Patents Examined by Matthews Smithers
-
Patent number: 12010204Abstract: Systems and/or methods of the present disclosure enable crypto-ledger interoperability using a controller to perform an operation between a first user and a second user on separate entity-specific distributed crypto-ledgers, where the separate entity-specific distributed crypto-ledgers are both operatively linked to a membered common distributed crypto-ledger. The controller burns a first quantity of first entity-specific crypto-tokens from the first entity-specific distributed crypto-ledger and mints a second quantity of the common crypto-tokens on the membered common distributed crypto-ledger, where the first quantity of first entity-specific crypto-tokens and the second quantity of the common crypto-tokens represent an equivalency.Type: GrantFiled: May 27, 2022Date of Patent: June 11, 2024Assignee: TASSAT GROUP INC.Inventors: Kevin Lupowitz, Eric Couillard, Sanjaya Kulkarni, Brian Bruce, Sanjay Deshpande, Omari Edwards, Joe Grastara, Al Gleicher
-
Patent number: 12008121Abstract: The present technology relates to a file processing method. The file processing method can includes a first terminal device receiving an encrypted file from a second terminal device. The first terminal device stores the encrypted file. The first terminal device receives an access instruction for the encrypted file. The first terminal device obtains a current security state. When the current security state is higher than or equal to a first security state, the first terminal device decrypts the file by using a decryption key. It can be learned that according to the method, after the first terminal device receives the encrypted file, the first terminal device decrypts the file by using the decryption key only when a security state is high.Type: GrantFiled: February 28, 2019Date of Patent: June 11, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Xiwen Fang, Qiang Wei
-
Patent number: 12003542Abstract: A method, system, and computer program product for recommending an initial database security model. The method may include identifying a plurality of nodes connected to a security network. The method may also include analyzing security characteristics of each node of the plurality of nodes. The method may also include identifying, from the security characteristics, key factors for each node. The method may also include calculating similarities between each node of the plurality of nodes. The method may also include building a self-organized centerless network across the plurality of nodes by grouping nodes with high similarities based on the similarities between each node, where the self-organized centerless network is a centerless network without a central management server, and includes groups of nodes from the plurality of nodes. The method may also include generating federated security models for the groups of nodes.Type: GrantFiled: January 14, 2021Date of Patent: June 4, 2024Assignee: International Business Machines CorporationInventors: Sheng Yan Sun, Shuo Li, Xiaobo Wang, Jun Wang, Hua Wang, Shidong Shan, Xing Xing Jing
-
Patent number: 12001553Abstract: Techniques for detecting anomalies or cyber attacks on a vehicle. A computer-implemented method for anomaly or attack detection includes determining, using a first model, a first predicted value of a first variable message associated with a vehicle, determining, using a second model, a second predicted value of the first variable message associated with the vehicle, determining, based on a difference between an actual value of the first variable message and the first predicted value of the first variable message and on a difference between the actual value of the first variable message and the second predicted value of the first variable message, a vector, and determining, using a third model, an output value based on the vector, the output value corresponding to at least one of a likelihood that an anomaly or an attack is occurring or a type of the anomaly or the attack.Type: GrantFiled: August 17, 2021Date of Patent: June 4, 2024Assignee: Red Bend Ltd.Inventors: Dror Cohen, Alexander Kreines, Shachar Mendelowitz
-
Patent number: 11997101Abstract: A content server can extend enterprise content management to a leading system in an efficient, automated, and seamless manner by leveraging the permission information provided by the leading system. The content server can sync the permission information with the leading system, evaluate user-manager relations, role-based rule definitions, and user-group associations defined in the leading system, and determine and/or update role memberships for workspaces created in the content server for users in the leading systems. In this way, even though the content server and the leading system have very different types of roles and permission models, the content server can evaluate complex relationships and role-based rules and intelligently, correctly, and quickly assign the right people to the right roles in the right workspaces in the content server.Type: GrantFiled: August 26, 2022Date of Patent: May 28, 2024Assignee: OPEN TEXT SA ULCInventors: Thomas Demmler, Szabolcs Gyula Mile
-
Patent number: 11997217Abstract: Methods, systems, and devices for virtualized authentication device are described. A virtual device (such as a virtual machine) may be permitted to access secured data within a memory device by an authentication process. The memory device may generate cryptographic keys in portions of the memory device and assign the cryptographic keys to the virtual machines. The virtual machine may use an authentication process using the cryptographic keys to access the secure data in the memory device. The authentication process may include authenticating the identity of the virtual machine and the code operating on the virtual machine based upon comparing cryptographic keys received from the virtual machines to the assigned cryptographic keys in the partitions of the memory device. Once both the identity of the virtual machine is authenticated, the virtual machine may be permitted to access the secure data in the memory device.Type: GrantFiled: July 26, 2022Date of Patent: May 28, 2024Assignee: Micron Technology, Inc.Inventor: Zoltan Szubbocsev
-
Patent number: 11985136Abstract: Systems, computer program products, and methods are described herein for detection and classification of intrusion using machine learning techniques. The present invention is configured to electronically receive, from a computing device of a user, an indication that the user has initiated a first resource interaction; retrieve information associated with the first resource interaction, wherein the information comprises at least one or more parameters associated with the first resource interaction; initiate a machine learning model on the one or more parameters associated with the first resource interaction; and classify, using the machine learning model, the first resource interaction into one or more classes, wherein the one or more classes comprises one or more access types.Type: GrantFiled: November 30, 2022Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Scott Anderson Sims, Jeffrey Brian Bashore, Jeffrey David Finocchiaro, Craig Douglas Widmann
-
Patent number: 11979434Abstract: A system and a method for secure operator onboarding and creating an ingest job agent for secure multitenant operations of a distributed computing cluster are provided. Embodiments automate multitenant operations for distributed computing clusters. These operations include automation of operator onboarding, creation of logically segregated distributed data stores within the distributed computing clusters for the on-boarded operator, and creation of ingest agents with security isolation for transfer of large quantities of files into the distributed computing clusters. Embodiments provide multitenant security, in which the same Hadoop cluster serves multiple operators with each operator's data and processes in effective isolation. In this manner, multitenant security keeps each user's data storage and operations on the Hadoop cluster separated from other operators.Type: GrantFiled: June 24, 2021Date of Patent: May 7, 2024Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: Leon D. Li, Tyson Solberg, Christopher Lock, Richard Vitek
-
Patent number: 11973860Abstract: Systems and methods for initiating an action based on electronic activities of a user. Generally, a computing device receives a policy for enabling cryptographically secure tracking of electronic activities of a user and a particular electronic computing device. The policy can include definitions for a multiple actions to be taken with respect to certain electronic activities resulting from interaction by the user with the at least one computing device. The computing device can identify a particular electronic activity resulting from user interaction with the at least one computing device. The computing device can determine a particular action to take by applying the policy to the particular electronic activity. The computing device can initiate the particular action with respect to the particular electronic activity.Type: GrantFiled: June 24, 2022Date of Patent: April 30, 2024Assignee: lonic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 11971979Abstract: Described systems and techniques store, at a first time, first system service verification data that includes a first capture of a system services table having at least one system service entry, and a first portion of a system service identified in the at least one system service entry. At a second time, second system service verification data may be stored that includes a second capture of the system services table and a second portion of the system service identified in the at least one system service entry. At least one mismatch between the first system service verification data and the second system service verification data may be determined. At least one security notification message identifying the at least one mismatch with respect to at least one of the second capture of the system services table and the second portion may thus be generated.Type: GrantFiled: November 30, 2021Date of Patent: April 30, 2024Assignee: BMC Software, Inc.Inventors: Jason Ronald Torola, Anthony Louis Lubrano, Subhasish Sarkar
-
Patent number: 11960590Abstract: Access to a shared library API is restricted for a customer application by a security system. A profile for each of a plurality of trusted applications is generated and stored in a security database. When a customer application attempts to access the shared library API, the customer application is verified by extracting a customer application profile for the customer application, comparing the customer application profile with each stored trusted application profile, and verifying that the customer application can access the shared library API based on the comparison. Based on the verification, the customer application may be allowed to or access to the shared library API or may be prevented from accessing the shared library API.Type: GrantFiled: November 22, 2022Date of Patent: April 16, 2024Assignee: PROTEGRITY CORPORATIONInventors: Yigal Rozenberg, Pierre Burlin, Jan Boberg
-
Patent number: 11962689Abstract: A quantum communications system may include a transmitter node, a receiver node, and a quantum communications channel coupling the transmitter node and receiver node. The transmitter node may include a pulse transmitter, a pulse divider downstream from the pulse transmitter, and at least one first waveplate upstream from the pulse divider and configured to alter a polarization state of pulses travelling therethrough. The receiver node may include at least one second waveplate being a conjugate of the at least one first waveplate, a pulse recombiner upstream from the at least one second waveplate, and a pulse receiver downstream from the at least one second waveplate.Type: GrantFiled: November 5, 2021Date of Patent: April 16, 2024Assignee: EAGLE TECHNOLOGY, LLCInventors: Samuel H. Knarr, Victor G. Bucklew, Samuel Nunez, Cypryan T. Klish, James Drakes
-
Patent number: 11949680Abstract: Disclosed is an improved approach to implement a mechanism to provide customer control over access to cloud infrastructure by the cloud provider's operator employees. This mechanism allow customer controlled access to any cloud infrastructure that belongs to or is otherwise allocated to the customer.Type: GrantFiled: April 30, 2021Date of Patent: April 2, 2024Assignee: Oracle International CorporationInventors: Prasanna Ramamurthi, Joydip Kundu, Binoy Sukumaran, Krishna Chander, Jeffrey Wright
-
Patent number: 11936669Abstract: Unauthorized use of user credentials in a network is detected. Data indicative of text strings being used to access resources in the network is accessed. Regex models are determined for the text strings. Troupings of the regex models are determined based on an optimization of a cumulative weighted function. A regex model having a cumulative weighted function that exceeds a predetermined threshold is identified. An alert is generated when the cumulative weighted function for the identified regex model exceeds the predetermined threshold.Type: GrantFiled: October 4, 2022Date of Patent: March 19, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Andrey Karpovsky, Tomer Rotstein, Fady Nasereldeen, Naama Kraus, Roy Levin, Yotam Livny
-
Patent number: 11924351Abstract: A transient blockchain proxy server consolidates many individual requests to add data to a blockchain by aggregating hashed data from these requests and sending the aggregated hashed data to the blockchain network as a single request. The blockchain network adds a new block to the blockchain with the aggregated hashed data and returns a transaction identifier for the new block to the transient blockchain proxy server, which passes the transaction identifier back to all the requestors who then can directly use the blockchain network to verify the hashed data using the transaction identifier. The transient blockchain proxy server buffers all incoming requests until one of the pending requests reaches a send timepoint that is the blockchain network delay plus a buffer time before a guaranteed time of verification. All incoming requests are then consolidated and sent as a single transaction to the blockchain network. Tiered verification-time services are enabled.Type: GrantFiled: February 9, 2023Date of Patent: March 5, 2024Assignee: Hong Kong Applied Science and Technology Research Institute Company LimitedInventors: Tak Wing Lam, Tak Fuk Wong
-
Patent number: 11924250Abstract: Disclosed herein is a system for minimizing the amount of time it takes to process and understand an unstructured, text-heavy document that includes important security-related information. The system uses a model that implements natural language processing techniques to semantically analyze an unstructured, text-heavy document, in order to identify notable security features useable to resolve the security issues in a more effective and efficient manner (e.g., without the need for a technical security professional). More specifically, the system receives an unstructured document that includes text which may be provided by multiple different security providers. The system is configured to apply the model to various text segments (e.g., a phrase, a sentence, a paragraph, etc.) included in the unstructured document to identify notable security features. The model can then associate the notable security features with a prescribed set of mitigation actions that can be implemented to resolve a security issue.Type: GrantFiled: April 21, 2021Date of Patent: March 5, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Bugra Karabey, Muhammad Ali Siddiqui, Jing Han Shiau, Meenal Srivastva, Subramanian Nagarajan
-
Patent number: 11916964Abstract: A multi-API security policy that covers multiple API calls of a transaction is dynamically enforced at runtime, without access to the specification or code of the APIs. Calls made to APIs of the transaction are logged, and the logs are read. Data objects used by the APIs are identified. Specific data labels are assigned to specific fields of the data objects, consistently identifying data fields of specific types. Linkages are identified between specific ones of the multiple APIs, based on the consistent identification of specific types of data fields. An API call graph is constructed, identifying a sequence of API calls made during the transaction. The call graph is used to enforce the security policy, by tracking the flow of execution of the multi-API transaction at runtime, and detecting actions that violate the security policy. Security actions are taken responsive to the detected actions that violate the policy.Type: GrantFiled: June 3, 2021Date of Patent: February 27, 2024Assignee: ArecaBay, Inc.Inventors: Lebin Cheng, Ravindra Balupari, Sekhar Babu Chintaginjala, Ankit Kumar, Sandeep Yadav
-
Patent number: 11899828Abstract: Methods and apparatus for protecting a physical unclonable function (PUF) generator are disclosed. In one example, a PUF generator is disclosed. The PUF generator includes a PUF cell array, a PUF control circuit and a reset circuit. The PUF cell array comprises a plurality of bit cells. Each of the plurality of bit cells is configurable into at least two different stable states. The PUF control circuit is coupled to the PUF cell array and is configured to access each of the plurality of bit cells to determine one of the at least two different stable states upon a power-up of the plurality of bit cells, and generate a PUF signature based on the determined stable states of the plurality of bit cells. The reset circuit is coupled to the PUF cell array and is configured to set the plurality of bit cells to represent their initialization data based on an indication of a voltage tempering event of a supply voltage of the PUF cell array.Type: GrantFiled: July 7, 2022Date of Patent: February 13, 2024Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.Inventor: Shih-Lien Linus Lu
-
Patent number: 11902282Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.Type: GrantFiled: May 28, 2021Date of Patent: February 13, 2024Assignee: Capital One Services, LLCInventors: Matthew A. Ghiold, Muhammad Saad Tahir, Gavin McGrew
-
Patent number: 11902330Abstract: A device may receive data identifying malicious behavior by a compromised endpoint device associated with a network and may receive user identity data identifying a user of the compromised endpoint device associated with the network. The device may receive endpoint device data identifying the compromised endpoint device and other endpoint devices associated with the network and may receive network device data identifying network devices associated with the network. The device may utilize the data identifying malicious behavior, the user identity data, and the endpoint device data to generate, based on an identity of the user, a security policy to isolate the malicious behavior. The device may cause the security policy to be provided to the network devices and the other endpoint devices based on the network device data and the endpoint device data.Type: GrantFiled: June 16, 2021Date of Patent: February 13, 2024Assignee: Juniper Networks, Inc.Inventor: Craig Dods