Patents Examined by Christopher A. Revak
  • Patent number: 11366892
    Abstract: In an embodiment, a method is configured to detect compromised credentials, comprising: generating a plurality of bloom filters, wherein each bloom filter corresponds to a particular subset of a set of compromised credentials; receiving an index value from a client computing device; in response to receiving the index value, determining a target bloom filter corresponding to the index value, and sending the target bloom filter to the client computing device; receiving a first value from the client computing device; in response to receiving the first value, generating a second value based on the first value, and sending the second value to the client computing device.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: June 21, 2022
    Assignee: Shape Security, Inc.
    Inventors: Yao Zhao, Jian Jiang, Rundong Liu
  • Patent number: 11366932
    Abstract: A consensus method includes: when a first consensus node of a consortium blockchain performs a consensus operation on a consensus proposal, sending a verification signature to a second consensus node of the consortium blockchain, wherein the verification signature is configured to represent at least one consensus verification item set by the first consensus node sending the verification signature for the consensus proposal; receiving, by the first consensus node, a verification signature sent by at least one of the second consensus node or a third consensus node of the consortium blockchain for the consensus proposal; and after the first consensus node reaches a consensus on proposal data of the consensus proposal, generating a block recording the received verification signature corresponding to the consensus proposal and the proposal data, wherein the verification signature recorded in the block is configured to prove validity of the proposal data recorded in the block.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: June 21, 2022
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventor: Shuai Li
  • Patent number: 11363013
    Abstract: An identity authenticator receives a first authentication credential from a first application at a first computing device. The identity authenticator then determines that the first authentication credential is associated with a second authentication credential for the first application at a second computing device based on a stored authentication identity. The identity authenticator then provides a stored execution state for the first application to the first computing device, wherein the stored execution state is associated, based on the stored authentication identity, with at least one of the first authentication credential or the second authentication credential.
    Type: Grant
    Filed: March 6, 2020
    Date of Patent: June 14, 2022
    Assignee: ELECTRONIC ARTS INC.
    Inventors: Lin Yang, Anand Nair, Gregory William Schaefer, Yuan Fang, Danjun Xing, Shengyong Li, Chuan Ye
  • Patent number: 11361087
    Abstract: A security data processing device comprising a processor and memory, the processor configured to: receive a script comprising at least one instruction set for provisioning a type of programmable device, the instruction set(s) defining one or more cryptographic operations, each of the cryptographic operations referring to a parameter; store the script in memory; verify a signature associated with the script using an authorization key retrieved from memory; receive a programming request from a programming module of a programming machine in communication with said processor, said programming request requesting the programming of a programmable device and identifying an instruction set of the instruction set(s) in said script; for each cryptographic operation in the identified instruction set, determine a value for the parameter and perform the cryptographic operation using the value; and in response to performing each cryptographic operation, output programming information to the programming module for programmi
    Type: Grant
    Filed: February 7, 2020
    Date of Patent: June 14, 2022
    Assignee: SECURE THINGZ LIMITED
    Inventors: Andrew Bott, Timothy Hoole
  • Patent number: 11354408
    Abstract: A memory controller for a (DRAM) memory processes an (access) command for a target row in the memory, increments a count value for each victim row associated with the target row, and issues a (dummy activate) command for a victim row whose count value reaches a specified threshold. By tracking victim rows instead of target rows, the memory controller can thwart both single-sided and double-sided row-hammer attacks. The memory controller maintains the victim-row addresses and corresponding command counts in a TCAM memory to detect rows that may be prone to row-hammer attacks. If so, then the memory controller issues dummy activate commands to the corresponding memory rows to thwart such row-hammer attacks.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: June 7, 2022
    Assignee: NXP USA, Inc.
    Inventors: Prokash Ghosh, Sourav Roy
  • Patent number: 11356279
    Abstract: A blockchain-based electronic signature method includes: receiving an electronic signature authentication request sent by an electronic signature client, wherein the electronic signature client is bound to one or more legal signature users, and the electronic signature authentication request includes biometric information of a signature user collected by the electronic signature client; in response to the electronic signature authentication request, authenticating whether the signature user is a legal signature user bound to the electronic signature client based on the biometric information; and if yes, returning an authentication result to the electronic signature client, so that the electronic signature client further prompts the signature user to perform an electronic signature operation in response to the authentication result; and receiving an electronic signature submitted by the signature user and collected by the electronic signature client, and publishing the electronic signature to a blockchain.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: June 7, 2022
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventor: Sanyuan He
  • Patent number: 11350279
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: May 31, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Patent number: 11343279
    Abstract: The embodiments herein disclose a system or a platform for multi-dimensional, multi-layered security control. The system includes Identity management module, Payload data handling module, heuristic network Management module, Application interface Manager, and an encapsulator or Modulator while leveraging a dynamic Validator. A Shielding protector is provided for safety of servers, devices, systems and clouds. The identity management module safeguards passwords, PINS, user information, and device data. The dynamic ID, time-based, multi factor elements is used to embed both ID and data. The Payload data handling module provides data wrapping, random-segmenting and flow-chains. The heuristic network Management module performs routing of watermarking, and obfuscation map tracker. The Application interface Manager works on DDMLSORI techniques to block out any unwanted Access while validating actual transactions using Qualifiers.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: May 24, 2022
    Inventor: Ravishankar Srinivasan
  • Patent number: 11341229
    Abstract: In order to provide improved matching of records between different sources, systems and methods include generating a data link between a stored interaction profile of the user and activity data records that identify activities performed by the user. Online interaction data associated with the user is received, including tracking data indicative of online interactions with content. The online interaction data is stored in the stored interaction profile associated with the user. An activity model is used to predict correlation parameters representing groupings of online interactions of the online interaction data with activities performed by the user, where the prediction is based on the tracking data and each activity in the interaction profile. The interaction profile is updated with the groupings and user activities are authenticated based on the interaction profile.
    Type: Grant
    Filed: June 16, 2020
    Date of Patent: May 24, 2022
    Assignee: Capital One Services, LLC
    Inventors: Lukiih Cuan, Xiaoguang Zhu, Jason Ji
  • Patent number: 11336461
    Abstract: The invention relates to a method for controlling by a server called secure server the use of a first set of at least one data element of a data owner and provided by a communication device, the method comprising the steps of: receiving at least one digital signature representative of a process authorized by the data owner and adapted to carry out a series of at least one instructions using the first set of at least one data element; receiving from a process entity the series of at least one instruction, and a ciphered version of the first set of at least one data element which is communicated to the process entity by the communication device; verifying that the series of at least one instruction correspond to a process authorized by the data owner of the communication device by comparing the at least one digital signature received by the secure server with a digital signature obtained by the secure server using as an input the series of at least one instruction received by the secure server; and if the serie
    Type: Grant
    Filed: December 7, 2018
    Date of Patent: May 17, 2022
    Assignee: THALES DIS FRANCE SA
    Inventors: GĂ©rald Maunier, Ludovic Tressol, Frederic Dao
  • Patent number: 11328057
    Abstract: A system which includes at least one host, wherein the host is configured to implement at least one container group including a first container, a data communication module, an interface, and a malicious detection module, wherein the data communication module is configured to collect data based on data communication of the container group, and transmit collected data, or data representative thereof, to the interface, the interface being configured to transmit collected data, or data representative thereof, to the malicious detection module, for detecting malicious data.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: May 10, 2022
    Assignee: VMware, Inc.
    Inventors: Haim Helman, Meori Oransky, Julien Sobrier
  • Patent number: 11321494
    Abstract: In an example, there is provided a method for attesting to a management state of a device platform configuration, based on a signed data structure that represents a device management status and a time-based value from a secure cryptoprocessor of the device. The signed data structure is sent to a management system for validation based on a comparison to the state of the cryptoprocessor at the time of signing the data structure.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: May 3, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Adrian Baldwin, James Robert Waldron, David Plaquin
  • Patent number: 11321457
    Abstract: An electronic device includes a combinational logic circuit, one or more functional state-sampling components, one or more protection state-sampling components, and protection logic. The combinational logic circuit has one or more outputs. The functional state-sampling components are configured to sample the respective outputs of the combinational logic circuit. The protection state-sampling components are associated respectively with the functional state-sampling components, each protection state-sampling component configured to sample a same output of the combinational logic circuit as the corresponding functional state-sampling component, but with a predefined time offset relative to the functional state-sampling component. The protection logic is configured to detect a discrepancy between the outputs sampled by the functional state-sampling components and the respective outputs sampled by the protection state-sampling components, and to initiate a responsive action in response to the discrepancy.
    Type: Grant
    Filed: September 16, 2019
    Date of Patent: May 3, 2022
    Assignee: NUVOTON TECHNOLOGY CORPORATION
    Inventor: Ziv Hershman
  • Patent number: 11321463
    Abstract: A hardware malware profiling and detection system is disclosed. In embodiments, the system includes a primary (e.g., trusted) system including template processors and hardware sensors. The template processors submit input vectors to the primary system and characterize the system response via power trace data collected by the hardware sensors. Based on the input vectors and power trace data, the template processors generate system templates and derive system challenges therefrom. The template processors submit the system challenges to a remote system under test and characterize the remote system response in real time via identical remote hardware sensors. The template processors correlate the real-time remote system response data with the system templates corresponding to the issued challenges to detect system anomalies or malware within the remote system or its components.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: May 3, 2022
    Assignee: Rockwell Collins, Inc.
    Inventors: Reginald D. Bean, Carl J. Henning, Gregory S. Droba
  • Patent number: 11321458
    Abstract: An Integrated Circuit (IC) includes functional circuitry and protection circuitry. The protection circuitry is configured to maintain a counter value, which is indicative of a cumulative amount of hostile attacking attempted on the functional circuitry over a lifetime of the IC, to detect events indicative of suspected hostile attacks on the functional circuitry, to decide, responsively to a detected event, on an update of the counter value depending on a time difference between the detected event and a most recent power-up in the IC, and update the counter value in accordance with the decided update, and to disable at least part of the IC in response to the counter value crossing a threshold.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: May 3, 2022
    Assignee: NUVOTON TECHNOLOGY CORPORATION
    Inventors: Ziv Hershman, Dan Morav
  • Patent number: 11316699
    Abstract: A method for authenticating users contactlessly with decentralized identifiers (DID) using verifiable credentials is provided. The method includes steps of: an authentication supporting server, (a) on condition that a user DID is issued and a user public key is registered in a blockchain network, in response to a contactless authentication request, (i) retrieving the user public key from the blockchain network or from a user DID document sent by a resolving server and (ii) verifying a user signature value; and (b) (i) transmitting real-time feature point information and identity confirmation information to a certification authority (CA) server, (ii) allowing the CA server to transmit authentication result information, (iii) retrieving a CA server public key from the blockchain network or from a CA server DID document sent by the resolving server, (iv) verifying a CA server signature value, (v) registering the authentication result information, and (vi) transmitting a user verifiable credential.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: April 26, 2022
    Assignee: Coinplug. Inc.
    Inventors: Joon Sun Uhr, Moon Gju Suh, Joo Han Song
  • Patent number: 11310059
    Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.
    Type: Grant
    Filed: June 2, 2020
    Date of Patent: April 19, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
  • Patent number: 11297047
    Abstract: Providing authentication servers (e.g. a RADIUS server) combined with a distributed data store (e.g. a memory cache) for storing a time-limited trust relationship message to establish/enable a time-limited trust between the authentication servers during network roaming of a user device. This circumvents the need for the traditional method of synchronous authentication messaging sequences, permitting transmission of authentication messaging sequences in a more time-efficient asynchronous manner.
    Type: Grant
    Filed: October 16, 2017
    Date of Patent: April 5, 2022
    Assignee: GLOBAL REACH TECHNOLOGY, INC
    Inventor: Christopher Alan Spencer
  • Patent number: 11295010
    Abstract: The present disclosure describes a system for saving metadata on files and using attribute data files inside a computing system to enhance the ability to provide user interfaces based on actions associated with non-executable attachments like text and document files from untrusted emails, to block execution of potentially harmful executable object downloads and files based on geographic location, and to a create a prompt for users to decide whether to continue execution of potentially harmful executable object downloads and files. The system also records user behavior on reactions to suspicious applications and documents by transmitting a set of attribute data in an attribute data file corresponding to suspicious applications or documents to a server. The system interrupts execution of actions related to untrusted phishing emails in order to give users a choice on whether to proceed with actions.
    Type: Grant
    Filed: April 17, 2020
    Date of Patent: April 5, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Bret Lowry, Gauvin Repuspolo
  • Patent number: 11297102
    Abstract: The present disclosure describes systems and methods for using for a simulated phishing campaign, information about one or more situations of a user determined from an electronic calendar of the user. A campaign controller may identify an electronic calendar of a user for which to direct a simulated phishing campaign, determine one or more situations of the user from information stored in the electronic calendar and select either a template from a plurality of templates or a starting action from a plurality of starting actions for the simulated phishing campaign based at least on the one or more situations of the user. The campaign controller may communicate to one or more devices of the user a simulated phishing communication based at least on the respective template or starting action.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: April 5, 2022
    Assignee: Knowbe4, Inc.
    Inventor: Greg Kras