Patents Examined by Luu T Pham
-
Patent number: 12052223Abstract: A network device identifies an Internet Protocol Security (IPsec) tunnel that connects the network device to a remote device and determines that dead peer detection (DPD) is enabled at the network device. The network device receives a first DPD request message from the remote device via the IPsec tunnel, and sends a first DPD response message to the remote device via the IPsec tunnel. The network device determines that a workload of the network device satisfies a threshold amount, and sends one or more encapsulating security payload (ESP) packets that include traffic flow confidentiality (TFC) payload data to the remote device via the IPsec tunnel. The network device determines that the workload of the network device does not satisfy the threshold amount. The network device receives a second DPD request message from the remote device and sends a second DPD response message to the remote device via the IPsec tunnel.Type: GrantFiled: April 19, 2021Date of Patent: July 30, 2024Assignee: Juniper Networks, Inc.Inventors: Naresh Chand, Ranjan Sinha
-
Patent number: 12047373Abstract: An online system monitors resources utilization by users connecting with the online system and detects unauthorized resource utilization caused by sharing of sessions. The online system collects samples of browser attributes from browsers interacting with the online system. The online system determines a score indicating a difference between two samples of browser attributes taken at different times. The online system uses the score to determine whether the two samples of browser attributes in the same session were received from different browsers. If the online system detects unauthorized resource utilization if the two samples are determined to be from two different browsers. The online system takes mitigating actions, for example, by invalidating the session or requiring users to re-enter credentials.Type: GrantFiled: November 5, 2019Date of Patent: July 23, 2024Assignee: salesforce.com, inc.Inventors: Ankur Gupta, Anuj Gargeya Malkapuram
-
Patent number: 12047515Abstract: A system and method for digital petition management utilizing the establishment of a universal, secure identity for online communications, interactions, and exchanges that uniquely associates an image, sound, or other digital asset with a person's identity using non-fungible tokens (NFTs). A digital signature associated with an individual who wants to sign a digital petition is obtained and verified using one or more mechanisms to ensure that each digital signature is associated with only one individual and to maintain compliance with rules and regulations governing petitions. Links to the petition (also herein called “calls to action” or CTAs) can be customized via an online platform such that interaction with a given link or type of link initiates automated petition signature acquisition. In some implementations, the digital signature is a personal NFT (PNFT) which can be verified using a unique identifier to match with existing PNFTs stored in a distributed ledger.Type: GrantFiled: January 14, 2023Date of Patent: July 23, 2024Assignee: TAPTEXT LLCInventors: Steve Doumar, David Teodosio
-
Patent number: 12047369Abstract: In variants, a fleet management method can include determining information about a device S100; sending information to a device S200, and operating the device according to the information S300 (e.g., example shown in FIG. 1). The fleet management system can function to scalably manage the operation and permissioning of one or more fleets of devices.Type: GrantFiled: July 21, 2023Date of Patent: July 23, 2024Assignee: Viam Inc.Inventors: Eliot Horowitz, Eric Daniels
-
Patent number: 12041041Abstract: A computer server may receive location data from a mobile client device and may compare the location data to predefined secure location definitions, which may be trusted or private locations. The computer server may receive a request from the mobile client device to access network resources or services, and the computer server may determine, using a result of comparing the location data and the one or more predefined secure location definitions, an authentication process for providing the mobile client device with access to the network resources or services. The computer server may execute the authentication process and may provide the mobile client device with access to the network resources or services.Type: GrantFiled: October 14, 2022Date of Patent: July 16, 2024Inventors: Reinaldo Gamaliel Rivera Colon, Everardo Calamaco, Jr., Michaela Rose Cestari
-
Patent number: 12039047Abstract: Systems and methods for detecting malicious activity in a computer system. One or more graphs can be generated based on information objects about the computer system and relationships between the information objects, where the information objects are vertices in the graphs and the relationships are edges in the graphs. Comparison of generated graphs to existing graphs can determine a likelihood of malicious activity.Type: GrantFiled: October 21, 2021Date of Patent: July 16, 2024Assignee: AO KASPERSKY LABInventors: Igor I. Soumenkov, Sergey Y. Golovanov
-
Patent number: 12034726Abstract: A proxy server receives a first request from a first user to access a resource hosted by a cloud-based server. The proxy server inserts a first tenant control header into the first request specifying a tenant identifier. The tenant identifier indicates a tenant permitted to access the resource. The proxy server then transmits the first request with the inserted first tenant control header to the cloud-based server. In response to receiving a first response indicating a rejection of the first request with the inserted first tenant control header, the proxy server transmits the first request again to the cloud-based server but without the first tenant control header. The proxy server then logs the first request as an access request using a non-permitted tenant identifier.Type: GrantFiled: May 31, 2023Date of Patent: July 9, 2024Assignee: CLOUDFLARE, INC.Inventors: Adrian Mateo Maceiras, Andrew Kenneth Godfrey Martin
-
Patent number: 12028329Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, a command is transmitted causing a client device to present a workflow action to perform. A user command to perform the workflow action is identified using the client device. Authentication data including user credentials and a navigation action for a visual user interface is identified. The user credentials are transmitted to the network service and an emulation of the navigation action is performed. A command that performs the workflow action is transmitted to the network service.Type: GrantFiled: February 16, 2022Date of Patent: July 2, 2024Assignee: VMware LLCInventors: Daniel E. Zeck, David Shaw, Robert Worsnop, John Ryan Bard
-
Patent number: 12028459Abstract: It is provided a multi-access edge computing node located within a cellular coverage area supported by a base station of a mobile network operator, the multi-access edge computing node comprising at least one memory to store a chained data block, where each data block is coded with data of a past transaction in respect of a good or service; and at least one stock processor configured with functions that: include a new data block, to record a current transaction in respect of a good or service, into the chained data block in response to a signature, generated from processing the data of the current transaction with the coded data of the past transactions stored in the chained data block, being validated by a group of external multi-access edge computing nodes, wherein the multi-access edge computing node and the group of external multi-access edge computing nodes are trusted, and communicate over a common channel.Type: GrantFiled: December 17, 2018Date of Patent: July 2, 2024Assignee: XENIROInventor: Enshen Huang
-
Patent number: 12026248Abstract: A system and method for identifying device attributes based on string field conventions. A method includes applying at least one machine learning model to an application data set extracted based on a string indicated in a field of device data corresponding to a device, wherein each of the at least one machine learning model is trained based on a training data set including a plurality of second strings and a plurality of device attribute labels, wherein each device attribute label corresponds to a respective second string of the plurality of second strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first string; and identifying, based on the output of the at least one machine learning model, a device attribute of the device.Type: GrantFiled: June 10, 2021Date of Patent: July 2, 2024Assignee: Armis Security Ltd.Inventors: Ron Shoham, Tom Hanetz, Yuval Friedlander, Gil Ben Zvi
-
Patent number: 12019736Abstract: Methods, systems, and computer readable media for using metadata tag compression. A method occurs at a metadata processing system for enforcing security policies in a processor architecture. The method comprises: receiving, at the metadata processing system, a short tag associated with a word in memory; translating the short tag, using a tag map, into a long tag, wherein the short tag indicates a location of the long tag relative to an offset in the tag map and wherein the long tag indicates a memory location containing metadata associated with the word or an instruction; obtaining the metadata from the memory location; and determining, using the metadata, whether the word or the instruction violates a security policy.Type: GrantFiled: March 1, 2021Date of Patent: June 25, 2024Assignee: THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIAInventors: Andre Maurice DeHon, Nicholas Edward Roessler
-
Patent number: 12021861Abstract: A system includes first and second subsystems. The first subsystem receives a validation number request, transmitted by a first device in response to the entry of an account number into a first field of a webpage. In response to receiving the request, the first subsystem randomly generates the validation number, stores a copy in memory, and transmits it to a second device. The second subsystem receives a transaction request that includes the validation number from the first device, and transmits the received number to the first subsystem. The first device transmitted the request in response to the second device receiving the validation number and its subsequent entry into a second field of the webpage displayed on the first device. In response to receiving the validation number, the first subsystem determines that it matches the stored copy and transmits a message to the second subsystem authorizing the transaction.Type: GrantFiled: January 4, 2021Date of Patent: June 25, 2024Assignee: Bank of America CorporationInventor: Morgan S. Allen
-
Patent number: 12021849Abstract: A privacy computing-enabled migration method for large-scale persistent data across platforms is provided. By virtue of a sealing key management service SKMS, based on trusted sealing and trusted connection which are the basic functions of privacy computing, large-scale migration of privacy data with low deployment cost, high security and high efficiency can be realized by providing download links to platforms that meet requirements, thus greatly improving the flexibility of data deployment and use and the landing of trusted sealing technology.Type: GrantFiled: May 30, 2023Date of Patent: June 25, 2024Assignee: Nanhu laboratoryInventor: Lei Zhang
-
Patent number: 12015612Abstract: In one embodiment, a charm application enables user devices to communicate via physical charms. Upon receiving, from a first user device, a read request that is associated with the physical charm, the charm application identifies a message and an authorization list that are associated with the physical charm and previously received from a second user device. The charm application then determines whether a first user associated with the first user device is authorized to read the message based on the authorization list. If the first user is authorized to read the message, then the charm application transmits the message to the first user device. Notably, each physical charm may be exchanged between any number of users, but only read by authorized users via a user device. Accordingly, user devices may communicate private messages including any type of data with other user devices irrespective of whether technical infrastructures are accessible.Type: GrantFiled: August 25, 2017Date of Patent: June 18, 2024Assignee: DISNEY ENTERPRISES, INC.Inventors: Michael Goslin, Larra Paolilli, Katherine M. Bassett, Janice Rosenthal
-
Patent number: 12010237Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.Type: GrantFiled: January 25, 2022Date of Patent: June 11, 2024Assignee: QPQ Ltd.Inventors: Emanuele Ragnoli, Roberto Ripamonti
-
Patent number: 12003497Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.Type: GrantFiled: December 29, 2022Date of Patent: June 4, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Manuel Ortiz, Jr., Daniel Solero, Michael Maglione, Katie Alvarez
-
Patent number: 11997076Abstract: A system includes an intelligent electronic device (IED) configured to perform operations that include receiving a first user input and deriving a first connectivity association key (CAK) based on the first user input. The system also includes a gateway configured to perform operations that include receiving a second user input, deriving a second CAK based on the second user input, identifying the first CAK of the IED, establishing an adoption link with the IED based on a match between the first CAK and the second CAK, generating a third CAK, and distributing a copy of the third CAK to the IED via the adoption link to establish a MKA connectivity association with the IED.Type: GrantFiled: August 25, 2020Date of Patent: May 28, 2024Assignee: Schweitzer Engineering Laboratories, Inc.Inventors: Colin Gordon, John W. Knapek
-
Patent number: 11995158Abstract: Techniques are provided herein for tracking activation events associated with a given serial number and using the data from the activation events to autonomously determine whether the serial number has been leaked. Numerous different characteristic parameters of activation events collected over a given time period for a serial number can be tracked and stored in a database. A plurality of different input variables can be generated based on the characteristic parameter data, which create the inputs that are used by a trained neural network to determine the leakage probability. If the leakage probability is determined to be above a certain threshold, an alert of some kind can be generated to indicate that the serial number has been leaked.Type: GrantFiled: March 5, 2021Date of Patent: May 28, 2024Assignee: Adobe Inc.Inventors: Sachin Goyal, Harsh Agarwal, Cyril Thomas
-
Patent number: 11997080Abstract: A method for validating a Uniform Resource Locator (URL) includes generating electronic media content including the URL, generating a Certificate Signing Request (CSR) including the URL, sending the CSR to a certificate signing server, receiving a signed certificate corresponding to the CSR from the certificate signing server, and encoding the signed certificate as metadata in the electronic media content and/or encoding a serial number associated with the signed certificate as metadata in the electronic media content. A user can send the URL to another user through a chat message, an email, a word processing document or other business application, or a document which has a URL through a pen drive, email, or chat message. The certificate-based mechanism is used to validate the origin (sender) of the URL so that the recipients know that the URL can be accessed without having to separately analyze the security risks.Type: GrantFiled: December 30, 2020Date of Patent: May 28, 2024Assignee: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Krishna Kumar KB
-
Patent number: 11991285Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: January 12, 2023Date of Patent: May 21, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce