Patents Examined by Fatoumata Traore
-
Patent number: 12149413Abstract: A new cybersecurity incident is registered at a security incident response platform. At a playbook generation system, details are received of the new cybersecurity incident from the security incident response platform. At least some of the details correspond to a set of features of the new cybersecurity incident. A set or subset of nearest neighbors of the new cybersecurity incident is localized in a feature space. The nearest neighbors of the new cybersecurity incident are other cybersecurity incidents having a distance from the new cybersecurity incident within the feature space that is defined by differences in features of the nearest neighbors with respect to the set of features of the new cybersecurity incident. A custom playbook is created for responding to the new cybersecurity incident having prescriptive procedures based on occurrences of prescriptive procedures previously employed in response to the nearest neighbor cybersecurity incidents.Type: GrantFiled: May 24, 2023Date of Patent: November 19, 2024Assignee: Sumo Logic, Inc.Inventors: Dario Valentino Forte, Michele Zambelli, Vojtech Letal
-
Patent number: 12143813Abstract: Systems and methods described herein provide for User Equipment (UE)-initiated authentication and authorization updates to Network Slice-Specific Authentication and Authorization (NSSAA). A network device in a core network receives a message from a user device outside of the core network, wherein the message includes a request to initiate a NSSAA procedure. The network device initiates the NSSAA procedure in response to the request. The systems and methods also provide for UE-initiated authorization revocation of NSSAA.Type: GrantFiled: October 1, 2021Date of Patent: November 12, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: David Taft, Maqbool Chauhan, Sudhakar Reddy Patil, Vinod Kumar Choyi, Jerry Steben
-
Patent number: 12124583Abstract: A method performs a trust review of repositories is provided. A computer system identifies security criteria for the trust review. The computer system applies the security criteria on a repository under evaluation. The computer system determines a recommendation for the repository under evaluation using a comparison of a result of applying the security criteria on the repository under evaluation to a trust baseline for a set of trusted repositories. According to other illustrative embodiments, a trust system and a computer program product for performing a trust review are provided.Type: GrantFiled: May 25, 2021Date of Patent: October 22, 2024Assignee: International Business Machines CorporationInventors: Shawn P. Mullen, Corinne Anne Leopold, Anton Aleksandrov, Zsolt Ádám Czinege
-
Patent number: 12124621Abstract: Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.Type: GrantFiled: July 8, 2021Date of Patent: October 22, 2024Assignee: EBAY INC.Inventors: Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole, Jennifer T. Robertson, Yu Tang
-
Patent number: 12120219Abstract: In an example embodiment, a solution is provided for encrypting and decrypting data in which the solution itself creates unique symbols, reducing or eliminating the possibility that a hacker or other malicious actor can understand what the symbols mean, let alone decrypt them. More particularly, for encryption, the characters of an original text is split into individual vector-based characters, and each of these vector-based characters are split into subcharacters at intersection points. Each of the split characters are then rotated, and the rotated characters are organized one on top of each other. The characters are then connected to each other, and the intersection points of the subcharacters within the characters that were used to split the characters into subcharacters are passed into a machine learning model that is trained to add lines between intersection points that have no lines, as noise to further obfuscate the original text.Type: GrantFiled: November 15, 2022Date of Patent: October 15, 2024Assignee: SAP SEInventor: Ramalingam Tv
-
Patent number: 12120122Abstract: Disclosed are apparatuses, systems, and techniques that improve efficiency and decrease latency of processing of authorization requests by cloud-based access servers that evaluate access rights to access various cloud-based services. The techniques include but are not limited to generating and processing advanced authorization requests that anticipate future authorization requests that may be generated by cloud-based services. The techniques further include processing of frequently accessed policies and policy data dependencies and preemptive generation and processing of authorization requests that are replicated from existing authorization requests.Type: GrantFiled: July 20, 2022Date of Patent: October 15, 2024Assignee: NVIDIA CorporationInventor: Dhruva Lakshmana Rao Batni
-
Patent number: 12120515Abstract: This disclosure provides systems, methods, and apparatuses for wireless sensing. In some aspects, a first wireless communication device may receive a first wireless transmission including a transmit (TX) parameter information element (IE). The first wireless communication device may verify the integrity of the TX parameter IE using a message integrity code (MIC) in the first wireless transmission, discarding the first wireless transmission when the MIC does not verify the integrity of the TX parameter IE. The first wireless device may obtain one or more transmission parameters for one or more second wireless communication devices associated with the TX parameter IE. The first wireless communication device may receive a second wireless transmission from one of the second wireless communication devices and obtain one or more wireless sensing measurements associated with the second wireless transmission and the one or more transmission parameters.Type: GrantFiled: March 24, 2021Date of Patent: October 15, 2024Assignee: QUALCOMM IncorporatedInventors: Solomon Trainin, Alecsander Eitan, Assaf Kasher
-
Patent number: 12113911Abstract: System and methods for key printing may include a control panel operable to receive a mobile device identifier from a mobile device. A property management system in communication with the control panel may assign or allocate a room in a hotel to a guest. A lock server may be in communication with the property management system, the lock server may create a digital key. A virtual encoder may be in communication with the property management system and the lock server, the virtual encoder may transmit a room number, lock information, authorized zones, a start time, an expiration, and the digital key to the mobile device. A key printer may receive the digital key from the mobile device, authenticate the mobile device, and print a physical key based on the received digital key.Type: GrantFiled: July 7, 2020Date of Patent: October 8, 2024Assignee: Marriott International, Inc.Inventors: David M. Straitiff, Gregory J. Durrer, Suraj Saraf, Neil R. Schubert, III, Naveen Singhal, Nathan Van Orden
-
Patent number: 12093436Abstract: According to one embodiment, a method, computer system, and computer program product for selecting methods of interfacing between a smart headset and a user based on privacy risk is provided. The present invention may include determining a privacy context of the smart headset based on the location, surrounding environment, and content associated with a smart headset, selecting at least one output method and at least one input method compatible with the smart headset based on the security of the output method and the input method within the privacy context, and operating the smart headset to interface with a user using the at least one output method and the at least one input method.Type: GrantFiled: December 7, 2020Date of Patent: September 17, 2024Assignee: International Business Machines CorporationInventors: Craig M. Trim, John M. Ganci, Jr., Hernan A. Cunico, Martin G. Keen
-
Patent number: 12093191Abstract: The embodiment of the present disclosure provides a method for evolving a root of trust and an electronic device using the method. Through the present disclosure, the root of trust can be evolved several times to strengthen the security verification capability for secure boot. Different from the conventional method of burning the root of trust in the read-only memory, the present disclosure uses a block protection storage device to write a verification firmware to be added to the root of trust into an unprotected block of the block protection storage device. Further, after the writing is completed, the unprotected block in which the verification firmware is written becomes a protected block, so as to make the evolvable root of trust secure and reliable, and can achieve credibility for evolving the root of trust.Type: GrantFiled: August 23, 2022Date of Patent: September 17, 2024Assignee: NUVOTON TECHNOLOGY CORPORATIONInventors: Lung-Chih Chien, Mu-Lin Chao
-
Patent number: 12095769Abstract: Systems and methods are provided for authentication and authorizing a client device on a network. First, one or more packets are received from a computing entity indicating an authentication request from a client device requesting connection at a network. Next, identification information of the client device are extracted from a body of the packets. Credentials of the client device are verified based on the identification information. In response to verifying the credentials, a level of access of the client device at the network is determined. Based on the level of access, a VLAN is assigned to the client device. The systems concurrently transmit, in a single packet, to the computing entity, an indication of approval of the credentials and the assigned VLAN, wherein the computing entity provisions the assigned VLAN to the client device following an allocation of an IP address corresponding to the assigned VLAN to the client device.Type: GrantFiled: October 21, 2021Date of Patent: September 17, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Rahul Agarwal, Vikram Limaye
-
Patent number: 12095926Abstract: A request to retroactively add one or more of an encryption level, an encryption type, a security level, and an authentication level to an existing blockchain is received. An authentication/encryption block is added to the existing blockchain. The authentication/encryption block comprises the one or more of the encryption level, the encryption type, the security level, and the authentication level. Based on the added authentication/encryption block in the existing blockchain, the one or more of the encryption level, the encryption type, the security level, and the authentication level are retroactively applied to at least a portion of blockchain data in the existing blockchain. In one embodiment, a data structure is used in place of the authentication/encryption block.Type: GrantFiled: March 25, 2022Date of Patent: September 17, 2024Assignee: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Patent number: 12086271Abstract: A system or a method for analyzing a software project for vulnerabilities. The system extracts scopes of source code, each of which is a source code block that contains a definition of an entity. The system also receives a vulnerability report relating to the source code. The vulnerability report identifies a vulnerability at a line of the source code. The system identifies a subset of the scopes of source code that contains the line of source code where the vulnerability is identified. The system identifies, based on smatch values, a minimum scope among the subset of the scopes that contains the line of source code where the vulnerability is identified, and generates a scoped vulnerability report recording the minimum scope and the vulnerability.Type: GrantFiled: June 30, 2023Date of Patent: September 10, 2024Assignee: GitLab Inc.Inventors: James Johnson, Julian Thome, Lucas Charles
-
Patent number: 12086272Abstract: Systems and methods for generating network mappings of self-executing program characteristics. For example, the system may receive a first user request to generate a mapping of a first network, wherein the mapping indicates self-executing program characteristics corresponding to each self-executing program of a first plurality of self-executing programs. In response to the first user request, the system may query the first plurality of self-executing programs to generate the mapping by identifying each self-executing program in the first plurality of self-executing programs, determining respective relationships between each self-executing program in the first plurality of self-executing programs and other self-executing programs in the first plurality of self-executing programs, and determining respective self-executing program characteristics for each self-executing program in the first plurality of self-executing programs. The system may store the mapping.Type: GrantFiled: July 25, 2023Date of Patent: September 10, 2024Assignee: Citibank, N.A.Inventor: Jonathan Miles Collin Rosenoer
-
Patent number: 12079344Abstract: A platform creating a third-party secure testing region for security experts to build and test proof-of-concepts thereby allowing the security expert or security team to report and retest the cybersecurity vulnerability and relay said vulnerability to the product team who can remediate the problem. The platform of the present invention also allows for automatic retesting of the vulnerability as soon as remediation is finished. Further, the present invention may optionally include an automatic proof-of-concept generator or automatic threat detector.Type: GrantFiled: June 4, 2020Date of Patent: September 3, 2024Assignee: BucPoc, LCInventor: Ryan Pickren
-
Patent number: 12067019Abstract: Embodiments of the present disclosure may provide a data clean room architecture that dynamically restricts data included in the clean room. The data clean room architecture can implement row access policy or dynamic data masking for row and column based restrictions of data provided through the clean room. The data clean room architecture can provide a limited set of data that does not require obfuscation of data for direction matching and correlation of data in the different datasets, such as matching user identifiers or emails.Type: GrantFiled: November 30, 2021Date of Patent: August 20, 2024Assignee: Snowflake Inc.Inventors: Rachel Frances Blum, Justin Langseth, Michael Earle Rainey
-
Patent number: 12067508Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for providing access to a private resource in an enterprise social networking system. One or more servers may receive a request for access to a private resource to be granted to a user from a publisher. The publisher may be configured to publish a message as a feed item to one or more feeds, where the message includes a user identification identifying the user. The user does not have access to the private resource. The feed item may be provided to display in the one or more feeds. Access may be granted to the user via the one or more feeds. In some implementations, access may be granted in response to a user input from the feed item associated with a moderator or owner, the moderator or owner having a privilege to control user access to the private resource.Type: GrantFiled: March 22, 2022Date of Patent: August 20, 2024Assignee: Salesforce, Inc.Inventor: Yanik Grignon
-
Patent number: 12067125Abstract: Methods and systems described herein are directed to measuring cybersecurity vulnerability management programs and readiness. A vulnerability management program evaluation system can define vulnerability management capabilities and technologies supporting execution of those capabilities. Once defined, the system can conduct an initial assessment including scoring for the capabilities representing a depth of vulnerability management, as well as scoring for the technologies representing a breadth of vulnerability management. To update the initial assessment, the system can track the ongoing progress of projects that can affect the depth and/or breadth of vulnerability management, and then recalculate the scoring. At any time, the system can combine the depth and breadth to determine a comprehensive vulnerability management score.Type: GrantFiled: April 11, 2022Date of Patent: August 20, 2024Assignee: United Services Automobile Association (USAA)Inventor: Michael Emil Lonigro
-
Patent number: 12061925Abstract: A system and method for inspecting managed workloads in a cloud computing environment for cybersecurity threats improves inspection of managed workload service repositories, by only inspecting bases of managed workload deployed in the cloud computing environment. The method includes discovering a managed workload deployed in a cloud computing environment; determining an identifier of the managed workload, wherein the identifier includes an indicator to a base repository in which a base is stored, and wherein the managed workload is currently deployed in the cloud computing environment, the base repository further storing a plurality of bases, wherein a portion of the plurality of bases do not correspond to a deployed workload; accessing the base repository to pull the base; and inspecting the base of the deployed managed workload for a cybersecurity threat.Type: GrantFiled: September 15, 2023Date of Patent: August 13, 2024Assignee: WIZ, INC.Inventors: Niv Roit Ben David, Yaniv Shaked, Yarin Miran, Raaz Herzberg, Amir Lande Blau
-
Patent number: 12058113Abstract: A first computing system establishes a cryptographically protected communication session with a second computing system by proposing a hybrid cryptographic scheme. In response to the proposed hybrid cryptographic scheme, a second computing system transmits cryptographic materials to the first computing system, and the first computing system transmits cryptographic materials to the second computing system. Using the cryptographic materials, two or more cryptographic keys are derived. One cryptographic key is used to perform an inner cryptographic operation on one or more data items, and another cryptographic key is used to perform an outer cryptographic operation on the one or more data items that have been cryptographically protected by the inner cryptographic operation.Type: GrantFiled: June 17, 2020Date of Patent: August 6, 2024Assignee: Amazon Technologies, Inc.Inventors: Nicholas Alexander Allen, Matthew J. Campagna