Patents Examined by Howard H. Louie
  • Patent number: 11509479
    Abstract: Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user is prompted to use a client device, such as a smartphone, to initiate an authentication flow. A soundwave is played through the voice assistant device that contains a secret key, which is then sent to an assistant connection service along with a token identifying the user or the user's device. An association between the user account and the voice assistant device can then be created.
    Type: Grant
    Filed: June 4, 2019
    Date of Patent: November 22, 2022
    Assignee: VMware, Inc.
    Inventors: Ramanandan Nambannor Kunnath, Ramani Panchapakesan, Ajay Bhat, Pranav Shenoy
  • Patent number: 11507666
    Abstract: Trusted execution environment verification of a software package. An operating system (OS) initiates a software package verification process in a trusted execution environment, the OS being part of an OS environment comprising a file system. It is determined that a first software package in a software repository is to be installed into the OS environment. The first software package is downloaded to a storage device. The OS sends, to the software package verification process, first location information that identifies a location of the first software package. The OS receives, from the software package verification process, information that indicates that the first software package on the storage device is trusted.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: November 22, 2022
    Assignee: Red Hat, Inc.
    Inventor: Michael H. M. Bursell
  • Patent number: 11503000
    Abstract: Technologies for secure I/O data transfer includes a compute device, which includes a processor to execute a trusted application, an input/output (I/O) device, and an I/O subsystem. The I/O subsystem is configured to establish a secured channel between the I/O subsystem and a trusted application running on the compute device, and receive, in response to an establishment of the secured channel, I/O data from the I/O device via an unsecured channel. The I/O subsystem is further configured to encrypt, in response to a receipt of the I/O data, the I/O data using a security key associated with the trusted application that is to process the I/O data and transmit the encrypted I/O data to the trusted application via the secured channel, wherein the secured channel has a data transfer rate that is higher than a data transfer rate of the unsecured channel between the I/O device and the I/O subsystem.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: November 15, 2022
    Assignee: INTEL CORPORATION
    Inventors: Reshma Lal, Luis S. Kida, Soham Jayesh Desai
  • Patent number: 11475457
    Abstract: A data attack detection system that includes a record host and an orchestration host. The record host stores account information for card holders. The orchestration host includes a switch interface configured to receive transaction information for a card from a network. The orchestration host further includes a velocity trap engine that stores received transaction information for the card in a cardholder file. The velocity trap engine creates entries in a velocity transaction timestamp record for the card when the number of transactions for the card in the cardholder record within a first predetermined time interval exceeds a first activity level threshold. The velocity trap engine discontinues a transaction flow between the orchestration host and the record host for the card when the number of transactions for the card in the velocity transaction timestamp record within a second predetermined time interval exceeds a second activity level threshold.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: October 18, 2022
    Assignee: Bank of America Corporation
    Inventors: Therese H. Willis, James J. Park, Paul Marziani, Jeetendra H. Jain, Eric W. Doyle, Vikash Damani, Chinmay S. Barhale
  • Patent number: 11477165
    Abstract: Techniques for securing containerized applications are disclosed. In some embodiments, a system, process, and/or computer program product for securing containerized applications includes detecting a new application container (e.g., an application pod); deploying a security entity (e.g., a firewall) to the application container; and monitoring all traffic to and from the application container (e.g., all layer-7 ingress, egress, and east-west traffic associated with the application container) using the security entity to enforce a policy.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: October 18, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: John Edward McDowall, Sharad Saha, Nilesh Bansal
  • Patent number: 11468201
    Abstract: A system includes a virtual machine to transmit an input/output request to a data storage system and a hypervisor configured to maintain a map of the virtual machine to a virtual disk, wherein the virtual disk is a slice of a persistent storage device. A virtual machine server is configured to maintain a map of the virtual disk to a start address and an end address and to update the input/output request with the start address, the end address, and a virtual disk identifier associated with the virtual machine. A processor determines whether the start address and the end address are valid, and if the start address and the end address are valid, then process the input/output request. The response is transmitted to the input/output request.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: October 11, 2022
    Assignee: Dell Products L.P.
    Inventors: Ankit Singh, Vinod Parackal Saby, Deepaganesh Deepaganesh Paulraj
  • Patent number: 11455399
    Abstract: An electronic device and a software provisioning server are provided. The electronic device is configured to obey an Anti-Roll Back (ARB) enforcement policy, obtain an ARB exception associated with a software, wherein the ARB exception comprises a signature of the ARB exception and a revision number of the software, check the validity of the signature of the ARB exception, and execute the software having the revision number so as to overrun the ARB enforcement policy if the signature of the ARB exception is valid. The software provisioning server is configured to determine an ARB exception associated with a software for overrunning an ARB enforcement policy in an electronic device, wherein the ARB exception comprises a signature of the ARB exception and a revision number of the software, provide the ARB exception to the electronic device.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: September 27, 2022
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Janne Hirvimies, Sampo Sovio
  • Patent number: 11451405
    Abstract: Various methods and systems are provided for providing on-demand emergency management. On-demand emergency management includes emergency management operations (e.g., certificate update operations or managed-secrets rollover operations) for accelerated deployment and expedited installation of certificates or secrets. In operation, a host secret manager on a host machine communicates with client secret managers on virtual machines running the host machine, to provide expedited installation of secrets on the virtual machines. During the certificate update operations, the host secret manager communicates the certificate update secret package having a new secret state to a client secret manager that installs the new certificate state on the virtual machine.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: September 20, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Brian Scott Lounsberry, Saurav Sinha, Chuanxin Fang, Ashok Chandrasekaran
  • Patent number: 11444783
    Abstract: Computer-implemented methods, apparatuses, and system for processing transactions using a blockchain integrated station are provided. The blockchain integrated station includes a central processing unit (CPU) and a smart network card, wherein the smart network card comprises a processor different from the CPU. The smart network card is configured to receive a transaction of a blockchain network, wherein the blockchain integrated station is a blockchain node of the blockchain network; write the transaction into a cache; in a process that the blockchain integrated station participates in a blockchain consensus of the blockchain network, perform consensus interactions with other blockchain nodes of the blockchain network based on the transaction in the cache; determine, based on a result of the blockchain consensus, a to-be-executed transaction list; and send the to-be-executed transaction list to the CPU.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: September 13, 2022
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Jiang Wang, Fuxi Deng, Chao Zeng, Zongru Zhan, Xiaoli Liu, Zheng Cao
  • Patent number: 11435907
    Abstract: One example method includes accessing stored data, associating a unique identifier with the data, creating a hash by hashing a combination that comprises the unique identifier and the data, transmitting the hash to a notary service, receiving, from the notary service, a digital signature that corresponds to the hash, appending the digital signature to the data, and storing, as an object, a combination that comprises the digital signature, the data, and the unique identifier.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: September 6, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Yossef Saad, Radia J. Perlman, Charles William Kaufman
  • Patent number: 11423144
    Abstract: A computer implemented method to mitigate a security attack against a target virtual machine (VM) in a virtualized computing environment, the target VM having a target VM configuration including configuration parameters, and the security attack exhibiting a particular attack characteristic, is disclosed.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: August 23, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Ian Herwono
  • Patent number: 11418327
    Abstract: A key management service creates a key upon user request. The key management service receives a request for a first cryptographic operation. The key management service performs the first cryptographic operation. The key management service returns results of the first cryptographic operation to a dependent service. The key management service receives a notification of key rotation. The key management service receives a request for a second cryptographic operation. The key management service performs the second cryptographic operation. The key management service returns results of the second cryptographic operation to the dependent service. The key management service returns updated key metadata to the dependent service.
    Type: Grant
    Filed: November 14, 2019
    Date of Patent: August 16, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark Duane Seaborn, Karunakar Bojjireddy, Erlander Lo
  • Patent number: 11406196
    Abstract: A multi-factor authentication method and system is provided such that a push notification during an authentication process is only received if a mobile device and user are authenticated prior to receiving the push notification. Either the mobile device itself or a second device sending the push notification may be programmed to either reject or not forward the authentication request. Additionally, using the method of the present invention, enhanced security is provided by requiring the location of the mobile device and the second device to be approximately in the same geographical location.
    Type: Grant
    Filed: February 9, 2017
    Date of Patent: August 9, 2022
    Assignee: Traitware, Inc.
    Inventors: Christopher M. Canfield, Herbert W. Spencer, III, Andrew Heath Spencer, Todd S. Hickerson
  • Patent number: 11403409
    Abstract: An example computer-implemented method includes presenting, by a hardware control of a computing system, an exception to an untrusted entity when the untrusted entity accesses a secure page stored in a memory of the computing system, the exception preventing the untrusted entity from accessing the secure page. The method further includes, in response to the exception, issuing, by the untrusted entity, an export call routine. The method further includes executing, by a secure interface control of the computing system, the export call routine.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: August 2, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan D. Bradbury, Martin Schwidefsky, Christian Borntraeger, Lisa Cranton Heller, Heiko Carstens, Fadi Y. Busaba
  • Patent number: 11347884
    Abstract: An apparatus includes a memory that stores a plurality of records and a hardware processor. The processor receives a request for a first record and a second record of the plurality of records and divides, based on a type of the first record and a type of the second record, the first record into a first portion and a second portion and the second record into a third portion and a fourth portion. The processor also creates a first chunk using the first portion of the first record and the third portion of the second record and creates a second chunk using the second portion of the first record and the fourth portion of the second record. The processor further scrubs the first chunk to create a first message, scrubs the second chunk to create a second message, and communicates the first and second messages to an external device.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: May 31, 2022
    Assignee: Bank of America Corporation
    Inventors: Rajesh Narayanan, Manu Jacob Kurian
  • Patent number: 11341233
    Abstract: Disclosed are various approaches for enforcing policies for unmanaged applications. A user supplied script can be evaluated to determine whether an application is installed on a computing device. In response to a determination that the application is installed on the computing device, a request can be sent to a management service for at least one policy applicable to the application. The policy can be evaluated to determine whether the application complies with the policy.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: May 24, 2022
    Assignee: VMware, Inc.
    Inventors: Shravan Shantharam, Kalyan Regula, Joshua Dobelstein, Sharath Chowdary Gude, Nigitha Alugubelli, Xueliang Hua
  • Patent number: 11321456
    Abstract: A method for protecting a machine learning (ML) model is provided. During inference operation of the ML model, a plurality of input samples is provided to the ML model. A distribution of a plurality of output predictions from a predetermined node in the ML model is measured. If the distribution of the plurality of output predictions indicates correct output category prediction with low confidence, then the machine learning model is slowed to reduce a prediction rate of subsequent output predictions. If the distribution of the plurality of categories indicates correct output category prediction with a high confidence, then the machine learning model is not slowed to reduce the prediction rate of subsequent output predictions of the machine learning model. A moving average of the distribution may be used to determine the speed reduction. This makes a cloning attack on the ML model take longer with minimal impact to a legitimate user.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: May 3, 2022
    Assignee: NXP B.V.
    Inventors: Gerardus Antonius Franciscus Derks, Brian Ermans, Wilhelmus Petrus Adrianus Johannus Michiels, Christine van Vredendaal
  • Patent number: 11316879
    Abstract: A computer-implemented method and system for protecting a host computer in a computer network from security threats uses local security-relevant data for the host computer, as well as global security-relevant data for other components in the computer network downloaded from a security information plane system to the host computer, to determine a security threat to the host computer. When a security threat is determined to be a legitimate threat, a security alert is issued, and then an action is initiated in response to the security alert.
    Type: Grant
    Filed: January 23, 2019
    Date of Patent: April 26, 2022
    Assignee: VMWARE, INC.
    Inventors: David Ott, Lei Xu, Ruimin Sun, Vijay Ganti, Dennis R. Moreau
  • Patent number: 11308229
    Abstract: An example computer-implemented method includes presenting, by a hardware control of a computing system, an exception to an untrusted entity when the untrusted entity accesses a secure page stored in a memory of the computing system, the exception preventing the untrusted entity from accessing the secure page. The method further includes, in response to the exception, issuing, by the untrusted entity, an export call routine. The method further includes executing, by a secure interface control of the computing system, the export call routine.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: April 19, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan D. Bradbury, Martin Schwidefsky, Christian Borntraeger, Lisa Cranton Heller, Heiko Carstens, Fadi Y. Busaba
  • Patent number: 11281765
    Abstract: A method of managing tokens is provided. The method includes receiving, by a token management system from a user device, a request from a user to register a token with the token management system. The token is associated with the user and is stored by an entity computing system associated with a first entity of a plurality of entities. Each of the plurality of entities is associated with an entity computing system that stores at least one token of a plurality of tokens that are each registered with the token management system and each associated with the user. The method further includes modifying, by the token management system, the token stored by the entity computing system associated with the first entity based on a token command from the user. The modification includes associating the token with a different entity of the plurality of entities relative to the first entity.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: March 22, 2022
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Azita Asefi, Jinee K. Ellis, Alan W. Hecht, Timothy R. Knowlton, Ashish B. Kurani, Steven E. Puffer, Young M. Yang