Patents Examined by Joseph P. Hirl
  • Patent number: 11669602
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked and a controller. The controller is receptive of an instruction to authorize users to unlock the securable resource and is configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: June 6, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 11663032
    Abstract: A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority.
    Type: Grant
    Filed: November 14, 2022
    Date of Patent: May 30, 2023
    Assignee: Orca Security Ltd.
    Inventor: Avi Shua
  • Patent number: 11657168
    Abstract: A system for detecting data leakage is disclosed. The system intercepts web traffic data, de-duplicates the web traffic data, and extracts data elements from the web traffic data. The system further groups the data elements into multiple clusters based on data types associated with the data elements. The system then identifies data elements in a cluster that were previously sent to a user and identifies allowed data elements from an allow table that are supposed to be sent to the user. The system determines whether there is a data leakage by determining whether the identified data elements in the cluster comprises at least one data element that is not in the identified allowed data elements in the allow table.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: May 23, 2023
    Assignee: Bank of America Corporation
    Inventors: Ramesh Alagar, Prabakar Rangarajan
  • Patent number: 11645404
    Abstract: A system, method, and computer program product are provided for preventing access to data associated with a data access attempt. In use, a data access attempt associated with a remote data sharing session is identified. Further, access to the data is prevented.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: May 9, 2023
    Assignee: McAfee, LLC
    Inventors: Gopi Krishna Chebiyyam, Prasanna Ganapathi Basavapatna
  • Patent number: 11641368
    Abstract: Systems and methods are disclosed for automatically predicting a risk score of a user login attempt by receiving a user login attempt and generating a login feature vector associated with the user login attempt. The systems and methods further train a machine learning technique to establish a relationship between the login feature vector and the risk score. The trained machine learning technique is applied to new user login attempts to predict a risk score associated with the login attempt and issue an authentication challenge to the user if the risk score exceeds a predetermined threshold value.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: May 2, 2023
    Assignee: Snap Inc.
    Inventors: Neil Shah, Mingyi Zhao, Yu-Hsin Chen
  • Patent number: 11637848
    Abstract: Systems, devices, media, and methods are presented for determining a level of abusive network behavior suspicion for groups of entities and for identifying suspicious entity groups. A suspiciousness metric is developed and used to evaluate a multi-view graph across multiple views where entities are associated with nodes of the graph and attributes of the entities are associated with levels of the graph.
    Type: Grant
    Filed: October 12, 2021
    Date of Patent: April 25, 2023
    Assignee: Snap Inc.
    Inventors: Neil Shah, Hamed Nilforoshan-Dardashti
  • Patent number: 11637861
    Abstract: A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: April 25, 2023
    Assignee: BMC Software, Inc.
    Inventors: Siddharth Sukumar Burle, Ajoy Kumar, Manish Jain
  • Patent number: 11636228
    Abstract: A computing device includes a memory and at least one processor configured to cooperate with the memory. The processor is to boot the computing device, and direct generated data to data storage. The data storage includes at least one persistent layer and a non-persistent layer. The processor determines if the data is to be stored in the at least one persistent layer or the non-persistent layer based on a version of the operating system being used to boot the computing device.
    Type: Grant
    Filed: January 28, 2021
    Date of Patent: April 25, 2023
    Assignee: Citrix Systems, Inc.
    Inventor: Christopher W. Midgley
  • Patent number: 11636218
    Abstract: The present embodiments provide an environment where a user first creates or imports a document comprising of fields to be completed by one or more users. All users who have view-only access or can act on a document are considered to be “in the workflow.” All users in the workflow (except view-only users) can take actions in the document by editing, adding or entering values or signatures in those fields. When the document is complete, a computing device adds an encrypted token visualization element to the document that uniquely identifies and secures the document. Thereafter, a copy of the original document, all attachments, authentication, security and validation information, and all other relevant information about the document and users will be available to view in the chain of custody and audit trail by the authorized users by scanning the token visualization element within the platform (web application or mobile application).
    Type: Grant
    Filed: June 22, 2021
    Date of Patent: April 25, 2023
    Assignee: ENTRUST & TITLE (FZE)
    Inventor: Shamsh S. Hadi
  • Patent number: 11632379
    Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.
    Type: Grant
    Filed: April 2, 2018
    Date of Patent: April 18, 2023
    Assignee: Sophos Limited
    Inventors: Fraser Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Patent number: 11632357
    Abstract: Electronic publications are increasingly replacing physical media but to date standards have evolved to mimic these physical media. Accordingly it is beneficial to provide electronic publication software systems and/or software applications to enable new paradigms that provide consumers, authors, publishers, retailers, and others with new models for releasing digital content from editorial and authorship viewpoints; new models for providing digital rights management with licensing, re-assignable rights and the ability to issue sub-rights or issue partial licenses with predetermined validity; new models for publishers to release revised editions, errata, new additions, etc; engaging social network type collaborative behavior within work and private environments with associated content (annotations) to the original release content; and supporting discussion and information dissemination within a wide variety of environments from education to business to book clubs etc.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: April 18, 2023
    Assignee: Cognilore Inc.
    Inventors: Andre Dube, Darryl Beallie, Brian Anderson, Cody Thompson
  • Patent number: 11627003
    Abstract: A system for a shared and synchronous time series identification that matches a hardware clock-generating signal of a blockchain identified node device, with a generated data event time stamp and shared by all computing nodes participating in a complete system based on a blockchain design pattern and protocol. A blockchain cybersecurity system time signature is applied to synchronize the device level ID or device chain; this time sync is matched to the client master clocking time signal governing data transactions on the data event level or event chain. The combination of these two disparate blockchain mechanisms is termed as a multi-chain application. The matched time signals now provide referenced smart contract time sequencing. This matched time sequencing is unique and customized in its application to a multi-chain block chain cyber security application.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: April 11, 2023
    Assignee: SmartAxiom, Inc.
    Inventor: Amit Biyani
  • Patent number: 11627146
    Abstract: Aspects of the present disclosure relate to systems and methods for partitioning an OS or hypervisor utilized on a computing device from the process of proxy control. For example, a proxy may be installed on a separation kernel or firmware on a computing device that routes all data traffic received via a network connection to a cloud which performs various services such as IP reputation management, URL reputation detection and validation, malicious file filtering through potential malware detection.
    Type: Grant
    Filed: October 12, 2020
    Date of Patent: April 11, 2023
    Assignee: WEBROOT INC.
    Inventor: David Dufour
  • Patent number: 11627157
    Abstract: A method of detecting and mitigating a denial of service attack is described. The method comprises monitoring incoming first traffic packets, building a first Benford distribution of the first traffic packets, the first Benford distribution corresponding to network behaviour associated with normal traffic, and detecting a denial of service attack associated with incoming second traffic packets. After detecting the denial of service attack, the method involves sorting the incoming second traffic packets according to a characteristic of the incoming second traffic packets to create a Zipf distribution, building a second Benford distribution of the second traffic packets using the Zipf distribution and the first Benford distribution, discarding incoming second traffic packets that are not consistent with the second Benford distribution, and allowing incoming second traffic packets that are consistent with the second Benford distribution.
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: April 11, 2023
    Assignee: HYPRFIRE PTY LTD
    Inventors: Mihai Mugurel Lazarescu, Sie Teng Soh, Subhash Kak, Stefan Prandl
  • Patent number: 11625461
    Abstract: A method and system for accessing stored data includes receiving a request to access data stored in a data storage unit. The request requires one or more data operations to be performed by a system having access to the stored data. Responsive to the data request, one or more locks are derived and assigned to one or more of the data operations. Each of the locks control invocation of the data operations to which the respective lock is assigned. The deriving is based in part on (i) user context data obtained from a user issuing the request and (ii) data context comprising one or more attributes of the request. Each of the one or more locks is unlocked and the one or more data operations are invoked after the one or more locks are unlocked.
    Type: Grant
    Filed: November 16, 2016
    Date of Patent: April 11, 2023
    Assignee: Sensoriant, Inc.
    Inventor: Shamim A. Naqvi
  • Patent number: 11627125
    Abstract: A apparatus for credentialing users across multiple devices. The apparatus includes a processor connected to a network and at least a user device. Processor is configured to receive a credential data structure, verify the credential data structure, generate a credential block, and store the credential block in a data storage system. A plurality of user devices may access the network and the data storage system to view the verified credentials.
    Type: Grant
    Filed: February 8, 2022
    Date of Patent: April 11, 2023
    Assignee: MY JOB MATCHER, INC.
    Inventors: Arran Stewart, Steve O'Brien
  • Patent number: 11620375
    Abstract: A method for calibrating user behavior based models, in order to enable user validation across different devices (i.e. known and unknown devices), comprising: receiving device usage data generated by monitoring user-device interactions on one or more user devices; employing a user behavior model based on the device usage data and a plurality of values of technical parameters of the one or more devices; receiving a plurality of values of technical parameters of an additional device; receiving device usage data by monitoring user-device interactions on the additional device; and analyzing the device usage data of the additional device by employing the user behavior model to validate an action held using the additional device.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: April 4, 2023
    Assignee: International Business Machines Corporation
    Inventor: Itay Hazan
  • Patent number: 11621965
    Abstract: A computing apparatus to provide endpoint detect and response (EDR) filtering to an enterprise, including: a processor and memory; a network interface; a network protocol to communicatively couple to a data source via the network interface; and instructions encoded within the memory to provide an EDR filtering pipeline to receive an unfiltered EDR stream via the network interface, extract an EDR record from the EDR stream, and apply a hash to the EDR record to determine that the EDR record is uncommon in context of the enterprise; and a decorator module to decorate the EDR record for in-depth analysis.
    Type: Grant
    Filed: September 27, 2019
    Date of Patent: April 4, 2023
    Assignee: Musarubra US LLC
    Inventors: Agustin Matias March, Raul Osvaldo Robledo, Alejandro Houspanossian, Gabriel Infante Lopez
  • Patent number: 11616994
    Abstract: A method and system are provided for updating an elliptic curve (EC) base point G, with the EC basepoint used in encryption and coding of video data. A candidate base point G is generated that includes additional data used for validation purposes and checked as a valid base point before transmission and use.
    Type: Grant
    Filed: May 11, 2021
    Date of Patent: March 28, 2023
    Assignee: ARRIS Enterprises LLC
    Inventors: Tat Keung Chan, Alexander Medvinsky, Eric J. Sprunk
  • Patent number: 11615175
    Abstract: Apparatuses, systems, and methods of the present disclosure may provide access security in a process control system. For example, current biometric data representative of a user may be acquired and compared to stored biometric data representative of previously identified users. Access to the process control system may be authorized when the current biometric data matches stored biometric data.
    Type: Grant
    Filed: September 15, 2020
    Date of Patent: March 28, 2023
    Assignee: FISHER-ROSEMOUNT SYSTEMS, INC.
    Inventors: Aaron C. Jones, Andrew E. Cutchin