Patents Examined by Darren B Schwartz
  • Patent number: 11888859
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a security risk persona; associating the security risk persona with a phase of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the phase of the cyber kill chain.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Margaret Cunningham, Clifford Charles Wright
  • Patent number: 11888860
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; the security related activity comprising a concerning behavior, the security related activity being enacted during an activity session; associating the security related activity enacted during an activity session with a security risk persona; analyzing the security related activity, the analyzing the security related activity using the security risk persona; and, performing a security operation in response to the analyzing the security related activity.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Margaret Cunningham, Clifford Charles Wright
  • Patent number: 11888863
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring a plurality of actions of an entity, the plurality of actions of the entity corresponding to a plurality of events enacted by the entity; maintaining information relating to the monitoring within a user edge component; identifying an event of analytic utility; analyzing the event of analytic utility at the user edge component, the analyzing generating a security risk assessment; and, providing the security risk assessment to a network edge component.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Patent number: 11888970
    Abstract: The present disclosure provides systems and methods for deriving a key from a basekey built-in a chip is provided. In an exemplary embodiment, there is provided a method for deriving a key from basekey built-in a chip that may comprise obtaining a basekey built-in the chip and a current version number when the chip starts up and runs read-only boot code, and performing iterations on the basekey via a one-way function to obtain a derived key of the current version. The number of times of the iterations is equal to the difference between a maximum version number and the current version number.
    Type: Grant
    Filed: October 19, 2021
    Date of Patent: January 30, 2024
    Assignee: MONTAGE ELECTRONICS (SHANGHAI) CO., LTD.
    Inventor: Zhaohui Du
  • Patent number: 11888862
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying an event of analytic utility; analyzing the event of analytic utility, the analyzing the event of analytic utility identifying an entity behavior associated with the event of analytic utility; and, performing the security operation in response to the analyzing the event of analytic utility, where the monitoring, identifying, analyzing and performing are performed via a distributed security analytics framework.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Patent number: 11888864
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Patent number: 11888861
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying a security related activity of the entity, the security related activity being of analytic utility; accessing an entity behavior catalog based upon the security related activity, the entity behavior catalog providing an inventory of entity behaviors; and performing a security operation via a human-centric risk modeling framework, the security operation using entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Nicolas Christian Fischbach, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
  • Patent number: 11882453
    Abstract: Arrangements are provided for identifying a second fraudulent subscription replacing a first fraudulent subscription. A method is performed by a fraudulent subscription detection system. The method includes obtaining notification of the first fraudulent subscription having been identified in a SIM box. The method comprises obtaining historical network data of the first fraudulent subscription. The method com includes prises generating a model based on the historical network data. The method includes identifying the second fraudulent subscription replacing the first fraudulent subscription in the SIM box upon providing live network data as input to the model. The method includes providing an identification of the second fraudulent subscription to at least one of a subscription manager entity and a user interface of a Manual Analysis component.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: January 23, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Christine Edman, Michael Liljenstam, Vasileios Giannokostas, Andrås Méhes
  • Patent number: 11856101
    Abstract: A method for providing a secured client computer that includes peripheral components. Each peripheral component processes a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component codes the corresponding data of the data type for establishing a secured peer-to-peer communication with other peripheral components.
    Type: Grant
    Filed: December 20, 2022
    Date of Patent: December 26, 2023
    Assignee: KAZUAR ADVANCED TECHNOLOGIES LTD.
    Inventors: Daniel Mondy Finchelstein, Yuval Moshe Porat, Shlomi Raz Marco
  • Patent number: 11855996
    Abstract: An administrator creates an access policy for a network resource using an access server. The access policy may specify device characteristics that are needed to access the network resource. These characteristics may relate to the type of user device, the computing environment of the user device, installed applications and versions, installed certificates, and physical characteristics. The access policy for the network resource may be assigned to a user or to groups of users. Later, when the user attempts to access the network resource, an application installed on the user device provides a file containing the characteristics of the user device to the access server. The access server determines whether the characteristics of the file satisfies the access policy associated with the user and network resource, and if so permits access to the network resource. Else, access to the network resource is denied.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: December 26, 2023
    Assignee: UAB 360 IT
    Inventors: Juta Gurinavi{hacek over (c)}iūtė, Carlos Eliseo Salas Lumbreras
  • Patent number: 11855999
    Abstract: An administrator creates an access policy for a network resource using an access server. The access policy may specify device characteristics that are needed to access the network resource. These characteristics may relate to the type of user device, the computing environment of the user device, installed applications and versions, installed certificates, and physical characteristics. The access policy for the network resource may be assigned to a user or to groups of users. Later, when the user attempts to access the network resource, an application installed on the user device provides a file containing the characteristics of the user device to the access server. The access server determines whether the characteristics of the file satisfies the access policy associated with the user and network resource, and if so permits access to the network resource. Else, access to the network resource is denied.
    Type: Grant
    Filed: December 20, 2022
    Date of Patent: December 26, 2023
    Assignee: UAB 360 IT
    Inventors: Juta Gurinavi{hacek over (c)}iūtė, Carlos Eliseo Salas Lumbreras
  • Patent number: 11847228
    Abstract: An apparatus to facilitate security within a computing system is disclosed. The apparatus includes a storage drive, a controller, comprising a trusted port having one or more key slots to program one or more cryptographic keys and an encryption engine to receive the cryptographic keys via the one or more key slots, encrypt data written to the storage drive using the cryptographic keys and decrypt data read from the storage drive using the cryptographic keys.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: December 19, 2023
    Assignee: Intel Corporation
    Inventors: Baiju Patel, Prashant Dewan
  • Patent number: 11843613
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source, the security related activity comprising a concerning behavior; generating a contextual modifier relating to the security related activity; analyzing the security related activity, the analyzing the security related activity being based upon the contextual modifier; and, performing a security operation in response to the analyzing the security related activity.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: December 12, 2023
    Assignee: Forcepoint LLC
    Inventors: Margaret Cunningham, Clifford Charles Wright
  • Patent number: 11838298
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a security risk persona; and, performing a security operation in response to the analyzing the security related activity.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: December 5, 2023
    Assignee: Forcepoint LLC
    Inventors: Margaret Cunningham, Clifford Charles Wright
  • Patent number: 11838294
    Abstract: A method for identifying a user includes: controlling an electronic device to connect to a first communication network; obtaining target behavior data of a user to be identified from a data pool corresponding to the first communication network, in which, the data pool stores at least one type of candidate behavior data of a candidate user, the candidate behavior data is obtained from a data source corresponding to a second communication network, and a security level of the first communication network is higher than a security level of the second communication network; and obtaining a category of the user to be identified by analyzing the target behavior data based on the first communication network.
    Type: Grant
    Filed: July 7, 2021
    Date of Patent: December 5, 2023
    Assignee: Beijing Baidu Netcom Science and Technology Co., LTD.
    Inventors: Kunpeng Ji, Shuangquan Yang, Xueting Zhang
  • Patent number: 11838760
    Abstract: A communication system including a host computer is provided herein. The host computer may include processing circuitry configured to provide user data and a communication interface configured to forward the user data to a cellular network for transmission to a user equipment (UE). The cellular network comprises a base station having a radio interface and base station processing circuitry. The base station processing circuitry configured to store a previously active security context for the UE, receive from the UE an RRCResumeRequest message including a security token, generate a temporary security context for the UE, use the temporary security context to verify the security token, send an RRC message to the UE, if no response to the RRC message is received from the UE, discard the temporary security context and retrieve the previously active security context. Thereafter, the base station transmits the user data for a host application.
    Type: Grant
    Filed: November 2, 2021
    Date of Patent: December 5, 2023
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Gunnar Mildh, Icaro L. J. da Silva
  • Patent number: 11829483
    Abstract: An apparatus to facilitate security within a computing system is disclosed. The apparatus includes a storage drive, a controller, comprising a trusted port having one or more key slots to program one or more cryptographic keys and an encryption engine to receive the cryptographic keys via the one or more key slots, encrypt data written to the storage drive using the cryptographic keys and decrypt data read from the storage drive using the cryptographic keys.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: November 28, 2023
    Assignee: Intel Corporation
    Inventors: Baiju Patel, Prashant Dewan
  • Patent number: 11824874
    Abstract: Example methods and systems for application security enforcement are described. In one example, a computer system may detect, from a client device, a packet requiring processing by a first server pool; and determine whether the packet is associated with a security attack. In response to determination that the packet is not associated with the security attack, the packet may be steered towards the first server pool to cause processing of the packet by one of multiple first application servers. Otherwise, the packet may be steered towards a second server pool to cause processing of the packet by one of multiple second application servers and to learn attack information associated with the security attack. The multiple second application servers in the second server pool may be capable of mimicking behavior of the multiple first application servers in the first server pool.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: November 21, 2023
    Assignee: VMWARE, INC.
    Inventors: Sudarshana Kandachar Sridhara Rao, Raghav Kempanna, Rajagopal Sreenivasan, Kumara Parameshwaran
  • Patent number: 11824854
    Abstract: A communication system is provided, the communication system including an authenticating unit that authenticates a plurality of communication terminals based on a single user ID, and keeps the plurality of communication terminals logged into an information providing service. A storing unit that stores therein provider registration information including a plurality of pieces of provider information that indicate providers of respective pieces of data being displayed on each communication terminal among the plurality of communication terminals. A receiving unit receives designation information that designates the provider registration information. A transmitting unit transmits each piece among the plurality of pieces of provider information to each communication terminal among the plurality of communication terminals so as to cause each communication terminal among the plurality of communication terminals to display data provided by a provider indicated by a plurality of pieces of provider information.
    Type: Grant
    Filed: October 30, 2022
    Date of Patent: November 21, 2023
    Assignee: e-Jan Networks Co.
    Inventors: Shiro Sakamoto, Kumar Karvepaku, Daisuke Yanagisawa, Shinji Kusuki
  • Patent number: 11811930
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which utilize authentication tokens recorded to a blockchain to identify and/or authenticate participants of a network-based communication session such as a network-based meeting. When joining the meeting, the participant may provide a token recorded on a blockchain to the communication service from the blockchain. The communication service may then identify and/or authenticate the user based upon the provided token. Various user-specific customizations and settings may then be applied and the user may be admitted to the meeting without having to enter a waiting room and be explicitly let in.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: November 7, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Michal Aichinger