Patents Examined by Khoi V Le
-
Patent number: 12218935Abstract: A communication apparatus receives request regarding a wireless communication parameter setting from another apparatus that has obtained information regarding the communication apparatus by capturing an image indicating information regarding the communication apparatus, accepts a user input regarding whether the parameter setting is to be executed with the other apparatus in a case where the request has been received, and executes the parameter setting with the other apparatus in a case where the user input indicating that a parameter setting is to be executed with the other apparatus has been accepted.Type: GrantFiled: October 4, 2023Date of Patent: February 4, 2025Assignee: Canon Kabushiki KaishaInventor: Fumihide Goto
-
Patent number: 12218924Abstract: A first host receives a packet from a first compute node for a second compute node of a second host. The payload is larger than a maximum transmission unit size. The first packet is encapsulated with an outer header. The first host analyzes a length of at least a portion of the outer header in determining a size of an encrypted segment of the payload. Then, the first host forms a plurality of packets where each packet in the packets includes an encrypted segment of the payload, a respective encryption header, and a respective authentication value. The payload of the first packet is segmented to form a plurality of encrypted segments based on the size. The first host sends the packets to the second host and receives an indication that a packet was not received. A second packet including the encrypted segment is sent to the second compute node.Type: GrantFiled: August 15, 2023Date of Patent: February 4, 2025Assignee: NICIRA, INC.Inventors: Wenyi Jiang, Daniel G. Wing, Bin Qian, Dexiang Wang
-
Patent number: 12217841Abstract: A system includes a plurality of tracking devices, such as RFID tags, affixed to items, such as vehicles, a data collection engine, client devices and backend devices. The backend devices include trained machine learning models, business logic, and attributes of a plurality of events. A plurality of data collection engines and systems send attributes of new events to the backend devices. The backend devices can track the items and predict particular outcomes of new events based upon the attributes of the new events utilizing the trained machine learning models.Type: GrantFiled: January 5, 2023Date of Patent: February 4, 2025Assignee: Brain Trust Innovations I, LLCInventor: David LaBorde
-
Patent number: 12218938Abstract: Embodiments disclosed are directed to a system that performs steps to perform enhanced device fingerprinting. The system at least at receives from an application, a plurality of device attributes identifying a client device on which the application is being used. The plurality of device attributes includes a push token provided by a push token service to the client device. The push token is uniquely paired to the client device. The system further transmits, to a device database, the plurality of device attributes for storage in a device profile. The system also transmits, to the application, a push notification based on the push token. The system receives, from the application, a deliverable status indicating whether the push notification was successfully transmitted to the client device, and transmits, to a notification database, the deliverable status for storage in a notification delivery profile. The system can use the information to authenticate a device.Type: GrantFiled: October 13, 2023Date of Patent: February 4, 2025Assignee: Capital One Services, LLCInventors: Daniel Alan Jarvis, Patrick Zearfoss, Salman Haq
-
Patent number: 12218958Abstract: A method comprises receiving, by a threat level engine (TLE) in the network, security data from a plurality of different sources, wherein the security data comprises data regarding traffic related to a security threat occurring in the network, determining, by the TLE, a security related event indicating a security threat occurring at network elements in the network based on security key performance indicators and the security data, when a threat impact level of the security related event exceeds a threshold, determining, by the TLE, a remediation action for the security related event based on the threat impact level, transmitting, by the TLE to a policy decision point, an instruction to generate and store a rule based on the remediation action for the security related event, and transmitting, to a policy enforcement point, an authorization to create the secure tunnel between the one or more network elements and another endpoint.Type: GrantFiled: September 6, 2022Date of Patent: February 4, 2025Assignee: T-Mobile Innovations LLCInventors: Marouane Balmakhtar, Serge Manning, Gregory Schumacher
-
Patent number: 12206689Abstract: An anomaly detection device is provided with a learning unit that generates a detection model using a communication log during normal operation of a communication apparatus as learning data and an anomaly detection unit that detects anomaly of the communication apparatus using the generated detection model. The anomaly detection device is further provided with a data acquisition unit that acquires a communication log (second communication log) generated during a predetermined period later than a first communication log and a determination unit that instructs relearning using the second communication log when there is difference information between the learning data (first communication log) of the current detection model and the second communication log and when the number of pieces of additional information (information on the additional flow) or the number of pieces of deletion information (information on the delete flow) included in the difference information satisfies predetermined evaluation criteria.Type: GrantFiled: June 24, 2019Date of Patent: January 21, 2025Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Masami Izumi, Tomoyasu Sato, Takeshi Nakatsuru, Takuya Minami, Naoto Fujiki
-
Patent number: 12200106Abstract: A memory device includes an input unit configured to receive a plain text and output plain blocks and CTS plain block, a multi-core unit including a plurality of encryption/decryption cores configured to encrypt each of the plain blocks provided from the input unit and output cipher blocks in accordance with control of an encryption/decryption core control unit, a CTS core unit including a CTS core configured to encrypt the CTS plain block provided from the input unit into a CTS cipher block, and an output unit configured to receive the cipher blocks and the CTS cipher block and output a cipher text. The CTS plain block is generated through a CTS calculation based on the plain text.Type: GrantFiled: March 18, 2022Date of Patent: January 14, 2025Assignee: Samsung Electronics Co., Ltd.Inventors: Jae Hun Jang, Ji Youp Kim, Han Byeul Na, Young Suk Ra, Man Keun Seo, Hong Rak Son, Se Jin Lim
-
Patent number: 12182255Abstract: Systems and methods for generating, selecting, and implementing rule-based strategies are disclosed. An input data set representing a plurality of interactions that may be classified as malicious or non-malicious is received and at least one strategy tree including a plurality of rule-based strategies is generated. The at least one strategy trees is generated by a machine learning model configured to generate a tree structure. The rule-based strategies are ranked based on a precision-recall-stability (PRS) score generated for each of the rule-based strategies and at least a first rule-based strategy having a highest PRS score is extracted. One or more interactions are evaluated using the first rule-based strategy to determine when the one or more interactions are malicious.Type: GrantFiled: January 31, 2022Date of Patent: December 31, 2024Assignee: Walmart Apollo, LLCInventors: Siyuan Zhou, Jing Xia, Alexander Chobanyan, Bradley Lamarr Leonard
-
Patent number: 12182280Abstract: The data transformation method operates discrete input data sources DF-in each having df-in data fields carrying to-be-converted data (tbc-data). Initial steps identify tbc-data field and characteristics; output discrete output (df-out) with predefined df-out data fields for converted data (conv-data); and maps or look-up tables for relationships between df-in data fields and df-out data fields. Process activates: SFTP App in the presence df-in and transfers df-in to unstructured data blob; and App copying the df-in from blob to file share archive; first orchestrating sequence App to validate df-in data based upon conversion rules. If INVALID, App generates error entry. If VALID, App converts tbc-data into conv-data with conversion rules and mapping orchestrating App populates df-out data fields with conv-data resulting converted df-out in the blob. A second orchestrating App transfers converted df-out to destination store.Type: GrantFiled: March 28, 2022Date of Patent: December 31, 2024Assignee: Data Solutions LLCInventors: Loren John Ball, Eduardo Bayudan
-
Patent number: 12184768Abstract: Systems, apparatuses, methods, and computer program products are disclosed for facilitating on-demand delivery of unknown qubits. An example method includes determining a first quantum basis pattern. The example method further includes encoding, by encoding circuitry, a set of bits utilizing the first quantum basis pattern to generate a set of qubits and transmitting, by quantum communications circuitry, the set of qubits over a quantum line, for example, a polarization maintaining optical fiber, to a remote device, wherein the set of qubits is configured for measurement by an independently determined, second quantum basis pattern, resulting in a second set of bits different than the first set of bits.Type: GrantFiled: October 29, 2021Date of Patent: December 31, 2024Assignee: Wells Fargo Bank, N.A.Inventor: Masoud Vakili
-
Patent number: 12174935Abstract: The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.Type: GrantFiled: July 30, 2020Date of Patent: December 24, 2024Assignee: DrFirst.com, Inc.Inventors: James F. Chen, Chen Qian, Zilong Tang, Eric Rosenfeld
-
Patent number: 12166916Abstract: A privacy protection method for the electronic device includes: starting face change detection, where the face change detection is continuously detecting, in a current unlocking period, whether a face in front of a display of the electronic device changes; after starting the face change detection, detecting an operation of starting a first private application; and in response to the operation and determining that a result of the face change detection is that the current face does not change, displaying first private content corresponding to the first private application; or in response to the operation and determining that a result of the face change detection is that the current face changes, displaying first non-private content, where the first non-private content does not include first private content.Type: GrantFiled: July 29, 2020Date of Patent: December 10, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Xiaoying Cui, Junqing Luo, Zhishan Zhuang, Xiaomei Wang, Chuan Qin, Shaojun Chen
-
Patent number: 12160428Abstract: In certain embodiments, systems and methods are provided for authenticating a user of a computing device. In some embodiments, a request to authorize a transaction associated with a user may be received, and a current location of the user may be determined. A determination of whether a threshold proximity exists (between the current location of the user and at least one location of at least one known associate) may be performed. The authorization request may be approved based on the determination of the threshold proximity. As an example, the known associate of the user may be determined from among a plurality of associates based on a geographical relationship between the location of the known associate and the current location of the user. The authorization request may be approved in response to a determination that the threshold proximity exists between the user's current location and the known associate's location.Type: GrantFiled: January 24, 2023Date of Patent: December 3, 2024Assignee: Capital One Services, LLCInventors: Drew Jacobs, Hannes Jouhikainen
-
Patent number: 12153688Abstract: Apparatuses, systems, and techniques to perform a cryptographic operation using multiple iterations, wherein each iteration includes two or more stages operating in parallel on inputs derived from a common value, one of the stages computing real data and other stages computing dummy data.Type: GrantFiled: March 29, 2021Date of Patent: November 26, 2024Assignee: NVIDIA CorporationInventors: Kun Yang, Zhili Wang, Xinxing Hu
-
Patent number: 12147546Abstract: Computer methods, apparatuses, and graphical user interfaces include placing one or more electronic messages in cloud storage that is defined by or accessed by a blockchain data structure.Type: GrantFiled: August 20, 2021Date of Patent: November 19, 2024Assignee: ABAXX TECHNOLOGIES CORP.Inventors: Joshua Crumb, Timothy M. Londergan, Christopher A. Wiklof
-
Patent number: 12137162Abstract: An apparatus comprises an encryption key generator to generate a media encryption key to encrypt data in number of memory components, where the encryption key generator is configured to wrap the media encryption key to generate an encrypted media encryption key, The encrypted media encryption key is stored in a non-volatile memory. The apparatus comprises firmware having instructions to transition the apparatus to and from a secure state using the encrypted media encryption key.Type: GrantFiled: June 28, 2021Date of Patent: November 5, 2024Inventors: Nathan A. Eckel, Steven D. Check
-
Patent number: 12132717Abstract: A system, method, and computer-readable media for linking identify information between a group-based communication system and an external application based on a user authorization to share credentials. After sharing the user's credentials, the user may be authenticated with the external application and user data from the group-based communication system may be shared with the external application. Additionally, a preview of a web resource associated with the external application may be displayed to the user within the group-based communication system allowing the user to interact with the web resource from within the group-based communication system.Type: GrantFiled: October 18, 2021Date of Patent: October 29, 2024Assignee: Salesforce, Inc.Inventors: Bertrand Fan, Salman Suhail, Paige Kehoe
-
Patent number: 12132716Abstract: A computing platform is configurable to cause initiating a communication session with a user, the user having a user account associated with a workflow data object, the workflow data object being configured to represent a plurality of operations included in a workflow. The computing platform is also configurable to cause identifying a verified status indicator associated with at least one of the plurality of operations, the verified status indicator comprising a verified credential associated with at least one of the plurality of operations. The computing platform is also configurable to cause identifying a transfer operation associated with the verified status indicator and identifying a target entity associated with the transfer operation. The computing platform is also configurable to cause implementing the identified transfer operation based, at least in part, on identified target entity.Type: GrantFiled: April 15, 2021Date of Patent: October 29, 2024Assignee: Salesforce, Inc.Inventor: Charles Hart Isaacs
-
Patent number: 12125028Abstract: In some embodiments, Uniform Resource Locator (URL) parameters may be used to bind access tokens to authorize web-browser-initiated network operations. In some embodiments, a user input at a data exchange gateway associated with a first website to perform a first network operation (e.g., a request to access resources associated with the first website) may be detected. In response to the detected user input, an access token may be generated based on user specific information associated with the user, where the access token is associated with one or more network operation parameters. In response to a use of the access token for authorizing the first network operation and successful authorization of the first network operation, the access token may be configured to be bound to a first URL identifier parameter associated with the first website.Type: GrantFiled: July 26, 2023Date of Patent: October 22, 2024Assignee: Capital One Services, LLCInventors: Varun Gupta, Allison Fenichel, Johanna Davis
-
Patent number: 12124596Abstract: The invention relates to data recovery technology. Each created backup is checked for the integrity of the placed files, while calculating the checksums of each block of data that can be restored from the backup. The computer system is restored from a backup copy by connecting it using the archive copy connection driver, which creates a virtual disk that is readable by standard means of the operating system of the computer system being restored. The booting of the operating system is performed from the virtual disk and, after restoring the functioning of the computer system, the system volume that has been damaged is restored from the backup copy to the local storage medium.Type: GrantFiled: March 29, 2022Date of Patent: October 22, 2024Assignee: Acronis International GmbHInventors: Vladimir Strogov, Alexey Sergeev, Alexey Kostushko, Serguei Beloussov, Stanislav Protasov