Patents Examined by Mahabub S Ahmed
  • Patent number: 11968209
    Abstract: Disclosed are hybrid authentication systems and methods that enable users to seamlessly sign-on between cloud-based services and on-premises systems. A cloud-based authentication service receives login credentials from a user and delegates authentication to an on-premises authentication service proxy. The login credentials can be passed by the cloud-based authentication service to the on-premises authentication service proxy, for instance, as an access token in an authentication header. The access token can be a JavaScript Object Notation (JSON) Web Token (JWT) token that is digitally signed using JSON Web Signature. Some embodiments utilize a tunnel connection through which the cloud-based authentication service communicates with the on-premises authentication service proxy. Some embodiments leverage an on-premises identity management system for user management and authentication.
    Type: Grant
    Filed: March 13, 2023
    Date of Patent: April 23, 2024
    Assignee: Open Text Corporation
    Inventors: Sachin Gopaldas Totale, Muneer Ahmed, Harish Rawat, Rajakumar Thiruvasagam, Lakshmi Narayana Prasad Kakumani
  • Patent number: 11966502
    Abstract: A digital file forensic accounting and management system collects forensic data for a digital file that is stored and accounted for in a datastore. The digital files and the associated forensic data may be retrieved from the datastore by a third party to verify the authenticity of the digital file. An interface program is utilized to collect forensic data about a file upon creation of the file and/or when the file is transferred to the datastore. An interface program may be a framework that is operated on a file producing program that a file provider used to create a digital file. An interface program may be an origination driver that is operated on the file providing computer. An interface program may be a directory monitoring program that transfers the digital file and forensic data to the datastore upon saving the file to the monitored directory.
    Type: Grant
    Filed: March 17, 2021
    Date of Patent: April 23, 2024
    Assignee: FORENSIFILE, LLC
    Inventors: Donna Renn, Lawrence Franklin Gibbs
  • Patent number: 11956355
    Abstract: The control device is configured to communicate with another device via a communication network, and comprises: a key acquisition unit configured to acquire, from a key distribution server via the communication network, an encryption key with a life period for performing encrypted communication with the another device; an encrypted communication processing unit configured to perform the encrypted communication with the another device using the encryption key within the life period; a server state detection unit configured to detect a key acquisition disabled state where acquisition of the encryption key by the key acquisition unit is disabled; and a life extension unit configured to perform extension processing for extending the life period if the key acquisition disabled state is detected.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: April 9, 2024
    Assignee: MITSUBISHI HEAVY INDUSTRIES, LTD.
    Inventors: Minoru Nakaide, Shinichi Toda, Yoshikane Yamanaka
  • Patent number: 11936644
    Abstract: A method for verifying identities of parties to a transaction includes receiving a login attempt from a mobile communication device, the login attempt including a security credential. The method determines that the security credential of the login attempt from the mobile communication device is authentic. The method communicates a one-time access code to the mobile communication device. The method receives a one-time entry code and mobile communication device information from the mobile communication device. The method determines that the one-time entry code and the mobile communication device information from the mobile communication device satisfies the communicated one-time access code and predetermined user mobile communication device information. The method provides by the mobile communication device access to a secure transaction environment.
    Type: Grant
    Filed: January 18, 2021
    Date of Patent: March 19, 2024
    Assignee: CertifID, Inc.
    Inventors: Thomas W. Cronkright, Lawrence R. Duthler
  • Patent number: 11936665
    Abstract: A method for monitoring data transiting via a user equipment is described, as well as a cyber attack detection device, The method includes obtaining a first decision from a first cyber attack detection technique and a second decision from a second cyber attack detection technique, indicating whether the data are associated with attack traffic, obtaining a third decision from a third cyber attack detection technique indicating whether the data are associated with attack traffic, the third technique the first and second decisions and confidence levels assigned to the first and second detection techniques, updating the confidence levels on the basis of the first, second and third decisions, and adapting, triggered on the basis of the obtained first, second and third decisions and of the updated confidence levels, at least one rule applied by the first and/or the second technique.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: March 19, 2024
    Assignee: ORANGE
    Inventor: Hichem Sedjelmaci
  • Patent number: 11916934
    Abstract: Example methods disclosed herein to determine whether a first monitored device is compromised include determining a first entropy value for the first monitored device based on a first number of unique event identifiers included in log entries obtained for the first monitored device, the log entries associated with a first time window. Disclosed example methods also include determining a second entropy value for the first monitored device based on numbers of unique event identifiers included in corresponding groups of log entries obtained for respective ones of a plurality of monitored devices including the first monitored device, the groups of log entries associated with the first time window. Disclosed example methods further include determining whether the first monitored device is compromised based on the first entropy value and the second entropy value, and performing an action in response to a determination that the first monitored device is compromised.
    Type: Grant
    Filed: May 16, 2022
    Date of Patent: February 27, 2024
    Assignee: MUSARUBRA US LLC
    Inventors: Peter Thayer, Gabriel G. Infante-Lopez, Leandro J. Ferrado, Alejandro Houspanossian
  • Patent number: 11917060
    Abstract: An apparatus and method for mapping user-associated data to an identifier. The apparatus includes a processor configured to store a plurality of user identifiers. User identifiers may be determined by way of user or by machine-learning modules or the like. Apparatus receives user-associated data from a user to be stored in a resource data storage system. User-associated data may include a plurality of data sets to be mapped to an identifier. Mapping a data set to an identifier may be user determined or use a machine-learning module. Apparatus is configured to update the immutable sequential listing associated with the data set with the mapped identifier.
    Type: Grant
    Filed: February 27, 2023
    Date of Patent: February 27, 2024
    Inventors: Arran Stewart, Steve O'Brien
  • Patent number: 11914720
    Abstract: A method for verifying a drone included in an industrial Internet of Things (IIoT) system, using a petri-net modeling is disclosed. In an embodiment, the method includes a step of modeling the IIoT system as a hierarchical petri-net (modeling step); and a step of verifying whether the drone has security vulnerability on the basis of the hierarchical petri-net model (verification step), wherein the verification step can determine that a drone has security vulnerability when at least one of a plurality of determination factors provided as places to the hierarchical petri-net model determines that the drone is operating abnormally.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: February 27, 2024
    Assignee: SOONCHUNHYANG UNIVERSITY INDUSTRY ACADEMY COOPERATION FOUNDATION
    Inventors: Il Sun You, Vishal Sharma, Gaurav Choudhary, Yong Ho Ko
  • Patent number: 11895237
    Abstract: Various embodiments of the present application set forth a computer-implemented method that includes generating, based on a resource file stored at an endpoint device, a credential data packet for authenticating with a first application executing in a first network, where the resource file includes a set of encryption keys associated with a plurality of applications including the first application, and where the credential data packet is encrypted with a device key signed by the endpoint device, and the credential data packet is signed by an endpoint device management (EDM) key extracted from the set of encryptions keys included in the resource file, sending, by the endpoint device, the credential data packet to the first application via a trusted communication channel, and receiving, by the endpoint device and in response to the credential data packet, an authorization packet from the first application via the trusted communication channel.
    Type: Grant
    Filed: January 5, 2023
    Date of Patent: February 6, 2024
    Assignee: SPLUNK INC.
    Inventors: Mingyuan Chen, Jesse Chor, Dylan Patricia Conway, Michael Emery, Simon Tam, Eeshan Wagh, Glen Wong, Everett Yip
  • Patent number: 11876829
    Abstract: One variation of a method for emulating a known attack on a computer network includes: generating a set of data packets by recombining packet fragments within a packet capture file representing packet fragments transmitted between machines during a prior malicious attack on a second network; defining transmission triggers for transmission of the set of data packets between pairs of agents connected to a target network based on timestamps of packet fragments in the packet capture file; initiating transmission of the set of data packets between the pairs agents according to the set of transmission triggers to simulate the malicious attack on the target network; and, in response to absence of a security event related to the simulation in a log of a security technology deployed on the target network, generating a prompt to reconfigure the security technology to respond to the malicious attack.
    Type: Grant
    Filed: December 22, 2022
    Date of Patent: January 16, 2024
    Assignee: AttackIQ, Inc.
    Inventors: Renan Fischer e Silva, Albert López Fernández, Rajesh K. Sharma
  • Patent number: 11870791
    Abstract: A policy-controlled authorization system including a local application on a client device, a policy component including a plurality of policies, and a mid-link server, coupled to the client device is provided. A request for access to a service using a token is provided by the local application. A correlator correlates the token with the plurality of tokens for identifying a policy from the plurality of policies associated with the token. A token inspector authorizes the token for accessing the service based on the correlation. Based on the authorization, either the token is authorized for access to the service via the remote application, or the token is blocked when unauthorized to prevent access to the service. Confidence scores are assigned to each token based on their categories, compliance with the policies, and a threat level. The confidence scores indicate need to re-authorize the tokens and/or disable them temporarily.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: January 9, 2024
    Assignee: Netskope, Inc.
    Inventors: James S. Robinson, Damian C. Chung, Lamont Orange
  • Patent number: 11848945
    Abstract: A method including calculating, by a user device, a hash of private data, the calculated hash to be utilized by an infrastructure device for comparison with a hash of breached data compromised due to a data breach; verifying, by the user device prior to transmitting the hash of the private data to the infrastructure device, that the user device is authorized to have access to a plaintext version of the private data; transmitting, by the user device based on verifying that the user device is authorized to have access to the plaintext version of the private data, the hash of the private data to the infrastructure device; and receiving, by the user device from the infrastructure device based on transmitting the hash of the private data, a notification indicating a result of a comparison of the hash of the private data with the hash of the breached data is disclosed.
    Type: Grant
    Filed: October 12, 2022
    Date of Patent: December 19, 2023
    Assignee: UAB 360 IT
    Inventor: Edvinas Tamosiunas
  • Patent number: 11843620
    Abstract: A method including determining, by an infrastructure device, a breach database including breach information indicating breached data that is compromised due to a data breach; calculating, by the infrastructure device, a hash of the breached data that is compromised due to the data breach; receiving, by the infrastructure device from the user device, a hash of private data associated with the user device; comparing, by the infrastructure device, the hash of the private data with the hash of the breached data; and transmitting, by the infrastructure device when the hash of the private data matches the hash of the breached data, a notification to the user device indicating that the private data associated with the user device is compromised due to the data breach is disclosed. Various other aspects are contemplated.
    Type: Grant
    Filed: October 12, 2022
    Date of Patent: December 12, 2023
    Assignee: UAB 360 IT
    Inventor: Edvinas Tamosiunas
  • Patent number: 11843619
    Abstract: A method including determining, by the infrastructure device, a breach database including breach information indicating breached data that is compromised due to a data breach; calculating, by the infrastructure device, a hash of the breached data; calculating, by the user device, a hash of private data; transmitting, by the user device, the hash of the private data to the infrastructure device; comparing, by the infrastructure device, the hash of the private data with the hash of the breached data; and transmitting, by the infrastructure device to the user device based at least in part on a result of the comparison, a notification indicating whether the private data is breached due to the data breach is disclosed. Various other aspects are contemplated.
    Type: Grant
    Filed: October 7, 2022
    Date of Patent: December 12, 2023
    Assignee: UAB 360 IT
    Inventor: Edvinas Tamosiunas
  • Patent number: 11843623
    Abstract: An anomaly detector for detecting anomaly in input data comprises an auto-encoder trained to encode the input data and decode the encoded input data to reconstruct the input data. Further, the anomaly detector comprises a classifier trained to determine a reconstruction loss indicative of a difference between the accepted input data and the reconstructed input data, where the reconstruction loss includes a weighted combination of a plurality of loss functions evaluating reconstruction losses of a plurality of parts of the reconstructed input data, different types of loss functions, or both. The classifier is further configured to detect an anomaly in the reconstructed input data when the reconstruction loss is above a threshold.
    Type: Grant
    Filed: March 16, 2021
    Date of Patent: December 12, 2023
    Assignee: Mitsubishi Electric Research Laboratories, Inc.
    Inventors: Ye Wang, Kyeong Jin Kim, Xiao Wang
  • Patent number: 11831763
    Abstract: Methods, systems, and computer readable media for utilizing predetermined encryption keys in a test simulation environment are disclosed. In one embodiment, a method includes generating, prior to an initiation of an Internet protocol security (IPsec) test session, a private key and a public key at a traffic emulation device and storing the private key and the public key in a local storage associated with the traffic emulation device. The method further includes retrieving, from the local storage, the private key and the public key upon the initiation of the IPsec test session between the traffic emulation device and a device under test (DUT) and generating a shared secret key utilizing the retrieved private key and a DUT public key received from the DUT.
    Type: Grant
    Filed: May 24, 2021
    Date of Patent: November 28, 2023
    Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.
    Inventors: Andrei Cipu, Alexandru Badea, George Ciobanu
  • Patent number: 11818277
    Abstract: A computing system for generating tamper-proof electronic messages is disclosed herein. A service provider application receives an electronic message from a client application. The electronic message comprises an authorization provider (AuP) token that includes a public key of a local signing authority (LSA) and a signed payload that has been signed by the LSA using a private key of the LSA that forms a cryptographic key pair with the public key, the signed payload comprising an indication of a programmatic task to be executed by the service provider application. Responsive to validating the AuP token in the electronic message, the service provider application extracts the public key from the electronic message. Responsive to validating the signed payload based upon the extracted public key of the LSA, the service provider application executes the programmatic task.
    Type: Grant
    Filed: October 31, 2022
    Date of Patent: November 14, 2023
    Assignee: ALLSCRIPTS SOFTWARE, LLC
    Inventors: Stanislav Makarskyy, Sayee Balaji Chandrasekaran, Ram Pratapa, Gaurav Samudra
  • Patent number: 11818152
    Abstract: A system and a method for modeling topic-based message-oriented middleware (MoM) are provided. The method commences with connecting with a MoM system and converting information associated with the MoM system into a standardized object model. The standardized object model may include a topic-based node associated with a topic, at least one producer application, and at least one consumer application. The at least one producer application provides one or more messages related to the topic to the topic-based node. The at least one consumer application receives the one or more messages from the topic-based node. The method continues with generating a standardized graph of relationships between producers and consumers over a period of time. The method further includes creating a policy, periodically analyzing the standardized graph for at least one deviation from the policy, and issuing an alert in response to detecting the at least one deviation.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: November 14, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Colin Ross, Marc Woolward, Keith Stewart
  • Patent number: 11818145
    Abstract: An automated technique for security monitoring leverages a labeled semi-directed temporal graph derived from system-generated events. The temporal graph is mined to derive process-centric subgraphs, with each subgraph consisting of events related to a process. The subgraphs are then processed to identify atomic operations shared by the processes, wherein an atomic operation comprises a sequence of system-generated events that provide an objective context of interest. The temporal graph is then reconstructed by substituting the identified atomic operations derived from the subgraphs for the edges in the original temporal graph, thereby generating a reconstructed temporal graph. Using graph embedding, the reconstructed graph is converted into a representation suitable for further machine learning, e.g., using a deep neural network. The network is then trained to learn the intention underlying the temporal graph.
    Type: Grant
    Filed: December 9, 2019
    Date of Patent: November 14, 2023
    Assignee: International Business Machines Corporation
    Inventors: Xiaorui Pan, Xiaokui Shu, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin
  • Patent number: 11818147
    Abstract: Systems, methods and computer program products for improving security of artificial intelligence systems. The system comprising processors for monitoring one or more transactions received by a machine learning decision model to determine a first score associated with a first transaction. The first transaction may be identified as likely adversarial, in response to the first score being lower than a certain score threshold and the first transaction having a low occurrence likelihood. A second score may be generated in association with the first transaction based on one or more adversarial latent features associated with the first transaction. At least one adversarial latent feature may be detected as being exploited by the first transaction, in response to determining that the second score falls above the certain score threshold. Accordingly, an abnormal volume of activations of adversarial latent features spanning across a plurality of transactions scored may be detected and blocked.
    Type: Grant
    Filed: November 23, 2020
    Date of Patent: November 14, 2023
    Assignee: Fair Isaac Corporation
    Inventors: Scott Michael Zoldi, Shafi Ur Rahman