Patents Examined by Izunna Okeke
-
Patent number: 11606384Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.Type: GrantFiled: July 28, 2021Date of Patent: March 14, 2023Assignee: Splunk Inc.Inventor: Munawar Monzy Merza
-
Patent number: 11606380Abstract: Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one embodiment, a service provider collects data relating to the online activity of users of third-party services and correlates the data with subscribers of the service provider to generate useful products and analytics (e.g., classifications, behavioral models, etc.) containing information relating to the subscribers' online activity. The generated products may be used to determine whether and how to modify services provided to individual subscribers, exported for use by third parties, or for other purposes.Type: GrantFiled: July 2, 2021Date of Patent: March 14, 2023Assignee: TIME WARNER CABLE ENTERPRISES LLCInventors: Chris Roosenraad, Richard Harman, John W. Watson, Christopher Turner, Philip Arnhold, Brian Durham, Barbara Stovall
-
Patent number: 11601272Abstract: A system for efficient third-party authentication of asset transfers using trusted computing includes a process authentication node configured to receive transfer data relating to an asset transfer, wherein the transfer data includes at least a first authentication datum, retrieve, from an instance of a secure listing, a first digitally signed assertion including at least a second authentication datum, wherein the first digitally signed assertion is generated by a data validator device as a function of information of a transferring entity, compare the at least a first authentication datum to the at least a second authentication datum, and authenticate the transfer data as a function of the comparing of the at least a first authentication datum to the at least a second authentication datum.Type: GrantFiled: April 29, 2020Date of Patent: March 7, 2023Assignee: Ares Technologies, Inc.Inventor: Christian T Wentz
-
Patent number: 11593504Abstract: A system for determining access for a hypercube includes an interface configured to receive a request for access from a user to data in a location in a hypercube; receive a tree structure with subcubes of the hypercube arranged in a hierarchical structure; and receive a user permission list, wherein an element of the user permission list comprises a permission, a root node, and a set of pruned nodes. The system also includes a processor configured to determine a user permission associated with the data in the location of the hypercube using the user permission list; and provide an indication of the user permission.Type: GrantFiled: July 17, 2019Date of Patent: February 28, 2023Assignee: Workday, Inc.Inventors: John Yates, Mark Hampton, Francis Wang, Lian Zheng, Thomas Nguyen
-
Patent number: 11589229Abstract: Methods and systems for dynamic wireless network configuration are provided. Aspects include receiving, by an application on a user device, a token, deriving, by the application, a unique identifier and passcode based at least in part on the token, and controlling remote access to a first computer system based on the unique identifier and passcode.Type: GrantFiled: January 20, 2020Date of Patent: February 21, 2023Assignee: CARRIER CORPORATIONInventors: Joshua Varghese, Phani Pavan Kumar Mangaiahgari
-
Patent number: 11582218Abstract: Various embodiments include computing devices and methods for management of access credentials. A processor of a computing device may receive an authentication request from a client application support service to authenticate a client application. The processor may send a response comprising an authentication token to the client application support service. The processor may receive from the client application support service a request for an access token to access a target system. The processor may send a response comprising the access token to the client application support service to enable the client application support service to access the target system using the access token on behalf of the client application.Type: GrantFiled: June 15, 2020Date of Patent: February 14, 2023Assignee: Charter Communications Operating, LLCInventors: Jon Svede, Colin B. Holm
-
Patent number: 11582022Abstract: A scheme for securely transferring a patient data file to an intended recipient regardless of a transfer mode selected by a sender. Encryption system executing at the sender device is operative to encrypt each plaintext data line of a file, one by one, using a symmetric key and a starting IV that is incremented per each line, resulting in corresponding ciphertext lines added to an encrypted file. A hash is generated based on the encrypted file. An encrypted header containing the symmetric key, starting IV and the hash is generated using a public key of the recipient, which is appended to the encrypted file. The encrypted header and associated encrypted file are transmitted to the recipient in any manner. Upon receipt, the recipient decrypts the encrypted header using a private key to obtain the symmetric key, starting IV and the hash, which are used by the recipient to validate and decrypt the encrypted file on a line-by-line basis.Type: GrantFiled: November 3, 2020Date of Patent: February 14, 2023Assignee: Advanced Neuromodulation Systems, Inc.Inventors: Greg Creek, James Thomas Nagle, Jagatkumar Shah
-
Patent number: 11580218Abstract: Disclosed herein are systems and methods for enabling the automatic detection of executable code from a stream of bytes. In some embodiments, the stream of bytes can be sourced from the hidden areas of files that traditional malware detection solutions ignore. In some embodiments, a machine learning model is trained to detect whether a particular stream of bytes is executable code. Other embodiments described herein disclose systems and methods for automatic feature extraction using a neural network. Given a new file, the systems and methods may preprocess the code to be inputted into a trained neural network. The neural network may be used as a “feature generator” for a malware detection model. Other embodiments herein are directed to systems and methods for identifying, flagging, and/or detecting threat actors which attempt to obtain access to library functions independently.Type: GrantFiled: September 21, 2021Date of Patent: February 14, 2023Assignee: Sentinel Labs Israel Ltd.Inventors: Shlomi Salem, Roy Ronen, Assaf Nativ, Amit Zohar, Gal Braun, Pavel Ferencz, Eitan Shterenbaum, Tal Maimon
-
Patent number: 11545242Abstract: Techniques are provided for computing with private healthcare data. The techniques include a method comprising constructing an isolated memory partition that forms a secure enclave and pre-provisioning software within the secure enclave. The pre-provisioned software is configured to receive at least one of input data or the instructions for the one or more application computing processes in an encrypted form; decrypt the at least one of input data or instructions using one or more cryptographic keys; execute the one or more application computing processes based on the decrypted at least one of input data or instructions to generate output data; generate a proof of execution that indicates that the one or more application computing processes operated on the received input data; encrypt the output data using the one or more cryptographic keys; and provide external access to the encrypted output data and the proof of execution.Type: GrantFiled: June 22, 2020Date of Patent: January 3, 2023Assignee: NFERENCE, INC.Inventors: Murali Aravamudan, Karthik Murugadoss, Sankar Ardhanari, Ajit Rajasekharan, Akash Anand, Rakesh Barve, Venkataramanan Soundararajan, Samir Awasthi, Tyler Wagner, Shamim Naqvi
-
Patent number: 11546757Abstract: Apparatuses, methods, and systems are disclosed for protecting the user identity and credentials. One apparatus includes a processor registers with a mobile communication network using a first set of credentials, the mobile communication network supporting a plurality of network slices. The processor receives a public key for a network slice where slice-specific authentication is required and encrypts a second set of credentials using the public key. Here, the second set of credentials is used for authentication with the network slice. The apparatus includes a transceiver that sends a message to the mobile communication network, the message including the encrypted second set of credentials.Type: GrantFiled: March 2, 2020Date of Patent: January 3, 2023Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Andreas Kunz, Genadi Velev
-
Patent number: 11537737Abstract: Methods and systems of data de-tokenization are described herein to provide solutions to utilizing tokenized data files. A de-tokenization service controller may extract instances of tokenized data by determining a schema associated with a tokenized file, wherein the schema identifies which fields contain tokenized data. A decryption system may decrypt the tokens and send decrypted sensitive values to the de-tokenization service controller. The de-tokenization service controller may then generate a de-tokenized data file comprising a plurality of records corresponding to the plurality of original tokenized records, using the decrypted sensitive values in place of the instances of tokenized data. In some embodiments, the methods may further comprise generating a validated file by adding one or more fields indicating the results of validation based on a set of validation rules.Type: GrantFiled: February 18, 2020Date of Patent: December 27, 2022Assignee: Capital One Services, LLCInventors: Naveen Teja Koduru, Kishore Doppalapudi, Siva Vegesana
-
Patent number: 11533615Abstract: Embodiments of a device and method are disclosed. In an embodiment, a method of communications involves from a wireless sensor deployed at a customer site, connecting to a wireless access point (AP) deployed at the customer site and based on a private key stored in the wireless sensor, performing mutual authentication between the wireless sensor and an authentication server connected to the wireless AP.Type: GrantFiled: May 6, 2021Date of Patent: December 20, 2022Assignee: Nile Global, Inc.Inventors: Gopal Raman, Suresh Katukam, Promode Nedungadi, Sathish Damodaran, Tjandra Trisno, Avinash Kumar, Steve Alexander
-
Patent number: 11526598Abstract: A microcontroller includes a CPU and a cryptographic circuit, and when a first program uses the cryptographic circuit, the second program transmits installation information of the first program and encrypted program installation information to the cryptographic circuit. The cryptographic circuit decrypts the encrypted program installation information and compares it with the installation information of the first program. In the case of match, the use of the cryptographic circuit by the first program is permitted.Type: GrantFiled: November 13, 2019Date of Patent: December 13, 2022Assignee: RENESAS ELECTRONICS CORPORATIONInventor: Seishiro Nagano
-
Patent number: 11528137Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.Type: GrantFiled: October 30, 2019Date of Patent: December 13, 2022Assignee: QUALCOMM IncorporatedInventors: Soo Bum Lee, Adrian Edward Escott, Gavin Bernard Horn, Anand Palanigounder
-
Patent number: 11522718Abstract: Disclosed is a method of generating digital signature information comprising: receiving a message; computing a particular solution in which a result of calculating the particular solution in a public key becomes a function-processed output value predetermined in the received message; and generating digital signature information for the message using the computed particular solution, wherein the public key is computed using a ring having a dimension (d) represented by a power of 2 and an integer multiplication of 3 or more.Type: GrantFiled: November 25, 2020Date of Patent: December 6, 2022Assignees: CRYPTO LAB INC., SEOUL NATIONAL UNIVERSITY R&DB FOUNDATIONInventors: Jung Hee Cheon, Yongha Son, Duhyeong Kim
-
Patent number: 11509463Abstract: Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have synchronized clocks. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp. Since the computing systems have synchronized clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another. Furthermore, both computing systems may synchronize their clocks to a private time server that maintains a clock that runs faster or slower than standard time.Type: GrantFiled: May 31, 2020Date of Patent: November 22, 2022Inventor: Daniel Chien
-
Patent number: 11503041Abstract: Systems and methods are disclosed for utilizing sender-recipient pair data to establish sender-level trust in future communication. One method comprises receiving raw communication data over a network and testing the received raw communication data against trained machine learning data to predict whether the raw communication data is associated with expected communication data. The raw communication data is sorted for expected communication data, which is further analyzed for sender-recipient pair data and assigned an expected communication pair data score. Senders associated with an expected communication pair data score that meets or exceeds a threshold are labeled and stored in a database as trusted. As a result of the sender-recipient pair analysis, recipients at-risk for being scammed can be identified, senders misidentified as spammers can be properly classified, and machine learning techniques utilized for analyzing raw communication data can be fine-tuned.Type: GrantFiled: February 24, 2021Date of Patent: November 15, 2022Assignee: Yahoo Assets LLCInventors: Lachlan A. Maxwell, Donald J. McQueen, Paul S. Rock
-
Patent number: 11503026Abstract: A system for authentication having an authentication protocol to communicate with the hardware device, the authentication protocol having an encryption function having a hardware key and a software key, a private and a public key pair, the key pair generated from the hardware key and the software key, used to encrypt the communication between the server and the client, an identity authentication service to assign a user of the hardware device to an identity string, and creates a unique user email address based on the identity string and an authentic email server domain, and a target service having a user identity data and comparing the user identity data to the email string, and if the user identity data and the email string match, then the target service accepts the unique user email address to send a service event communication to the hardware device.Type: GrantFiled: May 28, 2020Date of Patent: November 15, 2022Inventor: Alexander J. M. Van Der Velden
-
Patent number: 11496310Abstract: Described is an approach for an improved method, system, and computer program product that performs zero-knowledge proof of knowledge of user identification and/or authentication for a decentralized, trustless storage and management of user identification and/or authentication using one or more distributed ledger systems.Type: GrantFiled: December 28, 2020Date of Patent: November 8, 2022Assignee: NuID, Inc.Inventors: William Locke Brown, Nolan Smith
-
Patent number: 11487902Abstract: Techniques are provided for computing with private healthcare data. The techniques include a de-identification method including receiving a text sequence; providing the text sequence to a plurality of entity tagging models, each of the plurality of entity tagging models being trained to tag one or more portions of the text sequence having a corresponding entity type; tagging one or more entities in the text sequence using the plurality of entity tagging models; and obfuscating each entity among the one or more tagged entities by replacing the entity with a surrogate, the surrogate being selected based on one or more attributes of the entity and maintaining characteristics similar to the entity being replaced.Type: GrantFiled: March 4, 2021Date of Patent: November 1, 2022Assignee: nference, inc.Inventors: Sankar Ardhanari, Karthik Murugadoss, Murali Aravamudan, Ajit Rajasekharan