Patents Examined by Jayesh M Jhaveri
  • Patent number: 11539689
    Abstract: Provided is a method, system, and apparatus for authenticating a user device. The method includes registering a device identifier with at least one transformation rule, receiving a request for authentication comprising a device identifier associated with a user device, obtaining a one-time password (OTP) in response to receiving the request, communicating the OTP to the user device, receiving a transformed OTP from the user device, and authenticating the user device based on the OTP, the transformed OTP, and the at least one transformation rule.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: December 27, 2022
    Assignee: Visa International Service Association
    Inventors: Vaibhav Prakash Gajre, Veerabhadraiah Lingadhalli Matadha, Akon Samir Dey
  • Patent number: 11537752
    Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
    Type: Grant
    Filed: November 18, 2019
    Date of Patent: December 27, 2022
    Assignee: Red Hat, Inc.
    Inventor: David Zeuthen
  • Patent number: 11531755
    Abstract: Techniques are described herein that are capable of detecting ransomware among files using information that is not included in content of the files. The files are determined based on file-related operation(s) being performed on each of the files during a session of a cloud-based application. A subset of the files is determined such that each file in the subset has multiple file extensions during the session. A value, which is based on a number of the files in the subset, is compared to a threshold. A determination is made whether the files include the ransomware based on whether the value is greater than or equal to the threshold. An alert, which indicates that the files include the ransomware, is selectively triggered based on detection of whether the files include the ransomware.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: December 20, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Danielle Rachel Poleg, Adi Rose Lefkowitz, Amos Avraham Rimon
  • Patent number: 11528298
    Abstract: A method and a system for preventing an activity of a malware application in a computer system are provided. The method comprising: receiving at least one artefact of a sandbox environment to be installed in the computer system for simulating the sandbox environment in the computer system; receiving an indication of at least one interaction of a given application with the at least one artefact; analyzing an activity of the given application to detect at least one of a first type event and a second type event triggered thereby after executing the at least one interaction; in response to the analyzing rendering a positive result: identifying the given application as being the malware application; and using data indicative of a digital footprint of the given application in the computer system for further updating the at least one artefact for further preventing the activity of the malware application.
    Type: Grant
    Filed: May 7, 2021
    Date of Patent: December 13, 2022
    Assignee: TRUST LTD.
    Inventors: Andrei Bryzgin, Pavel Suprunyuk
  • Patent number: 11522844
    Abstract: A key master service capable of operating on a service provider in a network enables is disclosed. The key master enables authorized parties to securely exchange client information without compromising client security. One feature of the key master service is the generation of a unique key for each client. All parties in an authorized universe access, exchange and modify client information by referencing the universal key, rather than using known client identifiers. Client information is further secured by advantageously applying an obfuscation function to the data. Obfuscated client information is stored together with the universal key as keyed client data at the client and/or server, where it may be directly accessed by the service provider or third parties. Because client information is stored and exchanged without the ability to discern either the client identity or the nature of the information, such information is secured against malicious third-party interception.
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: December 6, 2022
    Assignee: Capital One Services, LLC
    Inventors: Jeremy Yoches, Christopher Vito Covalucci, Scott Johnson
  • Patent number: 11520886
    Abstract: Methods, apparatuses and computer program products implement embodiments of the present invention that include protecting a computer system coupled to a storage device by storing, to the storage device, a set of protected files and one or more decoy files, wherein any modification to the decoy file indicates a cyber-attack on the computer system. Upon receiving a request from a process executing on the computing device to enumerate files stored on the storage device, the process is analyzed so as to classify the process as benign or suspicious. The protected files are enumerated to the process whether the process was classified as benign or suspicious. However, the one or more decoy files are enumerated to the process only upon process being classified as suspicious.
    Type: Grant
    Filed: July 26, 2020
    Date of Patent: December 6, 2022
    Assignee: PALO ALTO NETWORKS (ISRAEL ANALYTICS) LTD.
    Inventors: Erez Levy, Or Chechik, Liav Zigelbaum, Eldar Aharoni
  • Patent number: 11514162
    Abstract: Systems and methods for malware filtering are provided herein. In some embodiments, a system having one or more processors is configured to: retrieve a file downloaded to a user device; break the downloaded file into a plurality of chunks; scan the plurality of chunks to identify potentially malicious chunks; predict whether the downloaded file is malicious based on the scan of the plurality of chunks; and determine whether the downloaded file is malicious based on the prediction.
    Type: Grant
    Filed: January 13, 2022
    Date of Patent: November 29, 2022
    Assignee: UAB 360 IT
    Inventors: Aleksandr Sevcenko, Mantas Briliauskas
  • Patent number: 11514160
    Abstract: Disclosed herein are systems and methods for determining a coefficient of harmfulness of a file using a trained learning model. In one aspect, an exemplary method includes forming a first vector containing a plurality of attributes of a known malicious file. A learning model is trained using the first vector to identify a plurality of significant attributes that influence identification of the malicious file. A second vector is formed containing a plurality of attributes of known safe files. The learning model is trained using the second vector to identify attributes insignificant to the identification of the malicious file. An unknown file is analyzed by the learning model. The learning model outputs a numerical value identifying a coefficient of harmfulness relating to a probability that the unknown file will prove to be harmful.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: November 29, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Sergey V. Prokudin, Alexey M. Romanenko
  • Patent number: 11509691
    Abstract: There are provided systems and methods for protecting from directory enumeration using honeypot pages within a network directory. A service provider, such as an electronic transaction processor for digital transactions, may have an internal network that is utilized by employees, developers, and other end users within the organization of the service provider. When internal devices become compromised or internal users act maliciously, they may attempt to enumerate a directory to find hidden pages that have secret or sensitive data. The service provider may therefore detect a scan of an internal directory having files paths to files and pages and may deploy honeypot pages that change an error status. Further, the service provider may add a process or operation to log additional data on these honeypot pages and/or change a byte size of the corresponding pages to confuse the enumeration attempt and obtain true source information.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: November 22, 2022
    Assignee: PAYPAL, INC.
    Inventor: George Chen Kaidi
  • Patent number: 11503034
    Abstract: Various embodiments are generally directed to techniques for generating rules automatically navigate a website and perform updates of payment token information.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: November 15, 2022
    Assignee: Capital One Services, LLC
    Inventors: Mykhaylo Bulgakov, Taurean Butler, William F. Carroll, II
  • Patent number: 11494489
    Abstract: A method for detecting malicious code may include generating, from deserialization examples, a finite automaton including states. The states may include labeled states corresponding to the deserialization examples. A state may correspond to a path from a start state to the state. The method may further include while traversing the states, generating a state mapping including, for the state, a tracked subset of the states, determining that the path corresponds to a path type, inferring, using the path type and the state mapping, a regular expression for the state, and determining, for a new deserialization example and using the regular expression, a polarity indicating whether it is safe to deserialize the new deserialization example.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: November 8, 2022
    Assignee: Oracle International Corporation
    Inventors: Kostyantyn Vorobyov, François Gauthier, Sora Bae, Padmanabhan Krishnan
  • Patent number: 11488265
    Abstract: Disclosed herein is a time-based leaderboard that ranks users based on a length of time each user has controlled or possessed a given digital object. The leaderboard includes customization options for purposes of user identification and identity connected to social network objects. The leaderboard further uses a staking feature where users provide their digital objects to universal wallets to hold for a predetermined period based on smart contract limitations. Staking improves leaderboard position. The leaderboard further enables expression and displayed of staked digital objects despite the user no longer having actual possession of the digital object. A digital object generator builds unique digital objects based on the user specific input. The unique digital objects are part of a graphic presentation to users.
    Type: Grant
    Filed: February 18, 2022
    Date of Patent: November 1, 2022
    Assignee: EMOJI ID, LLC
    Inventors: Naveen Kumar Jain, Riccardo Paolo Spagni, Tal Flanchraych, Shradha Rao, Karim Balaa
  • Patent number: 11475133
    Abstract: A method of training a malicious code detection model and a method of detecting a malicious code. The method includes acquiring application programming interface (API) call information of called functions from a result log of performing dynamic analysis of a malicious code, calculating time intervals between timestamps using the timestamps which indicate API call times extracted from the API call information, determining a feature value of the malicious code on the basis of the time intervals, and training the malicious code detection model using an API call sequence included in the API call information and the feature value.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: October 18, 2022
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Jang Mi Shin, Young Min Cho, Jung Bae Jun, Jang Ho Kim, Tae Jin Iyn
  • Patent number: 11477189
    Abstract: A computer system receives a first request as part of a primary session with a client device to access information stored on a primary domain associated with the computer system. The first request includes an authentication key that was generated using a session key. The computer system receives a second request as part of a sub-session with the client device to access information stored on a secondary domain associated with the computer system. The second request includes a second authentication key that includes a session identifier of the primary session and a session payload generated using the session key and an indicator of the secondary domain. The computer system determines whether to grant the first and second requests using the first and second authentication keys, respectively.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: October 18, 2022
    Assignee: salesforce.com, inc.
    Inventors: João Henrique Pimentel Wanderley Neves, Alan Vangpat
  • Patent number: 11468189
    Abstract: According to embodiments of the present disclosure, there is provided a method, system, apparatus, electronic device, storage medium and program product for data exchange. The method described herein comprises: obtaining original data to be exchanged by a target application between a first platform and a second platform; obtaining normalized data corresponding to a type of the original data by processing the original data based on the type; determining a satisfaction of a data exchange constraint from the normalized data. In this way, the embodiments of the present disclosure may simplify and promote the determination of the data exchange constraint and accelerate the data exchange process.
    Type: Grant
    Filed: February 24, 2022
    Date of Patent: October 11, 2022
    Assignee: BEIJING BYTEDANCE NETWORK TECHNOLOGY CO., LTD.
    Inventors: Xingxiu Chen, Yuming Liang, Jianye Ye, Yu Zheng, Wei Jiang, Cheng Wei, Feng Ren, Mingdong Zhao
  • Patent number: 11461484
    Abstract: A method by one or more runtime agents protecting a web application for capturing contextual information for data accesses. The method includes determining first metadata associated with a web application layer request sent by a web application firewall to the web application, determining second metadata associated with the web application layer request based on information available to the web application, serializing the first metadata and the second metadata to generate serialized metadata, and adding the serialized metadata to a database query that is to be submitted by the web application to the database server, wherein execution of the database query that includes the serialized metadata by the database server is to cause the database activity monitor to store the serialized metadata and third metadata associated with the database query determined by the database activity monitor in a data storage.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: October 4, 2022
    Assignee: Imperva, Inc.
    Inventors: Kunal Anand, Brian Anderson, Joe Moore, Ran Rosin, Itsik Mantin, Peter Klimek, Craig Burlingame
  • Patent number: 11463460
    Abstract: Techniques for inspecting network traffic are disclosed. An application executing as an operating system extension that uses a virtual private network (VPN) stack of the operating system intercepts an Internet protocol (IP) packet for delivery to a remote computer system. A determination is made of an alteration action to take in response to intercepting the packet. The determined action is taken.
    Type: Grant
    Filed: March 23, 2021
    Date of Patent: October 4, 2022
    Assignee: Barracuda Networks, Inc.
    Inventors: Sinan Eren, Jose Luis Ferras Pereira, Pablo German Sole, Luisa Marina Moya Praca de Araujo Lima
  • Patent number: 11457037
    Abstract: Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user. The predetermined date may by an event, an anniversary or a milestone associated with employment of the user with a company. The campaign controller may identify a date associated with the user and based on the identification of the date associated with the user, the campaign controller may select one or more templates for one or more simulated phishing campaigns to be triggered by a predetermined date related to the date associated with the user.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: September 27, 2022
    Assignee: KnowBe4, Inc.
    Inventor: Greg Kras
  • Patent number: 11451553
    Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: September 20, 2022
    Assignee: Live Nation Entertainment, Inc.
    Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
  • Patent number: 11442624
    Abstract: A digital certification system (or “analyzer”) provides protection for digital content stored on servers, file sharing systems, hard drives and USB enabled external drives or other digital repositories. The analyzer prevents unauthorized access from both owners/administrators and recipients of digital content being shared through a web based or file sharing type service. The analyzer protects the owner of the shared digital content from unauthorized access, while allowing multiple protection instances to be applied to multiple digital content shares within a digital file hosting and sharing environment. Timers are provided to limit access to digital content at the discretion of the owner of the digital content.
    Type: Grant
    Filed: February 22, 2020
    Date of Patent: September 13, 2022
    Inventor: Anthony Tan