Patents Examined by Madhuri R Herzog
  • Patent number: 11662928
    Abstract: Systems and methods for efficient and secure management of encrypted “snapshots” for a remote provider substrate extension (“PSE”) of a cloud provider network substrate are provided. The PSE may request and obtain a snapshot from the cloud provider network substrate, restore a volume from the snapshot, make changes to data in the restored volume, and/or initiate the creation and storage of a new snapshot that includes incremental updates to the original snapshot to reflect the changes made to data in the volume. An encrypted snapshot stored within the cloud provider network substrate may be decrypted using a cloud provider key designed for internal use only, and then re-encrypted using a PSE-specific key before providing the snapshot to the PSE, thereby avoiding the sharing of the cloud provider internal use only key outside the cloud provider network substrate.
    Type: Grant
    Filed: November 27, 2019
    Date of Patent: May 30, 2023
    Assignee: Amazon Technologies, Inc.
    Inventors: Sandeep Kumar, Marc Stephen Olson
  • Patent number: 11622273
    Abstract: The technology includes a method performed by a security system of a 5G network. The security system is instantiated to sort incoming or outgoing network traffic at a perimeter of the 5G network into one of multiple groups that are each uniquely associated with one of multiple functions or applications and one of multiple security levels. The system can inspect portions of incoming network traffic that contain addressing information required for the network traffic to reach an intended application or function, sorting the incoming network traffic into the groups based in part on the inspection of the portions of the network traffic, and dynamically directing the network traffic for the 5G network based on a particular security level associated with a particular application or a particular function of each of the groups.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: April 4, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11593460
    Abstract: An information processing apparatus connectable with a terminal via a network to manage a license of a package including applications assignable to a device includes circuitry configured to display a first screen for displaying a device list, the license of the package being assignable to and cancellable from the device in response to receiving a first request, receive a selection of a specific device in the device list and any one of an operation of assigning and cancelling the license of the package, assign the license of the package to the selected specific device in response to receiving the selection of the specific device and the operation of assigning the license of the package, and cancel the license of the package from the selected specific device in response to receiving the selection of the specific device and the operation of cancelling the license of the package.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: February 28, 2023
    Assignee: RICOH COMPANY, LTD.
    Inventor: Hiroki Uchibori
  • Patent number: 11568029
    Abstract: A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
    Type: Grant
    Filed: June 9, 2022
    Date of Patent: January 31, 2023
    Assignee: QUICKVAULT, INC.
    Inventor: Steven V. Bacastow
  • Patent number: 11563560
    Abstract: Embodiments of the present application provide a blockchain-based data evidence storage method, a blockchain-based data check method, and relevant apparatuses. The data evidence storage method comprises: performing irreversible encryption on data content of a target file to obtain irreversibly encrypted data of the target file; storing the irreversibly encrypted data in a blockchain and obtaining on-chain evidence storage information of the irreversibly encrypted data; generating a digital watermark of the on-chain evidence storage information; embedding the digital watermark into the target file; and storing the target file embedded with the digital watermark of the on-chain evidence storage information.
    Type: Grant
    Filed: August 3, 2021
    Date of Patent: January 24, 2023
    Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.
    Inventor: Xueqing Zou
  • Patent number: 11558417
    Abstract: A method, computer program product, and computer system for receiving, by a computing device, a plurality of file segments of a file, the plurality of file segments being received individually by the computing device. A first file segment of the file may be scanned to identify the presence of malware within the file segment. The first file segment of the file may be encrypted to create an encrypted file segment in response to identification by the scan of the first file segment that malware is absent from the first file segment. The encrypted file segment of the file may be sent to another computing device before a second file segment of the file is received by the computing device.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: January 17, 2023
    Inventors: Praveen Raja Dhanabalan, Anudeep Narasimhaprasad Athlur
  • Patent number: 11556645
    Abstract: A method for monitoring control-flow integrity in a low-level execution environment, the method comprising receiving, at a monitor, a message from the execution environment indicating that the execution environment has entered a controlled mode of operation, receiving, at the monitor, a data packet representing execution of a selected portion of a control-flow process at the execution environment, identifying, using the data packet, a pathway corresponding to the selected portion of the control-flow process from a set of permissible control-flow pathways and determining whether the identified pathway corresponds to an expected control-flow behaviour.
    Type: Grant
    Filed: June 6, 2018
    Date of Patent: January 17, 2023
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Ronny Chevalier, Guillaume Hiet, Maugan Villatel, David Plaquin
  • Patent number: 11552969
    Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.
    Type: Grant
    Filed: October 11, 2021
    Date of Patent: January 10, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
  • Patent number: 11537712
    Abstract: A security system includes a backup acquisition unit configured to store given information indicating states of backup data together with backup images generated from the backup data for each backup generation; and a determination unit configured to generate, when a predetermined timing comes, determination information for determining whether there is an abnormality in the stored backup data, based on a predetermined determination rule and the given information for each backup generation, and to output the generated determination information.
    Type: Grant
    Filed: August 18, 2020
    Date of Patent: December 27, 2022
    Assignee: HITACHI, LTD.
    Inventors: Genki Matsuda, Kazuya Higuchi, Keisuke Matsumoto, Goro Kazama
  • Patent number: 11539681
    Abstract: A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: December 27, 2022
    Assignee: Network-1 Technologies, Inc.
    Inventor: John A. Nix
  • Patent number: 11526610
    Abstract: A method and apparatus utilize a peer-to-peer network of security nodes collectively adhering to a protocol for inter-node communication. The system is comprised a plurality of first security nodes, at least one second security node, and at least one third security node. The plurality of first security nodes receive at least one of pre-trained detection models and rules, monitor at least one of a blockchain and connected devices for malicious behavior based on the received at least one of pre-trained detection models and rules, and report the malicious behavior. The at least one second security node creates and communicates the at least one of pre-trained detection models and rules to the plurality of first security nodes. The at least one third security node is informed by the at least one second security node of the reported malicious behavior.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: December 13, 2022
    Assignee: Veracode, Inc.
    Inventors: Anna Bacher, Erich Gstrein
  • Patent number: 11526602
    Abstract: A data-processing device includes a computing unit and an interface unit using a packet-based communication protocol, in particular PCI Express. The data-processing device also includes an intrusion detection unit that is connected via a signal connection to a filter device of the interface unit, and/or to a secure element, in the form of a Trusted Execution Environment, of an authentication arrangement related to the communication protocol. The intrusion detection unit evaluates input signals received via the signal connection for a rule infringement in a set of intrusion detection rules The filter device, at least part of which is hardware, is designed to forward only the communication data meeting an approval condition from the interface unit to an additional component of the data-processing device according to configuration information predetermined in the data-processing device and containing the approval condition.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: December 13, 2022
    Assignee: Audi AG
    Inventors: Markus Klein, Kamil Zawadzki, Changsup Ahn, Hans Georg Gruber, Jürgen Lerzer, Christoph Dalke
  • Patent number: 11523274
    Abstract: Embodiments of the present disclosure relate to a data transmission method, user equipment, and a control plane node. User equipment (UE) determines a security attribute of a session of the UE; the UE sends a session establishment request message to a control plane node when the security attribute of the session of the UE does not meet a security requirement of an application. The session establishment request message is used to request to establish a session corresponding to the security requirement of the application. Embodiments of the disclosed method reduce an unnecessary signaling exchange caused by establishment of a new session in a data transmission process to facilitate meeting requirements of different services.
    Type: Grant
    Filed: September 27, 2019
    Date of Patent: December 6, 2022
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Hui Ni, Yongcui Li, Jiangwei Ying
  • Patent number: 11522864
    Abstract: A first request is received for a temporary alternate identifier for a user, wherein the user is identified within a service using a user service identifier, and wherein the temporary alternate identifier assists in transferring the user service identifier from the service to a resource. In response to the first request, the temporary alternate identifier is generated and associated with the user service identifier. The temporary alternate identifier is then provided the user, and the temporary alternate identifier is also provided by the user to the resource. A second request is received, from the resource, for an associated service identifier that is associated with the temporary alternate identifier. An indication is then provided, to the resource, that the user service identifier is the associated service identifier.
    Type: Grant
    Filed: September 27, 2019
    Date of Patent: December 6, 2022
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventor: Chitranjan Gohil
  • Patent number: 11494488
    Abstract: A method, system, and computer program product for adaptive network provisioning. The method may include storing a plurality of use case records in a use case repository, where each use case record provides a diagnostic definition of a security threat to a SIEM environment. The method may also include storing metadata for a plurality of attributes of subscribers to the SIEM environment. The method may also include storing use cases that the subscribers have deployed from the use case repository. The method may also include setting up a new subscriber, where setting up the new subscriber includes: receiving a set of attributes of the new subscriber; searching a metadata store to identify subscribers with attributes that are similar to the set of attributes; and selecting an initial set of use cases for the new subscriber based on use cases deployed by the identified subscribers.
    Type: Grant
    Filed: October 14, 2020
    Date of Patent: November 8, 2022
    Assignee: International Business Machines Corporation
    Inventors: Tousif Ahmed Syed, Tamer Aboualy, Dusty Boshoff
  • Patent number: 11487907
    Abstract: Multi-mode interfaces having secure alternate modes are disclosed. An example method includes exposing to a device, during a first alternate mode negotiation session, an availability of a first secure alternate mode on a host, authenticating the device to the host using the first secure alternate mode, and responsive to the device being authenticated, exposing to the device a second secure alternate mode.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: November 1, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Neill Thomas Kapron, Christopher Ritchie Tabarez, Nicolas James Jurich
  • Patent number: 11489834
    Abstract: The present disclosure provides a method of access to users of a network system via a unique identity key that controls access and permission rights of outside entities as controlled by the entity itself. The system assigns unique identity to a unique entity. The key is responsible for facilitating preferred access types and information accessed by outside entities, and acts as a signal for action, interaction and experience within the System as well as third party platforms. Each interaction within the system includes a requesting entity's proxy (‘REP’) sending an information access request (‘IAR’) to the deciding entity's proxy (‘DEP’) via a network. This IAR is routed to the correct DEP via the unique identifier. The DEP applies access preferences to allow or deny the IAR, in part or completely. If allowed or partially allowed, the DEP returns information to the REP.
    Type: Grant
    Filed: October 10, 2019
    Date of Patent: November 1, 2022
    Assignee: DIEM AI, LLC
    Inventors: Daniel James Carroll, Aaron August Sloup
  • Patent number: 11481487
    Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.
    Type: Grant
    Filed: July 8, 2019
    Date of Patent: October 25, 2022
    Assignee: Google LLC
    Inventors: Michael Halcrow, Thomas Garnier
  • Patent number: 11468184
    Abstract: A data protection system includes a data storage apparatus and an information processing apparatus. In the information processing apparatus, a redirection processing apparatus sets a personal storage area corresponding to a user to an accessible state according to a redirection policy. Furthermore, a write control unit controls data writing permission/prohibition for each storage area according to a write management policy. In particular, the write control unit prohibits data writing to a local storage unit except for the storage area to be used to access the personal storage area. With this, the data does not remain in the information processing apparatus, thereby preventing data leakage from the information processing apparatus.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: October 11, 2022
    Assignees: KYUSHU ELECTRIC POWER CO., INC., HUMMING HEADS, INC.
    Inventors: Daijiro Kariu, Naoyuki Oe, Haruo Iwasaki, Takahiro Shima
  • Patent number: 11449609
    Abstract: A threat management facility analyzes a plurality of instructions in computer code for redundancy. When redundancy is found, the threat management facility determines whether the redundancy has characteristics of deliberate obfuscation consistent with malware techniques such as server-side polymorphism. Measures of redundancy, such as one or more of a degree of redundancy or a pattern of redundancy, may inform this process, and my usefully aid in distinguishing legitimate code redundancies from malware. Where an inference of malware is supported, the threat management facility may initiate remediation of the computer code. Further, or instead, the type of remediation applied to the computer code may be based on one or more aspects of the detected obfuscation.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: September 20, 2022
    Assignee: Sophos Limited
    Inventor: Graham John William Chantry