Patents Examined by Hosuk Song
  • Patent number: 12010142
    Abstract: A generative adversarial network and a reinforcement learning system are combined to generate phishing emails with adaptive complexity. A plurality of phishing emails are obtained from a trained generative adversarial neural network, including a generator neural network and a discriminator neural network. A subset of phishing emails is selected, from the plurality of phishing emails, using a reinforcement learning system trained on user-specific behavior. One or more of the subset of phishing emails are sent to a user email account associated with a particular user. The reinforcement learning system is then adjusted based on user action feedback to the one or more of the subset of phishing emails.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: June 11, 2024
    Inventors: Alok Singh, Nitish Kumar, Kanishka Kayathwal
  • Patent number: 11995195
    Abstract: The present disclosure provides a system, device and method for data management. The system includes a processor configured to: receive, from an entity, data packets; receive, from the entity; generate a plurality of shares pertaining to the data packets by applying a threshold scheme to the data packets; and distribute the plurality of shares amongst at least two secure cryptoprocessors, wherein each secure cryptoprocessor allows access to the plurality of shares stored within it upon receipt of a corresponding second password, and wherein the processor is configured to re-generate the data packets from a threshold number of shares out of the plurality of generated shares, the value of the threshold number being predetermined.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: May 28, 2024
    Inventors: Rohan Hari Agarwal, Vipul Saini
  • Patent number: 11997073
    Abstract: A system, method, and computer-readable medium for performing a data center monitoring and management operation.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: May 28, 2024
    Assignee: Dell Products L.P.
    Inventors: Elie A. Jreij, Dominique Prunier, Sudhir V. Shetty, Eric Williams, Michael E. Brown
  • Patent number: 11994919
    Abstract: A main housing portion of a portable information handing system. The main housing portion includes: a top cover portion; a bottom cover portion; and, an information handling system locking system, the information handling system locking system including a bottom cover locking component, the bottom cover locking component being mounted to the bottom cover, the bottom cover locking component defining a bottom cover locking portion aperture, the bottom cover locking portion aperture being aligned with the top cover aperture.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: May 28, 2024
    Assignee: Dell Products L.P.
    Inventors: Nicholas D. Grobelny, Jason S. Morrison, Patrick A. Hampton, Michael David, Ernesto Ramirez
  • Patent number: 11989282
    Abstract: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations that include generating a key pair and encrypting a data credential with a public key to make a data credential secret. The operations may further include storing the data credential secret in a cluster on a host and deploying a workload on the cluster. The operations may also include establishing an empty bundle in the host and generating a pod trusted execution environment.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: May 21, 2024
    Assignee: International Business Machines Corporation
    Inventors: Da Li Liu, Qi Feng Huo, Yuan Yuan Wang, Lei Li, Yan Song Liu
  • Patent number: 11991181
    Abstract: A method of multi-factor authentication, the method comprising computer executed steps, the steps comprising: from a computer of a cloud service, receiving data identifying a user logged-in to the cloud service after being successfully authenticated using a first authentication factor, communicating with a client device of the logged-in user, for receiving a second authentication factor from the logged-in user, determining whether the second authentication factor received from the logged-in user is valid, based on a result of the determining, determining a first user-permission policy for the logged-in user, and communicating the determined first user-permission policy to the computer of the cloud service, for the cloud service to base a restriction of usage of the cloud service by the logged-in user on.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: May 21, 2024
    Inventor: Doron Milchtaich
  • Patent number: 11983224
    Abstract: Provided are a data presentation system, method and device, and a computer-readable storage medium. The data presentation system includes: a data collection device configured to collect multiple service system data each from a respective data source and store the service system data in a database; a data parsing device configured to obtain the multiple service system data from the database, and parse each service system data through a respective data model to obtain a data block corresponding to the respective data source; a request responding device configured to: in response to a data request sent by a client, obtain the data block matching the data request as a demanded data block; and a data sending device configured to send the demanded data block to the client to enable a display interface of the client to display the demanded data block.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: May 14, 2024
    Inventors: Chunyang Wang, Huan Wu
  • Patent number: 11977669
    Abstract: Methods and systems for securing data processing systems are disclosed. A data processing system may be operably connected to other devices via ports. When operably connected, some devices connected via the ports may cause undesired actions to be performed. To limit physical access to the ports, a security apparatus may be used to lock the ports. The security apparatus may transition between states where it may be inserted into openings for the ports and may be locked to the openings for the ports. When so locked, physical access to the ports may be limited.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: May 7, 2024
    Assignee: Dell Products L.P.
    Inventors: Jason Scott Morrison, Nicholas D. Grobelny, Mark Andrew Schwager
  • Patent number: 11956226
    Abstract: Methods and systems for performing operations comprising: receiving, by a server from a client device, a request to access a data object comprising one or more medical records, the request comprising authentication information; determining, by the server, that the authentication information is valid; in response to determining that the authentication information is valid, transferring, by the server, the data object to a temporary storage location; transmitting a first portion of the data object to the client device from the temporary storage location; and deleting the first portion of the data object from the temporary storage location after the first portion of the data object has been transmitted to the client device.
    Type: Grant
    Filed: July 29, 2021
    Date of Patent: April 9, 2024
    Assignee: Evernorth Strategic Development, Inc.
    Inventors: Jason Teeple, Baird Kaake
  • Patent number: 11954206
    Abstract: Systems, methods, and devices securely boot processors and nonvolatile memories. Methods include implementing, using a controller of a secured nonvolatile memory, a validation operation on a first portion of code stored in a first secured storage region of the secured nonvolatile memory, the validation operation comprising computing a validation value. Methods also include retrieving a second portion of code from a second secured storage region, the second portion of code comprising a pre-computed validation value, the first and second portion of code being associated with booting a processor, and implementing a comparison operation of the validation value and the pre-computed validation value. Methods further include generating, using the controller, a signal based on a result of the comparison operation, the signal being provided to the processor via an interface of the secured nonvolatile memory, and the signal enabling booting of the processor in response to a matching comparison operation.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: April 9, 2024
    Assignee: Infineon Technologies LLC
    Inventors: Sandeep Krishnegowda, Zhi Feng
  • Patent number: 11947687
    Abstract: A computer-implemented method for securely transferring a secret from a source computing component to a target computing component, wherein the source computing component and the target computing component are part of a secure computing environment is disclosed. The method comprises upon the source computing component receiving from the target computing component a signed attestation document, verifying, by the source computing component, an authenticity and content of the attestation document, and upon a successful verification of the authenticity and the content, transferring, by the source computing component the secret to the target computing system. Thereby, the attestation document is attesting that the target computing component is compliant to an update governance rule.
    Type: Grant
    Filed: September 27, 2021
    Date of Patent: April 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Florian Fritz, Timo Kussmaul, Dennis Zeisberg, Angel Nunez Mencias, Dimitrij Pankratz, Stefan Liesche, Sebastian Hense
  • Patent number: 11947635
    Abstract: An objective of the present invention is to achieve greater efficiency in searches for illegal (illegitimate) content. The illegitimate content relates to content posted by an unauthorized user without a legitimate ownership of the content. An illegitimate content search device according to the present invention comprises: a content profile acquisition part for acquiring a profile including a posting history of illegitimate content posted by a user having posted candidate content being potentially illegitimate content; and a matching priority calculation part for calculating, on the basis of the profile, the priority of the candidate content with regard to determining whether a plurality of pieces of content is illegitimate content, and elevating the priority of the illegitimate content with a history of having posted the illegitimate content higher than if content without the history.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: April 2, 2024
    Inventors: Hiroko Muto, Takahito Kawanishi, Osamu Yoshioka, Ryo Kitahara
  • Patent number: 11934499
    Abstract: There are provided systems and methods for contact lookup operations during inoperability of mobile devices. A service provider, such as an online transaction processor, may provide additional services for secure contact lookup when a computing device of a user is nonoperational or unavailable. The user may establish a contact identifier and authentication mechanism with the service provider and allow access to the user's contacts. Once established, when the user's device is unable to access contacts and/or communication with other devices, the user may utilize the service provider for contact access through a contact lookup system. The user may utilize a different device to access a communication system or application and retrieve a data structure representing the user's contacts. The data structure may then be passed to the corresponding communication system or application interface system, which may then be output to the user.
    Type: Grant
    Filed: May 4, 2021
    Date of Patent: March 19, 2024
    Assignee: PAYPAL, INC.
    Inventor: Venkatesh Gnanasekaran
  • Patent number: 11934545
    Abstract: A system and method for authenticating a user from file protocol for viewing secure data in a browser is provided. The authentication method requires a server dedicated to validate authToken for monitoring document access requests and enforcing rules and policies to limit access to others having invalid authToken. Further, the method for authenticating a user for viewing a secured file in a browser, comprising using cross origin security policies; using history trick functions for redirecting the user back to the file; using signed tokens for making authentication context tampering resistant; using combination of AUTH session token and secret to support multiple AUTH sessions; and using multiple use cases where multiple files can be opened simultaneously with different authorization requirements.
    Type: Grant
    Filed: June 22, 2021
    Date of Patent: March 19, 2024
    Assignee: FORTRA, LLC
    Inventor: Anirudhan Rajagopalan
  • Patent number: 11924334
    Abstract: A quantum neural network architecture. In one aspect, a quantum neural network trained to perform a machine learning task includes: an input quantum neural network layer comprising (i) multiple qubits prepared in an initial quantum state encoding a machine learning task data input, and (ii) a target qubit; a sequence of intermediate quantum neural network layers, each intermediate quantum neural network layer comprising multiple quantum logic gates that operate on the multiple qubits and target qubit; and an output quantum neural network layer comprising a measurement quantum gate that operates on the target qubit and provides as output data representing a solution to the machine learning task.
    Type: Grant
    Filed: March 3, 2023
    Date of Patent: March 5, 2024
    Assignee: Google LLC
    Inventors: Hartmut Neven, Edward Henry Farhi
  • Patent number: 11914695
    Abstract: The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are mapped to available resources based on a model architecture for the secure element in order to provide hardware abstraction, the available physical resources varying based on the model architecture and an associated host device, the virtual resources allowing consistent interaction with the virtual resources regardless of variation in the physical resources available and their location. The hardware abstraction increases the versatility of the secure element and may contribute to the secure element's functionality. The secure element providing functionality to replace most items carried in an individual's pockets, e.g., logical and physical keys, a thumb drive, identification, credit and debit cards, etc.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: February 27, 2024
    Assignee: PROXENSE, LLC
    Inventor: John Joseph Giobbi
  • Patent number: 11907386
    Abstract: A platform root-of-trust system includes a System Control Processor (SCP) subsystem coupled to a central processing subsystem, a BIOS subsystem, and an I/O device. In response to an initialization instruction, the SCP subsystem begins initialization operations prior to the beginning of initialization operations for the central processing subsystem, the BIOS subsystem, and the I/O device. As part of SCP initialization operations, the SCP subsystem validates SCP subsystem initialization information to provide validated SCP subsystem initialization information, and uses the validated SCP subsystem initialization information to complete the SCP initialization operations.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: February 20, 2024
    Assignee: Dell Products L.P.
    Inventors: Mukund P. Khatri, Robert W. Hormuth, Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mark Steven Sanders, Walter A. O'Brien, III
  • Patent number: 11899831
    Abstract: Examples described herein relate to a method for managing hardware changes at an enclosure and a server. The enclosure includes a server and multiple hardware devices connected to the enclosure. A chassis manager in the enclosure is communicatively coupled to a manageability controller of the server and the multiple hardware devices. On enabling tamper detection, the manageability controller and the chassis manager monitor the hardware devices for determining changes in the hardware devices. A change in a hardware device is compared with a permissible hardware change to determine whether the change in the hardware device is unauthorized. The permissible hardware changes include changes in hardware devices that are permitted by a customer. Security actions are performed at the server and the enclosure if unauthorized changes in the hardware device are detected by the manageability controller and chassis manager.
    Type: Grant
    Filed: September 15, 2021
    Date of Patent: February 13, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Bharath Ramesh, Justin York
  • Patent number: 11888873
    Abstract: Systems and methods are provided to generate an attack surface for a protected entity. The method an include receiving identifying information associated with the protected entity; scanning one or more third parties to identify a host associated with the protected entity; determining that the host resolves to a webpage; resolving the webpage; extracting a uniform resource locator (URL) from the resolved webpage; determining, based on at least one rule, that the URL is associated with the protected entity; and generating the attack surface for the protected entity, the attack surface comprising the URL.
    Type: Grant
    Filed: October 24, 2022
    Date of Patent: January 30, 2024
    Assignee: ZeroFOX, Inc.
    Inventors: Jason Emile Sumpter, James Christopher Foster, Michael Morgan Price
  • Patent number: 11886558
    Abstract: Methods and systems for authenticating users based on contextual data in a privacy preserving way are disclosed.
    Type: Grant
    Filed: November 22, 2021
    Date of Patent: January 30, 2024
    Assignee: OneSpan North America Inc.
    Inventor: Pradip Mainali