Patents Examined by Khoi V Le
-
Patent number: 12153688Abstract: Apparatuses, systems, and techniques to perform a cryptographic operation using multiple iterations, wherein each iteration includes two or more stages operating in parallel on inputs derived from a common value, one of the stages computing real data and other stages computing dummy data.Type: GrantFiled: March 29, 2021Date of Patent: November 26, 2024Assignee: NVIDIA CorporationInventors: Kun Yang, Zhili Wang, Xinxing Hu
-
Patent number: 12147546Abstract: Computer methods, apparatuses, and graphical user interfaces include placing one or more electronic messages in cloud storage that is defined by or accessed by a blockchain data structure.Type: GrantFiled: August 20, 2021Date of Patent: November 19, 2024Assignee: ABAXX TECHNOLOGIES CORP.Inventors: Joshua Crumb, Timothy M. Londergan, Christopher A. Wiklof
-
Patent number: 12137162Abstract: An apparatus comprises an encryption key generator to generate a media encryption key to encrypt data in number of memory components, where the encryption key generator is configured to wrap the media encryption key to generate an encrypted media encryption key, The encrypted media encryption key is stored in a non-volatile memory. The apparatus comprises firmware having instructions to transition the apparatus to and from a secure state using the encrypted media encryption key.Type: GrantFiled: June 28, 2021Date of Patent: November 5, 2024Inventors: Nathan A. Eckel, Steven D. Check
-
Patent number: 12132716Abstract: A computing platform is configurable to cause initiating a communication session with a user, the user having a user account associated with a workflow data object, the workflow data object being configured to represent a plurality of operations included in a workflow. The computing platform is also configurable to cause identifying a verified status indicator associated with at least one of the plurality of operations, the verified status indicator comprising a verified credential associated with at least one of the plurality of operations. The computing platform is also configurable to cause identifying a transfer operation associated with the verified status indicator and identifying a target entity associated with the transfer operation. The computing platform is also configurable to cause implementing the identified transfer operation based, at least in part, on identified target entity.Type: GrantFiled: April 15, 2021Date of Patent: October 29, 2024Assignee: Salesforce, Inc.Inventor: Charles Hart Isaacs
-
Patent number: 12132717Abstract: A system, method, and computer-readable media for linking identify information between a group-based communication system and an external application based on a user authorization to share credentials. After sharing the user's credentials, the user may be authenticated with the external application and user data from the group-based communication system may be shared with the external application. Additionally, a preview of a web resource associated with the external application may be displayed to the user within the group-based communication system allowing the user to interact with the web resource from within the group-based communication system.Type: GrantFiled: October 18, 2021Date of Patent: October 29, 2024Assignee: Salesforce, Inc.Inventors: Bertrand Fan, Salman Suhail, Paige Kehoe
-
Patent number: 12125028Abstract: In some embodiments, Uniform Resource Locator (URL) parameters may be used to bind access tokens to authorize web-browser-initiated network operations. In some embodiments, a user input at a data exchange gateway associated with a first website to perform a first network operation (e.g., a request to access resources associated with the first website) may be detected. In response to the detected user input, an access token may be generated based on user specific information associated with the user, where the access token is associated with one or more network operation parameters. In response to a use of the access token for authorizing the first network operation and successful authorization of the first network operation, the access token may be configured to be bound to a first URL identifier parameter associated with the first website.Type: GrantFiled: July 26, 2023Date of Patent: October 22, 2024Assignee: Capital One Services, LLCInventors: Varun Gupta, Allison Fenichel, Johanna Davis
-
Patent number: 12124596Abstract: The invention relates to data recovery technology. Each created backup is checked for the integrity of the placed files, while calculating the checksums of each block of data that can be restored from the backup. The computer system is restored from a backup copy by connecting it using the archive copy connection driver, which creates a virtual disk that is readable by standard means of the operating system of the computer system being restored. The booting of the operating system is performed from the virtual disk and, after restoring the functioning of the computer system, the system volume that has been damaged is restored from the backup copy to the local storage medium.Type: GrantFiled: March 29, 2022Date of Patent: October 22, 2024Assignee: Acronis International GmbHInventors: Vladimir Strogov, Alexey Sergeev, Alexey Kostushko, Serguei Beloussov, Stanislav Protasov
-
Patent number: 12113797Abstract: Embodiments of the present invention provide a system for authorizing entity users based on augmented reality and LiDAR technology. In particular, the system may be configured to receive a unique identifier from a user device of the user, where the unique identifier is scanned using LiDAR technology present in the user device of the user, determine location of the user based on the unique identifier, determine an entity device associated with the unique identifier and location of the user, perform authentication of the user using at least one authentication method, determine that the authentication is successful, and in response to determining that the authentication is successful, provide access to an entity device.Type: GrantFiled: July 12, 2023Date of Patent: October 8, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Elliott Leonard Lillard, Regina Yee Cadavid, Gloria Youngsook Joo, Jinyoung Nathan Kim, Ramkumar Korlepara, Nia Mack, Philip Lone Mintac, Michael Jacob Richardson, Brandon Sloane, Srilekha Mudumbai Srinivasa
-
Patent number: 12107892Abstract: An identity set may be selected from an identity pool of an identity management service. The identity set may be selected based on a threshold quantity of unnecessary permissions relative to one or more existing managed policies provided by the identity management service. The identity set may be grouped into a plurality of identity subsets. The grouping may be performed based at least in part on services accessed by the identity set. A plurality of candidate policies may be generated, such as by generating, for each identity subset of the plurality of identity subsets, based at least in part on a plurality of policy generation rules, a respective candidate policy. At least one candidate policy of the plurality of candidate policies may be selected as a new managed policy that is provided by the identity management service to users.Type: GrantFiled: March 26, 2021Date of Patent: October 1, 2024Assignee: Amazon Technologies, Inc.Inventors: Atiye Alaeddini, Homer Strong
-
Patent number: 12095788Abstract: An authentication method for use in a device and comprises monitoring a program behavior stream comprising a plurality of program observables that comprises a program observable. The method records the program observable and matches the recorded first program observable to a program model selected from a plurality of program models stored within a program store. A user model is selected from a plurality of user models stored within a user store corresponding to the program model. A user behavior stream corresponding to the program observable is monitored and a user observable contained in the user behavior stream is recorded. The user observable is correlated to the user model and an authentication state associated with the device is determined based on the correlating.Type: GrantFiled: May 21, 2021Date of Patent: September 17, 2024Assignee: Zighra Inc.Inventors: Deepak Chandra Dutt, Anil Buntwal Somayaji, Michael John Kendal Bingham
-
Patent number: 12081531Abstract: A first party uses a secret key to encrypt information, which is then sent through an untrusted connection to a second party. The second party, however, cannot decrypt the information on its own, and it relays the encrypted information through a secure network. The secure network includes one or more nodes linking the first and second parties through one or more trusted connections (“hops”); each hop features uses of a shared secret key unique to that hop. The first party's connection to the network (domain) receives the information relayed through the secure network by the second party, it decrypts that information according to the secret key of the first party, and it then retransmits the decrypted information to the second party using the secure hops. Techniques are provided for sharing a private session key, federated credentials, and private information.Type: GrantFiled: January 27, 2023Date of Patent: September 3, 2024Assignee: JONETIX CORPORATIONInventors: Paul Ying-Fung Wu, Richard J. Nathan, Harry Leslie Tredennick
-
Patent number: 12081543Abstract: A system receives a request to authorize an interaction between a first avatar associated with a first user and a second avatar associated with a second user within a virtual environment. The system receives a request to verify the identity of the first user. The system receives an image of the first user and extracts facial features from the image. The system identifies a serial number and a user credential associated with the first user. The system generates a token based on the facial features, the serial number, and the user credential. The system verifies the identity of the first user based on the token. If the identity of the first user is verified, the system authorizes the interaction between the first avatar and the second avatar.Type: GrantFiled: May 31, 2022Date of Patent: September 3, 2024Assignee: Bank of America CorporationInventor: Saurabh Gupta
-
Patent number: 12072983Abstract: To support adding functionality to applications at a layer of abstraction above language-specific implementations of AOP, a language for implementing AOP facilitates runtime monitoring and analysis of an application independent of the language of the application. Aspects can be created for applications written in any supported language. Program code underlying implementations of aspects can be executed based on detecting triggering events during execution of the application. Routines written with the AOP language comprise event-based aspect code triggers that indicate an event which may occur during execution of the application and the associated aspect code to be executed. An agent deployed to a runtime engine to monitor the application detects events and evaluates contextual information about the detected events against the aspect triggers to determine if aspect code should be executed to perform further monitoring and analysis of the executing application.Type: GrantFiled: April 24, 2020Date of Patent: August 27, 2024Assignee: Veracode, Inc.Inventors: Christien R. Rioux, Robert Anthony Layzell
-
Patent number: 12069081Abstract: Presented is a network security system (NSS) that reliably detects malleable C2 traffic. The NSS intercepts outgoing transactions from user devices associated with user accounts. The NSS filters out transactions to known benign servers and analyzes remaining transactions for indicators of malleable command and control (C2) including heuristic, anomalous, and pattern-based detections. The NSS lowers the user confidence score associated with the user account or the user device based on the severity and number of detected indicators for each impacted outgoing transaction. When the user confidence score decreases below a threshold, the NSS implements a restricted security protocol for future outgoing transactions. Based on the detected indications, the NSS can identify malleable C2 attacker servers and add them to a blacklist of destination servers to further identify infected user accounts and devices.Type: GrantFiled: December 28, 2023Date of Patent: August 20, 2024Assignee: Netskope, Inc.Inventors: Dagmawi Mulugeta, Wu-Sheng Lin, Colin Davidson Estep, Raymond Jospeh Canzanese, Jr., Yong Zheng, Haoxin Hu, Yongxing Wang, Siying Yang
-
Patent number: 12058129Abstract: Policy-based genomic digital data sharing facilitates a variety of sharing scenarios, including public access, tenant-to-tenant sharing, workgroup sharing, and access by external service providers. Genomic digital data can be published to the platform and controlled by access tokens that are generated based on access policies. The policies can support conditions that are evaluated at execution time and effectively place control of access to information in hands of the owning tenant. Sharing conditions can be easily specified to support various use cases, relieving administrators from excessive access control configuration.Type: GrantFiled: June 25, 2021Date of Patent: August 6, 2024Assignee: Illumina, Inc.Inventors: Prabhu Palanisamy, Milan Karangutkar, Ryan Stinson
-
Patent number: 12058130Abstract: A device may receive software installation packages that include unique device identifiers and unique security mechanisms associated with corresponding IoT devices and include an address for the device, and may store the software installation packages in a data structure. The device may receive, based on the address for the device and from an IoT device, connection data identifying a request to connect to the device and identifying a device identifier and a security mechanism associated with the IoT device, and may utilize an MQTT protocol to authenticate the connection data based on the device identifier, the security mechanism, and the software installation packages stored in the data structure. The device may identify the IoT device as active when the connection data is authenticated, and may enable, when the connection data is authenticated, the IoT device to publish data to the device or to subscribe to data from the device.Type: GrantFiled: January 13, 2022Date of Patent: August 6, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Wujun Qie, Yagiz Onat Yazir, Adriana M. Rincon, Ping Judy Gao
-
Patent number: 12052258Abstract: A subscriber information authentication system that compares network-obtained and device-obtained information to verify that a device being used in connection with a user account is authenticated for that account. Certain subscriber information may be associated with the account during a registration process. In subsequent attempts to access the account, the registered subscriber information may be used in conjunction with information obtained from a telecommunication network and from a device to verify that the device is authorized. The information from the telecommunication network may be queried using Signaling System No. 7 (“SS7”) protocols. The device authorization may be performed, for example, to ensure that a device being used for device-based verification is the device a user purports it to be.Type: GrantFiled: October 18, 2022Date of Patent: July 30, 2024Assignee: Telesign CorporationInventor: Stacy Lyn Stubblefield
-
Patent number: 12052218Abstract: A method and system for protecting access to remote systems, such as resource databases containing sensitive resources, such as cryptographic keys or personally identifying information, is disclosed. A server can receive a plurality of access requests from a requesting entity. The server can identify an entity profile corresponding to the access requests, as well as a machine learning model corresponding to the entity profile. The access requests can be used to form access sequences, which can be evaluated by the machine learning model. The machine learning model returns an anomaly score that can be compared to a threshold. If the anomaly score exceeds the threshold, the server can prevent further access to the remote system, for example, by revoking a credential associated with the requesting entity.Type: GrantFiled: June 28, 2018Date of Patent: July 30, 2024Assignee: Visa International Service AssociationInventors: Ajit Gaddam, Pushkar Joglekar, Ara Jermakyan
-
Patent number: 12052345Abstract: The present disclosure includes apparatuses, methods, and systems for securing sensor communication. An embodiment includes a memory having instructions executable by the processing resource, and a sensor coupled to the processing resource and the memory. Wherein, the sensor is configured to collect sensor data and generate and provide a sensor public key, a sensor public identification, and a sensor identification certificate to a sensor fusion unit.Type: GrantFiled: May 15, 2022Date of Patent: July 30, 2024Assignee: Micron Technology, Inc.Inventors: Alberto Troia, Antonino Mondello
-
Patent number: 12045373Abstract: In some examples, machine learning and rule-based identification, anonymization, and de-anonymization of sensitive structured and unstructured data may include receiving input data that is to be masked, and determining, for the input data, at least one type '1 of entity extraction from a plurality of types of entity extractions to be performed on the input data. The at least one determined type of entity extraction may be performed on the input data, and at least one entity may be extracted from the input data. At least one replacement strategy may be determined from a plurality of replacement strategies for the at least one extracted entity. Further, the at least one determined replacement strategy may be applied to the at least one extracted entity to generate masked data.Type: GrantFiled: December 17, 2021Date of Patent: July 23, 2024Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITEDInventors: Aishwarya Satish Padmanabhan, Anshuma Chandak, Emmanuel Munguia Tapia