Patents Examined by Fatoumata Traore
  • Patent number: 12294630
    Abstract: A method for providing a token code in conjunction with a value token is disclosed. The token code serves as a shared secret for authenticating the use of the value token. Multiple token holders can possess the same value token, but each token holder may have a different token code for use with the value token.
    Type: Grant
    Filed: August 10, 2021
    Date of Patent: May 6, 2025
    Assignee: Visa International Service Association
    Inventor: Phillip Kumnick
  • Patent number: 12289396
    Abstract: In a method of facilitating encrypted communications between a transmitting system having a unique identifier and a receiving system, a key generation system generates at least one encryption master key for use with the unique identifier and an encryption algorithm to produce a transmitting system-unique encryption key. The key generation system also generates a shared secret master key for use with the unique identifier and a second encryption algorithm to produce a shared secret value. The at least one encryption master key and the shared secret master key are then stored in an encryption information database. The key generation system transmits the at least one encryption master key and shared secret information to the transmitting system and transmits the at least one encryption master key, the shared secret master key and the unique identifier to the receiving data processing system.
    Type: Grant
    Filed: August 18, 2022
    Date of Patent: April 29, 2025
    Assignee: Capital One Services, LLC
    Inventors: Kevin Osborn, James Zarakas, Mark C. Dupuis, Srinivasa Chigurupati
  • Patent number: 12284191
    Abstract: The present description relates to systems and techniques for allowing a third party verifier to verify aspects of secured data, or successful communication thereof. For example, a message or other data may be associated with a shared manifest that describes aspects of some data but does not reveal or expose the data. As a result, the data may be kept private while selective privacy and verification with respect to the data is achieved by the inclusion of only selected aspects of said data in the shared manifest.
    Type: Grant
    Filed: January 13, 2023
    Date of Patent: April 22, 2025
    Inventor: Yaron Gvili
  • Patent number: 12284174
    Abstract: A system to perform operations that include: minting a Non-Fungible Token (NFT) that comprises a media object and mutable metadata; allocating the NFT to a user of a client device; granting the user of the client device a permission to change the mutable metadata of the NFT based on the allocating the NFT to the user of the client device; generating an open-edition of the NFT, the open-edition of the NFT comprising a reference to the mutable metadata; receiving a change to the mutable metadata from the user of the client device; and updating the open-edition of the NFT based on the change.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: April 22, 2025
    Assignee: SNAP INC.
    Inventors: Rajeev Advani, Sophia Dominguez, Vu Tran
  • Patent number: 12271489
    Abstract: Exemplary embodiments may use word embeddings to enhance scanning of programming code scripts for sensitive subject matter, such as confidential subject matter. The scanning may be performed by a neural network in some exemplary embodiments. The neural network initially may be trained on a corpus of programming code scripts to identify keywords relating to sensitive subject matter, such as passwords, tokens or credentials. The neural network may not only identify instances of the keywords but also may identify related terms as well. The output of the scan may be a ranked list of terms in the programming code script that may relate to sensitive subject matter.
    Type: Grant
    Filed: December 20, 2023
    Date of Patent: April 8, 2025
    Assignee: Capital One Services, LLC
    Inventors: Vincent Pham, Kenneth Taylor, Jeremy Edward Goodsitt, Fardin Abdi Taghi Abad, Austin Grant Walters, Reza Farivar, Anh Truong, Mark Louis Watson
  • Patent number: 12271364
    Abstract: A method, system and computer program product are configured to access data, the data including a plurality of attributes, classify each of the attributes into one of a plurality of classifications, receive a privacy objective and a utility objective, determine a data transformation to achieve the privacy objective and the utility objective, apply the data transformation to the data, wherein the data transformation is applied to at least one of the attributes of the data based on the classifications to produce selectively modified data, iteratively refine data transformations through adjustment of utility objectives, and present the data for disclosure.
    Type: Grant
    Filed: February 4, 2022
    Date of Patent: April 8, 2025
    Assignee: IMMUTA, INC.
    Inventors: Joseph J. Regensburger, Alfred V. Rossi, III, Sophie Stalla-Bourdillon
  • Patent number: 12267365
    Abstract: A specific container is spawned by a docker module responsive to Kebernetes control instruction. Network connectivity is provided for the specific container to a data communication network through a networking bridge and a security policy is configured. After configuration, inbound or outbound data packets concerning the specific container are received and forwarded to a security policy KVM for scanning against security policies. Those that pass security scanning are forwarded to containers and external destinations.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: April 1, 2025
    Assignee: Fortinet, Inc.
    Inventor: Sérgio Henrique Marcelino Castro da Rosa
  • Patent number: 12265631
    Abstract: A system and method to analyze security across digital environments is provided. The system includes a report generation module to generate reports stating vulnerabilities in a software delivery pipeline. A recommendation engine is configured to perform a comprehensive analysis of the reports, verifies by cross-referencing with a CVE database to provide a rationalized and comprehensive view of the vulnerabilities. Further, the recommendation engine is configured to conduct an impact analysis using a ML model to determine the consequence of fixing the vulnerabilities and generates a score matrix based on a predefined threshold limit. Recommendations are provided to resolve the vulnerabilities based on the score matrix generated and impact analysis. The system includes a vulnerability remediation module to utilize the threshold limit to initiate automated vulnerability remediation thereby ensuring a secure and reliable development process.
    Type: Grant
    Filed: November 8, 2024
    Date of Patent: April 1, 2025
    Inventors: Ramnish Singh, Gaurav Aggarwal, Anantha Balasubramanian, Balaji Ramakrishnan, Rajesh Kannan
  • Patent number: 12261935
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: March 25, 2025
    Assignee: Cryptography Research, Inc.
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Patent number: 12255997
    Abstract: There is provided a method of communication between functional blocks in a system-on-chip.
    Type: Grant
    Filed: February 26, 2020
    Date of Patent: March 18, 2025
    Assignee: Agency for Science, Technology and Research
    Inventors: Ming Ming Wong, Anh Tuan Do, Kevin Tshun Chuan Chai
  • Patent number: 12242616
    Abstract: A method and system of selecting a software testing regimen for a software application. The method comprises receiving, at a security assessing server computing device, a Quality of Service (QoS) performance level in conjunction with a set of technical attributes of the software application, determining a security vulnerability diagnostic score for the software application based at least in part on the set of technical attributes and the QoS performance level, and selecting the software testing regimen in accordance with the QoS performance level and the security vulnerability diagnostic score.
    Type: Grant
    Filed: November 11, 2022
    Date of Patent: March 4, 2025
    Assignee: Ventech Solutions, Inc.
    Inventors: Matthew Canada, Jerry Allen Craig, II, Kathrine Dass, Raja Krishnamurthy, David Anthony Rigsby, Richard Nathan Toney, Stephen J. Veneruso
  • Patent number: 12242633
    Abstract: Embodiments for providing enhanced data protection for storage systems in a computing environment by a processor. One or more queries received by a storage system may be identified. Approval or denial of transmission of data with the storage system may be regulated in relation to the one or more queries based a queried metadata and a plurality of rules and administrative policies.
    Type: Grant
    Filed: April 11, 2022
    Date of Patent: March 4, 2025
    Assignee: International Business Machines Corporation
    Inventors: Pierpaolo Tommasi, Marco Simioni, Stephane Deparis
  • Patent number: 12244615
    Abstract: A method for protection from cyber attacks in a CAN (Controller Area Network), of a vehicle including the steps of selecting periodic messages having a transmission periodicity, grouping the periodic messages, and performing an analysis of messages of the nodes that exchange the received periodic messages, which includes obtaining times of arrival at the respective nodes of a set of periodic messages that have the same message identifier, computing average-offset values over successive subsets, of a given number of messages, accumulating the average-offset values for each identifier to obtain accumulated-offset values, identifying linear parameters by computing an angular coefficient, of a regression, and an intercept, or identification error, computing a correlation coefficient of the average offset of pairs of messages identified as coming from the same node, determining whether the correlation coefficient is higher than a first given threshold, determining whether the angular coefficient between two consec
    Type: Grant
    Filed: September 2, 2022
    Date of Patent: March 4, 2025
    Assignee: Marelli Europe S.p.A.
    Inventors: Christian Rosadini, Simona Chiarelli, Walter Nesci, Sergio Saponara, Alessio Gagliardi, Pierpaolo Dini
  • Patent number: 12235968
    Abstract: Software vulnerabilities affecting devices can be determined using a vulnerability identifier uniquely identifying a vulnerability and version check information for use in determining software versions affected by the vulnerability. The version check information comprises one or more version rules providing a definition of how a software version number is tokenized and one or more Boolean expressions on those tokens to identify impacted versions of software according to the one or more version rules. In checking software for a vulnerability, the software version is determined and checked using the Boolean expression according to the version definition.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: February 25, 2025
    Assignee: Malikie Innovations Limited
    Inventor: Glenn Daniel Wurster
  • Patent number: 12229279
    Abstract: A software package is received so that functions within the software package that implement or use cryptographic primitives can be identified. Further, a set of calls with each of the identified functions are determined. A call site analysis is performed based on the set of calls to determine cryptographic algorithm parameters. Thereafter, based on the set of calls and the call site analysis, a cryptography bill of materials (CBOM) detailing cryptographic primitives within the software package is generated. This CBOM can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: October 25, 2024
    Date of Patent: February 18, 2025
    Assignee: Binarly Inc
    Inventors: Alexander Matrosov, Sam Lloyd Thomas, Yegor Vasilenko
  • Patent number: 12229322
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: February 18, 2025
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Patent number: 12231563
    Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.
    Type: Grant
    Filed: April 7, 2023
    Date of Patent: February 18, 2025
    Assignee: Lemon Inc.
    Inventors: Haohao Qian, Jian Du, Qiang Yan
  • Patent number: 12225050
    Abstract: Distribution and management of services in virtual environments is described herein. In one or more implementations, a service distribution and management model is implemented in which system services and applications are seamlessly distributed across multiple containers which each implement a different runtime environment. In one or more implementations, a system for distributing access to services in a host operating system of a computing device includes a host operating system configured to implement a host runtime environment, and one or more services implemented by the host operating system. The system further includes a service control manager configured to enable communication between a client stub of a service implemented in a client runtime environment and a service provider of the service that is implemented in a service runtime environment that is separate from the first client runtime environment.
    Type: Grant
    Filed: March 28, 2022
    Date of Patent: February 11, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hari R. Pulapaka, Margarit Simeonov Chenchev, Benjamin M. Schultz, Jonathan David Wiswall, Frederick Justus Smith, John A. Starks, Richard O. Wolcott, Michael Bishop Ebersol
  • Patent number: 12223062
    Abstract: A system and method for identifying security control gaps. A method includes integrating with a set of security controls deployed with respect to a computing environment, wherein integrating with the set of security controls further comprises deploying an artifact in the computing environment, wherein the artifact is configured to record a plurality of activities performed in the computing environment by the set of controls; identifying at least one computing asset to be protected by the set of security controls; identifying at least one security control gap in the computing environment based on a configuration of the set of security controls, wherein each security control gap is defined with respect to one of the identified at least one computing asset; and performing at least one remediation action with respect to the identified at least one security control gap.
    Type: Grant
    Filed: April 29, 2024
    Date of Patent: February 11, 2025
    Assignee: Zafran Security LTD
    Inventors: Snir Havdala, Ben Seri
  • Patent number: 12218945
    Abstract: The invention relates to a system and method for managing the data streams for unified governance of a plurality of intensive computing solutions (70) accessible to a user client (2) from an aggregated interface (10), said intensive computing solutions including at least two solutions selected among: a high performance computing server (71), a server dedicated to supervised or unsupervised learning (72) and a server dedicated to quantum computing (73); said method being implemented at least partly by said computer system including: at least one database (25a) configured to store execution data for intensive computing operations; said method including the steps of storing (300) execution data for the intensive computing solutions (70) and transmitting (400) execution data for the intensive computing solutions to the aggregated interface (10).
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: February 4, 2025
    Assignee: BULL SAS
    Inventors: Patrice Calegari, Marc Levrier