Patents Examined by Darren B Schwartz
-
Patent number: 12170728Abstract: A first device may provide a request to establish a secure communication with a second device, and may hide public keys based on a commutative legacy compatible encryption process sharing a modulus and based on quasi-Carmichael numbers larger than the modulus with quadratic residuals. The first device may utilize variable extendable-output function hashing, based on the modulus, with bloom filtering to generate an output that prevents creation of classical rainbow tables, and may utilize a key derivation function to generate a symmetric key based on the output. The first device may establish the secure communication with the second device based on the symmetric key.Type: GrantFiled: July 26, 2022Date of Patent: December 17, 2024Assignee: Accenture Global Solutions LimitedInventor: Benjamin Glen McCarty
-
Patent number: 12169568Abstract: Systems and methods provide vulnerability proofing procedures for booting of an IHS (Information Handling System). A request to boot the IHS is detected. One or more boot configurations are determined that include configurations for operation of one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The boot configurations are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the boot configuration, further booting of the IHS may be disabled until the boot configuration is modified to include no configurations with vulnerabilities identified in the catalogs.Type: GrantFiled: October 19, 2022Date of Patent: December 17, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12166747Abstract: The present disclosure describes techniques for managing secret information. A material set may be created. The material set may correspond to a material set name (MSN). The material set may be configured to contain secret information and information for identifying destinations that are authorized to access the secret information. The secret information may be managed by using the MSN to identify and track the secret information and without exposing the secret information.Type: GrantFiled: May 31, 2022Date of Patent: December 10, 2024Assignee: Lemon Inc.Inventor: Jun Zeng
-
Patent number: 12166762Abstract: Example techniques described herein involve authorization management in a media playback system. Within examples, a client, such as a control device, may authenticate with a playback device using a token. The playback device may resolve a role corresponding to the token using a token-to-role mapping hosted at an authentication service. After resolving the role, the playback device may resolve a permissions set corresponding to the role using a role-to-permissions mapping similarly hosted at the authentication service. Within examples, such mappings may be cached locally at the edge (e.g., on a playback device).Type: GrantFiled: May 9, 2022Date of Patent: December 10, 2024Assignee: Sonos, Inc.Inventors: Gregory Ramsperger, Steven Beckhardt, Keith Thoresz, Ryan Moak
-
Patent number: 12166793Abstract: Methods and systems are provided for facilitating efficient intrusion detection via hierarchical signatures, in accordance with embodiments described herein. In particular, embodiments described herein include obtaining an intrusion signature that includes an intrusion attribute value(s) indicating a malicious attack on a computer network or system. Based on the intrusion signature, a hierarchical signature is generated by including the intrusion attribute value(s) of the intrusion signature in one of a corresponding data structure of hierarchical data structures. Thereafter, a network packet, having a data attribute(s) is obtained. The network packet is determined as suspect of being malicious based on the data attribute(s) of the network packet matching the at intrusion attribute value(s) of the hierarchical signature. The indication of the suspect network packet can be provided, for example for notification of such a suspect network packet.Type: GrantFiled: May 24, 2022Date of Patent: December 10, 2024Assignee: Microsoft Technology Licensing, LLCInventor: Ankit Jain
-
Patent number: 12158959Abstract: Systems and methods are provided for vulnerability proofing updates to an IHS. An update package is detected that includes configurations for one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The updated configurations of the hardware component that are included in the update package are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the updated configurations, further booting of the IHS may be disabled until the update package is modified to include no configurations with vulnerabilities identified in the catalogs.Type: GrantFiled: October 19, 2022Date of Patent: December 3, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12160509Abstract: Systems and methods include a random number pool where one or more sets of key data elements of the random number pool are transmitted and added or replaced with another set of key data elements.Type: GrantFiled: January 31, 2021Date of Patent: December 3, 2024Assignee: 7Tunnels Inc.Inventor: Michael L. Hammon
-
Patent number: 12155656Abstract: Mechanisms for authenticating a connection between a user device and a streaming media content device comprising: identifying a collection of candidate streaming media content devices based on beacon(s) detected by a user device; receiving an indication that one of the content devices is to be selected for connection to the user device; transmitting instructions to the content devices to broadcast a signal, wherein the signal broadcast by each of the content devices contains a value that indicates an identity of the content device; receiving, from the user device, an audio signal that includes a detected signal; processing the audio signal to extract the value indicating the identity of a particular content device associated with the detected signal contained in the received audio signal; identifying the particular content device based on the determined value; and transmitting an indication that the user device and the particular content device are authenticated to communicate.Type: GrantFiled: February 28, 2022Date of Patent: November 26, 2024Assignee: Google LLCInventors: Liam O'Gorman, Nate Plumley, Jagjit Singh Chawla, Brian Patrick Williams
-
Patent number: 12153685Abstract: Systems and methods are provided for vulnerability proofing an IHS (Information Handling System) while being administered using a bootable image. Launching of a bootable image by the one or more CPUs is detected and one or more IHS configurations to be made using the bootable image are identified. One or more catalogs specifying known vulnerabilities of hardware components are accessed and used to determine whether any of the IHS configurations to be made using the bootable image are identified as vulnerable in one or more of the catalogs. Configuration of the IHS using the bootable image is blocked until the configurations to be made using the bootable image are modified to include no configurations with vulnerabilities identified in the plurality of catalogs.Type: GrantFiled: October 20, 2022Date of Patent: November 26, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12147544Abstract: Systems and methods provided vulnerability proofing of an IHS (Information Handling System) while it is being provisioned for deployment, such as upon receipt at a datacenter. An initial provisioning of the IHS is detected, where no provisioning of the IHS has been conducted other than the factory provisioning of the IHS. A profile is identified that is to be used in provisioning the IHS, where the profile includes configurations for one or more hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. For each of the hardware configurations in the profile, configurations that are vulnerable are identified based on the catalogs of known vulnerabilities. If vulnerabilities are identified, further provisioning of the IHS is blocked until the profile is modified to include no hardware configurations with vulnerabilities identified in the catalogs.Type: GrantFiled: October 21, 2022Date of Patent: November 19, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12141287Abstract: Disclosed methods for enabling flexible policies for user access to BIOS attribute settings perform operations including creating a BIOS attribute map encompassing one or more configurable BIOS attributes, generating a role-based authorization table associating an authorization role to each of the configurable BIOS attributes, and deploying the role-based authorization table to an information handling system. Responsive to a user launching a BIOS attribute configuration tool, a user role associated with the user is detected and the role-based authorization table is retrieved. Based on the role-based authorization table and the user role, configurable BIOS attributes for the user are identified. The configurable BIOS attributes may then be presented to the BIOS configuration to enable the user to perform configuration operations for the configurable BIOS attributes.Type: GrantFiled: July 28, 2022Date of Patent: November 12, 2024Assignee: Dell Products L.P.Inventors: Vivekanandh Narayanasamy Rajagopalan, Balasingh Ponraj Samuel
-
Patent number: 12141306Abstract: A method for integrity auditing is provided. The method comprises: generate a challenge message for verifying data integrity of a file stored at a storage server (510); send the challenge message to the storage server (520); receive, from the storage server, a proof on the data integrity of the file, the proof being generated based on the challenge message (530); verify the data integrity of the file by verifying validity of the proof (540). In this way, integrity auditing for multi-copy storage can be enabled, where the overhead in updating data is independent of the number of copies of the data.Type: GrantFiled: July 18, 2019Date of Patent: November 12, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Anmin Fu, Jingyu Feng
-
Patent number: 12141295Abstract: Systems and methods are provided for vulnerability proofing the use of machine learning recommendations by an IHS. A machine learning recommendation is detected that provides configurations for one or more of the hardware components of the IHS. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the hardware configurations from the machine learning recommendations are identified as vulnerable in one or more of the catalogs. If a machine learning recommendation is identified as vulnerable, use of the machine learning recommendation by the IHS is blocked until the recommendation is modified to include no recommended hardware configurations with vulnerabilities identified in the catalogs.Type: GrantFiled: October 21, 2022Date of Patent: November 12, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12143366Abstract: The invention is a method of use for a VPN, customized via programming, that controls access without requiring any personal user information, and conveys only files encrypted using Diffie-Hellman AES-256-GCM encryption processes. Conveyed files are stored only in encrypted form and can only be displayed in real time by a user, and once viewed, only the encrypted file remains. The method also includes a means of end-to-end file deletion that leaves no remnants of the deleted file behind.Type: GrantFiled: August 26, 2022Date of Patent: November 12, 2024Inventors: Tariq Tony Ghanma, Alexandru Lazarovici, Fawad Ahsan
-
Patent number: 12143493Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which utilize authentication tokens recorded to a blockchain to identify and/or authenticate participants of a network-based communication session such as a network-based meeting. When joining the meeting, the participant may provide a token recorded on a blockchain to the communication service from the blockchain. The communication service may then identify and/or authenticate the user based upon the provided token. Various user-specific customizations and settings may then be applied and the user may be admitted to the meeting without having to enter a waiting room and be explicitly let in.Type: GrantFiled: September 27, 2023Date of Patent: November 12, 2024Assignee: Microsoft Technology Licensing, LLCInventor: Michal Aichinger
-
Patent number: 12141294Abstract: Systems and methods are provided for vulnerability proofing the use of risk scores in the administration of hardware components of an IHS (Information Handling System). Proposed configurations for a first of the hardware components of the IHS are detected, where the proposed configurations are associated with a risk score. Catalogs specifying known vulnerabilities of hardware components are accessed and used to determine whether any of the proposed configurations of the first hardware component are identified as vulnerable in one or more of the catalogs. When a vulnerability for the proposed configuration is identified in the catalogs, the risk score of the configuration is increased based on the vulnerabilities identified in the plurality of catalogs. When the risk score is increased to an elevated level, the hardware component is disabled until the proposed configurations are changed to include no configurations with vulnerabilities identified in the catalogs.Type: GrantFiled: October 20, 2022Date of Patent: November 12, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12143526Abstract: A method for securing an off-the-shelf smartphone, a secure communication system, and a security insert is provided. The method comprises removing the battery from the off-the-shelf smartphone and inserting the security insert to the battery compartment. The security insert comprises cryptographic module. The method further comprises modifying off-the-shelf smartphone and providing a power and data connection between the security insert and the smartphone. The secure communication system wirelessly transmits outgoing cellular encrypted black data, which is encrypted by the cryptographic module, from the modified off-the-shelf smartphone to a cellular network, and decrypts, by the cryptographic module, incoming cellular black data receives from the cellular network to the modified off-the-shelf smartphone. The security insert enclosure configured to be deployed in a battery compartment.Type: GrantFiled: April 8, 2021Date of Patent: November 12, 2024Assignee: HIGH SEC LABS LTD.Inventor: Aviv Soffer
-
Patent number: 12135794Abstract: Systems and methods provided for vulnerability proofing updates to an IHS (Information Handling System). Upon receipt of an update to hardware component configurations of the IHS, vulnerability proofing requirements for modifications to the hardware component configurations are retrieved, including requirements for modifications that are validated for operation of a computational workload by the IHS. Based on the vulnerability proofing requirements, catalogs specifying known vulnerabilities of hardware components are consulted to determine whether the modifications are identified as vulnerable in the catalogs and whether remediations to the identified vulnerabilities are validated for operation of the workload. If the modifications are not identified as vulnerable in the catalogs, the update is transmitted to the IHS. If the modifications are identified as vulnerable in the catalogs and remediations to the identified vulnerabilities are not validated for operation of the workload, the update is terminated.Type: GrantFiled: October 20, 2022Date of Patent: November 5, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore, Muniswamy Setty K S
-
Patent number: 12137112Abstract: Systems and methods are provided for vulnerability proofing the use of an IHS (Information Handling System) in a computing cluster. Notification is received by the IHS of modifications to configurations of a computing cluster that includes the IHS. Vulnerability proofing requirements for computing cluster configurations including the IHS are retrieved from a persistent data storage of the IHS. Based on the vulnerability proofing requirements, catalogs comprising known vulnerabilities of IHS hardware components are accessed. Modifications to the computing cluster configurations are identified as vulnerable in one or more of the catalogs. When modifications to the computing cluster configurations are identified as vulnerable, participation by the IHS in the computing cluster is suspended until the modifications to the computing cluster configurations are changed to include no configurations with vulnerabilities identified in the catalogs.Type: GrantFiled: October 20, 2022Date of Patent: November 5, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12130931Abstract: Systems and methods are provided for vulnerability proofing subsystems of hardware components of an IHS (Information Handling System). A request to modify configurations of a hardware component of the IHS is detected. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the modified hardware configurations are identified as vulnerable in one or more of the catalogs. When vulnerabilities are identified in the modified configurations for the hardware component, other hardware components of the IHS are identified that are interdependent on the hardware component as part of an IHS subsystem. Hardware configurations for any of the hardware components of the subsystem are evaluated for vulnerabilities based on the catalogs.Type: GrantFiled: October 21, 2022Date of Patent: October 29, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore