Patents Examined by Christopher A. Revak
  • Patent number: 11748473
    Abstract: An intrusion detection system (IDS) for a micro-services environment identifies attacks in substantially real-time and at a container-level. In this approach, behavior models are generated from container images using a binary analysis. A behavior model is a graph data structure having nodes and edges, wherein an edge represents a system call made by at least one process represented as a node in the graph data structure. The model is co-located with a running container, thereby enabling detection of anomalies as the container executes in a container environment on a hardware node. A per-container IDS function is instantiated by checking whether system call telemetry generated by an image's running container satisfies the associated behavior model that has been generated for the container image. If the telemetry indicates activity that deviates from the behavior model, an automated action is then initiated to attempt to address the attack, preferably while it is in progress.
    Type: Grant
    Filed: October 15, 2020
    Date of Patent: September 5, 2023
    Assignee: International Business Machines Corporation
    Inventors: Frederico Araujo, Teryl Paul Taylor, Jiyong Jang, Will Blair
  • Patent number: 11743284
    Abstract: Techniques are described herein that are capable of using multiple factors to detect illicit enumeration. Object requests are parsed among request types such that each request type includes object request(s) that share a respective common attribute. Each object request requests information about an object. Scores are generated for the respective request types such that the score for each request type is based at least in part on a count of the object request(s) in the respective request type. The scores for the respective request types are aggregated to provide a malicious activity score that represents a likelihood that the illicit enumeration has occurred. The malicious activity score is compared to a score threshold. A remedial operation is selectively performed with regard to the illicit enumeration based at least in part on whether the malicious activity score is greater than or equal to the score threshold.
    Type: Grant
    Filed: January 12, 2021
    Date of Patent: August 29, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Mor Rubin
  • Patent number: 11736944
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Grant
    Filed: May 25, 2022
    Date of Patent: August 22, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Patent number: 11734420
    Abstract: A snooping invalidation module is implemented at the network interface for a given core, or processing element, of a multicore or manycore device, e.g., NoC device, to discard packets with invalid header flits (e.g., duplicate packets) from being injected into the device, e.g., by a malicious hardware trojan implemented in the network interface. In some embodiments, a data-snooping detection circuit is implemented to detect a source of an on-going attack.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: August 22, 2023
    Assignee: Colorado State University Research Foundation
    Inventors: Sudeep Pasricha, Venkata Yaswanth Raparti
  • Patent number: 11734437
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
    Type: Grant
    Filed: March 21, 2023
    Date of Patent: August 22, 2023
    Assignee: Security First Innovations, LLC
    Inventors: Mark S. O'Hare, Rick L. Orsini, Roger Davenport, Steven Winick
  • Patent number: 11720678
    Abstract: System and method for protecting a computing device of a target system against ransomware attacks employs a file system having a data structure used by an operating system of the computing device for managing files. A software or a hardware installed agent in the computing device performs one or more actions autonomously on behalf of the target system. The agent autonomously creates one or more trap files in the data structure of the filing system. A trap file is a file access to which indicates a probability of ransomware attack. The agent monitors access to the one or more trap files. Upon detecting access to a trap file, remedial action is performed by the target system against the probability of ransomware attack.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: August 8, 2023
    Assignee: Cyber Crucible
    Inventors: Dennis Underwood, Kyle Nehman, Noah Greenberg, Mark Weideman
  • Patent number: 11716358
    Abstract: A system compares two network security specifications expected to implement the same network security policy for a network and identifies possible discrepancies between them. The system generates a representation of relations between subnetworks of the network for each network security specification. The representation efficiently stores permitted connections between subnetworks. The system compares the representations corresponding to the two network security specifications to identify discrepancies across the two network security specifications. If discrepancies are identified across the two network security specifications the system generating a report identifying the discrepancies.
    Type: Grant
    Filed: November 3, 2021
    Date of Patent: August 1, 2023
    Assignee: Salesforce, Inc.
    Inventor: Toan Nguyen
  • Patent number: 11706228
    Abstract: Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: July 18, 2023
    Assignee: AMERICORP INVESTMENTS LLC
    Inventor: Jordan Simons
  • Patent number: 11704421
    Abstract: Systems and methods are described for the generation of domain names that may be associated with a particular user device and may be encrypted to obfuscate the domain names of content requested by the user device.
    Type: Grant
    Filed: August 26, 2021
    Date of Patent: July 18, 2023
    Assignee: Comcast Cable Communications, LLC
    Inventors: Richard Fliam, David Arbuckle
  • Patent number: 11704406
    Abstract: Deriving and surfacing insights regarding security threats is disclosed. A plurality of features associated with a message is determined. A plurality of facet models is used to analyze the determined features. Based at least in part on the analysis, it is determined that the message poses a security threat. A prioritized set of information is determined to be provided as output that is representative of why the message was determined to pose a security threat. At least a portion of the prioritized set of information is provided as output.
    Type: Grant
    Filed: September 12, 2022
    Date of Patent: July 18, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
  • Patent number: 11700265
    Abstract: Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions and data access guidelines are received which govern access by a user to one or more of the data portions. A request to view one or more data portions of a block entry is received from the user. The data access guidelines for the user are applied to the request and the one or more data portions that are accessible by the request according to the data access guidelines are identified. A customized view of the block entry is generated which includes the one or more data portions determined to be accessible by the request.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: July 11, 2023
    Assignee: Americorp Investments LLC
    Inventor: Jordan Simons
  • Patent number: 11700131
    Abstract: Embodiments of this disclosure provide techniques for securely communicating an IMSI over the air from a UE to an SeAN, as well as for securely validating an unencrypted IMSI that the SeAN receives from the home network, during authentication protocols. In particular, the UE may either encrypt the IMSI assigned to the UE using an IMSI encryption key (KIMSIenc) or compute a hash of the IMSI assigned to the UE using an IMSI integrity key (KIMSIint), and then send the encrypted IMSI or the hash of the IMSI to the serving network. The encrypted IMSI or hash of the encrypted IMSI may then be used by the SeAN to validate an unencrypted IMSI that was previously received from an HSS in the home network of the UE.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: July 11, 2023
    Assignee: Futurewei Technologies, Inc.
    Inventors: Ahmad Shawky Muhanna, Marcus Wong
  • Patent number: 11695570
    Abstract: Arrangements of the present disclosure relate to a method for securing data located in a blockchain having a plurality of blocks. The method includes creating a pointer within a block of the plurality of blocks, the pointer pointing to a location external to the blockchain. In response to a request to protect data inside the block, the method further includes creating a security vault at the location, copying the block, and storing the copied block in the security vault using the pointer.
    Type: Grant
    Filed: December 27, 2021
    Date of Patent: July 4, 2023
    Assignee: Wells Fargo Bank, N.A.
    Inventor: Phillip H. Griffin
  • Patent number: 11687647
    Abstract: A method and an electronic device (100) are disclosed for generating semantic representation of a document to determine data security risk associated with the document. The method includes receiving, by a document semantics controller (160) of the electronic device (100), a document in an electronic form and determining, by the document semantics controller (160), raw text. Further, the method includes generating, by the document semantics controller (160), a plurality of sentence blocks using the raw text and determining, by the document semantics controller (160), embeddings for the plurality of sentence blocks. Further, the method includes determining, by the document semantics controller (160), the semantic representation of the document based on the embeddings for each of the sentence blocks; and generating, by the document semantics controller (160), the semantic representation of the document to determine the data security risk associated with the document.
    Type: Grant
    Filed: January 27, 2021
    Date of Patent: June 27, 2023
    Assignee: CONCENTRIC SOFTWARE, INC.
    Inventors: Madhusudana Shashanka, Bonnie Arogyam Varghese, Shankar Subramaniam, Karthik Krishnan, Rency Joseph
  • Patent number: 11689539
    Abstract: Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level. Enhanced operational efficiency and customer convenience is thereby provided in industries including parking, hotels, and autonomous vehicle fleets.
    Type: Grant
    Filed: March 12, 2021
    Date of Patent: June 27, 2023
    Assignee: Americorp Investments LLC
    Inventor: Jordan Simons
  • Patent number: 11687648
    Abstract: Deriving and surfacing insights regarding security threats is disclosed. A plurality of features associated with a message is determined. A plurality of facet models is used to analyze the determined features. Based at least in part on the analysis, it is determined that the message poses a security threat. A prioritized set of information is determined to be provided as output that is representative of why the message was determined to pose a security threat. At least a portion of the prioritized set of information is provided as output.
    Type: Grant
    Filed: December 9, 2021
    Date of Patent: June 27, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
  • Patent number: 11681804
    Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: June 20, 2023
    Assignee: Commvault Systems, Inc.
    Inventors: Oleg Goldshmidt, Mori Benech
  • Patent number: 11681808
    Abstract: A system is provided for configurably signing a secure data image that includes software code that interprets cryptographic atomic code. In the system, a code signing engine includes an interpreter that interprets atomic code signing operations presented in a recipe defined by a system administrator according to configuration parameter values supplied with the input image.
    Type: Grant
    Filed: January 6, 2022
    Date of Patent: June 20, 2023
    Assignee: ARRIS Enterprises LLC
    Inventors: Tat Keung Chan, Ting Yao, Alexander Medvinsky
  • Patent number: 11678261
    Abstract: A computer implemented method of distributed wireless communications access security, the method comprising steps a computer processor of a server computer is programmed to perform, the steps comprising: receiving data characterizing a device, selecting a policy from a database of policies using the received data characterizing the device, for the device, the policy defining a criterion for determining which wireless access points are allowable, and communicating data defining the selected policy to the device, for the device to use for determining whether access to an active wireless access point is allowable.
    Type: Grant
    Filed: January 26, 2022
    Date of Patent: June 13, 2023
    Assignee: CORONET CYBER SECURITY LTD.
    Inventor: Doron Milchtaich
  • Patent number: 11677734
    Abstract: A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: June 13, 2023
    Assignee: EBAY INC.
    Inventors: Raju Venkata Kolluru, Michael Dean Kleinpeter