Patents Examined by Evans Desrosiers
-
Patent number: 11804288Abstract: A computer-implemented method includes producing information that characterizes a group of individuals from a set of private data representing characteristics of the individuals. The identity of the individuals is unattainable from the produced information. The method also includes providing the produced information to report the characteristics of the group.Type: GrantFiled: October 1, 2020Date of Patent: October 31, 2023Assignee: Vigilytics LLCInventor: Andrew L. Paris, III
-
Patent number: 11799844Abstract: Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance characteristics of the secure network. A sender can receive the policy information and transmit packets to a receiver if the policy information is complied with by the potential packet transmission.Type: GrantFiled: November 16, 2020Date of Patent: October 24, 2023Assignee: APPLIED INVENTION, LLCInventors: W. Daniel Hillis, Mathias L. Kolehmainen
-
Patent number: 11797671Abstract: A cyber threat intelligence (CTI) gateway device may receive rules for filtering TCP/IP packet communications events that are configured to cause the CTI gateway device to identify communications corresponding to indicators, signatures, and behavioral patterns of network threats. The CTI gateway device may receive packets that compose endpoint-to-endpoint communication events and, for each event, may determine that the event corresponds to criteria specified by a filtering rule. The criteria may correspond to one or more of the network threat indicators, signatures, and behavioral patterns. The CTI gateway may create a log of the threat event and forward the threat event log to a task queue managed by a cyberanalysis workflow application. Human cyberanalysts use the cyberanalysis workflow application to service the task queue by removing the task at the front of the queue, investigating the threat event, and deciding whether the event is a reportable finding that should be reported to the proper authorities.Type: GrantFiled: December 16, 2022Date of Patent: October 24, 2023Assignee: Centripetal Networks, LLCInventors: Sean Moore, Jonathan R. Rogers, Jess P. Parnell, Zachary Ehnerd
-
Patent number: 11792000Abstract: An example method to obtain process data associated with a process control system received from a field device includes identifying, at a computing device, associated data and a payload included in the data packet, the associated data including a source bit, determining, at the computing device, a type of connection between the field device and the computing device based on the source bit, determining, at the computing device, an encryption key identifier and an initialization vector based on an auxiliary data packet received prior to the data packet, generating, at the computing device, a nonce value based on the source bit and the initialization vector, the nonce value indicative of an input to a data encryption algorithm used by the field device to encrypt the payload, and extracting, at the computing device, the process data associated with the process control system from the payload.Type: GrantFiled: May 23, 2022Date of Patent: October 17, 2023Assignee: FISHER CONTROLS INTERNATIONAL LLCInventor: Kenneth William Junk
-
Patent number: 11790073Abstract: A vibration signal-based smartwatch authentication method includes generating incremental vibration signals using a vibration motor in a smartwatch; performing frequency band-based hierarchical endpoint segmentation to obtain vibration signals at a plurality of frequency bands; extracting frequency-domain features for the vibration signals at the plurality of frequency bands; training a dynamic time warping model by taking the vibration signals at the plurality of frequency bands as a training data set, training a nearest neighbor model by taking the extracted frequency-domain features as training data; collecting to-be-authenticated vibration signals which are processed to serve as test data signals; discriminating similarities between the test data signals and corresponding training data signals through the dynamic time warping model, giving a classification result through the nearest neighbor model, performing weighted calculation on a discrimination result of the dynamic time warping model and a discriminType: GrantFiled: September 29, 2020Date of Patent: October 17, 2023Assignee: SHENZHEN UNIVERSITYInventors: Kaishun Wu, Yandao Huang, Lin Chen
-
Patent number: 11785455Abstract: [Object] To provide a mechanism that makes it possible to avoid inconveniences when the authentication process has abnormality. [Solution] A communication device comprising a control section configured to control each of a first process that achieves a prescribed function, and a second process that authenticates another communication device and that is different from the first process, wherein the control section performs control in such a manner that the second process is not performed in a case where abnormality is recognized.Type: GrantFiled: September 26, 2020Date of Patent: October 10, 2023Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventors: Masateru Furuta, Shigenori Nitta, Yuki Kono, Yosuke Ohashi
-
Patent number: 11785006Abstract: A communication device achieves inter-device authentication with high accuracy and high responsiveness. The communication device includes a control section configured to execute a process related to transmission or reception of a first authentication signal and a second authentication signal that are necessary for a first authentication process for authentication of another communication device. The control section starts execution of a second authentication process for different authentication from the first authentication process, after transmission or reception of the first authentication signal and before transmission or reception of the second authentication signal.Type: GrantFiled: November 30, 2020Date of Patent: October 10, 2023Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventors: Yosuke Ohashi, Masateru Furuta, Yuki Kono, Shigenori Nitta
-
Patent number: 11783051Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for normalizing, compressing, and correlating vulnerabilities are disclosed. In one aspect, a method includes the actions of generating a first and second copy of a software target. The actions further include providing the first copy to a first scanning tool and the second copy to a second scanning tool. The actions further include receiving a first scanning tool output that identifies a first issue of the software target. The actions further include receiving a second scanning tool output that identifies a second issue of the software target. The actions further include determining that the first issue and the second issue are a same issue. The actions further include generating a combined issue of the first issue and the second issue. The actions further include outputting a notification that includes the combined issue.Type: GrantFiled: July 15, 2021Date of Patent: October 10, 2023Assignee: ZeroNorth, Inc.Inventors: Sergey Bobrov, William Tyler Wissemann, Aaron Phillip Wise
-
Patent number: 11775674Abstract: Disclosed herein are an apparatus and method for recommending privacy control. A privacy control server includes multiple common privacy control recommendation models learned based on personal information provision histories of multiple users, a user preference determination unit for generating at least one question item based on the multiple common privacy control recommendation models and determining a privacy control preference of a user based on a result of a user answer to the at least one question item, and a common privacy control recommendation model provision unit for providing a common privacy control recommendation model selected to match the privacy control preference of the user to the user.Type: GrantFiled: April 7, 2021Date of Patent: October 3, 2023Assignee: Electronics and Telecommunications Research InstituteInventors: Seung-Hyun Kim, Seok-Hyun Kim, Soo-Hyung Kim, Young-Sam Kim, Jong-Hyouk Noh, Kwan-Tae Cho, Sang-Rae Cho, Young-Seob Cho, Jin-Man Cho, Jung-Yeon Hwang
-
Patent number: 11777972Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value.Type: GrantFiled: July 29, 2021Date of Patent: October 3, 2023Assignee: Kount Inc.Inventor: Matthew Lewis Jones
-
Patent number: 11777931Abstract: A system includes an intelligent electronic device (IED) and a proxy device communicatively coupled to the TED via a Media Access Control (MACsec) communication link. The proxy device is configured to perform operations that include receiving permissions data, receiving a request to perform an action associated with the TED, determining whether the action is authorized based on the permissions data, and transmitting data to the TED via the MACsec communication link in response to determining that the action is authorized.Type: GrantFiled: October 8, 2020Date of Patent: October 3, 2023Assignee: Schweitzer Engineering Laboratories, Inc.Inventors: Colin Gordon, Dennis Gammel
-
Patent number: 11770409Abstract: A computer-implemented method, computer system, and computer program product for threat management. A set of features used by a machine learning model is collected by the computer system to determine a threat type for an access attempt when the access attempt is detected. A cluster is determined, by the machine learning model in the computer system, for the access attempt using the set of features, wherein the machine learning model implements clustering to determine the cluster for the access attempt, and wherein the cluster for the access attempt corresponds to the threat type for the access attempt. A set of actions is performed by the machine learning model in the computer system based on the threat type determined for the access attempt.Type: GrantFiled: January 4, 2021Date of Patent: September 26, 2023Assignee: International Business Machines CorporationInventors: William Wesley Beaver, Oner Sufri, Kevin Potter, Shirley M. Han, Zachary Ryan, Kyle Greeley, ChunHui Y. Higgins, Omar Hammami, Gustavo Adolfo Arismendi Camero, Ryan West, Emilio Fiallos
-
Patent number: 11770394Abstract: A network security system that analyzes data from network attacks to determine which attacks came from the same attacker, even if the attacker tries to disguise its identity by spreading attacks out over time and attacking from multiple IP addresses. Intrusion detection systems or firewalls may log data for each attack, such as the time of the attack, the type of attack, and the source and target addresses. Embodiments may augment this data with derived attributes that may profile the attacker's behavior. For example, some attackers may spread out attacks over time, but always attack on the same day of the week; some attackers may spread out attacks over different IP addresses, but these addresses may all be in the same country. The original and augmented data may be clustered using an algorithm such as DBSCAN, and each attacker may be identified with one of the resulting clusters.Type: GrantFiled: June 2, 2021Date of Patent: September 26, 2023Assignee: BULL SASInventors: Harshvardhan Parmar, Vinod Vasudevan, Rajat Mohanty
-
Patent number: 11770381Abstract: Access level and security group information can be updated for a data instance without having to take down or recycle the instance. A data instance created in a data environment will have at least one default security group. Permissions can be applied to the default security group to limit access via the data environment. A control security group can be created in a control environment and associated with the default security group. Permissions can be applied and updated with respect to the control security group without modifying the default security group, such that the data instance does not need to be recycled or otherwise made unavailable. Requests to perform actions with respect to the control security groups are made via the control environment, while allowing native access to the data via the data environment.Type: GrantFiled: October 2, 2020Date of Patent: September 26, 2023Assignee: Amazon Technologies, Inc.Inventor: Grant Alexander MacDonald McAlister
-
Patent number: 11765151Abstract: Methods and systems for verifying a user's identity on a computing device using two-factor authentication are described. More particularly, the system utilizes a personal identification number input by a user, together with one or more of a secure browsing feature, a device fingerprint, and a token generator to authenticate the user on the computer.Type: GrantFiled: January 25, 2022Date of Patent: September 19, 2023Assignee: United Services Automobile Association (USAA)Inventors: Debra Casillas, Richard Andrew Davey, Michael Frank Morris, Maland Keith Mortensen, John David Row, Thomas Buckingham
-
Patent number: 11763010Abstract: Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.Type: GrantFiled: January 31, 2022Date of Patent: September 19, 2023Assignee: Intel CorporationInventors: Ashwin Muppalla, Changliang Wang, Penne Lee
-
Patent number: 11757928Abstract: The techniques described in this disclosure provide resilient and reactive on-demand Distributed Denial-of-Service (DDoS) mitigation services using an exchange. For example, an exchange comprises a first virtual network for switching mixed traffic (including dirty (DDoS) traffic and clean (non-DDoS) traffic)) from one or more networks to one or more DDoS scrubbing centers; and a second virtual network for switching the clean traffic from the one or more DDoS scrubbing centers to the one or more networks, wherein the exchange is configured to receive the mixed traffic from the one or more networks and switch, using the first virtual network, the mixed traffic to a selected DDoS scrubbing center of the one or more DDoS scrubbing centers, and wherein the exchange is configured to receive the clean traffic from the selected DDoS scrubbing center and switch, using the second virtual network, the clean traffic to the one or more networks.Type: GrantFiled: September 1, 2020Date of Patent: September 12, 2023Assignee: EQUINIX, INC.Inventors: Juxiang Teng, Muhammad Durrani, Rupinder Singh Randhawa
-
Patent number: 11750564Abstract: Disclosed are systems and methods for securing a network including one or more network nodes connecting a plurality of network connected devices of the network. A method may include: receiving and temporarily storing a plurality of data packets in a shared buffer of a network node; receiving requests from a first processing engine and a second processing engine to access a temporarily stored data packet; generating a first pointer and a second pointer to the temporarily stored data packet, the second pointer being different from the first pointer while pointing to the same temporarily stored data packet; and enabling the first processing engine to use the generated first pointer to access the temporarily stored data packet and the second processing engine to use the generated second pointer to access the temporarily stored data packet.Type: GrantFiled: November 4, 2021Date of Patent: September 5, 2023Assignee: LOOKINGGLASS CYBER SOLUTIONS, INC.Inventors: Paolo Fabio Zaino, Bryan Wesley Brown
-
Patent number: 11750660Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: GrantFiled: September 9, 2021Date of Patent: September 5, 2023Assignee: VMware, INC.Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Patent number: 11743278Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: GrantFiled: December 15, 2021Date of Patent: August 29, 2023Assignee: ServiceNow, Inc.Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir