Patents Examined by Meng An
  • Patent number: 11914724
    Abstract: Disclosed herein are systems and method for adjusting data protection levels based on system metadata. A method may include monitoring a computing device for a cyberattack, wherein a kernel driver of the computing device is configured to allow access to kernel control paths and hash tables in accordance with a first protection level, and detecting that the cyberattack is in progress. While the cyberattack is in progress, the method may include identifying kernel control paths and hashes of software objects that will be affected by the cyberattack, and configuring the kernel driver to disable access to the identified kernel control paths and hashes of the software objects in accordance with a second protection level, wherein the second protection level includes greater access restrictions to the computing device than the first protection level.
    Type: Grant
    Filed: December 19, 2021
    Date of Patent: February 27, 2024
    Assignee: Acronis International GmbH
    Inventors: Nikolay Grebennikov, Candid W├╝est, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11914738
    Abstract: Some embodiments are directed to a categorization system for categorizing a sensitive data field in a dataset, e.g., a disease classification according to the ICD classification. A client device is to obtain categories for one or more records of the dataset. The client device determines categorization data for the categorization. The categorization data comprises homomorphic encryptions of possible values of the sensitive data field and encodings of the categories associated to the respective possible values, thus keeping the categorization secret. A data provider device stores the dataset and determines homomorphic encryption indicating differences between the value of the sensitive data field for a record and respective possible values. A categorization device determines which of those encryptions indicates a match and provides a category encoding associated with a matching possible value to the client device. The client device associates the encoded category to the record.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: February 27, 2024
    Assignee: Koninklijke Philips N.V.
    Inventors: Peter Petrus van Liesdonk, Daniel Pletea, Paul Koster
  • Patent number: 11907407
    Abstract: Implementations of the present disclosure include providing a graph representative of a network, a set of nodes representing respective assets, each edge representing one or more lateral paths between assets, the graph data including configurations affecting at least one impact that has an effect on an asset, determining multiple sets of fixes for configurations, each fix having a cost associated therewith, incorporating fix data of the sets of fixes into the graph, defining a set of fixes including one or more fixes from the multiple sets of fixes by defining an optimization problem that identifies one or more impacts that are to be nullified and executing resolving the optimization problem to define the set of fixes, each fix in the set of fixes being associated with a respective configuration in the graph, and scheduling performance of each fix in the set of fixes based on one or more operational constraints.
    Type: Grant
    Filed: December 15, 2021
    Date of Patent: February 20, 2024
    Assignee: Accenture Global Solutions Limited
    Inventors: Eitan Hadar, Amin Hassanzadeh, Anup Nayak
  • Patent number: 11907378
    Abstract: Embodiments assess security vulnerability of an application. An embodiment runs one or more static and dynamic analysis tools on the application to generate a static vulnerability report and a dynamic vulnerability report. In turn, code of the application is decompiled to identify code of the application that accepts user input. One or more vulnerabilities of the application are determined using the identified code of the application that accepts user input and a vulnerability report is generated that indicates the one or more vulnerabilities of the application determined using the identified code of the application that accepts user input. A final static vulnerability report and a final dynamic vulnerability report are generated based on the static and dynamic vulnerability reports and the generated vulnerability report indicating the one or more vulnerabilities of the application determined using the identified code of the application that accepts user input.
    Type: Grant
    Filed: August 27, 2021
    Date of Patent: February 20, 2024
    Assignee: Virsec Systems, Inc.
    Inventor: Satya V. Gupta
  • Patent number: 11899540
    Abstract: A synthetic full backup of a source volume is retrieved, the synthetic full having been created from merging a backup chain including an incremental backup into a full backup. The full backup corresponds to a state of the source volume at a first time. The synthetic full corresponds to a state of the source volume at a second time, after the first time. A bitmap embedded into a snapshot of the source volume taken at the second time is retrieved. The bitmap identifies data from the source volume copied to secondary storage for the incremental backup. The backup chain is regenerated by copying from the snapshot the data identified by the bitmap to a regenerated incremental backup.
    Type: Grant
    Filed: December 27, 2021
    Date of Patent: February 13, 2024
    Assignee: Dell Products, L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 11902416
    Abstract: Systems and methods for secure distribution of biometric matching processing are provided. Certain configurations include homomorphic encrypting of captured biometric information. In some configurations, the biometric information is classified without decryption between a first identity class and a second identity class. The biometric information may be formed as a feature vector. A homomorphic encrypted feature vector may be formed by homomorphic encrypting of the biometric information.
    Type: Grant
    Filed: December 13, 2022
    Date of Patent: February 13, 2024
    Assignee: The Government of the United States of America, as represented by the Secretary of Homeland Security
    Inventor: Arun Vemury
  • Patent number: 11902420
    Abstract: A method of securely encrypting data whereby a computing device can utilize a seed and a pin to generate a mantissa of an irrational number. The computing device can then utilize a portion of the mantissa as a one-time pad to encrypt data. The seed can be transmitted to a recipient via a graphical code to enable secure decryption by a recipient's computing device.
    Type: Grant
    Filed: November 23, 2021
    Date of Patent: February 13, 2024
    Assignee: THEON TECHNOLOGY LLC
    Inventor: Robert Edward Grant
  • Patent number: 11899778
    Abstract: This application discloses a password verification method and a password setting method. The password verification method includes: in response to a detected operation of requesting for password verification, collecting at least one first image by using a camera of a mobile terminal; obtaining matching information when a result of matching between the at least one first image collected by the mobile terminal and at least one first preset image satisfies a first preset matching condition, where the matching information includes at least one of the following: location information of the mobile terminal, motion information of the mobile terminal, at least one second image collected by the camera of the mobile terminal, and network connection information of the mobile terminal; and performing matching between the obtained matching information and a second preset matching condition, where the password verification succeeds when the matching is successful.
    Type: Grant
    Filed: September 30, 2017
    Date of Patent: February 13, 2024
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Qiang Tao, Jing Han, Guangyuan Gao
  • Patent number: 11899546
    Abstract: Systems and methods are described for improving portability of checkpoints of an application using central processing unit (CPU)-specific features. In an example, a system includes a source computing system and a destination computing system. The source computing system may be configured to: cause a first execution of an application that includes a function associated with a plurality of implementations; receive a request to resolve an implementation decision for the function; select, based on a set of source CPU-specific features, a source-specific implementation for the first execution of the function; patch, by rendering a resolved callsite table, a call site associated with the function with an address of the source-specific implementation; and send, to a destination computing system, a checkpoint of the application that includes the resolved callsite table.
    Type: Grant
    Filed: May 26, 2022
    Date of Patent: February 13, 2024
    Assignee: Red Hat, Inc.
    Inventors: Ashutosh Mehra, Daniel Heidinga
  • Patent number: 11902778
    Abstract: An electronic processor of a wireless fob is configured to establish a first communication link between the wireless fob and an external device, and receive, over the first communication link, first identification information and credential information of a power tool device from the external device. The electronic processor is further configured to receive, via the wireless transceiver, an identification signal including second identification information from the power tool device. The electronic processor is further configured to identify the power tool device by determining that the first identification information matches with the second identification information. The electronic processor is further configured to transmit the credential information to the power tool device to establish a second communication link between the wireless fob and the power tool device and transmit, over the second communication link, a command to the power tool device to control an operation of the power tool device.
    Type: Grant
    Filed: August 13, 2020
    Date of Patent: February 13, 2024
    Assignee: Milwaukee Electric Tool Corporation
    Inventors: Anthony Davis, Corey J. Dickert, Timothy R. Obermann
  • Patent number: 11899824
    Abstract: Disclosed are methods and systems for secure data communication amongst computer systems. Encrypted data in a first format is accessed over a secure communication channel from a first source for a first subject. Encrypted data in a second format is accessed over a secure communication channel from a second source for the first subject. The encrypted data in the first format from the first source and in the second format from the second source is decrypted. The decrypted data in the first format from the first source and in the second format from the second source is converted to a third format. At least partly in response to the request for information from a first system, at least a portion of the data from the first source and the second source is accessed from a database The accessed data is transmitted in encrypted form to the first system.
    Type: Grant
    Filed: August 25, 2023
    Date of Patent: February 13, 2024
    Assignee: Vive Concierge, Inc.
    Inventors: Dwayne Hall, Akwi Devine
  • Patent number: 11895195
    Abstract: In various examples there is a session border controller, SBC, connected between two communications networks. The SBC comprises a store holding statistics of events in the networks. The SBC also has an ingress receiving messages from the first communications network, the ingress having a memory storing an ingress message manipulation function MMF comprising a plurality of rules. The SBC has a session border controller processing unit connected to the ingress and receiving the messages from the ingress. The SBC has an egress connected to the session border controller processing unit, the egress receiving the messages from the session border controller processing unit and forwarding the messages, to the second communications network, the egress having a memory storing an egress message manipulation function MMF comprising a plurality of rules. At least some of the rules of the ingress MMF or egress MMF are for computing and storing the statistics.
    Type: Grant
    Filed: March 18, 2022
    Date of Patent: February 6, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Timothy James Pierrepont
  • Patent number: 11893121
    Abstract: An apparatus and method for providing cyber security defense in digital environments are provided. The apparatus includes a processor and a memory communicatively coupled to the at least a processor. The memory contains instructions configuring the at least a processor to receive a cyber profile associated with a digital environment. The processor is also configured to receive a risk profile associated with the cyber profile and analyze the cyber profile and risk profile. In addition, the processor is configured to generate a user interface data structure configured to display the determined risk score. A graphical user interface (GUI) is communicatively connected to the processor and the GUI is configured to receive the user interface data structure for the cyber-attack defense assessment and display the cyber-attack defense assessment.
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: February 6, 2024
    Inventors: David Imrem, Reuben Vandeventer
  • Patent number: 11893035
    Abstract: In some examples, a networked computing system comprises a backup node cluster of a backup service in communication with a host database node cluster of a host, a host database at least initially undiscovered by the backup node cluster, one or more processors coupled with memory storing instructions that, when executed, perform operations comprising at least installing a backup agent on at least one node of the host database node cluster, registering the host at the backup service, based on the host registration, triggering a host database discovery process to discover the undiscovered database automatically, the discovery process including a discovery call, in response to the discovery call, receiving metadata relating to the discovered database, and communicating with the discovered database.
    Type: Grant
    Filed: January 6, 2023
    Date of Patent: February 6, 2024
    Assignee: Rubrik, Inc.
    Inventors: Kevin Rui Luo, Deepti Kochar, Anshul Mohan Gupta
  • Patent number: 11895035
    Abstract: This disclosure describes systems, devices, and computer-implemented methods that facilitate the modification of network configuration data within a client network to improve a Quality of Experience (QoE) metric associated with the execution of a user application on a client device. More specifically, a diagnostic controller may retrieve diagnostic data associated with the execution of a user application on a client device, determine a QoE metric associated with the execution of the user application, and generate network configuration data for delivery to the client device that improves the QoE metric, based on the diagnostic data and the QoE metric.
    Type: Grant
    Filed: August 10, 2020
    Date of Patent: February 6, 2024
    Assignee: T-Mobile USA, Inc.
    Inventor: Kanakrai Chauhan
  • Patent number: 11888928
    Abstract: Embodiments of the disclosure provide systems and methods for performing a rapid failover in a cloud-based service with reduced interruption of ongoing communications. According to embodiments described herein, independent arbitration between servers can be used to indicate to a load balancer which of two or more servers should be considered the active one. This independent arbitration makes better state of health assessments than simple server failure. The load balancer can be explicitly controlled in this case. The health of individual containers, the completeness of the shadowed state as well as server health itself can be factored into the decision to make one server active over the other.
    Type: Grant
    Filed: April 15, 2022
    Date of Patent: January 30, 2024
    Assignee: Avaya Management L.P.
    Inventors: Kurt Haserodt, Philipp Schubert
  • Patent number: 11888716
    Abstract: Methods, systems, and apparatuses include evaluating a possibility of having more than a threshold number of connections with an access point of a network at a same time by multiple IoT devices that access the server through the network. In response to the evaluation, a determination of schedules for IoT devices is performed such that when the IoT devices operate according to the schedules the connections with the access point by the IoT devices that occur at the same time do not exceed the threshold number of connections. Configuration parameters are transmitted to the IoT devices causing the IoT devices to operate according to the schedules.
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: January 30, 2024
    Assignee: Samsara Inc.
    Inventor: Kevin Russell Coates Lloyd
  • Patent number: 11888965
    Abstract: A method for protection of data transfers for internet of things (IoT) devices using a blockchain includes: receiving, by a node in a blockchain network, a data message from an IoT device formatted according to an IoT messaging protocol and including a device identifier associated with the IoT device and encrypted data; generating a new block including one or more data values including the received data message; transmitting the generated new block to one or more additional nodes in the blockchain network; receiving a data request from an external device including an external identifier associated with the external device; verifying permission of the external device to access the encrypted data based on the external identifier and device identifier; and transmitting the encrypted data to the external device.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: January 30, 2024
    Assignee: MASTERCARD ASIA/PACIFIC PTE. LTD.
    Inventors: Hui Fang, Bensam Joyson, Anupam Sharma, Zunhua Wang
  • Patent number: 11888719
    Abstract: Techniques are described for generating an end-to-end distributed network trace involving cloud edge networks. In one example, a cloud or datacenter environment obtains, from an edge node in a cloud edge network, one or more network communications that include a correlation identifier associated with the one or more network communications and an identifier of the edge node. Based on the identifier of the edge node, the cloud or datacenter environment provides a network probe to the edge node. The cloud or datacenter environment obtains, from the edge node, telemetry data that is generated responsive to the network probe. The cloud or datacenter environment provides the telemetry data and the correlation identifier to an aggregation server that is configured to, based on the correlation identifier, aggregate the telemetry data with further telemetry data to generate an end-to-end distributed network trace associated with the one or more network communications.
    Type: Grant
    Filed: May 13, 2022
    Date of Patent: January 30, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventor: Hans F. Ashlock
  • Patent number: 11882012
    Abstract: Techniques are described for generating an end-to-end distributed trace in connection with a cloud or datacenter environment. In one example, a server obtains target application telemetry data and external telemetry data associated with one or more correlation identifiers included in one or more network communications provided to a target application in the cloud or datacenter environment. The server aggregates the target application telemetry data and the external telemetry data based on the one or more correlation identifiers to generate an end-to-end distributed trace associated with the one or more network communications.
    Type: Grant
    Filed: May 13, 2022
    Date of Patent: January 23, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Hans F. Ashlock, Cameron Esdaile, Walter T Hulick, Jr., Carlos M. Pignataro, Renato Quedas