Patents Examined by Matthew Smithers
  • Patent number: 11366886
    Abstract: A user provides an identification (ID) signal (e.g. a biometric ID signal like a self-snapshot) to a trusted cloud-based provider. When the user attempts to authenticate with the cloud-based provider, a similar ID signal (e.g. another self-snapshot) for the user is captured and provided to the cloud-based provider. The cloud-based provider then obtains a secondary ID signal, or a combination of secondary ID signals, and utilizes the secondary ID signal, or signals, to identify a subset of user records to be searched for the ID signal. The subset of the records, rather than all of the user records, can then be searched for the ID signal. The cloud-based provider can then authenticate the user based on the results of the search of the subset of the user records.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: June 21, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Raju Jain, Peter Gregory Davis, Jeffrey Johnson, Craig Thomas McIntyre, Kiran Kumar
  • Patent number: 11361074
    Abstract: The disclosed technology teaches reducing threat detection processing, including recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, metadata values, hashes for property groups and an entropy measure of the previously processed file. Also included is parsing the file into metadata values and property groups and calculating hashes of the property groups and entropy measure for the file. The method further includes applying similarity measures to compare the metadata values, the entropy measures, and the hashes on the property groups, for the edited version and the previously processed file. When any similarity measure or combination of similarity measures reaches a trigger, the technology teaches processing the file by using a threat detection module to detect malware. Property groups include core properties, application properties, document content and programming scripts for the edited version of the file and the previously processed file.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: June 14, 2022
    Assignee: Netskope, Inc.
    Inventors: Abhinav Singh, Himanshu Sharma
  • Patent number: 11363012
    Abstract: A customer in a computing resource provider environment, running an application on a VM instance, uses role credentials to request access to one or more web services. The request is forwarded to an enclave associated with the VM instance such that the enclave digitally signs the request and access to the one or more web services is provided.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: June 14, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Jasmeet Chhabra, Rebecca Claire Weiss, Eric Robert Northup
  • Patent number: 11362820
    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive from a pressure sensor matrix data describing a time-varying pressure interaction of the pressure sensor matrix with a second pressure sensor matrix, process the data to obtain a bit sequence, and use the bit sequence as a shared secret in a cryptographic procedure with a device.
    Type: Grant
    Filed: May 20, 2020
    Date of Patent: June 14, 2022
    Assignee: Nokia Technologies Oy
    Inventor: Harm Cronie
  • Patent number: 11356467
    Abstract: A log acquirer acquires an analysis communication log and a malicious communication log. A signature generator generates a signature serving as a condition for detecting a terminal infected with malware based on a field and a value included in the malicious communication log. A malware analysis report acquirer acquires information on the malware. A malware information adder adds the information on the malware to the signature. A log analyzer analyzes the analysis communication log using the signature and detects the terminal infected with the malware. A detection result display unit displays the detection result obtained from the analysis communication log by the log analyzer and the information on the malware added to the signature used in the analysis of the analysis communication log in a manner associated with each other.
    Type: Grant
    Filed: June 7, 2017
    Date of Patent: June 7, 2022
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventor: Kensuke Nakata
  • Patent number: 11349835
    Abstract: Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that are presented to the user for authentication purposes. A user response to the challenge may be compared to an expected response, and if the user response matches within a predetermined error of the expected response, the user may be authenticated. The systems and methods may further generate challenges that are adaptively designed to address weaknesses or errors in the created model such that the model is more closely associated with a user and the user is more likely to be the only person capable of successfully responding to the generated challenges.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: May 31, 2022
    Assignee: PAYPAL, INC.
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 11334651
    Abstract: A user provides an identification (ID) signal (e.g. a biometric ID signal like a self-snapshot) to a trusted cloud-based provider. When the user attempts to authenticate with the cloud-based provider, a similar ID signal (e.g. another self-snapshot) for the user is captured and provided to the cloud-based provider. The cloud-based provider then obtains a secondary ID signal, or a combination of secondary ID signals, and utilizes the secondary ID signal, or signals, to identify a subset of user records to be searched for the ID signal. The subset of the records, rather than all of the user records, can then be searched for the ID signal. The cloud-based provider can then authenticate the user based on the results of the search of the subset of the user records.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: May 17, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Raju Jain, Peter Gregory Davis, Jeffrey Johnson, Craig Thomas McIntyre, Kiran Kumar
  • Patent number: 11336437
    Abstract: A method for determining a terminal ID from a message received from a terminal in a communication system avoids sending the terminal ID in the clear. In this system each terminal ID has an associated encryption key. A transmitted message comprises at least a Message Authentication Code (MAC), a n-bit hash, and encrypted message text. At least the terminal key and a nonce is used to generate the MAC, and neither the terminal ID or the terminal key are included in the transmitted message. An authentication broker stores the set of all (terminal ID, terminal key) pairs for the plurality of terminals in the communication system. The set of all terminal keys is grouped into at least two partitions, and on receipt of a message the authentication broker identifies the partition that includes the terminal key of the terminal that transmitted the received message using the n-bit hash (the search partition).
    Type: Grant
    Filed: August 28, 2018
    Date of Patent: May 17, 2022
    Assignee: MYRIOTA PTY LTD
    Inventors: Andrew Beck, Robert George McKilliam
  • Patent number: 11328062
    Abstract: A computer-implemented method for detecting cyber-attacks affecting a computing device includes retrieving a plurality of sensor datasets from a plurality of sensors, each sensor dataset corresponding to involuntary emissions from the computing device in a particular modality and extracting a plurality of features from the plurality of sensor datasets. One or more statistical models are applied to the plurality of features to identify one or more events related to the computing device. Additionally, a domain-specific ontology is applied to designate each of the one or more events as benign, failure, or a cyber-attack.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: May 10, 2022
    Assignee: Siemens Aktiengesellschaft
    Inventors: Arquimedes Martinez Canedo, Justinian Rosca, Sanjeev Srivastava
  • Patent number: 11329995
    Abstract: There is disclosed a blockchain-based system, and an electronic apparatus and a method in the system. The electronic apparatus at a control node end includes a processor configured to: verify, in response to an ownership declaration for a new object that is first introduced from a to-be-verified node in the system, the ownership declaration; and sign, in a case that the verification is successful, the ownership declaration to be returned to the to-be-verified node, so that the signed ownership declaration is verified by other nodes in the system and a record regarding the ownership declaration is added to the blockchain. According to the embodiment of the disclosure, it is possible to verify the newly introduced object in the blockchain-based system without binding with a cipher coin, while maintaining a peer-to-peer architecture of the blockchain-based system.
    Type: Grant
    Filed: November 12, 2019
    Date of Patent: May 10, 2022
    Assignee: SONY CORPORATION
    Inventor: Zhihui Zhang
  • Patent number: 11323444
    Abstract: A method for secure multiparty computation of an inner product includes performing multiparty additions to generate a first sum share and a second sum share between two shares of alternating elements from corresponding pairs of elements in a first vector and a second vector, performing multiparty multiplications with at least one other node to generate inner product pair shares corresponding to products of the first sum shares and the second sum shares corresponding to pairs of elements in the first and second vectors, and performing another multiparty addition of each inner product pair share with a first negated shares of pair products corresponding to pairs of elements in the first vector and a second negated shares of pair products corresponding to pairs of elements in the second vector to generate a share of an inner product of the first and second vectors.
    Type: Grant
    Filed: September 25, 2018
    Date of Patent: May 3, 2022
    Assignee: Robert Bosch GmbH
    Inventors: Xinxin Fan, Qingji Zheng, Jorge Guajardo Merchan
  • Patent number: 11316878
    Abstract: Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: April 26, 2022
    Assignee: COGNYTE TECHNOLOGIES ISRAEL LTD.
    Inventors: Yuval Altman, Assaf Yosef Kere, Ido Krupkin, Pinhas Rozenblum
  • Patent number: 11314540
    Abstract: The present disclosure describes a combined network and physical security appliance. The appliance may be wired to or communicate with automation systems, IoT devices, physical sensors, computing devices and servers on an internal or local network, and other computing devices on an external network. By combining network security and physical security into a single device, a combination security appliance may correlate physical sensor signals with packet inspection results, providing enhanced protection against network threats to physical security systems, and physical protection against network threats.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: April 26, 2022
    Assignee: Fortress Cyber Security, LLC
    Inventor: Dejan Nenov
  • Patent number: 11316817
    Abstract: Various text or other messages may be overlayed on top of these messages. This processing of selecting different content postings from different channels may be determined by the likes on a posting, an editorial account, a recommendation system, or an automated algorithm that looks for curated postings. These postings may be collated into a story based on time of posting, likes, location, users who posted them, high follower posters, low follower posters and other factors. These can be collated into a story1 and a story 2.
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: April 26, 2022
    Inventor: Sanjay Kaliputnam Rao
  • Patent number: 11310040
    Abstract: Methods, systems and computer readable media are disclosed for providing a quantum cipher based on phase inversion, A shared key is established between a first party and a second party. A Hadamard transformation is applied to a message intended for a second party from the first party to produce an equal superposition state. A key phase inversion is applied to the output of the Hadamard transformation. A multiple phase inversion transformation is applied to the output of the key phase inversion to produce an encrypted quantum state with a uniform probability and relative phase distributions. The result is sent to the second party.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: April 19, 2022
    Assignee: Parallel Wireless, Inc.
    Inventors: Vikram Menon, Ayan Chattopadhyay
  • Patent number: 11295034
    Abstract: Exemplary privacy management platforms are described herein. Such platforms may be embodied in systems, computer-implemented methods, apparatuses and/or software applications. The described privacy management platform may be configured to scan identity, primary and/or secondary data sources in order to provide users with visibility into stored personal information, risk associated with storing such information and usage activity relating to such information. The platform may correlate personal information to specific data subjects to provide an indexed inventory across multiple data sources.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: April 5, 2022
    Assignee: BigID Inc.
    Inventors: Nimrod Vax, Eyal Sacharov, Dimitri Sirota
  • Patent number: 11297055
    Abstract: Methods and systems for authenticating a user requesting to access one or more resources via a device are described herein. Authentication may be based on or otherwise rely on a plurality of devices. For example, aspects described herein are directed towards a system and method for receiving an authentication request from a first user device. A second user device may send a request for and receive a public key of the first user device and receive. The second user device may verify the authentication request using the public key of the first user device and perform authentication based on an authentication secret received from a user.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: April 5, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Georgy Momchilov, Chris Pavlou, Ola Nordstrom, Christopher Wade
  • Patent number: 11294641
    Abstract: A domain module computation unit has as a single board computer (1) a central processing unit (CPU) in communication with both a first bus and with a second bus with all communication between the first bus and the second bus being-through the CPU, (2) the first bus communicating with a plurality of internal modules and (3) the second bus communicating with an input/output (I/O) unit enabling communication with devices external to the single board computer. Representative internal modules include a kernel non-volatile memory, a working non-volatile memory, a random access memory and an encryption/decryption unit. The single board computational unit is configured to execute software code modeled in a form embedding data and software instructions in a single model.
    Type: Grant
    Filed: April 13, 2018
    Date of Patent: April 5, 2022
    Inventor: Dimitris Lyras
  • Patent number: 11290431
    Abstract: A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
    Type: Grant
    Filed: October 15, 2021
    Date of Patent: March 29, 2022
    Assignee: Seven Networks, LLC
    Inventors: Lee R. Boynton, Trevor A. Fiatal, Scott M. Burke, Mark Sikes
  • Patent number: 11283814
    Abstract: Embodiments provide for distributed transaction-based provenance tracking of agricultural data, secured access to authorized user accounts, auditability of the data, and transactional oversight of the data when exchanged between user accounts. A distributed ledger network including a primary node and a plurality of secondary nodes can store transactions generated based on various operations on or associated with agricultural data, including the certification of select portions of agricultural data collected by a data collection device, commands received from client devices associated with user accounts purchasing or licensing the agricultural data, and detected attempts to access the agricultural data, among other things.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: March 22, 2022
    Assignee: Farmobile LLC
    Inventors: Jason Tatge, Chris Schibi, Daniel Mola, Jason Munro, Aeron Bowden