Patents Examined by Jeremiah L Avery
  • Patent number: 12045380
    Abstract: There is provided a method and apparatus for controlling a privacy setting of at least one sensor. A signal is acquired from one or more sensors. A characteristic of one or more subjects is detected in the acquired signal. A privacy level is set based on the detected characteristic of the one or more subjects. A privacy setting of at least one sensor is controlled based on the set privacy level.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: July 23, 2024
    Inventors: Matthew John Lawrenson, Lucas Jacobus Franciscus Geurts, Vincentius Paulus Buil
  • Patent number: 12045176
    Abstract: Embodiments are directed to memory protection with hidden inline metadata. An embodiment of an apparatus includes processor cores; a computer memory for the storage of data; and cache memory communicatively coupled with one or more of the processor cores, wherein one or more processor cores of the plurality of processor cores are to implant hidden inline metadata in one or more cachelines for the cache memory, the hidden inline metadata being hidden at a linear address level.
    Type: Grant
    Filed: April 18, 2023
    Date of Patent: July 23, 2024
    Assignee: Intel Corporation
    Inventors: David M. Durham, Ron Gabor
  • Patent number: 12034770
    Abstract: In one or more embodiments, the present invention is directed to a blockchain secured, software-defined network and monitoring system comprising: a multi-controller software-defined network (SDN) network layer; a blockchain based security and autonomy layer; a deep learning-driven decision making layer comprising the one or more computational centers and a horizontal data plane layer. In some embodiments, the present invention is directed to methods for ensuring the integrity of a control commands and optimizing performance and security using the blockchain secured, software-defined network and monitoring system. In various embodiments, the present invention relates to methods for extracting useful features from said labelled and non-labelled data contained in the horizontal data plane layer in the blockchain secured, software-defined network and monitoring system using a knowledge domain-enabled hybrid semi-supervision learning method.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: July 9, 2024
    Assignee: The University of Akron
    Inventors: Jin Kocsis, Mututhanthrige Praveen Sameera Fernando, Yifu Wu
  • Patent number: 12032726
    Abstract: Systems and methods for obfuscating keyboard keys against interception are provided. In an example, a protected application is dynamically virtualized in user space, wherein the virtualization comprises an isolated keyboard path. Keystrokes are injected to the isolated keyboard path, wherein the injected keystrokes are associated with a respective timestamp, and user input keystrokes are obfuscated with the injected keystrokes and the obfuscated keystrokes are passed to a low level hook. The obfuscated keystrokes passed to the low level hook are separated according to tags associated with the obfuscated keystrokes to obtain the user input keystrokes. The user input keystrokes are transmitted to a target window of the protected application.
    Type: Grant
    Filed: May 17, 2022
    Date of Patent: July 9, 2024
    Assignee: Deloitte Development LLC
    Inventors: Egemen Tas, Haibo Zhang
  • Patent number: 12026292
    Abstract: A remote control-based method for protecting information on a device screen is provided. A controlling terminal controls a controlled terminal through a remote control system, and the remote control-based method specifically includes the following steps: S1: superimposing a floating layer on a content page of a screen of the controlled terminal; S2: adjusting transparency of the floating layer to allow the content page on the screen of the controlled terminal to be invisible; S3: taking a screenshot of the controlled terminal; and S4: adjusting brightness of the screenshot to restore the content page to be normally visible and displayed at the controlling terminal. The remote control-based method can prevent screen information on a remote device from being disclosed, provide a more secure and private environment for a remote control process, and protect the security of information.
    Type: Grant
    Filed: January 17, 2022
    Date of Patent: July 2, 2024
    Assignee: SAND STUDIO PTE. LTD.
    Inventor: Jun Xiong
  • Patent number: 12021967
    Abstract: Data privacy is a major concern when accessing and processing sensitive medical data. Homomorphic Encryption (HE) is one technique that preserves privacy while allowing computations to be performed on encrypted data. An encoding method enables typical HE schemes to operate on real-valued numbers of arbitrary precision and size by representing the numbers as a series of polynomial terms.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: June 25, 2024
    Assignee: Siemens Healthineers AG
    Inventors: Andreea Bianca Popescu, Cosmin Ioan Nita, Ioana Taca, Anamaria Vizitiu, Lucian Mihai Itu, Puneet Sharma
  • Patent number: 12021877
    Abstract: Systems and methods for managing membership in a private data exchange are provided herein. In one embodiment, the method includes receiving a request for access to a first listing of a data exchange, each listing of the data exchange comprising version metadata. The method further includes, in response to the request, accessing a first version of a data set referenced by the first listing, wherein the first version of the data set comprises a first structure defined by first version metadata, a second listing of the data exchange references a second version of the data set, the second version of the data set comprising a second structure defined by second version metadata, and the second structure is incompatible with the first structure.
    Type: Grant
    Filed: September 18, 2023
    Date of Patent: June 25, 2024
    Assignee: Snowflake Inc.
    Inventors: Pui Kei Johnston Chu, Benoit Dageville, Matthew J. Glickman, Christian Kleinerman, Prasanna Krishnan, Justin Langseth
  • Patent number: 12021902
    Abstract: Systems and methods are provided for evaluation of communication paths through networks to determine whether communication is permitted across one or more internal network boundaries. The analysis may be used to determine whether a node in one isolated network (e.g., VPC, VPN, client on-premise network, etc.) is able to communicate with a node in another isolated network across region and/or segment boundaries. The automated analysis can allow users (e.g., network administrators) to see what high-level policies (e.g., Cloud WAN policies written in a declarative language) are interfering with or permitting communication between the nodes.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: June 25, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Baihu Qian, Bashuman Deb, Justin Lin Hsieh, Daniel William Dacosta, Nick Matthews, Viktor Heorhiadi, Lalith Kumar Ramamoorthi, Anoop Dawani, Omer Hashmi, Thomas Nguyen Spendley
  • Patent number: 12022009
    Abstract: The present disclosure relates to a method and device for performing access control by authenticating an electronic device and performing secure ranging. The method may include: receiving, from a server, a device certificate including a first scrambled timestamp sequence (STS) code encrypted by a public key of the electronic device and a second STS code encrypted by an STS key; transmitting the device certificate to a target device; obtaining the first STS code by decrypting the encrypted first STS code by using a secret key of the electronic device; and performing secure ranging with the target device by using the first STS code.
    Type: Grant
    Filed: October 21, 2020
    Date of Patent: June 25, 2024
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Jieun Keum, Oleksandr Andrieiev
  • Patent number: 12013924
    Abstract: Verification of digital identities with a non-repudiable proof of identity maintained in a verification log. The verification log may be generated by a platform for verification of a digital identity of a human user in response a request for verification of a human user's identity from a relying party. Such verification may be performed via online transactions or via an identity verification device. The non-repudiable proof of identity may include records in the verification audit log that may be non-reversible. As such, anonymized records may be maintained that demonstrate proof of identity verification without providing sensitive details. The verification log may be accessible by relying parties and/or end users to provide a record of verifications.
    Type: Grant
    Filed: December 7, 2023
    Date of Patent: June 18, 2024
    Assignee: Credence ID, LLC
    Inventors: Bruce Hanson, Yash Shah, Ravishankar Mysore, Vijeth Aralaguppi
  • Patent number: 12013932
    Abstract: A computer security system with enhanced blacklisting includes administrative interfaces that accept user inputs to create and modify entries in a blacklist and a whitelist that define which programs are allowed to execute on one or more target computer systems. Upon an attempt to run a program, if the program is in the blacklist and not in the white list, the program is prevented from running. If the program is prevented from running, at a later time, an administrative interface is used to either block future execution of the program or to create an entry in the whitelist that allows future execution of a class of programs or only that the program until revoked. The whitelists and blacklists are for a single target computer or many computers.
    Type: Grant
    Filed: March 8, 2022
    Date of Patent: June 18, 2024
    Assignee: PC MATIC, INC.
    Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, Jr., Andrew Tuch
  • Patent number: 12015603
    Abstract: Systems and methods are described for a multi-tenant mode of a serverless code execution system. For instance, a method may include maintaining a set of execution environments, wherein each execution environment is associated with a serverless function, wherein the serverless function is associated with a software as a service (SaaS) provider that is a tenant of a cloud services provider, wherein the SaaS provider provides services to sub-tenants, wherein the set of execution environments are partitioned based on sub-tenants of the SaaS provider; receiving a call to execute a serverless function, wherein the call includes a serverless function identifier and a sub-tenant identifier; identifying a sub-tenant-specific execution environment of the set of execution environments that is associated with the sub-tenant; and in response to identifying the tenant-specific execution environment, invoking the serverless function on the sub-tenant-specific execution environment.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: June 18, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Mikhail Danilov, Deepthi Chelupati, David Nasi, Dylan Owen Marriner, Suganya Rajendran, Sean Tyler Myers
  • Patent number: 12008373
    Abstract: Instance instrumentation is provided for different data sources by identifying an instance of a function in a program that receives input from an untrusted source; and replacing, at runtime of the program, the instance of the function with an instrumented version of the function that includes a marking function to indicate an output of the instrumented version of the function is tainted by the input received from the untrusted source. Additionally, instance instrumentation can be provided by identifying a second instance of the function in the program that does not receive input from the untrusted source; and leaving, at runtime of the program, the second instance of the function alone, wherein the second instance of the function is not replaced with the instrumented version of the function.
    Type: Grant
    Filed: October 12, 2021
    Date of Patent: June 11, 2024
    Assignee: Synopsys, Inc.
    Inventors: Allon Mureinik, Niv Mamam
  • Patent number: 12003630
    Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.
    Type: Grant
    Filed: July 26, 2023
    Date of Patent: June 4, 2024
    Assignee: Wiz, Inc.
    Inventors: Shahar Rand, Eric Abramov, Yaniv Shaked, Elad Gabay
  • Patent number: 11997141
    Abstract: A method, computer system, and computer program product are provided for performing policy enforcement, attestation, and network forensics. A universal reference for a computing entity is obtained, wherein the universal reference identifies one or more components of the computing entity by additional universal references assigned to the one or more components. A hierarchical description of the computing entity is determined by enumerating each additional universal reference of the one or more components and additional sub-components, wherein the hierarchical description exhaustively identifies the components and sub-components of the computing entity. The hierarchical description is analyzed by accessing a database to identify mappings of the one or more additional universal references to the one or more components and sub-components.
    Type: Grant
    Filed: October 21, 2021
    Date of Patent: May 28, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jeffrey G. Schutt, Edward A. Warnicke
  • Patent number: 11997198
    Abstract: A wireless communication network generates and transfers qubits to a wireless user device. The wireless communication network and the wireless user device determine polarization states for the qubits. The wireless communication network and the wireless user device exchange cryptography information. The wireless communication network and the wireless user device generate cryptography keys based on the polarization states and the cryptography information. The wireless communication network and the wireless user device encrypt and decrypt data that they exchange with one another based on the cryptography keys.
    Type: Grant
    Filed: June 28, 2023
    Date of Patent: May 28, 2024
    Assignee: T-MOBILE INNOVATIONS LLC
    Inventors: Marouane Balmakhtar, Lyle Walter Paczkowski
  • Patent number: 11997087
    Abstract: A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.
    Type: Grant
    Filed: June 13, 2023
    Date of Patent: May 28, 2024
    Assignee: SECURE IDENTITY, LLC
    Inventor: Stewart Whitman
  • Patent number: 11973889
    Abstract: The present disclosure relates to a searchable encrypted data sharing method and system based on blockchain and homomorphic encryption, which protects security of sensitive data on the blockchain and realizes searchable and homomorphic calculation of data ciphertext. According to the present disclosure, a data owner encrypts the generated sensitive data and the keywords extracted according to the data with his own key, and then sends the encrypted transaction information to the cloud server. The cloud server verifies the identity of the data owner. If the verification succeeds, the uploaded ciphertext data is stored on a local server, and a ciphertext index, keyword ciphertext and related evidences of the data storage are uploaded to an alliance chain. The alliance chain node verifies the consistency of the uploaded transaction information, and if the verification succeeds, the transaction information is recorded.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: April 30, 2024
    Assignees: Zhejiang University City College, Zhejiang Gongshang University, Insititute Of Information Engineering, CAS, Zhejiang Ponshine Information Technology Co., Ltd.
    Inventors: Song Han, Siqi Ren, Haiqing Bai, Ben Niu, Xiaoli Chen
  • Patent number: 11973790
    Abstract: Implementations include determining a set of components within the connected vehicle ecosystem, components within the set of components representing at least one layer within the connected vehicle ecosystem, for each component in the set of components: providing a set of facts representative of the respective component, and providing a component digital twin using the set of facts, defining a set of digital twins including digital twins of components in the set of components, generating, using the set of digital twins, at least one AAG representative of potential lateral movement between components of the at least one layer within the connected vehicle ecosystem, the at least one AAG representing a contextual digital twin of components operating within the connected vehicle ecosystem, and evaluating the connected vehicle ecosystem using the at least one AAG.
    Type: Grant
    Filed: November 9, 2021
    Date of Patent: April 30, 2024
    Assignee: Accenture Global Solutions Limited
    Inventors: Dan Klein, Elad Segev
  • Patent number: 11966484
    Abstract: A computer-implemented method comprising receiving, based on a first user interface of a first application executing on a first device, user input that indicates a recipient, the recipient associated with registration information that indicates a method of communication with the recipient and an encryption key associated with the method of communication. The method causing an encrypted message to be generated based on the encryption key, the encrypted message encrypting clear data based on received user input, causing the encrypted message to be formatted into an encrypted package, that is in an application format compatible with a second application corresponding to the method of communication, wherein the application format is compatible with the second application by at least being a format that is allowed to be sent or to be processed by the second application, and providing the encrypted package to the second application to be sent to the recipient.
    Type: Grant
    Filed: March 27, 2023
    Date of Patent: April 23, 2024
    Assignee: Arebus LLC
    Inventors: Edwin Zargarian, Andrew Robert Rolfe