Patents Examined by Khang Do
  • Patent number: 11500992
    Abstract: The present specification discloses a trusted execution environment (TEE)-based model training method and apparatus. In one or more embodiments, the method includes: obtaining encrypted target samples from an encrypted training sample set in a first execution environment, inputting the encrypted target samples into a second execution environment that is a trusted execution environment (TEE) different from the first execution environment, decrypting the encrypted target samples in the TEE to obtain decrypted target samples, inputting the decrypted target samples into a feature extraction model in the TEE to determine sample features, determining the sample features output from the TEE as target sample features for a current iteration of a training process for a target model, and performing, based on the target sample features, the current iteration on the target model in the first execution environment.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: November 15, 2022
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yongchao Liu, Bei Jia, Yue Jin, Chengping Yang
  • Patent number: 11487900
    Abstract: Within one or more instances of a computing environment where an instance is a self-contained architecture to provide at least one database with corresponding search and file system. User information from the one or more instances of the computing environment is organized as zones. A zone is based on one or more characteristics of corresponding user information that are different than the instance to which the user information belongs. User information is selectively obfuscated prior to transmitting blocks of data including the obfuscated user information. The selective obfuscation is based on zone information for one or more zones to which the user information belongs.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: November 1, 2022
    Assignee: salesforce.com, inc.
    Inventors: Olumayokun Obembe, Gregory Lapouchnian, Vijayanth Devadhar, Jason Woods, Karthikeyan Govindarajan, Ashwini Bijwe, Prasad Peddada
  • Patent number: 11483351
    Abstract: The present disclosure relates to securing workloads of a network by identifying compromised elements in communication with the network and preventing their access to network resources. In one aspect, a method includes monitoring network traffic at network elements of a network; detecting a compromised element in communication with one or more of the network elements, the compromised element being associated with at least one network threat; and based on a defined network policy, applying one of a number of different access prevention schemes to the compromised element to prevent access to the network by the compromised element.
    Type: Grant
    Filed: August 26, 2020
    Date of Patent: October 25, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Supreeth Hosur Nagesh Rao, Navindra Yadav, Tapan Shrikrishna Patwardhan, Umamaheswaran Arumugam, Darshan Shrinath Purandare, Aiyesha Ma, Hongyang Zhang, Kai Zhu
  • Patent number: 11477182
    Abstract: A key management protocol (such as KMIP) is extended to provide an extended credential type that enables an initiating (first) client device to create a credential dynamically and that can then be selectively shared with and used by other (second) client devices. Using a dynamically-created credential of this type, the other (second) devices are able to fetch the same key configured by the initiating (first) device. In this manner, multiple devices are able to create and share one or more keys among themselves dynamically, and on as-needed basis without requiring a human administrator to create a credential for a device group in advance of its usage.
    Type: Grant
    Filed: May 7, 2019
    Date of Patent: October 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Rinkesh I. Bansal, Mohit Niranjan Agrawal, Prashant V. Mestri
  • Patent number: 11477226
    Abstract: A system, a method, and a computer program for identifying and prioritizing a risky computing resource for security evaluation and remediation in a computer network that has a plurality of computing resources, comprising analyzing network-internal domain information to identify the risky computing resource in the computer network, generating a keyword for a cyberattack risk, analyzing open source intelligence domain information using the keyword, analyzing network-external domain information to identify additional risk attributes for the cyberattack risk, determining a ranking weight for the cyberattack risk, prioritizing the risky computing resource with respect to one or more computing resources based on the ranking weight, targeting the risky computing resource for penetration testing in accordance with the prioritization, and evaluating a threat risk of the risky computing resource to the computer network.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: October 18, 2022
    Assignee: Saudi Arabian Oil Company
    Inventor: Nawwaf S Alabdulhadi
  • Patent number: 11470114
    Abstract: A method for using a malware and phishing detection and mediation platform is discussed. The method includes accessing data from one or more of a monitored portion of website data and a monitored portion of emails, the data indicating a respective potential malware or a suspect phishing element (e.g., Uniform Resource Locator (URL)). The method includes selecting one of a plurality of detection engines for processing the data, where the selecting is based on previous results of previous processing by one or more detection engines. Each of the plurality of detection engines can be for performing one or more respective investigation actions on the plurality of data to determine a particular issue with one of the monitored data. The method also includes determining a mediation action based on a result of processing of the detection engine and the previous processing.
    Type: Grant
    Filed: December 27, 2019
    Date of Patent: October 11, 2022
    Assignee: PAYPAL, INC.
    Inventors: Nathan Pratt, Bradley Wardman, Kevin Tyers, Eric Nunes, Meethil Vijay Yadav, Todd Clausen, Nicholas Bailey
  • Patent number: 11470113
    Abstract: There is provided a method to eliminate data-theft through a phishing website by creating a layer of control between the user and the website to be visited that prevents submission of sensitive data to malicious servers. When there is a form submit event in a webpage, the data that is input (by the user or automatically) is modified by a data deception layer in a random manner that disguises the authentic content, while preserving the format of the data. Visual cues are provided to indicate that the data deception is enabled and that fake/generated data is being submitted instead of real data. The generated fake data is sent to unknown (potentially malicious) server while the users' actual private data is preserved (never submitted), with the results of the server response visible to the user.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: October 11, 2022
    Inventor: Fatih Orhan
  • Patent number: 11470072
    Abstract: A browser application has at least two web browser objects for browsing Private PAIR while hiding multi-page navigation from a user. The browser application is configured to automatically download XML data from Private PAIR, and generate one or more reports therefrom, including a Daily Updates report, a Cross Checker report, and a Docket Listing report. The browser application is preferably configured to selectively provide limited access to Private PAIR by restricting user navigation to programmatic navigation.
    Type: Grant
    Filed: April 27, 2020
    Date of Patent: October 11, 2022
    Assignee: NIMVIA, LLC
    Inventors: Chad Dustin Tillman, Jeremy Cooper Doerre
  • Patent number: 11443048
    Abstract: A system and method for generating content for an encrypted package is provided. A package may be received that includes one or more anti-tamper hash portions and encrypted data, where the encrypted data includes one or more procedural content generation instructions. A portion of the encrypted data including the one or more procedural content generation instructions may be decrypted and a data based on the execution of the one or more procedural content generation instructions and a corpus of data may be generated. The generated data may be encrypted and anti-tamper hashes may be generated based on the encrypted generated data. The generated anti-tamper hashes may be compared to the one or more anti-tamper hashes in the anti-tamper hash portion of the received package.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: September 13, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Simon Lee Cooke, Xin Huang
  • Patent number: 11429713
    Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server generates a training system having a virtual attack machine and a virtual target machine where the virtual target machine is operatively controlled by a trainee computer. The server then executes a simulated cyber-attack and monitors/collects actions and responses by the trainee. The server then executes an artificial intelligence model to evaluate the trainee's action and to identify a subsequent simulated cyber-attack (e.g., a next step to the simulated cyber-attack). The server may then train the artificial intelligence model using various machine-learning techniques using the collected data during the exercise.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: August 30, 2022
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Matthew Donovan, Paul Nicotera, Dahyun Hollister, Robert Joyce, Judson Powers
  • Patent number: 11411990
    Abstract: A method, system, and computer-usable medium are disclosed for establishing a reference outbound email volume rate for a user account, monitoring the user account to determine a current outbound email volume rate, determining a risk score based on the current outbound email volume rate and the reference outbound email volume rate, buffering outgoing emails of the user account if the risk score exceeds a threshold risk score, analyzing the buffered emails against one or more factors indicative of a probability of the buffered emails comprising spam, and responsive to analysis of the buffered emails against the one or more factors indicating that the user account is potentially compromised, quarantine the user account and prevent outbound mail from being delivered from the user account.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: August 9, 2022
    Assignee: Forcepoint LLC
    Inventors: Ruchika Pandey, Ran Mosessco
  • Patent number: 11405421
    Abstract: An electronic control apparatus includes: an obtaining unit configured to obtain data transmitted via a network in a system; and a judging unit configured to judge presence or absence of an anomaly in the data obtained by the obtaining unit, based on a transmission state of the data. The judging unit is configured to judge that an anomaly is present in the data, when the transmission state of the data is a transmission stopped state.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: August 2, 2022
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Kaoru Yokota, Toshihisa Nakano, Jun Anzai
  • Patent number: 11349852
    Abstract: A network-based line-rate method and apparatus for detecting and managing potential malware utilizing a black list of possible malware to scan content and detect potential malware content based upon characteristics that match the preliminary signature. The undetected content is then subjected to an inference-based processes and methods to determine whether the undetected content is safe for release. Typical to inference-based processes and method, the verdict is a numerical value within a predetermined range, out of which content is not safe. The network content released if the verdict is within safe range, otherwise, the apparatus provides various options of handling such presumably unsafe content; options including, soliciting user input whether to release, block, or subject the content to further offline behavioral analysis.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: May 31, 2022
    Assignee: Wedge Networks Inc.
    Inventors: Hongwen Zhang, Mark Koob, Kevin Chmilar, Husam Kinawi
  • Patent number: 11343277
    Abstract: Described are methods, systems, and medias for detecting spoofing of biometric identity recognition and/or validating an identity recognition match by using the camera of a mobile device, processing the user's face image or set of images at a first and second distance to generate first and second data representations, processing the first data representation into a predictive model, and comparing the data representation with the predictive model.
    Type: Grant
    Filed: March 11, 2020
    Date of Patent: May 24, 2022
    Assignee: ELEMENT INC.
    Inventors: Fengjun Lv, Dushyant Goyal, Yang Wang, Adam Perold
  • Patent number: 11336689
    Abstract: Disclosed is phishing classifier that classifies a URL and content page accessed via the URL as phishing or not is disclosed, with URL feature hasher that parses and hashes the URL to produce feature hashes, and headless browser to access and internally render a content page at the URL, extract HTML tokens, and capture an image of the rendering. Also disclosed are an HTML encoder, trained on HTML tokens extracted from pages at URLs, encoded, then decoded to reproduce images captured from rendering, that produces an HTML encoding of the tokens extracted, and an image embedder, pretrained on images, that produces an image embedding of the image captured. Further, phishing classifier layers, trained on the feature hashes, the HTML encoding, and the image embedding, process the URL feature hashes, HTML encoding and image embeddings to produce a likelihood score that the URL and the page accessed presents a phishing risk.
    Type: Grant
    Filed: September 14, 2021
    Date of Patent: May 17, 2022
    Assignee: Netskope, Inc.
    Inventors: Najmeh Miramirkhani, Ari Azarafrooz, Yihua Liao, Zhi Xu
  • Patent number: 11310270
    Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of dis
    Type: Grant
    Filed: October 14, 2021
    Date of Patent: April 19, 2022
    Assignee: Expel, Inc.
    Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
  • Patent number: 11310051
    Abstract: One or more implementations of the present specification provide a blockchain-based data authorization method and apparatus. The method can include receiving, by a blockchain node, an authentication transaction submitted by a privacy computing platform, where the authentication transaction queries whether a data user has obtained authorization of target data possessed by a data owner, and in response to determining that the data user has obtained authorization of the target data, executing, by the blockchain node, a smart contract invoked by the authentication transaction to provide an authorization token to the privacy computing platform that instructs the privacy computing platform to obtain the target data, and send a computational result of one or more predetermined computational operations based on the target data to the data user.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: April 19, 2022
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Changzheng Wei, Ying Yan, Hui Zhang, Yujun Peng
  • Patent number: 11297080
    Abstract: A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; obtaining at least one security-relevant information set from each of the plurality of security-relevant subsystems, thus defining a plurality of security-relevant information sets; and combining the plurality of security-relevant information sets to form an aggregated security-relevant information set for the computing platform.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: April 5, 2022
    Assignee: RELIAQUEST HOLDINGS, LLC
    Inventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer
  • Patent number: 11263328
    Abstract: Disclosed are various examples for threat detection and security for edge devices in communication with Internet-of-Things (IoT) devices. In one example, a profile is associated with a virtual machine of a gateway device. The profile includes an expected behavior for the virtual machine. The virtual machine is executed by a hypervisor of the gateway device. An actual behavior for the virtual machine is determined. A remedial action is performed. The remedial action is based on an anomaly between the expected behavior and the actual behavior.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: March 1, 2022
    Assignee: VMWARE, INC.
    Inventors: Ian Ragsdale, Saurabh Agrawal, Kartik Patel, Santhosh Chandrashekarappa Irani
  • Patent number: 11252179
    Abstract: A risk analyzer analyzing risk of a system including N (natural number greater than or equal to 2) elements connected includes: an inputter receiving, as inputs, a cost of each N element for increasing a safety degree against a threat to security, a connection relationship of at least part of the N elements, an entry point being an element serving as an entry to the system, and a defense target being an element protected in the system; an identifier identifying, based on the cost of each N element and the connection relationship, a target element of one or more elements requiring a minimum total cost necessary for cutting off a target path from the entry point to the defense target by increasing a safety degree of one or more elements on the target path to a threshold value or more; and an outputter outputting element information indicating the target element.
    Type: Grant
    Filed: September 3, 2021
    Date of Patent: February 15, 2022
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Hiroshi Amano, Yusuke Nemoto, Minehisa Nagata, Yosuke Tajika