Patents Examined by Izunna Okeke
  • Patent number: 11394728
    Abstract: In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web traffic in the network. The web traffic log data includes header information captured from the web traffic and a plurality of client addresses associated with the web traffic. The device detects a particular one of the set of known user identifiers in the header information captured from the web traffic associated with a particular one of the plurality of client addresses. The device makes an association between the particular detected user identifier and the particular client address.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: July 19, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Blake Harrell Anderson, Ivan Nikolaev
  • Patent number: 11395137
    Abstract: A communication device may display an instruction screen in a case where a first wireless connection is established between the communication device and a first external device; in a case where it is instructed that a target process is to be executed in a situation where the instruction screen is displayed, supply, to the first wireless interface, first instruction information; after the public key has been sent to the first external device, receive an authentication request from the first external device; send an authentication response to the first external device; receive connection information from the first external device; and in a case where the connection information is received from the first external device, establish, by using the connection information, the second wireless connection between the communication device and a second external device.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: July 19, 2022
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Hiroshi Shibata
  • Patent number: 11394727
    Abstract: Described is a system for side-channel based detection of cyber-attack. In operation, the system converts data bus signals from a platform (e.g., vehicular platform) into a first time series of system states. The system further converts analog side-channel signals from the platform into a second time-series of system states. Anomalous behavior of the platform is detected by comparing the first time series of system states with the second time series of system states to identify violations of predetermined constraints. Upon detection, the anomalous behavior is designated as a cyber-attack of the platform, which causes the platform to initiate an action based on the detected cyber-attack. Such actions include implementing a safe made, etc.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: July 19, 2022
    Assignee: HRL LABORATORIES, LLC
    Inventor: David W. Payton
  • Patent number: 11386419
    Abstract: An electronic device may include a printed circuit board having a physically unclonable function (PUF) source. The electronic device may also include an integrated circuit (IC) chip positioned on the printed circuit board, and the first PUF source may be embedded in or formed on the printed circuit board external to the IC chip. The IC chip has processing circuitry that is configured to determine PUF data based on the PUF source. The processing circuitry is further configured to determine a cryptographic key or authentication token based on the PUF data and to perform at least one secure operation using the cryptographic key or authentication token.
    Type: Grant
    Filed: March 20, 2020
    Date of Patent: July 12, 2022
    Assignee: Block, Inc.
    Inventors: Kamran Sharifi, Jeremy Wade, Bertram Leesti, Afshin Rezayee, Yue Yang, Max Joseph Guise
  • Patent number: 11379599
    Abstract: Methods, systems, and computer-readable media for a client-side filesystem for a remote repository are disclosed. One or more files of a repository are sent from a storage service to a client device. The file(s) are obtained by the client using a credential sent by a repository manager. Local copies of the file(s) are accessible via a local filesystem mounted at the client device. One or more new files associated with the repository are generated at the client device. Using the credential, the one or more new files are obtained at the storage service from the client device. The one or more new files are added to the repository.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: July 5, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Marvin Michael Theimer, Yunhan Chen, Shu Liu, Arjun Raman, Yuxin Xie, Fengjia Xiong, Julien Jacques Ellie, Colin Watson, Ullas Sankhla, Swapandeep Singh, Kerry Hart, Paul Anderson, Brian Dahmen, Suchi Nandini
  • Patent number: 11381550
    Abstract: Disclosed are various embodiments for account management using a portable data store. In one embodiment, an authentication client is stored in a portable data store. In response to receiving a master security credential from the user, the authentication client decrypts encrypted account data stored in the portable data store. The authentication client detects that a network site is being accessed. The authentication client automatically provides a corresponding security credential to the network site.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: July 5, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Daniel W. Hitchcock, Brad Lee Campbell
  • Patent number: 11372978
    Abstract: A system facilitates detection of malicious properties of software packages. A generic application which comprises known functionality into which a software package has been included is analyzed through a static analysis and/or dynamic analysis, which is performed based on executing the generic application in a controlled environment. The static analysis and/or dynamic analysis are performed to determine whether one or more properties associated with the software package comprise deviations from the known behavior of the generic application. Behavior deviations identified based on the static and/or dynamic analysis are associated with a score. An aggregate score is calculated for the software package based on the scores which have been assigned to the identified behavior deviations and may be adjusted based on a reputation multiplier determined based on metadata of the software package. If the aggregate score of the software package exceeds a score threshold, the software package is flagged as malicious.
    Type: Grant
    Filed: April 13, 2020
    Date of Patent: June 28, 2022
    Assignee: Twistlock Ltd.
    Inventors: Ory Segal, Yuri Shapira, Avraham Shulman, Benny Nissimov, Shaked Yosef Zin
  • Patent number: 11374746
    Abstract: The concepts and technologies disclosed herein are directed to time-aware blockchain staged regulatory control of Internet of Things (“IoT”) data. A federation platform can receive a registration request from an enterprise edge platform to register a blockchain identifier for publication of public data on a public blockchain. The federation platform can determine if the registration request contains any restricted data parameters. In response to determining that the registration request does not contain any restricted data parameters, the federation platform can query a security module to obtain an encryption key. The federation platform can receive the encryption key from the security module. The federation platform can store the encryption key in association with the blockchain identifier and an enterprise edge platform ID that uniquely identifies the enterprise edge platform.
    Type: Grant
    Filed: May 31, 2020
    Date of Patent: June 28, 2022
    Assignees: AT&T Global Network Services Hong Kong LTD, AT&T Mobility II LLC
    Inventors: Winnie Chau, John Philip Mulligan, Shashi Gowda
  • Patent number: 11372991
    Abstract: A distributed system responds to a request to enable a restoration capability for a database instance by beginning a process for replicating configuration and transaction data for the database instance. The system associates the replicated configuration and transaction data with a first account and a second account, and prevents termination of the replication process except where consent for the termination is provided by both accounts. In response to a request to restore the database instance, the distributed system accesses the configuration and transaction data using the second account.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: June 28, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Dallas Lamont Willett, Prashant Bondada, Michael G. Rascher, Slawomir Sobon
  • Patent number: 11374937
    Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
    Type: Grant
    Filed: September 29, 2018
    Date of Patent: June 28, 2022
    Assignee: Apple Inc.
    Inventors: Conrad A. Shultz, Alexander D. Sanciangco, Brent M. Ledvina, Chelsea E. Pugh, Kyle C. Brogle, Marc J. Krochmal, Maureen G. Daum, Reza Abbasian, Richard J. Mondello, Jacob S. Klapper
  • Patent number: 11368840
    Abstract: An always-listening-capable computing device is disclosed, comprising: a first electronic sensor configured to receive user input, a second electronic sensor configured to receive a signal indicating that a user depressed a physical button, a gate-keeping module implemented by a processor, wherein data from the first electronic sensor passes through the gate-keeping module while a gatekeeping function is disabled, no data from the first electronic sensor passes through the communications module while the gatekeeping function is enabled, all data input to the gate-keeping module is received via an exclusive input lead from the first electronic sensor, and all data output from the gate-keeping module is transmitted via an exclusive output lead to a component other than the first electronic sensor. The device receives the signal indicating that the user has depressed the physical button; and enables or disables a functionality of a second computing device.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: June 21, 2022
    Inventor: Thomas Stachura
  • Patent number: 11362838
    Abstract: The present disclosure relates to systems and methods for transmitting data. The methods may include obtaining, by a first module, a first packet, wherein the first packet includes a first random code, first data, and a first signature, wherein the first signature is generated by a second module by encryption based on an original random code and original data; generating, by the first module a second signature by encryption based on the first random code and a checksum of the first data; and generating, by the first module, a first response to the first packet upon determining whether the second signature matches the first signature.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: June 14, 2022
    Assignee: YUNDING NETWORK TECHNOLOGY BEIJING CO., LTD.
    Inventor: Hao Tang
  • Patent number: 11363016
    Abstract: A biometrics hub may establish a session with a first biometric device, receive first biometric data of a user from the first biometric device, establish a session with a second biometric device, receive second biometric data of the user from the second biometric device, and store the first biometric data and the second biometric data at the biometrics hub. The biometrics hub may further detect a power event associated with at least one of the first biometric device or the second biometric device, and change, in response to detecting the power event, a schedule for processing at least one of the first biometric data or the second biometric data.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: June 14, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw
  • Patent number: 11354426
    Abstract: A secure cellular communication system comprises a modified smartphone mated with a security pack. A Cryptographic module within the security pack encrypts all cellular outgoing data and decrypts cellular incoming data. The modified smartphone is modified to rout all cellular outgoing data and incoming data via the Cryptographic module within the security pack. The cellular MODEM may reside within the security pack while the phone's cellular MODEM is disabled, or the phone's cellular MODEM may be used.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: June 7, 2022
    Assignee: HIGH SEC LABS LTD.
    Inventor: Aviv Soffer
  • Patent number: 11356443
    Abstract: Systems and methods described herein are directed to associating a distributed ledger identity of a user with a centralized identity of the user, and generating a verifiable claim including a reference to the user's centralized identity. In some implementations, a method includes: proving a claim using a distributed ledger identity; requesting that a server system create an attestation to the claim proven using the distributed ledger identity that includes a centralized identity of a user, authenticating the centralized identity at an authentication server; and receiving a confirmation message from the server system that a verifiable claim including the user's centralized identity has been created.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: June 7, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Abilash Soundararajan, Michael Reid Tennefoss
  • Patent number: 11349662
    Abstract: Systems and methods are provided for persistent login. Such persistent login may be based on linking user identity across accounts of different entities to allow each entity to maintain control over their respective sets of user data, while providing a streamlined user experience that avoids much of the repetitive need to login to different services with different login credentials (e.g., during periods of heavy use). Such persistent login may utilize a set of tokens issued and exchanged between devices of the partnering entities. Such tokens may include an access token, refresh token, and identity token. When a user associated with a first entity requests access to information secured by a second entity, such request may be associated with the access token. If the access token is determined to be expired, the refresh token may be used to refresh the access token, which may also trigger issuance of a new refresh token.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: May 31, 2022
    Assignee: Synchrony Bank
    Inventors: Shaoyen Chang, William Mahoney, Chidhambaram Mathevan Pillai, Seulkee Park, Jeremy T Mack, Shahul Shaik, Sathyanarayana Mahendran, Marina Loginova
  • Patent number: 11341232
    Abstract: The present invention relates to a method for making available a security key, wherein a smart card adapted according to the invention is employed for the production thereof. In this case, an expedient method sequence is proposed which makes it possible for the smart card to make available, for example, a so-called one-time password or a dynamic check number in interaction with a token server. The present invention further relates to a correspondingly adapted computing arrangement and to a computer program product with control commands which implement the method and/or operate the computing arrangement.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: May 24, 2022
    Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventors: Volker Stohr, Frank-Michael Kamm, Nils Gerhardt, Andreas Chalupar
  • Patent number: 11336661
    Abstract: Systems, methods, and software can be used to detect remote application profiling. In some aspects, one computer-implemented method includes receiving, over a network, a request from a network client directed to a particular application executed by an application server; determining whether the received request deviates from a communications profile associated with the particular application; in response to determining that the received request deviates from the communications profile, identifying the network client as an attacker; and in response to identifying the network client as an attacker, performing a defensive response with respect to the network client.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: May 17, 2022
    Assignee: BlackBerry Limited
    Inventor: Adam John Boulton
  • Patent number: 11336445
    Abstract: This invention relates to a method for updating a one-time secret key Kn maintained in a subscription module implemented in a communication apparatus, a wireless communication network maintaining an identical version of said one-time secret key Kn and configured to determine a result XRES expected from the communication apparatus when an authentication function is applied by the subscription module using a random challenge and said one-time secret key Kn as an input, the method comprising the following steps: receiving from the communication network an authentication request message containing at least a random challenge RANDn; determining by the subscription module a result RES by applying the authentication function using the random number RANDn and the one-time secret key Kn as inputs; transmitting said result RES to the communication network for it to be compared with the expected result XRES determined by the communication network using the random number RANDn and the corresponding version of the one-tim
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: May 17, 2022
    Assignee: THALES DIS FRANCE SAS
    Inventors: Michel Anslot, Francis D'Souza
  • Patent number: 11321465
    Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: May 3, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners