Patents Examined by Matthew Smithers
-
Patent number: 12197984Abstract: A card, such as a payment card, or other device may include an electronics package. The electronics package may include an RFID antenna. The RFID may not be utilized to access data on the card, or other device, until the appropriate manual input is received into the card or other device. Such manual input may take the form of a manual press of a physical button or the manual activation of a virtual button on a touch-screen device (e.g., a touch-screen mobile phone or card).Type: GrantFiled: September 5, 2018Date of Patent: January 14, 2025Inventor: Jeffrey D. Mullen
-
Patent number: 12192317Abstract: Systems and/or methods of the present disclosure enable ledger interoperability using a controller to perform an operation between a first user and a second user on separate entity-specific distributed ledgers, where the separate entity-specific distributed ledgers are both operatively linked to a membered common distributed ledger. The controller burns a first quantity of first entity-specific tokens from the first entity-specific distributed ledger and mints a second quantity of the common tokens on the membered common distributed ledger, where the first quantity of first entity-specific tokens and the second quantity of the common tokens represent an equivalency. The controller moves the second quantity of common tokens from a first encrypted storage to a second encrypted storage of the membered common distributed ledger, burns the second quantity of the common tokens and mints a third quantity of the second entity-specific tokens on the second entity-specific distributed ledger to complete the operation.Type: GrantFiled: March 13, 2023Date of Patent: January 7, 2025Assignee: Tassat Group Inc.Inventors: Kevin Lupowitz, Eric Couillard, Sanjaya Kulkarni, Brian Bruce, Sanjay Deshpande, Omari Edwards, Joe Grastara, Al Gleicher
-
Patent number: 12184651Abstract: Embodiments of the present disclosure relate to verifying a third-party resource by automatically validating multi-factor message codes associated with the third-party resource to enable access to functionality associated with the third-party resource via a multi-app communication system. An example embodiment includes a multi-app communication system including at least one processor and at least one memory. The embodiment multi-app communication system is configured to receive a sign-in request from a multi-app communication system application executed on a client device, and cause transmission of a multi-factor confirmation message to a verified third-party multi-factor authentication resource. The embodiment multi-app communication system is further configured query the verified third-party multi-factor authentication resource to identify the multi-factor confirmation message, and enable access to the third-party resource.Type: GrantFiled: September 21, 2022Date of Patent: December 31, 2024Assignee: Salesforce, Inc.Inventors: Mark Pike, Roland Schemers, James McPhail, Matthew Wahl
-
Patent number: 12182423Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool.Type: GrantFiled: January 26, 2023Date of Patent: December 31, 2024Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Joseph Soryal, Naila Jaoude
-
Patent number: 12184769Abstract: Quantum network devices, systems, and methods are provided to enable long-distance transmission of quantum bits (qubits) for applications such as Quantum Key Distribution (QKD), entanglement distribution, and other quantum communication applications. Such systems and methods provide for separately storing first, second, third, and fourth photons, wherein the first and second photons and the third and fourth photons are respective first and second entangled photon pairs, triggering a synchronized retrieval of the stored first, second, third, and fourth photons such that the first photon is propagated to a first node, the second and third photons are propagated to a second node, and the fourth photon is propagated to a third node, and creating a new entangled pair comprising the first and fourth photons at the first and third nodes to transmit quantum information.Type: GrantFiled: September 8, 2023Date of Patent: December 31, 2024Assignees: The Research Foundation for The State University of New York, Qunnect, Inc.Inventors: Eden Figueroa, Mehdi Namazi, Mael Flament, Sonali Gera
-
Patent number: 12184699Abstract: The invention relates to method and system for providing security and access control in a network model. The method includes generating a network model including process entities. Each of the process entities is represented by a corresponding node on a node-based User-Interface. Each of nodes corresponding to the entities is configured to be linked with at least one of remaining nodes of the nodes in the node-based User-Interface, via an interconnection network link. The method further includes receiving one or more attributes associated with each of the nodes; and creating an access control policy for a target node of the nodes. Accessing the target node includes at least one of view the attributes associated with the target node; modifying the attributes associated with the target node; or modifying an interconnection network link between the target node and another node of the nodes.Type: GrantFiled: September 20, 2021Date of Patent: December 31, 2024Inventor: Srinivasa Raju Eedarapalli
-
Patent number: 12170692Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.Type: GrantFiled: September 16, 2020Date of Patent: December 17, 2024Assignee: Salesforce, Inc.Inventors: Toan Van Nguyen, Sriram Srinivasan, Syed Abdullah Shah, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Prabhat Singh, Bogdan Florin Romanescu
-
Patent number: 12170691Abstract: A method, performed by at least one processor, for protecting a front-haul link from a Man-in-the-Middle (MiTM) attack in a network communication system includes receiving, through a port of an authenticator, an authentication request for port authentication from a supplicant via an Ethernet Frame, obtaining, by the authenticator from the Ethernet frame, a hop count corresponding to a number of hops in a transmission path of the Ethernet frame between the supplicant and the authenticator, comparing the hop count to a predetermined threshold to determine whether the port should be disabled, and disabling the port based on the hop count being greater than the predetermined threshold.Type: GrantFiled: July 11, 2022Date of Patent: December 17, 2024Assignee: RAKUTEN SYMPHONY, INC.Inventors: Raghul Ravirajh, Nagendra Bykampadi, Satish Balagopalan
-
Patent number: 12170665Abstract: A client identification method, an apparatus, a storage medium and a network device. The method includes: acquiring, when any client is associated with a network device, a MAC address of the client; searching and matching the MAC address from a user information table, which includes MAC addresses of all clients that have ever been associated with the network device and characteristic information corresponding to each of the MAC addresses; marking the client as successfully identified when the matching of the MAC address is successful; and marking the client as to be detected when the matching of the MAC address is failed, acquiring the characteristic information of the client from a data packet sent by the client, searching and matching the characteristic information of the client from the user information table, and identifying the client according to the matching result.Type: GrantFiled: January 13, 2024Date of Patent: December 17, 2024Assignee: TP-LINK CORPORATION LIMITEDInventor: Xiana Lin
-
Patent number: 12170679Abstract: A set of metadata associated with a plurality of samples is received. The samples are clustered. For members of a first cluster, a set of similarities shared among at least a portion of the members of the first cluster is determined. A cluster member is identified within the first cluster, and in response, additional analysis is caused to be performed on the outlier cluster member.Type: GrantFiled: May 1, 2023Date of Patent: December 17, 2024Assignee: Palo Alto Networks, Inc.Inventors: Zhi Xu, Jiajie Wang, Xiao Zhang, Wenjun Hu
-
Patent number: 12166750Abstract: Systems and methods for secure access are provided. The secure access system includes a contactless card, a user device, a processor, and a storage device. The processor receives a first authentication request from the user device. Then, the processor transmits a first authentication credential associated with user login data to the user device. Next, the processor receives a second authentication request from the user device. Upon receipt of the second authentication request, the processor transmits a second authentication credential associated with a contactless card to the user device. Then, the processor receives a first code from the user device, and the storage device performs one or more access actions based on the first code.Type: GrantFiled: February 8, 2022Date of Patent: December 10, 2024Assignee: Capital One Services, LLCInventors: Bryant Yee, Mykhaylo Bulgakov, George Bergeron
-
Patent number: 12158977Abstract: Devices and methods to obtain values usable to verify the geographic location of a device. In at least one embodiment, a device comprises a positioning circuit and a cryptoprocessor. The device obtains geographic coordinates of the device's location, using the positioning circuit. The device stores, in the cryptoprocessor, information indicating the state of the device and the geographic coordinates. The device uses the cryptoprocessor to obtain values usable to validate the geographic location of the device.Type: GrantFiled: October 29, 2021Date of Patent: December 3, 2024Assignee: NVIDIA CorporationInventor: Binu Ramakrishnan
-
Patent number: 12153674Abstract: An event graph can be generated, and, upon malware detection, traversed backward to identify a root cause associated with the malware detection. Using this information, rules for earlier malware detection can be created by analyzing the event graph proximal to the root cause rather than proximal to the malware detection trigger.Type: GrantFiled: March 8, 2022Date of Patent: November 26, 2024Assignee: Sophos LimitedInventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries
-
Patent number: 12155666Abstract: Disclosed herein are system, method, and computer program product embodiments for generating a list of deny policy statements associated with an allow policy statement with respect to the effective access permissions for a principal in an identity and access management system. The operations can include identifying a first policy statement that specifies members of a first identity set including the principal are allowed to access a first system resource set. The operations further include identifying a second policy statement specifying that members of a second identity set are denied access to a second system resource set. Moreover, the operations include determining that the second policy statement overlaps with the first policy statement with respect to the effective access permissions for the principal, and placing the second policy statement into the list of deny policy statements associated with an allow policy statement.Type: GrantFiled: May 28, 2021Date of Patent: November 26, 2024Assignee: Capital One Services, LLCInventors: James Simonetti, Britton Lee, Joseph Chen, John Valin, Anika Gera, Nicholas Mirallegro, Jessica Feinstein, Nicholas Kotakis
-
Patent number: 12149537Abstract: Access control management to shared resources in a common resource directory between different users of cloud data centers can be implemented as computer-readable methods, media and systems. A resource managing service receives a request to access resources of a resource directory managed by the resource managing service. The request includes a token for identity authentication. The resource managing service determined a container membership associated with the token, where the container membership is associated with a container from a set of containers for the resource directory. The container includes one or more resources in a tree data structure of the resource directory. The resource managing service filters access rights defined in authorization primitives associated with the container membership based on container policy rules for the set of containers in the resource directory. The resource managing service provides access to a set of resources from the resource directory.Type: GrantFiled: January 12, 2022Date of Patent: November 19, 2024Assignee: VMware LLCInventors: Stanimir Lukanov, Georgi Lyubomirov Dimitrov, Georgi Lekov
-
Patent number: 12149615Abstract: A system and method for determining a secret cryptographic key shared between a sending unit and a receiving unit by using a communication channel comprising spatially separated amplifiers for secure long-distance communication includes transmitting a sequence of electromagnetic pulses via the communication channel through the amplifiers for establishing a shared secret cryptographic key, wherein each electromagnetic pulse corresponds to a bit of a random bit sequence according to a ciphering protocol, and at least one ciphering parameter is determined by maximizing the expected key generation rate using an information theory model, wherein a measured signal loss and at least one amplification parameter are taken into account as input parameters to the information theory model.Type: GrantFiled: February 18, 2022Date of Patent: November 19, 2024Assignee: Terra Quantum AGInventors: Nikita Kirsanov, Nurbolat Kenbayev, Dmitry Kronberg, Valerii Vinokour, Gordey Lesovik, Pavel Sekatski, Asel Sagingalieva
-
Patent number: 12141312Abstract: Provided herein are methods, systems and machine-readable programs for enabling a secure channel for communicating self-destructive messages. In an embodiment, a method, system and machine-readable program are provided for generating, communicating and receiving the self-destructive message is disclosed.Type: GrantFiled: August 18, 2023Date of Patent: November 12, 2024Assignee: BoardPAC Private LimitedInventors: Lakmini Wijesundera, Sanjeewa Widyaratne
-
Patent number: 12143391Abstract: In one embodiment, a device including a processor, and a memory to store data used by the processor, wherein the processor is operative to run a manufacturer usage description (MUD) controller operative to obtain a MUD profile of an Internet of Things (IoT) device from a MUD server, the MUD profile of the IoT device including: access rights of the IoT device, and any one or more of the following a default device username and/or a default device password of the IoT device, a recommended/required device password complexity of the IoT device, at least one service that should be enabled/disabled on the IoT device, and/or allowed security protocols and/or ciphers for communication to and/or from the IoT device, enforce security of the IoT device according to the MUD profile of the IoT device. Related apparatus and methods are also described.Type: GrantFiled: March 14, 2023Date of Patent: November 12, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Nikhil Sainath Kale, M. David Hanes, Ana Peric, Gonzalo Salgueiro
-
Patent number: 12135768Abstract: An interface provides answers to natural language user queries based upon real time data generated by live processes. The natural language queries are converted into a machine query syntax and the machine query syntax is provided to a large language model without sharing underlying data that is used to satisfy the natural language query by serving the data to the end user while, at the same time, masking the data from large language model, where interaction with the large language model is based upon a predefined syntax protocol. A reply is a received from the large language model in the same syntax and the reply is used to create an output to be served to the end user and/or to execute a functionality.Type: GrantFiled: March 25, 2024Date of Patent: November 5, 2024Assignee: AlertEnterprise, Inc.Inventors: Yogesh Ailawadi, Navjot Singh, Mohit Kumar, Ribhav Jain
-
Patent number: 12124868Abstract: Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.Type: GrantFiled: November 14, 2022Date of Patent: October 22, 2024Assignee: Rubrik, Inc.Inventors: Di Wu, Chenyang Zhou, Shanthi Kiran Pendyala