Patents Examined by Luu T Pham
  • Patent number: 12010237
    Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.
    Type: Grant
    Filed: January 25, 2022
    Date of Patent: June 11, 2024
    Assignee: QPQ Ltd.
    Inventors: Emanuele Ragnoli, Roberto Ripamonti
  • Patent number: 12003497
    Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: June 4, 2024
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Luis Albisu, Manuel Ortiz, Jr., Daniel Solero, Michael Maglione, Katie Alvarez
  • Patent number: 11997076
    Abstract: A system includes an intelligent electronic device (IED) configured to perform operations that include receiving a first user input and deriving a first connectivity association key (CAK) based on the first user input. The system also includes a gateway configured to perform operations that include receiving a second user input, deriving a second CAK based on the second user input, identifying the first CAK of the IED, establishing an adoption link with the IED based on a match between the first CAK and the second CAK, generating a third CAK, and distributing a copy of the third CAK to the IED via the adoption link to establish a MKA connectivity association with the IED.
    Type: Grant
    Filed: August 25, 2020
    Date of Patent: May 28, 2024
    Assignee: Schweitzer Engineering Laboratories, Inc.
    Inventors: Colin Gordon, John W. Knapek
  • Patent number: 11995158
    Abstract: Techniques are provided herein for tracking activation events associated with a given serial number and using the data from the activation events to autonomously determine whether the serial number has been leaked. Numerous different characteristic parameters of activation events collected over a given time period for a serial number can be tracked and stored in a database. A plurality of different input variables can be generated based on the characteristic parameter data, which create the inputs that are used by a trained neural network to determine the leakage probability. If the leakage probability is determined to be above a certain threshold, an alert of some kind can be generated to indicate that the serial number has been leaked.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: May 28, 2024
    Assignee: Adobe Inc.
    Inventors: Sachin Goyal, Harsh Agarwal, Cyril Thomas
  • Patent number: 11997080
    Abstract: A method for validating a Uniform Resource Locator (URL) includes generating electronic media content including the URL, generating a Certificate Signing Request (CSR) including the URL, sending the CSR to a certificate signing server, receiving a signed certificate corresponding to the CSR from the certificate signing server, and encoding the signed certificate as metadata in the electronic media content and/or encoding a serial number associated with the signed certificate as metadata in the electronic media content. A user can send the URL to another user through a chat message, an email, a word processing document or other business application, or a document which has a URL through a pen drive, email, or chat message. The certificate-based mechanism is used to validate the origin (sender) of the URL so that the recipients know that the URL can be accessed without having to separately analyze the security risks.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: May 28, 2024
    Assignee: Citrix Systems, Inc.
    Inventors: Praveen Raja Dhanabalan, Krishna Kumar KB
  • Patent number: 11991298
    Abstract: A method of executing an instance of a smart contract through a blockchain shared among a plurality of nodes including the following first step of serializing in the blockchain of the instance of the smart contract, and the following steps in cyclical succession: a second step of serializing a plurality of status files each containing a state defined only by internal variables of the instance at an end of a respective plurality of executions of the instance, the plurality of status files are temporally ordered according to the respective plurality of executions of the instance, a third step of deserializing in a RAM of a last state of the instance by deserializing at least one last state file from the blockchain, and a fourth step of deserializing the instance by valuing a second state of the instance as a last state, a fifth step including further execution of the instance.
    Type: Grant
    Filed: June 15, 2020
    Date of Patent: May 21, 2024
    Assignee: AILIA SA
    Inventors: Fausto Spoto, Iris Dimni, Francesco Pasetto, Giovanni Antino
  • Patent number: 11991285
    Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.
    Type: Grant
    Filed: January 12, 2023
    Date of Patent: May 21, 2024
    Assignee: Koninklijke Philips N.V.
    Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
  • Patent number: 11985134
    Abstract: Systems, computer program products, and methods are described herein for implementing an enhanced authentication framework using Erasable Programmable Read-Only Memory (EPROM) grid pattern recognition.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: May 14, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Sandeep Kumar Chauhan, Shailendra Singh, Santosh Kumar Miryala, Ramarao Gaddam
  • Patent number: 11985128
    Abstract: Embodiments of the present invention provide computer-implemented methods, computer program products and computer systems. Embodiments of the present invention can monitor user activity for one or more user interactions performed while connected to a Virtual Private Network. Embodiments of the present invention can then identify potential risks associated with a user and respective user interactions. Embodiments of the present invention can then, in response to determining a respective user interaction of the one or more interactions is suspicious, generate a real time risk score for the respective user interaction. Embodiments of the present invention can then, in response to the generate real time risk score exceeding a threshold level of risk for the respective user interaction, initiate a secondary authentication protocol.
    Type: Grant
    Filed: August 19, 2021
    Date of Patent: May 14, 2024
    Assignee: International Business Machines Corporation
    Inventors: Jacob Thomas Covell, Thomas Jefferson Sandridge, Alvin Zhang, Robert Huntington Grant
  • Patent number: 11985132
    Abstract: A method of providing continuous user authentication for resource access control includes launching a continuous authentication service at a boot time of a first device, wherein the first device includes a processor, a memory, and one or more sensors configured to collect authentication information. Additionally, the method includes receiving authentication information comprising one or more of explicit authentication information or implicit authentication information, and receiving a request for access to a resource of the first device. Further, the method includes the operations of determining, by the continuous authentication service, a current value of a security state, the current value of the security state based in part on a time interval between a receipt time of the authentication information and a current time and controlling access to the resource based on the current value of the security state.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: May 14, 2024
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Haining Chen, Xun Chen, Khaled ElWazeer, Ahmed M. Azab, David Thomson, Ruowen Wang, Wei Yang, Peng Ning
  • Patent number: 11985167
    Abstract: A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container running on a target client device associated with the user and having a managed cache storing content managed by or through the server computer may, in response to the remote wipe message or notification, deleting the managed content or a portion thereof from its managed cache. The managed container may send back an acknowledgement or message to the server computer that it had completed the remote wipe. The remote wipe functionality can avoid having to deal with individual applications running on the client device and therefore can eliminate the complexity of having to deal with individual applications. Furthermore, the remote wipe can be done independently of the local operating system and without affecting non-managed information/applications on the client device.
    Type: Grant
    Filed: August 2, 2021
    Date of Patent: May 14, 2024
    Assignee: OPEN TEXT SA ULC
    Inventors: Gregory Beckman, Robert Laird, Alain Gagne
  • Patent number: 11985162
    Abstract: A computer method and system for determining patterns in network traffic packets having structured subfields for generating filter candidate regular expressions for DDoS attack mitigation. Stored packets are analyzed to extract a query name for each stored packet. Each query name is segregated into subfields. A Results-table is generated utilizing the segregated subfields of the query names. A Field-length table is generated that contains the length of the Field Values (Field-length) for each Field Name and an associated counter indicating how many instances the Field-length for a Field Name is present in the extracted query names. The Field-length table is analyzed to determine patterns of equal length in the “Results” table. Utilizing the Patterns table, unique combinations of the Field Values are generated as a filter candidate regular expression for DDoS attack mitigation purposes.
    Type: Grant
    Filed: February 23, 2022
    Date of Patent: May 14, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventor: Steinthor Bjarnason
  • Patent number: 11977653
    Abstract: A computer implemented method for securing at least one of files and records related to a specific process, the method comprising obtaining interaction data comprising one or more persons and one or more files and/or records, said interaction data comprises a process interaction score between at least one user and the specific process; identifying, from the interaction data, one or more persons and one or more files and/or records related to the specific process; comparing a process threshold with a process interaction score between a target user and the specific process; and in response to the comparison satisfying a rule, performing a security operation on the one or more files and/or records related to the specific process.
    Type: Grant
    Filed: March 7, 2022
    Date of Patent: May 7, 2024
    Assignee: RECOLABS LTD.
    Inventors: Tal Shapira, Eyal Asulin, Dorin Shmaryahu, Gilad Wisney, Gal Bezalel, Nir Weingarten
  • Patent number: 11979405
    Abstract: Disclosed is a method for processing network resource access requests. The method comprises: receiving a resource access request and acquiring resource access request information; extracting user information and target resource information from the resource access request information, and requiring to establish a corresponding access mediator instance according to the user information and the target resource information; establishing the access mediator instance; and initiating an access to a target resource correspondingly by using the access mediator instance according to the resource access request information received by the access mediator instance. The network security is improved greatly.
    Type: Grant
    Filed: January 28, 2022
    Date of Patent: May 7, 2024
    Assignee: Hangzhou Jindoutengyun Technologies Co., Ltd.
    Inventor: Yang Yang
  • Patent number: 11979395
    Abstract: Systems, methods, and computer media for securing software applications are provided herein. Through an enhanced authentication token, an application session request can be deceptively authenticated. When a malicious session request is detected, an enhanced authentication token can be generated that appears to successfully authenticate the session but contains information indicating that the session is malicious. The attacker believes that the session has been authenticated, but the information in the token indicating that the session is malicious causes an application clone session to be established instead of an actual application session. The clone session appears to be an actual application session but protects the valid user's account by including fake data instead of the user's actual data.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: May 7, 2024
    Assignee: SAP SE
    Inventors: Cedric Hebert, Anderson Santana de Oliveira, Merve Sahin
  • Patent number: 11973881
    Abstract: A method for electronically signing contracts between at least a first and a second parties, the method including a first party accessing second party's website and fills in an on-line form with party personal data which is sent to a second party's server. The method of the inventions solves the problem of signing contracts between two parties, hence the object of the present invention is a computer implemented method that deals with the issue of protection against unauthorised use of data from within the employees of TTP companies and we present a solution in which a TTP company can certify the validity of a contract without having access to its content. In this way, the TTP minimizes the information it has access to and reduces the risks derived from such knowledge, like an eventual data leakage caused by some dishonest TTP employee.
    Type: Grant
    Filed: June 2, 2020
    Date of Patent: April 30, 2024
    Assignee: LLEIDANETWORKS SERVEIS TELEMÀTICS, S.A.
    Inventors: Francisco Jose Sapena Soler, Carolina Sola
  • Patent number: 11966468
    Abstract: Examples are disclosed for detecting synthetic online entities that may be used for fraudulent purposes or other purposes. In some aspects, a computing system can generate a data structure that includes nodes and links between the nodes. The nodes can represent online entities and the links can represent geographic associations or transactional associations between pairs of online entities. These associations can be identified from electronic transactions involving the online entities. The computing system can determine, from the links between the nodes, that a degree of connectivity among a subset of the nodes exceeds a threshold connectivity. The degree of connectivity indicates electronic communications involving online entities represented by the subset of the nodes. The computing system can transmit, based on the degree of connectivity exceeding the threshold connectivity, an alert indicating a potential synthetic entity (e.g., potentially fraudulent activity) within the subset of the nodes.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: April 23, 2024
    Assignee: Equifax Inc.
    Inventors: Stephen Leitner, Mark Burgess, Keith Manthey, Steven Hicklin
  • Patent number: 11968316
    Abstract: A system for enhanced public key infrastructure is provided. The system includes a computer device. The computer device is programmed to receive a digital certificate including a composite signature field including a plurality of signatures. The plurality of signatures include at least a first signature and a second signature. The computer device is also programmed to retrieve, from the digital certificate, a first key associated with the first signature from the digital certificate. The computer device is further programmed to retrieve the first signature from the composite signature field. In addition, the at least one computer device is programmed to validate the first signature using the first key.
    Type: Grant
    Filed: January 9, 2023
    Date of Patent: April 23, 2024
    Assignee: Cable Television Laboratories, Inc.
    Inventor: Massimiliano Pala
  • Patent number: 11968202
    Abstract: A method of authenticating a user to a computer in an adverse environment includes receiving the user's password in a trusted user device, such as by the user typing the password, and encoding a keyword with a hash of the entered password to create an encoded keyword. The encoded keyword is sent from the trusted user device to the computer using a physical communication channel perceivable by the user; and the encoded keyword is compared in the computer with a keyword encoded with a known hash of the user's password in the computer to authenticate the user.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: April 23, 2024
    Assignee: Avast Software s.r.o.
    Inventors: Karel Fuka, Vojt{hacek over (e)}ch Tůma
  • Patent number: 11962596
    Abstract: A device configured to receive a connection request that includes device authentication credentials and to determine the user device passes authentication in response to identifying a device profile associated with the device authentication credentials. The device is further configured to receive user credentials for a first user and identify a first user identity that corresponds with the user credentials. The device is further configured to establish a first network connection with the user device, to send a token request to the user device, and to receive a token via the first network connection. The device is further configured to identify a second user identity based on the token, to determine the first user identifier matches the second user identifier, and to establish a second network connection for the user device, wherein the network connection enables the user device to access the network.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: April 16, 2024
    Assignee: Bank of America Corporation
    Inventors: Shardul Vasudev Joshi, Abhishek Palahalli Manjunath