Patents Examined by Jeffrey C Pwu
-
Patent number: 12219076Abstract: Systems and methods that mitigate network congestion on blockchain networks by supporting blockchain operations through off-chain interactions. For example, as communications to initiate off-chain events and/or blockchain operations are received, the system may determine various characteristics about the addresses involved. In particular, the system may determine whether the addresses correspond to cryptography-based, storage applications sharing a common platform service.Type: GrantFiled: June 15, 2022Date of Patent: February 4, 2025Assignee: Coinbase, Inc.Inventors: Jim Cai, Lauren Dowling, Brian Cripe, Rick Huynh
-
Patent number: 12218937Abstract: A packet processing method. A protection device receives a first access request packet. The first access request packet includes a packet sent based on a TCP/IP protocol. The protection device extracts a first fingerprint feature from a transport-layer packet header and/or a network-layer packet header of the first access request packet. The first fingerprint feature corresponds to an operating system type of a terminal device that transmits the first access request packet. The protection device recognizes the first fingerprint feature based on a fingerprint feature database to determine whether to allow the first access request packet to access a server. The protection device allows the first access request packet to pass through when the first access request packet is allowed to access the server. The protection device blocks the first access request packet when the first access request packet is not allowed to access the server.Type: GrantFiled: April 28, 2022Date of Patent: February 4, 2025Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Shiguang Li
-
Patent number: 12219043Abstract: A system for matrix-based homomorphic encryption including a processor of a computing node configured to host a homomorphic encryption module and connected to at least one cloud server and a memory on which are stored machine-readable instructions that when executed by the processor, cause the processor to: acquire plaintext M required to be encrypted; select a size of a matrix and modulus n; select invertible × matrix S1 over n, wherein n is a residue ring modulo n; compute an invertible × matrix S2 over n; set a secret key (S1, S2); and encode the plaintext M by an integer m over n, wherein m is encoded by an envelope matrix comprising a form V ? ( m ) = ( ? 0 ? m ) , wherein ? and ? are numbers chosen at random ?, ??n.Type: GrantFiled: June 28, 2024Date of Patent: February 4, 2025Inventors: Semen Konstantinovich Rososhek, Ilya Rososhek
-
Patent number: 12219062Abstract: An electronic device and method are disclosed for managing a non-fungible token (NFT). The electronic device includes: a memory configured to store computer-executable instructions, and a processor. The processor implements the method, including: generating, a NFT for target content in response to receiving a request to register the target content from a first external electronic device, generating, for the NFT, a certification authority (CA) signature indicating that the NFT is generated by the server, and transmitting, via a communication circuitry, the NFT to the first external electronic device, wherein an ownership signature is added to the NFT, together with the CA signature, the ownership signature based on a private key of a user to which ownership of the NFT is assigned.Type: GrantFiled: June 22, 2022Date of Patent: February 4, 2025Assignee: Samsung Electronics Co., Ltd.Inventors: Bumhan Kim, Eunbi Kim, Hansang Song, Seungwon Shin
-
Patent number: 12212603Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device detects whether the endpoint has moved to a new network by monitoring for changes to an IP address associated with the endpoint. When the detecting is affirmative, the agent further determines whether a trusted network determination service associated with a cloud-based security service is reachable. When the determining is affirmative, the agent further identifies whether the new network is among a set of trusted networks that have been previously registered with the cloud-based security service by querying the trusted network determination service. When the identifying is affirmative, a particular security feature on the endpoint is configured for operation within a trusted network and when the identifying is negative, the particular security feature is configured for operation outside of a trusted networks.Type: GrantFiled: September 25, 2020Date of Patent: January 28, 2025Assignee: Fortinet, Inc.Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
-
Patent number: 12212958Abstract: Aspects are provided which allow a first device to secure transmission of polar encoded control information by encoding at least a portion of frozen bits and/or information bits with a shared key with a second device before these bits are encoded by a polar encoder. The first device determines whether to encode at least one of a plurality of frozen bits or a plurality of information bits using the shared key. Based on the determination, the first device encodes the frozen bits and/or the information bits, and sends the encoded frozen bits and/or the encoded information bits to the second device. Since the receiving device has the shared key, the receiving device may successfully decode the control information, while an eavesdropper who receives the encoded bits may fail to decode the control information due to lack of knowledge of the shared key.Type: GrantFiled: September 8, 2021Date of Patent: January 28, 2025Assignee: QUALCOMM IncorporatedInventors: Ahmed Elshafie, Hung Dinh Ly
-
Patent number: 12212667Abstract: A first network device may install a new receive key on a data plane of the first network device, and may provide, to a second network device, a first request to install the new receive key. The first network device may receive a first indication that the new receive key is installed by the second network device, and may install a new transmit key on the data plane of the first network device based on the first indication. The first network device may provide, to the second network device, a second request to install the new transmit key, and may receive a second indication that the new transmit key is installed and that an old receive key is deleted by the second network device. The first network device may delete the old receive key from the data plane of the first network device based on the second indication.Type: GrantFiled: May 9, 2022Date of Patent: January 28, 2025Assignee: Juniper Networks, Inc.Inventor: Sumeet Mundra
-
Patent number: 12210640Abstract: The present invention is directed to managing sensitive local data for a global application in compliance with local data residency requirements. In a first location having data residency requirements, the system receives a write request for a record, determines that the record includes both sensitive and non-sensitive data, stores the sensitive data in a local storage device, creates masked data corresponding to the sensitive data, creates a modified record that includes the masked data, the local storage ID of the sensitive data, and the non-sensitive data, and sends the modified record to a global application for storage in a second location. In the second location, the system receives the write request for the modified record at an enforcement module on the global application, determines whether the modified record complies with the data residency requirements of the first location and, if so, sends the modified record to a global storage device.Type: GrantFiled: May 12, 2022Date of Patent: January 28, 2025Assignee: Odaseva Technologies SASInventors: Sovane Bin, Saddek Dekoum, Francois Lopitaux, Remi Poujeaux, Arnaud Deronne
-
Patent number: 12210626Abstract: A method for prioritizing among vulnerabilities in a software code for a user by using a server is presented. The method comprises receiving a request, a software identification associated to the software code, and a user identification associated to the user from a user computer, fetching domain specific knowledge (DSK) data from a DSK database by using the software identification, wherein the DSK database comprises non-user defined features related to the vulnerabilities, fetching user specific knowledge (USK) data from a USK database by using the user identification, wherein the USK database comprises user defined features related to the vulnerabilities, determining utility estimations for the vulnerabilities, respectively, by comparing the vulnerabilities with the DSK data and comparing the vulnerabilities with the USK data, and transferring the utility estimations from the server to the user computer such that a prioritized list of vulnerabilities can be achieved.Type: GrantFiled: April 7, 2020Date of Patent: January 28, 2025Assignee: debricked ABInventors: Linus Karlsson, Pegah Nikbakht Bideh, Martin Hell
-
Patent number: 12212599Abstract: The present invention discloses a hacking detection method, including: deploying a plurality of trap IP addresses in a trap IP address list; collecting access logs from a plurality of network devices to create a connection record list, wherein the connection record list includes a plurality of connection records; and comparing the trap IP address list and the connection record list to obtain a suspicious source list. The suspicious source list includes a plurality of suspicious source IP addresses. The suspicious source IP addresses match a portion of the trap IP addresses in the trap IP address list.Type: GrantFiled: May 14, 2021Date of Patent: January 28, 2025Assignee: QUANTA COMPUTER INC.Inventors: Chen-Chung Lee, Chia-Hung Lin, Cheng-Yao Wang, Li-Pin Tseng
-
Patent number: 12212546Abstract: Systems and methods are described for implementing a device isolation service. A device isolation service creates and administers per-device virtual networks for individual computing devices, thereby isolating the computing devices from each other and limiting device-to-device communication. The device isolation service may further provide a monitored and access-controlled network that facilitates access to the isolated devices, thereby allowing “administrator” devices to access and administer devices while preventing a compromised device from seeing, probing, or compromising other devices on the network. The device isolation service may group devices by category or function, and may put devices that communicate with each other on the same virtual network while isolating other devices to different virtual networks.Type: GrantFiled: September 19, 2022Date of Patent: January 28, 2025Assignee: Amazon Technologies, Inc.Inventor: Eknath Venkataramani
-
Patent number: 12207084Abstract: The present invention relates to a method and wireless device for supporting verification of a device as well as to a method and a network node. It is desired to enable the reliable verification of a device. The method at the device includes transmitting the wireless device identifier; calculating verification information from a random bit sequence by using a verification function associated with the wireless device identifier, wherein the verification function uses the cryptographic key; transmitting a message including the verification information to a trusted network node over a secure connection; and wherein the secure connection is established by using a trusted network identifier or by using a network encryption key associated with a trusted network identifier.Type: GrantFiled: March 11, 2019Date of Patent: January 21, 2025Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Martin Hessler, Pål Frenger, Nicklas Johannson
-
Patent number: 12204625Abstract: Various methods, apparatuses/systems, and media for accessing a plurality of resources with a single authentication pass are disclosed. A processor successfully allows login a user into an application embedded within a user computing device based on a positive facial recognition result for gaining access to a building; generates, in response to successful login, a quick response (QR) code and a near field communication (NFC) tag; causes a security system installed in an entry point to the building to read the QR code or the NFC tag in response to bringing the user computing device close to the security system; authenticates the user based on successful reading of the QR code or the NFC tag; and configures the QR code or the NFC tag as a single authentication pass allowing the user to enter the building and access the plurality of resources for a predetermined configurable period.Type: GrantFiled: August 1, 2022Date of Patent: January 21, 2025Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Kumar Rao Krishnagi, Andrea Johnson, Cristine Santos, Swathi Govindarao, Lakshmipavankumar Vegirouthu, Deepak Chhabra
-
Patent number: 12193480Abstract: A device comprises a sensor and processing circuitry coupled to the sensor. The sensor is configured to obtain authentication information from an identification label of a cartridge of an electronic vaping device. The processing circuitry is configured to perform authentication of the cartridge based on the authentication information; and determine whether to unlock a battery section of the electronic vaping device to power the cartridge based on a result of the authentication of the cartridge.Type: GrantFiled: July 11, 2023Date of Patent: January 14, 2025Assignee: ALTRIA CLIENT SERVICES LLCInventors: Arie Holtz, Bernard Juster, Shmuel Gavrielov
-
Patent number: 12198070Abstract: An effective strategy provides an intuitive starting point for an enterprise network agent to resolve issues before the issues increase the probability of an outage. Being able to predict whether and when a current anomalous state will transform into an outage is valuable to an enterprise network agent tasked with network administration, including monitoring the network; configuring the network; recommending software or hardware licenses, updates, or additions; obtaining software or hardware licenses or devices; generating reports and alerts; and launching countermeasures in association with the enterprise network.Type: GrantFiled: March 29, 2021Date of Patent: January 14, 2025Assignee: Zoho Corporation Private LimitedInventors: Satya Madhuri Penumarthi, Ramprakash Ramamoorthy, Shailesh Kumar Davey
-
Patent number: 12200146Abstract: A blockchain-based data processing method and apparatus, a computer device, and a computer-readable storage medium.Type: GrantFiled: September 9, 2022Date of Patent: January 14, 2025Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Zhang Wang, Yixin Guo, Dezhi Wei, Zhaochuang Wang, Xiaoqiang Qiao, Youwei Liu
-
Patent number: 12197619Abstract: The present disclosure discloses an interactive method, an electronic device and a storage medium. In an embodiment, the method is applied to an electronic device including an interactive apparatus, and the method includes: receiving login request information and performing identity authentication; displaying information and/or at least one control corresponding to an authentication result; and displaying information corresponding to a control or executing a function corresponding to the control in response to an operation on the control.Type: GrantFiled: August 30, 2021Date of Patent: January 14, 2025Assignee: BOE Technology Group Co., Ltd.Inventor: Ting Li
-
Patent number: 12200134Abstract: There are provided systems and methods for multifactor authentication through cryptography-enabled smart cards. A user may engage in transactions or other online interactions that may require multifactor authentication, such as by providing a secondary or further piece of evidence or information that is used to more securely trust the user and that they are not another malicious user. The user may utilize a physical card that includes a microchip embedded to a surface, where the microchip includes a key or other cryptographic signing function to be able to be scanned and digitally sign a request for authentication from a computing device. A user's computing device may then be brought into close proximity to the microchip when a request to scan the card's microchip is received. The user's computing device may then use wireless signals to activate the microchip and perform a multifactor authentication.Type: GrantFiled: December 27, 2021Date of Patent: January 14, 2025Assignee: Brex Inc.Inventor: Jeff Venable
-
Patent number: 12189741Abstract: A password input method is disclosed. The password input method is conducted by a microprocessor of a touch sensitive password input device, wherein the touch sensitive password input device is integrated in an electronic device, such as point-of-sale payment terminal, smartphone, tablet computer, all-in-one computer, door station, and keyless electronic door lock. In case of the password input method according to the present invention being conducted, the touch sensitive password input device is controlled to guide a visually impaired person to successfully complete a password input operation with high security.Type: GrantFiled: December 15, 2021Date of Patent: January 7, 2025Assignee: CASTLES TECHNOLOGY CO., LTD.Inventors: Chia-Che Tsai, Chia-En Tsai
-
Patent number: 12192232Abstract: A security system for an in-vehicle network includes a gateway including at least one processor, wherein the at least one processor is configured to transition an intrusion detection and prevention system (IDPS) loaded into the gateway from a function off mode to a first monitoring mode and detect an intrusion into a general message and a diagnostic message on the in-vehicle network, transition from the first monitoring mode to a second monitoring mode and stop detecting the intrusion into the general message when there is a request to stop transmitting the general message from outside, detect the intrusion into the diagnostic message, and detect and block the general message introduced into the in-vehicle network.Type: GrantFiled: July 2, 2021Date of Patent: January 7, 2025Assignees: Hyundai Motor Company, Kia CorporationInventor: Ho Jin Jung