Patents Examined by Kambiz Zand
  • Patent number: 11463478
    Abstract: A method provides for collecting data source images from multiple repositories. Application dependencies are discovered from the data source images. Status results are determined based on vulnerability and compliance scanning of all dependent sources for each data source image. The status results are aggregated across all data source images for each of the multiple repositories. Remediations are determined for violations indicated by the aggregated status results. Each of the remediations is aggregated and ordered to define a single global remediation solution.
    Type: Grant
    Filed: October 29, 2019
    Date of Patent: October 4, 2022
    Assignee: International Business Machines Corporation
    Inventors: Shripad Nadgowda, Alessandro Morari, James R. Doran
  • Patent number: 11463457
    Abstract: An Artificial Intelligence AI-based cyber threat analyst protects a system from cyber threats. A cyber threat analyst module uses i) one or more AI models, ii) a set of scripts, and iii) any combination of both, to form and investigate hypotheses on what are a possible set of cyber threats that include abnormal behavior and/or a suspicious activity. An analyzer module uses one or more data analysis processes including i) an agent analyzer data analysis process; ii) an Ngram data analysis process; iii) an exfiltration data analysis process; and iv) a network scan data analysis process; in order to obtain any of the abnormal behavior and the suspicious activity to start the investigation on the possible set of cyber threats hypotheses, as well as, to obtain the collection of system data points to either support or refute the possible cyber threat hypotheses.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: October 4, 2022
    Assignee: Darktrace Holdings Limited
    Inventors: Timothy Owen Bazalgette, Dickon Murray Humphrey, Carl Joseph Salji
  • Patent number: 11456876
    Abstract: Providing virtualized credentials of a holder includes authorizing a subset of credential data to be sent to a device of a relying party that is different from the holder, where the subset of credential data depends on a role of the relying party, selection by the holder, and/or contextual data of the relying party and includes displaying the subset of credential data on a screen of the device of the relying party. The contextual data may be a privacy level setting, distance between the relying party and the holder, and/or geolocation of the relying party. The role of the relying party may be provided by the relying party. Role information provided by the relying party may be provided in a verifiable format. The role information may be digitally signed or securely derived and determined by a mutual authentication algorithm between the relying party and the holder.
    Type: Grant
    Filed: September 8, 2016
    Date of Patent: September 27, 2022
    Assignee: ASSA ABLOY AB
    Inventors: Julian Eric Lovelock, Philip Hoyer
  • Patent number: 11457027
    Abstract: A system includes at least one web server, a storage, and a suspicious access attempt detector. The at least one web server is configured to receive and process a plurality of access attempts from a plurality of user devices over a network, and to provide access attempt information corresponding to the plurality of access attempts to a storage, wherein access attempt information for each respective access attempt comprises an access signature corresponding to the respective access attempt. The suspicious access attempt detector configured to: obtain the access attempt information corresponding to the plurality of access attempts from the storage; analyze the access attempt information corresponding to the plurality of access attempts to detect suspicious access attempts out of the plurality of access attempts, wherein analyzing the access attempt information is based on respective access signatures corresponding to the plurality of access attempts; and output a result of the detection.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: September 27, 2022
    Assignee: Aetna Inc.
    Inventor: Salil Kumar Jain
  • Patent number: 11457030
    Abstract: A cyber threat defense system can autonomously gather research data about external hosts visited by a network entity and present that information in a format integrated with a threat-tracking graphical user interface. A collation module can collect input data from the network entity. A cyber threat module can identify a cyber threat from the input data. A host module can determine at least one host metric for an external host in the input data based on the identified cyber threat. A researcher module can collect host research data describing the external host. A scoring module can analyze the host research data using the at least one host metric. The scoring module can generate an automatic threat score describing a threat level presented by the external host. A user interface module can present a threat-tracking graphical user interface displaying the automatic threat score.
    Type: Grant
    Filed: February 19, 2019
    Date of Patent: September 27, 2022
    Assignee: Darktrace Holdings Limited
    Inventors: Dickon Humphrey, David Palmer
  • Patent number: 11456854
    Abstract: A cryptographic module is switchable between a key-input mode and a data-input mode. In the key-input mode, the cryptographic module receives key data, key length information and first input data, combines an amount of the key data corresponding to the key length information with the first input data to produce combined data, wherein a key-influenced length of the combined data is the shortest length of the combined data that contains every data bit of the combined data whose value depends on the key data. It performs a cryptographic operation on the combined data to generate first output data and does not output any of the first output data until after the cryptographic operation has been applied to all of the key-influenced length of the combined data.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: September 27, 2022
    Assignee: Nordic Semiconductor ASA
    Inventors: Kauko Kutti, Jarmo Veikkola, Marko Winblad
  • Patent number: 11449620
    Abstract: Apparatus and methods are disclosed for transparently and efficiently encrypting data-at-rest in a platform as a service (PaaS) environment. Disclosed techniques transparently transform any existing persistent data services in the PaaS environment into respective secure data services. For the deployment of the above secure data services, an encryption addon containing an addon core and activity-based callouts is provided. The addon core contains a kernel module for encryption/decryption. A coordinator in charge of the deployment executes a pre-filesystem-creation callout that encrypts a raw storage device before creating a filesystem on it. It then deploys a secure data service configured to use the filesystem. Thus, applications using the data service can now transparently store data as encrypted data-at-rest in the filesystem. Similarly, the coordinator also executes a pre-filesystem-mounting callout before mounting the filesystem for accessing encrypted-data-rest.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: September 20, 2022
    Assignee: ZETTASET, INC.
    Inventor: Maksim Yankovskiy
  • Patent number: 11451515
    Abstract: Techniques managing access rules are provided. Access rules and their associated profiles are determined for evaluation. A triggering rate or a triggering percentage can be used to indicate efficacy of the rule. Recommendations can be provided based on a triggering percentage difference of the rule during a predetermined period of time. The recommendations can be provided in an interactive user interface.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: September 20, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Benjamin Scott Boding, Christopher Holmes, Cory Siddens, Henry Wong
  • Patent number: 11451541
    Abstract: An apparatus for connecting a data-processing and/or data-generating production apparatus with a network includes a first network interface to be connected with the network, a second network interface to be connected with the production apparatus, and a program code stored in the memory for execution by the at least one processor. The program code includes instructions upon whose execution data packets received at the second network interface via a second protocol are forwarded to the first network interface, and/or upon whose execution data packets received at the first network interface via a first protocol are forwarded to the second network interface and there are sent via a second protocol to the production apparatus. The program code includes instructions upon whose execution the at least one processor applies a packet filter to the data packets on the way between the network interfaces.
    Type: Grant
    Filed: December 20, 2016
    Date of Patent: September 20, 2022
    Assignee: SECUNET SECURITY NETWORKS AKTIENGESELLSCHAFT
    Inventor: Jens Kulikowski
  • Patent number: 11438361
    Abstract: The present disclosure discloses method and an attack path prediction system for predicting an attack path in a computer network. The attack path prediction system receives static and dynamic data associated with a source node attacked in computer network along with static and dynamic risk attributes of one or more vulnerabilities associated with one or more target nodes reachable from source node. A likelihood score is calculated for each of one or more vulnerabilities associated with one or more target nodes in relation to each of one or more vulnerabilities associated with source node based on static and dynamic risk attributes. Additionally, a prediction score is calculated for each of one or more vulnerabilities associated with target nodes based on corresponding likelihood score and static and dynamic risk attributes. Thereafter, based on prediction score, the attack path is predicted between the source node and one or more target nodes.
    Type: Grant
    Filed: November 29, 2019
    Date of Patent: September 6, 2022
    Assignee: HITACHI, LTD.
    Inventors: Ramesh Kumar Rakesh, Remish Leonard Minz, Sanjana Pai Nagarmat
  • Patent number: 11438384
    Abstract: An aggregated networking device subsystem station move control system includes first and second aggregated networking devices connected via an ICL. The first aggregated networking device receives a MAC address from the second aggregated networking device that was learned on an orphan port that has port security enabled and a station-move-deny configuration, and generates a static MAC address entry in its MAC address table that associates the MAC address with the ICL. The static MAC address entry causes data packets received on non-ICL ports on the first aggregated networking device that include the MAC address to generate a static MAC move violation. The first aggregated networking device also programs rule(s) that, in response to data packets being received on its non-ICL ports that have port security disabled and generating a static MAC move violation, causes the association of the MAC address with that non-ICL port.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: September 6, 2022
    Assignee: Dell Products L.P.
    Inventors: Saye Balasubramaniam Subramanian, Damodharan Sreenivasagaperumal
  • Patent number: 11438326
    Abstract: An electronic device is disclosed. The electronic device comprises: a camera; a storage unit; and a processor for capturing an image including authentication information of an external electronic device through the camera, acquiring first information related with a public key included in the image and storing the first information in the storage unit, and comparing second information with the first information so as to authenticate the external electronic device when the second information and identification information related with the public key are received from the external electronic device on the basis of a type of first information.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: September 6, 2022
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Youngman Jung, Junbum Shin, Dongik Lee, Oleksandr Chalyi
  • Patent number: 11431733
    Abstract: The present disclosure generally relates to a system and method for defending a utilities system against cyber-physical attacks associated with anomalies in a physical process operative in the utilities system. The defense system comprises: a set of sensors for collecting physical data associated with the physical process; a set of controller devices for monitoring process states of the physical process based on the physical data from the sensors; a set of verification devices for monitoring the physical process based on the physical data from the sensors, the physical data enabling the verification devices to detect the anomalies based on a set of invariants predefined for the physical process; and a set of actuators controllable by the controller devices or verification devices to remedy the anomalies and regulate the physical process, thereby defending the utilities system against the cyber-physical attacks.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: August 30, 2022
    Assignee: Singapore University of Technology and Design
    Inventors: Aditya Mathur, Sridhar Adepu, Siddhant Shrivastava, Myat Aung Kaung, Nils Tippenhauer, Giedre Sabaliauskaite
  • Patent number: 11431496
    Abstract: Provided is a secret search device including an arithmetic processing unit configured to speed up secret search processing by, when the secret search processing is performed by executing a pairing operation relating to each element of an encrypted tag and each element of a trapdoor, and when the pairing operation is executed by using a pre-calculation table stored in a storage unit for each element to be used in the pairing operation. The arithmetic processing unit is configured to execute, based on information on a free space usable for the pre-calculation table, size adjustment of the pre-calculation table such that the pre-calculation table fits in the free space.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: August 30, 2022
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Kenichiro Hayasaka, Yutaka Kawai
  • Patent number: 11431491
    Abstract: Systems and methods for protecting secret or secure information involved in generation of ciphered data by circuitry. The circuitry includes data paths and key paths that operate to perform cipher operations to generate a plurality of key shares and a plurality of data shares using a key and data as input. The data and the key may be masked by at least one mask. The plurality of key shares may be generated using the key and a first mask. The plurality of data shares are generated using key shares, the data, and a second mask.
    Type: Grant
    Filed: June 16, 2020
    Date of Patent: August 30, 2022
    Assignee: STMICROELECTRONICS (ROUSSET) SAS
    Inventors: Thomas Sarno, Yanis Linge
  • Patent number: 11431698
    Abstract: Systems and methods are provided for a media provider to allow a user to access media objects with a third-party partner that authenticates the user and authorizes the user to access certain media objects. The media provider offers access to media objects, such as video content or audio content. The partner, through a relationship with the media provider, similarly offers access to the media provider's media objects, for example, as a service or benefit to the partner's customers or users. In particular, a partner integration server mediates user authentication and authorization by the partner. The partner integration server also allows the media provider to easily and flexibly to add and integrate additional partners.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: August 30, 2022
    Assignee: NBA Properties, Inc.
    Inventors: Kenneth DeGennaro, Hector Arguelles Menendez, Christopher Quansah Benyarko, Edwin Edem Akrong
  • Patent number: 11429743
    Abstract: Embodiments disclosed herein are related to computing systems and methods for localizing how a user will receive and view received DID-related data. The computing system and methods are implemented in the decentralized network that implements a distributed ledger that backs one or more decentralized identities (DID) for one or more users of the computing system. Various sets of rule are accessed. The sets of rules specify how a DID owner will receive and view DID-related data received from a third party entity. The sets of rules are applied to the DID-related data received from the third party entity. The received DID-related data is modified such that the received DID-related data conforms to the one or more sets of rules. The modified DID-related data is provided to the DID owner so that the DID owner is able to view the modified DID-related data according to the applied sets of rules.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: August 30, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Brandon Murdoch, Daniel James Buchner, Ankur Patel
  • Patent number: 11431741
    Abstract: The present disclosure describes a system, method, and computer program for detecting unmanaged and unauthorized assets on an IT network by identifying anomalously-named assets. A recurrent neural network (RNN) is trained to identify patterns in asset names in a network. The RNN learns the character distribution patterns of the names of all observed assets in the training data, effectively capturing the hidden naming structures followed by a majority of assets on the network. The RNN is then used to identify assets with names that deviate from the hidden naming structures. Specifically, the RNN is used to measure the reconstruction errors of input asset name strings. Asset names with high reconstruction errors are anomalous since they cannot be explained by learned naming structures. After filtering for attributes or circumstances that mitigate risk, such assets are associated with a higher cybersecurity risk.
    Type: Grant
    Filed: May 13, 2019
    Date of Patent: August 30, 2022
    Assignee: Exabeam, Inc.
    Inventors: Derek Lin, Domingo Mihovilovic, Sylvain Gil, Barry Steiman
  • Patent number: 11422870
    Abstract: Aspects of the disclosure relate to managing and routing messages to distributed user devices in an enterprise computing environment. In some embodiments, a computing platform may receive an application content request from an enterprise tablet computing device. The computing platform may generate and send a database query, which may cause a message database server to select message data from a message database hosted by the message database server. After sending the database query, the computing platform may receive, from the message database server, the message data selected from the message database. Subsequently, the computing platform may generate a notification for the enterprise tablet computing device and may send the notification to the enterprise tablet computing device, which may cause the enterprise tablet computing device to display the notification.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: August 23, 2022
    Assignee: Bank of America Corporation
    Inventors: Moses Sureshkumar, John Schils, Mohan Kumar Jadamuthu
  • Patent number: 11424911
    Abstract: An example operation may include one or more of receiving, via a network, tag data that is read from a tag associated with a physical object and signed with a key assigned to the tag, determining, via a blockchain peer, that the signed tag data is validly signed based on a corresponding key pair of the tag which is accessible to the blockchain peer, determining, via the blockchain peer, whether the tag data satisfies of one or more predefined conditions of the physical object, and storing the determination via a blockchain database.
    Type: Grant
    Filed: March 3, 2020
    Date of Patent: August 23, 2022
    Assignee: International Business Machines Corporation
    Inventors: Chandrasekhar Narayanaswami, Daniel Joseph Friedman, Nigel Hinds, Abhilash Narendra, Arun Paidimarri, James Thomas Rayfield, Roman Vaculin, Zhiyuan Li