Patents Examined by Luu T Pham
-
Patent number: 12010237Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.Type: GrantFiled: January 25, 2022Date of Patent: June 11, 2024Assignee: QPQ Ltd.Inventors: Emanuele Ragnoli, Roberto Ripamonti
-
Patent number: 12003497Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.Type: GrantFiled: December 29, 2022Date of Patent: June 4, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Manuel Ortiz, Jr., Daniel Solero, Michael Maglione, Katie Alvarez
-
Patent number: 11997076Abstract: A system includes an intelligent electronic device (IED) configured to perform operations that include receiving a first user input and deriving a first connectivity association key (CAK) based on the first user input. The system also includes a gateway configured to perform operations that include receiving a second user input, deriving a second CAK based on the second user input, identifying the first CAK of the IED, establishing an adoption link with the IED based on a match between the first CAK and the second CAK, generating a third CAK, and distributing a copy of the third CAK to the IED via the adoption link to establish a MKA connectivity association with the IED.Type: GrantFiled: August 25, 2020Date of Patent: May 28, 2024Assignee: Schweitzer Engineering Laboratories, Inc.Inventors: Colin Gordon, John W. Knapek
-
Patent number: 11995158Abstract: Techniques are provided herein for tracking activation events associated with a given serial number and using the data from the activation events to autonomously determine whether the serial number has been leaked. Numerous different characteristic parameters of activation events collected over a given time period for a serial number can be tracked and stored in a database. A plurality of different input variables can be generated based on the characteristic parameter data, which create the inputs that are used by a trained neural network to determine the leakage probability. If the leakage probability is determined to be above a certain threshold, an alert of some kind can be generated to indicate that the serial number has been leaked.Type: GrantFiled: March 5, 2021Date of Patent: May 28, 2024Assignee: Adobe Inc.Inventors: Sachin Goyal, Harsh Agarwal, Cyril Thomas
-
Patent number: 11997080Abstract: A method for validating a Uniform Resource Locator (URL) includes generating electronic media content including the URL, generating a Certificate Signing Request (CSR) including the URL, sending the CSR to a certificate signing server, receiving a signed certificate corresponding to the CSR from the certificate signing server, and encoding the signed certificate as metadata in the electronic media content and/or encoding a serial number associated with the signed certificate as metadata in the electronic media content. A user can send the URL to another user through a chat message, an email, a word processing document or other business application, or a document which has a URL through a pen drive, email, or chat message. The certificate-based mechanism is used to validate the origin (sender) of the URL so that the recipients know that the URL can be accessed without having to separately analyze the security risks.Type: GrantFiled: December 30, 2020Date of Patent: May 28, 2024Assignee: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Krishna Kumar KB
-
Patent number: 11991298Abstract: A method of executing an instance of a smart contract through a blockchain shared among a plurality of nodes including the following first step of serializing in the blockchain of the instance of the smart contract, and the following steps in cyclical succession: a second step of serializing a plurality of status files each containing a state defined only by internal variables of the instance at an end of a respective plurality of executions of the instance, the plurality of status files are temporally ordered according to the respective plurality of executions of the instance, a third step of deserializing in a RAM of a last state of the instance by deserializing at least one last state file from the blockchain, and a fourth step of deserializing the instance by valuing a second state of the instance as a last state, a fifth step including further execution of the instance.Type: GrantFiled: June 15, 2020Date of Patent: May 21, 2024Assignee: AILIA SAInventors: Fausto Spoto, Iris Dimni, Francesco Pasetto, Giovanni Antino
-
Patent number: 11991285Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: January 12, 2023Date of Patent: May 21, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Patent number: 11985134Abstract: Systems, computer program products, and methods are described herein for implementing an enhanced authentication framework using Erasable Programmable Read-Only Memory (EPROM) grid pattern recognition.Type: GrantFiled: February 1, 2021Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Sandeep Kumar Chauhan, Shailendra Singh, Santosh Kumar Miryala, Ramarao Gaddam
-
Patent number: 11985128Abstract: Embodiments of the present invention provide computer-implemented methods, computer program products and computer systems. Embodiments of the present invention can monitor user activity for one or more user interactions performed while connected to a Virtual Private Network. Embodiments of the present invention can then identify potential risks associated with a user and respective user interactions. Embodiments of the present invention can then, in response to determining a respective user interaction of the one or more interactions is suspicious, generate a real time risk score for the respective user interaction. Embodiments of the present invention can then, in response to the generate real time risk score exceeding a threshold level of risk for the respective user interaction, initiate a secondary authentication protocol.Type: GrantFiled: August 19, 2021Date of Patent: May 14, 2024Assignee: International Business Machines CorporationInventors: Jacob Thomas Covell, Thomas Jefferson Sandridge, Alvin Zhang, Robert Huntington Grant
-
Patent number: 11985132Abstract: A method of providing continuous user authentication for resource access control includes launching a continuous authentication service at a boot time of a first device, wherein the first device includes a processor, a memory, and one or more sensors configured to collect authentication information. Additionally, the method includes receiving authentication information comprising one or more of explicit authentication information or implicit authentication information, and receiving a request for access to a resource of the first device. Further, the method includes the operations of determining, by the continuous authentication service, a current value of a security state, the current value of the security state based in part on a time interval between a receipt time of the authentication information and a current time and controlling access to the resource based on the current value of the security state.Type: GrantFiled: April 30, 2019Date of Patent: May 14, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Haining Chen, Xun Chen, Khaled ElWazeer, Ahmed M. Azab, David Thomson, Ruowen Wang, Wei Yang, Peng Ning
-
Patent number: 11985167Abstract: A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container running on a target client device associated with the user and having a managed cache storing content managed by or through the server computer may, in response to the remote wipe message or notification, deleting the managed content or a portion thereof from its managed cache. The managed container may send back an acknowledgement or message to the server computer that it had completed the remote wipe. The remote wipe functionality can avoid having to deal with individual applications running on the client device and therefore can eliminate the complexity of having to deal with individual applications. Furthermore, the remote wipe can be done independently of the local operating system and without affecting non-managed information/applications on the client device.Type: GrantFiled: August 2, 2021Date of Patent: May 14, 2024Assignee: OPEN TEXT SA ULCInventors: Gregory Beckman, Robert Laird, Alain Gagne
-
Patent number: 11985162Abstract: A computer method and system for determining patterns in network traffic packets having structured subfields for generating filter candidate regular expressions for DDoS attack mitigation. Stored packets are analyzed to extract a query name for each stored packet. Each query name is segregated into subfields. A Results-table is generated utilizing the segregated subfields of the query names. A Field-length table is generated that contains the length of the Field Values (Field-length) for each Field Name and an associated counter indicating how many instances the Field-length for a Field Name is present in the extracted query names. The Field-length table is analyzed to determine patterns of equal length in the “Results” table. Utilizing the Patterns table, unique combinations of the Field Values are generated as a filter candidate regular expression for DDoS attack mitigation purposes.Type: GrantFiled: February 23, 2022Date of Patent: May 14, 2024Assignee: ARBOR NETWORKS, INC.Inventor: Steinthor Bjarnason
-
Patent number: 11977653Abstract: A computer implemented method for securing at least one of files and records related to a specific process, the method comprising obtaining interaction data comprising one or more persons and one or more files and/or records, said interaction data comprises a process interaction score between at least one user and the specific process; identifying, from the interaction data, one or more persons and one or more files and/or records related to the specific process; comparing a process threshold with a process interaction score between a target user and the specific process; and in response to the comparison satisfying a rule, performing a security operation on the one or more files and/or records related to the specific process.Type: GrantFiled: March 7, 2022Date of Patent: May 7, 2024Assignee: RECOLABS LTD.Inventors: Tal Shapira, Eyal Asulin, Dorin Shmaryahu, Gilad Wisney, Gal Bezalel, Nir Weingarten
-
Patent number: 11979405Abstract: Disclosed is a method for processing network resource access requests. The method comprises: receiving a resource access request and acquiring resource access request information; extracting user information and target resource information from the resource access request information, and requiring to establish a corresponding access mediator instance according to the user information and the target resource information; establishing the access mediator instance; and initiating an access to a target resource correspondingly by using the access mediator instance according to the resource access request information received by the access mediator instance. The network security is improved greatly.Type: GrantFiled: January 28, 2022Date of Patent: May 7, 2024Assignee: Hangzhou Jindoutengyun Technologies Co., Ltd.Inventor: Yang Yang
-
Patent number: 11979395Abstract: Systems, methods, and computer media for securing software applications are provided herein. Through an enhanced authentication token, an application session request can be deceptively authenticated. When a malicious session request is detected, an enhanced authentication token can be generated that appears to successfully authenticate the session but contains information indicating that the session is malicious. The attacker believes that the session has been authenticated, but the information in the token indicating that the session is malicious causes an application clone session to be established instead of an actual application session. The clone session appears to be an actual application session but protects the valid user's account by including fake data instead of the user's actual data.Type: GrantFiled: September 28, 2020Date of Patent: May 7, 2024Assignee: SAP SEInventors: Cedric Hebert, Anderson Santana de Oliveira, Merve Sahin
-
Patent number: 11973881Abstract: A method for electronically signing contracts between at least a first and a second parties, the method including a first party accessing second party's website and fills in an on-line form with party personal data which is sent to a second party's server. The method of the inventions solves the problem of signing contracts between two parties, hence the object of the present invention is a computer implemented method that deals with the issue of protection against unauthorised use of data from within the employees of TTP companies and we present a solution in which a TTP company can certify the validity of a contract without having access to its content. In this way, the TTP minimizes the information it has access to and reduces the risks derived from such knowledge, like an eventual data leakage caused by some dishonest TTP employee.Type: GrantFiled: June 2, 2020Date of Patent: April 30, 2024Assignee: LLEIDANETWORKS SERVEIS TELEMÀTICS, S.A.Inventors: Francisco Jose Sapena Soler, Carolina Sola
-
Patent number: 11966468Abstract: Examples are disclosed for detecting synthetic online entities that may be used for fraudulent purposes or other purposes. In some aspects, a computing system can generate a data structure that includes nodes and links between the nodes. The nodes can represent online entities and the links can represent geographic associations or transactional associations between pairs of online entities. These associations can be identified from electronic transactions involving the online entities. The computing system can determine, from the links between the nodes, that a degree of connectivity among a subset of the nodes exceeds a threshold connectivity. The degree of connectivity indicates electronic communications involving online entities represented by the subset of the nodes. The computing system can transmit, based on the degree of connectivity exceeding the threshold connectivity, an alert indicating a potential synthetic entity (e.g., potentially fraudulent activity) within the subset of the nodes.Type: GrantFiled: March 4, 2021Date of Patent: April 23, 2024Assignee: Equifax Inc.Inventors: Stephen Leitner, Mark Burgess, Keith Manthey, Steven Hicklin
-
Patent number: 11968316Abstract: A system for enhanced public key infrastructure is provided. The system includes a computer device. The computer device is programmed to receive a digital certificate including a composite signature field including a plurality of signatures. The plurality of signatures include at least a first signature and a second signature. The computer device is also programmed to retrieve, from the digital certificate, a first key associated with the first signature from the digital certificate. The computer device is further programmed to retrieve the first signature from the composite signature field. In addition, the at least one computer device is programmed to validate the first signature using the first key.Type: GrantFiled: January 9, 2023Date of Patent: April 23, 2024Assignee: Cable Television Laboratories, Inc.Inventor: Massimiliano Pala
-
Patent number: 11968202Abstract: A method of authenticating a user to a computer in an adverse environment includes receiving the user's password in a trusted user device, such as by the user typing the password, and encoding a keyword with a hash of the entered password to create an encoded keyword. The encoded keyword is sent from the trusted user device to the computer using a physical communication channel perceivable by the user; and the encoded keyword is compared in the computer with a keyword encoded with a known hash of the user's password in the computer to authenticate the user.Type: GrantFiled: May 24, 2019Date of Patent: April 23, 2024Assignee: Avast Software s.r.o.Inventors: Karel Fuka, Vojt{hacek over (e)}ch Tůma
-
Patent number: 11962596Abstract: A device configured to receive a connection request that includes device authentication credentials and to determine the user device passes authentication in response to identifying a device profile associated with the device authentication credentials. The device is further configured to receive user credentials for a first user and identify a first user identity that corresponds with the user credentials. The device is further configured to establish a first network connection with the user device, to send a token request to the user device, and to receive a token via the first network connection. The device is further configured to identify a second user identity based on the token, to determine the first user identifier matches the second user identifier, and to establish a second network connection for the user device, wherein the network connection enables the user device to access the network.Type: GrantFiled: August 4, 2021Date of Patent: April 16, 2024Assignee: Bank of America CorporationInventors: Shardul Vasudev Joshi, Abhishek Palahalli Manjunath