Patents Examined by Ghazal B Shehni
-
Patent number: 12216784Abstract: Systems and processes for synchronizing disparate applications are described herein. In various embodiments, the process includes: (1) receiving and validating a log-in request; (2) receiving a request submission comprising a plurality of data items; (3) writing the plurality of data items into a dynamic and scalable data model; (4) determining request parameters associated with the plurality of data items; (5) determining a recommended deployment strategy based on the one or more parameters and characteristic values stored in the data model; (6) generating a and transmitting one or more notifications according to the recommended deployment strategy; and (7) generating and/or modifying a display based on the notification(s).Type: GrantFiled: June 2, 2022Date of Patent: February 4, 2025Assignee: MedTrans Go, Inc.Inventors: Obinwanne Ugwonali, Dana Weeks Ugwonali
-
Patent number: 12212576Abstract: A computer-implemented technique is described herein for defining and applying constraints that regulate a supervisee's interaction with applications. In one implementation, the technique provides a user interface presentation to a supervisor that lists a set of applications that run on plural application execution platforms. The user interface presentation also allows the supervisor to set platform-agnostic constraint information for any identified application. The platform-agnostic constraint information, once set for an application, constrains interaction by a supervisee with all versions of that same application. That is, the constraint information is said to be agnostic with respect to platform in the sense that it applies to a variety of application execution platforms that run the application. In one example, the platform-agnostic constraint information specifies a permitted amount of an activity that the supervisee is permitted to perform across all versions of an application.Type: GrantFiled: May 23, 2022Date of Patent: January 28, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Rui Suresh Zhu, Daniel Martin Strommen, Irina Petronela Salvan, Fernando Israel Osorio Cedeno, Alec Richard Lindberg, Thomas Anand Jeyaseelan, Mouna Sidi Hida, Emre Aydinceren
-
Patent number: 12212582Abstract: In one aspect, a computer-implemented method of detecting network security threats comprises the following steps: receiving at an analysis engine events relating to a monitored network; analysing the received events to identify at least one event that meets a case creation condition and, in response, creating a case in an experience database, the case being populated with data of the identified at least one event; assigning a threat score to the created case based on the event data; matching at least one further event to the created case and populating the case with data of the at least one further event, the threat score assigned to that case being updated in response; and in response to the threat score for one of the cases meeting a significance condition, rendering that case accessible via a case interface.Type: GrantFiled: December 22, 2020Date of Patent: January 28, 2025Assignee: Senseon Tech LtdInventors: David Atkinson, James Mistry
-
Patent number: 12204668Abstract: Techniques are described for enabling users to create and configure request-based policies used by a data storage system to generate custom responses to particular types of requests for users' stored data objects. The request-based policies include rules used to identify types of requests for data objects and corresponding types of responses to be generated responsive to detecting such requests. The types of responses that can be specified in such policies include responses other than simply returning a requested data object or denying a request. For example, a rule for certain types of responses can instruct the data storage system to return a dynamically generated data object, another rule can instruct the system to return a different data object than the one requested, and so forth.Type: GrantFiled: August 4, 2021Date of Patent: January 21, 2025Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Rebecca Claire Weiss, Andrew Kent Warfield
-
Patent number: 12192078Abstract: A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP addresses of hosts having been infected by a malware to yield an analysis. When the analysis indicates that the host IP address has been used to communicate with an external host infected by the malware to yield an indication, the method includes assigning a reputation score, based on the indication, to the host. The method can further include applying a conditional policy associated with using the host based on the reputation score. The reputation score can include a reduced reputation score from a previous reputation score for the host.Type: GrantFiled: March 1, 2024Date of Patent: January 7, 2025Assignee: Cisco Technology, Inc.Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
-
Patent number: 12189752Abstract: A robust and reliable multimodal authentication is provided by a multimodal authentication device. The multimodal authentication device utilizes an audio authentication, a video authentication, an audio liveliness authentication, and a video liveliness authentication to determine the authentication of a user. By including a liveliness component in the authentication determination reduces the risk of fraud by factoring in live movement and orientation into the authentication determines. For example, various image/location combinations are displayed to the user and the user is instructed to track and verbally identify the various images. In this way, the user is authenticated based not only on, for example, facial and audio recognition but also a liveliness associated with each.Type: GrantFiled: January 10, 2022Date of Patent: January 7, 2025Assignee: ARRIS ENTERPRISES LLCInventor: Yuvaraj Nagarathnam
-
Patent number: 12182276Abstract: A method is described. The method includes streaming subject data from a subject repository. The method also includes storing a subject length of the subject data. The method further includes executing a hash function on the subject data to produce a subject hash value. The method additionally includes executing the hash function on content data from a content stream based on the subject length to produce a content hash value. The method also includes detecting whether the content data matches the subject data based on the subject hash value and the content hash value. The method further includes reporting a match detection in response to detecting that the content data matches the subject data.Type: GrantFiled: December 15, 2021Date of Patent: December 31, 2024Assignee: Stealthbits Technologies LLCInventors: Robert Edward Minichino, Michael James Longo, Michael McLean Rubacky
-
Patent number: 12182312Abstract: First data from a first application logically located in a first security zone may be identified. A processing device may determine a second application is logically located in a second security zone having a higher trust level than the first security zone based on configuration data. The first data may be communicated, via an interoperation bus, to the second application based on the second security zone having the higher trust level.Type: GrantFiled: July 18, 2024Date of Patent: December 31, 2024Assignee: Here Enterprise Inc.Inventor: Chuck Doerr
-
Patent number: 12177213Abstract: Techniques for establishing a secure connection between a lead device and a secondary device are disclosed herein. According to an embodiment, the lead device receives a request to establish a secure connection with the secondary device. The lead device determines whether the secure connection is an initial connection with the secondary device. In response to a determination that the secure connection is not an initial connection with the secondary device, the lead device authenticates the secondary device using one or more credentials associated with the secondary device and stored by the lead device. In response to a successful authentication using the one or more credentials, the lead device establishes the secure connection with the secondary device.Type: GrantFiled: June 23, 2021Date of Patent: December 24, 2024Assignee: SHOPPERTRAK RCT LLCInventor: Spencer Neilan
-
Patent number: 12164674Abstract: Disclosed are techniques for providing an exposure rating. In an aspect, a processing system provides, to a user, an exposure rating to enable the user to visualize a level of online exposure of their personal information, wherein the exposure rating is determined based at least in part on an email score and a data broker score, wherein the email score is determined based at least in part on a number of a set of commercial email domains determined from a scan of an email account of the user, a number of a set of protected commercial email domains, and an email portion of the exposure rating, and wherein the data broker score is determined based at least in part on a number of a set of known data brokers, a number of the set of protected data brokers, and a data broker portion of the exposure rating.Type: GrantFiled: March 15, 2024Date of Patent: December 10, 2024Assignee: PrivacyHawk, Inc.Inventors: Aaron Mendes, Justin Wright
-
Patent number: 12166902Abstract: An electronic resource tracking and storage computer system is provided that communicates with a distributed blockchain computing system that includes multiple computing nodes. The system includes a storage system, a transceiver, and a processing system. The storage system includes an resource repository and transaction repository that stores submitted blockchain transactions. A new resource issuance request is received, and a new resource is added to the resource repository in response. A new blockchain transaction is generated and published to the blockchain. In correspondence with publishing to the blockchain, the transaction storage is updated with information that makes up the blockchain transaction and some information that was not included as part of the blockchain transaction. The transaction storage is updated when the blockchain is determined to have validated the previously submitted blockchain transaction.Type: GrantFiled: September 1, 2023Date of Patent: December 10, 2024Assignee: Nasdaq, Inc.Inventor: Alex Zinder
-
Patent number: 12160443Abstract: FlowSpec is a mechanism for distributing rules to routers in a network. Such rules may be used, for example, to drop traffic associated with a distributed denial of service attack. However, a malformed or incorrect FlowSpec announcement may, if distributed in the network, cause legitimate traffic to be dropped, degrading the service experienced by legitimate users. As such, systems and methods for avoiding the distribution of malformed FlowSpec announcements are provided.Type: GrantFiled: August 9, 2022Date of Patent: December 3, 2024Assignee: Level 3 Communications, LLCInventors: Michael Feldpusch, Christian Jensen, Lisa Harenski, William Hoxworth
-
Patent number: 12153721Abstract: A method of checking the authenticity of at least a first portion of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element is disclosed. The method includes starting the microcontroller with instructions stored in a first secure memory area associated with the microcontroller and starting the secure element. The secure element has a plurality of decipher keys, each associated with a portion of the content of a second reprogrammable non-volatile memory area associated with the microcontroller. The secure element performs a signature check on a first portion of the content of the second area. If the signature is verified, the secure element sends the decipher key associated with the first portion to the microcontroller. If the signature is not verified, the secure element executes a signature check on another portion of the content of the second memory area.Type: GrantFiled: August 8, 2023Date of Patent: November 26, 2024Assignee: PROTON WORLD INTERNATIONAL N.V.Inventor: Olivier Van Nieuwenhuyze
-
Patent number: 12147529Abstract: A computer comprising processors and memory may implement an application execution engine to execute an application including both managed code and unmanaged code, the managed code providing memory safety for accesses to objects in memory and the unmanaged code providing no such safety. Responsive to a request from managed code, the application execution engine allocates memory for an object in a managed pool and the object is accessible to managed code in a managed state. Responsive to a requirement for unmanaged code to access the managed object, the application execution engine transforms the object to be accessible in an unmanaged state, the transformation including allocating memory for the object in an unmanaged pool, copying data from managed memory to unmanaged memory according to a predetermined unmanaged layout, releasing the managed memory and using an address of the unmanaged memory to access the object in the unmanaged state.Type: GrantFiled: April 20, 2023Date of Patent: November 19, 2024Assignee: Oracle International CorporationInventors: Roland Schatz, Christian Haeubl, Matthias Grimmer
-
Patent number: 12147527Abstract: The processing of an incoming query targeted to a data store in a way that early detection of code injections can be achieved. Initial code injections, even if unsuccessful, can be used to adjust the code injections to more successfully perform harmful actions against the data store. Accordingly, early detection can be used to block attackers from experimenting against the data store. The early detection is accomplished by detecting when all or a portion of the query is structured in accordance with a query language, but does not follow the syntax recognized by the underlying data store. This is a good indication that the issuer of the query is performing a blind code injection, not knowing the type of the underlying data store.Type: GrantFiled: December 15, 2021Date of Patent: November 19, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Haim Saadia Bendanan, Andrey Karpovsky, Inbal Argov
-
Patent number: 12141296Abstract: The present disclosure describes devices and methods monitoring a technology environment. In particular, a computing device including a processor with computer readable instructions to access a plurality of indicators (e.g., variables) that have corresponding stored historical information. The indicators are then used to calculate a summed weights table of relative risk for each time period in the past. The summed weights table is then correlated to a target variable (e.g., a variable that documents major issues, incidents, or disruptions that occurred in the technology environment in the past). The correlation coefficient between the summed weights table and the target variable is then used to implement a machine learning algorithm in order to better determine current risk levels (e.g., relative values that predict issues, incidents, or disruption).Type: GrantFiled: January 25, 2023Date of Patent: November 12, 2024Assignee: AMERICAN FAMILY MUTUAL INSURANCE COMPANY, S.L.Inventors: Kelsen Alexander, Nathaniel Petreman, Noel Howlett, Magann Orth
-
Patent number: 12132760Abstract: The technology described herein identifies and mitigates phishing attempts by analyzing user input received at the operating system level. Initially, a credential, such as a username or password, is registered with the threat detection system. The technology described herein intercepts user input at the operating system level, generates a hash of the input, and compares it with a hash of a credential being monitored. A credential entry is detected when a hash for the character string entered matches a hash for a credential being monitored. The technology described herein will perform a threat assessment when a secret entry is detected. The threat assessment may use the application context and the network context as inputs to the assessment. Various mitigation actions may be taken when a threat is detected.Type: GrantFiled: March 3, 2022Date of Patent: October 29, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Paresh Maisuria, Ali Alabbas, Abhishek Sagar, Mara Beth Fortini, Rupo Zhang, Christian Stockwell, Michael David McCormack, Jason Joseph Weber, Charles J. Strempler, Sinclaire R. Hamilton, Brian Keith Catlin, Richard Joseph Murillo, Robert G. Lefferts, Eric P. Douglas, Christian Seifert
-
Patent number: 12124589Abstract: A cybersecurity system for an information and technology system is presented. The cybersecurity system includes: a risk engine that detects past events in the information and technology system, the risk engine including an electronically stored set of rules characterizing events; a prevention engine that models events in the information and technology system, the prevention engine including a model builder, the prevention engine communicatively coupled to the risk engine; and a user interface communicatively coupled to the risk engine and to the prevention engine; where the model builder is configured to build at least one attack tree based on a past event detected by the risk engine and a potential event modeled by the prevention engine, and where the cybersecurity system is configured to report the at least one attack tree through the user interface, such that a future event depicted in the at least one attack tree can be remediated.Type: GrantFiled: March 25, 2022Date of Patent: October 22, 2024Assignee: SAIX INC.Inventors: Hemanth Shenoy, Vardaan Sharma, Phanindra Banda
-
Patent number: 12126742Abstract: A cross-blockchain mutual data storage method includes obtaining, in a first node in a first blockchain network, initial data from a first relay node in the first blockchain network, and verifying the initial data according to a first oracle contract in the first node. The method further includes, in response to the verification being successful, converting the initial data from a first data format into a second data format, and determining the initial data in the second data format as to-be-transferred data, the second oracle contract being deployed on a second node in a second blockchain network. The method also includes transmitting the to-be-transferred data to the first relay node, so that the first relay node transmits the to-be-transferred data to the second node for storage of the to-be-transferred data.Type: GrantFiled: April 7, 2022Date of Patent: October 22, 2024Assignee: Tencent Technology (Shenzhen) Company LimitedInventor: Pan Liu
-
Patent number: 12120109Abstract: Systems, devices, and methods are described for millimeter wave device authentication. A system may include one or more access points. Each access point of the one or more access points is configured to extract, from one or more beam patterns generated via a client device, a beam feature associated with the client device. Each access point may also be configured to transmit the beam feature. The system may also include a server communicatively coupled to the one or more access points and including a database for storing known beam features. The server may be configured to receive the beam feature associated with the client device from at least one access point of the one or more access points. Also, the server may be configured to authenticate the client device in response to the received beam feature matching a known beam feature stored in the at least one database.Type: GrantFiled: June 26, 2020Date of Patent: October 15, 2024Assignee: Battelle Energy Alliance, LLCInventors: Arupjyoti Bhuyan, Zhi Sun, Sarankumar Balakrishnan