Patents Examined by Jeffrey C Pwu
  • Patent number: 11509467
    Abstract: Embodiments disclosed herein are related to generating and using a private key recovery seed based on random words extracted from a generated story to recover the private key. An input story is received from a user. The story includes random words and filler words that were previously generated. The number of random words generated is based on an entropy level. The random words included in the story are extracted. This means that the user does not need to enter any random words that are not included in the story to recover the private key. The random words are input into a first key recovery mechanism to thereby generate a private key recovery seed. The private key recovery seed is then input into a second private key recovery mechanism, the second private key recovery mechanism generating a recovered private key upon performing a recovery operation on the private key recovery seed.
    Type: Grant
    Filed: February 25, 2020
    Date of Patent: November 22, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Brandon Murdoch, Ankur Patel, Logan Girvin
  • Patent number: 11507643
    Abstract: At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: November 22, 2022
    Assignee: Intel Corporation
    Inventors: Malini K. Bhandaru, Kapil Sood, Christian Maciocco, Isaku Yamahata, Yunhong Jiang
  • Patent number: 11502998
    Abstract: Methods for provisioning and managing Internet-of-Things (IoT) devices over a network using device based tunneled nodes are provided. In one aspect, a method includes receiving, by a first network device in a network, data originated from an Internet-of-Things (IoT) device; identifying a device type of the IoT device by analyzing data packets of the received data; obtaining, by the first network device, a device profile for the IoT device, wherein the device profile is used for provisioning the IoT device to access the network; and provisioning the IoT device using the device profile, wherein the provisioning includes at least one of (1) identifying a tunneling attribute in the device profile; and (2) identifying a constrained application protocol (CoAP) parameter in the device profile, wherein the CoAP parameter is used to zero touch provision one or more device attributes of the IoT device. Systems and machine-readable media are also provided.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: November 15, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sivasankaran Nagarajan, Sudhir kumar Chimakurthy, Feroz Ahmed
  • Patent number: 11503023
    Abstract: A first authentication apparatus obtains a modification restriction parameter which is stored in a second authentication apparatus and which indicates a number of times a mutual authentication pair modification is possible or a number of times modification has been executed. The first authentication apparatus transmits to the second authentication apparatus authentication information corresponding to the modification restriction parameter. The second authentication apparatus receives the authentication information from the first authentication apparatus. The second authentication apparatus determines whether or not the received authentication information is authentication information for permitting the mutual authentication pair modification. In a case where the received authentication information is authentication information that permits the mutual authentication pair modification, the second authentication apparatus and the first authentication apparatus form a mutual authentication pair.
    Type: Grant
    Filed: December 29, 2020
    Date of Patent: November 15, 2022
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yuta Hojo
  • Patent number: 11503045
    Abstract: A cyber-physical system may have monitoring nodes that generate a series of current monitoring node values over time that represent current operation of the system. A hierarchical abnormality localization computer platform accesses a multi-level hierarchy of elements, and elements in a first level of the hierarchy are associated with elements in at least one lower level of the hierarchy and at least some elements may be associated with monitoring nodes. The computer platform may then determine, based on feature vectors and a decision boundary, an abnormality status for a first element in the highest level of the hierarchy. If the abnormality status indicates an abnormality, the computer platform may determine an abnormality status for elements, associated with the first element, in at least one level of the hierarchy lower than the level of the first element. These determinations may be repeated until an abnormality is localized to a monitoring node.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: November 15, 2022
    Assignee: General Electric Company
    Inventors: Masoud Abbaszadeh, Walter Yund, Daniel Francis Holzhauer
  • Patent number: 11496493
    Abstract: Systems and methods for implementing dynamic graph analysis (DGA) to detect anomalous network traffic are provided. The method includes processing communications and profile data associated with multiple devices to determine dynamic graphs. The method includes generating features to model temporal behaviors of network traffic generated by the multiple devices based on the dynamic graphs. The method also includes formulating a list of prediction results for sources of the anomalous network traffic from the multiple devices based on the temporal behaviors.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: November 8, 2022
    Inventors: LuAn Tang, Jingchao Ni, Wei Cheng, Haifeng Chen, Dongjin Song, Bo Zong, Wenchao Yu
  • Patent number: 11496459
    Abstract: A server includes a processor, memory, and a communications interface. During a registration process the communications interface receives a phone number associated with a client mobile device, from a client computer system. In response to receiving the phone number, the processor generates a password and associates it with the client computer system. The password is transmitted to the client mobile device using the received phone number, and a password interface is transmitted to the client computer system. The processor waits up to a predetermined amount of time for the password transmitted to the client mobile device to be returned to the server device via the password interface transmitted to the client computer system. In response to the predetermined amount of time expiring without receiving the password, a message allowing the registration process to be completed using the client mobile device is transmitted to the client mobile device.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: November 8, 2022
    Assignee: iHeartMedia Management Services, Inc.
    Inventor: Paula Buzzard
  • Patent number: 11494472
    Abstract: Systems and methods provide voice activated authentication over time. A user can be registered with a voice authentication system based on a voiceprint profile of common words. This user voiceprint profile can be used in an ongoing secondary authentication as a hands-free head-mounted wearable device is used over time. Upon a user logging into a hands-free head-mounted wearable device voiceprints can be collected during a session. These collected voiceprints can be compared with a user voiceprint profile for a user authorized to operate the hands-free head-mounted wearable device. Such a comparison can include an analysis of frequency, duration, and amplitude for the voiceprints. When the voiceprints match, the login of the user can be maintained based on this secondary authentication using the voiceprints matched to the user voiceprint profile.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: November 8, 2022
    Assignee: RealWear, Inc.
    Inventors: Sanjay Subir Jhawar, Tom Dollente, Kenneth Lustig, Christopher Iain Parkinson
  • Patent number: 11496518
    Abstract: Various embodiments of network access control (NAC) systems and methods are provided herein to control access to a network comprising a plurality of network endpoint nodes, where each network endpoint node includes a policy information point and a policy decision point. The policy information point within each network endpoint node stores a distributed ledger including one or more client policies that must be satisfied to access the network, and a smart contract including a set of predefined rules defining network access behaviors and actions. Upon receiving a network access request from a client device outside of the network, the policy decision point within each network endpoint node executes the smart contract to determine whether the client device should be granted access, denied access or have restricted access to the network, and executes consensus algorithm to select one of the network endpoint nodes to be a policy decision point leader.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: November 8, 2022
    Assignee: Dell Products L.P.
    Inventors: Charles D. Robison, Nicholas D. Grobelny, Jason Kolodziej
  • Patent number: 11496491
    Abstract: A fraud detecting method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network includes detecting whether a state of a vehicle satisfies a first condition or a second condition, and switching, upon detecting that the state of the vehicle satisfies the first condition or the second condition, an operation mode of a fraud-sensing electronic control unit connected to the network between a first mode in which a first type of detecting process for detecting a fraudulent message in the network is performed and a second mode in which the first type of detecting process is not performed.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: November 8, 2022
    Assignee: PANASONIC IN TEI IECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Manabu Maeda, Hideki Matsushima, Tomoyuki Haga, Yuji Unagami, Yoshihiro Ujiie, Takeshi Kishikawa
  • Patent number: 11489835
    Abstract: A method for performing secure transactions is disclosed. The method includes: providing an access controller between a core application and a third-party application, where the access controller prevents the third-party application from unauthorized access to the core application; receiving, by the access controller, a command from the third-party application to access the core application; transmitting, by the access controller, an authorization request to a secure application storing credentials of a user; providing, by the access controller, the third-party application with access to the core application in response to the access controller receiving notification from the secure application that the command is authorized; and preventing, by the access controller, the third-party application from accessing the core application in response to the access controller receiving notification from the secure application that the command is unauthorized.
    Type: Grant
    Filed: February 21, 2020
    Date of Patent: November 1, 2022
    Assignee: Asa Technologies, Corporation
    Inventors: Ryan Lawrence Ruff, Jay Landon Glenn
  • Patent number: 11487866
    Abstract: A security application may monitor applications attempting to be installed on a user device. In one example, various steps may include at least one of: receiving an application access operation on a computing device, identifying at least one application action associated with the application access operation, retrieving an application security profile stored in memory, identifying at least one application security restriction in the application security profile related to the at least one application action, restricting the at least one application action from occurring based on the at least one application security restriction and notifying a pre-registered device responsive to restricting the at least one application action.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: November 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael John Spisak
  • Patent number: 11487860
    Abstract: Authentication method and system using biometric data of a person. The method is flexibly usable on a plurality of distinct verification and authentication devices and comprises a verification process and an authentication process. First biometric data is captured by the verification device and compared to official biometric data. Captured and inputted data is certified and stored. At time of a required authentication of the person, live biometric data of the person is captured and compared to first biometric data. If the data is similar, the person is automatically authenticated.
    Type: Grant
    Filed: April 23, 2019
    Date of Patent: November 1, 2022
    Assignee: AMADEUS S.A.S.
    Inventors: Colin McKell-Redwood, Nicolas Torres, Gregorio Gianluca Prestia, Mohamed-Amine Maaroufi
  • Patent number: 11487897
    Abstract: In some aspects, a computing system can receive a request for a processing operation that involves a query. The computing system can extract a query parameter indicating an entity or information type. The computing system can parse, using the query parameter, an obfuscated dataset that is generated by electronically transforming (i) first sensitive information into first obfuscated data using an obfuscation key and (ii) second sensitive information into second obfuscated data using the obfuscation key. The sensitive information is unreadable in the obfuscated data. The computing system can match the query parameter to the first obfuscated data and the second obfuscated data based on a relationship between the first obfuscated data and the second obfuscated data. The relationship is independent of a meaning of the first and second sensitive information. The computing system can performing the processing operation using the first and second obfuscated data.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: November 1, 2022
    Assignee: EQUIFAX INC.
    Inventors: Lester Anthony Pieniazek, Stephen Leitner, Steven Hicklin
  • Patent number: 11489672
    Abstract: An example operation may include one or more of connecting, by a multi-party smart contract server, to a blockchain network configured to store cryptographic proofs, generating, by the multi-party smart contract server, a proposed transaction, providing, by the multi-party smart contract server, the proposed transaction to a plurality of participant nodes, receiving, by the multi-party smart contract server, responses to the proposed transaction from the participant nodes, executing, by the multi-party smart contract server, a smart contract to request from respondent participant nodes attestations of required conditions of the smart contract, receiving and verifying, by the multi-party smart contract server, the attestations from the respondent participant nodes, and executing the proposed transaction and posting a cryptographic proof of a successful execution to the blockchain, by the multi-party smart contract server, in response to a satisfaction of the required conditions of the smart contract.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: November 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, James R. Kraemer
  • Patent number: 11481492
    Abstract: Disclosed are a method and system for static behavior-predictive malware detection. The method and system use a transfer learning model from behavior prediction to malware detection based on static features. In accordance with an embodiment, machine learning is used to capture the relations between static features, behavior features, and other context information. For example, the machine learning may be implemented with a deep learning network model with multiple embedded layers pre-trained with metadata gathered from various resources, including sandbox logs, simulator logs and context information. Synthesized behavior-related static features are generated by projecting the original static features to the behavior features. A final static model may then be trained using the combination of the original static features and the synthesized features as the training data. The detection stage may be performed in real time with static analysis because only static features are needed.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: October 25, 2022
    Assignee: TREND MICRO INCORPORATED
    Inventors: Wen-Kwang Tsao, Chia-Yen Chang, PingHuan Wu
  • Patent number: 11475113
    Abstract: In some examples, voice modulation based voice authentication may include receiving a signal that represents a modulated voice of a user, and analyzing the signal to ascertain a specified code for a specified time period. Voice modulation based voice authentication may further include determining, for the specified time period, an authentication code from a plurality of authentication codes, and comparing the specified code to the authentication code. In response to a determination that the specified code matches the authentication code, voice modulation based voice authentication may further include authenticating the user.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: October 18, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jonathan Neuneker, Paul Michael Carson, Ian Christopher Shatto
  • Patent number: 11477188
    Abstract: Methods and systems for injection of tokens or certificates for managed application communication are described. A computing device may intercept a request from an application executable on the computing device, the request being to access a remote resource. The computing device may modify future network communications between the computing device and the remote resource to include a token or a client certificate, where the token or the client certificate is an identifier that enables the future network communications to be routed to the remote resource for a given computing session without use of data from the remote resource or data indicative of a connection of the remote resource in which to receive the future network communications. The computing device may send the future network communications to the remote resource to enable action to be taken on behalf of the computing device in response to receipt of the future network communications.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: October 18, 2022
    Assignee: Citrix Systems, Inc.
    Inventor: Thierry Duchastel
  • Patent number: 11477248
    Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: October 18, 2022
    Assignee: Menlo Security, Inc.
    Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
  • Patent number: 11477015
    Abstract: In some embodiments, a computing system may comprise a memory for storing a ledger; a computer processor for verification of the ledger, wherein the computer processor comprises at least one of a classical computer processor configured to run a virtual quantum machine and a quantum computer comprising a plurality of qubits; wherein the ledger is configured to store arbitrary classical information and quantum information which is verifiable using the computer processor. Furthermore, in some embodiments the computing system is configured to perform operations comprising: adding to the ledger using the computer processor to solve a mathematically difficult problem which is Quantum-Merlin-Arthur-complete (QMA-complete). In embodiments, a blockchain includes a quantum state. In some aspects, a unitary operator corresponding to a quantum rotation is found when new transaction data are to be secured in the blockchain.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: October 18, 2022
    Assignee: Rigetti & Co, LLC
    Inventors: Robert Stanley Smith, Nicholas C. Rubin, Johannes Sebastian Otterbach