Patents Examined by Huan V Doan
-
Patent number: 12225011Abstract: Computer technology for protecting data security in a computerized system for recommending content to users where, a processing unit generates an identifier for a first data record relating to a user device based on a first machine learning model. Then, the processing unit sends the identifier to a service provider, and the service provider uses the identifier to determine one or more contents to be sent to the user device. Creating and using a decision tree machine learning (ML) model and a cluster ML model with training records and a transformed records.Type: GrantFiled: June 29, 2022Date of Patent: February 11, 2025Assignee: International Business Machines CorporationInventors: Jin Wang, Lei Gao, A Peng Zhang, Dan Sun, Jing Zhang, Na Liu, Xun Pan, Zi Yun Kang
-
Event signifiers connected to social- or group-based visual representations of cryptographic objects
Patent number: 12219063Abstract: Aspects of the preset document relate to social or group-based presentation of cryptographic objects. Cryptographic objects linked to members of a group are visually represented to each group member, such as in a “binder”-like presentation. Further, group activity related to the cryptographic objects is also presented to each group member. Specific object events of the group activity are detected based on searching an immutable cryptographic ledger. The object events are categorized according to value and volume of the cryptographic objects involved in the object events. With this event data (and event data for other related object events), event signifiers are assigned to object events and presented to group members. Example event signifiers include audio, persistent visuals, and/or dynamic visuals that are connected to visual representations of the cryptographic objects involved in the object events.Type: GrantFiled: September 26, 2022Date of Patent: February 4, 2025Assignee: EMOJI ID, LLCInventors: Naveen Kumar Jain, Riccardo Paolo Spagni -
Patent number: 12192226Abstract: A system determines an on/off feature and vulnerability and dependency nodes in a graph which represents a system of components. The feature enables vulnerability nodes based on a probability that a vulnerability will be exploited, and a vulnerability degrades a utility of one or more components based on an exposure factor. The system calculates, for a path in the graph to a component, a loss of utility of a given dimension of multiple dimensions based on a combiner operator and a logic operator. The combiner operator takes inputs which represent a weighted probability that the given dimension is degraded, and the logic operator defines the inputs based on a probability and exposure factor. The system aggregates calculated losses of utility across the multiple dimensions for the system components. The system selects a combination of possible on/off feature values which results in a lowest loss of utility for the components.Type: GrantFiled: November 29, 2022Date of Patent: January 7, 2025Assignee: Xerox CorporationInventors: Marc E. Mosko, Massimiliano Albanese, Ibifubara Iganibo
-
Patent number: 12192179Abstract: The present disclosure is directed to systems and methods for dynamic firewall discovery on a service plane. The method includes the steps of identifying a source data packet for transmission from a source machine at a source site to a destination machine at a destination site, wherein the source data packet corresponds to a request for connection between the source machine and the destination machine over a WAN, inspecting the source data packet at a first firewall associated with the source site, marking the source data packet with a marker to indicate inspection by the first firewall, transmitting the marked source data packet to the destination site, determining at the destination site that the source data packet has been inspected based on the marker, and forwarding the source data packet to the destination machine at the destination site, without inspection of the source data packet by a second firewall associated with the destination site.Type: GrantFiled: August 4, 2022Date of Patent: January 7, 2025Assignee: CISCO TECHNOLOGY, INC.Inventors: Balaji Sundararajan, Venkatesh Gota B R, Sireesha Yeruva, Chandramouli Balasubramanian, Anand Oswal
-
Patent number: 12184692Abstract: Herein are graph machine learning explainability (MLX) techniques for invalid traffic detection. In an embodiment, a computer generates a graph that contains: a) domain vertices that represent network domains that received requests and b) address vertices that respectively represent network addresses from which the requests originated. Based on the graph, domain embeddings are generated that respectively encode the domain vertices. Based on the domain embeddings, multidomain embeddings are generated that respectively encode the network addresses. The multidomain embeddings are organized into multiple clusters of multidomain embeddings. A particular cluster is detected as suspicious. In an embodiment, an unsupervised trained graph model generates the multidomain embeddings. Based on the clusters of multidomain embeddings, feature importances are unsupervised trained. Based on the feature importances, an explanation is automatically generated for why an object is or is not suspicious.Type: GrantFiled: December 21, 2021Date of Patent: December 31, 2024Assignee: Oracle International CorporationInventors: Valentin Venzin, Rhicheek Patra, Sungpack Hong, Hassan Chafi
-
Patent number: 12177185Abstract: Techniques are described for enabling users of a cloud provider network to create policies used to control the use of temporary security credentials by computing resources other than a computing resource to which the credentials were issued. An identity and access management service encodes, into temporary security credentials, information about the virtual private network to which the credentials are issued. When a computing resource subsequently issues requests to perform actions and uses the temporary security credentials to sign the request, the cloud provider network further adds, to the network traffic, information associated with the virtual private network from which the request originates. A user can then create a policy with a statement indicating that request are to be permitted only if, e.g., the identity of the virtual private network as encoded in the temporary security credentials matches the identity of the virtual private network identified by the information included in the request.Type: GrantFiled: September 30, 2022Date of Patent: December 24, 2024Assignee: Amazon Technologies, Inc.Inventors: Mark Ryland, Joshua Benjamin Levinson
-
Patent number: 12174951Abstract: A level estimation apparatus includes processing circuitry configured to receive event logs of events detected by a device or software, and calculate degrees of similarity among the events indicated by the event logs with use of the event logs, and estimate a level of a predetermined event based on the calculated degrees of similarity among the events and a level of at least one of the events, wherein in the calculation of the degrees of similarity among the events, when a degree of similarity between events detected by different devices or items of software is calculated, a degree of similarity to a common event is used, the common event being an event that has been detected mutually by the different devices or items of software.Type: GrantFiled: October 9, 2019Date of Patent: December 24, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiki Shibahara, Hirokazu Kodera, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato
-
Patent number: 12166860Abstract: The present inventive concept relates to a method for forming a Bluetooth network performing communication based on post-quantum cryptography at an application level and a Bluetooth network operating system that performs the same. A method for forming a Bluetooth network performed by a master device to perform Bluetooth communication with a slave device, according to an embodiment of the present invention, comprises the steps of: completing pairing with the slave device; receiving a certificate and an authentication message from the slave device; authenticating the slave device by using the certificate and the authentication message; generating a public key and a private key; generating a symmetric key by using the public key and the private key; and performing Bluetooth network communication by using the symmetric key.Type: GrantFiled: December 13, 2022Date of Patent: December 10, 2024Assignee: NORMA Inc.Inventors: Hyunchul Jung, Chang Nyoung Song
-
Patent number: 12164611Abstract: Disclosed herein is an identity network that provides a universal, digital identity for users to be authenticated by an identity provider for relying parties upon sign-in to the relying party. The identity network receives the sign-in request from a relying party for a user using a user device. The identity network can provide a session identifier to the relying party for the request and launch an identity provider application associated with the user via a software development kit in the relying party application. The user may sign-in to the identity provider via the software development kit, thereby authenticating the user for the relying party. Additionally, the identity provider may generate a risk validation score and provide it to the relying party that provides a confidence value that the user is validly using the user device and a risk score based on device activity on the identity network.Type: GrantFiled: January 8, 2024Date of Patent: December 10, 2024Assignee: Early Warning Services, LLCInventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
-
Patent number: 12155660Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that when executed by the processor, may cause the processor to identify configuration information to be used by an on-premise access management service to provide authentication services to applications by users. The processor may also transform the identified configuration information into a transformed set of configuration information to be used by a cloud-based access management service to provide authentication services to the applications by users. In addition, the processor may store the transformed set of configuration information for use by the cloud-based access management service to provide authentication services to the applications by users to migrate authentication of the users from the on-premise access management service to the cloud-based access management service.Type: GrantFiled: October 10, 2023Date of Patent: November 26, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Luis Carlos Leon Plata, Rama Mohan Rao Dintakurthi, Xin Yu Chong, Sushant Choudhary, Ramiro Calderon Romero, David Alan Gregory
-
Patent number: 12147531Abstract: In an example embodiment, a solution is provided that provides parallel executions of privileged actions in an audited and secured way. This highly impacts the resiliency of applications because it allows for quick responses in outage situations and makes maintenance activities that could prevent the outages less cumbersome.Type: GrantFiled: November 9, 2022Date of Patent: November 19, 2024Assignee: SAP SEInventors: Joachim Goennheimer, Sven Sterbling
-
Patent number: 12147518Abstract: A system includes: a first authentication unit configured to perform authentication based on biometric information that is information about a body of a first user who reserves a usage target that is a target capable of being used by the user, that is, first authentication for authenticating legitimacy of the first user; and a second authentication unit configured to perform authentication based on the biometric information of a second user who uses the usage target, that is, second authentication for authenticating that the second user is the same as the first user.Type: GrantFiled: February 1, 2021Date of Patent: November 19, 2024Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventor: Kohei Kishimoto
-
Patent number: 12141285Abstract: A method for identifying malicious software includes receiving and executing a software application, identifying a plurality of uniform resource identifiers the software application interacts with during execution of the software application, and generating a vector representation for the software application using a feed-forward neural network configured to receive the plurality of uniform resource identifiers as feature inputs. The method also includes determining similarity scores for a pool of training applications, each similarity score associated with a corresponding training application and indicating a level of similarity between the vector representation for the software application and a respective vector representation for the corresponding training application.Type: GrantFiled: December 20, 2023Date of Patent: November 12, 2024Assignee: Google LLCInventors: Richard Cannings, Sai Deep Tetali, Mo Yu, Salvador Mandujano
-
Patent number: 12126620Abstract: Account delegation is provided. A request for access to a secure system using an owner's account is received from an applier via a browser supplement module on the applier's computing device. The request is communicated to the account owner via a browser supplement module on the account owner's computing device. Approval of the request is received from the account owner. The secure system is logged into using the account owner's credential. A connection to the applier's computing device is established to act as a proxy for communication between the secure system and the applier's computing device. Further provided herein are a computer system and a computer program product for performing the method.Type: GrantFiled: November 10, 2020Date of Patent: October 22, 2024Assignee: International Business Machines CorporationInventors: Wen-Ping Chi, Andy Min-Tsung Wu, Hsiao-Yung Chen, Hsin-Yu Hsieh, Wendy Ping Wen Wang
-
Patent number: 12120117Abstract: A method and system for provisioning credentials is disclosed. The method includes receiving, by a token provider computer, a token request message from a token requestor computer that comprises an initial access identifier. The token provider computer transmits the initial access identifier to a first authorization computer, and then the token provider computer receives an intermediate access identifier. The token provider computer then transmits a token activation request message to a second authorization computer based at least in part on the intermediate access identifier. The token provider computer then receives a token activation response message from the second authorization computer. The token provider computer then provides the token to the token requestor computer.Type: GrantFiled: August 29, 2023Date of Patent: October 15, 2024Assignee: Visa International Service AssociationInventors: Katharina Fuhrmann, Stephanie Zachariae, David Petch, Andrew Whitcombe, David William Wilson, Neil Hilton, Ramesh Shankar, Sayeed Mohammed
-
Patent number: 12120129Abstract: A computer-implemented method includes receiving data comprising a plurality of application programming interface (API) requests from a plurality of client devices. The method includes generating a plurality of API sessions based on the data, wherein each of the API sessions is associated with a corresponding client device of the plurality of client devices and includes a sequence of API requests originating from the corresponding client device. The method includes comparing each of the plurality of API sessions to one or more of a plurality of different patterns indicative of permissible API sessions determined based on training data. The method includes determining one or more API sessions of the plurality of API sessions generated based on the data are abnormal based, at least in part, on the comparing. Finally, the method includes performing one or more actions based on determining the one or more API sessions are abnormal.Type: GrantFiled: January 4, 2024Date of Patent: October 15, 2024Assignee: INTUIT INC.Inventors: Itsik Yizhak Mantin, Laetitia Kahn, Sapir Porat, Yaron Sheffer
-
Patent number: 12114153Abstract: One disclosure of the present specification provides a method for an SMF node to perform authentication. The method may include the steps of: receiving, from a relay UE, a Remote UE report message related to a Remote UE connected to the relay UE; transmitting a request message to a UDM node or an AMF node on the basis of the Remote UE report message including an SUCI of the remote unit; receiving a response message, including an SUPI of the Remote UE, from the UDM node or the AMF node; and transmitting an authentication request message, requesting authentication for the Remote UE, to an authentication server.Type: GrantFiled: August 19, 2020Date of Patent: October 8, 2024Assignee: LG Electronics Inc.Inventors: Myungjune Youn, Laeyoung Kim
-
Patent number: 12101310Abstract: Techniques described herein are directed toward enabling a transfer of access rights for an electronic device between users. In embodiments a transferee device may receive a first request to obtain access rights for an electronic device associated with a transferor device. The transferor device may receive a second request to grant access rights for the electronic device. Embodiments may include receiving, at the transferee device, a device key associated with the electronic device and storing the device key in association with the electronic device. Embodiments may further include issuing a command from at least one of the transferee or transferor devices to unlock the electronic device, and causing the electronic device to comply with the command to unlock if the at least one of the transferee or transferor devices that issues the command has access to the device key when the command is issued.Type: GrantFiled: October 17, 2023Date of Patent: September 24, 2024Assignee: Lowe's Companies, Inc.Inventors: Mason E. Sheffield, Jonothon Frederick Douglas, Paul Michael Sisneros, Joseph Ygona Laurino
-
Patent number: 12086225Abstract: An image of at least a portion of a user during enrollment to a biometric identification system is acquired and processed with a first model to determine a first embedding that is representative of features in that image in a first embedding space. The first embedding may be stored for later comparison to identify the user, while the image is not stored. A second model that uses a second embedding space may be later developed. A transformer is trained to accept as input an embedding from the first model and produce as output an embedding consistent with the second embedding space. The previously stored first embedding may be converted to a second embedding in a second embedding space using the transformer. As a result, new embedding models may be implemented without requiring storage of user images for later reprocessing with the new models or requiring re-enrollment by users.Type: GrantFiled: September 22, 2021Date of Patent: September 10, 2024Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Gerard Guy Medioni, Manoj Aggarwal, Alon Shoshan, Igor Kviatkovsky, Nadav Israel Bhonker, Lior Zamir, Dilip Kumar
-
Patent number: 12081547Abstract: A method, computer system, and a computer program product for account security is provided. The present invention may include analyzing one or more financial accounts of a user and assigning a risk threshold to each of the one or more financial accounts. The present invention may include monitoring a vulnerability of each of the one or more financial accounts, wherein the vulnerability is monitored using a vulnerability score, the vulnerability score being generated based on user data. The present invention may include determining the risk threshold has been exceeded for at least one financial account based on a comparison of the vulnerability score and the risk threshold of the at least one financial account. The present invention may include preventing access to the at least one financial account in which the risk threshold has been exceeded.Type: GrantFiled: September 23, 2021Date of Patent: September 3, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Uri Kartoun, Sophie Batchelder, Sophia O Smith, Jayanth Krishnan