Patents Examined by Matthew Smithers
-
Patent number: 11637827Abstract: The techniques herein are directed generally to providing access control and identity verification for communications when receiving a communication at an entity to be verified. In one embodiment, a receiving device receives a communication from an initiating device on a communication channel, wherein the initiating device is configured to determine whether an identity associated with the receiving device is verified by a verification service. The receiving device verifies the identity through a verification service client application on the receiving device, and conveys, to the verification service over a verification channel, that the identity associated with the receiving device is verified, wherein the verification service is caused to convey, to the initiating device over the verification channel, that the identity is verified.Type: GrantFiled: April 29, 2020Date of Patent: April 25, 2023Assignee: Journey.aiInventors: Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley
-
Patent number: 11632348Abstract: A method for a user/an employee in a system to acquire an email account is disclosed in the present invention, including: relating a role-nature email account to a role according to work content of the role in the system, wherein during the same period, one role can only be related to one role-nature email account, and one role-nature email account can only be related to one role; said role is an independent individual not a group/a class, and during the same period, one role can only be related to a unique user, while one user is related to one or more roles; and creating a relation between a user and a role, wherein for any user, a role-nature email accounts related to all roles related to said user are used as role-nature email accounts of the user and/or an employee corresponding to the user.Type: GrantFiled: July 27, 2018Date of Patent: April 18, 2023Assignee: CHENGDU QIANNIUCAO INFORMATION TECHNOLOGY CO., LTD.Inventor: Dazhi Chen
-
Patent number: 11627054Abstract: The present disclosure relates to managing activity taken with respect to cloud-based software services. A platform manages data objects processed by software services and/or those entities that initiate processing events. The platform uses identifiers such as, for example, a persistent identifier (PID) to track processing events, The platform implements rules and/or permissions related to the managed data objects and/or managed entities to determine whether processing events are in compliance. The platform may update database records, send alerts, send data graphs, or provide a real-time stream related to the managed data objects and/or managed entities.Type: GrantFiled: March 3, 2021Date of Patent: April 11, 2023Assignee: BETTERCLOUD, INC.Inventors: David Anthony Esposito, Peter Bilali, David Kenneth Hardwick, David Eli Politis
-
Patent number: 11625414Abstract: A method for providing database management system support to a source application configured to operate with a source database management system Is provided. The method comprises detecting database management system communications issued by the source application to the source database management system; and responsive to said database management systems communications, impersonating the source database management system to the source application.Type: GrantFiled: August 20, 2020Date of Patent: April 11, 2023Assignee: DATOMETRY, INC.Inventors: Florian Michael Waas, Mohamed Soliman, Zhongxian Gu, Lyublena Rosenova Antova, Tuan Anh Cao, Entong Shen, Michael Alexander Duller, John Eshleman
-
Patent number: 11620390Abstract: A risk rating method and system that predicts the risk likelihood, the risk impact, and the risk rating of certain threats and vulnerabilities from exploiting different component groups. In some embodiments, the system's predictions (also referred to herein as inferences) are generated based on data elements provided by a user about its organization's information systems. In further embodiments, the method and system utilizes data mining, historical records, and an AI Engine to provide the predictions for the risk likelihood, the risk impact, and the risk rating posed by the various threat occurrences.Type: GrantFiled: April 18, 2022Date of Patent: April 4, 2023Assignee: CLEARWATER COMPLIANCE LLCInventors: Jonathan D. Stone, Tess Array Miller, Ravneet Singh
-
Patent number: 11611589Abstract: A data storage system can consist of a network controller connected to a data storage device and a remote host. An attack mitigation strategy may be generated with an attack module connected to the network controller in response to detected data storage conditions in the data storage device. The attack mitigation strategy can be executed with the attack module by sending separate first and second security queries to the data storage device over time. At least a powered move attack can then be identified based on the second security query.Type: GrantFiled: June 5, 2020Date of Patent: March 21, 2023Assignee: Seagate Technology LLCInventors: Christopher N. Allo, Saheb Biswas, Kevin G. Sternberg
-
Patent number: 11606188Abstract: Systems and/or methods of the present disclosure enable crypto-ledger interoperability using a controller to perform an operation between a first user and a second user on separate entity-specific distributed crypto-ledgers, where the separate entity-specific distributed crypto-ledgers are both operatively linked to a membered common distributed crypto-ledger. The controller burns a first quantity of first entity-specific crypto-tokens from the first entity-specific distributed crypto-ledger and mints a second quantity of the common crypto-tokens on the membered common distributed crypto-ledger, where the first quantity of first entity-specific crypto-tokens and the second quantity of the common crypto-tokens represent an equivalency.Type: GrantFiled: May 27, 2022Date of Patent: March 14, 2023Assignee: TASSAT GROUP INC.Inventors: Kevin Lupowitz, Eric Couillard, Sanjaya Kulkarni, Brian Bruce, Sanjay Deshpande, Omari Edwards, Joe Grastara, Al Gleicher
-
Patent number: 11599643Abstract: Systems and methods for facilitating an analysis of software vulnerabilities are described. The system receives a first request to present software vulnerabilities of a virtual machine on a production machine. The system receives a first request to present software vulnerabilities of a virtual machine on a production machine. The first request includes a first selection including a virtual machine identifier identifying the virtual machine on the production machine. The software vulnerabilities include a first software vulnerability. The system presents a first electronic user interface including software vulnerabilities for the virtual machine. The system receives a second request including a second selection identifying a first software vulnerability. The system presents a second electronic user interface including presenting recovery point identifiers corresponding to snapshot images stored on a database.Type: GrantFiled: October 30, 2019Date of Patent: March 7, 2023Assignee: Rubrik, Inc.Inventor: Di Wu
-
Patent number: 11595200Abstract: A system and method for securely distributing quantum keys in a network are disclosed. The method includes receiving request for generating pair of quantum keys between source quantum node and target quantum node. Further, the method includes generating first pair of quantum keys based on the request. The method includes transmitting the first pair of quantum keys to the intermediate quantum node using a first quantum link. The method further includes generating intermediate pair of quantum key based on events detected at the intermediate quantum node. The method further includes interleaving the intermediate pair of quantum key with the first pair of quantum keys. Also, the method includes generating a second pair of quantum keys comprising interleaved intermediate pair of quantum key and first pair of quantum keys. Further, the method includes encoding and transmitting the second pair of quantum keys to target quantum node using second quantum link.Type: GrantFiled: August 2, 2021Date of Patent: February 28, 2023Inventors: Karunakaran M T, Anindita Banerjee, Rajesh Kumar Krishnan
-
Patent number: 11592997Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool.Type: GrantFiled: January 30, 2020Date of Patent: February 28, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Naila Jaoude
-
Patent number: 11595431Abstract: Efficient virus detection and removal are realized by changing a mode of collecting logs in accordance with a network usage status. A configuration includes a processing monitoring unit that executes processing of monitoring a data communication network, and the processing monitoring unit includes a system load monitoring unit that monitors an available bandwidth of a network and a virus monitoring unit that collects log information corresponding to a communication message and performs virus detection. The virus monitoring unit changes a mode of collecting log information in accordance with information regarding the available bandwidth of the network acquired by the system load monitoring unit. In a case where a virus is detected and the available bandwidth is neither equal to nor larger than a predetermined threshold, only limited log information corresponding to a high-priority communication message is collected.Type: GrantFiled: October 19, 2018Date of Patent: February 28, 2023Assignee: SONY CORPORATIONInventor: Kenta Tada
-
Patent number: 11588628Abstract: A space and wave division multiplexing and demultiplexing system and method for quantum key distribution (QKD) using free space laser communications. The system operates to transmit a quantum channel, including a key of QKD, included in a combined laser transmission with a classical channel, including an encrypted message of QKD. The laser transmission can be transmitted through free space to a lens, wherein it is diffracted into two separate diffraction patterns and captured by a double clad optical receiver fiber having an inner core and a concentric outer core. The diffraction pattern of the classical channel is captured by the outer core, while the diffraction pattern of the quantum channel is captured by the inner core, thus allowing separate treatment of each channel.Type: GrantFiled: March 31, 2021Date of Patent: February 21, 2023Assignee: United States of America as Represented by the Administrator of National Aeronautics and Space AdministrationInventor: Adam C. Wroblewski
-
Patent number: 11588632Abstract: Methods and a system of generating a master seed using location-based data. The system includes a pseudo-random number generator configured to generate a random number and a global positioning system module configured to determine a location of the system. The system also includes an encryption module configured to generate a signing request message. The signing request message includes the random number and the location. The system further includes a communication device configured to transmit the signing request message to a location authority for authorization. The communication device further configured to receive a signature from the location authority upon authorization of the signing request message. The system is further configured to generate a master seed based on the signature.Type: GrantFiled: September 22, 2020Date of Patent: February 21, 2023Assignee: International Business Machines CorporationInventors: Junichi Shimada, Shuichi Hachiya
-
Patent number: 11580223Abstract: A vehicular control apparatus is used in an onboard system provided with a plurality of information processors mutually connected via a communication bus, and includes a storage section for storing information, and an arithmetic section for executing a process based on the information stored in the storage section. The information contains first management information relating to a security abnormality as a communication data abnormality owing to security attack from outside the onboard system, and second management information relating to a safety abnormality as a communication data abnormality owing to an abnormality in the onboard system. The first management information contains first limit condition information indicating a first limit condition for executing a security coping with the security abnormality. The second management information contains second limit condition information indicating a second limit condition for executing a safety coping with the safety abnormality.Type: GrantFiled: October 10, 2018Date of Patent: February 14, 2023Assignee: Hitachi Astemo, Ltd.Inventors: Nobuyoshi Morita, Kota Ideguchi
-
Patent number: 11580224Abstract: A computer-implemented method includes monitoring, by a power monitor on a computer device, for a peripheral device connection. The peripheral device connection connecting a peripheral device to an input/output port of the computer device. The input/output port is configured to provide power from a power supply of the computer device to the peripheral device. In response to the monitoring for the peripheral device connection identifying the peripheral device connection, the method includes determining, by the power monitor, a device type and a negotiated power of the peripheral device as connected. The power monitor determines whether the negotiated power of the peripheral device as connected matches expected power information. In response to determining the negotiated power of the peripheral device does not match the expected power information, the power monitor takes action on the computer device.Type: GrantFiled: December 10, 2020Date of Patent: February 14, 2023Assignee: Target Brands, Inc.Inventors: Kyle Shattuck, Brian Souder, John Holland, Adam Lesperance, Jerome Odegaard
-
Patent number: 11575499Abstract: A processor may collect process information associated with a peer node of a self-auditing blockchain. The processor may generate an imprint from the process information. The processor may compare the imprint from the peer node to an imprint consensus to detect an error. The error may indicate that the peer node has been compromised.Type: GrantFiled: December 2, 2020Date of Patent: February 7, 2023Assignee: International Business Machines CorporationInventors: Dushyant K. Behl, Sayandeep Sen, Palanivel Andiappan Kodeswaran
-
Patent number: 11570160Abstract: Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request to determine whether a user device communicatively coupled to a resource server is authorized to access at least one resource hosted by the resource server and determining whether the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server based at least in part on whether the user device communicatively coupled to the resource server has been issued a management identifier. The method further includes providing a response indicating that the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server in response to a determination that the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server.Type: GrantFiled: September 29, 2020Date of Patent: January 31, 2023Assignee: AirWatch, LLCInventor: Jonathan Blake Brannon
-
Patent number: 11568074Abstract: According to one embodiment, a memory system is connectable to a host including a first volatile memory and includes a non-volatile memory and a controller. The controller may use a first area of the first volatile memory as a temporary storage memory of data stored in the non-volatile memory and controls the non-volatile memory. The controller generates a first parity by using first data stored in the non-volatile memory and a key value to store the first data and the generated first parity in the first area. In the case of reading the first data stored in the first area, the controller reads the first data and the first parity to verify the read first data using the read first parity and the key value.Type: GrantFiled: August 23, 2019Date of Patent: January 31, 2023Assignee: KIOXIA CORPORATIONInventor: Keigo Hara
-
Patent number: 11568083Abstract: There is provided a method comprising, receiving, from a second network node, a request to access data of a user of a user device, forwarding the request to the user device, receiving, from the user device, an acknowledgement indicating that access to the data of the user is granted and transmitting, in response to receiving the acknowledgement, a first indication to a blockchain, the first indication indicating that access to the data of the user is granted.Type: GrantFiled: July 30, 2020Date of Patent: January 31, 2023Assignee: NOKIA TECHNOLOGIES OYInventors: Matteo Signorini, Dimitrios Schoinianakis
-
Patent number: 11568055Abstract: A method for (of) automatically detecting a security vulnerability in a source code using a machine learning model, characterized in that the method includes: obtaining the source code from a client codebase, wherein the client codebase is a complete or an incomplete body of the source code for a given software program or an application; and using a machine learning (ML) model to perform a ML based analysis on an abstract syntax tree (AST) for detecting a first security vulnerability over a static source code, the machine learning based analysis comprise (i) flattening the abstract syntax tree (AST) into a sequence of structured tokens, wherein the sequence of structured tokens includes a semantic structure and a syntactic structure of the source code, (ii) implementing a natural language processing technique on the sequence of structured tokens for mapping the sequence of structured tokens to one or more integers, (iii) pre-training the machine learning model using an unlabeled source code as an input to preType: GrantFiled: August 23, 2019Date of Patent: January 31, 2023Assignee: PraetorianInventors: Jeff Olson, Matthew Kindy, II