Patents Examined by Jacob Lipman
-
Patent number: 11252148Abstract: A network service, program product and method that manages secure web application delivery. A service is disclosed that includes an interface configured to receive a request for a secure web application from a plug-in integrated into a web browser on a client computing device, wherein the request further includes a user credential token. Also included is a token processor that evaluates the user credential token and determines an associated customer domain server provided by a back-end service and a transport service that establishes a secure channel with the customer domain server, and forwards the request to the associated customer domain server and receives back a text-based data package. Once generated, the text-based data package is forwarded to the plug-in in response to the request.Type: GrantFiled: June 7, 2019Date of Patent: February 15, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Zhen Zeng, Hongfei Wu
-
Patent number: 11252147Abstract: A platform for delivering secure web applications to a client browser. A software plug-in is provided configured for integration into a web browser. The plug-in includes: a request hook that intercepts web browser requests associated with a secure web application; a request processing system that redirects an request to access the secure web application to a network service, and then redirects subsequent HTTP requests to interact with the secure web application to the network service; and a package manager that receives a text-based data package from a customer domain server in response to the initial request and renders the secure web application in the web browser, and receives an updated text-based data package from the customer domain server in response to the subsequent HTTP request and renders updates to secure web application in the web browser.Type: GrantFiled: June 7, 2019Date of Patent: February 15, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Zhen Zeng, Hongfei Wu
-
Patent number: 11240248Abstract: A computing platform may receive, from a web server, entity identification information in different formats, and normalize the entity identification information. After normalizing the information, the computing platform may receive a plurality of interaction records each associated with an interaction between a system and a client of the system. The computing platform may compare the normalized entity identification information with the interaction records of the interactions between the system and the clients of the system. After determining that the entity identification information matches client information for one of the interaction records, the computing platform may send an alert to a control server. The alert may cause the control server to take one or more actions with respect to the client. For example, future attempts by the client to access one or more services offered by the system may be blocked for access by the client.Type: GrantFiled: October 7, 2019Date of Patent: February 1, 2022Assignee: Bank of America CorporationInventors: Jason D. Latta, Nelipher Moyo
-
Patent number: 11232231Abstract: Mechanisms for generating documents with confidential information are provided, the systems comprising: a memory; and a first collection of at least of one hardware processor coupled to the memory and configured to: receive from a user device a request for a first document with confidential information; generate a second document, that corresponds to the first document, with at least one token corresponding to the confidential information; transmit the second document to a second collection of at least one hardware processor in a high-trust network that is entitled to access the confidential information; receive from the second collection of at least one hardware processor in the high-trust network a uniform resource locator (URL) corresponding to the first document; and transmit the URL to the user device. In some of these mechanisms, the user device is in the high trust network.Type: GrantFiled: June 23, 2021Date of Patent: January 25, 2022Assignee: Institutional Capital Network, Inc.Inventors: Michael November, Thomas M. Fortin
-
Patent number: 11223475Abstract: An example operation may include one or more of receiving, by a document validation node, documents from a plurality of document owner nodes over a blockchain network, generating, by the document validation node, commitments for the documents on the blockchain network, deriving, by the document validation node, proofs to verify predicates of the documents, and generating, by the document validation node, a document relationship graph (DRG) based on the commitments and the predicates.Type: GrantFiled: June 5, 2019Date of Patent: January 11, 2022Assignee: International Business Machines CorporationInventors: Nitin Singh, Pankaj S. Dayama, Vinayaka Pandit, Kameshwaran Sampath
-
Patent number: 11222140Abstract: Mechanisms (which can include systems, methods, and computer readable media) for generating documents with confidential information are provided, the mechanisms comprising: receiving, using a first collection of at least one hardware processor, a first document from a second collection of at least one hardware processor; replacing, using the first collection of at least one hardware processor, at least one token in the first document to produce a second document; causing the second document to be stored; and transmitting a uniform resource locator (URL) corresponding to the second document to the second collection of at least one hardware processor. In some of these mechanisms, the mechanisms further comprise serving the first document to a user device.Type: GrantFiled: June 23, 2021Date of Patent: January 11, 2022Assignee: Institutional Capital Network, Inc.Inventors: Michael November, Thomas M. Fortin
-
Patent number: 11216590Abstract: Mechanisms for generating documents with confidential information are provided, the mechanisms comprising: sending, from a user device, a request for a first document with confidential information to a first collection of at least one hardware processor in a low-trust network that is not entitled to access the confidential information; receive a uniform resource locator (URL) corresponding to the first document from the first collection of at least one hardware processor at the user device; request, from the user device, the first document using the URL from a second collection of at least one hardware processor in a high-trust network that is entitled to access the confidential information; receive the first document at the user device; and cause the first document to be presented. In some of these mechanisms, the user device is in the high trust network.Type: GrantFiled: June 23, 2021Date of Patent: January 4, 2022Assignee: Institutional Capital Network, Inc.Inventors: Michael November, Thomas M. Fortin
-
Patent number: 11206278Abstract: Technology related to risk-informed autonomous adaptive cyber controllers is disclosed. In one example of the disclosed technology, a method includes generating probabilities of a cyber-attack occurring along an attack surface of a network. The probabilities can be generated using sensor and operational data of a network as inputs to an attack graph. The risk scores can be determined using a plurality of fault trees and the generated probabilities from the attack graph. The respective risk scores can correspond to respective nodes of an event tree. The event tree and the determined risk scores can be used to determine risk estimates for a plurality of configurations of the network. The risk estimates for the plurality of configurations of the network can be used to reconfigure the network to reduce a risk from the cyber-attack.Type: GrantFiled: June 5, 2019Date of Patent: December 21, 2021Assignee: Battelle Memorial InstituteInventors: Arun Veeramany, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles, Mark J. Rice, Paul M. Skare, David O. Manz, Jeffery E. Dagle, Stephen D. Unwin
-
Patent number: 11201876Abstract: A computer implemented method to identify malicious software in a computer system includes receiving an indication of a detection of malicious network traffic communicated via a computer network accessed by the computer system; identifying a software component involved in the malicious network traffic at the computer system; evaluating a measure of a correlation fractal dimension (CFD) for at least a portion of the software component; and storing the measure of CFD for subsequent comparison with a second measure of CFD for a corresponding portion of a second software component in the computer system to identify the second software component as a software component involved in malicious network communication.Type: GrantFiled: December 15, 2016Date of Patent: December 14, 2021Assignee: British Telecommunications Public Limited CompanyInventors: George Kallos, Fadi El-Moussa
-
Patent number: 11196729Abstract: A method for distributing encrypted cryptographic data includes receiving, by a key service, from a first client device, a request for a first public key. The method includes transmitting, by the key service, to the first client device, the first public key. The method includes receiving, by the key service, from an access control management system, an encryption key encrypted with the first public key and a request from a second client device for access to the encryption key. The method includes decrypting, by the key service, the encrypted encryption key, with a private key corresponding to the first public key. The method includes encrypting, by the key service, the decrypted encryption key, with a second public key received from the second computing device. The method includes transmitting, by the key service, to the second client device, the encryption key encrypted with the second public key.Type: GrantFiled: May 19, 2021Date of Patent: December 7, 2021Assignee: Virtru CorporationInventor: William R. Ackerly
-
Patent number: 11196730Abstract: Provided is a network-enabled method for creating an online account using a network of devices. The method comprises: receiving by an authentication system, a request to create an online account with an online server; generating a visual graphical code by the authentication system, which is displayed on a display screen and comprises a validation identity; acquiring image data of the visual graphical code from a user device with aid of optical detection apparatus, by capturing an image of the visual graphical code displayed on the display screen; processing the image data to extract the validation identity; based on the validation identity identifying an online serve provider associated with the online server and user information categories associated with the online account; and based on identification information related to the user identifying the user, and the data to the online server for the online account with the online server.Type: GrantFiled: June 5, 2019Date of Patent: December 7, 2021Assignee: Trusona, Inc.Inventors: Ori Eisen, David Michael Kopack, Nikolas Mangu-Thitu
-
Patent number: 11184346Abstract: Aspects of providing single sign on (SSO) sessions are described. An access interval key is generated using an access code as a seed to a key derivative function. The access interval key is encrypted using a public key of an SSO-enabled application to generate an encrypted access interval key for a sign on session. The sign on session is established by storing the encrypted access interval key in a memory location of an SSO session map shared by SSO-enabled applications.Type: GrantFiled: September 16, 2019Date of Patent: November 23, 2021Assignee: VMWARE, INC.Inventors: Kishore Sajja, Lucas Chen, Raghuram Rajan, Anuj Panwar, Sandeep Naga Kaipu, Rajiv Singh
-
Patent number: 11182491Abstract: A method of limiting data usage for certified purposes by using functional encryption, comprising: receiving from a software publisher an application code and declared privacy information, the declared privacy information specifies at least one declared usage for at least one data type; analyzing the application's usage of data collected by the application, to identify an actual usage of the at least one data type by a function; identifying when the actual usage is compliant with the at least one declared usage according to the analysis; in response to the identification, creating a pair of a public key and a master private key; creating a function private key for the function using the master private key; and sending the function private key to the software publisher to be used for operating the function on data which is encrypted using the public key.Type: GrantFiled: February 4, 2020Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Abigail Goldsteen, Ron Shmelkin, Gilad Ezov, Muhammad Barham
-
Patent number: 11184352Abstract: The embodiments described herein relate generally to securely establishing an account and authentication metrics associated with a communication platform. An account associated with a communication platform may allow a user associated with the account to send and receive communications via the communication platform.Type: GrantFiled: May 14, 2019Date of Patent: November 23, 2021Assignee: The Western Union CompanyInventors: Abhinav Gupta, Shankar Narayan
-
Patent number: 11184163Abstract: A value comparison server holds a first secret key and a plurality of tags corresponding to values, each of the plurality of tags is a ciphertext obtained by encrypting each of the values with an additive-homomorphic encryption scheme by using secret keys including the first secret key and a first parameter, a plaintext space has remainder operation with a natural number as modulo in the encryption scheme, and the value comparison server generates a value used for comparing two values corresponding to two tags included in the plurality of tags from the first secret key and the two tags by using the additive homomorphism; and determines which of the two values is greater or equal, on the basis of whether a discrete logarithm of the generated value to the first parameter can be calculated within a value of a predetermined range.Type: GrantFiled: May 15, 2019Date of Patent: November 23, 2021Assignee: HITACHI, LTD.Inventors: Hisayoshi Sato, Masayuki Yoshino, Ken Naganuma
-
Patent number: 11163865Abstract: A trusted computing method applicable in a computer device, a computer device, and a storage medium are provided. The method comprises: during a startup process of the computer device including first and second trusted computing chips, the first trusted computing chip performing a static measurement on the computer device to obtain a static measurement result, and sending the static measurement result to a verification center; and during operations of the computer device after startup of the computer device, the second trusted computing chip performing a dynamic measurement on the computer device to obtain a dynamic measurement result, and sending the dynamic measurement result and association evidence to the verification center, wherein the association evidence indicates that the first and the second trusted computing chips are disposed in the same computer device, and the verification center associates the two measurement results and verifies the integrity of a software system of the computer device.Type: GrantFiled: April 30, 2021Date of Patent: November 2, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventor: Wuqiong Pan
-
Patent number: 11159502Abstract: A system and method include an encryptor, a decryptor, and a communication link. The encryptor includes a first processor and a first memory, and the decryptor includes a second processor and a second memory. The encryptor and the decryptor communicate data via the communication link. The encryptor and the decryptor are configured to: exchange public messages comprising keying materials, and calculate a common key based on the keying materials, first private modular integers known only to the encryptor, and second private modular integers known only to the decryptor. The keying materials disclosed in the public messages form an under-determined system of equations in variables of the first and the second private modular integers.Type: GrantFiled: April 27, 2018Date of Patent: October 26, 2021Assignee: University of North DakotaInventor: Jun Liu
-
Patent number: 11144657Abstract: A system and method of providing a secure inter-domain data management platform based on blockchain technology allows a user to access files of one or more organizations based on the credentials of the user. The system includes at least one remote server and a network of computing nodes. The remote server is used to manage at least one group. The at least one group may be one or more intelligence or government organizations. The at least one group includes a plurality of member accounts. Each member account includes a member access level. The network of computing nodes is used to manage a blockchain system and to store a plurality of files. Each file includes a file access level. A user with a member account can access a file in accordance to the member access level of the member account and the file access level of the file.Type: GrantFiled: June 5, 2019Date of Patent: October 12, 2021Assignee: MOTION MATTERS INC.Inventors: Naquib Hatami, Zalmai Azmi
-
Patent number: 11144297Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.Type: GrantFiled: September 28, 2018Date of Patent: October 12, 2021Assignee: Apple Inc.Inventors: Dallas B. De Atley, Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl, Kelsey J. Skillman, Edward E. Thomas
-
Patent number: 11115220Abstract: A system and method wherein an authentication request to verify authentication information submitted to a first system in connection with a first request submitted to the first system is received from the first system. A response to the authentication request is generated that includes information usable by a second system to make, without communicating with the authentication system, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication system, with the determination being based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request. The response generated is provided to the first system.Type: GrantFiled: May 4, 2016Date of Patent: September 7, 2021Assignee: Amazon Technologies, Inc.Inventors: Gregory Branchek Roth, Graeme David Baer