Patents Examined by Darren B Schwartz
-
Patent number: 11963010Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). According to various embodiments of the present disclosure, an apparatus of a terminal in a wireless communication system may include a transceiver and at least one processor coupled to the transceiver, wherein the at least one processor may be configured to transmit a registration request message or a service request message including primary information and secondary information to an access and mobility management function (AMF), the primary information may be plain information, and the secondary information may be encrypted information.Type: GrantFiled: April 5, 2019Date of Patent: April 16, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Kyungjoo Suh, Youngkyo Baek
-
Patent number: 11949700Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.Type: GrantFiled: April 9, 2021Date of Patent: April 2, 2024Assignee: Forcepoint LLCInventors: Assaf Almaz, Ofir Arkin, Nicolas Christian Fischbach, Raffael Marty
-
Patent number: 11947679Abstract: A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.Type: GrantFiled: April 19, 2023Date of Patent: April 2, 2024Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Samiksha Patel, Jessica Colvin, Patrick M. Ward, Marty Grant, Jr., David Everett, Jean-Francois Legault
-
Patent number: 11947648Abstract: In one embodiment, a method for authenticating a user with an electronic device is disclosed. The method incudes receiving digital sensor data from a motion sensor over a signal acquisition time period; deleting a beginning portion of the digital sensor data prior to the signal acquisition time period; suppressing signal components in the data associated with voluntary movement of the user; signal processing the suppressed digital sensor data to extract signal features representing neuro muscular tone of the user; tabulating the extracted signal features over periods of time into a feature vector table; executing a predictive model with the feature vector table; generating a numerical degree of matching level based on the feature vector table and the user parameter set; and making a determination to either authorize the user or not based on the numerical degree of matching level. The predictive model is trained by a user parameter set.Type: GrantFiled: December 23, 2021Date of Patent: April 2, 2024Assignee: Proprius Technolgies S.A.R.LInventors: Martin Zizi, Nick Sullivan, Luke Stork, Doron Drusinsky, Kitae Lee
-
Patent number: 11941123Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.Type: GrantFiled: December 29, 2021Date of Patent: March 26, 2024Assignee: UAB 360 ITInventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
-
Patent number: 11941121Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.Type: GrantFiled: December 28, 2021Date of Patent: March 26, 2024Assignee: UAB 360 ITInventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
-
Patent number: 11941124Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.Type: GrantFiled: December 29, 2021Date of Patent: March 26, 2024Assignee: UAB 360 ITInventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
-
Patent number: 11941122Abstract: In an embodiment, systems and methods for detecting malware are provided. A server trains a static malware model and a dynamic malware model to detect malware in files. The models are distributed to a plurality of user devices for use by antimalware software executing on the user devices. When a user device receives a file, the static malware model is used to determine whether the file contains malware. If the static malware model is unable to make the determination, when the file is later executed, the dynamic malware model is used to determine whether the file contains malware. The file along with the determination made by the dynamic malware model are then provided to the server. The server then retrains the static malware model using the received files and the received determinations. The server then distributes the updated static malware model to each of the devices.Type: GrantFiled: December 29, 2021Date of Patent: March 26, 2024Assignee: UAB 360 ITInventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
-
Patent number: 11936688Abstract: Systems and methods are provided for performing simulated phishing attacks using social engineering indicators. One or more failure indicators can be configured in a phishing email template, and each failure indicator can be assigned a description about that failure indicator through use of a markup tag. The phishing email template containing the markup tags corresponding to the failure indicators can be stored and can be used to generate a simulated phishing email in which the one or more markup tags are removed.Type: GrantFiled: March 6, 2023Date of Patent: March 19, 2024Assignee: KnowBe4, Inc.Inventors: Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
-
Patent number: 11928230Abstract: A method for execution by a computing device to adjust efficiency of storing data in a storage network includes processing a data segment based on a storage approach to produce a processed data segment, the storage approach being based on an estimated overwrite frequency for the data segment. The method continues by error encoding the processed data segment to produce a set of encoded data slices, where a decode threshold number of encoded data slices is needed to recover the processed data segment. The method continues by storing the set of encoded data slices in the memory of the storage network.Type: GrantFiled: February 3, 2023Date of Patent: March 12, 2024Assignee: Pure Storage, Inc.Inventors: Ilya Volvovski, Wesley B. Leggette, Michael C. Storm, Jason K. Resch
-
Patent number: 11928215Abstract: An apparatus to verify firmware in a computing system, comprising a non-volatile memory, including firmware memory to store agent firmware associated with each of a plurality of interconnect protocol (IP) agents and version memory to store security version numbers (SVNs) included in the agent firmware, a security controller comprising verifier logic to verify an integrity of the version memory by applying a hash algorithm to contents of the version memory to generate a SVN hash, and a trusted platform module (TPM) to store the SVN hash.Type: GrantFiled: June 29, 2022Date of Patent: March 12, 2024Assignee: Intel CorporationInventors: Prashant Dewan, Chao Zhang, Nivedita Aggarwal, Aditya Katragada, Mohamed Haniffa, Kenji Chen
-
Patent number: 11930126Abstract: The present invention provides systems and methods for supporting encrypted communications with a medical device, such as an implantable device, through a relay device to a remote server, and may employ cloud computing technologies. An implantable medical device is generally constrained to employ a low power transceiver, which supports short distance digital communications. A relay device, such as a smartphone or WiFi access point, acts as a conduit for the communications to the internet or other network, which need not be private or secure. The medical device supports encrypted secure communications, such as a virtual private network technology. The medical device negotiates a secure channel through a smartphone or router, for example, which provides application support for the communication, but may be isolated from the content.Type: GrantFiled: February 15, 2023Date of Patent: March 12, 2024Assignee: Piltorak Technologies LLCInventor: Alexander I Poltorak
-
Patent number: 11924179Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive, by the network communication device from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.Type: GrantFiled: August 8, 2022Date of Patent: March 5, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Patent number: 11924332Abstract: The disclosure relates to, among other things, systems and methods for facilitating the secure recording of assertions made by entities tied to identities. Embodiments of the disclosed systems and methods may allow users to make non-revocable, difficult to forge, cryptographic assertions tied to their identities through the posting of entries in an immutable ledger. In certain embodiments, a user's cryptographic assertions may be preceded by ledger entries which feature certificates from trusted authorities that tie the keys used for making assertions to the user's identity. Further embodiments provide for a mechanism for disabling further entries posted under a user's key, either automatically or at the user's initiation.Type: GrantFiled: March 10, 2023Date of Patent: March 5, 2024Assignee: Intertrust Technologies CorporationInventor: Caleb Levy
-
Patent number: 11916890Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be accessed from a cryptographic service. The private session key can be communicated from the user space software to a network communication device. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can be configured to generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.Type: GrantFiled: August 8, 2022Date of Patent: February 27, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Patent number: 11902293Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying a security related activity of the entity, the security related activity being of analytic utility; accessing an entity behavior catalog based upon the security related activity, the entity behavior catalog providing an inventory of entity behaviors; and performing a security operation via a distributed security analytics environment, the security operation using entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: GrantFiled: December 22, 2020Date of Patent: February 13, 2024Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, Nicolas Christian Fischbach, Raffael Marty
-
Patent number: 11902295Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.Type: GrantFiled: December 31, 2020Date of Patent: February 13, 2024Assignee: Forcepoint LLCInventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
-
Patent number: 11902294Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; associating a human factor with the entity; identifying an event of analytic utility, the event of analytic utility being derived from the observable from the electronic data source; analyzing the event of analytic utility, the analyzing the event of analytic utility taking into account the human factor associated with the entity enacting the event of analytic utility; generating a risk score in response to the analyzing, the risk score taking into account the human factor associated with the entity; and, performing the security operation when the risk score meets a security risk parameter.Type: GrantFiled: December 31, 2020Date of Patent: February 13, 2024Assignee: Forcepoint LLCInventors: Raffael Marty, Nicolas Christian Fischbach
-
Patent number: 11902296Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.Type: GrantFiled: December 31, 2020Date of Patent: February 13, 2024Assignee: Forcepoint LLCInventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
-
Patent number: 11895150Abstract: Implementations of the present disclosure include receiving analytical attack graph data representative of an analytical attack graph, the analytical attack graph including: one or more rule nodes each representing a network configuration rule; and one or more impact nodes each representing an impact of one or more respective network configuration rules; converting the analytical attack graph to a tactic graph including one or more tactic nodes, each tactic node representing at least one rule node and at least one impact node; determining one or more paths of the tactic graph that lead to a particular network impact; generating a process model based on the paths that lead to the particular network impact, the process model representing network activity for execution of a process that leads to the particular network impact; and executing one or more remedial actions based on the process model to mitigate cyber-security risk to the enterprise network.Type: GrantFiled: July 28, 2021Date of Patent: February 6, 2024Assignee: Accenture Global Solutions LimitedInventors: Gal Engelberg, Moshe Hadad, Alexander Basovskiy