Patents Examined by Jeremiah L Avery
-
Patent number: 12244703Abstract: Systems, methods, and computer-readable storage media for improving cybersecurity protections across entities. One system includes a response system including one or more processing circuits including memory and at least one processor configured to identify a plurality of first level configurations corresponding to at least one of an operational or security action performed on the a plurality of computing systems of an entity of a plurality of entities. The at least one processor further configured to encrypt or tokenize the plurality of first level configurations. The at least one processor further configured to record the plurality of first level configurations on the distributed ledger or data source.Type: GrantFiled: April 5, 2024Date of Patent: March 4, 2025Assignee: AS0001, Inc.Inventor: Jonathan J. Thompson
-
Patent number: 12238218Abstract: In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network (“DNN”) on those one-way homomorphic encryptions (i.e., each biometrics' feature vector) can determine matches or execute searches on encrypted data. Each biometrics' feature vector can then be stored and/or used in conjunction with respective classifications, for use in subsequent comparisons without fear of compromising the original biometric data. In various embodiments, the original biometric data is discarded responsive to generating the encrypted values. In another embodiment, the homomorphic encryption enables computations and comparisons on cypher text without decryption. This improves security over conventional approaches. Searching biometrics in the clear on any system, represents a significant security vulnerability. In various examples described herein, only the one-way encrypted biometric data is available on a given device.Type: GrantFiled: May 5, 2023Date of Patent: February 25, 2025Assignee: Private Identity LLCInventor: Scott Edward Streit
-
Patent number: 12238202Abstract: A cryptographic management key system is disclosed for providing secure communication in a cryptographic system. The cryptographic key management system includes a plurality of communication apparatuses under the control of a common control console, each communication apparatus being in communication with at least one source of dynamic random or pseudo-random information via the common control console, and communication paths among the plurality of communication apparatuses, said communication paths including a control plane, a random information plane and a data plane.Type: GrantFiled: February 15, 2023Date of Patent: February 25, 2025Assignee: Qwerx Inc.Inventors: Mark Pecen, John Ellingson
-
Patent number: 12235966Abstract: Systems and methods for providing secure motherboard replacement techniques are described. In one embodiment, an Information Handling System (IHS) may include computer-executable instructions to, during a bootstrap process, obtain a remodeled vendor tracking certificate from a replacement motherboard in which the remodeled vendor tracking certificate comprising inventory information associated with a previous motherboard, and determine that the vendor tracking certificate includes information indicating that the replacement motherboard has replaced a previous motherboard.Type: GrantFiled: July 22, 2022Date of Patent: February 25, 2025Assignee: Dell Products, L.P.Inventors: Mahesh Babu Ramaiah, Kalyani Korubilli
-
Patent number: 12229249Abstract: Protection of process memory against foreign code injection is described herein. A system includes at least one processor and at least one memory storing instructions thereon that, when executed by the at least one processor, cause the at least one processor to perform operations. The operations include to dynamically virtualize a protected application in user space, wherein the virtualization comprises a virtualized memory management system and to monitor memory allocated to the virtualized protected application by the virtualized memory management system. The operations include to compare memory allocated by the virtualized memory management system with known allocations of virtual memory. Additionally, the applications include to designate the memory as being injected with foreign code in response to the virtualized memory management system detecting privileges not created by the virtualized memory management system.Type: GrantFiled: May 17, 2022Date of Patent: February 18, 2025Assignee: Deloitte Development LLCInventors: Egemen Tas, Haibo Zhang
-
Patent number: 12229246Abstract: Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: scanning, in a sandbox of a browser by a browser extension, at least part of a web page to produce a set of items of interests; transmitting the set of items of interests to a cloud-based enrichment and analysis of cybersecurity threat intelligence system to request information on the set of items; receiving a response from the cloud-based enrichment and analysis of cybersecurity threat intelligence system, the response including a scan result based on the transmitted set of items of interests, and the scan result including at least one of an indicator of compromise of the at least scanned part of the web page; and displaying the scan results including the at least one of an indicator of compromise.Type: GrantFiled: June 25, 2021Date of Patent: February 18, 2025Assignee: ThreatConnect, Inc.Inventors: Edward Hinkle, Mashell Rodriguez, Marika Chauvin, Daniel Cole, Andrew Pendergast, Kathryn Grayson Nanz
-
Patent number: 12229298Abstract: A method for managing a data protection module (DPM) includes: obtaining an alert generated by the DPM within a predetermined period of time; obtaining metadata associated with the DPM; analyzing the metadata to extract relevant data; analyzing the alert to extract second relevant data; making, based on the second relevant data, a determination that a tolerance level associated with the alert has been exceeded; sending, based on the determination, the alert, the relevant data, and the second relevant data to a vendor environment (VE) analyzer; in response to sending the alert, the relevant data, and the second relevant data, receiving a service request (SR) generated by the VE analyzer for the DPM; and providing the SR to the client to notify a user of the client about the SR using a graphical user interface (GUI) of the client.Type: GrantFiled: March 10, 2023Date of Patent: February 18, 2025Assignee: DELL PRODUCTS L.P.Inventors: Shelesh Chopra, Gururaj Kulkarni, Mahantesh Ambaljeri
-
Patent number: 12231573Abstract: The disclosure provides improved methods and systems for processing, storing, sharing, retrieving, writing and accessing data (content) on a blockchain e.g. Bitcoin. The invention may form part of a protocol for storing, searching and accessing the data. In particular, improved efficiency and also enhanced access control permissions are provided. An embodiment of the disclosure comprises the step of processing at least one blockchain transaction (Tx) comprising: a protocol flag; a discretionary public key (DPK); and a discretionary transaction ID (DTxID). These are discretionary in the sense that they are not required as part of the underlying blockchain protocol but in accordance with the present invention. This combination of features enables portions of data to be identified, retrieved and shared on a blockchain, and also to be linked/associated with one another when provided in a plurality of transactions.Type: GrantFiled: November 27, 2019Date of Patent: February 18, 2025Assignee: nChain Licensing AGInventors: Craig Steven Wright, Owen Vaughan, Jack Owen Davies, Chloe Ceren Tartan
-
Patent number: 12229258Abstract: A system for intelligent managing whitelists and blacklist provides options and/or suggestions to the administrators and/or information technology team to allow administration of whitelists and/or blacklists based upon history and rules. For example, if permission to run a certain program is requested by several people in a group or organization and the program is not believed to have a virus, then, the administrator if presented with an option to enable (e.g., add to the whitelist) that program for the entire group or organization.Type: GrantFiled: October 21, 2022Date of Patent: February 18, 2025Assignee: PC MATIC, INC.Inventors: Robert J. Cheng, Robert J. Woodworth, Jr., Andrew Tuch, Matthew Quincy Riley, Devin R. Bergin
-
Patent number: 12219053Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.Type: GrantFiled: April 29, 2024Date of Patent: February 4, 2025Assignee: Wiz, Inc.Inventors: Shahar Rand, Eric Abramov, Yaniv Shaked, Elad Gabay
-
Patent number: 12216768Abstract: An asset scoring method and apparatus, a computer device, and a storage medium are provided. The method includes: obtaining multi-dimensional threat information data of assets to be assessed; obtaining sub-scores of dimensions according to the multi-dimensional threat information data and a preset security scoring model; according to the sub-scores of the dimensions, determining a security scoring result of the corresponding assets to be assessed; and according to the security scoring result and a preset level division rule, determining security levels of the corresponding assets to be assessed.Type: GrantFiled: April 28, 2021Date of Patent: February 4, 2025Assignee: DBAPPSECURITY CO., LTDInventors: Wei Wang, Yuan Fan
-
Patent number: 12212555Abstract: Aspects of subject technology provide systems and methods for generation and distribution of a stable identifier associated with multiple aliases of a user account. The stable identifier may be provided to various electronic devices by a server, responsive to requests associated with communications to those devices from one of the associated aliases. In this way, messaging applications can utilize the stable identifier to merge conversations from a single user having multiple aliases, and secure access to a secure device can be provided to an authorized user, even if the authorized user attempts access from an unauthorized account alias.Type: GrantFiled: November 10, 2023Date of Patent: January 28, 2025Assignee: Apple Inc.Inventors: Nicholas Joseph Circosta, Patrick R. Burns, Bhaskar P. Sarma, Daniel B. Pollack, Liang Qu, Kevin J. Lindeman, Roberto Garcia
-
Patent number: 12212564Abstract: A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.Type: GrantFiled: April 23, 2024Date of Patent: January 28, 2025Assignee: SECURE IDENTITY, LLCInventor: Stewart Whitman
-
Patent number: 12206680Abstract: The present disclosure provides techniques that may be applied, for example, for providing network policy information in a secure manner. In some cases, a UE may receive a first message for establishing a secure connection with a network, wherein the first message comprises network policy information, generate a first key based in part on the network policy information, and use the first key to verify the network policy information.Type: GrantFiled: November 1, 2023Date of Patent: January 21, 2025Assignee: QUALCOMM IncorporatedInventors: Soo Bum Lee, Adrian Edward Escott, Anand Palanigounder
-
Patent number: 12206795Abstract: A lightweight attribute-based signcryption (ABSC) method for cloud-fog-assisted Internet-of-things: performing, by a central authority, system initialization to generate a system key pair, and disclosing a public key, the public key including a symmetric encryption algorithm (SEA) and a key derivation function (KDF); generating, by the central authority, a decryption key and an outsourcing decryption key based on a decryption attribute set of a data user, and generating a signature key and an outsourcing signature key based on a signature access structure; calling, by a data owner, a fog node for outsourcing signature, performing symmetric encryption on a plaintext based on a symmetric key, and performing ABSC on the symmetric key based on a defined encryption access structure; and calling, by the data user, a fog node for outsourcing signature verification, calling a fog node for outsourcing decryption, and performing symmetric decryption on a ciphertext based on an outsourcing decryption result.Type: GrantFiled: March 22, 2021Date of Patent: January 21, 2025Assignee: QILU UNIVERSITY OF TECHNOLOGYInventors: JiGuo Yu, SuHui Liu, AnMing Dong, YingLong Wang
-
Patent number: 12200131Abstract: A method for a control system includes receiving in a biometric capture portion of a wearable device worn by a wearer, wearer biometric data associated with the wearer, storing in a memory of the wearable device authentic biometric data associated with an authorized user and a private key associated with the wearable device, receiving in a first short-range transceiver of the wearable device payload data, determining in a first processor of the wearable device if the wearer biometric data is authentic in response to the authentic biometric data associated with of the authorized user, encrypting in the first processor the payload data to form encrypted data in response the private key and in response to determining that the wearer biometric data is authentic, and outputting with the first short-range transceiver the encrypted data in response to determining that the wearer biometric data is authentic.Type: GrantFiled: September 2, 2021Date of Patent: January 14, 2025Assignee: Ouraring, Inc.Inventors: Denis Mars, Simon Ratner
-
Patent number: 12199975Abstract: Apparatus and methods for automating replacement and disablement of one-time password (“OTP”) generators are provided. The apparatus and methods may include an authentication engine on a server and an OTP generator that may generate a standard OTP or an enhanced OTP that includes additional information beyond the standard OTP. The authentication engine may analyze the additional information when an enhanced OTP is received, and in response to that additional information, execute an operation. The operation may include initiating the sending of a new OTP generator to a user when the OTP generator's battery is failing or the OTP generator has been damaged or disabling an OTP generator when the OTP generator has been tampered with.Type: GrantFiled: November 1, 2021Date of Patent: January 14, 2025Assignee: Bank of America CorporationInventor: Marcus R. Matos
-
Patent number: 12192762Abstract: Provided are a method and an apparatus for authenticating a terminal, a computer device, and a storage medium. The method includes: receiving an authentication request of a request terminal including a first media access control address and a first message integrity code of the request terminal; determining a target key-value pair from key-value pairs based on the first media access control address, and determining at least one first preshared key corresponding to the first media access control address from the target key-value pair, the media access control address in any of the key-value pairs being a historical successfully-authenticated address; generating a second message integrity code corresponding to each of the at least one first preshared key, one first preshared key corresponding to one second message integrity code; and authenticating the request terminal based on the first message integrity code and the at least one second message integrity code.Type: GrantFiled: November 10, 2022Date of Patent: January 7, 2025Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LTDInventor: Guoxu Liu
-
Patent number: 12190003Abstract: Methods and apparatus to protect sensitive information on media processing devices are disclosed. An example media processing device includes a processing engine configured to process a media processing instruction received at the media processing device, wherein the media processing instruction includes a command and data to cause a component of the media processing device to perform a function; and a data protector configured to determine whether the command is a data protection command; and when the command is the data protection command, modify the function to provide protection to the data.Type: GrantFiled: August 7, 2023Date of Patent: January 7, 2025Assignee: Zebra Technologies CorporationInventors: Andrew J. Pekarske, James M. Rehberger
-
Patent number: 12185101Abstract: The present disclosure generally relates to the field of security context setup. More specifically, the present disclosure relates to techniques of supporting security context setup in a wireless communication network. A method embodiment relates to supporting security context setup in a wireless communication network, the method comprising initiating (S304), by a radio access network (RAN) element of the wireless communication network, Access Stratum (AS) security context setup for a first Radio Access Technology (RAT) and a second RAT in a common signaling procedure.Type: GrantFiled: April 19, 2023Date of Patent: December 31, 2024Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Osman Nuri Can Yilmaz, Icaro L. J. Da Silva, Karl Norrman, Paul Schliwa-Bertling, Stefan Wager