Patents Examined by Farid Homayounmehr
-
Patent number: 11625500Abstract: A system for secure commingling of tenant isolated data includes a commingling storage unit, an interface, and a processor. The interface is configured to receive an indication of tenant data to be commingled. The processor is configured to determine one or more instances of sensitive data included in the tenant data, and transfer the tenant data to the commingling storage unit without transferring the one or more instances of sensitive data, wherein an index identifier is transferred to be stored in the commingling storage unit in place of an instance of sensitive data of the one or more instances of sensitive data.Type: GrantFiled: January 8, 2020Date of Patent: April 11, 2023Assignee: Workday, Inc.Inventors: Denis Gulsen, Erol Guney, Eric James Ranstrom
-
Patent number: 11621832Abstract: A device can include an internal secure processing environment (SE) and communicate with a configuration system. The device may utilize a near field communications (NFC) radio. A mobile handset can connect with the SE in the device using NFC. The mobile handset can communicate with the configuration system and receive configuration data and a software package for the device. The SE can derive a PKI key pair and send the derived public key to the configuration system via the mobile handset. The SE and the configuration system can mutually derive an encryption key using the derived PKI key pair. The configuration data can be transmitted over the NFC radio, and the mobile handset can establish a Wi-Fi access point. The software package can be encrypted using the encryption key and transmitted to the device over the established Wi-Fi access point, thereby completing a configuration step for the device.Type: GrantFiled: March 14, 2019Date of Patent: April 4, 2023Assignee: IOT AND M2M TECHNOLOGIES, LLCInventor: John A. Nix
-
Patent number: 11588844Abstract: Disclosed herein are methods, systems, and processes to distribute and disperse search loads to optimize security event processing in cybersecurity computing environments. A search request that includes a domain specific language (DSL) query directed to a centralized search cluster by an event processing application is intercepted. The event processing application is inhibited from issuing the search request to the centralized search cluster if a structured or semi-structured document matches the DSL query.Type: GrantFiled: June 27, 2019Date of Patent: February 21, 2023Assignee: Rapid7, Inc.Inventors: Austin Lee, Gerardo Perez
-
Patent number: 11537689Abstract: In one embodiment, a computer implemented method of a data processing (DP) accelerator providing a watermark of an artificial intelligence (AI) model to a host device includes receiving, by the DP accelerator, from the host device, the AI model, and a watermark-enabled kernel to the DP accelerator. The DP accelerator further receives from the host device, first input data to the DP accelerator that, when the first input data is used as input to the watermark-enabled kernel, generates a watermark of the AI model. The watermark is provided to the host device. In an embodiment, the method further includes receiving a signature kernel from the host device and calling the signature kernel to digitally sign the watermark. In an embodiment, the method alternatively includes calling a digital signature routine in a secure unit of the DP accelerator to digitally sign the watermark.Type: GrantFiled: October 10, 2019Date of Patent: December 27, 2022Assignees: BAIDU USA LLC, KUNLUNXIN TECHNOLOGY (BEIJING) COMPANY LIMITEDInventors: Yong Liu, Yueqiang Cheng
-
Patent number: 11539734Abstract: Methods and systems for identifying a vulnerability on a network are disclosed. The methods described herein may involve executing a first scanning function to obtain a first view of a network and then filtering the first view of the network for at least one point of exposure of a first entity that originates from a second entity. The methods described herein may further involve executing a secondary scanning function to identify any vulnerabilities of the first entity based on the point of exposure of the first entity that originates from the second entity and implementing a threat prevention procedure upon identifying a vulnerability of the first entity based on the point of exposure of the first entity that originates from the second entity.Type: GrantFiled: December 20, 2019Date of Patent: December 27, 2022Assignee: Rapid7, Inc.Inventors: Wah-Kwan Lin, Paul Deardorff
-
Patent number: 11533296Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: GrantFiled: September 1, 2017Date of Patent: December 20, 2022Assignee: KYNDRYL, INC.Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
-
Patent number: 11528296Abstract: A data manipulation detection device that includes an alert engine configured to receive data from a data source, apply a set of rules for a threat model to the data using a first machine learning model, and to obtain an alert vector in response to applying the set of rules to the data. The device further includes an alert feedback engine configured to receive alert feedback that includes text comments for the alert vector. The device further includes a natural language processing (NLP) training engine configured to identify the text comments for the alert status and identify keywords within the text comments associated with a rule parameter value for a rule. The NLP training engine is further configured to determine a new rule parameter value based on the identified keywords and modify a rule parameter value for the rule based on the new rule parameter value.Type: GrantFiled: February 18, 2019Date of Patent: December 13, 2022Assignee: Bank of America CorporationInventors: Suki Ramasamy, Satish Kumar Arunachalam Lakshmanan, Sudhansu Mohanty, Kumaraguru Mohan
-
Patent number: 11520875Abstract: An electronic device according to various embodiments of the present invention comprises: an infrared filter for passing light in an infrared wavelength band; an image sensor for converting the received light into a video signal and outputting the video signal; an infrared light-emitting unit for emitting the light in the infrared wavelength band; and a processor. The processor can execute a first application, confirm a security level of the first application, and authorize the first application with an authority for controlling at least one of the image sensor, the infrared filter and the infrared light-emitting unit according to the confirmed security level of the first application.Type: GrantFiled: January 2, 2018Date of Patent: December 6, 2022Assignee: Samsung Electronics Co., Ltd.Inventors: Hye-Kyoung Jeon, Ho-Seok Kang, Jun-Hyun Park, Sung-Koo Lee, Woong-Ho Hong, Moo-Young Kim
-
Patent number: 11502995Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: GrantFiled: December 14, 2017Date of Patent: November 15, 2022Assignee: KYNDRYL, INC.Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
-
Patent number: 11503007Abstract: Systems, methods, and use-cases of multi-modal authentications and content distribution are presented. A content consumer can capture a multi-modal digital representation of multiple objects where a juxtaposition of features derived from the digital representation can be used to recognize that at least some of the objects are a valid authentication object. Upon authentication, an authentication agent determines a content access level for content associated with the corresponding to the juxtaposition. The content can then be presented on an electronic device, possibly within a secure virtual machine, according to the content access level.Type: GrantFiled: October 15, 2020Date of Patent: November 15, 2022Assignee: Nant Holdings IP, LLCInventor: Patrick Soon-Shiong
-
Patent number: 11495088Abstract: A computer-implemented method of authenticating a memory of a gaming machine uses a computing device having a processor communicatively coupled to a memory. The method includes identifying a first subset of the memory including one or more operational data components associated with operating the gaming machine. The method also includes identifying a second subset of the memory. At least some of the second subset of the memory is distinct from the first subset of the memory. The method further includes authenticating the first subset of the memory while the gaming machine is in a disabled state. The method also includes enabling operation of the gaming machine after said authenticating the first subset of the memory if the authentication of the first subset of the memory is successful. The method further includes authenticating the second subset of the memory while the gaming machine is in an enabled state.Type: GrantFiled: November 18, 2019Date of Patent: November 8, 2022Assignee: Video Gaming Technologies, Inc.Inventor: Michael Oberberger
-
Patent number: 11481227Abstract: A method can include evaluating each of a plurality of collaborative systems, using a processor, for suitability hosting an artifact according to at least one attribute of the artifact. A first collaborative system can be selected from the plurality of collaborative systems according to the evaluation. The artifact can be stored in the first collaborative system.Type: GrantFiled: October 14, 2019Date of Patent: October 25, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas J. Burris, Manish Kataria
-
Patent number: 11477232Abstract: Disclosed herein are systems and method for anti-virus scanning of backup data at a centralized storage. In an exemplary aspect, a method may receive, at the centralized storage, a backup slice from each respective computing device in a plurality of computing devices, wherein the centralized storage comprises, for each respective computing device, a respective backup archive including a plurality of backup slices. The method may mount the received backup slice as a virtual disk. The method may detect, for the respective computing device, a change between the mounted virtual disk and any number of previous backup slices and may evaluate the change against behavioral rules to identify malicious behavior. In response to determining that the change exhibits malicious behavior, the method may execute a remediation action to prevent an attack on the plurality of computing devices or the centralized storage.Type: GrantFiled: June 22, 2020Date of Patent: October 18, 2022Assignee: Acronis International GmbHInventors: Andrey Kulaga, Vladimir Strogov, Sergey Ulasen, Oleg Ishanov, Igor Kornachev, Nikolay Grebennikov, Stanislav Protasov, Serguei Beloussov
-
Patent number: 11470029Abstract: Machine learning based methods for the analysis and reporting of suspicious email are disclosed. In one aspect, there is a method that includes displaying a user-selectable icon to report a suspicious electronic message. The method further includes receiving selections of the electronic message and the user-selectable icon. The method further includes quarantining the electronic message in response to the selections. The method further includes electronically communicating the electronic message to a processor for performing threat analysis in response to the selections. The method further includes receiving a response message in response to the performed threat analysis, the response message indicating a threat status of the electronic message.Type: GrantFiled: October 31, 2018Date of Patent: October 11, 2022Assignee: Edgewave, Inc.Inventors: Louis Ryan, Robert Crowe, Steven Christopher Kelley, John Randall, Gang Ding
-
Patent number: 11455433Abstract: In one embodiment, a system on chip includes a dynamic voltage and frequency scaling (DVFS) power supply, a secure environment, a non-secure environment, and a power supply management control module. The secure environment is configured to generate a secure instruction defining a permitted operating point of voltage and frequency for the DVFS power supply. The non-secure environment is configured to generate a request to modify the DVFS power supply, where the request to modify includes a voltage-frequency operating point. The power supply management control module is configured to scale the DVFS power supply to the permitted operating point, in response to the request to modify the DVFS power supply.Type: GrantFiled: September 23, 2019Date of Patent: September 27, 2022Assignee: STMICROELECTRONICS (GRAND OUEST) SASInventors: Arnaud Rosay, Gerald Lejeune, Jean Nicolas Graux, Olivier Claude LeBreton
-
Patent number: 11451373Abstract: An example operation may include one or more of authenticating a user, by a first system node, based on a first set of user credentials, computing, by the first system node, a second set of user credentials for a second system node, testing the second system node, by the first system node, to determine if the second system node has a user with the second set of the user credentials, and responsive to the second system node not having the user with the second set of the user credentials, creating a user with the second set of the user credentials.Type: GrantFiled: April 1, 2020Date of Patent: September 20, 2022Assignee: International Business Machines CorporationInventors: James Arthur Lindeman, Danny Soroker, Lisa Frankel
-
Patent number: 11451394Abstract: Methods and systems for performing demographics filtering based on biometric information are disclosed. An access terminal can capture a biometric instance corresponding to a user, such as a fingerprint scan, iris scan, etc. The access terminal can determine demographics information from the biometric instance, such as the age, biological sex, or ethnicity of the user. The access terminal can compare the demographics information to demographics information stored on a group of mobile devices corresponding to a group of users, in order to identify candidate user mobile devices. Once candidate user mobile devices are identified, the access terminal can perform a biometric match between the biometric instance corresponding to the user and biometric instances stored on the candidate user mobile devices. Once a biometric match and the corresponding mobile device are determined, the access terminal can conduct a further interaction with the mobile device.Type: GrantFiled: July 27, 2018Date of Patent: September 20, 2022Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Kim Wagner, John F. Sheets
-
Patent number: 11436373Abstract: Systems and methods are disclosed detecting whether calls to consent rejection functions originate with an automated tool or a human user. The system can determine that a calls to a consent rejection function are likely from an automated tool by determining that a rate and/or number of calls to a function exceeds a threshold and/or that the calls are received before the interface requesting user consent preferences has been rendered to the user. The system can also require that a function call include a token that an automated tool would not have knowledge of or access to and reject function calls without this token. The system can also use private consent rejection function calls with obfuscated names and/or provide a follow up consent rejections confirmation interface requiring human user input before process a consent rejection.Type: GrantFiled: September 15, 2021Date of Patent: September 6, 2022Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Patrick Whitney, Sharath Chandra Chavva
-
Patent number: 11425118Abstract: A centralized gateway server receives a first user request, configured to operate with a first development platform, indicating a first operation to be performed on behalf of a first user. The centralized gateway server generates a first service request for performing the first operation, and transmits the first service request to a server associated with a service, to cause the server to perform the first operation on behalf of the first user. The centralized gateway server also receives a second user request indicating a second operation. The second user request is configured to operate with a second development platform different from the first development platform. The centralized gateway server generates a second service request for performing the second operation, and transmits the second service request to the server to cause the server to perform the second operation.Type: GrantFiled: August 6, 2018Date of Patent: August 23, 2022Assignee: Giesecke+Devrient Mobile Security America, Inc.Inventor: Mehdi Zadeh Heidari
-
Patent number: 11423139Abstract: An information processing apparatus includes a rewrite request receiving unit configured to receive a rewrite request for rewriting an execution module, an update module determination unit configured to determine whether an update module that issues the rewrite request is an authorized module, a first falsification detection unit configured to detect falsification of a whitelist, an unauthorized-rewriting prevention unit configured to prevent unauthorized rewriting while maintaining a function of the information processing apparatus by rejecting the rewrite request without stopping the function of the information processing apparatus, in a case where the execution module for which the rewrite request is issued is registered in a whitelist for which the first falsification detection unit determines that no falsification is made and where the rewrite request is issued by an update module for which the update module determination unit determines to be an unauthorized update module.Type: GrantFiled: June 22, 2020Date of Patent: August 23, 2022Assignee: Canon Kabushiki KaishaInventors: Ayuta Kawazu, Nobuhiro Tagashira, Takami Eguchi