Patents Examined by Lynn D. Feild
-
Patent number: 11868465Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: GrantFiled: October 25, 2021Date of Patent: January 9, 2024Assignee: Blackberry LimitedInventors: Adam John Boulton, Benjamin John Godwood
-
Patent number: 11868853Abstract: An input unit receives an input of data, as learning purpose data and determination target data, in which requests made to a server by a user are represented in a time series. Then, a shaping unit shapes the received data. A classifying unit classifies the shaped data for each user who made the requests. Then, a learning unit extracts, from the classified learning purpose data, consecutive n requests as feature values of the learning purpose data, performs learning by using the feature values of the learning purpose data, and creates a profile for each user. A determination unit extracts, from the classified determination target data, consecutive n requests as feature values of the determination target data and performs determination of the determination target data based on the feature values of the determination target data and based on the profiles created by the learning unit.Type: GrantFiled: January 19, 2017Date of Patent: January 9, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Shingo Orihara, Masaki Tanikawa, Tohru Sato, Yuta Iwaki
-
Patent number: 11863678Abstract: A permissioned blockchain, using off-chain storage, provides advantages over blockchains that rely on consensus and/or store information within the blockchain. Advantages include enhanced viability, compactness, and the ability to register material with distribution limitations (e.g., military classified). Examples create an immutable public record of data signatures that confirm when data is intact, without distributing the data itself, so that widespread availability of the blockchain (beyond those privileged to see the data) advantageously increases the size of the community that is able to detect spoofing or forgery attempts. A permissioning entity limits submissions to manage blockchain growth, foreclosing problematic material that may risk long-term viability.Type: GrantFiled: December 31, 2020Date of Patent: January 2, 2024Assignee: Tenet 3, LLCInventors: Kelce S. Wilson, Jeff A. Hughes, Tyler J. Moody, Derek E. Doran, Gary R. Tuttle, Joel B. Rieman
-
Patent number: 11863679Abstract: A permissioned blockchain, using off-chain storage, provides advantages over blockchains that rely on consensus and/or store information within the blockchain. Advantages include enhanced viability, compactness, and the ability to register material with distribution limitations (e.g., military classified). Examples create an immutable public record of data signatures that confirm when data is intact, without distributing the data itself, so that widespread availability of the blockchain (beyond those privileged to see the data) advantageously increases the size of the community that is able to detect spoofing or forgery attempts. A permissioning entity limits submissions to manage blockchain growth, foreclosing problematic material that may risk long-term viability.Type: GrantFiled: December 31, 2020Date of Patent: January 2, 2024Assignee: Tenet 3, LLCInventors: Kelce S. Wilson, Jeff A. Hughes, Tyler J. Moody, Derek E. Doran, Gary R. Tuttle, Joel B. Rieman
-
Patent number: 11863566Abstract: Aspects of the disclosure relate to dynamic message analysis using machine learning. A computing platform may monitor a messaging server associated with an enterprise organization. Based on monitoring the messaging server, the computing platform may identify bi-directional messaging traffic between enterprise domains associated with the enterprise organization and external domains not associated with the enterprise organization. Based on identifying the bi-directional messaging traffic, the computing platform may select external domains for a conversation detection process. The computing platform may compute an initial set of rank-ordered external domains by: determining, based on a number of messages sent to and received from each enterprise domain/external domain pair, weighted difference values and ranking the plurality of external domains selected for the conversation detection process based the weighted difference values.Type: GrantFiled: September 10, 2020Date of Patent: January 2, 2024Assignee: Proofpoint, Inc.Inventor: J. Trent Adams
-
Patent number: 11863680Abstract: A permissioned blockchain, using off-chain storage, provides advantages over blockchains that rely on consensus and/or store information within the blockchain. Advantages include enhanced viability, compactness, and the ability to register material with distribution limitations (e.g., military classified). Examples create an immutable public record of data signatures that confirm when data is intact, without distributing the data itself, so that widespread availability of the blockchain (beyond those privileged to see the data) advantageously increases the size of the community that is able to detect spoofing or forgery attempts. A permissioning entity limits submissions to manage blockchain growth, foreclosing problematic material that may risk long-term viability.Type: GrantFiled: December 31, 2020Date of Patent: January 2, 2024Assignee: Tenet 3 LLCInventors: Kelce S. Wilson, Jeff A. Hughes, Tyler J. Moody, Derek E. Doran, Gary R. Tuttle, Joel B. Rieman
-
Patent number: 11861031Abstract: Systems and methods are disclosed for using a distributed ledger interface system to facilitate background verification of an individual. One method may include, sending, by a server to a first device associated with a first organization, an indication that an individual is ending the membership to the first organization; unlocking access to an individual-specific data structure in a distributed ledger, wherein the individual-specific data structure allows storage of a plurality of data values corresponding to a plurality of background aspects of the individual, and wherein the distributed ledger is shared within a plurality of nodes within a network; providing, to a user device associated with the individual, a digital key to allow permission to access the individual-specific data structure; and granting, to a second computing device associated with a second organization, and based on a permission received from the user device, access to the individual-specific data structure.Type: GrantFiled: June 15, 2020Date of Patent: January 2, 2024Assignee: Allstate Solutions Private LimitedInventors: Anupam Adhikari, Rohit Basuri
-
Patent number: 11847938Abstract: Various embodiments relate to a method for multiplying a first and a second polynomial in a ring q [X]/(Xn+1) where q is a positive integer.Type: GrantFiled: August 3, 2021Date of Patent: December 19, 2023Assignee: NXP B.V.Inventors: Joost Roland Renes, Joppe Willem Bos, Christine van Vredendaal, Tobias Schneider
-
Patent number: 11842072Abstract: The present disclosure provides a distributed storage method, a computer device, and a storage medium. The method includes: grouping a file to be stored to form a plurality of data packets; dividing all the data packets into at least three data fragments, in which, each data fragment includes a part of the plurality of data packets, and each data packet is added to at least two data fragments; storing each data fragment in a distributed storage node to perform distributed storage; recording a corresponding relationship between the data fragments and the data packets and a corresponding relationship between storage nodes and the data fragments; and deleting the file to be stored in local.Type: GrantFiled: January 18, 2019Date of Patent: December 12, 2023Assignee: BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD.Inventor: Bo Jing
-
Patent number: 11843622Abstract: Techniques are described for providing users of a data intake and query system with pre-trained ML models capable of identifying malicious threats (e.g., malware, botnets, ransomware, etc.) in users' computing environments based on an analysis of Domain Name System (DNS) log data collected from DNS servers in users' environments. DNS log data is ingested by a data intake and query system and processed to obtain searchable timestamped event data. This event data can then be used as input to ML models provided by a security ML application described herein to detect potential occurrences of malicious activity within users' computing environments.Type: GrantFiled: October 16, 2020Date of Patent: December 12, 2023Assignee: Splunk Inc.Inventors: Anthony G Tellez, Philipp Drieger
-
Patent number: 11831417Abstract: Various embodiments provide novel tools and techniques for a threat mapping engine. A system includes a vertex discovery harvester subsystem, an edge extractor subsystem, a vertex correlator subsystem, and a recursive graph builder subsystem. The recursive graph builder subsystem includes a processor, and a computer readable medium in communication with the processor, the computer readable medium having encoded thereon a set of instructions executable by the processor to generate a map of one or more connections from the first known vertex to at least one related vertex of the one or more vertices via at least one edge, based on the one or more vertex correlations, determine a threat score indicative of a threat posed by at least one related vertex of the map, and generate a threat graph based on the map and the threat score of the at least one related vertex layered over the map.Type: GrantFiled: November 12, 2020Date of Patent: November 28, 2023Assignee: Focus IP Inc.Inventors: Faisal Shah, David Montz
-
Patent number: 11831772Abstract: Provided by embodiments of the present application is a blockchain multi-party shared-governance-based system for maintaining domain name information, wherein a Root blockchain is formed by first network nodes where respective top-level domain registries are located, and domain name operation information needs to be confirmed by authoritative nodes among the first network nodes after a consensus process. Since the authoritative node is generated by means of voting by each first network node, each network node in the Root blockchain in the system participates in the consensus process for the domain name operation information. Through such a decentralized method for maintaining domain name information, the final state will not be affected by a mistake or an attack on one network node, resulting in higher security and better stability of the entire system compared to the centralized maintenance method.Type: GrantFiled: February 28, 2019Date of Patent: November 28, 2023Assignee: CHINA INTERNET NETWORK INFORMATION CENTERInventors: Yu Zeng, Hongtao Li, Anlei Hu, Zhiwei Yan, Yanfeng Wang, Douxuan Nan
-
Patent number: 11822642Abstract: A method and apparatus for executing code in a container are described. In one embodiment, the method comprises generating code on a host computer system using a user interface; and executing the code inside a container on the host computer system, including performing access control based on one or more properties of the host computer system.Type: GrantFiled: October 29, 2020Date of Patent: November 21, 2023Assignee: STRIPE, INC.Inventors: Karla Burnett, Andrew Reitz, Yasha Mostofi-Ashtiani, Jason Shantz, Justin Sippel, Andrew Dunham, Shawn Moore, Adam Zev Sorkin
-
Patent number: 11822676Abstract: Example methods are provided to for automated determination of a minimal set of privileges that are required to execute a workflow in a virtualized computing environment. While the workflow is being executed, interactions with a user interface are recorded. The interactions include application program interface (API) calls. The method identifies the privileges that are used to execute the API calls, and the identified privileges are combined to form the minimal set of privileges. A model is generated that associates the minimal set of privileges to the workflow, and the model is applied to determine the privileges to assign to users that will be performing the same workflow.Type: GrantFiled: June 25, 2019Date of Patent: November 21, 2023Assignee: VMWARE, INC.Inventors: Martin Marinov, Branislav Abadzhimarinov, Miroslava Dimitrova Markova
-
Patent number: 11811954Abstract: Technologies are provided for clockless physically unclonable functions (PUFs) in reconfigurable devices. Embodiments of the disclosed technologies include processing circuitry configured to perform numerous operations. The operations can include receiving a challenge continuous pulse signal, and generating a response continuous pulse signal by iteratively extending the challenge continuous pulse signal in time-domain. In some configurations, the iteratively extending includes generating a next continuous pulse signal by operating on a prior continuous pulse signal according to a stretching function, and generating a second next continuous pulse width signal by operating on the next continuous pulse signal according to a folding function.Type: GrantFiled: January 10, 2022Date of Patent: November 7, 2023Assignee: Kratos SRE, Inc.Inventor: Seth D. Cohen
-
Patent number: 11811802Abstract: A security threat detection system is used to monitor the physical resource usage of a hosted application in a PaaS service in order to detect anomalous behavior indicative of a security threat. The system analyzes the historical usage of the application's physical resources in order to determine the normal range of consumption of a resource by the application. A security threat alert is then provided when the application's resource consumption exceeds the normal range of consumption.Type: GrantFiled: August 21, 2020Date of Patent: November 7, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Benyamin Farshteindiker, Assaf Israel, Tomer Weinberger
-
Patent number: 11805094Abstract: Some embodiments provide a method for securing communication of data messages of a particular machine that includes a dynamic first level address. The method identifies a fixed second level address for a particular data. The fixed second level address is associated with an interface of the particular machine. Based on the fixed second level address, the method identifies a set of security policies for securing the communication of the particular data message. The method applies the set of security policies to the particular data message.Type: GrantFiled: November 14, 2019Date of Patent: October 31, 2023Assignee: NICIRA, INC.Inventor: Akshay Kumar Sreeramoju
-
Patent number: 11804965Abstract: Methods, apparatus, and processor-readable storage media for connecting configuration services using blockchain technology are provided herein. An example computer-implemented method includes obtaining at least one user request comprising configuration-related data pertaining to at least one item of hardware and at least one user network; encrypting at least a portion of the configuration-related data using one or more cryptographic hash functions; storing copies of the encrypted configuration-related data across multiple nodes within at least one distributed blockchain technology-based cloud storage system; and performing one or more automated actions, in connection with the at least one user request, using at least a portion of the stored data within the at least one distributed blockchain technology-based cloud storage system.Type: GrantFiled: April 14, 2021Date of Patent: October 31, 2023Assignee: EMC IP Holding Company LLCInventors: Ashish Kumar Palo, Sathish Kumar Bikumala
-
Patent number: 11805418Abstract: Methods, systems and computer readable media for location-based endpoint security are described.Type: GrantFiled: September 12, 2019Date of Patent: October 31, 2023Assignee: Sophos LimitedInventors: Anil Kaushik, Sathwikh Gopady Narasimha
-
Patent number: 11798435Abstract: A method for executing a cryptographic operation is provided comprising acts comprising: (i) sampling a first polynomial, wherein one or more (e.g., one, some and/or all) coefficients of the first polynomial are determined; (ii) sampling a second polynomial, wherein a selection of k coefficients of the second polynomial is determined; (iii) multiplying the first polynomial with the second polynomial to determine a result; and (iv) using the result of the multiplication in the cryptographic operation. A security device arranged to perform one, some and/or all of the acts is provided.Type: GrantFiled: September 12, 2019Date of Patent: October 24, 2023Assignee: Infineon Technologies AGInventor: Thomas Poeppelmann