Patents Examined by Gregory Lane
-
Patent number: 11604872Abstract: Example threat detection methods and apparatus are disclosed. One example method includes obtaining page code of a first display page group identified by a uniform resource locator (URL) and an overall size occupied by the first display page group in a display area of a browser of a Web sandbox when loading the URL in the browser. After preset dynamic code is injected into the page code of the first display page group, the page code is parsed and executed. A request message is sent when a value of a display variable is greater than or equal to a preset value, to request to obtain page code of a second display page group. A response message that carries the page code of the second display page group is received. It is further detected, in the Web sandbox, whether the page code of the second display page group carries attack code.Type: GrantFiled: November 24, 2020Date of Patent: March 14, 2023Assignee: Huawei Technologies Co., Ltd.Inventor: Jia Chen
-
Patent number: 11570184Abstract: In a fraud-detection method for use in an in-vehicle network system including a plurality of electronic control units (ECUs) that exchange messages on a plurality of networks, a plurality of fraud-detection ECUs each connected to a different one of the networks, and a gateway device, a fraud-detection ECU determines whether a message transmitted on a network connected to the fraud-detection ECU is malicious by using rule information stored in a memory. The gateway device receives updated rule information transmitted to a first network among the networks, selects a second network different from the first network, and transfers the updated rule information only to the second network. A fraud-detection ECU connected to the second network acquires the updated rule information and updates the rule information stored therein by using the updated rule information.Type: GrantFiled: February 8, 2021Date of Patent: January 31, 2023Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICAInventors: Yuji Unagami, Hideki Matsushima, Tomoyuki Haga, Manabu Maeda, Yoshihiro Ujiie, Takeshi Kishikawa
-
Patent number: 11568088Abstract: Provided is a method for checking the integrity of user data by a processor, which includes a method step for a first check value for the user data to be computed during a security-protected mode of operation. The method includes a further method step for the first check value to be stored in a security-protected memory module of the processor during the security protected mode of operation. The method includes a further method step for a second check value for the user data to be computed during a runtime mode. The method includes a further method step for the first check value to be compared with the second check value by the processor during the runtime mode. The method includes a further method step for a piece of control information to be provided by the processor during the runtime mode, wherein the control information includes a result of the comparing.Type: GrantFiled: March 17, 2017Date of Patent: January 31, 2023Inventors: Dominik Merli, Daniel Schneider
-
Patent number: 11551142Abstract: Users have to assign labels to a ticket to route to right domain expert for resolving issue(s). In practice, labels are large and organized in form of a tree. Lack in clarity in problem description has resulted in inconsistent and incorrect labeling of data, making it hard for one to learn/interpret. Embodiments of the present disclosure provide systems and methods that identify relevant queries to obtain user response, for identification of right category and ticket logging there. This is achieved by implementing attention based sequence to sequence (seq2seq) hierarchical classification model to assign the hierarchical categories to tickets, followed by a slot filling model to enable identifying/deciding right set of queries, if the top-k model predictions are not consistent. Further, training data for slot filling model is automatically generated based on attention weight in the hierarchical classification model.Type: GrantFiled: October 15, 2019Date of Patent: January 10, 2023Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Puneet Agarwal, Mayur Patidar, Lovekesh Vig, Gautam Shroff
-
Patent number: 11537725Abstract: The present disclosure generally relates to creating virtualized block storage devices whose data is replicated across isolated computing systems to lower risk of data loss even in wide-scale events, such as natural disasters. The virtualized device can include at least two volumes, each of which is implemented in a distinct computing system. Each volume can be encrypted with a distinct key, and an encryption service can operate to transform data “in-flight” on the replication path between the volumes, reencrypting data according to the key appropriate for each volume.Type: GrantFiled: September 23, 2019Date of Patent: December 27, 2022Assignee: Amazon Technologies, Inc.Inventors: Kiran-Kumar Muniswamy-Reddy, Romain Benoit Seguy, Rahul Upadhyaya, Divya Ashok Kumar Jain, William Zaharchuk, Wells Lin
-
Patent number: 11531748Abstract: A computer-implemented method, a device, and a non-transitory computer-readable storage medium of automatically determining an interactive GUI element in a graphic user interface (GUI) to be interacted. The method includes: detecting, by the processor, one or more candidate interactive GUI elements in the GUI based on a plurality of algorithms; determining, by the processor, a likelihood indicator for each of the one or more candidate interactive GUI elements, a likelihood indicator indicating the likelihood that a candidate interactive GUI element associated with the likelihood indicator is an interactive GUI element to be interacted; and determining, by the processor, an interactive GUI element to be interacted from the one or more candidate interactive GUI elements based on the likelihood indicators.Type: GrantFiled: January 11, 2019Date of Patent: December 20, 2022Assignees: BEIJING JINGDONG SHANGKE INFORMATION TECHNOLOGY CO., LTD., JD.COM AMERICAN TECHNOLOGIES CORPORATIONInventors: Zhenxin Zhan, Junyuan Zeng, Jimmy Su
-
Patent number: 11531774Abstract: An information processing apparatus includes a detection unit that detects a degree of inconvenience to a user who is a target of authority setting, and a setting unit that sets an authority of the user in accordance with the degree of inconvenience.Type: GrantFiled: March 6, 2018Date of Patent: December 20, 2022Assignee: FUJIFILM Business Innovation Corp.Inventor: Naoya Konita
-
Patent number: 11516669Abstract: The disclosure includes embodiments for an ego vehicle to detect misbehavior. According to some embodiments, a method includes receiving a V2X message from an attacker. The V2X message includes V2X data describing a location of an object at a target time. The method includes receiving a set of CPMs from a set of remote devices. The set of CPMs include remote sensor data describing a free space region within the roadway environment. The method includes determining a relevant subset of the CPMs include remote sensor data that is relevant to detecting misbehavior. The method includes determining, based at least in part on the remote sensor data of the relevant subset, that the object is not located at the location at the target time. The method includes detecting the misbehavior by the attacker based on the determination that the object is not located at the location at the target time.Type: GrantFiled: September 22, 2020Date of Patent: November 29, 2022Inventors: Takayuki Shimizu, John Kenney, Michael Clifford, Hongsheng Lu
-
Patent number: 11516013Abstract: Disclosed embodiments relate to encrypting or decrypting confidential data with additional authentication data by an accelerator and a processor. In one example, a processor includes processor circuitry to compute a first hash of a first block of data stored in a memory, store the first hash in the memory, and generate an authentication tag based in part on a second hash. The processor further includes accelerator circuitry to obtain the first hash from the memory, decrypt a second block of data using the first hash, and compute the second hash based in part on the first hash and the second block of data.Type: GrantFiled: June 28, 2018Date of Patent: November 29, 2022Assignee: Intel CorporationInventors: James Guilford, Vinodh Gopal, Kirk Yap
-
Patent number: 11509480Abstract: A method of attestation of a host machine based on runtime configuration of the host machine is provided. The method receives, at an attestation machine, a request from the host machine for attestation of a software executing on the host machine, the request including at least one security-related configuration of the software at launch time and a corresponding runtime behavior of the software when the security-related configuration changes. The method then generates a claim based on evaluating a value associated with the at least one security-related configuration and the corresponding runtime behavior of the software when the value changes. The method also generates an attestation token after a successful attestation of the software and include in the attestation token the generated claim. The method further transmits the attestation token to the host machine.Type: GrantFiled: June 30, 2020Date of Patent: November 22, 2022Assignee: VMWARE, INC.Inventors: Samyuktha Subramanian, Jesse Pool
-
Patent number: 11483287Abstract: Various example embodiments of a reliable firewall are presented herein. Various example embodiments of a reliable firewall may be configured to provide a single, stateful firewall spanning multiple routers. Various example embodiments of a reliable firewall spanning multiple routers may be configured to provide a reliable firewall configured to protect high-availability network services, network services using multipath routing, or the like, as well as various combinations thereof. Various example embodiments of a reliable firewall spanning multiple routers may be configured to provide a reliable firewall by supporting synchronization of firewall synchronization information (e.g., firewall policy information, firewall session state information, or the like, as well as various combinations thereof) across the multiple routers.Type: GrantFiled: June 13, 2018Date of Patent: October 25, 2022Assignee: Nokia Solutions and Networks OyInventors: Lawrence Menten, Michel Rochon, Prashant Shanbhag
-
Patent number: 11481523Abstract: The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory RAM and NVM and at least one bus access controller, wherein the bus access controller defines at least a first area PBL, a second area SBL and a secure area MZ. The first area comprises a first loader program capable of loading a program package in the second area. The secure area comprises an authentication key capable of authenticating the program package loaded in the second area. After authentication of the program package loaded in the second area, the access right of the first loader program is changed in such a way that a program in the first area can no more access the second area.Type: GrantFiled: December 16, 2015Date of Patent: October 25, 2022Assignee: THALES DIS FRANCE SASInventor: Alain Rhelimi
-
Patent number: 11475146Abstract: Systems and methods for providing a privacy screen to a network application accessed via an embedded browser of a client application are described. The method includes establishing, by a client application on a client device, a session to a network application hosted on a third party server. The client application includes an embedded browser for accessing the network application. The method further includes identifying, by the client application, a policy for providing a privacy screen to one or more portions of the network application, detecting, by the embedded browser, that the one or more portions of the network application are to be rendered on a display of the client device, and displaying a privacy screen including one or more masks displayed over at least the one or more portions of the network application rendered on the display of the client device via the embedded browser.Type: GrantFiled: November 8, 2018Date of Patent: October 18, 2022Assignee: Citrix Systems, Inc.Inventor: Abhishek Chauhan
-
Patent number: 11468151Abstract: A method and system are described for controlling access to online applications using memetic authenticators that are de-identified and passwordless. The method includes curating, issuing ownership, and registering memetic authenticators. The method involves assembling an authenticator package including a fingerprint hash value, matched pairs of user-selected memetic authenticator records, a timer, and encrypting the package using a cipher issued and uniquely-assigned by a service provider. Ciphers may be regenerated on each authentication event providing for episodic re-verification. Fingerprints assign ownership for memetic authenticators, with such associations stored on networked nodes of a distributed database. On authenticating, the client-supplied authenticator package is decrypted and compared to ownership records on an identity network for verification and granting or denying access.Type: GrantFiled: August 29, 2019Date of Patent: October 11, 2022Assignee: Ideola, Inc.Inventor: Daniel G. Beckett, Jr.
-
Patent number: 11455410Abstract: Embodiments of the present disclosure are directed to techniques for deriving collaborative intelligence based on constraint computing or constraint querying. At a high level, a data trustee can operate a trustee environment that derives collaborative intelligence subject to configurable constraints, without sharing raw data. The trustee environment can include a data privacy pipeline through which data can be ingested, fused, derived, and sanitized to generate collaborative data without compromising data privacy. The collaborative data can be stored and queried to provide collaborative intelligence subject to the configurable constraints. In some embodiments, the data privacy pipeline is provided as a cloud service implemented in the trustee environment and can be spun up and spun down as needed.Type: GrantFiled: April 18, 2019Date of Patent: September 27, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Tomer Turgeman, Yisroel Gershon Taber, Lev Rozenbaum
-
Patent number: 11445371Abstract: Methods, apparatus, and systems for automatically determining the access rights to be granted to a telecommunication device to the assets in a first network as a function of the access rights previously granted to that same device in another network.Type: GrantFiled: August 17, 2016Date of Patent: September 13, 2022Assignee: PCMS Holdings, Inc.Inventors: Antti V. P. Evesti, Pia E. Raitio, Pekka P. Savolainen
-
Patent number: 11438763Abstract: A process for improving network performance in systems that utilize secure domain name system (DNS) schemes. Encrypted DNS requests from devices in a local area network (LAN), such as a home or office, are submitted to a local proxy which stores cached DNS records. The proxy decrypts or examines at least a portion of the DNS request in order search for a matching record in its storage. Matching records are retrieved, encrypted, and supplied to the requesting device to satisfy the DNS request. If the proxy does not contain a matching record, the DNS query is encrypted and submitted to an external DNS server for resolution. The matching record can optionally be saved by the proxy prior to being supplied to the requesting device.Type: GrantFiled: September 25, 2019Date of Patent: September 6, 2022Assignee: Hughes Network Systems, LLCInventors: Ganeshan Ramachandran, Robert Torres, George Choquette
-
Patent number: 11438329Abstract: An authenticated data transfer system may include generating, after entry of one or more processors of a transmitting device into a communication field, a link, the link comprising a near field communication data exchange format uniform resource locator including identifier data and user data; transmitting, to a first application comprising instructions for execution on a first device, the link to initiate data transfer; authenticating a user associated with the first device by activating one or more actions based on the link; transmitting one or more requests for confirmation of quantity and recipient data associated with the data transfer; receiving one or more notifications that are based on the one or more requests for confirmation of quantity and recipient data associated with the data transfer; and performing one or more login credentials that are responsive to the one or more notifications so as to complete the data transfer.Type: GrantFiled: January 29, 2021Date of Patent: September 6, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Colin Hart, George Bergeron, Kaitlin Newman, Jeffrey Rule
-
Patent number: 11423178Abstract: A System on a Chip (SoC) includes a plurality of general purpose processors, a plurality of application specific processors, a plurality of SoC support processing components, a security processing subsystem (SCS), a general access Network on a Chip (NoC) coupled to and servicing communications between the plurality of general purpose processors and the plurality of SoC support components, and a proprietary access NoC coupled to and servicing communications for the plurality of application specific processors and the SCS. The SoC may further include a safety processor subsystem (SMS) coupled to the proprietary access NoC, wherein the proprietary access NoC further services communications for the SMS and isolates communications of the SMS from communications of the plurality of general purpose processors. The general access NoC and the proprietary access NoC isolate communications of the SCS and the SMS from communications of the plurality of general purpose processors.Type: GrantFiled: April 18, 2019Date of Patent: August 23, 2022Assignee: Tesla, Inc.Inventors: David Glasco, Patryk Kaminski, Thaddeus Fortenberry
-
Patent number: 11425132Abstract: An on-demand database system may receive a request to create a user account associated with a subdomain of the database system. The system may identify a pre-existing user account associated with a different subdomain of the database system where the pre-existing user account is associated with a personal communications address identified in the request. The system may create the requested account using personal information retrieved from the pre-existing user account.Type: GrantFiled: December 3, 2018Date of Patent: August 23, 2022Assignee: Salesforce.com, Inc.Inventors: Rafael Kabesa, Samantha Ready, Douglas Bitting, Matthew Bahrenburg, Sathish Raghunathan