sensitive data. The method includes sending the encrypted data packet to a gateway system for tokenization, receiving a token that represents the sensitive data, and providing the token to the terminal device.Type: GrantFiled: October 14, 2021Date of Patent: July 23, 2024Assignee: FIRST DATA CORPORATIONInventors: Nicholas Aceto, Kevin Nathan, Kyle Nahrgang, Tom Catullo, Pete Foley, Bill Miller, Evan Broderick
-
Patent number: 12039068Abstract: The present technology pertains to a link service that can create, maintain, and service links to objects on behalf of a content management system or other services. The link service can share administration of links with other services when desired or can even allow other services to issue the link and manage the object that is the subject of the link while providing other functions to support the link. Additionally, link service can interface with a file system that can support links as actors in the file system, whereby greater control and flexibility in supporting links is provided. Link service can also accommodate servicing and management of links issued by legacy services, where the legacy services have unique link logic that should still be utilized to maintain a consistent user experience.Type: GrantFiled: June 28, 2021Date of Patent: July 16, 2024Assignee: Dropbox, Inc.Inventors: Aaron Passey, Fangzhou Wang, Eric Cunningham, Royce Ausburn, Nicholas Larson, David Wetterau, William Ho, Harrison Ho
-
Patent number: 12039019Abstract: A computing system for securely managing access to resources of a computing device receives an input at a secure login of a user interface. The computing system compares the input to a plurality of stored security measures and activates one of an operating system or a configuration of a false desktop system. A user interface of the false desktop system shares characteristics with a user interface of an operating system and restricts access to specified files, data stores, applications, networking functions, and/or ports associated with the computing system. When configured, the false desktop system or the operating system is enabled based on the location of the computing system. When configured, the false desktop system deletes files, data stores, and applications of the operating system.Type: GrantFiled: October 27, 2022Date of Patent: July 16, 2024Assignee: Bank of America CorporationInventors: Daniel Horne, George Albero, Robert A. Lang
-
Patent number: 12032666Abstract: Before or after a first-type authentication has been completed, disclosed devices, systems, and methods may conduct a second-type authentication to authenticate a user such that the user can log into a secure device and/or access secure content. An example system may cause a wearable device to activate a biosensor, which extends along a full internal circumference of the wearable device when worn, to detect at least a first sEMG signal on the user's skin responsive to the user performing a first gesture. The system may also generate or receive a first user signature based on the first sEMG signal and determine whether the first user signature matches stored authentication training data. In response to determining that there is a match, the system may complete the second-type authentication to authenticate the user.Type: GrantFiled: March 23, 2020Date of Patent: July 9, 2024Assignee: CAPITAL ONE SERVICES, LLCInventor: Jose Antonio Moreno
-
Patent number: 12003962Abstract: [Object] To provide a novel and improved communication system and communication device that make it possible to reduce an amount of time from when communication with an external device is completed to when communication data corresponding to a communication result is output to another device. [Solution] Provided is a communication system including: a communication device configured to transmit a selection solution that is selected depending on a result of first communication with an external device; and a control device configured to receive the selection solution from the communication device through second communication between the communication device and a communication partner that is different from the external device serving as a communication partner in the first communication.Type: GrantFiled: April 7, 2020Date of Patent: June 4, 2024Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventors: Yosuke Ohashi, Masateru Furuta
-
Patent number: 11995171Abstract: The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.Type: GrantFiled: May 12, 2022Date of Patent: May 28, 2024Assignee: Apple Inc.Inventors: Marcel Van Os, Peter D. Anton, Patrick L. Coffman, Elizabeth Caroline Furches Cranfill, Raymond S. Sepulveda, Chun Kin Minor Wong
-
Patent number: 11983286Abstract: Methods, systems, and devices for data processing are described. Some database systems may implement data processing permits to manage data access. A database system may use encryption schemes to tie permits to data (e.g., cryptographically ensuring that the system follows data regulations). To support queries for a database implementing such encryption schemes, the database may implement a proxy. When the system receives a query, the database proxy may intercept and transform the query based on the encryption schema of the database. The database proxy may execute the transformed query at the database, receive encrypted query results in response, and decrypt the results for use by the querying application. Additionally, the system may access relevant data processing permits to support querying operations. For example, the system may use permits when transforming the query, executing the query in the database, preparing query results for the querying application, or any combination thereof.Type: GrantFiled: April 13, 2020Date of Patent: May 14, 2024Assignee: Ketch Kloud, Inc.Inventors: Yacov Salomon, Seth Yates, Maxwell Anderson, Vivek Vaidya, Anton Winter, Samuel Alexander, Tom Chavez
-
Patent number: 11968530Abstract: A network may authenticate a user equipment (UE) to access an edge data network. The network generates a first credential based on a second credential, the second credential generated for a procedure between the UE and a cellular network corresponding to the network component, receives an identifier associated with the first credential from a further network component in response to the UE transmitting an application registration request to a server associated with an edge data network and retrieves the first credential based on the identifier. The network also receives a multi-access edge computing (MEC) authorization parameter, verifies the MEC authorization parameter and transmits an authentication verification response to a second network component.Type: GrantFiled: August 6, 2020Date of Patent: April 23, 2024Assignee: Apple Inc.Inventors: Shu Guo, Dawei Zhang, Fangli Xu, Haijing Hu, Huarui Liang, Mona Agnel, Ralf Rossbach, Sudeep Manithara Vamanan, Xiangying Yang, Yuqin Chen
-
Patent number: 11966459Abstract: Systems and methods include providing virtual certification number (VCN) authorizations to an external entity by receiving a plurality of secure entity global authorizations comprising global VCN authorizations and global primary account number (PAN) authorizations, identifying the global VCN authorizations, identifying a subset of the global VCN authorizations, each of the subset of the global VCN authorizations corresponding to an external entity authorization, comparing the subset of global VCN authorizations to previously provided VCN authorizations, to identify an unsent VCN authorization, storing a transmittable unsent VCN authorization based on the unsent VCN authorization, providing an unsent authorization indication to the external entity, receiving, from the external entity, a request for the unsent VCN authorization based on providing the unsent authorization indication to the external entity, and providing the transmittable unsent VCN authorization to the external entity, based on storing the tranType: GrantFiled: November 23, 2022Date of Patent: April 23, 2024Assignee: Capital One Services, LLCInventors: Kelly Jo Brown, Jesse Emery, Jonathan Blocksom, Todd Safford, Victoria Yang, Brian Glowniak, Edward Husa, Calvin Sun
-
Patent number: 11962660Abstract: User reputation regarding exposure of data objects in a cloud computing environment is determined. Behavioral information, which indicates behavior of a user for a cloud computing environment corresponding to one or more data objects in the cloud computing environment that are associated with the user, is analyzed. Based on analyzing the behavior information, a plurality of characteristics for the user that indicate exposure of the data object(s) associated with the user is determined. Each of the plurality of characteristics reflects the behavior of the user pertaining to the one or more data objects. Based on compliance of the plurality of characteristics with corresponding ones of a plurality of rules, a reputation of the user for exposing data objects in the cloud computing environment is determined. The reputation of the user is indicated to an entity with which the user is associated.Type: GrantFiled: October 24, 2017Date of Patent: April 16, 2024Assignee: Palo Alto Networks, Inc.Inventor: Nishant Doshi
-
Patent number: 11950096Abstract: Aspects of the present disclosure are drawn to client device for use with a network controller and an external server, the network controller being configured to manage a wireless network, to change a critical parameter of the wireless network, to transmit a request for a one time password (OTP). The external server being configured to generate the OTP in response to the request for the OTP, to provide a notification of the OTP and to transmit the OTP to the network controller. The network controller being configured to additionally receive the OTP from the external server. The client device including a memory having a data structure stored therein, the data structure including a list of configurable critical parameters of the wireless network, and including a processor configured to execute instructions stored on the memory to cause the client device to receive a request to configure a configurable parameter of the wireless network.Type: GrantFiled: September 8, 2021Date of Patent: April 2, 2024Assignee: ARRIS ENTERPRISES LLCInventors: Akhtar Ghaus Zaman, Muralidharan Narayanan