Patents Examined by Fatoumata Traore
  • Patent number: 11533613
    Abstract: Embodiments include devices and methods for providing secure communications between a first computing device and a second computing device are disclosed. A processor of the first computing device may determine in a first application software first security key establishment information. The processor may provide the first security key establishment information to a communication layer of the first computing device for transmission to the second computing device. The processor may receive, in the first application software from the communication layer of the first computing device, second security key establishment information received from the second computing device. The processor may determine a first security key by the first application software based at least in part on the second security key establishment information. The processor may provide the first security key to the communication layer for protecting messages from the first application software to the second computing device.
    Type: Grant
    Filed: May 21, 2020
    Date of Patent: December 20, 2022
    Assignee: QUALCOMM Incorporated
    Inventors: Adrian Edward Escott, William Whyte, Anand Palanigounder
  • Patent number: 11522887
    Abstract: A cyber-threat coordinator-component identifies devices and/or users that are in a breach state of a benchmark of parameters, utilized by AI models, that correspond to the normal pattern of life for the network. The cyber-threat coordinator-component sends an external communication to selected network devices in order to initiate actions with that network device in order to change a behavior of a detected threat of at least one a user and/or a device acting abnormal to the normal pattern of life on the network. The initiated actions are also targeted to minimize an impact on other network devices and users that are i) currently active in the network and ii) that are not in breach of being outside the normal behavior benchmark.
    Type: Grant
    Filed: February 19, 2019
    Date of Patent: December 6, 2022
    Assignee: Darktrace Holdings Limited
    Inventor: Matthew Dunn
  • Patent number: 11522907
    Abstract: Apparatus and methods for mitigating network attacks, such as by dynamically re-routing traffic. Various disclosed embodiments manipulate path-based routing of the backbone network to insert a scrubbing appliance within the backbone network topology, rather than using traditional network addressed tunnels in the edge network. In one implementation, traffic entering the backbone network ingress peer routers (from either another backbone network, or an edge network) is normally destination-address routed via the backbone to its appropriate egress router based on a path label; however, when a Distributed Denial of Service (DDoS) attack is detected, the ingress peer router inserts an additional hop into the path label that redirects dirty traffic to a substantially centralized scrubbing appliance. The benefits of the disclosed solutions include, among other things, significantly reduced attack response/recovery times without significant capital outlays.
    Type: Grant
    Filed: July 1, 2019
    Date of Patent: December 6, 2022
    Assignee: TIME WARNER CABLE ENTERPRISES LLC
    Inventors: Wesley George, Raymond Sliteris
  • Patent number: 11503042
    Abstract: A managed server (MS) within an administrative domain is quarantined. The administrative domain includes multiple MSs that use management instructions to configure management modules so that the configured management modules implement an administrative domain-wide management policy that comprises a set of one or more rules. The quarantined MS is isolated from other MSs. A description of the MS is modified to indicate that the MS is quarantined, thereby specifying a description of the quarantined MS. Cached actor-sets are updated to indicate the quarantined MS's changed state, thereby specifying updated actor-sets. A determination is made regarding which updated actor-sets are relevant to an other MS, thereby specifying currently-relevant updated actor-sets. A determination is made regarding whether the currently-relevant updated actor-sets differ from actor-sets previously sent to the other MS.
    Type: Grant
    Filed: May 12, 2020
    Date of Patent: November 15, 2022
    Assignee: Illumio, Inc.
    Inventors: Paul J. Kirner, Daniel R. Cook, Juraj G. Fandli, Matthew K. Glenn, Mukesh Gupta, Andrew S. Rubin, Jerry B. Scott, Thukalan V. Verghese
  • Patent number: 11502856
    Abstract: A method for providing information to be stored includes computing a storable first secret for generating a random value based on a random function. The information to be stored is provided as a chunk which is divided into blocks each having an element. A storable second secret comprising a random element is computed. A tag is computed for each block such that the tag for the j-th block of the i-th chunk is computed using: an output of the random function, the j-th block, and a representation of the second secret. The information to be stored is provided together with an information tag comprising the computed tags of each block of each chunk.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: November 15, 2022
    Assignee: NEC CORPORATION
    Inventors: Ghassan Karame, Frederik Armknecht
  • Patent number: 11503463
    Abstract: According to one embodiment, a wireless communication apparatus includes a transmitter. The transmitter transmits, in a first period, a first information frame. The first information frame includes first, verification information and a first key usable in the first period. The transmitter transmits, in the first period and after transmitting the first information frame, a data frame including first data. The transmitter transmits, in the first period and after transmitting the first information frame, a second information frame. The data frame includes a fourth key usable in a second period following the first period. The transmitter transmits, in the second period, a third information frame including third verification information and the fourth key.
    Type: Grant
    Filed: March 1, 2021
    Date of Patent: November 15, 2022
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventors: Tatsuma Hirano, Masahiro Sekiya, Toshihisa Nabetani
  • Patent number: 11496893
    Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: November 8, 2022
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Hiroyoshi Takiguchi, Naoto Kiribuchi, Teruko Miyata
  • Patent number: 11487882
    Abstract: The vulnerability influence evaluation system includes: a vulnerability information storage unit which stores vulnerability information; a vulnerability information collecting unit which collects the latest vulnerability information from the vulnerability information storage unit; a system relevance determination unit which compares system definition information about an evaluation target system with the vulnerability information, and determines whether or not there is relevance between the evaluation target system and vulnerability; a vulnerability influence degree calculation unit which calculates the vulnerability influence degree of vulnerability relevant to the evaluation target system on the basis of vulnerability influence degree calculation information; a vulnerability influence degree determination unit which performs determination as to the vulnerability level of the evaluation target system on the basis of the vulnerability influence degree; and an evaluation result output unit which outputs a resu
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: November 1, 2022
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Kenta Fukami, Mitsunobu Yoshinaga
  • Patent number: 11488136
    Abstract: Systems, methods, and computer-readable media for using an online resource to manage credentials on an electronic device are provided. In one example embodiment, a method, at an electronic device, includes, inter alia, receiving account data via an online resource, accessing commerce credential status data from a secure element of the electronic device, providing initial credential management option data via the online resource based on the received account data and based on the accessed commerce credential status data, in response to the providing, receiving a selection of an initial credential management option via the online resource, and changing the status of a credential on the secure element based on the received selection. Additional embodiments are also provided.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: November 1, 2022
    Assignee: Apple Inc.
    Inventors: Christopher Sharp, David T. Haggerty, George R. Dicker, Glen W. Steele, Matthew R. Murphy, Timothy S. Hurley
  • Patent number: 11477178
    Abstract: An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual and at least two sets of digital identity attributes each operative as a personal privacy proxy with compartmental identity attributes. The at least two sets of digital identity attributes each include a digital identity name, a digital identity mobile device number and a digital identity email address. The at least two sets of digital identity attributes are evaluated to produce a similarity measure. The real individual is provided with a recommendation based upon the similarity measure.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: October 18, 2022
    Assignee: Anonyome Labs, Inc.
    Inventors: Steven Harvey McCown, Paul Ashley, Matthew Poulton, Steve Shillingford, Greg Clark
  • Patent number: 11469963
    Abstract: A new cybersecurity incident is registered at a security incident response platform. At a playbook generation system, details are received of the new cybersecurity incident from the security incident response platform. At least some of the details correspond to a set of features of the new cybersecurity incident. A set or subset of nearest neighbors of the new cybersecurity incident is localized in a feature space. The nearest neighbors of the new cybersecurity incident are other cybersecurity incidents having a distance from the new cybersecurity incident within the feature space that is defined by differences in features of the nearest neighbors with respect to the set of features of the new cybersecurity incident. A custom playbook is created for responding to the new cybersecurity incident.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: October 11, 2022
    Assignee: Sumo Logic Italy S.p.A
    Inventors: Dario Valentino Forte, Michele Zambelli, Vojtech Letal
  • Patent number: 11457043
    Abstract: A device may receive policy information associated with a first application group and a second application group. The device may receive network topology information associated with a network. The device may generate a first policy based on the policy information and the network topology information, and generate a second policy based on the policy information and the network topology information. The device may provide, to the virtual network device, information associated with the first policy to permit the virtual network device to implement the first policy in association with network traffic transferred between the first application group and the second application group. The device may provide, to the physical network device, information associated with the second policy to permit the physical network device to implement the second policy in association with network traffic transferred between the first application group and the second application group.
    Type: Grant
    Filed: December 31, 2019
    Date of Patent: September 27, 2022
    Assignee: Juniper Networks, Inc.
    Inventors: Srinivas Nimmagadda, Rakesh Kumar, Prakash T. Seshadri, Sriram Subramanian
  • Patent number: 11449597
    Abstract: Example implementations relate to transposed passwords. A computing device may comprise a processing resource; and a memory resource storing machine-readable instructions to cause the processing resource to: receive an entered password; generate, based on the entered password, a transposed version of the entered password; compare the transposed version of the password to a stored password; and grant access based on the comparison.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: September 20, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Lavanya Bollam, Yashavantha Nagaraju, Sharath Srikanth Chellappa
  • Patent number: 11451522
    Abstract: A system and method for a computer system for the secure storage, transmittance and access of genetic data includes a coordinator server including a coordinator program arranged to update secure access information, the coordinator server being in communication with a genetic data sequencing server, a genetic data analysing server, and a genetic data storage server, whereby the coordinator server communicates the secure access information in a manner to allow the genetic data storage server to act as a proxy server between the genetic data sequencing server and the genetic data analysing server.
    Type: Grant
    Filed: June 7, 2018
    Date of Patent: September 20, 2022
    Assignee: City University of Hong Kong
    Inventors: Shuai Cheng Li, Wei Dong
  • Patent number: 11451566
    Abstract: A network traffic anomaly detection method and apparatus is provided. The method includes: acquiring network flows generated by a network monitoring node within a set period of time; for any one of attributes in the network flows, aggregating the network flows at a set time interval according to the attribute to generate N time sequences with respect to the attribute; determining N samples to be detected corresponding to the network flows according to the N time sequence, calculating respective angular dissimilarity degrees between a first time sequence and N?1 second time sequences corresponding to a first attribute in the other N?1 samples to be detected, and determining a first detection result with respect to the first time sequence; and determining whether each of the samples to be detected is an abnormal data stream according to a detection result.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: September 20, 2022
    Assignees: NSFOCUS INFORMATION TECHNOLOGY CO., LTD., NSFOCUS TECHNOLOGIES, INC.
    Inventor: Zijian Wu
  • Patent number: 11445363
    Abstract: In accordance with one embodiment, a method of modifying data in a telecommunication system can be implemented by receiving a communication comprising voice data and non-voice data at a first processor; sending the non-voice data from the first processor to a second processor; sending the voice data from the first processor to a third processor; receiving a sensitive-data-alert-message at the second processor from a fourth processor; and, in response to the sensitive-data-alert-message from the fourth processor, producing a set of modified-non-voice data at the second processor by removing a set of sensitive data contained within the non-voice data.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: September 13, 2022
    Assignee: INTRANEXT Software, Inc.
    Inventors: Patrick Brown, James Mitch, Michael Verlare
  • Patent number: 11444954
    Abstract: An authentication/authorization server that manages access to a resource server is provided. The server comprises a management unit that manages an expected completion time of a change to an access destination authentication/authorization server with respect to a client for which the access destination authentication/authorization server is to be changed; an issuing unit that issues an access token for accessing the resource server, the token having an expiration time; and a response unit that returns the access token to the client, wherein if an expected completion time of the change to the access destination authentication/authorization server is managed with respect to the client that is the source of the token issuance request, the issuing unit sets the expiration time of the access token that has been issued to expire no later than the expected completion time of the change.
    Type: Grant
    Filed: April 10, 2020
    Date of Patent: September 13, 2022
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kei Kitagata
  • Patent number: 11443041
    Abstract: Measurements of a device's firmware are made regularly and compared with prior, derived measurements. Prior measurements are derived from a set of identical firmware measurements obtained from multiple devices having the same make, model and firmware version number. The firmware integrity status is reported on a data and device security console for a group of managed endpoints. Alerts about firmware changes, which may be potential attacks on the firmware, are given automatically.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: September 13, 2022
    Assignee: Absolute Software Corporation
    Inventor: Eugene Khoruzhenko
  • Patent number: 11438157
    Abstract: The present disclosure discloses a method and system for data ownership confirmation based on encryption. The method comprises following steps: determining whether data is open; and if the data can be open, encrypting, by a data owner, the data by using a private key of the data owner to complete ownership declaration, and ending a process; or if the data cannot be open, determining whether the data is shared; and if the data cannot be shared, encrypting, by the data owner, the data by using a public key of the data owner to complete data protection, and ending a process; or if the data can be shared, proceeding to ownership declaration and protection steps. The method achieves data ownership confirmation, technically ensures proprietary of data ownership, and implements unique ownership of the data owner for the data, laying a foundation for data responsibility, right, and profit allocation.
    Type: Grant
    Filed: March 25, 2020
    Date of Patent: September 6, 2022
    Assignee: CHENGDU YUNSHUZHILIAN TECHNOLOGY CO., LTD.
    Inventors: Fang Miao, Yan Xie, Wenhui Yang
  • Patent number: 11436339
    Abstract: In some embodiments, a cybersecurity data handling and governance service displays a cybersecurity artifact generation object. In some embodiments, while displaying the cybersecurity artifact generation object, the cybersecurity data handling and governance service receives a first input selecting the cybersecurity artifact generation object.
    Type: Grant
    Filed: May 22, 2022
    Date of Patent: September 6, 2022
    Assignee: RISQ Management LLC
    Inventors: Gerard Edward Scheitlin, Quintin Scott Scheitlin, Chandler Carter Scheitlin