Patents Examined by Evans Desrosiers
-
Patent number: 11831779Abstract: Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger.Type: GrantFiled: July 18, 2022Date of Patent: November 28, 2023Assignee: PAYPAL, INC.Inventors: Meethil Vijay Yadav, Bradley Wardman, Braden Christopher Ericson
-
Patent number: 11829468Abstract: A neural network having one or more public parts and one or more confidential parts is trained to perform a primary task. A deployment instantiation of the neural network is trained based on optimal performance of the primary task, and based on sub-optimal performance of the primary task conditioned on the confidential parts of the deployment instantiation being inaccessible. An adversary instantiation of the neural network is trained based on optimal performance of the primary task conditioned on the public parts being identical for the deployment instantiation and for the adversary instantiation, and conditioned on the confidential parts of the deployment instantiation being inaccessible. The training of the deployment instantiation and the training of the adversary instantiation are based on a plurality of training data samples, and are performed iteratively by alternating between the training of the deployment instantiation and the training of the adversary instantiation.Type: GrantFiled: December 18, 2020Date of Patent: November 28, 2023Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (publ)Inventors: Jakob Sternby, Björn Johansson, Michael Liljenstam
-
Patent number: 11822679Abstract: The host computer securitization architecture, which comprises: an offline source server, an offline provisioning server configured to connect with a portable mobile securitization server via a wired communication, an administration server configured to monitor and interact with at least one portable mobile securitization server, at least one portable mobile securitization server configured to connect via a wired communication to a host computer, said portable mobile securitization server comprising: a connector to mechanically connect and establish a removable wired communication between the mobile server and the host computer, a first wired bidirectional communicator with the host computer, a second of bidirectional communicator with a data storage peripheral or a data network and a unit securing the communication between the host computer and the data storage mobile server or the data network, this communication being established between the first and the second communicator, a blockchain comprisingType: GrantFiled: February 7, 2022Date of Patent: November 21, 2023Inventor: Vladimir Mickael Leal Monteiro
-
Patent number: 11818105Abstract: Systems and methods for encoded communications are disclosed. In some embodiments, a server system may be configured to receive a communication from a user interface at an encoded communication module that includes an artificial intelligence based natural language processing module, determine whether the received communication is an encoded communication, decode the encoded communication to generate a financial query when it is determined that the received communication is an encoded communication, retrieve financial data associated with the user, determine an answer to the financial query based on the retrieved financial data, encode the determined answer to generate an encoded responsive communication, and transmit the generated encoded responsive communication to the user interface for providing to a user of the user interface.Type: GrantFiled: May 21, 2021Date of Patent: November 14, 2023Assignee: Capital One Services, LLCInventors: Michael Mossoba, Joshua Edwards, Salik Shah
-
Patent number: 11818248Abstract: A device includes an encoder and a decoder using physically unclonable functions. The encoder includes a first generator for generating a first hash value based on first input data; a first exclusive OR (XOR) operator for performing an XOR operation between second input data and a cryptographic value to generate a first operation value; a second XOR operator for performing an XOR operation between the first hash value and the first operation value to generate a second operation value; a second generator for generating a second hash value based on the first operation value; and an encoding component for encoding the first input data, the second operation value and the second hash value to output first to third encoded data. The decoder contains the same generators and XOR operators as the encoder.Type: GrantFiled: June 2, 2022Date of Patent: November 14, 2023Assignee: SK hynix Inc.Inventors: Siarhei Zalivaka, Alexander Ivaniuk
-
Patent number: 11816211Abstract: An apparatus and method for responding to an invalid state occurrence encountered during execution of a third-party application program is included. The apparatus performing the method which includes registering a trap signal handler with a kernel of an operating system. The method also including intercepting calls from the third-party application program to the operating system and processing an exception signal corresponding to the invalid state to generate a response. The response including performing a signal reporting process.Type: GrantFiled: July 29, 2021Date of Patent: November 14, 2023Assignee: RUNSAFE SECURITY, INC.Inventors: Shane Fry, Brent Bessemer
-
Patent number: 11804288Abstract: A computer-implemented method includes producing information that characterizes a group of individuals from a set of private data representing characteristics of the individuals. The identity of the individuals is unattainable from the produced information. The method also includes providing the produced information to report the characteristics of the group.Type: GrantFiled: October 1, 2020Date of Patent: October 31, 2023Assignee: Vigilytics LLCInventor: Andrew L. Paris, III
-
Patent number: 11804952Abstract: A system and method for the analysis of log data is presented. The system uses SuperMinHash based locality sensitive hash signatures to describe the similarity between log lines. Signatures are created for incoming log lines and stored in signature indexes. Later similarity queries use those indexes to improve the query performance. The SuperMinHash algorithm uses a two staged approach to determine signature values, one stage uses a first random number to calculate the index of the signature value that is to update. The two staged approach improves the accuracy of the produced similarity estimation data for small sized signatures. The two staged approach may further be used to produce random numbers that are related, e.g. each created random number may be larger than its predecessors. This relation is used to optimize the algorithm by determining and terminating when further created random numbers have no influence on the created signature.Type: GrantFiled: August 12, 2022Date of Patent: October 31, 2023Assignee: Dynatrace LLCInventors: Otmar Ertl, Edyta Kalka
-
Patent number: 11805413Abstract: A medical device of a medical system is configured for communicating with an external programmer over a wireless communications link. The medical device comprises a wireless communications module configured for receiving a first unencrypted version of a random number and a first encrypted version of the random number from the external programmer over the wireless communications link. The medical device further comprises control circuitry configured for performing an authentication procedure on the external programmer based on the first unencrypted version of the random number and the first encrypted version of the random number, and preventing the external programmer from commanding the medical device to perform an action unless the authentication procedure is successful.Type: GrantFiled: May 20, 2022Date of Patent: October 31, 2023Assignee: THE ALFRED E. MANN FOUNDATION FOR SCIENTIC RESEARCHInventors: Saul Rodriguez, Dianna (Dan) Han, Emil Istoc
-
Patent number: 11799844Abstract: Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance characteristics of the secure network. A sender can receive the policy information and transmit packets to a receiver if the policy information is complied with by the potential packet transmission.Type: GrantFiled: November 16, 2020Date of Patent: October 24, 2023Assignee: APPLIED INVENTION, LLCInventors: W. Daniel Hillis, Mathias L. Kolehmainen
-
Patent number: 11797671Abstract: A cyber threat intelligence (CTI) gateway device may receive rules for filtering TCP/IP packet communications events that are configured to cause the CTI gateway device to identify communications corresponding to indicators, signatures, and behavioral patterns of network threats. The CTI gateway device may receive packets that compose endpoint-to-endpoint communication events and, for each event, may determine that the event corresponds to criteria specified by a filtering rule. The criteria may correspond to one or more of the network threat indicators, signatures, and behavioral patterns. The CTI gateway may create a log of the threat event and forward the threat event log to a task queue managed by a cyberanalysis workflow application. Human cyberanalysts use the cyberanalysis workflow application to service the task queue by removing the task at the front of the queue, investigating the threat event, and deciding whether the event is a reportable finding that should be reported to the proper authorities.Type: GrantFiled: December 16, 2022Date of Patent: October 24, 2023Assignee: Centripetal Networks, LLCInventors: Sean Moore, Jonathan R. Rogers, Jess P. Parnell, Zachary Ehnerd
-
Patent number: 11790073Abstract: A vibration signal-based smartwatch authentication method includes generating incremental vibration signals using a vibration motor in a smartwatch; performing frequency band-based hierarchical endpoint segmentation to obtain vibration signals at a plurality of frequency bands; extracting frequency-domain features for the vibration signals at the plurality of frequency bands; training a dynamic time warping model by taking the vibration signals at the plurality of frequency bands as a training data set, training a nearest neighbor model by taking the extracted frequency-domain features as training data; collecting to-be-authenticated vibration signals which are processed to serve as test data signals; discriminating similarities between the test data signals and corresponding training data signals through the dynamic time warping model, giving a classification result through the nearest neighbor model, performing weighted calculation on a discrimination result of the dynamic time warping model and a discriminType: GrantFiled: September 29, 2020Date of Patent: October 17, 2023Assignee: SHENZHEN UNIVERSITYInventors: Kaishun Wu, Yandao Huang, Lin Chen
-
Patent number: 11792000Abstract: An example method to obtain process data associated with a process control system received from a field device includes identifying, at a computing device, associated data and a payload included in the data packet, the associated data including a source bit, determining, at the computing device, a type of connection between the field device and the computing device based on the source bit, determining, at the computing device, an encryption key identifier and an initialization vector based on an auxiliary data packet received prior to the data packet, generating, at the computing device, a nonce value based on the source bit and the initialization vector, the nonce value indicative of an input to a data encryption algorithm used by the field device to encrypt the payload, and extracting, at the computing device, the process data associated with the process control system from the payload.Type: GrantFiled: May 23, 2022Date of Patent: October 17, 2023Assignee: FISHER CONTROLS INTERNATIONAL LLCInventor: Kenneth William Junk
-
Patent number: 11785455Abstract: [Object] To provide a mechanism that makes it possible to avoid inconveniences when the authentication process has abnormality. [Solution] A communication device comprising a control section configured to control each of a first process that achieves a prescribed function, and a second process that authenticates another communication device and that is different from the first process, wherein the control section performs control in such a manner that the second process is not performed in a case where abnormality is recognized.Type: GrantFiled: September 26, 2020Date of Patent: October 10, 2023Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventors: Masateru Furuta, Shigenori Nitta, Yuki Kono, Yosuke Ohashi
-
Patent number: 11785006Abstract: A communication device achieves inter-device authentication with high accuracy and high responsiveness. The communication device includes a control section configured to execute a process related to transmission or reception of a first authentication signal and a second authentication signal that are necessary for a first authentication process for authentication of another communication device. The control section starts execution of a second authentication process for different authentication from the first authentication process, after transmission or reception of the first authentication signal and before transmission or reception of the second authentication signal.Type: GrantFiled: November 30, 2020Date of Patent: October 10, 2023Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventors: Yosuke Ohashi, Masateru Furuta, Yuki Kono, Shigenori Nitta
-
Patent number: 11783051Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for normalizing, compressing, and correlating vulnerabilities are disclosed. In one aspect, a method includes the actions of generating a first and second copy of a software target. The actions further include providing the first copy to a first scanning tool and the second copy to a second scanning tool. The actions further include receiving a first scanning tool output that identifies a first issue of the software target. The actions further include receiving a second scanning tool output that identifies a second issue of the software target. The actions further include determining that the first issue and the second issue are a same issue. The actions further include generating a combined issue of the first issue and the second issue. The actions further include outputting a notification that includes the combined issue.Type: GrantFiled: July 15, 2021Date of Patent: October 10, 2023Assignee: ZeroNorth, Inc.Inventors: Sergey Bobrov, William Tyler Wissemann, Aaron Phillip Wise
-
Patent number: 11777931Abstract: A system includes an intelligent electronic device (IED) and a proxy device communicatively coupled to the TED via a Media Access Control (MACsec) communication link. The proxy device is configured to perform operations that include receiving permissions data, receiving a request to perform an action associated with the TED, determining whether the action is authorized based on the permissions data, and transmitting data to the TED via the MACsec communication link in response to determining that the action is authorized.Type: GrantFiled: October 8, 2020Date of Patent: October 3, 2023Assignee: Schweitzer Engineering Laboratories, Inc.Inventors: Colin Gordon, Dennis Gammel
-
Patent number: 11777972Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value.Type: GrantFiled: July 29, 2021Date of Patent: October 3, 2023Assignee: Kount Inc.Inventor: Matthew Lewis Jones
-
Patent number: 11775674Abstract: Disclosed herein are an apparatus and method for recommending privacy control. A privacy control server includes multiple common privacy control recommendation models learned based on personal information provision histories of multiple users, a user preference determination unit for generating at least one question item based on the multiple common privacy control recommendation models and determining a privacy control preference of a user based on a result of a user answer to the at least one question item, and a common privacy control recommendation model provision unit for providing a common privacy control recommendation model selected to match the privacy control preference of the user to the user.Type: GrantFiled: April 7, 2021Date of Patent: October 3, 2023Assignee: Electronics and Telecommunications Research InstituteInventors: Seung-Hyun Kim, Seok-Hyun Kim, Soo-Hyung Kim, Young-Sam Kim, Jong-Hyouk Noh, Kwan-Tae Cho, Sang-Rae Cho, Young-Seob Cho, Jin-Man Cho, Jung-Yeon Hwang
-
Patent number: 11770394Abstract: A network security system that analyzes data from network attacks to determine which attacks came from the same attacker, even if the attacker tries to disguise its identity by spreading attacks out over time and attacking from multiple IP addresses. Intrusion detection systems or firewalls may log data for each attack, such as the time of the attack, the type of attack, and the source and target addresses. Embodiments may augment this data with derived attributes that may profile the attacker's behavior. For example, some attackers may spread out attacks over time, but always attack on the same day of the week; some attackers may spread out attacks over different IP addresses, but these addresses may all be in the same country. The original and augmented data may be clustered using an algorithm such as DBSCAN, and each attacker may be identified with one of the resulting clusters.Type: GrantFiled: June 2, 2021Date of Patent: September 26, 2023Assignee: BULL SASInventors: Harshvardhan Parmar, Vinod Vasudevan, Rajat Mohanty