Patents Examined by Izunna Okeke
  • Patent number: 11153071
    Abstract: A computer-implemented method comprising: accessing, at a client device, a first artifact and artifact metadata corresponding to the artifact; creating, at the client device, an artifact cryptographic digest corresponding to the artifact to certify existence of the artifact; transmitting, at the client device, the artifact cryptographic digest and artifact metadata to a server; adding, at the server device, the artifact cryptographic digest to a block chain; and adding, at the server device, the artifact cryptographic digest, the artifact metadata and the first artifact to a data storage device separate and distinct from the block chain to reference the artifact cryptographic digest on the block chain.
    Type: Grant
    Filed: September 18, 2019
    Date of Patent: October 19, 2021
    Inventors: Kevin Joseph McCurry, David Lee Kochalko, Marcos Vincente Blanco
  • Patent number: 11140152
    Abstract: This invention relates to a process for detecting and mitigating risk generated when a customer's log-in credentials are compromised. A significant majority of stolen credentials and customer's personally identifiable information data eventually make their way to the dark web. By dynamically monitoring the dark web and combining the analysis with related information about the user and their credentials on the deep web and the surface web, through a machine learning model, a service provider pre-emptively or otherwise can act to mitigate the risk arising from such compromise of said customer log-in credentials.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: October 5, 2021
    Assignee: Guardinex LLC
    Inventors: Vishal Verma, Aravind Immaneni
  • Patent number: 11139980
    Abstract: Software for immutably storing computational determinations using distributed ledgers. The software performs the following operations: (i) receiving an indication that a first computational model is ready to be deployed; (ii) storing a copy of the first computational model in a first distributed ledger; (iii) computing a hash of the first computational model using a cryptographic hash function; (iv) receiving an indication that a second computational model has been used to produce a first computational determination; (vi) receiving a hash of the second computational model; and (vii) in response to determining that the hash of the second computational model matches the hash of the first computational model, storing a record of the first computational determination in a second distributed ledger, wherein the record of the first computational determination identifies the second computational model as being the first computational model and includes the hash of the first computational model.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: October 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Bradley C. Herrin, Xianjun Zhu, Bo Zhang, Alexander Sobran
  • Patent number: 11139073
    Abstract: Disclosed are systems and methods for personalized care management. The method includes collecting login credentials of a user. The login credentials are checked and the user is authenticated accordingly. Then, user profile of the user is accessed to determine a specific role of the user. Based on the specific role of the user, a user interface is presented on a user device of the user. The user interacts with the user interface by providing at least one voice input including a request. Further, a notification is generated based on the voice input of the user for at least one user. The at least one user provides at least one voice input including a response for the user via a user interface on at least one user device of the at least one user. The response is presented to the user through the user interface.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: October 5, 2021
    Inventor: Sethumadavan Sanjay-Gopal
  • Patent number: 11122082
    Abstract: A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication via a backchannel to reduce the potential for malicious third-party impersonation of the client prior to transfer of the call to the customer call center. Pre-authorized customer support calls may be intelligently and efficiently routed directly to call center agents, without incurring further delay. During call handling, call center agents may initiate further client authentication processes, including contactless card authentication requests, over one or more different communication channels for authorizing access to sensitive information or to allay suspicion.
    Type: Grant
    Filed: October 9, 2019
    Date of Patent: September 14, 2021
    Inventors: Rajko Ilincic, Kaitlin Newman, Jeffrey Rule
  • Patent number: 11120128
    Abstract: Provided are a computer program product, system, and method for offloading processing of writes to determine malicious data from a first storage system to a second storage system. Write data for a first storage is cached in a first cache in the first storage system and copied to a second cache in the second storage system. The second storage system determines whether the copy of the write data comprises random data according to a randomness criteria. The second storage system returns a message to the first storage system indicating that the write data comprises malicious data if random or not malicious data if not random. The first storage system destages the write data in the first cache if the message indicates not malicious data or processes the write data in the first cache as malicious data if the message indicates malicious data.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Matthew G. Borlick, Lokesh M. Gupta, Carol S. Mellgren, John G. Thompson
  • Patent number: 11121876
    Abstract: A distributed access control system is disclosed. A payload is received at a voted principal from the client. The voted principal is selected from the plurality of minors. The payload is passed to the minors, and the user is verified by a consensus of the minors. A response packet, which includes an authentication unit, is prepared via a consensus of minors. The response packet can be provided to the client via the voted principal. The ledger is updated to include the authentication unit.
    Type: Grant
    Filed: April 11, 2018
    Date of Patent: September 14, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Abhijeet Haldar
  • Patent number: 11108807
    Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: August 31, 2021
    Assignee: Splunk Inc.
    Inventor: Munawar Monzy Merza
  • Patent number: 11101988
    Abstract: A transmitting device and a receiving device independently generate shared encryption keys by exchanging a ternary datastream composed of trits encoded by polarized photons generated and measured using one of two polarization orientations. The first orientation defines two mutually-orthogonal polarization axes and a mixed polarization state formed by a combination of the two axes for that orientation. The second orientation also define two mutually-orthogonal polarization axes and a mixed polarization state formed by a combination of the two axes for that orientation. The mutually-orthogonal axes of one orientation are combinations of the mutually-orthogonal axes of the other orientation. The sender and receiver independently choose an orientation for each trit and use trits where each party's polarization orientations agree to determine addresses in separate cryptographic tables belonging to each party.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: August 24, 2021
    Assignee: Arizona Board of Regents on Behalf of Northern Arizona University
    Inventor: Bertrand F Cambou
  • Patent number: 11100913
    Abstract: An always-listening-capable decoupled cap for a computing device having a communication module is disclosed, comprising an electronic sensor and a gatekeeping module. All data received by the communications module based on data from the electronic sensor passes through the gatekeeping module while a gatekeeping function is disabled, no data based on data from the electronic sensor passes through the communications module while the gatekeeping function is enabled, all data input to the gatekeeping module is received via an exclusive input lead from the electronic sensor, and all data output from the gatekeeping module is transmitted via an exclusive output lead to a component other than the electronic sensor. The cap interferes with a function of the computing device, determines that user input recorded by the first electronic sensor comprises a first input content, and changes a nature of interference with the function of the computing device.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: August 24, 2021
    Inventor: Thomas Stachura
  • Patent number: 11093608
    Abstract: A selection of data types is defined from available log data for an evaluation of events associated with an entity. One or more evaluations associated with the entity are defined and reference data is generated from the selection of data types based on the one or more defined evaluations. The one or more evaluations are grouped into a pattern. A three dimensional (3D) score diversity diagram visualization is initialized for display in a graphical user interface, where a point representing the entity in the visualization is localized in 3D space at a coordinate based on two-dimensional (2D) coordinates in a 2D coordinate system of a centroid of the calculated area of a polygon placed to into the 2D coordinate system and defined by the values of each evaluation associated with the entity.
    Type: Grant
    Filed: February 3, 2020
    Date of Patent: August 17, 2021
    Assignee: SAP SE
    Inventors: Jona Hassforther, Jens Baumgart, Thorsten Menke, Volker Guzman, Florian Kraemer, Anne Jacobi, Thanh-Phong Lam, Omar-Alexander Al-Hujaj, Kathrin Nos
  • Patent number: 11093615
    Abstract: A method and a computer for protecting a computer, particularly an industrial automation component, against cybercriminal threats, wherein application programs are installed on the computer, different application programs being required for different functions of the computer, where at least two security stages are defined, such that for each security stage, functions are defined that are either undeactivatable in the event of cybercriminal threats to the functions and/or deactivatable in the event of cybercriminal threats to the functions, where identified functions and modules are selected which are allowed to be deactivated, and where selected modules are blocked, and functions are deactivated such that it is possible to dynamically deactivate optional software modules depending on cybercriminal threats and security stage of the computer to thereby constantly and optimally adapt the usable functional scope of the computer to a threat location and applicable respective operating conditions.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: August 17, 2021
    Assignee: Siemens Aktiengesellschaft
    Inventor: Amit Verma
  • Patent number: 11057408
    Abstract: Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one embodiment, a service provider collects data relating to the online activity of users of third-party services and correlates the data with subscribers of the service provider to generate useful products and analytics (e.g., classifications, behavioral models, etc.) containing information relating to the subscribers' online activity. The generated products may be used to determine whether and how to modify services provided to individual subscribers, exported for use by third parties, or for other purposes.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: July 6, 2021
    Assignee: Time Warner Cable Enterprises LLC
    Inventors: Chris Roosenraad, Richard Harman, John W. Watson, Christopher Turner, Philip Arnhold, Brian Durham, Barbara Stovall
  • Patent number: 11038843
    Abstract: GTP firewall service to block or allow GTP-C v1 messages from specific SGSN/GGSN and GTP-C v2 messages from specific SGW/PGW to prevent fraudulent activity occurring from any specific serving node or home node. GTP Traffic from specific SGSN (3G) or SGW (4G) can be blocked going to specific home operator, including 3G GSM to 4G LTE and 4G LTE to 3G GSM protocol interoperability provided by GTP Firewall. Individual Information Elements within GTP-C v1 and GTP-C v2 messages will be monitored based on home and serve operator configuration as well as GTP messages and Information Elements mapped from GTP-C v1 to GTP-C v2 for 3G GSM to 4G LTE interoperability and GTP-C v2 to GTP-C v1 for 4G LTE to 3G GSM interoperability.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: June 15, 2021
    Assignee: Syniverse Technologies, LLC
    Inventor: Karan Mehra
  • Patent number: 11036848
    Abstract: System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach. Utilizing information from such a test identifies users that have weak passwords, reused passwords or shared passwords that have been associated with an earlier breach. With this information, the organization can seek to reduce risk by training staff for this specific issue in a timely and appropriate manner to significantly reduce the risk of a future breach by those identified users. Training can be customized and targeted at those users who attempt to use passwords that have been associated with a breach (either of their own account or of another account on the same or related domain.
    Type: Grant
    Filed: January 17, 2020
    Date of Patent: June 15, 2021
    Assignee: KnowBe4, Inc.
    Inventor: Greg Kras
  • Patent number: 11032260
    Abstract: The disclosed technology is generally directed to security technology. In one example of the technology, it is determined that an attempted function associated with an application has at least one requirement including at least particular security credentials for a user of the application. A transaction is caused to be sent to each node in a permissioned blockchain that stores an access level block corresponding to the user. The transaction is associated with a real-time determination as to whether the at least one requirement for the attempted function is met. A transaction result is received from the permissioned blockchain. The attempted function is selectively allowed based on the transaction result.
    Type: Grant
    Filed: May 10, 2018
    Date of Patent: June 8, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Jonathan James Gollogly
  • Patent number: 11017107
    Abstract: A security assessment system of a computing resource service provider performs security analyses of virtual resource instances, such as virtual machine instances and virtual data store instances, to verify that certain invariable security requirements are satisfied by the instances' corresponding configurations; these analyses are performed before the instances are provisioned and deployed. If the security checks, which can be selected by the administrator of the resources, fail, the requested resources are denied deployment. Notifications identifying the faulty configuration(s) may be send to the administrative user. A template for launching virtual resource instances may be transformed into an optimized template for performing the pre-deployment security checks, such as by storing information needed to perform the checks within the optimized template itself.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: May 25, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Neha Rungta, Pauline Virginie Bolignano, Catherine Dodge, Carsten Varming, John Cook, Rajesh Viswanathan, Daryl Stephen Cooke, Santosh Kalyankrishnan
  • Patent number: 11019036
    Abstract: There is provided a method for privacy protection including: identifying an API request being related to a tracking service; generating and sending a predetermined number of initial requests to the tracking service when processing the API requests to the tracking service; storing the initial requests and respective responses related to the initial requests from the API in a database; analysing body objects of the stored initial requests and respective responses and generating a dynamic response recipe on the basis of the analysis; and generating a response including a response body acceptable by the tracking process on the basis of the generated dynamic response recipe.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: May 25, 2021
    Assignee: F-Secure Corporation
    Inventors: Heikki Hannikainen, Igor Afanasiev
  • Patent number: 11017092
    Abstract: Technologies for fast launch of trusted containers include a computing device having a trusted platform module (TPM). The computing device measures a container runtime with the TPM and executes the container runtime in response to the measurement. The computing device establishes a trust relationship between the TPM and a virtual platform credential, provisions the virtual platform credential to a virtual TPM, and executes a guest environment in response to provisioning the virtual platform credential. The computing device measures a containerized application with the virtual TPM and executes the containerized application in response to the measurement. The computing device may perform a trusted computing operation in the guest environment with the virtual TPM. The virtual TPM and the containerized application may be protected with multi-key total memory encryption (MKTME) support of the computing device. State of the virtual TPM may be encrypted and persisted. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: May 25, 2021
    Assignee: Intel Corporation
    Inventors: Ned Smith, Samuel Ortiz, Manohar Castelino, Mikko Ylinen
  • Patent number: 10999264
    Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: May 4, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Philippe Alain Martineau, Ambuj Kumar, William Craig Rawlings