Patents Examined by Josnel Jeudy
  • Patent number: 11593482
    Abstract: Systems and methods to detect malicious software include an application software repository including a stored header file associated with a driver, an executable, or both, and are operable to (i) receive a memory dump file upon an operating system crash including a driver copy, an executable copy, or both, (ii) verify the memory dump file is new for analysis, (iii) compress the verified memory dump file to generate a memory snapshot of the verified memory dump file, (iv) scan the memory snapshot for a memory dump header file associated with the driver copy, the executable copy, or both, and (v) identify and extract malicious software when the memory dump header file from the memory snapshot fails to match at least one stored header file in the application software repository.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: February 28, 2023
    Assignee: Saudi Arabian Oil Company
    Inventor: Urfan Ahmed
  • Patent number: 11576039
    Abstract: A customer premises node device can receive an authentication message from a fixed cellular communication device that operates according to a third-generation mobile network access standard (e.g., a 3G alarm panel). The customer premises node device can facilitate transmitting the authentication message, to a network node that operates according to a fourth-generation mobile network access standard. The authentication message can then be routed via mobile network components, including a network gateway device, to a home location registry device, which can authenticate the 3G fixed cellular communication device for communications on a 4G mobile network.
    Type: Grant
    Filed: September 12, 2019
    Date of Patent: February 7, 2023
    Assignees: AT&T Mobility II LLC, AT&T Intellectual Property I, L.P.
    Inventors: Eric W. Green, Maurice Scott Laster, Inderpreet Ahluwalia, Christopher McConnell, Timothy Shira
  • Patent number: 11574224
    Abstract: Internet-of-things (IOT) devices can be identified based on specific behavioral patterns when their identification data is unknown. Previously identified IOT devices with similar behavioral patterns can be used as a baseline from which to compare data that is available about unknown IOT devices. For example, an IOT device can be pooled with a group of IOT devices based on the frequency with which they connect to a wireless network. Additionally, a confidence level of the unknown device being associated with the group of IOT devices can be generated based on such comparison data.
    Type: Grant
    Filed: October 8, 2019
    Date of Patent: February 7, 2023
    Assignee: AT&T MOBILITY II LLC
    Inventors: Stephen T. Hardin, Johnathan Webb, Jordan Alexander
  • Patent number: 11575652
    Abstract: A communication system and a communication method for one-way transmission are provided. The communication method includes: transmitting a filtering rule to a programmable logic device by a server; receiving a signal and obtaining data from the signal by the server; packing the data to generate at least one data packet by the server; transmitting the at least one data packet to the programmable logic device by the server; and determining, according to the filtering rule, whether to output the at least one data packet by the programmable logic device.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: February 7, 2023
    Assignee: BlackBear (Taiwan) Industrial Networking Security Ltd.
    Inventors: Yuan Chen Chan, Po-Chih Hsu
  • Patent number: 11562079
    Abstract: In different example embodiments, a system-on-chip is provided.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: January 24, 2023
    Assignee: Infineon Technologies AG
    Inventors: Albrecht Mayer, Reinhard Deml, Viola Rieger, Alexander Zeh
  • Patent number: 11563769
    Abstract: Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows security administrators can to design and implement a workflow of device-actions taken by security individuals in response to a security incident. Based on the nature of a particular threat, the cyber-security system may initiate an action plan that is tailored to the security operations center and their operating procedures to protect potentially impacted components and network resources.
    Type: Grant
    Filed: April 6, 2020
    Date of Patent: January 24, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventors: Bernard Thomas, David Scott, Fred Brott, Paul Smith
  • Patent number: 11556647
    Abstract: A system and method is provided that tests and determines whether candidate artificial intelligence model contains a Trojan from when it was trained and using the outcome determination of the Trojan to determine whether the candidate artificial intelligence model should be deployed. The system utilizes a first artificial intelligence that operates as a data generator and a second artificial intelligence that operates as a discriminator to determine whether the candidate artificial intelligence contains a Trojan. The first artificial intelligence combines sets of data with random Trojan triggers and the second artificial intelligence discriminates output classifications from the candidate artificial intelligence model to determine whether the Trojan is present based on probability outputs.
    Type: Grant
    Filed: March 30, 2020
    Date of Patent: January 17, 2023
    Assignee: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Jonathan Shuai, Ty M. Danet, Kalyanaraman Vaidyanathan
  • Patent number: 11558740
    Abstract: Techniques and architectures enable a wireless communications system to receive and transmit a message for which a user of a mobile device has specified to be delivered on a particular date and time to a contact in an address book of the user. Further, the network securely stores the message by encrypting the message with a strength of encryption that is based on the length of time that the message will be stored before its scheduled delivery.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: January 17, 2023
    Inventors: Anbalagan Elumalai, Sudhanshu Pandey
  • Patent number: 11544383
    Abstract: A system of mitigating code weaknesses in a target code by adding micro functionality fixes. The system includes a mitigation module installed a memory chip of a device and a server for identifying a plurality of code weaknesses in a target code installed in a memory chip of a device and sending configuration instructions to the mitigation module, the configuration instructions comprising: a plurality of micro functionality fixes, and a plurality of code weakness locations each associated with one of the plurality of code weaknesses and one of the plurality of micro functionality fixes. The execution of the mitigation module by at least one processor of the device induces an installment of the plurality of micro functionality fixes in the plurality of code weakness locations.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: January 3, 2023
    Assignee: Red Bend Ltd.
    Inventors: David Mor Ofek, Yuval Weisglass
  • Patent number: 11539524
    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
    Type: Grant
    Filed: July 13, 2020
    Date of Patent: December 27, 2022
    Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
  • Patent number: 11537711
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: December 27, 2022
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 11540130
    Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: December 27, 2022
    Assignee: 802 Secure, Inc.
    Inventors: Konrad Grutzmacher, Clifford Fernandez
  • Patent number: 11526611
    Abstract: Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.
    Type: Grant
    Filed: August 12, 2021
    Date of Patent: December 13, 2022
    Inventors: Dumitru Dontov, Mykola Klymenko
  • Patent number: 11523279
    Abstract: A transmission device suitable for communicating via a radio link with a gateway equipment of a telecommunications network and configured to communicate with a management server. The device is able to obtain authentication data associated with a terminal configured such that it connects with an application server to: set up a communication session with the terminal; to transmit session set-up data to the management server in order to register the terminal in a list of connected terminals; and to receive and retransmit a data message transmitted by the terminal or by the application server. A transmission method implemented by the transmission device. A management server and a management method implemented by the server.
    Type: Grant
    Filed: June 6, 2018
    Date of Patent: December 6, 2022
    Assignee: ORANGE
    Inventors: Quentin Lampin, Dominique Barthel
  • Patent number: 11521100
    Abstract: Systems and methods are provided for processing an input dataset or running an inference. The systems and methods may be configured to accept an input dataset, access one or more predefined logic plugins for processing the input dataset, process the input dataset based at least in part on a first predefined logic plugin, and generate the one or more outputs based at least in part of the processing of the input dataset. The one or more outputs may have a different format than a format of the input dataset.
    Type: Grant
    Filed: October 29, 2019
    Date of Patent: December 6, 2022
    Assignee: Palantir Technologies Inc.
    Inventors: Megha Arora, Samuel Szuflita, Hao Dang, Mihir Patil, Yeong Wei Wee, Alice Yu
  • Patent number: 11507661
    Abstract: An information handling system includes a basic input/output system (BIOS), a memory, and a processor. The processor scans a current state of each BIOS attribute in the BIOS, and stores one or more changed attributes in a secure event log in the memory. The processor converts each changed attribute into a different threat event including a first changed attribute into a first threat event. The processor provides a list of threat events to multiple threat chains, each of which determine whether the threat events match threat criteria in a threat chain policy. In response to the threat event matching a threat criterion in the threat chain policy, the threat chain provides a threat state change to the processor, which in turn provides new threat state changes to a threat state change consumer.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: November 22, 2022
    Assignee: Dell Products L.P.
    Inventors: Marc N. McGarry, Nizar A. Basan, Bradley C. Rood, Andy A. Yiu
  • Patent number: 11500767
    Abstract: In accordance with an embodiment, a method for determining an overall memory size of a global memory area configured to store input data and output data of each layer of a neural network includes: for each current layer of the neural network after a first layer, determining a pair of elementary memory areas based on each preceding elementary memory area associated with a preceding layer, wherein: the two elementary memory areas of the pair of elementary memory areas respectively have two elementary memory sizes, each of the two elementary memory areas are configured to store input data and output data of the current layer of the neural network, the output data is respectively stored in two different locations, and the overall memory size of the global memory area corresponds to a smallest elementary memory size at an output of the last layer of the neural network.
    Type: Grant
    Filed: March 5, 2020
    Date of Patent: November 15, 2022
    Assignee: STMicroelectronics (Rousset) SAS
    Inventors: Laurent Folliot, Pierre Demaj
  • Patent number: 11463413
    Abstract: A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a given client request; sending entitlements to the requesting client securely; handling entitlement information securely on a plurality of client devices at run time; storing entitlement information securely on a plurality of client devices for offline use; and enforcing entitlements on a plurality of client devices. The method employs manipulation of manifest files by a proxy that may be included in the client device or located in the network.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: October 4, 2022
    Assignee: ERICSSON AB
    Inventors: Mikhail Mikhailov, Raj Nair
  • Patent number: 11461764
    Abstract: Example embodiments relate to reissuing or otherwise altering a contactless card. These embodiments are particularly well-suited to an emergency reissue in which many cards have been compromised as the result of a data breach of a major credit card provider or department store. An exemplary contactless card includes a chip that stores encrypted authentication information, including a primary account number (PAN) that identifies the card. The chip may include a first applet responsible making payments with the card; the first applet may manage the PAN. A second applet may be capable of interacting with an outside application, and may serve as a bridge to the first applet. A rewrite of the PAN may be triggered by issuing a write command to the second applet, or by interacting with the chip in a predetermined manner (e.g., tapping the card on an interactable element a predetermined number of times).
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: October 4, 2022
    Assignee: Capital One Services, LLC
    Inventors: Jeffrey Rule, Daniel Herrington, Rajko Ilincic
  • Patent number: 11457361
    Abstract: A method to prevent or reduce cyberattacks can include analyzing information of users of a 5G network. The information can include user profile data and social media data. The method can further include ranking the users according to a network security ranking based on a social media ranking, to identify target users as potential hotspots for cyberattacks. The 5G network dynamically assigns computing resources based on the network security ranking to monitor computing device(s) associated with the target users and receives an indication of a malicious software of the computing device(s) as detected by the computing resources.
    Type: Grant
    Filed: August 31, 2020
    Date of Patent: September 27, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw