Patents Examined by Khoi V Le
  • Patent number: 12137162
    Abstract: An apparatus comprises an encryption key generator to generate a media encryption key to encrypt data in number of memory components, where the encryption key generator is configured to wrap the media encryption key to generate an encrypted media encryption key, The encrypted media encryption key is stored in a non-volatile memory. The apparatus comprises firmware having instructions to transition the apparatus to and from a secure state using the encrypted media encryption key.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: November 5, 2024
    Inventors: Nathan A. Eckel, Steven D. Check
  • Patent number: 12132717
    Abstract: A system, method, and computer-readable media for linking identify information between a group-based communication system and an external application based on a user authorization to share credentials. After sharing the user's credentials, the user may be authenticated with the external application and user data from the group-based communication system may be shared with the external application. Additionally, a preview of a web resource associated with the external application may be displayed to the user within the group-based communication system allowing the user to interact with the web resource from within the group-based communication system.
    Type: Grant
    Filed: October 18, 2021
    Date of Patent: October 29, 2024
    Assignee: Salesforce, Inc.
    Inventors: Bertrand Fan, Salman Suhail, Paige Kehoe
  • Patent number: 12132716
    Abstract: A computing platform is configurable to cause initiating a communication session with a user, the user having a user account associated with a workflow data object, the workflow data object being configured to represent a plurality of operations included in a workflow. The computing platform is also configurable to cause identifying a verified status indicator associated with at least one of the plurality of operations, the verified status indicator comprising a verified credential associated with at least one of the plurality of operations. The computing platform is also configurable to cause identifying a transfer operation associated with the verified status indicator and identifying a target entity associated with the transfer operation. The computing platform is also configurable to cause implementing the identified transfer operation based, at least in part, on identified target entity.
    Type: Grant
    Filed: April 15, 2021
    Date of Patent: October 29, 2024
    Assignee: Salesforce, Inc.
    Inventor: Charles Hart Isaacs
  • Patent number: 12124596
    Abstract: The invention relates to data recovery technology. Each created backup is checked for the integrity of the placed files, while calculating the checksums of each block of data that can be restored from the backup. The computer system is restored from a backup copy by connecting it using the archive copy connection driver, which creates a virtual disk that is readable by standard means of the operating system of the computer system being restored. The booting of the operating system is performed from the virtual disk and, after restoring the functioning of the computer system, the system volume that has been damaged is restored from the backup copy to the local storage medium.
    Type: Grant
    Filed: March 29, 2022
    Date of Patent: October 22, 2024
    Assignee: Acronis International GmbH
    Inventors: Vladimir Strogov, Alexey Sergeev, Alexey Kostushko, Serguei Beloussov, Stanislav Protasov
  • Patent number: 12125028
    Abstract: In some embodiments, Uniform Resource Locator (URL) parameters may be used to bind access tokens to authorize web-browser-initiated network operations. In some embodiments, a user input at a data exchange gateway associated with a first website to perform a first network operation (e.g., a request to access resources associated with the first website) may be detected. In response to the detected user input, an access token may be generated based on user specific information associated with the user, where the access token is associated with one or more network operation parameters. In response to a use of the access token for authorizing the first network operation and successful authorization of the first network operation, the access token may be configured to be bound to a first URL identifier parameter associated with the first website.
    Type: Grant
    Filed: July 26, 2023
    Date of Patent: October 22, 2024
    Assignee: Capital One Services, LLC
    Inventors: Varun Gupta, Allison Fenichel, Johanna Davis
  • Patent number: 12113797
    Abstract: Embodiments of the present invention provide a system for authorizing entity users based on augmented reality and LiDAR technology. In particular, the system may be configured to receive a unique identifier from a user device of the user, where the unique identifier is scanned using LiDAR technology present in the user device of the user, determine location of the user based on the unique identifier, determine an entity device associated with the unique identifier and location of the user, perform authentication of the user using at least one authentication method, determine that the authentication is successful, and in response to determining that the authentication is successful, provide access to an entity device.
    Type: Grant
    Filed: July 12, 2023
    Date of Patent: October 8, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Elliott Leonard Lillard, Regina Yee Cadavid, Gloria Youngsook Joo, Jinyoung Nathan Kim, Ramkumar Korlepara, Nia Mack, Philip Lone Mintac, Michael Jacob Richardson, Brandon Sloane, Srilekha Mudumbai Srinivasa
  • Patent number: 12107892
    Abstract: An identity set may be selected from an identity pool of an identity management service. The identity set may be selected based on a threshold quantity of unnecessary permissions relative to one or more existing managed policies provided by the identity management service. The identity set may be grouped into a plurality of identity subsets. The grouping may be performed based at least in part on services accessed by the identity set. A plurality of candidate policies may be generated, such as by generating, for each identity subset of the plurality of identity subsets, based at least in part on a plurality of policy generation rules, a respective candidate policy. At least one candidate policy of the plurality of candidate policies may be selected as a new managed policy that is provided by the identity management service to users.
    Type: Grant
    Filed: March 26, 2021
    Date of Patent: October 1, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Atiye Alaeddini, Homer Strong
  • Patent number: 12095788
    Abstract: An authentication method for use in a device and comprises monitoring a program behavior stream comprising a plurality of program observables that comprises a program observable. The method records the program observable and matches the recorded first program observable to a program model selected from a plurality of program models stored within a program store. A user model is selected from a plurality of user models stored within a user store corresponding to the program model. A user behavior stream corresponding to the program observable is monitored and a user observable contained in the user behavior stream is recorded. The user observable is correlated to the user model and an authentication state associated with the device is determined based on the correlating.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: September 17, 2024
    Assignee: Zighra Inc.
    Inventors: Deepak Chandra Dutt, Anil Buntwal Somayaji, Michael John Kendal Bingham
  • Patent number: 12081543
    Abstract: A system receives a request to authorize an interaction between a first avatar associated with a first user and a second avatar associated with a second user within a virtual environment. The system receives a request to verify the identity of the first user. The system receives an image of the first user and extracts facial features from the image. The system identifies a serial number and a user credential associated with the first user. The system generates a token based on the facial features, the serial number, and the user credential. The system verifies the identity of the first user based on the token. If the identity of the first user is verified, the system authorizes the interaction between the first avatar and the second avatar.
    Type: Grant
    Filed: May 31, 2022
    Date of Patent: September 3, 2024
    Assignee: Bank of America Corporation
    Inventor: Saurabh Gupta
  • Patent number: 12081531
    Abstract: A first party uses a secret key to encrypt information, which is then sent through an untrusted connection to a second party. The second party, however, cannot decrypt the information on its own, and it relays the encrypted information through a secure network. The secure network includes one or more nodes linking the first and second parties through one or more trusted connections (“hops”); each hop features uses of a shared secret key unique to that hop. The first party's connection to the network (domain) receives the information relayed through the secure network by the second party, it decrypts that information according to the secret key of the first party, and it then retransmits the decrypted information to the second party using the secure hops. Techniques are provided for sharing a private session key, federated credentials, and private information.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: September 3, 2024
    Assignee: JONETIX CORPORATION
    Inventors: Paul Ying-Fung Wu, Richard J. Nathan, Harry Leslie Tredennick
  • Patent number: 12072983
    Abstract: To support adding functionality to applications at a layer of abstraction above language-specific implementations of AOP, a language for implementing AOP facilitates runtime monitoring and analysis of an application independent of the language of the application. Aspects can be created for applications written in any supported language. Program code underlying implementations of aspects can be executed based on detecting triggering events during execution of the application. Routines written with the AOP language comprise event-based aspect code triggers that indicate an event which may occur during execution of the application and the associated aspect code to be executed. An agent deployed to a runtime engine to monitor the application detects events and evaluates contextual information about the detected events against the aspect triggers to determine if aspect code should be executed to perform further monitoring and analysis of the executing application.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: August 27, 2024
    Assignee: Veracode, Inc.
    Inventors: Christien R. Rioux, Robert Anthony Layzell
  • Patent number: 12069081
    Abstract: Presented is a network security system (NSS) that reliably detects malleable C2 traffic. The NSS intercepts outgoing transactions from user devices associated with user accounts. The NSS filters out transactions to known benign servers and analyzes remaining transactions for indicators of malleable command and control (C2) including heuristic, anomalous, and pattern-based detections. The NSS lowers the user confidence score associated with the user account or the user device based on the severity and number of detected indicators for each impacted outgoing transaction. When the user confidence score decreases below a threshold, the NSS implements a restricted security protocol for future outgoing transactions. Based on the detected indications, the NSS can identify malleable C2 attacker servers and add them to a blacklist of destination servers to further identify infected user accounts and devices.
    Type: Grant
    Filed: December 28, 2023
    Date of Patent: August 20, 2024
    Assignee: Netskope, Inc.
    Inventors: Dagmawi Mulugeta, Wu-Sheng Lin, Colin Davidson Estep, Raymond Jospeh Canzanese, Jr., Yong Zheng, Haoxin Hu, Yongxing Wang, Siying Yang
  • Patent number: 12058129
    Abstract: Policy-based genomic digital data sharing facilitates a variety of sharing scenarios, including public access, tenant-to-tenant sharing, workgroup sharing, and access by external service providers. Genomic digital data can be published to the platform and controlled by access tokens that are generated based on access policies. The policies can support conditions that are evaluated at execution time and effectively place control of access to information in hands of the owning tenant. Sharing conditions can be easily specified to support various use cases, relieving administrators from excessive access control configuration.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: August 6, 2024
    Assignee: Illumina, Inc.
    Inventors: Prabhu Palanisamy, Milan Karangutkar, Ryan Stinson
  • Patent number: 12058130
    Abstract: A device may receive software installation packages that include unique device identifiers and unique security mechanisms associated with corresponding IoT devices and include an address for the device, and may store the software installation packages in a data structure. The device may receive, based on the address for the device and from an IoT device, connection data identifying a request to connect to the device and identifying a device identifier and a security mechanism associated with the IoT device, and may utilize an MQTT protocol to authenticate the connection data based on the device identifier, the security mechanism, and the software installation packages stored in the data structure. The device may identify the IoT device as active when the connection data is authenticated, and may enable, when the connection data is authenticated, the IoT device to publish data to the device or to subscribe to data from the device.
    Type: Grant
    Filed: January 13, 2022
    Date of Patent: August 6, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Wujun Qie, Yagiz Onat Yazir, Adriana M. Rincon, Ping Judy Gao
  • Patent number: 12052258
    Abstract: A subscriber information authentication system that compares network-obtained and device-obtained information to verify that a device being used in connection with a user account is authenticated for that account. Certain subscriber information may be associated with the account during a registration process. In subsequent attempts to access the account, the registered subscriber information may be used in conjunction with information obtained from a telecommunication network and from a device to verify that the device is authorized. The information from the telecommunication network may be queried using Signaling System No. 7 (“SS7”) protocols. The device authorization may be performed, for example, to ensure that a device being used for device-based verification is the device a user purports it to be.
    Type: Grant
    Filed: October 18, 2022
    Date of Patent: July 30, 2024
    Assignee: Telesign Corporation
    Inventor: Stacy Lyn Stubblefield
  • Patent number: 12052345
    Abstract: The present disclosure includes apparatuses, methods, and systems for securing sensor communication. An embodiment includes a memory having instructions executable by the processing resource, and a sensor coupled to the processing resource and the memory. Wherein, the sensor is configured to collect sensor data and generate and provide a sensor public key, a sensor public identification, and a sensor identification certificate to a sensor fusion unit.
    Type: Grant
    Filed: May 15, 2022
    Date of Patent: July 30, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Alberto Troia, Antonino Mondello
  • Patent number: 12052218
    Abstract: A method and system for protecting access to remote systems, such as resource databases containing sensitive resources, such as cryptographic keys or personally identifying information, is disclosed. A server can receive a plurality of access requests from a requesting entity. The server can identify an entity profile corresponding to the access requests, as well as a machine learning model corresponding to the entity profile. The access requests can be used to form access sequences, which can be evaluated by the machine learning model. The machine learning model returns an anomaly score that can be compared to a threshold. If the anomaly score exceeds the threshold, the server can prevent further access to the remote system, for example, by revoking a credential associated with the requesting entity.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: July 30, 2024
    Assignee: Visa International Service Association
    Inventors: Ajit Gaddam, Pushkar Joglekar, Ara Jermakyan
  • Patent number: 12045373
    Abstract: In some examples, machine learning and rule-based identification, anonymization, and de-anonymization of sensitive structured and unstructured data may include receiving input data that is to be masked, and determining, for the input data, at least one type '1 of entity extraction from a plurality of types of entity extractions to be performed on the input data. The at least one determined type of entity extraction may be performed on the input data, and at least one entity may be extracted from the input data. At least one replacement strategy may be determined from a plurality of replacement strategies for the at least one extracted entity. Further, the at least one determined replacement strategy may be applied to the at least one extracted entity to generate masked data.
    Type: Grant
    Filed: December 17, 2021
    Date of Patent: July 23, 2024
    Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Aishwarya Satish Padmanabhan, Anshuma Chandak, Emmanuel Munguia Tapia
  • Patent number: 12047374
    Abstract: Systems, methods, and computer-readable media are provided for protecting a network from network discovery by an unknown or unauthenticated device. A network element, according to one implementation, is arranged in a communication network and includes an interface device configured to enable communication with an unknown network device. The network element also includes a memory system configured to store first and second sets of network information. The first set of network information includes fake information about the network and is configured to deceive the unknown network device before a procedure is performed for analyzing the authentication of the unknown network device. The second set of network information includes real information about the network. In some cases, the first set of network information may be provided to the unknown network device via the interface device before performing the procedure for analyzing the authentication of the unknown network device.
    Type: Grant
    Filed: March 10, 2021
    Date of Patent: July 23, 2024
    Assignee: Ciena Corporation
    Inventors: James P'ford't Carnes, III, David Jordan Krauss, Kyle Gosselin-Harris
  • Patent number: 12019762
    Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.
    Type: Grant
    Filed: October 14, 2021
    Date of Patent: June 25, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey C. Venable, Sr., Ramanathan Jagadeesan