Patents Examined by Christopher Revak
  • Patent number: 11108544
    Abstract: An example operation may include one or more of receiving a request to commit a blockchain request to a hash-linked chain of blocks stored on a distributed ledger, extracting governance policies which are encoded within a data block of the hash-linked chain of blocks on the distributed ledger, determining if the blockchain request satisfies the extracted governance policies of the hash-linked chain of blocks on the distributed ledger, and in response to the blockchain request satisfying the extracted governance policies, executing the blockchain request and storing the executed blockchain request within another data block of the hash-linked chain of data blocks on the distributed ledger.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: August 31, 2021
    Assignee: International Business Machines Corporation
    Inventors: Meeta Vouk, Gari Singh, Jason K. Yellick, Gennaro A. Cuomo
  • Patent number: 11095431
    Abstract: A blockchain transaction manager implements a method of managing submission of blockchain transactions to a node in a blockchain network by validating a received blockchain transaction and enqueuing the validated received blockchain transaction in a transaction queue, preparing at least one transaction attribute of the received blockchain transaction and placing the received blockchain transaction in a persistence queue, digitally signing or certifying the received blockchain transaction, attempting to submit the digitally signed or certified blockchain transaction to the node, and polling a blockchain status of the submitted blockchain transaction. Processes are provided for automatically recalculating blockchain transaction processing fees in the blockchain transaction attributes. Processes are also provided for repairing transaction attributes when the blockchain transaction has been rejected and submitting the repaired blockchain transaction to the node.
    Type: Grant
    Filed: December 8, 2020
    Date of Patent: August 17, 2021
    Assignee: DLT Global, Inc.
    Inventor: Neeraj Srivastava
  • Patent number: 11087016
    Abstract: Disclosed is a system and method to create an encrypted file system on a block chain. The system creates the block chain controlling an access to the encrypted file system. The block chain defines a user permission to access at least a portion of the encrypted file system. The system creates the encrypted file system by recording a unique file ID in the block chain, where the unique file ID stores a chunk index including memory locations of multiple chunks storing portions of a file in the encrypted file system. The system encrypts the file using a channel session key and a file encryption key. The channel session key includes a cryptographic key computed based on information known to users granted at least a temporary access to the file, and the file encryption key includes a cryptographic key used to encrypt each file in the encrypted file system.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: August 10, 2021
    Assignee: SpiderOak, Inc.
    Inventor: Jonathan Andrew Crockett Moore
  • Patent number: 11082238
    Abstract: A method for network authentication of wireless devices at a gateway is provided that includes scanning a wireless network by the gateway to discover unjoined wireless devices, joining a discovered wireless device to the gateway using a non-internet protocol implemented by the wireless device, wherein the joining results in an encrypted connection between the gateway and the wireless device, and authenticating the discovered wireless device to the gateway via the encrypted connection, wherein authentication is performed according to an authentication protocol of a network protocol management layer of the gateway.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: August 3, 2021
    Assignee: Texas Instruments Incorporated
    Inventors: Ramanuja Vedantham, Alejandro Martin Lampropulos, Arvind Kandhalu Raghu
  • Patent number: 11080391
    Abstract: Examples of the present disclosure describe systems and methods for behavioral threat detection definition. In an example, a behavior rule comprising a set of rule instructions is used to define one or more events indicative of a behavior. For example, a set of events from which one event must be matched may be defined or a set of events from which all events must be matched may be defined. In some examples, events are matched based on an event name or type, or may be matched based on one or more parameters. Exact and/or inexact matching may be used. The set of rule instructions ultimately specifies one or more halt instructions, thereby indicating that a determination as to the presence of the behavior has been made. Example determinations include, but are not limited to, a match determination, a non-match determination, or an indication that additional monitoring should be performed.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: August 3, 2021
    Assignee: Webroot Inc.
    Inventors: Eric Klonowski, Fred Krenson
  • Patent number: 11075744
    Abstract: Disclosed herein are systems and method for storing media authentication data using a distributed ledger. In one aspect, an exemplary method comprises, receiving, by a processor of a computing node of a plurality of computing nodes, one or more hashes associated with a media content and a timestamp, the computing nodes being communicatively linked, generating a data block that contains at least one of the received hashes, the data block being generated by hashing a hash corresponding to a previous data block of the distributed ledger together with the at least one hash, the at least one hash corresponding to the media content of the data block being generated, transmitting to the plurality of computing nodes, a message reporting an addition of the generated data block, wherein at least some of the plurality of computing nodes maintain at least a partial copy of the distributed ledger.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: July 27, 2021
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11075766
    Abstract: A method and system for certification and authentication of objects is disclosed herein. The method and system use multiple attestations along with digital ledger technology to provide a digital certificate of authenticity for an object such as a work of art, collectible, or the like. QR codes attached to the collectible object and recorded at a central database provide a further degree of confidence in the authenticity of the object.
    Type: Grant
    Filed: January 22, 2021
    Date of Patent: July 27, 2021
    Assignee: Verisart, Inc.
    Inventors: Robert Norton, Bradford Lindsley Schlei, Shelley Ann Mannion, John Wood, Marcus Ramsden
  • Patent number: 11075919
    Abstract: A wireless communication device includes a network component, a wireless communication component, a memory, a trusted visitor management component and a primary user notification component. The network component can establish a primary wireless local area network and can establish a trusted visitor wireless local area network. The wireless communication component can receive a primary user identification and can receive a trusted visitor identification. The trusted visitor management component can generate a permission based on a stored trusted visitor identification and the trusted visitor identification. The primary user notification component can generate a primary user notification based on the permission. The network component can connect a trusted visitor wireless communication device to the trusted visitor wireless local area network based on the permission.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: July 27, 2021
    Assignee: ARRIS Enterprises LLC
    Inventor: Girdhari Lal Yadav
  • Patent number: 11075756
    Abstract: A method of encryption of a message implemented by an electronic encryption device. The method includes: obtaining a current message; obtaining a current encryption key; determining, from a plurality of variants a basic encryption protocol, of a current variant of the encryption protocol; encrypting, by using the current variant and the encryption key, the message to be encrypted, delivering an encrypted message; and transmitting the encrypted key.
    Type: Grant
    Filed: October 12, 2017
    Date of Patent: July 27, 2021
    Assignee: INGENICO GROUP
    Inventors: Marc Beunardeau, Remi Geraud, David Naccache, Aisling Connolly
  • Patent number: 11068609
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: July 20, 2021
    Assignee: Security First Corporation
    Inventors: Mark S. O'Hare, Rick L. Orsini, Roger S. Davenport, Steven Winick
  • Patent number: 11055405
    Abstract: A method is disclosed. The method includes: receiving, at a computing device, an event log including a plurality of events, where the plurality of events are derived from machine data generated by components of an information technology environment; determining a first score associated with a first granularity level by comparing a first event from the event log with a first plurality of frequent patterns generated for the first granularity level; determining a second score associated with a second granularity level by comparing the first event with a second plurality of frequent patterns generated for the second granularity level; determining an aggregate score for the first event based on the first score and the second score; comparing the aggregate score for the first event with an anomaly score threshold; and issuing an alert identifying the first event as an anomaly based on the aggregate score exceeding the anomaly score threshold.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: July 6, 2021
    Assignee: Splunk Inc.
    Inventors: Zhuxuan Jin, George Apostolopoulos
  • Patent number: 11057221
    Abstract: Disclosed herein are methods, systems, and apparatus for blockchain-based consensus process having enhanced security. One of the methods includes executing a first smart contract on a first blockchain. Executing the consensus smart contract includes executing code for implementing a consensus process for determining consensus among two or more consensus nodes according to a set of one or more consensus rules. A private key of the consensus smart contract corresponding to the public key is stored in a key management system associated with the second blockchain. The consensus smart contract uses the private key to digitally sign a message requesting a vote, and sends the digitally signed message to the two or more consensus nodes. The public key of the consensus smart contract enables the consensus nodes to validate the message sent from the consensus smart contract. A result of execution of the consensus smart contract are recorded in the first or second blockchain.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: July 6, 2021
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventor: Yujun Peng
  • Patent number: 11048551
    Abstract: A secured container provides access to enterprise data while isolated from the operating system of an Information Handling System (IHS). The secured container remains secured during its delivery and deployment. A secured container is configured to provide a user of the IHS with access to enterprise data. The secured container is encrypted using a symmetrical key that is transmitted to a secured storage that is isolated from the operating system of the IHS via out-of-band communications. The encrypted secured container is digitally signed using an asymmetric key pair. The digital signature and the encrypted secured container are transmitted to the IHS via in-band communications. At the IHS, the public key of the asymmetric key pair is used to validate the digital signature and the private symmetric key is retrieved from secured storage to decrypt the secured container. Additional embodiments provide a technique for securely migrating a secured container between IHSs.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: June 29, 2021
    Assignee: Dell Products, L.P.
    Inventors: Joseph Kozlowski, Ricardo L. Martinez, Abeye Teshome, Charles D. Robison, Girish S. Dhoble
  • Patent number: 11050744
    Abstract: Artificial biometric traits self-nullify due to natural physiological processes. Biometric enrollment and authentication may then be based on a life associated with the self-nullifying biometric trait. Once the life is expected to have expired, no further authentication may be performed until a new artificial biometric is applied.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: June 29, 2021
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Julio A. Cartaya
  • Patent number: 11030319
    Abstract: Disclosed herein are methods and systems for automated testing of hardware and software systems. An exemplary method comprises receiving a formalized architecture description describing an architecture of a system being designed, receiving a formalized threat description describing threats to systems similar to the system being designed, building, by a processor, a use model based on the formalized description, building, by a processor, a threat model based on the formalized threat description, determining, by a processor, kinds of use of the system by comparing the threat model to the use model and determining, by a processor, components of the system based on the kinds of use.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: June 8, 2021
    Assignee: AO Kaspersky Lab
    Inventors: Andrey P. Doukhvalov, Ekaterina A. Rudina, Semen S. Kort, Viacheslav N. Zolotnikov
  • Patent number: 11030310
    Abstract: There is provided a computer implemented method of disabling a malicious electronic control unit (ECU) of a plurality of ECUs in communication with a controller area network (CAN) bus network, the method executed by a computing device in communication with the plurality of ECUs and the CAN bus network, the method comprising: detecting a malicious message transmitted by the malicious ECU over the CAN bus network, and injecting a plurality of bits over the CAN bus network to trigger a predefined plurality of errors for disabling the malicious ECU before the malicious ECU makes an additional attempt to retransmit an additional instance of the malicious message.
    Type: Grant
    Filed: August 17, 2017
    Date of Patent: June 8, 2021
    Assignee: Red Bend Ltd.
    Inventors: Tomer Gilad, Shachar Rosen
  • Patent number: 11023620
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing cryptographic operations subject to identity verification. One of the methods includes receiving, by a cryptography chip, a request to perform a requested cryptographic operation from a client including client identity information, wherein the cryptography chip includes a processing resource that performs cryptographic operations and a storage resource that stores key information used in the cryptographic operations, and identity information associated with clients that are permitted to request cryptographic operations; determining, by the cryptography chip, that the client identity information is associated with one of the clients that are permitted to request cryptographic operations; and performing, by the cryptography chip, the requested cryptographic operation based on the key information stored in the storage resource.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: June 1, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Zhiyuan Feng, Yanpeng Li, Long Cheng
  • Patent number: 11010474
    Abstract: A virtualized storage for use in performing dynamic analysis of a sample is configured, at least in part by copying the sample to the virtualized storage. A virtual machine emulator is launched using a snapshot of a virtualized platform. A location of the copied sample in an image corresponding to the virtualized storage is determined, at least in part by identifying an offset. The copied sample is installed and dynamic analysis is performed on the sample.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: May 18, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventors: Wenjun Hu, Cong Zheng, Zhi Xu
  • Patent number: 11005760
    Abstract: An approach is provided that selects a geographic location to which transmission of a data packet is disallowed. The approach identifies disallowed network devices that reside in the selected geographic location and builds a routing path through a public computer network through an allowed set of network devices with the allowed set of network devices not including any of the disallowed network devices. The approach then transmits the data packet from a transmitting network device to a receiving network device using the routing path.
    Type: Grant
    Filed: April 2, 2020
    Date of Patent: May 11, 2021
    Assignee: International Business Machines Corporation
    Inventors: Andrew Barnes, John Delaney, Alexander J. Harvilchuck, Kenneth Weber, Clea Zolotow
  • Patent number: 11003747
    Abstract: A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field to represent a binary 0 or 1, with the value of the Key Character identifying the bit position of the binary 0 or 1 within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: May 11, 2021
    Assignee: LiveRamp, Inc.
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose