Patents Examined by Luu T Pham
  • Patent number: 12052223
    Abstract: A network device identifies an Internet Protocol Security (IPsec) tunnel that connects the network device to a remote device and determines that dead peer detection (DPD) is enabled at the network device. The network device receives a first DPD request message from the remote device via the IPsec tunnel, and sends a first DPD response message to the remote device via the IPsec tunnel. The network device determines that a workload of the network device satisfies a threshold amount, and sends one or more encapsulating security payload (ESP) packets that include traffic flow confidentiality (TFC) payload data to the remote device via the IPsec tunnel. The network device determines that the workload of the network device does not satisfy the threshold amount. The network device receives a second DPD request message from the remote device and sends a second DPD response message to the remote device via the IPsec tunnel.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: July 30, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Naresh Chand, Ranjan Sinha
  • Patent number: 12047373
    Abstract: An online system monitors resources utilization by users connecting with the online system and detects unauthorized resource utilization caused by sharing of sessions. The online system collects samples of browser attributes from browsers interacting with the online system. The online system determines a score indicating a difference between two samples of browser attributes taken at different times. The online system uses the score to determine whether the two samples of browser attributes in the same session were received from different browsers. If the online system detects unauthorized resource utilization if the two samples are determined to be from two different browsers. The online system takes mitigating actions, for example, by invalidating the session or requiring users to re-enter credentials.
    Type: Grant
    Filed: November 5, 2019
    Date of Patent: July 23, 2024
    Assignee: salesforce.com, inc.
    Inventors: Ankur Gupta, Anuj Gargeya Malkapuram
  • Patent number: 12047515
    Abstract: A system and method for digital petition management utilizing the establishment of a universal, secure identity for online communications, interactions, and exchanges that uniquely associates an image, sound, or other digital asset with a person's identity using non-fungible tokens (NFTs). A digital signature associated with an individual who wants to sign a digital petition is obtained and verified using one or more mechanisms to ensure that each digital signature is associated with only one individual and to maintain compliance with rules and regulations governing petitions. Links to the petition (also herein called “calls to action” or CTAs) can be customized via an online platform such that interaction with a given link or type of link initiates automated petition signature acquisition. In some implementations, the digital signature is a personal NFT (PNFT) which can be verified using a unique identifier to match with existing PNFTs stored in a distributed ledger.
    Type: Grant
    Filed: January 14, 2023
    Date of Patent: July 23, 2024
    Assignee: TAPTEXT LLC
    Inventors: Steve Doumar, David Teodosio
  • Patent number: 12047369
    Abstract: In variants, a fleet management method can include determining information about a device S100; sending information to a device S200, and operating the device according to the information S300 (e.g., example shown in FIG. 1). The fleet management system can function to scalably manage the operation and permissioning of one or more fleets of devices.
    Type: Grant
    Filed: July 21, 2023
    Date of Patent: July 23, 2024
    Assignee: Viam Inc.
    Inventors: Eliot Horowitz, Eric Daniels
  • Patent number: 12041041
    Abstract: A computer server may receive location data from a mobile client device and may compare the location data to predefined secure location definitions, which may be trusted or private locations. The computer server may receive a request from the mobile client device to access network resources or services, and the computer server may determine, using a result of comparing the location data and the one or more predefined secure location definitions, an authentication process for providing the mobile client device with access to the network resources or services. The computer server may execute the authentication process and may provide the mobile client device with access to the network resources or services.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: July 16, 2024
    Inventors: Reinaldo Gamaliel Rivera Colon, Everardo Calamaco, Jr., Michaela Rose Cestari
  • Patent number: 12039047
    Abstract: Systems and methods for detecting malicious activity in a computer system. One or more graphs can be generated based on information objects about the computer system and relationships between the information objects, where the information objects are vertices in the graphs and the relationships are edges in the graphs. Comparison of generated graphs to existing graphs can determine a likelihood of malicious activity.
    Type: Grant
    Filed: October 21, 2021
    Date of Patent: July 16, 2024
    Assignee: AO KASPERSKY LAB
    Inventors: Igor I. Soumenkov, Sergey Y. Golovanov
  • Patent number: 12034726
    Abstract: A proxy server receives a first request from a first user to access a resource hosted by a cloud-based server. The proxy server inserts a first tenant control header into the first request specifying a tenant identifier. The tenant identifier indicates a tenant permitted to access the resource. The proxy server then transmits the first request with the inserted first tenant control header to the cloud-based server. In response to receiving a first response indicating a rejection of the first request with the inserted first tenant control header, the proxy server transmits the first request again to the cloud-based server but without the first tenant control header. The proxy server then logs the first request as an access request using a non-permitted tenant identifier.
    Type: Grant
    Filed: May 31, 2023
    Date of Patent: July 9, 2024
    Assignee: CLOUDFLARE, INC.
    Inventors: Adrian Mateo Maceiras, Andrew Kenneth Godfrey Martin
  • Patent number: 12028329
    Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, a command is transmitted causing a client device to present a workflow action to perform. A user command to perform the workflow action is identified using the client device. Authentication data including user credentials and a navigation action for a visual user interface is identified. The user credentials are transmitted to the network service and an emulation of the navigation action is performed. A command that performs the workflow action is transmitted to the network service.
    Type: Grant
    Filed: February 16, 2022
    Date of Patent: July 2, 2024
    Assignee: VMware LLC
    Inventors: Daniel E. Zeck, David Shaw, Robert Worsnop, John Ryan Bard
  • Patent number: 12028459
    Abstract: It is provided a multi-access edge computing node located within a cellular coverage area supported by a base station of a mobile network operator, the multi-access edge computing node comprising at least one memory to store a chained data block, where each data block is coded with data of a past transaction in respect of a good or service; and at least one stock processor configured with functions that: include a new data block, to record a current transaction in respect of a good or service, into the chained data block in response to a signature, generated from processing the data of the current transaction with the coded data of the past transactions stored in the chained data block, being validated by a group of external multi-access edge computing nodes, wherein the multi-access edge computing node and the group of external multi-access edge computing nodes are trusted, and communicate over a common channel.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: July 2, 2024
    Assignee: XENIRO
    Inventor: Enshen Huang
  • Patent number: 12026248
    Abstract: A system and method for identifying device attributes based on string field conventions. A method includes applying at least one machine learning model to an application data set extracted based on a string indicated in a field of device data corresponding to a device, wherein each of the at least one machine learning model is trained based on a training data set including a plurality of second strings and a plurality of device attribute labels, wherein each device attribute label corresponds to a respective second string of the plurality of second strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first string; and identifying, based on the output of the at least one machine learning model, a device attribute of the device.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: July 2, 2024
    Assignee: Armis Security Ltd.
    Inventors: Ron Shoham, Tom Hanetz, Yuval Friedlander, Gil Ben Zvi
  • Patent number: 12019736
    Abstract: Methods, systems, and computer readable media for using metadata tag compression. A method occurs at a metadata processing system for enforcing security policies in a processor architecture. The method comprises: receiving, at the metadata processing system, a short tag associated with a word in memory; translating the short tag, using a tag map, into a long tag, wherein the short tag indicates a location of the long tag relative to an offset in the tag map and wherein the long tag indicates a memory location containing metadata associated with the word or an instruction; obtaining the metadata from the memory location; and determining, using the metadata, whether the word or the instruction violates a security policy.
    Type: Grant
    Filed: March 1, 2021
    Date of Patent: June 25, 2024
    Assignee: THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIA
    Inventors: Andre Maurice DeHon, Nicholas Edward Roessler
  • Patent number: 12021861
    Abstract: A system includes first and second subsystems. The first subsystem receives a validation number request, transmitted by a first device in response to the entry of an account number into a first field of a webpage. In response to receiving the request, the first subsystem randomly generates the validation number, stores a copy in memory, and transmits it to a second device. The second subsystem receives a transaction request that includes the validation number from the first device, and transmits the received number to the first subsystem. The first device transmitted the request in response to the second device receiving the validation number and its subsequent entry into a second field of the webpage displayed on the first device. In response to receiving the validation number, the first subsystem determines that it matches the stored copy and transmits a message to the second subsystem authorizing the transaction.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: June 25, 2024
    Assignee: Bank of America Corporation
    Inventor: Morgan S. Allen
  • Patent number: 12021849
    Abstract: A privacy computing-enabled migration method for large-scale persistent data across platforms is provided. By virtue of a sealing key management service SKMS, based on trusted sealing and trusted connection which are the basic functions of privacy computing, large-scale migration of privacy data with low deployment cost, high security and high efficiency can be realized by providing download links to platforms that meet requirements, thus greatly improving the flexibility of data deployment and use and the landing of trusted sealing technology.
    Type: Grant
    Filed: May 30, 2023
    Date of Patent: June 25, 2024
    Assignee: Nanhu laboratory
    Inventor: Lei Zhang
  • Patent number: 12015612
    Abstract: In one embodiment, a charm application enables user devices to communicate via physical charms. Upon receiving, from a first user device, a read request that is associated with the physical charm, the charm application identifies a message and an authorization list that are associated with the physical charm and previously received from a second user device. The charm application then determines whether a first user associated with the first user device is authorized to read the message based on the authorization list. If the first user is authorized to read the message, then the charm application transmits the message to the first user device. Notably, each physical charm may be exchanged between any number of users, but only read by authorized users via a user device. Accordingly, user devices may communicate private messages including any type of data with other user devices irrespective of whether technical infrastructures are accessible.
    Type: Grant
    Filed: August 25, 2017
    Date of Patent: June 18, 2024
    Assignee: DISNEY ENTERPRISES, INC.
    Inventors: Michael Goslin, Larra Paolilli, Katherine M. Bassett, Janice Rosenthal
  • Patent number: 12010237
    Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.
    Type: Grant
    Filed: January 25, 2022
    Date of Patent: June 11, 2024
    Assignee: QPQ Ltd.
    Inventors: Emanuele Ragnoli, Roberto Ripamonti
  • Patent number: 12003497
    Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: June 4, 2024
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Luis Albisu, Manuel Ortiz, Jr., Daniel Solero, Michael Maglione, Katie Alvarez
  • Patent number: 11997076
    Abstract: A system includes an intelligent electronic device (IED) configured to perform operations that include receiving a first user input and deriving a first connectivity association key (CAK) based on the first user input. The system also includes a gateway configured to perform operations that include receiving a second user input, deriving a second CAK based on the second user input, identifying the first CAK of the IED, establishing an adoption link with the IED based on a match between the first CAK and the second CAK, generating a third CAK, and distributing a copy of the third CAK to the IED via the adoption link to establish a MKA connectivity association with the IED.
    Type: Grant
    Filed: August 25, 2020
    Date of Patent: May 28, 2024
    Assignee: Schweitzer Engineering Laboratories, Inc.
    Inventors: Colin Gordon, John W. Knapek
  • Patent number: 11995158
    Abstract: Techniques are provided herein for tracking activation events associated with a given serial number and using the data from the activation events to autonomously determine whether the serial number has been leaked. Numerous different characteristic parameters of activation events collected over a given time period for a serial number can be tracked and stored in a database. A plurality of different input variables can be generated based on the characteristic parameter data, which create the inputs that are used by a trained neural network to determine the leakage probability. If the leakage probability is determined to be above a certain threshold, an alert of some kind can be generated to indicate that the serial number has been leaked.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: May 28, 2024
    Assignee: Adobe Inc.
    Inventors: Sachin Goyal, Harsh Agarwal, Cyril Thomas
  • Patent number: 11997080
    Abstract: A method for validating a Uniform Resource Locator (URL) includes generating electronic media content including the URL, generating a Certificate Signing Request (CSR) including the URL, sending the CSR to a certificate signing server, receiving a signed certificate corresponding to the CSR from the certificate signing server, and encoding the signed certificate as metadata in the electronic media content and/or encoding a serial number associated with the signed certificate as metadata in the electronic media content. A user can send the URL to another user through a chat message, an email, a word processing document or other business application, or a document which has a URL through a pen drive, email, or chat message. The certificate-based mechanism is used to validate the origin (sender) of the URL so that the recipients know that the URL can be accessed without having to separately analyze the security risks.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: May 28, 2024
    Assignee: Citrix Systems, Inc.
    Inventors: Praveen Raja Dhanabalan, Krishna Kumar KB
  • Patent number: 11991285
    Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.
    Type: Grant
    Filed: January 12, 2023
    Date of Patent: May 21, 2024
    Assignee: Koninklijke Philips N.V.
    Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce