Patents Examined by Jeffery L Williams
-
Patent number: 11586745Abstract: An integrated one-chip security module for a smart energy security threat response included in an intelligent smart meter constituting a smart energy system includes: a first core unit collecting measured data generated in an operation process of the smart energy system and stores the measured data in a security memory; and a second core unit encrypting the measured data stored in the security memory and transmitting the encrypted data to an external device.Type: GrantFiled: November 28, 2020Date of Patent: February 21, 2023Assignee: CIOT Inc.Inventors: Hyeon-Ju Park, Han-Na Park
-
Patent number: 11575515Abstract: A method comprises maintaining, for at least one remote device, a security footprint and a verified version of a software stack for the remote device, generating an attestation initiation token that includes a nonce to be used to generate an XMSS signature for attestation of the remote device, sending the attestation initiation token to the remote device, receiving, from the remote device, a modified message representative including a hash of a current version of a software stack for the remote device and an indicator of a version number of the current version of the software stack for the remote device, validating the hash, and in response to a determination that the hash is valid, generating an XMSS signature using the security footprint and the current version of a software stack for the remote device and a security footprint for the apparatus.Type: GrantFiled: December 23, 2020Date of Patent: February 7, 2023Assignee: INTEL CORPORATIONInventors: Santosh Ghosh, Marcio Juliato, Manoj Sastry
-
Patent number: 11575689Abstract: A system, method, and computer program product are provided for dynamically configuring a virtual environment for identifying unwanted data. In use, a virtual environment located on a first device is dynamically configured based on at least one property of a second device. Further, unwanted data is identified, utilizing the virtual environment.Type: GrantFiled: July 8, 2019Date of Patent: February 7, 2023Assignee: MCAFEE, LLCInventors: Igor G. Muttik, Mikhail Yu Vorozhtsov
-
Patent number: 11575714Abstract: This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different environments, such as those including personal applications and corporate applications, so that both types of applications can run simultaneously while complying with all required policies. The invention enables employees to use their personal devices for work purposes, or work devices for personal purposes. The secure, policy-based separation is created by dividing the data processing device into two or more “domains,” each with its own policies. These policies may be configured by the device owner, an IT department, or other data or application owner.Type: GrantFiled: October 28, 2021Date of Patent: February 7, 2023Assignee: Pulse Secure, LLCInventors: Yoav Weiss, David Goldschlag, Karl Ginter, Michael Bartman
-
Patent number: 11574071Abstract: A target device stores secure information and one or more security tools configured to protect against unauthorized access of the secure information. A first database stores profiles for each of a set of predefined attack groups. Each profile includes a set of attack techniques used by the corresponding attack group and, for each attack technique, a corresponding set of mitigations. A second database stores control policies. Each control policy is associated with a set of security tools that protect against unauthorized access of the secure information stored by the target device. A controls monitor determines an attack controls superset based on the profiles and control policies. A controls health dashboard receives a user query and provides a representation of a portion of the attack controls superset that is associated with the received query.Type: GrantFiled: July 28, 2020Date of Patent: February 7, 2023Assignee: Bank of America CorporationInventor: Martin A. Carmichael
-
Patent number: 11568095Abstract: Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.Type: GrantFiled: May 11, 2020Date of Patent: January 31, 2023Assignee: Micron Technology, Inc.Inventors: Claudia A. Delaney, Elsie de la Garza Villarreal, Madison E. Wale, Bhumika Chhabra
-
Patent number: 11568091Abstract: A system, method, and computer-readable medium are disclosed for attesting component certificates to particular devices. An enterprise hosted integrity protected distributed ledger, such as a block chain, is provided to publish component certificates. Component vendors are provided authorization tokens to publish their component certificates. Manifests are generated by the original equipment manufacturer (OEM) that includes vendor component identifiers. End users discover the distributed ledger through a verification mechanism, and the component certificates are retrieved from the distributed ledger.Type: GrantFiled: January 15, 2021Date of Patent: January 31, 2023Assignee: Dell Products L.P.Inventors: Charles D. Robison, Vaibhav Soni
-
Patent number: 11563585Abstract: Systems and methods for establishing an arbitration agreement for an agreement. A method includes creating, by a first computing system associated with a first party, an ArbitrationInformation attribute comprising the arbitration agreement. The method includes signing, by the first computing system, the ArbitrationInformation attribute with the first computing system's digital signature; creating, by the first computing system, a first SignedData message comprising the ArbitrationInformation attribute and information indicative of the agreement; and transmitting, by the first computing system, the first SignedData message to a second computing system associated with a second party different than the first party and on a different network node than the first party.Type: GrantFiled: July 30, 2019Date of Patent: January 24, 2023Assignee: Wells Fargo Bank, N.A.Inventor: Phillip H. Griffin
-
Patent number: 11558379Abstract: Some implementations of the disclosure are directed to receiving, at an authentication server system, a distributed ledger address transmitted by a client device to identify itself during an authentication process for accessing a network, where the distributed ledger address corresponds to a distributed ledger network; transmitting an authentication challenge message from the authentication server to the client device; in response to transmitting the authentication challenge message from the authentication server to the client device, receiving at the authentication server, a response to the challenge message including a signature; and using at least the distributed ledger network to determine if the signature used to sign the response to the challenge message is associated with the distributed ledger address transmitted by the client device.Type: GrantFiled: July 15, 2019Date of Patent: January 17, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Mohammed Salman, Rajarao Bhagya Prasad Nittur, Ram Tripathi, Mohit Goyal, Rajesh Kumar Ganapathy Achari
-
Patent number: 11558347Abstract: Systems and methods for connecting devices via a virtual global network across network fabrics using a network tapestry are disclosed. The network system comprises a first access point server in communication with a first backbone exchange server, a second access point server in communication with a second backbone exchange server, and a network tapestry comprising a first communication path connecting the first and second access point servers and a second communication path connecting the first and second backbone exchange servers.Type: GrantFiled: June 13, 2016Date of Patent: January 17, 2023Assignee: UMBRA TECHNOLOGIES LTD.Inventor: Joseph E. Rubenstein
-
Patent number: 11558407Abstract: The present invention relates to methods, processes, and systems for monitoring security policy violations in a computer network. Details of such monitoring include creating a rule according to a security policy, determining if the rule is violated by a value of a variable, and recording security events and comparing the number of events to a threshold.Type: GrantFiled: February 3, 2017Date of Patent: January 17, 2023Assignee: Defensestorm, Inc.Inventors: Sean Cassidy, Alejandro Hernandez, Darryl J. Landreneau, Edgardo Nazario
-
Patent number: 11558374Abstract: Methods that can verify a password utilizing commitments are provided. One method includes receiving from a client device and storing, by a processor, an initial commitment representing a password for a user account without storing the actual password on the apparatus, receiving, from the client device, a subsequent commitment, and verifying that the subsequent commitment represents the password for the user account based on a difference between the initial commitment and the subsequent commitment. Systems and apparatus that can include, perform, and/or implement the methods are also provided.Type: GrantFiled: March 31, 2021Date of Patent: January 17, 2023Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Igor Stolbikov, Joshua N. Novak, Scott Wentao Li
-
Patent number: 11550945Abstract: A method includes a data processing system creating a virtual machine for use with a data owner system in accordance with a temporary credential protocol between the data processing system and the data owner system. The method continues with by the virtual machine accessing memory of the data owner system regarding a set of data records having common data criteria. The method continues by the virtual machine modifying the set of data records to produce a set of shareable data records. The method continues with the data processing system executing a data analysis function on the set of shareable data records to produce an analytical result. The method continues with the data processing system sending the analytical result to a data consumer computing entity.Type: GrantFiled: March 13, 2020Date of Patent: January 10, 2023Assignee: Sympatic, Inc.Inventors: Joseph Sislow, Piers Nash
-
Patent number: 11544708Abstract: Technologies are shown for secure management of personal information data involving storing personal information data in a personal information data block and committing the personal information data block to a personal information data blockchain and authorizing access to the personal information data by a platform entity by storing a platform identifier corresponding to the platform entity in authorized access data. An access request is received from the platform entity that includes the platform identifier for the first platform entity. If the platform identifier is verified to be in the authorized access data, the personal information data is obtained from the personal information data blockchain and returned to the platform entity. In some examples, the authorized access data includes permissions that identify portions of the personal information data that the platform entity can access. In other examples, the authorized access data is secured on an authorized access data blockchain.Type: GrantFiled: June 27, 2018Date of Patent: January 3, 2023Assignee: EBAY INC.Inventor: Sergio Pinzon Gonzales, Jr.
-
Patent number: 11546352Abstract: Utilities (e.g., methods, systems, apparatuses, etc.) for use in generating and making use of priority scores for data generated by one or more data systems that more accurately prioritize those events and other pieces of data to be addressed by analysts and troubleshooters before others (e.g., collectively taking into account threats posed by origin host components and risks to impacted host components) to work the highest risk events and alarms first and to effectively and efficiently spend their alarm monitoring time.Type: GrantFiled: June 1, 2020Date of Patent: January 3, 2023Assignee: LogRhythm, Inc.Inventors: Christopher L. Petersen, Mark Vankempen
-
Patent number: 11539726Abstract: Disclosed herein are systems and methods for generating heuristic rules for identifying spam emails based on fields in headers of emails. In one aspect, an exemplary method comprises, collecting statistical data on contents of a plurality of emails; analyzing the statistical data to identify different types of content, including headers or hyperlinks in said emails; grouping the emails into clusters based on types of content identified in said emails, wherein at least one cluster group being based on fields in headers of said emails; generating a hash from the most frequent combination of group of data in each cluster; formulating regular expressions based on analysis of hyperlinks of emails corresponding to the generated hashes; and generating heuristic rule for identifying spam emails by combining the hashes and the corresponding regular expressions, wherein the hash is generated based on fields in the headers of said emails.Type: GrantFiled: September 30, 2021Date of Patent: December 27, 2022Assignee: AO Kaspersky LabInventors: Roman A. Dedenok, Dmitry S. Golubev, Petr A. Salnikov
-
Patent number: 11539707Abstract: Various embodiments provide for the consolidation of policies across multiple identities that are respectively associated with multiple active directory (AD) groups to which a user belongs. Present embodiments provide for dynamically generating a new identity in the resource provider environment that includes permissions to all of the resources that may otherwise be distributed across multiple identities. Specifically, in accordance with various embodiments, when a user login is detected, the active directory is queried to determine the AD groups to which the user belongs. As mentioned, the user's AD groups are mapped to respective identities in the resource provider environment, in which each identity includes policy defining access to one or more resources. The policies of all the respective identities are consolidated and assigned to a new identity. The user may assume the new identity and access all the resources in tandem.Type: GrantFiled: September 14, 2020Date of Patent: December 27, 2022Assignee: Amazon Technologies, Inc.Inventors: Robert W. Kissell, Eric Andrew Scholz
-
Patent number: 11533183Abstract: A system, includes a device and a payload warehouse. The device receives a user request to initiate a feature of the device. In response to receiving the request, device information is provided to a payload warehouse. The payload warehouse stores an inventory which includes a digital payload. The digital payload includes data, such as a digital certificate, which may be used by the device to implement the user-requested feature. The payload warehouse receives the device information provided by the device and determines an encryption vector based at least in part on the received device information. Using the encryption vector, the digital payload is encrypted. The encrypted digital payload is provided to the device.Type: GrantFiled: January 10, 2020Date of Patent: December 20, 2022Assignee: Lennox Industries Inc.Inventors: Nguyen Trong Ho, Sunil Khiani
-
Patent number: 11526613Abstract: A computer system has a separation mechanism which enforces separation between at least two execution environments such that one execution environment is a gatekeeper which interposes on all communications of the other execution environment. The computer system has an attestation mechanism which enables the gatekeeper to attest to properties of the at least two execution environments. A first one of the execution environments runs application specific code which may contain security vulnerabilities. The gatekeeper is configured to enforce an input output policy on the first execution environment by interposing on all communication to and from the first execution environment by forwarding, modifying or dropping individual ones of the communications according to the policy. The gatekeeper provides evidence of attestation both for the application specific code and the policy.Type: GrantFiled: July 3, 2019Date of Patent: December 13, 2022Assignee: Microsoft Technology Licensing, LLCInventors: David Thomas Chisnall, Cédric Alain Marie Fournet, Manuel Costa, Samuel Alexander Webster, Sylvan Clebsch, Kapil Vaswani
-
Patent number: 11526585Abstract: Techniques for managing activation of software, e.g., an operating system, in an information processing system are provided. For example, a method comprises the following steps. A data object is obtained for a system having an un-activated computer program stored thereon. The data object comprises information about the system encrypted by a private value. The method then causes the data object to be securely stored on a distributed ledger for subsequent access during a process to activate the computer program.Type: GrantFiled: February 6, 2020Date of Patent: December 13, 2022Assignee: Dell Products L.P.Inventors: Shibi Panikkar, Murali Devendranath