Patents Examined by Lynn D. Feild
  • Patent number: 11587177
    Abstract: Methods, devices, systems and computer program products enable monitoring and responding to cyber security attacks. One such system relates to a consortium of monitoring companies and an infrastructure including one or more central monitoring stations or local handling stations for a monitoring company are provided. A central monitoring station of a monitoring company detects a cyberattack that has been launched against a client computer system, and requests a local station to respond to the cyberattack via onsite visits or requests additional resources from other monitoring companies through the consortium system. The central monitoring station also sends to the consortium system updates on a cyberattack that is detected or mitigated by a central monitoring station or local handling station of the monitoring company. The monitoring consortium enables stronger capabilities than any individual monitoring company can offer by the combination and coordination of the efforts and resources of the members.
    Type: Grant
    Filed: October 21, 2015
    Date of Patent: February 21, 2023
    Assignee: Palantir Technologies Inc.
    Inventors: Shyam Sankar, Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Rick Ducott, Peter Maag, Marissa Kimball
  • Patent number: 11588808
    Abstract: An operating system with automatic login mechanism and an automatic login method are provided. The operating system includes a first electronic device, a second electronic device and a server device. The second electronic device includes a biometric sensor. When a login event of the first electronic is triggered, the first electronic device sends a login request to the second electronic device directly or via the server device, so that the second electronic device performs a biometric verification by the biometric sensor according to the login request. When the biometric verification is passed, the second electronic device sends a first login credential to the first electronic device directly or via the server device, so that the first electronic device performs an automatic login operation of the first electronic device according to the first login credential.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: February 21, 2023
    Assignee: GoTrustID Inc.
    Inventors: Darren Tien-Chi Lee, Minglian Chen, Jeng-Lung Li, Yi-Kai Wang
  • Patent number: 11587050
    Abstract: A server in a blockchain distribution network includes a processor and a transceiver operatively coupled to the processor. The transceiver is configured to receive bytes of a transaction from a first peer node. The transceiver is also configured to propagate the bytes of the transaction to one or more additional peer nodes and to one or more additional servers in the blockchain distribution network. The transceiver is also configured to receive bytes of a blockchain from a second peer node. The blockchain includes information regarding a plurality of transactions, and the plurality of transactions includes the transaction. The transceiver is further configured to propagate the bytes of the blockchain to the one or more additional peer nodes and to the one or more additional servers in the blockchain distribution network.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: February 21, 2023
    Assignee: Northwestern University
    Inventors: Uri Klarman, Aleksandar Kuzmanovic
  • Patent number: 11544416
    Abstract: A system for preventing attacks on at least one computer via its USB port, the system comprising at least one processor configured to monitor at least one aspect of a connection between a peripheral and a computer's USB port, to identify aspects which match pre-configured criteria and responsively, to take action.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: January 3, 2023
    Assignee: CYBER SEPIO SYSTEMS LTD
    Inventors: Yosef Appleboum, Iftah Bratspiess, Bentsi Ben-Atar
  • Patent number: 11526629
    Abstract: The disclosure herein describes a method and a system for providing data privacy based on customized cookie consent. The proposed customized cookie consent system enables user's data privacy by facilitating the user to customize a plurality of features for each individual cookie, wherein a cookie is customized for multiple features that includes a consent and expiry customization, a drill down at individual cookie, an online masking unmasking cookie data—an offline masking-unmasking cookie data, a consent lineage and a data subject rights for cookie data that further include data access, data portability, right to erasure based on machine learning techniques. Further the customized cookie consent system also provides recommendation for data privacy and obscured cookies using machine learning techniques.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: December 13, 2022
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Aishwarya Arun Shinde, Akshay Baban Kamble, Gangadhara Reddy Sirigireddy, Vijayanand Mahadeo Banahatti, Sachin Premsukh Lodha
  • Patent number: 11514193
    Abstract: Embodiments validate the secure assembly and delivery of IHSs (Information Handling Systems) that are installed in a shared chassis, such as two 1RU (rack unit) servers installed in a shared 2RU chassis. An inventory certificate is retrieved that was uploaded to a first IHS of the IHSs installed in the shared chassis during factory provisioning of the first IHS. The inventory certificate specifies factory installed hardware components installed in each of the IHSs of the shared chassis. A validation process of the first IHS collects an inventory of hardware components detected by each of the IHSs of the shared chassis. The validation process compares the collected inventory of detected hardware components of the IHSs against the factory installed hardware components specified in the inventory certificate in order to validate the detected hardware components as the same hardware components installed during factory assembly of each of the IHSs.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: November 29, 2022
    Assignee: Dell Products, L.P.
    Inventors: Jason Matthew Young, Marshal F. Savage, Mukund P. Khatri
  • Patent number: 11496315
    Abstract: Systems and methods for enhanced hash transforms are disclosed. In particular embodiments, biometric data is concatenated with non-biometric data for generating a fixed-sized vector, and furthermore performing various permutations and projections on the vector. The resulting vector may be stored in a registry, and a corresponding key may be generated and provided to the user associated with the biometric data. The hash transformation may be a lossy process, such that the resulting hash includes less bytes than the initial biometric data, and a hash reversal fails to generate an exact copy of the original biometric data.
    Type: Grant
    Filed: May 8, 2019
    Date of Patent: November 8, 2022
    Assignee: T Stamp Inc.
    Inventors: Gareth Neville Genner, Norman Hoon Thian Poh
  • Patent number: 11487906
    Abstract: According to one or more embodiments of the present invention, a computer implemented method includes enabling, by a secure interface control of a computer system, a non-secure entity of the computer system to access a page of memory shared between the non-secure entity and a secure domain of the computer system based on the page being marked as non-secure with a secure storage protection indicator of the page being clear. The secure interface control can verify that the secure storage protection indicator of the page is clear prior to allowing the non-secure entity to access the page. The secure interface control can provide a secure entity of the secure domain with access to the page absent a check of the secure storage protection indicator of the page.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: November 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Lisa Cranton Heller, Fadi Y. Busaba, Jonathan D. Bradbury
  • Patent number: 11483306
    Abstract: Methods, systems, and apparatuses for secure communications in a communications system through a secure database (SDB) using random numbers including, one-time use random number cipher keys.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: October 25, 2022
    Assignee: Matrics2, Inc.
    Inventors: Michael R. Arneson, William R. Bandy
  • Patent number: 11481486
    Abstract: Examples of the present disclosure describe systems and methods for a behavioral threat detection engine. In examples, the behavioral threat detection engine manages execution of one or more virtual machines, wherein each virtual machine processes a rule in relation to a context. The behavioral threat detection engine uses any of a variety of techniques to identify when events occur. Accordingly, the behavioral threat detection engine provides event indications, in the form of event packets, to one or more virtual machines, such that corresponding rules are able to process the events accordingly. Eventually, a rule may make a determination as to the presence or absence of a behavior. As a result, execution of the associated virtual machine may be halted, thereby indicating to the behavioral threat detection engine that a determination has been made. Thus a behavioral threat detection engine employs a behavior-based approach to detecting malicious or potentially malicious behaviors.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: October 25, 2022
    Assignee: Webroot Inc.
    Inventors: Eric Klonowski, Fred Krenson
  • Patent number: 11470102
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
    Type: Grant
    Filed: November 12, 2018
    Date of Patent: October 11, 2022
    Assignee: Palantir Technologies Inc.
    Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
  • Patent number: 11455378
    Abstract: A computer-implemented method (100) and system (1) for determining a metadata M for securing a controlled digital resource such as computer software using a distributed hash table (13) and a peer-to-peer distributed ledger (14). This is a blockchain such as the Bitcoin blockchain. The method includes determining (110) a data associated with the computer software and determining (120) a first hash value based on the computer software. A second hash value based on the data and the computer software may be determined (130). The method further includes sending 140, over a communications network (5), the data, the first hash value and the second hash value to an entry for storage in a distributed hash table (13). The second hash value may be a key of a key-value pair. The data and the first hash value may be a value in the key-value pair. A metadata (M) that is based on the second hash value may be determined (150) for storage on the peer-to-peer distributed ledger (14).
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: September 27, 2022
    Assignee: nChain Holdings Limited
    Inventors: Craig Steven Wright, Stephane Savanah
  • Patent number: 11429694
    Abstract: Techniques for managing customer license agreements are described. In one embodiment, a user-specified resource metric of a license model and a user-specified limit of the user-specified resource metric are obtained. A request for permission to launch a new compute resource at a computing device of the provider network is obtained from a service within a provider network. The new compute resource having a property that is an amount of the user-specified metric. A determination is made that a launch of the new compute resource would cause the user-specified limit to be exceeded, and the request the request to launch the new compute resource is denied.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: August 30, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Murtaza Chowdhury, Malcom Featonby, Adnan Ijaz, Anup P. Pandya, Anupama Anand, Niti Khadapkar, Ramapulla Reddy Chennuru, Raviprasad Mummidi, Srivasan Ramkumar, Jagruti Patil, Yupeng Zhang
  • Patent number: 11429714
    Abstract: A method of operating a privacy management system for managing personal data includes receiving a first input indicative of a first user activity in accessing personal data stored within a memory element. The method also includes creating an activity model based on the first input. The activity model is indicative of typical activity in accessing personal data stored in the memory element. The method further includes receiving a second input indicative of a second user activity in accessing personal data stored within the memory element. Also, the method includes recognizing, according to the activity model, the second user activity as being anomalous to the typical activity in accessing personal data stored in the memory element. Moreover, the method includes generating, as a result of recognizing the second user activity as being anomalous, a command that causes at least one of the client devices to perform an anomaly corrective action.
    Type: Grant
    Filed: March 12, 2019
    Date of Patent: August 30, 2022
    Assignee: salesforce.com, inc.
    Inventors: Christian Meyer, Chris Lawrence
  • Patent number: 11425559
    Abstract: Embodiments of a data transmission network device and methods of operating the same are disclosed. In one embodiment, the data transmission network device includes an encryption module and an RF transceiver. The encryption module is configured to receive data and encrypt the data so as to generate first encrypted data. The encryption module then encrypts the first encrypted data so as to generate second encrypted data. The RF transceiver is configured to generate an RF signal such that the second encrypted data is modulated onto the RF signal. By providing the double encryption in a single device, the data transmission network device has greater spectral efficiency and is a much more cost-effective solution than what is currently provided in the market. Furthermore, the encryption module can be disabled so that unsecure data can also be transmitted via the data transmission network device.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: August 23, 2022
    Inventors: Claude Church, Patrick L. Geddes
  • Patent number: 11418499
    Abstract: The description relates to password reset security. One example can receive a login request and a password for a cloud-based user account. The example can also retrieve stored authenticated user information associated with the password. The example can further send a notification of the login request to a contact address associated with the cloud-based user account. The notification can contain at least some of the stored authenticated user information.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: August 16, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Liqiang Zhu, Yi Zeng, Yu Huang
  • Patent number: 11411915
    Abstract: A network device configured to communicate with a network executes a security protocol. The security protocol establishes a secure session with a security peer network device, exchanges security protected traffic with the security peer network device over a secure link, detects whether there is a security failure in the secure session, and upon detecting a security failure, signals there is a security failure. The network device also executes a routing protocol. The routing protocol maintains a routing table that includes a route to the security peer over the secure link, routes the security protected traffic along the route, and, upon receiving from the security protocol the signal that there is a security failure, removes the route from the routing table to stop the routing.
    Type: Grant
    Filed: January 9, 2019
    Date of Patent: August 9, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Craig Thomas Hill, Stephen Michael Orr
  • Patent number: 11356259
    Abstract: Techniques are described for managing authentication tokens associated with a secure account maintained by a business or organization. In one example, this disclosure describes a method that includes storing interaction information associated with an account maintained by an organization, wherein the interaction information includes information about authentication tokens used during a plurality of prior authentication procedures performed for the account, receiving, over a network, a request to authenticate a user to access the account, determining, based on the stored interaction information, an authentication token to be used to authenticate the user, wherein the authentication token is different than a prior authentication token used during the plurality of prior authentication procedures performed for the account, presenting a prompt for the authentication token; and determining, based on information received in response to the prompt, whether the user is authorized to access the account.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: June 7, 2022
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Joseph Benjamin Agnew, Christopher Robin Sharpe, Daniel S. Sumner, Douglas Innocenti, Joel Gardner, Kevin Potter, Michael J. Martindale, Raymond Creed Lowers, Wesley Donald Duncan, Zoe Tierney, Wendy Davidson
  • Patent number: 11347869
    Abstract: A method is provided. The method is implemented by a secure interface control of a computer that prevents unauthorized accesses to locations in a memory of the computer. The secure interface control determines that a host absolute page is not previously mapped to a virtual page in accordance with securing the host absolute page and a host virtual page is not already mapped to an absolute page in accordance with securing the host absolute page.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: May 31, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Martin Schwidefsky, Heiko Carstens, Jonathan D. Bradbury, Lisa Cranton Heller
  • Patent number: 11347890
    Abstract: Disclosed is a multi-region data center connectivity solution for seamless integration between multi-region data center users and content. The solution supports user pinning (e.g., users and their personal content can be pinned to a particular geographical location/data center); protects personal content (e.g., personal content uploaded by a user is stored in that user's pinned geographical location/data center); and enables data sharing between multi-region data center users in a manner that is seamless and transparent to end users, while respecting user privacy, complying with data sovereignty requirements, and maintaining system anonymity.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: May 31, 2022
    Assignee: OPEN TEXT SA ULC
    Inventors: Gregory Beckman, Ryan Cathal Robert O'Toole, Paul Turner