Patents Examined by Fatoumata Traore
  • Patent number: 10523686
    Abstract: Techniques to facilitate securing web services from unauthorized access are disclosed herein. In at least one implementation, user interactions with a web service are monitored, and sets of the user interactions are generated per originator based on origination information associated with the user interactions. The sets of the user interactions are processed to identify credentials used to access the web service per originator. The credentials used to access the web service per originator are compared with compromised credentials stored in a database to identify one or more user accounts of the web service associated with an originator that used the compromised credentials found in the database. Security measures are applied for at least the one or more user accounts of the web service associated with the originator that used the compromised credentials found in the database.
    Type: Grant
    Filed: March 25, 2016
    Date of Patent: December 31, 2019
    Assignee: Cequence Security, Inc.
    Inventors: Shreyans Mehta, Ameya Talwalkar, Michael Barrett, David Weisman
  • Patent number: 10523685
    Abstract: A method for verifying a proximity of a user device to a beacon, including broadcasting a frame comprising an encrypted payload, receiving the frame, extracting information from the frame, and verifying the proximity of the user device to the beacon based on the extracted information.
    Type: Grant
    Filed: August 23, 2019
    Date of Patent: December 31, 2019
    Assignee: Estimote Polska Sp z o.o.
    Inventors: Lukasz Kostka, Jakub Krzych
  • Patent number: 10509892
    Abstract: A system and methods of computer security are provided wherein a first mobile computing device drives an acoustic transducer to emit an acoustic signal encoding a time-based, one time password (TOTP) code, and a second mobile computing device measures output of a MEMS gyroscope that senses the emitted acoustic signal. The second mobile computing device decodes the TOTP code from the gyroscope output, validates the TOTP code and responsively permits a user to access a secure application.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: December 17, 2019
    Assignee: B. G. NEGEV TECHNOLOGIES AND APPLICATIONS LTD., AT BEN-GURION UNIVERSITY
    Inventors: Yossi Oren, Asaf Grosz, Nir Hasidim, Benyamin Farshteindiker
  • Patent number: 10511435
    Abstract: Methods (100, 200, 300) and apparatus (400, 500, 600, 700, 800, 900) are disclosed for establishing a key for direct communication between a User Equipment device, UE, and a device. The methods and apparatus cooperate to form a system for securing direct communication between a UE and a device over an interface. The system comprises a UE (20), a device (30) and a Direct Communication Element (40). The Direct Communication Element (40) is configured to obtain a shared session key and Generic Bootstrapping Architecture Push Information, GPI, to derive a UE delivery key from at least the shared session key, to generate a direct communication key, to encrypt the direct communication key with the UE delivery key, and to send the direct communication key, the encrypted direct communication key and the GPI to the device (30). The device (30) is configured to send the encrypted direct communication key and the GPI to the UE (20).
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: December 17, 2019
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Monica Wifvesson, Vesa Lehtovirta, Katharina Pfeffer
  • Patent number: 10503890
    Abstract: An authentication system for a computing environment uses physically unclonable functions (PUFs) to authenticate requests to perform an action in the environment. The system receives, from an imaging device, an image of a physically unclonable object associated with the electronic request. The system then obtains from a computer server operating within the system via an encrypted communication channel, a challenge associated with the object. The system uses extraction parameters encoded within the challenge to transform a portion of the image and produce authentication data representing a response to the challenge. The system extracts, using the extraction parameters, the authentication data from the image and determines whether the challenge and response match and the request is authenticated.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: December 10, 2019
    Assignee: ARIZONA BOARD OF REGENTS ON BEHALF OF NORTHERN ARIZONA UNIVERSITY
    Inventors: Bertrand Cambou, Abolfazl Razi
  • Patent number: 10489587
    Abstract: The disclosed computer-implemented method for classifying files as specific types of malware may include (i) identifying an unknown file on a computing device, (ii) performing an analysis of the unknown file by applying, to the unknown file, a machine-learning heuristic that employs at least one decision tree, (iii) classifying the unknown file as malicious based on the analysis, and (iv) after classifying the unknown file as malicious, using the same decision tree employed by the machine-learning heuristic to sub-classify the unknown file by (a) identifying at least one leaf node of the decision tree arrived at by the analysis performed by the machine-learning heuristic on the unknown file, (b) determining that the leaf node of the decision tree is associated with a particular type of malicious file, and (c) sub-classifying the unknown file as the particular type of malicious file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: November 26, 2019
    Assignee: Symantec Corporation
    Inventors: Mark Kennedy, Barry Laffoon
  • Patent number: 10484360
    Abstract: A method for providing an authenticated connection between at least two communication partners and to a communication system. The method includes setting up an anonymous signal-conducting connection between the at least two communication partners; checking the authenticity of a signed certificate used by a first communication partner of the at least two communication partners by a second communication partner of the at least two communication partners; reproducing an authentication code by the second communication partner after the check of the authenticity of the signed certificate used by the first communication partner has been carried out; and confirming the authentication code reproduced by the second communication partner by a user by the first communication partner. The method provides a possibility which increases the security of a certificate-based authentication of a communication connection between at least two communication partners.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: November 19, 2019
    Assignee: Volkswagen AG
    Inventors: Timo Winkelvos, Alexander Tschache, Martin Wuschke
  • Patent number: 10476893
    Abstract: The present disclosure is directed towards systems and methods for detecting anomalous network traffic. Network traffic corresponding to an application executed by a server can be received. Application characteristics of the application can be identified to select an anomaly detection profile. The anomaly detection profile can be selected based on the identified application characteristics. The anomaly detection profile can include a set of detection features for the anomaly and one or more predetermined threshold values of the detection features. One or more feature values of the set of one or more detection features can be determined. An anomaly in the network traffic can be detected responsive to comparing the feature values and the predetermined threshold values of the detection features.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: November 12, 2019
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Nastaran Baradaran, Anoop Reddy, Ratnesh Singh Thakur
  • Patent number: 10469528
    Abstract: A method for detecting patterns using statistical analysis is provided. The method includes receiving a subset of structured data having a plurality of fields. A plurality of value combinations is generated for the plurality of fields using a statistical combination function. Each combination of the generated plurality of value combinations is stored as a separate entry in a results table. The entry in the results table includes a counter associated with the stored combination. A value of the counter is incremented for every occurrence of the stored combination in the generated plurality of value combinations. The results table is sorted based on the counters' values and based on a number of fields in each combination. One or more entries having highest counter values are identified in the results table.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: November 5, 2019
    Assignee: Arbor Networks, Inc.
    Inventor: Steinthor Bjarnason
  • Patent number: 10445481
    Abstract: The disclosed computer-implemented method for performing human-verification procedures may include (1) detecting, at a computing device, an attempt to access a computing resource that is to be protected from being accessed by automated bots, (2) in response to detecting the attempt to access the computing resource, presenting, on the computing device, an audiovisual display that is configured to produce at least one expected reaction from human users, the expected reaction being characterized by an expected facial expression, (3) while the audiovisual display is being presented, monitoring facial expressions of any user that is currently using the computing device, and (4) determining whether the attempt to access the computing resource was performed by a human user or an automated bot based at least in part on a comparison between the monitored facial expressions and the expected facial expression. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: October 15, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Keith Newstadt
  • Patent number: 10447710
    Abstract: A shielding is provided to prevent attacks on network architecture or reduce the impact thereof. The system reconfigures the network differently for each user, operating system, and host and the configuration changes as time passes. The system can use dynamic redirection to create a reconfigurable network, and include intermediary nodes to dynamically reconfigure the network infrastructure for all traffic.
    Type: Grant
    Filed: June 3, 2015
    Date of Patent: October 15, 2019
    Assignee: Cryptonite, LLC
    Inventors: Jason Li, Justin Yackoski, Brian Kambach, Renato Levy, Nicholas Evancich
  • Patent number: 10438198
    Abstract: Examples described herein relate to systems, apparatuses, and methods for using tokens between two entities comprising a client device and a server, including receiving, by the server, a token from the client device, wherein the token is unique to a transaction, deriving, by the server, a server-derived token from the original data based on a transaction count, wherein the transaction count corresponds to a number of times that the original data is involved in transactions, comparing, by the server, the received token with the server-derived token, and responsive to determining that the received token and the server-derived token are same, sending, by the server, a verification message.
    Type: Grant
    Filed: May 19, 2017
    Date of Patent: October 8, 2019
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
  • Patent number: 10439884
    Abstract: A new cybersecurity incident is registered at a security incident response platform. At a playbook generation system, details are received of the new cybersecurity incident from the security incident response platform. At least some of the details correspond to a set of features of the new cybersecurity incident. A set or subset of nearest neighbors of the new cybersecurity incident is localized in a feature space. The nearest neighbors of the new cybersecurity incident are other cybersecurity incidents having a distance from the new cybersecurity incident within the feature space that is defined by differences in features of the nearest neighbors with respect to the set of features of the new cybersecurity incident. A custom playbook is created for responding to the new cybersecurity incident having prescriptive procedures based on occurrences of prescriptive procedures previously employed in response to the nearest neighbor cybersecurity incidents.
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: October 8, 2019
    Assignee: DFLABS S.P.A.
    Inventors: Dario Valentino Forte, Michele Zambelli, Vojtech Letal
  • Patent number: 10430442
    Abstract: The disclosed computer-implemented method for automated classification of application network activity may include (1) building a lexicon dictionary that comprises lexical keywords, wherein network streams whose headers contain a given lexical keyword represent communications of an activity type that is associated with the given lexical keyword in the lexicon dictionary, (2) identifying, at a network vantage point, a network stream that represents a communication between an application and a server, (3) extracting, through a lexical analysis that utilizes the lexicon dictionary, a set of keywords from one or more header fields of the network stream, and (4) classifying the network stream based on activity types associated with each keyword in the set of keywords that were extracted from the header fields of the network stream. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: October 1, 2019
    Assignee: Symantec Corporation
    Inventors: Gyan Ranjan, Alok Tongaonkar
  • Patent number: 10432665
    Abstract: A system for managing attacker incidents, including a mobile device manager (MDM) receiving instructions to deploy deceptions on a mobile device used by an employee of an organization in conjunction with a network of the organization and, in response to the instructions, running a dedicated agent on the mobile device, wherein the dedicated agent is configured to register the mobile device and its current deceptions state, and install deceptions in the mobile device, a trap server triggering an incident in response to an attacker attempting to use deceptive data that was installed in the mobile device, and a deception management server sending instructions to the MDM to deploy deceptions on the mobile device, registering the mobile device and its deceptions state, receiving the notification from the trap server that an incident has occurred, and in response thereto instructing the MDM to run forensics on the mobile device.
    Type: Grant
    Filed: September 3, 2018
    Date of Patent: October 1, 2019
    Assignee: ILLUSIVE NETWORKS LTD.
    Inventors: Tal Yohai, Ofir Lauber, Yoav Epelman
  • Patent number: 10412068
    Abstract: Techniques are disclosed relating to signing and authentication of network messages such as API calls. A server system and a client system may collaboratively establish a shared secret key, which is then usable to sign such messages. These techniques may be useful in various situations, such as for integrations between different systems.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: September 10, 2019
    Assignee: salesforce.com, inc.
    Inventor: Prasad Peddada
  • Patent number: 10402586
    Abstract: The present disclosure relates to enabling users to logging access information associated with their license via a virtual network. In one example of the present disclosure, user data associated with a user having an account on a virtual network is obtained. Access control list associated with an identified application pid from an application database is then obtained, the identified application pid having been previously purchased by the user and the identified application being selected by the user from a user device. An application programming interface of the virtual network is then invoked to publish the transaction associated with the identified application pid to a central log storage.
    Type: Grant
    Filed: April 5, 2017
    Date of Patent: September 3, 2019
    Inventor: Tat Wai Chan
  • Patent number: 10395066
    Abstract: The invention relates to digital data processing systems that use a microphone and/or a camera as a means of inputting information. More particularly, the invention relates to the security and protection of computers or computer systems from unauthorized actions by controlling access to a microphone and/or a camera from software applications that request access to the function of a microphone and/or camera.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: August 27, 2019
    Assignee: KROMTECH ALLIANCE CORP.
    Inventors: Viktor Radulov, Oleksii Shchutskyi, Volodymyr Shelest
  • Patent number: 10396991
    Abstract: Deferred verification of the integrity of data operations over a set of data that is hosted at an untrusted module (UM) is controlled. The controlling includes generating a request for a data operation on the set of data. The request includes an authentication portion. The request is sent to the UM. A response to the request is received from the UM. The response includes cryptographic verification information attesting the integrity of the data operation with respect to prior data operations on the set of data. The response includes results from deferred verification at a trusted module (TM).
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: August 27, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Arvind Arasu, Kenneth Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Pingfan Meng, Vineet Pandey
  • Patent number: 10389739
    Abstract: A system, method, and computer program product are provided for detecting regular and irregular events associated with various entities. In operation, an event detection system detects at least one event associated with at least one entity. The event detection system identifies the at least one entity. Additionally, the event detection system identifies one or more historical patterns associated with the at least one event. Further, the event detection system determines whether the at least one event is anomalous based on the one or more historical patterns and details associated with the at least one event. Moreover, the event detection system performs at least one action based on whether the at least one event is determined to be anomalous.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: August 20, 2019
    Assignee: AMDOCS DEVELOPMENT LIMITED
    Inventor: Gad N. Solotorevsky