Patents Examined by Matthew Smithers
  • Patent number: 11637827
    Abstract: The techniques herein are directed generally to providing access control and identity verification for communications when receiving a communication at an entity to be verified. In one embodiment, a receiving device receives a communication from an initiating device on a communication channel, wherein the initiating device is configured to determine whether an identity associated with the receiving device is verified by a verification service. The receiving device verifies the identity through a verification service client application on the receiving device, and conveys, to the verification service over a verification channel, that the identity associated with the receiving device is verified, wherein the verification service is caused to convey, to the initiating device over the verification channel, that the identity is verified.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: April 25, 2023
    Assignee: Journey.ai
    Inventors: Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley
  • Patent number: 11632348
    Abstract: A method for a user/an employee in a system to acquire an email account is disclosed in the present invention, including: relating a role-nature email account to a role according to work content of the role in the system, wherein during the same period, one role can only be related to one role-nature email account, and one role-nature email account can only be related to one role; said role is an independent individual not a group/a class, and during the same period, one role can only be related to a unique user, while one user is related to one or more roles; and creating a relation between a user and a role, wherein for any user, a role-nature email accounts related to all roles related to said user are used as role-nature email accounts of the user and/or an employee corresponding to the user.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: April 18, 2023
    Assignee: CHENGDU QIANNIUCAO INFORMATION TECHNOLOGY CO., LTD.
    Inventor: Dazhi Chen
  • Patent number: 11627054
    Abstract: The present disclosure relates to managing activity taken with respect to cloud-based software services. A platform manages data objects processed by software services and/or those entities that initiate processing events. The platform uses identifiers such as, for example, a persistent identifier (PID) to track processing events, The platform implements rules and/or permissions related to the managed data objects and/or managed entities to determine whether processing events are in compliance. The platform may update database records, send alerts, send data graphs, or provide a real-time stream related to the managed data objects and/or managed entities.
    Type: Grant
    Filed: March 3, 2021
    Date of Patent: April 11, 2023
    Assignee: BETTERCLOUD, INC.
    Inventors: David Anthony Esposito, Peter Bilali, David Kenneth Hardwick, David Eli Politis
  • Patent number: 11625414
    Abstract: A method for providing database management system support to a source application configured to operate with a source database management system Is provided. The method comprises detecting database management system communications issued by the source application to the source database management system; and responsive to said database management systems communications, impersonating the source database management system to the source application.
    Type: Grant
    Filed: August 20, 2020
    Date of Patent: April 11, 2023
    Assignee: DATOMETRY, INC.
    Inventors: Florian Michael Waas, Mohamed Soliman, Zhongxian Gu, Lyublena Rosenova Antova, Tuan Anh Cao, Entong Shen, Michael Alexander Duller, John Eshleman
  • Patent number: 11620390
    Abstract: A risk rating method and system that predicts the risk likelihood, the risk impact, and the risk rating of certain threats and vulnerabilities from exploiting different component groups. In some embodiments, the system's predictions (also referred to herein as inferences) are generated based on data elements provided by a user about its organization's information systems. In further embodiments, the method and system utilizes data mining, historical records, and an AI Engine to provide the predictions for the risk likelihood, the risk impact, and the risk rating posed by the various threat occurrences.
    Type: Grant
    Filed: April 18, 2022
    Date of Patent: April 4, 2023
    Assignee: CLEARWATER COMPLIANCE LLC
    Inventors: Jonathan D. Stone, Tess Array Miller, Ravneet Singh
  • Patent number: 11611589
    Abstract: A data storage system can consist of a network controller connected to a data storage device and a remote host. An attack mitigation strategy may be generated with an attack module connected to the network controller in response to detected data storage conditions in the data storage device. The attack mitigation strategy can be executed with the attack module by sending separate first and second security queries to the data storage device over time. At least a powered move attack can then be identified based on the second security query.
    Type: Grant
    Filed: June 5, 2020
    Date of Patent: March 21, 2023
    Assignee: Seagate Technology LLC
    Inventors: Christopher N. Allo, Saheb Biswas, Kevin G. Sternberg
  • Patent number: 11606188
    Abstract: Systems and/or methods of the present disclosure enable crypto-ledger interoperability using a controller to perform an operation between a first user and a second user on separate entity-specific distributed crypto-ledgers, where the separate entity-specific distributed crypto-ledgers are both operatively linked to a membered common distributed crypto-ledger. The controller burns a first quantity of first entity-specific crypto-tokens from the first entity-specific distributed crypto-ledger and mints a second quantity of the common crypto-tokens on the membered common distributed crypto-ledger, where the first quantity of first entity-specific crypto-tokens and the second quantity of the common crypto-tokens represent an equivalency.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: March 14, 2023
    Assignee: TASSAT GROUP INC.
    Inventors: Kevin Lupowitz, Eric Couillard, Sanjaya Kulkarni, Brian Bruce, Sanjay Deshpande, Omari Edwards, Joe Grastara, Al Gleicher
  • Patent number: 11599643
    Abstract: Systems and methods for facilitating an analysis of software vulnerabilities are described. The system receives a first request to present software vulnerabilities of a virtual machine on a production machine. The system receives a first request to present software vulnerabilities of a virtual machine on a production machine. The first request includes a first selection including a virtual machine identifier identifying the virtual machine on the production machine. The software vulnerabilities include a first software vulnerability. The system presents a first electronic user interface including software vulnerabilities for the virtual machine. The system receives a second request including a second selection identifying a first software vulnerability. The system presents a second electronic user interface including presenting recovery point identifiers corresponding to snapshot images stored on a database.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: March 7, 2023
    Assignee: Rubrik, Inc.
    Inventor: Di Wu
  • Patent number: 11595200
    Abstract: A system and method for securely distributing quantum keys in a network are disclosed. The method includes receiving request for generating pair of quantum keys between source quantum node and target quantum node. Further, the method includes generating first pair of quantum keys based on the request. The method includes transmitting the first pair of quantum keys to the intermediate quantum node using a first quantum link. The method further includes generating intermediate pair of quantum key based on events detected at the intermediate quantum node. The method further includes interleaving the intermediate pair of quantum key with the first pair of quantum keys. Also, the method includes generating a second pair of quantum keys comprising interleaved intermediate pair of quantum key and first pair of quantum keys. Further, the method includes encoding and transmitting the second pair of quantum keys to target quantum node using second quantum link.
    Type: Grant
    Filed: August 2, 2021
    Date of Patent: February 28, 2023
    Inventors: Karunakaran M T, Anindita Banerjee, Rajesh Kumar Krishnan
  • Patent number: 11592997
    Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: February 28, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Patent number: 11595431
    Abstract: Efficient virus detection and removal are realized by changing a mode of collecting logs in accordance with a network usage status. A configuration includes a processing monitoring unit that executes processing of monitoring a data communication network, and the processing monitoring unit includes a system load monitoring unit that monitors an available bandwidth of a network and a virus monitoring unit that collects log information corresponding to a communication message and performs virus detection. The virus monitoring unit changes a mode of collecting log information in accordance with information regarding the available bandwidth of the network acquired by the system load monitoring unit. In a case where a virus is detected and the available bandwidth is neither equal to nor larger than a predetermined threshold, only limited log information corresponding to a high-priority communication message is collected.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: February 28, 2023
    Assignee: SONY CORPORATION
    Inventor: Kenta Tada
  • Patent number: 11588628
    Abstract: A space and wave division multiplexing and demultiplexing system and method for quantum key distribution (QKD) using free space laser communications. The system operates to transmit a quantum channel, including a key of QKD, included in a combined laser transmission with a classical channel, including an encrypted message of QKD. The laser transmission can be transmitted through free space to a lens, wherein it is diffracted into two separate diffraction patterns and captured by a double clad optical receiver fiber having an inner core and a concentric outer core. The diffraction pattern of the classical channel is captured by the outer core, while the diffraction pattern of the quantum channel is captured by the inner core, thus allowing separate treatment of each channel.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: February 21, 2023
    Assignee: United States of America as Represented by the Administrator of National Aeronautics and Space Administration
    Inventor: Adam C. Wroblewski
  • Patent number: 11588632
    Abstract: Methods and a system of generating a master seed using location-based data. The system includes a pseudo-random number generator configured to generate a random number and a global positioning system module configured to determine a location of the system. The system also includes an encryption module configured to generate a signing request message. The signing request message includes the random number and the location. The system further includes a communication device configured to transmit the signing request message to a location authority for authorization. The communication device further configured to receive a signature from the location authority upon authorization of the signing request message. The system is further configured to generate a master seed based on the signature.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: February 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Junichi Shimada, Shuichi Hachiya
  • Patent number: 11580223
    Abstract: A vehicular control apparatus is used in an onboard system provided with a plurality of information processors mutually connected via a communication bus, and includes a storage section for storing information, and an arithmetic section for executing a process based on the information stored in the storage section. The information contains first management information relating to a security abnormality as a communication data abnormality owing to security attack from outside the onboard system, and second management information relating to a safety abnormality as a communication data abnormality owing to an abnormality in the onboard system. The first management information contains first limit condition information indicating a first limit condition for executing a security coping with the security abnormality. The second management information contains second limit condition information indicating a second limit condition for executing a safety coping with the safety abnormality.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: February 14, 2023
    Assignee: Hitachi Astemo, Ltd.
    Inventors: Nobuyoshi Morita, Kota Ideguchi
  • Patent number: 11580224
    Abstract: A computer-implemented method includes monitoring, by a power monitor on a computer device, for a peripheral device connection. The peripheral device connection connecting a peripheral device to an input/output port of the computer device. The input/output port is configured to provide power from a power supply of the computer device to the peripheral device. In response to the monitoring for the peripheral device connection identifying the peripheral device connection, the method includes determining, by the power monitor, a device type and a negotiated power of the peripheral device as connected. The power monitor determines whether the negotiated power of the peripheral device as connected matches expected power information. In response to determining the negotiated power of the peripheral device does not match the expected power information, the power monitor takes action on the computer device.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: February 14, 2023
    Assignee: Target Brands, Inc.
    Inventors: Kyle Shattuck, Brian Souder, John Holland, Adam Lesperance, Jerome Odegaard
  • Patent number: 11575499
    Abstract: A processor may collect process information associated with a peer node of a self-auditing blockchain. The processor may generate an imprint from the process information. The processor may compare the imprint from the peer node to an imprint consensus to detect an error. The error may indicate that the peer node has been compromised.
    Type: Grant
    Filed: December 2, 2020
    Date of Patent: February 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Dushyant K. Behl, Sayandeep Sen, Palanivel Andiappan Kodeswaran
  • Patent number: 11570160
    Abstract: Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request to determine whether a user device communicatively coupled to a resource server is authorized to access at least one resource hosted by the resource server and determining whether the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server based at least in part on whether the user device communicatively coupled to the resource server has been issued a management identifier. The method further includes providing a response indicating that the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server in response to a determination that the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: January 31, 2023
    Assignee: AirWatch, LLC
    Inventor: Jonathan Blake Brannon
  • Patent number: 11568074
    Abstract: According to one embodiment, a memory system is connectable to a host including a first volatile memory and includes a non-volatile memory and a controller. The controller may use a first area of the first volatile memory as a temporary storage memory of data stored in the non-volatile memory and controls the non-volatile memory. The controller generates a first parity by using first data stored in the non-volatile memory and a key value to store the first data and the generated first parity in the first area. In the case of reading the first data stored in the first area, the controller reads the first data and the first parity to verify the read first data using the read first parity and the key value.
    Type: Grant
    Filed: August 23, 2019
    Date of Patent: January 31, 2023
    Assignee: KIOXIA CORPORATION
    Inventor: Keigo Hara
  • Patent number: 11568083
    Abstract: There is provided a method comprising, receiving, from a second network node, a request to access data of a user of a user device, forwarding the request to the user device, receiving, from the user device, an acknowledgement indicating that access to the data of the user is granted and transmitting, in response to receiving the acknowledgement, a first indication to a blockchain, the first indication indicating that access to the data of the user is granted.
    Type: Grant
    Filed: July 30, 2020
    Date of Patent: January 31, 2023
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Matteo Signorini, Dimitrios Schoinianakis
  • Patent number: 11568055
    Abstract: A method for (of) automatically detecting a security vulnerability in a source code using a machine learning model, characterized in that the method includes: obtaining the source code from a client codebase, wherein the client codebase is a complete or an incomplete body of the source code for a given software program or an application; and using a machine learning (ML) model to perform a ML based analysis on an abstract syntax tree (AST) for detecting a first security vulnerability over a static source code, the machine learning based analysis comprise (i) flattening the abstract syntax tree (AST) into a sequence of structured tokens, wherein the sequence of structured tokens includes a semantic structure and a syntactic structure of the source code, (ii) implementing a natural language processing technique on the sequence of structured tokens for mapping the sequence of structured tokens to one or more integers, (iii) pre-training the machine learning model using an unlabeled source code as an input to pre
    Type: Grant
    Filed: August 23, 2019
    Date of Patent: January 31, 2023
    Assignee: Praetorian
    Inventors: Jeff Olson, Matthew Kindy, II