Patents Examined by Khang Do
-
Patent number: 11500992Abstract: The present specification discloses a trusted execution environment (TEE)-based model training method and apparatus. In one or more embodiments, the method includes: obtaining encrypted target samples from an encrypted training sample set in a first execution environment, inputting the encrypted target samples into a second execution environment that is a trusted execution environment (TEE) different from the first execution environment, decrypting the encrypted target samples in the TEE to obtain decrypted target samples, inputting the decrypted target samples into a feature extraction model in the TEE to determine sample features, determining the sample features output from the TEE as target sample features for a current iteration of a training process for a target model, and performing, based on the target sample features, the current iteration on the target model in the first execution environment.Type: GrantFiled: June 28, 2021Date of Patent: November 15, 2022Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yongchao Liu, Bei Jia, Yue Jin, Chengping Yang
-
Patent number: 11487900Abstract: Within one or more instances of a computing environment where an instance is a self-contained architecture to provide at least one database with corresponding search and file system. User information from the one or more instances of the computing environment is organized as zones. A zone is based on one or more characteristics of corresponding user information that are different than the instance to which the user information belongs. User information is selectively obfuscated prior to transmitting blocks of data including the obfuscated user information. The selective obfuscation is based on zone information for one or more zones to which the user information belongs.Type: GrantFiled: August 2, 2019Date of Patent: November 1, 2022Assignee: salesforce.com, inc.Inventors: Olumayokun Obembe, Gregory Lapouchnian, Vijayanth Devadhar, Jason Woods, Karthikeyan Govindarajan, Ashwini Bijwe, Prasad Peddada
-
Patent number: 11483351Abstract: The present disclosure relates to securing workloads of a network by identifying compromised elements in communication with the network and preventing their access to network resources. In one aspect, a method includes monitoring network traffic at network elements of a network; detecting a compromised element in communication with one or more of the network elements, the compromised element being associated with at least one network threat; and based on a defined network policy, applying one of a number of different access prevention schemes to the compromised element to prevent access to the network by the compromised element.Type: GrantFiled: August 26, 2020Date of Patent: October 25, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Supreeth Hosur Nagesh Rao, Navindra Yadav, Tapan Shrikrishna Patwardhan, Umamaheswaran Arumugam, Darshan Shrinath Purandare, Aiyesha Ma, Hongyang Zhang, Kai Zhu
-
Patent number: 11477182Abstract: A key management protocol (such as KMIP) is extended to provide an extended credential type that enables an initiating (first) client device to create a credential dynamically and that can then be selectively shared with and used by other (second) client devices. Using a dynamically-created credential of this type, the other (second) devices are able to fetch the same key configured by the initiating (first) device. In this manner, multiple devices are able to create and share one or more keys among themselves dynamically, and on as-needed basis without requiring a human administrator to create a credential for a device group in advance of its usage.Type: GrantFiled: May 7, 2019Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Rinkesh I. Bansal, Mohit Niranjan Agrawal, Prashant V. Mestri
-
Patent number: 11477226Abstract: A system, a method, and a computer program for identifying and prioritizing a risky computing resource for security evaluation and remediation in a computer network that has a plurality of computing resources, comprising analyzing network-internal domain information to identify the risky computing resource in the computer network, generating a keyword for a cyberattack risk, analyzing open source intelligence domain information using the keyword, analyzing network-external domain information to identify additional risk attributes for the cyberattack risk, determining a ranking weight for the cyberattack risk, prioritizing the risky computing resource with respect to one or more computing resources based on the ranking weight, targeting the risky computing resource for penetration testing in accordance with the prioritization, and evaluating a threat risk of the risky computing resource to the computer network.Type: GrantFiled: April 24, 2019Date of Patent: October 18, 2022Assignee: Saudi Arabian Oil CompanyInventor: Nawwaf S Alabdulhadi
-
Patent number: 11470114Abstract: A method for using a malware and phishing detection and mediation platform is discussed. The method includes accessing data from one or more of a monitored portion of website data and a monitored portion of emails, the data indicating a respective potential malware or a suspect phishing element (e.g., Uniform Resource Locator (URL)). The method includes selecting one of a plurality of detection engines for processing the data, where the selecting is based on previous results of previous processing by one or more detection engines. Each of the plurality of detection engines can be for performing one or more respective investigation actions on the plurality of data to determine a particular issue with one of the monitored data. The method also includes determining a mediation action based on a result of processing of the detection engine and the previous processing.Type: GrantFiled: December 27, 2019Date of Patent: October 11, 2022Assignee: PAYPAL, INC.Inventors: Nathan Pratt, Bradley Wardman, Kevin Tyers, Eric Nunes, Meethil Vijay Yadav, Todd Clausen, Nicholas Bailey
-
Patent number: 11470113Abstract: There is provided a method to eliminate data-theft through a phishing website by creating a layer of control between the user and the website to be visited that prevents submission of sensitive data to malicious servers. When there is a form submit event in a webpage, the data that is input (by the user or automatically) is modified by a data deception layer in a random manner that disguises the authentic content, while preserving the format of the data. Visual cues are provided to indicate that the data deception is enabled and that fake/generated data is being submitted instead of real data. The generated fake data is sent to unknown (potentially malicious) server while the users' actual private data is preserved (never submitted), with the results of the server response visible to the user.Type: GrantFiled: February 15, 2019Date of Patent: October 11, 2022Inventor: Fatih Orhan
-
Patent number: 11470072Abstract: A browser application has at least two web browser objects for browsing Private PAIR while hiding multi-page navigation from a user. The browser application is configured to automatically download XML data from Private PAIR, and generate one or more reports therefrom, including a Daily Updates report, a Cross Checker report, and a Docket Listing report. The browser application is preferably configured to selectively provide limited access to Private PAIR by restricting user navigation to programmatic navigation.Type: GrantFiled: April 27, 2020Date of Patent: October 11, 2022Assignee: NIMVIA, LLCInventors: Chad Dustin Tillman, Jeremy Cooper Doerre
-
Patent number: 11443048Abstract: A system and method for generating content for an encrypted package is provided. A package may be received that includes one or more anti-tamper hash portions and encrypted data, where the encrypted data includes one or more procedural content generation instructions. A portion of the encrypted data including the one or more procedural content generation instructions may be decrypted and a data based on the execution of the one or more procedural content generation instructions and a corpus of data may be generated. The generated data may be encrypted and anti-tamper hashes may be generated based on the encrypted generated data. The generated anti-tamper hashes may be compared to the one or more anti-tamper hashes in the anti-tamper hash portion of the received package.Type: GrantFiled: May 6, 2019Date of Patent: September 13, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Simon Lee Cooke, Xin Huang
-
Patent number: 11429713Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server generates a training system having a virtual attack machine and a virtual target machine where the virtual target machine is operatively controlled by a trainee computer. The server then executes a simulated cyber-attack and monitors/collects actions and responses by the trainee. The server then executes an artificial intelligence model to evaluate the trainee's action and to identify a subsequent simulated cyber-attack (e.g., a next step to the simulated cyber-attack). The server may then train the artificial intelligence model using various machine-learning techniques using the collected data during the exercise.Type: GrantFiled: January 24, 2019Date of Patent: August 30, 2022Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Matthew Donovan, Paul Nicotera, Dahyun Hollister, Robert Joyce, Judson Powers
-
Patent number: 11411990Abstract: A method, system, and computer-usable medium are disclosed for establishing a reference outbound email volume rate for a user account, monitoring the user account to determine a current outbound email volume rate, determining a risk score based on the current outbound email volume rate and the reference outbound email volume rate, buffering outgoing emails of the user account if the risk score exceeds a threshold risk score, analyzing the buffered emails against one or more factors indicative of a probability of the buffered emails comprising spam, and responsive to analysis of the buffered emails against the one or more factors indicating that the user account is potentially compromised, quarantine the user account and prevent outbound mail from being delivered from the user account.Type: GrantFiled: February 15, 2019Date of Patent: August 9, 2022Assignee: Forcepoint LLCInventors: Ruchika Pandey, Ran Mosessco
-
Patent number: 11405421Abstract: An electronic control apparatus includes: an obtaining unit configured to obtain data transmitted via a network in a system; and a judging unit configured to judge presence or absence of an anomaly in the data obtained by the obtaining unit, based on a transmission state of the data. The judging unit is configured to judge that an anomaly is present in the data, when the transmission state of the data is a transmission stopped state.Type: GrantFiled: June 10, 2019Date of Patent: August 2, 2022Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Kaoru Yokota, Toshihisa Nakano, Jun Anzai
-
Patent number: 11349852Abstract: A network-based line-rate method and apparatus for detecting and managing potential malware utilizing a black list of possible malware to scan content and detect potential malware content based upon characteristics that match the preliminary signature. The undetected content is then subjected to an inference-based processes and methods to determine whether the undetected content is safe for release. Typical to inference-based processes and method, the verdict is a numerical value within a predetermined range, out of which content is not safe. The network content released if the verdict is within safe range, otherwise, the apparatus provides various options of handling such presumably unsafe content; options including, soliciting user input whether to release, block, or subject the content to further offline behavioral analysis.Type: GrantFiled: August 30, 2017Date of Patent: May 31, 2022Assignee: Wedge Networks Inc.Inventors: Hongwen Zhang, Mark Koob, Kevin Chmilar, Husam Kinawi
-
Patent number: 11343277Abstract: Described are methods, systems, and medias for detecting spoofing of biometric identity recognition and/or validating an identity recognition match by using the camera of a mobile device, processing the user's face image or set of images at a first and second distance to generate first and second data representations, processing the first data representation into a predictive model, and comparing the data representation with the predictive model.Type: GrantFiled: March 11, 2020Date of Patent: May 24, 2022Assignee: ELEMENT INC.Inventors: Fengjun Lv, Dushyant Goyal, Yang Wang, Adam Perold
-
Patent number: 11336689Abstract: Disclosed is phishing classifier that classifies a URL and content page accessed via the URL as phishing or not is disclosed, with URL feature hasher that parses and hashes the URL to produce feature hashes, and headless browser to access and internally render a content page at the URL, extract HTML tokens, and capture an image of the rendering. Also disclosed are an HTML encoder, trained on HTML tokens extracted from pages at URLs, encoded, then decoded to reproduce images captured from rendering, that produces an HTML encoding of the tokens extracted, and an image embedder, pretrained on images, that produces an image embedding of the image captured. Further, phishing classifier layers, trained on the feature hashes, the HTML encoding, and the image embedding, process the URL feature hashes, HTML encoding and image embeddings to produce a likelihood score that the URL and the page accessed presents a phishing risk.Type: GrantFiled: September 14, 2021Date of Patent: May 17, 2022Assignee: Netskope, Inc.Inventors: Najmeh Miramirkhani, Ari Azarafrooz, Yihua Liao, Zhi Xu
-
Patent number: 11310270Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of disType: GrantFiled: October 14, 2021Date of Patent: April 19, 2022Assignee: Expel, Inc.Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
-
Patent number: 11310051Abstract: One or more implementations of the present specification provide a blockchain-based data authorization method and apparatus. The method can include receiving, by a blockchain node, an authentication transaction submitted by a privacy computing platform, where the authentication transaction queries whether a data user has obtained authorization of target data possessed by a data owner, and in response to determining that the data user has obtained authorization of the target data, executing, by the blockchain node, a smart contract invoked by the authentication transaction to provide an authorization token to the privacy computing platform that instructs the privacy computing platform to obtain the target data, and send a computational result of one or more predetermined computational operations based on the target data to the data user.Type: GrantFiled: January 31, 2020Date of Patent: April 19, 2022Assignee: Advanced New Technologies Co., Ltd.Inventors: Changzheng Wei, Ying Yan, Hui Zhang, Yujun Peng
-
Patent number: 11297080Abstract: A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; obtaining at least one security-relevant information set from each of the plurality of security-relevant subsystems, thus defining a plurality of security-relevant information sets; and combining the plurality of security-relevant information sets to form an aggregated security-relevant information set for the computing platform.Type: GrantFiled: June 5, 2019Date of Patent: April 5, 2022Assignee: RELIAQUEST HOLDINGS, LLCInventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer
-
Patent number: 11263328Abstract: Disclosed are various examples for threat detection and security for edge devices in communication with Internet-of-Things (IoT) devices. In one example, a profile is associated with a virtual machine of a gateway device. The profile includes an expected behavior for the virtual machine. The virtual machine is executed by a hypervisor of the gateway device. An actual behavior for the virtual machine is determined. A remedial action is performed. The remedial action is based on an anomaly between the expected behavior and the actual behavior.Type: GrantFiled: January 17, 2019Date of Patent: March 1, 2022Assignee: VMWARE, INC.Inventors: Ian Ragsdale, Saurabh Agrawal, Kartik Patel, Santhosh Chandrashekarappa Irani
-
Patent number: 11252179Abstract: A risk analyzer analyzing risk of a system including N (natural number greater than or equal to 2) elements connected includes: an inputter receiving, as inputs, a cost of each N element for increasing a safety degree against a threat to security, a connection relationship of at least part of the N elements, an entry point being an element serving as an entry to the system, and a defense target being an element protected in the system; an identifier identifying, based on the cost of each N element and the connection relationship, a target element of one or more elements requiring a minimum total cost necessary for cutting off a target path from the entry point to the defense target by increasing a safety degree of one or more elements on the target path to a threshold value or more; and an outputter outputting element information indicating the target element.Type: GrantFiled: September 3, 2021Date of Patent: February 15, 2022Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Hiroshi Amano, Yusuke Nemoto, Minehisa Nagata, Yosuke Tajika