Patents Examined by Ka Shan Choy
  • Patent number: 12155693
    Abstract: A system for fully integrated collection of business impacting data, analysis of that data and generation of both analysis driven business decisions and analysis driven simulations of alternate candidate business actions has been devised and reduced to practice. This business operating system may be used to monitor and predictively warn of events that impact the security of business infrastructure and may also be employed to monitor client-facing services supported by both software and hardware to alert in case of reduction or failure and also predict deficiency, service reduction or failure based on current event data.
    Type: Grant
    Filed: July 21, 2024
    Date of Patent: November 26, 2024
    Assignee: QOMPLX LLC
    Inventors: Jason Crabtree, Andrew Sellers
  • Patent number: 12149541
    Abstract: Aspects of the present disclosure relate to systems and methods for partitioning an OS or hypervisor utilized on a computing device from the process of proxy control. For example, a proxy may be installed on a separation kernel or firmware on a computing device that routes all data traffic received via a network connection to a cloud which performs various services such as IP reputation management, URL reputation detection and validation, malicious file filtering through potential malware detection.
    Type: Grant
    Filed: March 3, 2023
    Date of Patent: November 19, 2024
    Assignee: OPEN TEXT INC.
    Inventor: David Dufour
  • Patent number: 12149940
    Abstract: A method for wireless communication between a client object and a server object. The method includes the implementation by a proxy of steps of: detecting advertising packets broadcast by the server object; establishing a first connection between the proxy and the server object so as to block the broadcasting by the server object of advertising packets, and retrieving identification information from the server object; and establishing a second connection between the proxy and the client object, by using as proxy identification information the retrieved identification information of the server object, so as to simulate with the client object a connection with the server object.
    Type: Grant
    Filed: August 5, 2020
    Date of Patent: November 19, 2024
    Assignee: ORANGE
    Inventors: Eric Bouvet, Thibaut Deshaies, Fabrice Fontaine
  • Patent number: 12132757
    Abstract: The technology disclosed prevents phishing attacks where a malicious attacker creates a malicious file in a cloud-based store and shares it with endpoint users. A user, opening the shared document, is redirected to a malicious website where a corporation's critical data may be compromised. The cloud-based method applies a set of rules and policies to allow the shared document or block the shared document from the network, based on identifying the ownership or originator of the shared document. Documents from blacklisted websites are blocked. Documents from trusted sources are allowed access to the network. Unknown documents are blocked and threat-scanned to determine if they contain malicious content. If analysis proves a blocked document to be safe, it may be released into the network along with subsequent documents having the same ownership or originator.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: October 29, 2024
    Assignee: NetSkope, Inc.
    Inventors: Anupam Kumar, Prasenna Ravi, Muhammed Shafeek, Venkataswamy Pathapati
  • Patent number: 12118124
    Abstract: Methods, systems, articles of manufacture and apparatus to privatize consumer data are disclosed. A disclosed example apparatus includes a consumer data acquirer to collect original data corresponding to (a) confidential information associated with consumers and (b) behavior information associated with the consumers, and a data obfuscator. The data obfuscator is to determine a degree to which the original data is to be obfuscated and a type of obfuscation to be applied to the original data based on the original data, generate obfuscation adjustments of the original data based on the degree and the type, and generate an obfuscation model based on the obfuscation adjustments.
    Type: Grant
    Filed: July 18, 2023
    Date of Patent: October 15, 2024
    Assignee: The Nielsen Company (US), LLC
    Inventors: Bruce C. Richardson, Shixiao Li, Martin Quinn, Michael R. Smith
  • Patent number: 12116001
    Abstract: An information collection device including a processor and a communication unit that communicates with a control device installed at a vehicle. The processor is configured to send a message in a specific way to the control device that is in a test mode, receive from the control device a determination result about a state of the control device which has been determined based on the message sent in the specific way, send another message in a usual way to the control device in a case in which the determination result indicates that the state of the control device is normal, and receive, from the control device, anomaly information relating to communication in the control device, in response to the other message sent in the usual way.
    Type: Grant
    Filed: November 9, 2021
    Date of Patent: October 15, 2024
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Yoshihiko Katoh
  • Patent number: 12120138
    Abstract: A software agent executing on a computing device receives a request from a client to provide data associated with neighboring devices to the computing device. The client includes a scan engine to perform a network scan of a network that includes the computing device. The software agent accesses device data in a cache of an operating system command, determines, based on the device data, an identifier associated with each device that is neighboring the computing device, converts the device data into a standardized format to create neighboring device data, and sends the neighboring device data to the client.
    Type: Grant
    Filed: February 28, 2022
    Date of Patent: October 15, 2024
    Assignee: Rapid7, Inc.
    Inventors: Emmett Kelly, Ross Kirk
  • Patent number: 12114159
    Abstract: A method of operating a network node of a communication network includes establishing a PDU session with a UE, configuring a first UP security policy for the PDU session that applies to radio bearers set up between the UE and a first RAN, and configuring a second UP security policy for the PDU session that applies to radio bearers set up between the UE and a second RAN. A method of operating a UE includes establishing a PDU session with a UPF in a core network, via a first RAN, configuring a first UP security policy for the PDU session that applies to radio bearers set up between the UE and the first RAN, and configuring a second UP security policy for the PDU session that applies to radio bearers set up between the UE and a second RAN. Related network nodes and UEs are disclosed.
    Type: Grant
    Filed: September 30, 2020
    Date of Patent: October 8, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Monica Wifvesson
  • Patent number: 12101350
    Abstract: A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.
    Type: Grant
    Filed: June 20, 2022
    Date of Patent: September 24, 2024
    Assignee: Akamai Technologies, Inc.
    Inventors: David Senecal, Prajakta Bhurke
  • Patent number: 12081530
    Abstract: Techniques and mechanisms to reduce double encryption of packets that are transmitted using encrypted tunnels. The techniques described herein include determining that portions of the packets are already encrypted, identifying portions of the packets that are unencrypted, and selectively encrypting the portions of the packets that are unencrypted prior to transmission through the encrypted tunnel. In this way, potentially private or sensitive data in the packets that is unencrypted, such as information in the packet headers, will be encrypted using the encryption protocol of the encrypted tunnel, but the data of the packets that is already encrypted, such as the payload, may avoid unnecessary double encryption. By reducing (or eliminating) the amount of data in data packets that is double encrypted, the amount of time taken by computing devices, and computing resources consumed, to encrypted traffic for encrypted tunnels may be reduced.
    Type: Grant
    Filed: August 15, 2023
    Date of Patent: September 3, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Kyle Andrew Donald Mestery, Ian James Wells, Grzegorz Boguslaw Duraj
  • Patent number: 12081970
    Abstract: A contextual authentication method includes receiving a request to launch a web service and causing the web service to be launched on a remote browser. When a security event is detected, a security key obtained, based on a context of a client computing system, from a near-field communication (NFC) device connected to a mobile device. The security key is requested and received from the NFC device via the mobile device. The security key is delivered to the web service via the remote browser.
    Type: Grant
    Filed: April 26, 2022
    Date of Patent: September 3, 2024
    Assignee: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Patent number: 12069051
    Abstract: Techniques for authenticating and enforcing differentiated policies for a virtual machine (VM) executing in bridge mode on a wireless host device in a media access control (MAC)-based authentication network are described. In an example method a wireless host device is authorized to join a fabric enabled wireless network. A VM executes in bridge mode on the wireless host device. At the fabric edge, a source MAC address of the VM is determined. A session is created between the VM and an authentication server. The VM is authenticated. A policy for the VM is determined. A source internet protocol (IP) address is assigned to the VM to create a MAC-IP binding. A data-plane device in the fabric enabled wireless network is programmed to apply the policy to traffic communicated with the VM. Finally, the data-plane device applies the policy for the VM based at least in part on the MAC-IP binding.
    Type: Grant
    Filed: May 13, 2022
    Date of Patent: August 20, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Roberto Mitsuo Kobo, Zheng Li, Gopala Krishna Andagunda, Einar Nilsen-Nygaard, Shree Murthy, Parthiv Shah
  • Patent number: 12069084
    Abstract: Various embodiments include systems and methods to implement network scanner timeouts based at least in part on historical network conditions. The implementing comprises initiating, using one or more network scanners and according to a first set of timeout parameters, a first security assessment of one or more scan targets in a network, wherein the first set of timeout parameters comprises a first initial round trip time (RTT)-timeout parameter value to which a dynamic RTT-timeout value is initially set. The implementing comprises determining a first set of RTT statistics for the first security assessment. The implementing comprises determining, based at least in part on the first set of RTT statistics, a second set of timeout parameters for a second security assessment of the one or more scan targets. The implementing comprises initiating, according to the second set of timeout parameters, the second security assessment of the one or more scan targets.
    Type: Grant
    Filed: March 15, 2022
    Date of Patent: August 20, 2024
    Assignee: Rapid7, Inc.
    Inventors: Emmett Kelly, Paul Miseiko
  • Patent number: 12063299
    Abstract: Dynamic encryption and decryption method among lock control system modules comprise the following steps: step 1. filling hardware ID data, an unlocking communication protocol and a mask variable into an array according to a predefined variable space, and encrypting the array based on the mask variable to obtain an encrypted array; step 2. decrypting the encrypted array based on the mask variable to obtain a decrypted array, executing data division on the decrypted array according to the predefined variable space, matching the divided data with data recorded in advance one by one, and if the divided data are consistent with the data recorded in advance, executing related operations according to the decrypted unlocking communication protocol content; otherwise, executing no operation.
    Type: Grant
    Filed: December 27, 2019
    Date of Patent: August 13, 2024
    Assignee: TRI STAR INC.
    Inventors: Jiayan Liu, Wenkun Chen, Xiaofeng Wang, Shuigen Lv
  • Patent number: 12052275
    Abstract: A method for protection from cyber attacks in a communication network of a vehicle comprising: the steps of building sets of dominant voltage measurements for each message identifier associated to a message that is passing; extracting statistical features; supplying the statistical features for each message identifier that are available at each instant at input to a neural network of a pattern-recognition type; carrying out an operation of classification, or pattern recognition, supplying a prediction of a membership class corresponding to a given node on the basis of the statistical features supplied at input; evaluating whether the prediction supplied by the neural network corresponds to a given node that allows as admissible message identifier the message identifier at input and, if it does not, signalling an anomaly for the message identifier; and evaluating whether a number of anomalies signalled for said message identifier exceeds a given threshold.
    Type: Grant
    Filed: May 25, 2022
    Date of Patent: July 30, 2024
    Assignee: Marelli Europe S.p.A.
    Inventors: Christian Rosadini, Anastasia Cornelio, Walter Nesci, Sergio Saponara, Alessio Gagliardi, Paola De Cesare
  • Patent number: 12047495
    Abstract: A method for the initial setup of a machine data communication network including a network unit provided with a first hardware component having a digital identity. For the digital identity, a signature of the network unit is generated based on a first private key for a communication partner in the machine data communication network. The first private key is stored in a first hardware security module of the first hardware component, and a first public key corresponding to the first private key and the signature is disclosed to the communication partner in order to verify the identity of the network unit. A separate identification device is arranged in the network unit, and the first public key is transferred from the first hardware security module to the identification device. The first public key of the identification device is saved in the identification device by an intelligent contract and is transmitted by distributed ledger technology to the communication partner.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: July 23, 2024
    Assignee: MERCEDES-BENZ GROUP AG
    Inventor: Christian Seiler
  • Patent number: 12039055
    Abstract: Various aspects related to methods, systems, and computer readable media for automatic fuzz testing. An example method of automatic software fuzz testing can include, receiving a description of a target software application, determining, based on the description, a type of fuzzing, identifying one or more fuzzers based on the type of fuzzing, executing the one or more fuzzers on the target software application, extracting prioritized results of the executing of the one or more fuzzers, and, presenting the prioritized results.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: July 16, 2024
    Assignee: Sophos Limited
    Inventors: Mehdi Karimibiuki, Craig Paradis
  • Patent number: 12041044
    Abstract: Technology described herein can globally perform management of security tokens of plural nodes of a multi-node system. In an embodiment, a system can comprise an interconnected group of server nodes, and an administrator node communicatively connected to the interconnected group of server nodes and comprising a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise selecting a server node of the interconnected group of server nodes as a leader server node, resulting in a selection of the leader server node, in response, receiving, by the administrator node from the leader server node, a request for a new security token, and sending, to the leader server node, the new security token, and broadcasting, by the leader server node across a link layer discovery (LLDP) network, the new security token to additional nodes of the interconnected group of nodes.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: July 16, 2024
    Assignee: DELL PRODUCTS, L.P.
    Inventors: Bharath Koushik, Faizal SN, Santosh Gore, Ramesha He
  • Patent number: 12034751
    Abstract: A method for detecting unauthorized and/or malicious hands-on-keyboard activity in an information handling system derived from the telemetry from one or more client systems, tokenizing a plurality of partial values/idiosyncrasies detected in the telemetry to form a plurality of tokens, aggregating the plurality of tokens or features over a selected time window to at least partially develop an aggregate feature vector, submitting the aggregate feature vector to one or more machine learning subsystems, and applying an ensemble model to one or more outputs from the one or more machine learning subsystems to generate an overall behavioral threat score of the potentially malicious hands-on-keyboard activity.
    Type: Grant
    Filed: October 1, 2021
    Date of Patent: July 9, 2024
    Assignee: Secureworks Corp.
    Inventor: Nash Borges
  • Patent number: 12032714
    Abstract: Methods and systems for secure, encrypted and distributed ownership and usage of big data are provided. According to one example, a server maintains a local key management data store, a data blockchain copy, an audit blockchain copy, and a metadata blockchain copy. A data operation from a user electronic device is received. The server verifies that the user electronic device has access against the local key management data store, runs the data operation and records metadata about the data operation, and writes data blocks to the data blockchain copy, the audit blockchain copy, and the metadata blockchain copy. The server broadcasts the updated blockchain copies to the peer-to-peer network for replication.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: July 9, 2024
    Assignee: BITNOBI INC.
    Inventors: Marin Litoiu, Mark Shtern