Patents Examined by Ghazal B Shehni
  • Patent number: 12216784
    Abstract: Systems and processes for synchronizing disparate applications are described herein. In various embodiments, the process includes: (1) receiving and validating a log-in request; (2) receiving a request submission comprising a plurality of data items; (3) writing the plurality of data items into a dynamic and scalable data model; (4) determining request parameters associated with the plurality of data items; (5) determining a recommended deployment strategy based on the one or more parameters and characteristic values stored in the data model; (6) generating a and transmitting one or more notifications according to the recommended deployment strategy; and (7) generating and/or modifying a display based on the notification(s).
    Type: Grant
    Filed: June 2, 2022
    Date of Patent: February 4, 2025
    Assignee: MedTrans Go, Inc.
    Inventors: Obinwanne Ugwonali, Dana Weeks Ugwonali
  • Patent number: 12212576
    Abstract: A computer-implemented technique is described herein for defining and applying constraints that regulate a supervisee's interaction with applications. In one implementation, the technique provides a user interface presentation to a supervisor that lists a set of applications that run on plural application execution platforms. The user interface presentation also allows the supervisor to set platform-agnostic constraint information for any identified application. The platform-agnostic constraint information, once set for an application, constrains interaction by a supervisee with all versions of that same application. That is, the constraint information is said to be agnostic with respect to platform in the sense that it applies to a variety of application execution platforms that run the application. In one example, the platform-agnostic constraint information specifies a permitted amount of an activity that the supervisee is permitted to perform across all versions of an application.
    Type: Grant
    Filed: May 23, 2022
    Date of Patent: January 28, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rui Suresh Zhu, Daniel Martin Strommen, Irina Petronela Salvan, Fernando Israel Osorio Cedeno, Alec Richard Lindberg, Thomas Anand Jeyaseelan, Mouna Sidi Hida, Emre Aydinceren
  • Patent number: 12212582
    Abstract: In one aspect, a computer-implemented method of detecting network security threats comprises the following steps: receiving at an analysis engine events relating to a monitored network; analysing the received events to identify at least one event that meets a case creation condition and, in response, creating a case in an experience database, the case being populated with data of the identified at least one event; assigning a threat score to the created case based on the event data; matching at least one further event to the created case and populating the case with data of the at least one further event, the threat score assigned to that case being updated in response; and in response to the threat score for one of the cases meeting a significance condition, rendering that case accessible via a case interface.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 28, 2025
    Assignee: Senseon Tech Ltd
    Inventors: David Atkinson, James Mistry
  • Patent number: 12204668
    Abstract: Techniques are described for enabling users to create and configure request-based policies used by a data storage system to generate custom responses to particular types of requests for users' stored data objects. The request-based policies include rules used to identify types of requests for data objects and corresponding types of responses to be generated responsive to detecting such requests. The types of responses that can be specified in such policies include responses other than simply returning a requested data object or denying a request. For example, a rule for certain types of responses can instruct the data storage system to return a dynamically generated data object, another rule can instruct the system to return a different data object than the one requested, and so forth.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: January 21, 2025
    Assignee: Amazon Technologies, Inc.
    Inventors: Eric Jason Brandwine, Rebecca Claire Weiss, Andrew Kent Warfield
  • Patent number: 12192078
    Abstract: A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP addresses of hosts having been infected by a malware to yield an analysis. When the analysis indicates that the host IP address has been used to communicate with an external host infected by the malware to yield an indication, the method includes assigning a reputation score, based on the indication, to the host. The method can further include applying a conditional policy associated with using the host based on the reputation score. The reputation score can include a reduced reputation score from a previous reputation score for the host.
    Type: Grant
    Filed: March 1, 2024
    Date of Patent: January 7, 2025
    Assignee: Cisco Technology, Inc.
    Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
  • Patent number: 12189752
    Abstract: A robust and reliable multimodal authentication is provided by a multimodal authentication device. The multimodal authentication device utilizes an audio authentication, a video authentication, an audio liveliness authentication, and a video liveliness authentication to determine the authentication of a user. By including a liveliness component in the authentication determination reduces the risk of fraud by factoring in live movement and orientation into the authentication determines. For example, various image/location combinations are displayed to the user and the user is instructed to track and verbally identify the various images. In this way, the user is authenticated based not only on, for example, facial and audio recognition but also a liveliness associated with each.
    Type: Grant
    Filed: January 10, 2022
    Date of Patent: January 7, 2025
    Assignee: ARRIS ENTERPRISES LLC
    Inventor: Yuvaraj Nagarathnam
  • Patent number: 12182276
    Abstract: A method is described. The method includes streaming subject data from a subject repository. The method also includes storing a subject length of the subject data. The method further includes executing a hash function on the subject data to produce a subject hash value. The method additionally includes executing the hash function on content data from a content stream based on the subject length to produce a content hash value. The method also includes detecting whether the content data matches the subject data based on the subject hash value and the content hash value. The method further includes reporting a match detection in response to detecting that the content data matches the subject data.
    Type: Grant
    Filed: December 15, 2021
    Date of Patent: December 31, 2024
    Assignee: Stealthbits Technologies LLC
    Inventors: Robert Edward Minichino, Michael James Longo, Michael McLean Rubacky
  • Patent number: 12182312
    Abstract: First data from a first application logically located in a first security zone may be identified. A processing device may determine a second application is logically located in a second security zone having a higher trust level than the first security zone based on configuration data. The first data may be communicated, via an interoperation bus, to the second application based on the second security zone having the higher trust level.
    Type: Grant
    Filed: July 18, 2024
    Date of Patent: December 31, 2024
    Assignee: Here Enterprise Inc.
    Inventor: Chuck Doerr
  • Patent number: 12177213
    Abstract: Techniques for establishing a secure connection between a lead device and a secondary device are disclosed herein. According to an embodiment, the lead device receives a request to establish a secure connection with the secondary device. The lead device determines whether the secure connection is an initial connection with the secondary device. In response to a determination that the secure connection is not an initial connection with the secondary device, the lead device authenticates the secondary device using one or more credentials associated with the secondary device and stored by the lead device. In response to a successful authentication using the one or more credentials, the lead device establishes the secure connection with the secondary device.
    Type: Grant
    Filed: June 23, 2021
    Date of Patent: December 24, 2024
    Assignee: SHOPPERTRAK RCT LLC
    Inventor: Spencer Neilan
  • Patent number: 12164674
    Abstract: Disclosed are techniques for providing an exposure rating. In an aspect, a processing system provides, to a user, an exposure rating to enable the user to visualize a level of online exposure of their personal information, wherein the exposure rating is determined based at least in part on an email score and a data broker score, wherein the email score is determined based at least in part on a number of a set of commercial email domains determined from a scan of an email account of the user, a number of a set of protected commercial email domains, and an email portion of the exposure rating, and wherein the data broker score is determined based at least in part on a number of a set of known data brokers, a number of the set of protected data brokers, and a data broker portion of the exposure rating.
    Type: Grant
    Filed: March 15, 2024
    Date of Patent: December 10, 2024
    Assignee: PrivacyHawk, Inc.
    Inventors: Aaron Mendes, Justin Wright
  • Patent number: 12166902
    Abstract: An electronic resource tracking and storage computer system is provided that communicates with a distributed blockchain computing system that includes multiple computing nodes. The system includes a storage system, a transceiver, and a processing system. The storage system includes an resource repository and transaction repository that stores submitted blockchain transactions. A new resource issuance request is received, and a new resource is added to the resource repository in response. A new blockchain transaction is generated and published to the blockchain. In correspondence with publishing to the blockchain, the transaction storage is updated with information that makes up the blockchain transaction and some information that was not included as part of the blockchain transaction. The transaction storage is updated when the blockchain is determined to have validated the previously submitted blockchain transaction.
    Type: Grant
    Filed: September 1, 2023
    Date of Patent: December 10, 2024
    Assignee: Nasdaq, Inc.
    Inventor: Alex Zinder
  • Patent number: 12160443
    Abstract: FlowSpec is a mechanism for distributing rules to routers in a network. Such rules may be used, for example, to drop traffic associated with a distributed denial of service attack. However, a malformed or incorrect FlowSpec announcement may, if distributed in the network, cause legitimate traffic to be dropped, degrading the service experienced by legitimate users. As such, systems and methods for avoiding the distribution of malformed FlowSpec announcements are provided.
    Type: Grant
    Filed: August 9, 2022
    Date of Patent: December 3, 2024
    Assignee: Level 3 Communications, LLC
    Inventors: Michael Feldpusch, Christian Jensen, Lisa Harenski, William Hoxworth
  • Patent number: 12153721
    Abstract: A method of checking the authenticity of at least a first portion of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element is disclosed. The method includes starting the microcontroller with instructions stored in a first secure memory area associated with the microcontroller and starting the secure element. The secure element has a plurality of decipher keys, each associated with a portion of the content of a second reprogrammable non-volatile memory area associated with the microcontroller. The secure element performs a signature check on a first portion of the content of the second area. If the signature is verified, the secure element sends the decipher key associated with the first portion to the microcontroller. If the signature is not verified, the secure element executes a signature check on another portion of the content of the second memory area.
    Type: Grant
    Filed: August 8, 2023
    Date of Patent: November 26, 2024
    Assignee: PROTON WORLD INTERNATIONAL N.V.
    Inventor: Olivier Van Nieuwenhuyze
  • Patent number: 12147529
    Abstract: A computer comprising processors and memory may implement an application execution engine to execute an application including both managed code and unmanaged code, the managed code providing memory safety for accesses to objects in memory and the unmanaged code providing no such safety. Responsive to a request from managed code, the application execution engine allocates memory for an object in a managed pool and the object is accessible to managed code in a managed state. Responsive to a requirement for unmanaged code to access the managed object, the application execution engine transforms the object to be accessible in an unmanaged state, the transformation including allocating memory for the object in an unmanaged pool, copying data from managed memory to unmanaged memory according to a predetermined unmanaged layout, releasing the managed memory and using an address of the unmanaged memory to access the object in the unmanaged state.
    Type: Grant
    Filed: April 20, 2023
    Date of Patent: November 19, 2024
    Assignee: Oracle International Corporation
    Inventors: Roland Schatz, Christian Haeubl, Matthias Grimmer
  • Patent number: 12147527
    Abstract: The processing of an incoming query targeted to a data store in a way that early detection of code injections can be achieved. Initial code injections, even if unsuccessful, can be used to adjust the code injections to more successfully perform harmful actions against the data store. Accordingly, early detection can be used to block attackers from experimenting against the data store. The early detection is accomplished by detecting when all or a portion of the query is structured in accordance with a query language, but does not follow the syntax recognized by the underlying data store. This is a good indication that the issuer of the query is performing a blind code injection, not knowing the type of the underlying data store.
    Type: Grant
    Filed: December 15, 2021
    Date of Patent: November 19, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Haim Saadia Bendanan, Andrey Karpovsky, Inbal Argov
  • Patent number: 12141296
    Abstract: The present disclosure describes devices and methods monitoring a technology environment. In particular, a computing device including a processor with computer readable instructions to access a plurality of indicators (e.g., variables) that have corresponding stored historical information. The indicators are then used to calculate a summed weights table of relative risk for each time period in the past. The summed weights table is then correlated to a target variable (e.g., a variable that documents major issues, incidents, or disruptions that occurred in the technology environment in the past). The correlation coefficient between the summed weights table and the target variable is then used to implement a machine learning algorithm in order to better determine current risk levels (e.g., relative values that predict issues, incidents, or disruption).
    Type: Grant
    Filed: January 25, 2023
    Date of Patent: November 12, 2024
    Assignee: AMERICAN FAMILY MUTUAL INSURANCE COMPANY, S.L.
    Inventors: Kelsen Alexander, Nathaniel Petreman, Noel Howlett, Magann Orth
  • Patent number: 12132760
    Abstract: The technology described herein identifies and mitigates phishing attempts by analyzing user input received at the operating system level. Initially, a credential, such as a username or password, is registered with the threat detection system. The technology described herein intercepts user input at the operating system level, generates a hash of the input, and compares it with a hash of a credential being monitored. A credential entry is detected when a hash for the character string entered matches a hash for a credential being monitored. The technology described herein will perform a threat assessment when a secret entry is detected. The threat assessment may use the application context and the network context as inputs to the assessment. Various mitigation actions may be taken when a threat is detected.
    Type: Grant
    Filed: March 3, 2022
    Date of Patent: October 29, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Paresh Maisuria, Ali Alabbas, Abhishek Sagar, Mara Beth Fortini, Rupo Zhang, Christian Stockwell, Michael David McCormack, Jason Joseph Weber, Charles J. Strempler, Sinclaire R. Hamilton, Brian Keith Catlin, Richard Joseph Murillo, Robert G. Lefferts, Eric P. Douglas, Christian Seifert
  • Patent number: 12124589
    Abstract: A cybersecurity system for an information and technology system is presented. The cybersecurity system includes: a risk engine that detects past events in the information and technology system, the risk engine including an electronically stored set of rules characterizing events; a prevention engine that models events in the information and technology system, the prevention engine including a model builder, the prevention engine communicatively coupled to the risk engine; and a user interface communicatively coupled to the risk engine and to the prevention engine; where the model builder is configured to build at least one attack tree based on a past event detected by the risk engine and a potential event modeled by the prevention engine, and where the cybersecurity system is configured to report the at least one attack tree through the user interface, such that a future event depicted in the at least one attack tree can be remediated.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: October 22, 2024
    Assignee: SAIX INC.
    Inventors: Hemanth Shenoy, Vardaan Sharma, Phanindra Banda
  • Patent number: 12126742
    Abstract: A cross-blockchain mutual data storage method includes obtaining, in a first node in a first blockchain network, initial data from a first relay node in the first blockchain network, and verifying the initial data according to a first oracle contract in the first node. The method further includes, in response to the verification being successful, converting the initial data from a first data format into a second data format, and determining the initial data in the second data format as to-be-transferred data, the second oracle contract being deployed on a second node in a second blockchain network. The method also includes transmitting the to-be-transferred data to the first relay node, so that the first relay node transmits the to-be-transferred data to the second node for storage of the to-be-transferred data.
    Type: Grant
    Filed: April 7, 2022
    Date of Patent: October 22, 2024
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventor: Pan Liu
  • Patent number: 12120109
    Abstract: Systems, devices, and methods are described for millimeter wave device authentication. A system may include one or more access points. Each access point of the one or more access points is configured to extract, from one or more beam patterns generated via a client device, a beam feature associated with the client device. Each access point may also be configured to transmit the beam feature. The system may also include a server communicatively coupled to the one or more access points and including a database for storing known beam features. The server may be configured to receive the beam feature associated with the client device from at least one access point of the one or more access points. Also, the server may be configured to authenticate the client device in response to the received beam feature matching a known beam feature stored in the at least one database.
    Type: Grant
    Filed: June 26, 2020
    Date of Patent: October 15, 2024
    Assignee: Battelle Energy Alliance, LLC
    Inventors: Arupjyoti Bhuyan, Zhi Sun, Sarankumar Balakrishnan