Patents Examined by Hosuk Song
  • Patent number: 12078980
    Abstract: A system is provided which includes at least two production units, which interact in a production process, and a verification module. Each production unit of the at least two production units includes a service module and is configured to transmit first information about one or more features of the production unit to the verification module. The verification module is configured to transmit, to at least one of the at least two production units, second information designating whether the at least two production units exhibit an admissible configuration or whether the at least two production units exhibit no admissible configuration.
    Type: Grant
    Filed: May 5, 2021
    Date of Patent: September 3, 2024
    Assignee: Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e. V.
    Inventors: Philip Kleen, Sebastian Schriegel
  • Patent number: 12072847
    Abstract: Systems and methods of providing immutable records, and immutable ordering of records, in a computing system are disclosed. The computing system can be a member of a blockchain network of a plurality of blockchains. Each block can include a cryptographic digest (or hash) conforming to a minimum degree of difficulty, a nonce by which the cryptographic digest was generated in conformation with the degree of difficulty, and a list of cryptographic digests of most recent blocks of participating neighbor blockchains. Blocks may be passed between blockchains of the plurality of blockchains, which enables each member of the blockchain network to verify an immutable record of data transactions free of the mutual trust requirement of a typical blockchain environment. In conjunction with the generation of each block, an event record may be entered into an event log of the computing system wherein the block was generated. The event record, which may contain actionable instructions, requests, etc.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: August 27, 2024
    Assignee: Uledger, Inc.
    Inventor: Taulant Ramabaja
  • Patent number: 12074874
    Abstract: Systems for providing high-fidelity data management for cross domain analytics may include multiple components. An access management function component may control access to data stored in a data store of a business domain by a user account associated with a search engine domain. A data management function component may select based on at least one of one or more data access privileges for the user account associated with the search engine domain or one or more privacy policies, a data view of multiple data views for viewing the data, and one or more data filters for application to the data. An external API manager component may store in the data store of the business domain cross correlation information that correlates a plurality of machine learning model identifiers of machine learning models of the search engine domain with one or more corresponding business APIs of the business domain.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: August 27, 2024
    Assignee: National Association of Convenience Stores
    Inventor: Gray Taylor
  • Patent number: 12075240
    Abstract: An authentication method and apparatus are provided. In an embodiment, the authentication method includes: receiving, by a first network node, an enrollment request from a second network node; obtaining, by the first network node, position information of the second network node; and authenticating, by the first network node, the second network node according to the obtained position information of the second network node. A flexible simple authentication solution is provided, having low deployment costs.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: August 27, 2024
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventor: Lin Qi
  • Patent number: 12075245
    Abstract: In a wireless communication network, a wireless access node receives an encrypted slice certificate from a wireless user device and transfers the encrypted slice certificate to a network control-plane. The network control-plane decrypts the encrypted slice certificate and determines a correspondence between expected characteristics and the slice characteristics from the decrypted slice certificate. The network control-plane authorizes the wireless user device for the wireless network slice based on the correspondence. In response to the authorization, the network control-plane transfers user context for the wireless network slice to the wireless access node and a network user-plane. The wireless access node exchanges user data between the wireless user device and the network user-plane per the user context. The network user-plane exchanges the user data between the wireless access node and a data system per the user context.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: August 27, 2024
    Assignee: T-MOBILE INNOVATIONS LLC
    Inventors: Marouane Balmakhtar, Lyle Walter Paczkowski
  • Patent number: 12067109
    Abstract: Aspects of the invention are directed towards methods and systems for managing access of an application. One or more embodiments of the invention describe receiving an indication from a user to access an application. One or more embodiments of the invention further describe determining whether a user device is in an offline mode and if the user device is in the offline mode, prompting the user to input user credentials. Furthermore, the embodiments of the invention also describe receiving the user credentials from the user and validating the user credentials of the user with pre-stored user credentials. Accordingly, access of the application to the user is controlled based on said validation.
    Type: Grant
    Filed: May 20, 2020
    Date of Patent: August 20, 2024
    Assignee: CARRIER CORPORATION
    Inventors: Ramesh Lingala, Gowthami Vuradi, Adam Kuenzi
  • Patent number: 12063228
    Abstract: In one embodiment, a method comprises: receiving, by a process, an executed function flow of a daisy chained serverless function-as-a-service (FaaS) function, the executed function flow having been injected with a particular trace identifier in response to an initial event trigger and span identifiers having been injected by each service that was executed; generating, by the process, a serverless flow graph associated with the particular trace identifier based on linking a path of serverless functions according to correlation of the span identifiers between the serverless functions; performing, by the process, a trace-based analysis of the serverless flow graph through comparison to a baseline of expectation; detecting, by the process, one or more anomalies in the serverless flow graph according to the trace-based analysis; and mitigating, by the process, the one or more anomalies in the serverless flow graph.
    Type: Grant
    Filed: December 22, 2021
    Date of Patent: August 13, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Akram Ismail Sheriff, Rajiv Asati, Nagendra Kumar Nainar, Ariel Shuper, Hendrikus G. P. Bosch
  • Patent number: 12061584
    Abstract: An objective of the present invention is to make a search for illegal (illegitimate) content more efficient. The illegitimate content relates to content posted by an unauthorized user without a legitimate ownership of the content. An illegitimate content search device according to the present invention comprises: a query generation dictionary storage part for storing a query generation dictionary for generating a search query used in searching for illegitimate content; a query generation dictionary creation part for extracting, from a title of illegitimate content, associated wording being associated with wording included in a title of legitimate content, and registering the extracted associated wording in the query generation dictionary for generating the search query used in searching for the illegitimate content; and a search query generation part for generating the search query using the associated wording registered in the query generation dictionary.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: August 13, 2024
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Hiroko Muto, Takahito Kawanishi, Osamu Yoshioka, Ryo Kitahara
  • Patent number: 12063514
    Abstract: In various embodiments supporting directional security, a user equipment (UE) may receive from a network device a noise resource allocation including an indication of a noise direction and a noise parameter, generate a noise signal based at least in part on the noise parameter, and transmit the noise signal in the noise direction while transmitting a communication transmission signal in a different direction from the noise direction. In various embodiments, a network device may determine a geographic zone of interest, select one or more reconfigurable intelligent surfaces (RISs) associated with the geographic zone of interest, selecting one or more noise transmitting UEs, control the one or more noise transmitting UEs to transmit at least one noise signal, and control the one or more RISs to steer the at least one noise signal into the geographic zone of interest.
    Type: Grant
    Filed: January 14, 2022
    Date of Patent: August 13, 2024
    Assignee: QUALCOMM Incorporated
    Inventors: Anantharaman Balasubramanian, Shuanshuan Wu, Kapil Gulati, Sourjya Dutta, Junyi Li, Navid Abedini, Preeti Kumari
  • Patent number: 12056908
    Abstract: A method for processing microscope images comprises: acquiring a microscope image captured by a microscope; identifying at least one image section with sensitive information within the microscope image by means of an image processing program which uses provided reference information regarding sensitive information; rendering unrecognizable the at least one identified image section with sensitive information in order to generate an anonymized image; and outputting the anonymized image.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: August 6, 2024
    Assignee: Carl Zeiss Microscopy GmbH
    Inventors: Manuel Amthor, Daniel Haase, Thomas Ohrt
  • Patent number: 12052340
    Abstract: A stack of rotating discs drilled with randomized holes allow a light fluid L to rise into a chamber filled with heavier fluid H, as a randomized stream of bubbles. The two fluids are mutually non-soluble, and of different electric conductivity, hence the randomized stream of bubbles generates a randomized curve of electrical resistance within the chamber, over time; this output resistance curve is shared by all parties that have a duplicate of the contraption and apply the same activation settings. The physical complexity of the contraptions keeps the randomness secure against all parties not in possession of the contraption. Unlike Entanglement and BB84 solutions, this invention generates shared randomness without communicating the same between the parties.
    Type: Grant
    Filed: September 4, 2023
    Date of Patent: July 30, 2024
    Inventor: Gideon Samid
  • Patent number: 12041179
    Abstract: A digital signature terminal device and a secure communication method are provided. The digital signature terminal includes a first module and a second module. The first module includes a communication component configured to communicate with outside and includes a central unit. The central unit includes a memory configured to store data received by the communication component. The central unit is configured to receive an operation from a user, and is controlled, in response to the operation from the user, to be simultaneously connected to the second module and disconnected from the communication component or to be simultaneously disconnected from the second module and connected to the communication component. The second module includes a signature component configured to generate a digital signature for the data, and the second module is configured to send the digital signature to the memory.
    Type: Grant
    Filed: August 26, 2021
    Date of Patent: July 16, 2024
    Assignee: SHANGHAI FINANASIA INC.
    Inventor: Dongxiao Shaw
  • Patent number: 12039463
    Abstract: An example computer-implemented method includes receiving agricultural data records comprising a first set of yield properties for a first set of seeds grown in a first set of environments, and receiving genetic feature data related to a second set of seeds. The method further includes generating a second set of yield properties for the second set of seeds associated with a second set of environments by applying a model using the genetic feature data and the agricultural data records. In addition, the method includes determining predicted yield performance for a third set of seeds associated with one or more target environments by applying the second set of yield properties, and generating seed recommendations for the one or more target environments based on the predicted yield performance for the third set of seeds. In the present example, the method also includes causing display of the seed recommendations.
    Type: Grant
    Filed: February 27, 2023
    Date of Patent: July 16, 2024
    Assignee: CLIMATE LLC
    Inventors: Jason K. Bull, Tonya S. Ehlmann, Dongming Jiang, Brian Lutz, James C. Moore, III, Timothy Reich, Herbert Ssegane, Guomei Wang, Xuefei Wang, Liwei Wen, Xiao Yang
  • Patent number: 12039085
    Abstract: A computer device performs operations for managing registry access. The computing device can determine a set of registry access rules relevant to the user process. The computing device can perform an evaluation of a registry operation requested by the user process using the set of registry access rules. The computing device can determine an action based on the evaluation. The action can include one of blocking the registry operation in relation to a particular key in a registry of the operating system, and enabling access to a particular key in the registry of the operating system to perform the requested registry operation.
    Type: Grant
    Filed: June 22, 2023
    Date of Patent: July 16, 2024
    Assignee: Avecto Limited
    Inventors: John Goodridge, Ian James McLean
  • Patent number: 12041165
    Abstract: A key updating method includes receiving, by a terminal, a key updating notification sent by an operation server, generating, by the terminal, a new private key and a new public key using a trusted execution environment (TEE) system of the terminal, storing the new private key in the TEE system, performing signature processing on the new public key using an upper-level private key of the new private key to obtain to-be-verified signature information, and sending, by the terminal to the operation server, a storage request carrying a device identifier of the terminal, the new public key, and the to-be-verified signature information.
    Type: Grant
    Filed: July 6, 2021
    Date of Patent: July 16, 2024
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Xuan Ye
  • Patent number: 12041095
    Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.
    Type: Grant
    Filed: July 14, 2023
    Date of Patent: July 16, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
  • Patent number: 12033142
    Abstract: A method 1000 for authenticating operations within consent architecture includes obtaining an operation request 142 requesting a service application 140 to access a remote entity 130 to perform an operation (138). The method also includes issuing, by the service application, an authentication request 152 requesting an authenticator application 150 to obtain user authentication credentials 154 for authenticating a user 12 before the remote entity performs the operation. The method also includes encrypting, by the authenticator application, the obtained user authentication credentials using a public key 132 of the remote entity. The service application is restricted from obtaining the user authentication credentials in unencrypted form.
    Type: Grant
    Filed: August 21, 2019
    Date of Patent: July 9, 2024
    Assignee: Google LLC
    Inventors: Hannia Zia, Heman Khanna, Animesh Chatterji, Stavan Parikh, Ridhima Kedia, Bogdan Brinzarea Iamandi
  • Patent number: 12028355
    Abstract: Aspects of the disclosure relate to enhancing hybrid traditional neural networks with liquid neural networks for cyber security and offense protection. A computing platform may receive a request to access enterprise organization data. The computing platform may compare the current request to previous requests to determine whether a similar request was previously processed. If a similar request was not previously processed, the computing platform may flag the request as a threat and may analyze the request. The computing platform may extract data from the request and may use the extracted data to generate rules, threat detection algorithms, and training models. The computing platform may use the rules, threat detection algorithms, and training models to train a deep learning neural network to identify and handle threats to an enterprise organization.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: July 2, 2024
    Assignee: Bank of America Corporation
    Inventor: Elvis Nyamwange
  • Patent number: 12026278
    Abstract: A system for securely storing personal information and memories of a user, such as through a software application, is disclosed. In particular, the system may utilize the application to transition the personal information and memories from cloud storage to cold storage and/or to an air-gapped data storage system. The personal information and memories of the user may be secured by the system using blockchain technology, multi-factor authentication, and/or other security technologies. The system may ensure that the information is highly secured until the user has passed and a next of kin of the user and/or other intended recipient of the user's information successfully authenticates with the system, such as by presenting a valid death certificate and/or acceptable credential. If the intended recipient of the data successfully provides a valid death certificate and/or credential, the intended recipient may be provided with access to the data associated with the user.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: July 2, 2024
    Assignee: DIGITAL LEGACY AI, INC.
    Inventor: Glenn W. Devitt
  • Patent number: 12026265
    Abstract: An information system is provided that enables stakeholders to define a secure data object that sets permissions, rules, and rights for an asset. The secure data object may be communicated to entities, such as computer hosts or hardware agents, and the entities are enable to act within the permissions, rules, and rights to conduct transactions and gather information as agents of the stakeholders. The secure data object may be received into a hardware agent attached to an asset, and the agent may have sufficient permission to monitor environmental conditions, adjust pricing, consummate a transaction, or communicate a report.
    Type: Grant
    Filed: October 10, 2020
    Date of Patent: July 2, 2024
    Inventors: Paul Atkinson, Jack Donner