Patents Examined by Fahimeh Mohammadi
-
Patent number: 11204989Abstract: A system and method for multifactor authentication. The method includes receiving a passthought brainprint and a training 3D pattern. The method also includes calculating a variance between the training 3D pattern and a passthought 3D pattern, and generating an error tolerance for the passthought 3D pattern based on the calculated variance between the training 3D pattern and the passthought 3D pattern. Further, the method includes storing the passthought 3D pattern and the passthought brainprint in a neural profile as a passthought for a secure area.Type: GrantFiled: April 27, 2018Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Simon J. Brady, Barry Hollywood, Clea A. Zolotow, John V. Delaney
-
Patent number: 11188655Abstract: Examples disclosed herein relate to scanning an IT component for compliance. In an example, events related to an IT component and past compliance scans performed on the IT component may be analyzed. Based on an analysis of the events related to the IT component and the past compliance scans performed on the IT component, a determination may be made whether a compliance scan is to be performed on the IT component.Type: GrantFiled: May 5, 2017Date of Patent: November 30, 2021Assignee: Micro Focus LLCInventor: Sachin Johar
-
Patent number: 11178158Abstract: Aspects of the present disclosure address systems, methods, and devices for enabling secure communication between electronic control units (ECUs) in a vehicle. The system may include a first and second ECU from a plurality of ECUs in the vehicle. The first ECU is to enable secure communication between the plurality of ECUs by performing operations that include provisioning the second ECU with authentication data for authenticating messages exchanged with a third ECU and provisioning the third ECU with a set of security keys to enable the third ECU to securely exchange messages with the second ECU. The second ECU receives, from the third ECU, a secure message that is cryptographically signed using a security key from the set of security keys provisioned to the third ECU, and the second ECU authenticates the secure message by comparing the authentication data with an authentication signal.Type: GrantFiled: July 5, 2018Date of Patent: November 16, 2021Assignee: NAGRAVISION S.A.Inventors: Christophe Buffard, Sanjeev Sehgal
-
Patent number: 11176242Abstract: A pop-up blocker application detects and remediates malicious pop-up loops. The pop-up blocker application intercepts a call from a web page for initiating a pop-up browser window in a web browser. The pop-up blocker application updates a count of pop-up initiating calls associated with the web page occurring within a pre-defined time window. The updated count is compared to a threshold to determine whether the count meets a threshold indicative of a malicious pop-up loop. Responsive to the count meeting the threshold, the pop-up blocker applications takes a remedial action, such as navigating away from the web page.Type: GrantFiled: November 28, 2018Date of Patent: November 16, 2021Assignee: Malwarebytes Inc.Inventor: Douglas Stuart Swanson
-
Patent number: 11170118Abstract: A technology solution, including a method, a system, and a computer program for receiving, processing, and managing access requests in a network system, including autonomously processing and managing access requests to one or more information technology (IT) domains in the network system. The technology solution can include receiving an access request for the computing resource at the node, determining a service type and one or more validation criteria from information included in the access request, comparing the service type and the one or more validation criteria to a validation table, and automatically creating, renewing, modifying or revoking access privileges of a network user at the computing resource at the node without any user intervention.Type: GrantFiled: October 21, 2019Date of Patent: November 9, 2021Assignee: Saudi Arabian Oil CompanyInventors: M Weam Al-Shanqity, Mohamed Faizal Kooliyattayil Saidali, Eman A Al Abdulraheem, Mohammad H Fraihat
-
Patent number: 11153309Abstract: Concepts and technologies are disclosed herein for multifactor authentication for Internet-of-things devices. An access request can be received from an Internet-of-things device. The access request can include identifying information associated with the Internet-of-things device and a certificate. The certificate can be validated and a stored version of the identifying information can be obtained. If the stored version of the identifying information is determined to match the identifying information included with the access request, access to a resource can be allowed.Type: GrantFiled: March 13, 2018Date of Patent: October 19, 2021Assignees: AT&T Mobility II LLC, AT&T Intellectual Property II, L.P.Inventors: Russell Vegh, Senthil Ramakrishnan, Roger Mahler
-
Patent number: 11082839Abstract: Systems, methods, and non-transitory computer-readable storage media for using mobile network authentication factors to authenticate a mobile device.Type: GrantFiled: August 23, 2018Date of Patent: August 3, 2021Assignee: Tevnos LLCInventors: Stuart Alexander Jacobson, Joshua Goldbard
-
Patent number: 11070506Abstract: Examples described herein include systems and methods for providing push notifications to a third-party application executing on a client device. An example can include encrypting user credentials, generating a callback Uniform Resource Locator (“URL”) with at least a portion of the encrypted credentials embedded into the URL, and requesting notifications from an email service to be provided at the callback URL. Upon receiving a notification at the callback URL, a system component can decrypt the credentials within the URL using a private key and log into the email account using those decrypted credentials. The system component can then generate a push notification based on any changes found in the email account and cause the notification to be delivered to the third-party application on the client device.Type: GrantFiled: January 10, 2018Date of Patent: July 20, 2021Assignee: VMware, Inc.Inventors: Ian Ragsdale, Neal Foster, Evan Hurst, Ruben Nieves
-
Patent number: 11063767Abstract: An apparatus serves as a node device included in a distributed data sharing network, and shares, by using a blockchain, a piece of event information related to an event generated in a terminal, among node devices included in the distributed data sharing network, where the blockchain is a continuously growing list of blocks which are linked and secured using cryptography. The apparatus generates a piece of event data including the piece of event information related to the event, and causes the generated piece of event data to be stored in one of the node devices included in the distributed data sharing network.Type: GrantFiled: October 27, 2017Date of Patent: July 13, 2021Assignee: FUJITSU LIMITEDInventors: Satoshi Imai, Toru Katagiri, Motoyoshi Sekiya
-
Patent number: 11042610Abstract: Embodiments herein describe techniques for validating binary files used to configure a hardware card in a computing system. In one embodiment, the hardware card (e.g., an FPGA) includes programmable logic which the binary file can configure to perform a specialized function. In one embodiment, multiple users can configure the hardware card to perform their specialized tasks. For example, the computing system may be server on the cloud that hosts multiple VMs or a shared workstation. Permitting multiple users to directly configure and use the hardware card may present a security risk. To mitigate this risk, the embodiments herein describe techniques for validating encrypted binary files.Type: GrantFiled: October 4, 2017Date of Patent: June 22, 2021Assignee: XILINX, INC.Inventors: Hem C. Neema, Sonal Santan, Bin Ochotta
-
Patent number: 11036855Abstract: A method includes obtaining a given web page, parsing the given web page to identify one or more frame tags for one or more inline frames of the given web page, and extracting a set of features of a given inline frame from a given one of the identified frame tags in the given web page, the extracted set of features comprising one or more style features, one or more destination features and one or more context features of the given identified frame tag. The method also includes classifying the given inline frame as one of a malicious frame type and a benign frame type utilizing at least one model and at least a portion of the extracted set of features, and controlling access by one or more client devices associated with an enterprise to the given web page responsive to classifying the given inline frame as the malicious frame type.Type: GrantFiled: September 28, 2018Date of Patent: June 15, 2021Assignee: EMC IP Holding Company LLCInventors: Zhou Li, Kevin Bowers, Martin Rosa, Raymond Carney, Ke Tian
-
Patent number: 11038890Abstract: A method, non-transitory computer readable medium and apparatus for controlling access of a custom browser function are disclosed. For example, the method includes a processor that sends a request to a third party website, receives a hypertext markup language code and a browser script, renders the hypertext markup language code, detects that the browser script is trying to access a custom browser function, compares one or more parameters associated with the custom browser function to an access control list to control an access of the custom browser function, and executes the custom browser function when a match of the one or more parameters is found in the access control list.Type: GrantFiled: October 27, 2019Date of Patent: June 15, 2021Assignee: THE DIRECTV GROUP, INC.Inventors: Rudy Ruiz, Mark T. Thorson
-
Patent number: 11025438Abstract: Implementations of the present disclosure include identifying, by a relay that is communicatively linked with a first blockchain instance and a second blockchain instance in a unified blockchain network, a blockchain domain name of a first blockchain instance; identifying a blockchain domain name of the second blockchain instance; receiving, from a node of the first blockchain instance, an access request for accessing the second blockchain instance, wherein the access request including the blockchain domain name of the second blockchain instance; identifying a chain identifier of the second blockchain instance based on the blockchain domain name of the second blockchain instance, wherein the chain identifier of the second blockchain instance indicates a blockchain network configuration of the second blockchain instance; and providing access to the second blockchain instance for the first blockchain instance based on the blockchain network configuration indicated by the chain identifier of the second blockchaiType: GrantFiled: May 20, 2020Date of Patent: June 1, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Honglin Qiu
-
Patent number: 11012240Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.Type: GrantFiled: June 7, 2018Date of Patent: May 18, 2021Assignee: Neustar, Inc.Inventor: Steven Todd Kirsch
-
Patent number: 10965696Abstract: Techniques are provided for evaluating anomaly detection algorithms using impersonation data derived from user transaction data. An exemplary method comprises obtaining transaction data of a given enterprise organization comprising transactions of a plurality of users; generating impersonation data by modifying one or more features of a subset of the transaction data of the given enterprise organization; classifying (i) at least a portion of the transaction data of the given enterprise organization, and (ii) at least a portion of the impersonation data using the anomaly detection algorithm of the given enterprise organization, wherein records of the impersonation data comprise a known classification; and evaluating a performance of the anomaly detection algorithm of the given enterprise organization by comparing the classification of records of the impersonation data by the anomaly detection algorithm with the known classification.Type: GrantFiled: October 30, 2017Date of Patent: March 30, 2021Assignee: EMC IP Holding Company LLCInventors: Shay Amram, Alex Zaslavsky
-
Patent number: 10958438Abstract: A method for blockchain-based data verification is provided. The method includes: obtaining target data submitted by a data submitter, wherein a first data digest of the target data is recorded in a blockchain; computing a second data digest of the target data; determining whether the second data digest matches the first data digest of the target data recorded in the blockchain; and determining that the target data submitted by the data submitter is valid in response to determining that the second data digest matches the first data digest of the target data recorded in the blockchain.Type: GrantFiled: May 14, 2020Date of Patent: March 23, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Fuqiang Li, Linqing Wang, Hong Zhang, Haitao Jiang, Xinyu Weng, Zongru Zhan
-
Patent number: 10958691Abstract: Embodiments of the present invention provide an automated network security system for dynamically managing network security rules. The system uses a cognitive engine to capture network traffic and analyze behavioral data about said network traffic. Based on analysis of the behavioral data, the system may identify one or more vulnerabilities in the network security system and determine one or more changes to the network security rules to remedy the one or more vulnerabilities. The system further uses a robotic process automation system to test and simulate the one or more changes.Type: GrantFiled: January 30, 2020Date of Patent: March 23, 2021Assignee: BANK OF AMERICA CORPORATIONInventor: Sasidhar Purushothaman
-
Patent number: 10936622Abstract: An interface of a content management system manages storage and access of content on the system. For example, after receiving, from a client, a request to download a content item, the interface determines whether the request includes a valid token. If so, the interface sends a content item request to a storage service, retrieves the content item, and sends the content item to the client. Otherwise, the interface sends an authorization request to an authorization service, an authentication request to an authentication service, and a content item request to the storage service. Based on the requests, the interface determines whether the content item is available in storage and whether the client is authorized to access the content item. When the content item is available in storage and the client is authorized to access the content item, the interface retrieves the content item and sends the content item to the client.Type: GrantFiled: January 10, 2018Date of Patent: March 2, 2021Assignee: Dropbox, Inc.Inventors: Nipunn Koorapati, Daniel Horn, Elmer Charles Jubb, IV
-
Patent number: 10938571Abstract: Disclosed are system and method for verification of data transferred among several data storages. An exemplary method includes: calculating first hash-sums of the data during an initial placement in a data storage; transmitting the first hash-sums to at least one blockchain network; detecting a transfer of the data to a new data storage; calculating second hash-sums of the data after a placement of the data in the new data storage; transmitting the second hash-sums to the at least one blockchain network; comparing the first and second hash-sums of the data; and determining data immutability after the transfer of the data from the data storage to the new data storage based at least on results of the comparing.Type: GrantFiled: October 23, 2017Date of Patent: March 2, 2021Assignee: Acronis International GmbHInventors: Victor Lysenko, Stanislav Protasov, Mark Shmulevich, Serguei M Beloussov
-
Patent number: 10931439Abstract: A data storage method comprises sending, by a blockchain node associated with a blockchain, data to an encryption device to cause the encryption device to encrypt the data and return the encrypted data to the blockchain node; receiving the encrypted data returned by the encryption device; and sending the encrypted data to other blockchain nodes associated with the blockchain to cause each of the other blockchain nodes to store the encrypted data in the blockchain after performing consensus verification on the encrypted data with success.Type: GrantFiled: January 15, 2020Date of Patent: February 23, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventor: Hao Wu