Patents Examined by Chi D Nguy
-
Patent number: 11178118Abstract: A method of tokenizing sensitive data from a terminal device includes receiving, a connection request comprising a hardware serial number associated with a terminal device and validating the hardware serial number associated with the terminal device. The method includes sending a command to a terminal device that causes the terminal device to display a prompt for sensitive data associated with a user interacting with the terminal device and receiving an encrypted data packet from the terminal device. The encrypted data packet includes the sensitive data. The method includes sending the encrypted data packet to a gateway system for tokenization, receiving a token that represents the sensitive data, and providing the token to the terminal device.Type: GrantFiled: April 9, 2019Date of Patent: November 16, 2021Assignee: First Data CorporationInventors: Nicholas Aceto, Kevin Nathan, Kyle Nahrgang, Tom Catullo, Pete Foley, Bill Miller, Evan Broderick
-
Patent number: 11178161Abstract: The system obtains a multimodal dataset containing different types of data gathered during operation of the computer system, wherein the multimodal dataset includes time-series data for different variables associated with operation of the computer system. Next, the system forms a set of feature groups from the multimodal dataset, wherein each feature group comprises variables from the multimodal dataset containing the same type of data. The system then computes a tripoint similarity matrix for each feature group, and aggregates the tripoint similarity matrices for the feature groups to produce a crossmodal tripoint similarity matrix. Next, the system uses the crossmodal tripoint similarity matrix to cluster the multimodal dataset to form a model. The system then performs prognostic-surveillance operations on real-time multimodal data received from the computer system, wherein the prognostic-surveillance operations use the model as a classifier to detect anomalies.Type: GrantFiled: April 18, 2019Date of Patent: November 16, 2021Assignee: Oracle International CorporationInventors: Aleksey M. Urmanov, Alan Paul Wood
-
Patent number: 11171977Abstract: A method for detecting spoofing attacks from network traffic log data is presented. The method includes training a spoofing attack detector with the network traffic log data received from one or more mobile networks by extracting features that are relevant to spoofing attacks for training data, building a first set of vector representations for the network traffic log data, training an anomaly detection model by employing DAGMM, and obtaining learned parameters of DAGMM. The method includes testing the spoofing attack detector with the network traffic log data received from the one or more mobile networks by extracting features that are relevant to spoofing attacks for testing data, building a second set of vector representations for the network traffic log data, obtaining latent representations of the testing data, computing a z-score of the testing data, and creating a spoofing attack alert report listing traffic logs generating z-scores exceeding a predetermined threshold.Type: GrantFiled: January 14, 2019Date of Patent: November 9, 2021Inventors: Haifeng Chen, Bo Zong, Christian Lumezanu
-
Patent number: 11159500Abstract: In some aspects, control circuitry receives, at a content provider server that is associated with a first subscription service, a first authentication key from a content aggregator server that is associated with a second subscription service, prior to the user subscribing to the first subscription service. The control circuitry generates and stores, at the content provider server, the first user account after comparing the first authentication key to acceptable authentication. In response to storing the first user account, the control circuitry receives a request from the content aggregator server to subscribe the user to the first subscription service, wherein the request includes a second authentication key.Type: GrantFiled: November 3, 2017Date of Patent: October 26, 2021Assignee: Rovi Guides, Inc.Inventors: William L. Thomas, Walter R. Klappert
-
Patent number: 11159553Abstract: Examples of the present disclosure describe systems and methods for determining exploit prevention software settings using machine learning. In aspects, exploit prevention software may be used to identify processes executing on a computing device. Metadata for the identified processes may be determined and transmitted to a machine learning system. The machine learning system may use an exploit prevention model to determine exploit prevention configuration settings for each of the processes, and may transmit the configuration setting to the computing device. The computing device may implement the configuration settings to protect the processes and monitor the stability of the protected processes as they execute. The computing device may transmit the stability data to the machine-learning system. The machine-learning system may then modify the exploit prevention model based on the stability data.Type: GrantFiled: April 13, 2018Date of Patent: October 26, 2021Assignee: Webroot Inc.Inventor: Jonathan Giffard
-
Patent number: 11157652Abstract: A real-time event processing system receives event data containing telemetric data and one or more personal identifiers. The personal identifier in the event data is replaced with an obfuscated value so that the telemetric data may be used without reference to the personal identifier. A reversible map is used to reverse the obfuscated personal identifier to its original value. In the case when a request is received to delete the mapped personal identifier, the link to the entry in the reversible map is broken by associating the personal identifier with a different obfuscated value.Type: GrantFiled: December 10, 2018Date of Patent: October 26, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Shibani Basava, Dinesh Chandnani, Zhu Chen, Ram Kumar Donthula, Matthew Sloan Theodore Evans, Siwei Li, George Joshua Michaels, Andrew Christopher Neil, Geoffrey Staneff, Evgenia Steshenko, Vijay Upadya, Shengyu Fu
-
Patent number: 11153076Abstract: Methods, systems, and apparatus for providing secure communication. The device includes a secure element for generating application key pairs. The device includes a trusted environment that is physically or logically isolated from an untrusted environment. The trusted environment includes one or more processors configured to perform operations of an application. The operations include generating an application key pair. The application key pair includes a secure element private key and a secure element public key. The operations include sending an application authentication request including one or more device identifiers and the secure element public key to a server. The operations include obtaining a digital certificate that includes the secure element public key and the one or more device identifiers. The operations include providing the digital certificate to a second device and establishing a secure communication channel between the device and the second device using the digital certificate.Type: GrantFiled: September 17, 2018Date of Patent: October 19, 2021Assignee: THIRDWAYV, INC.Inventors: Nabil Wasily, Michael Atef Ayoub
-
Patent number: 11140455Abstract: A first network namespace and second network namespace are created in a computing instance of a computer system, with the second network namespace being accessible to the first network namespace via an interface. A service is executed in the first namespace and an encoder is executed in the second namespace, with the encoder transforming media from one format to another format. Communication from the encoder to the service is regulated via the interface.Type: GrantFiled: June 9, 2017Date of Patent: October 5, 2021Assignee: Amazon Technologies, Inc.Inventors: Eric Woodruff, Akshat Aranya, Varad Joshi, Rebecca Claire Weiss
-
Patent number: 11140153Abstract: Techniques allow identification of credential fields in a credential form on a web page that can be stored in a credential manager database to allow a credential manager application to fill the credential fields with saved credentials managed by the credential manager.Type: GrantFiled: September 16, 2019Date of Patent: October 5, 2021Assignee: MCAFEE, LLCInventors: Nicolas Lupien, Michael Lakhia, Hubert Gagnon-Lamonde
-
Patent number: 11132446Abstract: The present disclosure is directed to a novel system for using a distributed blockchain ledger to conduct, manage, and store application assessment data. In particular, computing systems may be used to perform assessments on the various applications within the enterprise environment and store the assessments as data records within the blockchain. The entity system may further comprise one or more blockchain interjectors which may trigger the addition of updated data records for one or more application assessments in the blockchain. In this way, the system provides for a highly efficient way to perform application assessments.Type: GrantFiled: October 25, 2018Date of Patent: September 28, 2021Assignee: BANK OF AMERICA CORPORATIONInventors: Lonnie Jason Carter, Cris Jay Gwin, Theresa Kruse Leahy
-
Patent number: 11128607Abstract: The invention provides a generic operating system for coordinating, controlling and/or influencing the activities of a device. The invention is implemented using a blockchain platform with which the operating system is arranged to interact. The blockchain may be the Bitcoin blockchain. In a preferred embodiment, the device is an Internet of Things (IOT) device. The invention provides a computer-implemented control system and corresponding method for controlling a device, the system comprising a device configured for wireless communication with a network and having an IP address and a public-private key cryptographic key pair associated with the device; a software-implemented control component arranged to monitor the state of a blockchain network and/or transmit blockchain Transactions to the blockchain network; and a set of instructions arranged for execution by the control component to control the functionality of the device.Type: GrantFiled: April 28, 2017Date of Patent: September 21, 2021Assignee: nChain Licensing AGInventors: Craig Steven Wright, Stephane Savanah
-
Patent number: 11126702Abstract: An application login password input method and a terminal, where the method includes, obtaining, by the terminal, biometric feature information of a user, determining, according to the biometric feature information, whether the user has login permission, obtaining voice information of the user, determining, according to the voice information after it is determined that the user has the login permission, password information corresponding to the voice information, and inputting the password information into a password input box of the application. Hence, in combination with the biometric feature information of the user, password information input security is ensured, password information input accuracy can be improved, an operation is easy and convenient, and burdens of the user can be reduced.Type: GrantFiled: January 22, 2016Date of Patent: September 21, 2021Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yong Chen, Tao Zheng
-
Patent number: 11115430Abstract: A method, apparatus and computer-readable medium for testing a target device. A fuzzer and a monitor are connected to the target device via a tactical bus. The fuzzer records messages sent from a source device to the target device over the tactical bus, creates a first fuzzed message having a data structure of the recorded message, and sends the first fuzzed message to the target device over the tactical bus. A fuzzer monitor monitors the target device for an anomalous response to the first fuzzed message, and determines a vulnerability of the target device from the response to the first fuzzed message.Type: GrantFiled: June 9, 2017Date of Patent: September 7, 2021Assignee: RAYTHEON COMPANYInventors: Brandon Woolley, Ross MacKinnon, Eric Rammelsberg
-
Patent number: 11115400Abstract: In a control terminal device for controlling a plurality of devices, when account information is registered in a first device which is one of the plurality of devices, after completion of registration of account information in the first device, a second device in which the account information is not registered is searched, and the account information is registered in the searched second device.Type: GrantFiled: March 29, 2018Date of Patent: September 7, 2021Assignee: Yamaha CorporationInventors: Kazuya Mushikabe, Akihiko Suyama, Keisuke Tsukada
-
Patent number: 11115384Abstract: A walled garden system includes a firewall controlling access between a first network and a second network at least by allowing connection requests originating from a user device on the first network to a destination IP address on the second network in response to determining that the destination IP address matches a cleared IP address on a cleared IP addresses list. A controller receives a domain name service (DNS) reply from a DNS server on the second network, and determines whether a domain name specified within the DNS reply matches a cleared domain name on a cleared domain names list. In response to determining that the domain name specified within the DNS reply matches the cleared domain name on the cleared domain names list, the controller adds a resolved IP address specified in the DNS reply to the cleared IP addresses list as a new cleared IP address.Type: GrantFiled: October 27, 2017Date of Patent: September 7, 2021Assignee: Guest Tek Interactive Entertainment Ltd.Inventor: David T. Ong
-
Patent number: 11100207Abstract: Provided is a user authentication method including reproducing sound data of which a sound source in a first position of a space around a user is virtually localized using a Head-Related Transfer Function (HRTF) of the user toward the user, acquiring a second position of the space around the user, the second position being estimated by the user who has listened to the reproduced sound data as a position of the sound source; and authenticating the user according to a coincidence between the first position and the second position.Type: GrantFiled: September 9, 2019Date of Patent: August 24, 2021Assignee: SONY CORPORATIONInventor: Kosei Yamashita
-
Patent number: 11093657Abstract: Embodiments of the present systems and methods may provide additional security mechanisms inside an operating system kernel itself by isolating parts of the kernel to protect them from attacks. For example, in an embodiment, a computer-implemented method implemented in a computer comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, the method may comprise: creating a namespace in an operating system kernel-space in the memory of the computer, creating an address space for the namespace that maps only kernel objects owned by the namespace, and providing access to kernel objects owned by the namespace only to the least one user process using the combined page table.Type: GrantFiled: May 19, 2019Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: James Bottomley, Joel Kelly Nider, Michael Rapoport
-
Patent number: 11089035Abstract: A method and system for predicting subsequent cyber-attacks in attack campaigns are provided. The method includes receiving events data related to cyber-attacks occurring in a network during a predefined time window; extracting at least one sequence from the received events data at least one attack vector; generating a sequence signature for each of the at least one extracted sequence; comparing each sequence signature to a representation of historic sequence signatures to determine at least partially matching sequence signature; and based on the matching sequence, determining at least one subsequent cyber-attack in a respective sequence.Type: GrantFiled: December 11, 2018Date of Patent: August 10, 2021Assignee: Radware Ltd.Inventors: Ehud Doron, Amnon Lotem, Yotam Ben-Ezra, Ami Navon, Nadav Grossaug, Nissim Pariente
-
Patent number: 11074333Abstract: Systems and methods for authentication with resistance to replay attacks are provided. A device may be used to capture image data of a physical token to authenticate or identify a user. Authentication information may be obtained by processing and analyzing the captured image data. Data about a state of the imaging device and the captured image data may be used for fraud detection. The data may be collected when the image data is processed and analyzed. The state of the imaging device and captured image data are unlikely to be repeated. The detected repetition of a state of the imaging device and captured image data may be a cause for increasing the likelihood that a replay attack is taking place. The device may be used to perform a transaction.Type: GrantFiled: January 15, 2019Date of Patent: July 27, 2021Assignee: Trusona, Inc.Inventors: Ori Eisen, Clayton Lengel-Zigich, Nikolas Mangu-Thitu
-
Patent number: 11051161Abstract: A method performed by a wireless device (110) includes determining whether a first message received from a network node (160) includes an Authentication and Key Management for Applications (AKMA) key indicator and, based on whether the first message includes the AKMA indicator, determining whether to generate AKMA key material for the authentication procedure with the network.Type: GrantFiled: January 28, 2021Date of Patent: June 29, 2021Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Cheng Wang, David Castellanos Zamora, Noamen Ben Henda, Helena Vahidi Mazinani