Patents Examined by Evans Desrosiers
-
Patent number: 11604887Abstract: A data protection method is provided. The data protection method includes the following. A first image is obtained; at least one first object image in the first image is identified; the at least one first object image is analyzed to capture multiple first characteristic values of multiple characteristic points of the at least one first object image; and an encryption key is generated according to the first characteristic values.Type: GrantFiled: March 2, 2021Date of Patent: March 14, 2023Assignee: Wistron CorporationInventor: Yi Fen Chen
-
Patent number: 11599335Abstract: A vehicle includes: at least one memory configured to store at least one default Instruction Structure Key (ISK), a generated ISK, and a pin code of the vehicle; and at least one processor. The at least one default ISK may include a first default ISK and a second default ISK. The processor may generate a random number using the first default ISK, receive the second default ISK encrypted with the generated ISK generated based on the pin code, and determine the generated ISK as an encryption key for encryption communication of the vehicle when the generated random number and the random number corresponding to the second default ISK are the same.Type: GrantFiled: October 2, 2019Date of Patent: March 7, 2023Assignees: Hyundai Motor Company, Kia Motors CorporationInventors: Jihye Lee, Kyuhwan Chin, Dong June Song, Jaekwon Jung, Yongho Shin, Sinjung Kim, Beom Choon Park, SeokHan Lee
-
Patent number: 11601349Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.Type: GrantFiled: April 10, 2020Date of Patent: March 7, 2023Assignee: Cisco Technology, Inc.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 11595476Abstract: Federation of trusted data distribution systems is accomplished by treating an entire data distribution network as either a publisher or subscriber to a feed in another data distribution network. A first data feed is created in a first data feed management subsystem associated with a first data distribution network. A second data feed related to the first data feed is created in a second data feed management subsystem associated with a second data distribution network. A first data access policy is associated with the second data feed and a publisher for the second data feed is created in the second data distribution network. The identity and authentication of a second subscriber to the second data feed in the second data distribution network is managed by referencing the first data access policy.Type: GrantFiled: July 16, 2019Date of Patent: February 28, 2023Assignee: AT&T Intellectual Property I, L.P.Inventor: Christopher Rath
-
Patent number: 11588770Abstract: A user can share (show) multimedia information while simultaneously communicating (telling) with one or more other users over a network. Multimedia information is received from at least one source. The multimedia information may be manually and/or automatically annotated and shared with other users. The multimedia information may be displayed in an integrated live view simultaneously with other modes of communication, such as video, voice, or text. A simultaneous sharing communication interface provides an immersive experience that lets a user communicate via text, voice, video, sounds, music, or the like, with one or more other users while also simultaneously sharing media such as photos, videos, movies, images, graphics, illustrations, animations, presentations, narratives, music, sounds, applications, files, and the like. The simultaneous sharing interface enables a user to experience a higher level of intimacy in their communication with others over a network.Type: GrantFiled: November 10, 2020Date of Patent: February 21, 2023Assignee: Snap Inc.Inventors: Matthew James Skyrm, Joshua Robert Russell Jacobson, Eric P. Burke
-
Patent number: 11586713Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.Type: GrantFiled: December 6, 2021Date of Patent: February 21, 2023Assignee: LiveRamp, Inc.Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
-
Patent number: 11582041Abstract: An electronic device is provided. The electronic device includes a communication interface including circuitry, a memory, and a processor which, based on receiving ID information generated by performing a first encryption process on biometric information and password information generated by performing a second encryption process on the biometric information from an external electronic device through the communication interface, is configured to control the electronic device to: store the ID information and the password information in the memory.Type: GrantFiled: January 30, 2020Date of Patent: February 14, 2023Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Jinsu Kim, Junbum Shin, Jungkon Kim, Seungtaek Han
-
Patent number: 11574047Abstract: A cyber threat intelligence (CTI) gateway device may receive rules for filtering TCP/IP packet communications events that are configured to cause the CTI gateway device to identify communications corresponding to indicators, signatures, and behavioral patterns of network threats. The CTI gateway device may receive packets that compose endpoint-to-endpoint communication events and, for each event, may determine that the event corresponds to criteria specified by a filtering rule. The criteria may correspond to one or more of the network threat indicators, signatures, and behavioral patterns. The CTI gateway may create a log of the threat event and forward the threat event log to a task queue managed by a cyberanalysis workflow application. Human cyberanalysts use the cyberanalysis workflow application to service the task queue by removing the task at the front of the queue, investigating the threat event, and deciding whether the event is a reportable finding that should be reported to the proper authorities.Type: GrantFiled: September 26, 2019Date of Patent: February 7, 2023Assignee: Centripetal Networks, Inc.Inventors: Sean Moore, Jonathan R. Rogers, Jess Parnell, Zachary Ehnerd
-
Patent number: 11568028Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.Type: GrantFiled: December 6, 2021Date of Patent: January 31, 2023Assignee: LiveRamp, Inc.Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
-
Patent number: 11568070Abstract: A process of linking a key to a component is disclosed herein. In various aspects, the key may be a password, hash, key, encryption key, decryption key, seed value, unlock code, or other alphanumeric identifier, and the component includes a computer in networked communication, and may further include a specific user of the computer. The process may include the step of identifying a component using environmental variables associated with the component, and the process step of forming a representation of the key unique to the component. The representation is tested to determine that the identified component is the source of the representation, in various aspects.Type: GrantFiled: March 3, 2021Date of Patent: January 31, 2023Inventor: F. Scott Deaver
-
Patent number: 11562072Abstract: The present disclosure provides a data processing method for coping with ransomware, which encrypts data with a malicious intent and blocks an access to the data, to protect the data, and a program for executing the data processing method. In a computer apparatus that loads an application program stored in a memory onto a processor and carries out a predetermined processing according to the application program, on an operating system (OS) kernel which controls an access of the application program to hardware components of the computer apparatus, the processor reads the data stored in the memory, performs the predetermined processing at the request of the application program, determines whether a ransomware attack occurred for the data before storing the processed data back to the memory, and stores the processed data to the memory according to a determination result, thereby preventing the damage caused by the ransomware attack.Type: GrantFiled: January 28, 2019Date of Patent: January 24, 2023Assignee: SECUVE CO., LTD.Inventor: Ki Yoong Hong
-
Patent number: 11558750Abstract: This disclosure describes systems, methods, and devices related to security for multi-link operation. A device may determine a multi-link communication with a first multi-link device comprising two or more links associated with two or more station devices (STAs) included in the first multi-link device. The device may determine a first medium access control (MAC) address associated with a first link of the two or more links. The device may determine a second MAC address associated with a second link of the two or more links. The device may generate one or more pairwise security keys to be used in the multi-link communication on the two or more links. The device may cause to send a frame to the first multi-link device using at least one combination of the one or more pairwise security keys.Type: GrantFiled: May 6, 2020Date of Patent: January 17, 2023Assignee: Intel CorporationInventors: Po-Kai Huang, Laurent Cariou, Carlos Cordeiro, Daniel Bravo, Robert Stacey, Arik Klein, Avner Epstein, Daniel Leiderman
-
Patent number: 11550944Abstract: Systems and methods are described for modifying input and output (I/O) to an object storage service by implementing one or more owner-specified functions to I/O requests. Such functions can include data access control functions, data manipulation functions, and the like. The owner of an object collection maintained by the object storage service can specify code execution environment rules that can give privileges to the execution of such functions such as by allowing the functions to access external services or the requesting user's private resources. In this manner, owners of the object collection are provided with greater control over how the object collection is accessed.Type: GrantFiled: September 27, 2019Date of Patent: January 10, 2023Assignee: Amazon Technologies, Inc.Inventors: Kevin C. Miller, Timothy Lawrence Harris, Ramyanshu Datta
-
Patent number: 11550935Abstract: Provided is a method for blockchain-based recordkeeping and implementable by a terminal device. The method comprises: obtaining target data; computing a data digest of the target data, and extracting a key segment from the target data; signing, in a secure operation environment included in the terminal device, the data digest and/or the key segment based on a private key associated with the terminal device to generate a signature; and submitting to a blockchain the data digest, the key segment, and the signature, for one or more nodes in the blockchain to verify the signature based on a public key corresponding to the private key, and to record the data digest and the key segment in the blockchain in response to the signature being verified to be valid.Type: GrantFiled: November 25, 2020Date of Patent: January 10, 2023Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Hong Zhang, Haitao Jiang, Linqing Wang, Xinyu Weng, Fuqiang Li, Feng Lin, Jun Wu, Xiaodong Zeng, Lei Yang
-
Patent number: 11550887Abstract: A method and system include receiving, by a processor of a server, from a computing device associated with a user, real-time user activity data identifying at least one activity performed on the computing device. User-inputted data elements from a plurality of elements of a graphical user interface displayed on the computing device are received, which identify user-specific data attributes. Potential user-specific knowledge information is identified from databases based on at least one user-specific data attribute. User-specific challenge questions based on the potential user-specific knowledge information are generated and displayed on the user's computing device. Answers to the user-specific challenge questions by the user are received. An answer score based on correct answers and a behavioral score based the real-time user activity data of the user are determined. The processor determines whether the user is or is not a fraudster based on the answer score and the behavioral score.Type: GrantFiled: December 16, 2020Date of Patent: January 10, 2023Inventors: Abdelkader M'Hamed Benkreira, Phoebe Atkins, Andrea Montealegre, Nagaraju Gaddigopula, William Prior, Daniel John Marsch
-
Patent number: 11546370Abstract: Methods and systems are disclosed for anti-replay protection for network packet communications. A scorecard is stored that includes packet sequence numbers for received packets associated with a network packet flow. For each received packet, an anti-replay unit accesses the scorecard for an initial check to determine if the current packet represents a late packet and/or a replay packet. After further processing, the anti-replay unit accesses the scorecard for a final check to determine if the current packet represents a replay packet. For one embodiment, the initial check uses a first window of packet sequence numbers, and the final check uses a second window of packet sequence numbers that is larger than the first window. For further embodiments, multiple processing units operate in parallel to process received packets and to share the anti-replay unit, and each processing unit requests initial and final checks for received packets it processes.Type: GrantFiled: January 31, 2018Date of Patent: January 3, 2023Assignee: NXP USA, Inc.Inventors: Steve D. Millman, Michael J. Torla, David Abdoo
-
Patent number: 11546149Abstract: A processor of a remote crypto cluster (RCC) may receive a public key from a client device through at least one network. The processor of the RCC may obtain an encrypted specific key and a blinded project key from at least one data source through the at least one network. The processor of the RCC may derive a derived key in blind based on the encrypted specific key and the blinded project key. The processor of the RCC may send the derived key in blind to the client device.Type: GrantFiled: March 15, 2021Date of Patent: January 3, 2023Assignee: INTUIT INC.Inventors: Gleb Keselman, Yaron Sheffer, Alon Rosen
-
Patent number: 11539527Abstract: An example operation may include one or more of receiving, from a blockchain peer node, a sequence of blocks stored in a hash-linked chain of blocks on a distributed ledger, where each block in the sequence of blocks includes a reduced-step hash of block content from a previous block in the sequence, performing an approximate hash verification on the reduced-step hashes stored among the sequence of blocks, and determining whether the sequence of blocks has been tampered with based on the approximate hash verification on the reduced-step hashes.Type: GrantFiled: May 29, 2019Date of Patent: December 27, 2022Assignee: International Business Machines CorporationInventor: Praveen Jayachandran
-
Patent number: 11537721Abstract: Applications on a device are assigned scores based on their attributes, update status, and source. A device is a assigned a score based on its attributes and the scores of applications installed thereon. the device score may be combined with an evaluation of user behavior to obtain a user score. The scores may be used to invoke security actions with respect to data and services of an enterprise. Security reports for a network environment may be modified such that the severity of threats accounts for policies and attributes of the environment. Security of a device may be evaluated locally, including the training of a model to identify anomalous authentication or usage behavior. Security of a device may be reduced to a score lacking personal information that may be used by a server to select access controls for a device.Type: GrantFiled: March 5, 2020Date of Patent: December 27, 2022Assignee: LOOKOUT INC.Inventors: Victoria Ashley Mosby, Bastien Bobe, Brian Buck, Katelyn Clifford
-
Patent number: 11539667Abstract: A virtual private network connection method and a memory card device using the virtual private network connection method are provided. Firstly, a virtual private network connection application program is provided. Then, the virtual private network connection application program is loaded in a memory card device. Then, the memory card device is installed in a medical device. After the virtual private network connection application program is executed and the memory card device is connected to a virtual private network server according to a connection request, the data from the medical device is transmitted to the virtual private network server through the memory card device. In such way, the data will not be attacked by malware and stolen by a third-party manufacturer during the transmission process.Type: GrantFiled: August 5, 2020Date of Patent: December 27, 2022Assignee: KEY ASIC INC.Inventors: Bahadur Shah Khan, Sek Yen Tan, Hao-Jen Wu