Patents Examined by Evans Desrosiers
-
Patent number: 11966471Abstract: Secure circuitry detects a latency between when an interrupt occurred and when the interrupt was released in correspondence with handling of the interrupt. The secure circuitry detects an interval between consecutive occurrences of the interrupt. In response to either or both of the latency exceeding a latency limit and the interval exceeding an interval limit, the secure circuitry performs an action.Type: GrantFiled: September 30, 2021Date of Patent: April 23, 2024Assignee: Hewlett-Packard Development Company, L.P.Inventors: Gary T. Brown, Vincent C. Skurdal, Marvin Nelson
-
Patent number: 11968224Abstract: A method, a computer system, and a computer program product for security risk analysis is provided. Embodiments of the present invention may include collecting operational data. Embodiments of the present invention may include building pipelines. Embodiments of the present invention may include localizing security issues using the operational data on an unsupervised model. Embodiments of the present invention may include constructing a semantic graph using shift-left data. Embodiments of the present invention may include constructing a mapping between the operational data and the shift-left data. Embodiments of the present invention may include clustering collected datasets. Embodiments of the present invention may include creating an active learning cycle using ground truth.Type: GrantFiled: March 22, 2021Date of Patent: April 23, 2024Assignee: International Business Machines CorporationInventors: Jinho Hwang, Larisa Shwartz, Raghav Batta, Michael Elton Nidd, Jakub Krchak
-
Patent number: 11943202Abstract: A method including receiving, at a VPN server from a user device during an established VPN connection between the VPN server and the user device, a data request for the VPN server to retrieve data of interest from a host device; utilizing, by the VPN server during the established VPN connection, a first exit IP address to transmit a query to the host device for retrieving the data of interest; determining, by the VPN server based on transmitting the query, that the first exit IP address is blocked by the host device; and transmitting, by the VPN server during the established VPN connection and based on determining that the first exit IP address is blocked, the data request to a secondary server to enable retransmission of the query to the host device by utilizing a second exit IP address is disclosed. Various other aspects are contemplated.Type: GrantFiled: September 15, 2022Date of Patent: March 26, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, Justinas Tubis
-
Patent number: 11936628Abstract: A method, system, and computer program product to provide a synthetic device ID for a device is provided herein. The method includes receiving a request from the device to obtain a service from a vendor, where the device is associated with an internal device ID. The method further includes generating the synthetic device ID for the device and associating the device, the internal device ID, the vendor, and the synthetic device ID. The method also includes transmitting the synthetic device ID to the vendor, and internally tracking the request based on the association.Type: GrantFiled: October 25, 2021Date of Patent: March 19, 2024Assignee: CSC Holdings, LLCInventors: Heitor J. Almeida, Jaison Antony, John Markowski, Peter Caramanica
-
Patent number: 11934948Abstract: An adaptive deception system is provided for defending a production network against cyber-attacks utilizing deception devices on the production network. The adaptive deception system includes a deception management system. The deception management system includes monitors for making observations regarding the deception devices including observations of an attacker's interaction with the deception device. The adaptive deception system further incudes a control system having sensors that receive the observations of the deception management system. The control system is configured to provide an adaption specification in response to the observations made. Actuators of the control system are activated in order to provide the adaption specification to the deception management system where monitors of the deception management system implement the specified adaption. Implementation of the adaption adapts the properties of the deception devices to interfere with the cyber-attacker.Type: GrantFiled: July 15, 2020Date of Patent: March 19, 2024Inventors: Kimberly J Ferguson-Walter, Sunny James Fugate
-
Patent number: 11928192Abstract: A host device, a storage device, and a method employ a vendor unique command (VUC) authentication system. The storage device includes a memory and a memory controller which includes a VUC authentication module and controls the memory. The VUC authentication module transmits first memory information about the memory to the host device, receives from the host device a one-time password generated by the first memory information, verifies the one-time password, and receives a vendor unique command from the host device when the one-time password is correct.Type: GrantFiled: July 29, 2022Date of Patent: March 12, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Bo Hyung Kim, Jang Hwan Kim, Moon Wook Oh, Da Woon Jung
-
Authenticating data associated with a data intake and query system using a distributed ledger system
Patent number: 11921873Abstract: Systems and methods are disclosed for authenticating a chunk of data identified in a query received by a data intake and query system. The data intake and query system receives a query that identifies a set of data and manner for processing the set of data, and identifies a chunk of data that is part of the set of data. The system generates a content identifier, such as a hash, of the chunk of data. The system further authenticates the chunk of data based on the generated content identifier and a content identifier stored by a distributed ledger system.Type: GrantFiled: July 12, 2021Date of Patent: March 5, 2024Assignee: Splunk Inc.Inventors: Nathaniel Gerard McKervey, Ryan Russell Moore -
Patent number: 11914701Abstract: To facilitate improved email and device security, embodiments of systems and methods include intercepting, by a processor associated with an entity, an internet request, where the internet request is produced by a link received in an email at a first computing device. The processor determines that the link is externally bound relative to an entity network. The processor determines an existence of a sandbox environment instance in a set of existing sandbox environment instances. The processor routes the link through the sandbox environment instance. The processor updates the sandbox log in the database based on the sandbox environment instance and the link. The processor causes to display on a screen of the first computing device a user interface for interacting with the link in the sandbox environment instance, and the processor logs activities associated with interacting with the link in a security log.Type: GrantFiled: August 8, 2022Date of Patent: February 27, 2024Assignee: Capital One Services, LLCInventors: Vincent Pham, Joseph Boayue, Lee Adcock, Geeta Shyamala, Ana Cruz, Christopher Camenares, Nahid Farhady Ghalaty
-
Patent number: 11917066Abstract: In modern object-oriented programming, programs are written using typed objects like classes and instances that interact with one another via rules of composition, inheritance, encapsulation, message passing, and polymorphism. Some embodiments described herein can include a method for tokenizing such modern objects that maintains their interactive properties on a blockchain. It improves upon, and diverges from, the smart contract model used mainly on account-based blockchains today to create a generally-programmable token system that is native to UTXO-based blockchains, where individually-owned software objects interact with other software objects owned by other individuals. These tokenized objects are called jigs. Jigs, an abstraction like objects, enable applications to build their own digital assets that interact with other jigs from other applications. Jogs enable users to own their data as tokens and use their data independent of any one application's complete control.Type: GrantFiled: June 1, 2022Date of Patent: February 27, 2024Assignee: RUN INTERACTIVE, INC.Inventor: Brenton John Gunning
-
Patent number: 11910193Abstract: Methods and systems of segmenting computing devices in a wireless network having an access point broadcasting in a single domain are described. In an exemplary method, a request to join the wireless network is received from a computing device. The request is associated with an identifier. When the identifier is not associated with a virtual network within the wireless network, a virtual network is configured within the wireless network and the identifier is associated thereto and the computing device is assigned thereto. When the identifier is associated with an existing virtual network within the wireless network, the computing device is assigned to the existing virtual network.Type: GrantFiled: August 16, 2022Date of Patent: February 20, 2024Assignee: BlackBerry LimitedInventors: James Randolph Winter Lepp, Stephen McCann, Michael Peter Montemurro
-
Patent number: 11902271Abstract: Two-way secure channels are provided between multiple services across service groups, where the certification is performed by a certificate authority associated with one of the service groups. One method comprises a first service providing a first handshake communication with a first token to a second service, wherein the first service obtains the first token by authenticating with an identity and access management service having a first certificate signed by a certificate authority, wherein the first handshake communication succeeds when the second service has a second certificate signed by the certificate authority, and wherein the second service obtains a second token by authenticating with the identity and access management service. The first service receives a second handshake communication from the second service with the second token.Type: GrantFiled: April 7, 2021Date of Patent: February 13, 2024Assignee: EMC IP Holding Company LLCInventors: Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
-
Patent number: 11902601Abstract: Disclosed are examples for providing functions to receive a media file to be stored in a media repository. In the examples, a location in the media repository may be assigned to the media file. A media file address in a blockchain platform may be assigned to the media file. Metadata including the assigned location in the media repository and the assigned media file address in the blockchain platform may be added to the media file. A media file hash value may be generated by applying a hash function to the media file including the metadata. The media file hash value may be included in a message and uploaded to the assigned media file address in the blockchain platform as a transaction in the blockchain. An indication that the media file is uploaded to the media repository may be delivered to a subscriber device from which the media file was received.Type: GrantFiled: November 2, 2022Date of Patent: February 13, 2024Assignee: Capital One Services, LLCInventors: Kenneth Taylor, Austin Grant Walters, Jeremy Edward Goodsitt, Fardin Abdi Taghi Abad, Reza Farivar, Vincent Pham, Anh Truong
-
Patent number: 11886582Abstract: A method for assessing a cybersecurity risk of a software object includes generating an abstract syntax tree (AST) for a software object, and determining that the AST is insufficient to identify, to a specified confidence level, a cybersecurity risk of the software object. In response to determining that the AST is insufficient to identify the cybersecurity risk of the software object, a graph convolutional neural network (gCNN) is executed, based on the AST, to produce a set of features for the AST and to produce a probability of maliciousness of the software object based on the set of features. A signal representing an alert is sent, based on the probability of maliciousness, if the probability of maliciousness exceeds a pre-defined threshold.Type: GrantFiled: December 17, 2020Date of Patent: January 30, 2024Assignee: GOOGLE LLCInventor: Ahmed Abdallah
-
Patent number: 11886615Abstract: An example operation includes one or more of encrypting, by a transport, received data based on a first biometric associated with an occupant, unencrypting, by the transport, the encrypted data, based on a verification of a second biometric, wherein the second biometric is a continuum of the first biometric, and providing, by the transport, the unencrypted data to the occupant.Type: GrantFiled: October 28, 2022Date of Patent: January 30, 2024Assignee: TOYOTA MOTOR NORTH AMERICA, INC.Inventor: Stephen Paul McFarland, Jr.
-
Patent number: 11886596Abstract: Preliminary program analysis of an executable may be performed. A security vulnerability level of a portion of the executable may be determined based on the preliminary program analysis. The security vulnerability level of the portion may be compared to a security vulnerability threshold. The precision of runtime monitoring of the portion may be tuned based on the comparison.Type: GrantFiled: March 3, 2020Date of Patent: January 30, 2024Assignee: International Business Machines CorporationInventors: Paul Ionescu, Iosif V. Onut, Omer Tripp
-
Patent number: 11880448Abstract: A computer-implemented method of user authentication is provided. The method comprises combining, by a computer system, a user recurrent neural network with a system recurrent neural network to form a unique combined recurrent neural network. The user recurrent neural network is configured to generate a unique user key, and the system recurrent neural network is configured to generate a system key. The computer system inputs a predetermined input into the combined recurrent neural network, and the combined recurrent neural network generates a unique combined key from the input, wherein the combined key differs from both the user key and system key. The computer system then associates the combined key with a unique access authorization to authenticate a user.Type: GrantFiled: March 9, 2021Date of Patent: January 23, 2024Assignee: National Technology & Engineering Solutions of Sandia, LLCInventors: James Bradley Aimone, Jason Hamlet, Tu-Thach Quach
-
Patent number: 11874925Abstract: The present disclosure provides a data processing method for coping with ransomware, which encrypts data with a malicious intent and blocks an access to the data, to protect the data, and a program for executing the data processing method. In a computer apparatus that loads an application program stored in a memory onto a processor and carries out a predetermined processing according to the application program, on an operating system (OS) kernel which controls an access of the application program to hardware components of the computer apparatus, the processor reads the data stored in the memory, performs the predetermined processing at the request of the application program, determines whether a ransomware attack occurred for the data before storing the processed data back to the memory, and stores the processed data to the memory according to a determination result, thereby preventing the damage caused by the ransomware attack.Type: GrantFiled: September 23, 2022Date of Patent: January 16, 2024Assignee: SECUVE CO., LTD.Inventor: Ki Yoong Hong
-
Patent number: 11876789Abstract: A gateway device between a first and second communication network outside the gateway device handles communication between a first device in the first network and a second device in the second network. When the gateway receives a communication request from the first device, directed to the second device, for performing a first cryptographic data communication protocol, the gateway determines whether the first cryptographic data communication protocol is registered as unsafe in the gateway device, and/or registered as safe, in particular whether it is safe against key reconstruction by a quantum computer. When the first cryptographic data communication protocol is not registered as unsafe in the gateway device, and/or registered as safe, the gateway device forwards messages exchanged as part of execution of the first cryptographic data communication protocol between the first and second device.Type: GrantFiled: May 25, 2020Date of Patent: January 16, 2024Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNOInventors: Nicolaas Leonardus Maria Van Adrichem, Maran Paula Petronella Van Heesch, Piotr Wojciech Zuraniewski, Jeffrey Jermain Panneman
-
Patent number: 11871224Abstract: A medical device of a medical system is configured for communicating with an external programmer over a wireless communications link. The medical device comprises a wireless communications module configured for receiving a first unencrypted version of a random number and a first encrypted version of the random number from the external programmer over the wireless communications link. The medical device further comprises control circuitry configured for performing an authentication procedure on the external programmer based on the first unencrypted version of the random number and the first encrypted version of the random number, and preventing the external programmer from commanding the medical device to perform an action unless the authentication procedure is successful.Type: GrantFiled: May 21, 2022Date of Patent: January 9, 2024Assignee: THE ALFRED E. MANN FOUNDATION FOR SCIENTIFIC RESEARCHInventors: Saul Rodriguez, Dianna (Dan) Han, Emil Istoc
-
Patent number: 11870909Abstract: Presented here is a system to reduce the computational cost of validating transactions recorded in a block chain by at least 500 million. In one embodiment, no proof of work is required, and the validity of the data stored in the block chain is guaranteed using a combination of private identification associated with one or more authorized users and a hash value propagated from each block to the subsequent blocks in the block chain. In another embodiment, the proof of work required is designed to be mildly computationally expensive, for example, at least 500 million times cheaper than the proof of work required to perform a bitcoin verification. The proof of work required can be increased or decreased based on various factors such as an expected time to add a new block to the block chain and/or current processor performance.Type: GrantFiled: April 29, 2021Date of Patent: January 9, 2024Assignee: Certinia Inc.Inventor: Raphael Bres