Patents Examined by Meng Li
  • Patent number: 12039054
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to detect a request for a sign-up form from a client device to a remote server. The at least one processor is further configured to generate a code module based on the detection. The code module is configured to request a credential vulnerability check from an application management server. The at least one processor is further configured to provide the code module to the client device for execution on the client device in response to an attempted submission of the sign-up form. The at least one processor is further configured to receive a result of the credential vulnerability check from the client device and perform a security action in response to the credential vulnerability check indicating vulnerable credentials.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: July 16, 2024
    Assignee: Citrix Systems, Inc.
    Inventor: Rama Rao Katta
  • Patent number: 12039056
    Abstract: Systems, methods, and other embodiments described herein relate to securing software composition information in a software management environment. In one embodiment, a method includes acquiring, in a managing device, identifying information about a software package installed on a remote device, including a unique identifier of an entity associated with the software package, and a secure identifier that combines the unique identifier with a package identifier of the software package. The method includes, responsive to identifying a vulnerability, generating a vulnerability identifier using the unique identifier of the entity and a vulnerability label that identifies a vulnerable package that includes the vulnerability. The method includes comparing the vulnerability identifier with the secure identifier to determine whether the software package includes the vulnerability. The method includes providing a response about the vulnerability when the vulnerability identifier matches the secure identifier.
    Type: Grant
    Filed: March 10, 2022
    Date of Patent: July 16, 2024
    Assignee: Denso Corporation
    Inventors: Ameer Kashani, Carlos Mora-Golding, Gopalakrishnan Iyer
  • Patent number: 12032718
    Abstract: A system for securely handling and storing customer data without enabling human access to the data receives and processes the customer data for storage where the customer data is granularly encrypting without storing a key for decryption. The granularly-encrypted customer data is transmitted over a secure network to a cloud-based data storage system that has no access to the key for decryption. The system receives a request from the customer to transmit the customer data to an external destination. The system retrieves the granularly-encrypted customer data from the cloud-based data storage system over a secure network and receives the key for decryption from the customer. The system decrypts the granularly-encrypted customer data using the key and discards the key. The system processes the customer data for transmission and transmits the customer data to the external destination over a secure network.
    Type: Grant
    Filed: January 22, 2021
    Date of Patent: July 9, 2024
    Assignee: Odaseva Technologies SAS
    Inventors: Sovane Bin, Saddek Dekoum, Raphaƫl Fonrouge, Francois Lopitaux
  • Patent number: 12032685
    Abstract: The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted.
    Type: Grant
    Filed: September 29, 2022
    Date of Patent: July 9, 2024
    Assignee: Snowflake Inc.
    Inventors: Thierry Cruanes, Ganeshan Ramachandran Iyer, Isaac Kunen
  • Patent number: 12026275
    Abstract: In a method for electronic data card enhancements, at least one electronic data card may be requested containing data within a plurality of data elements. At least one value adding feature may be determined applicable to the data. Additionally, the at least one value adding feature may be applied to the data, and the at least one electronic data card may be presented containing data and the applied at least one value adding feature of the data.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: July 2, 2024
    Assignee: MicroStrategy Incorporated
    Inventors: Tejas Sahasranaman, Nida Imtiaz, Siyuan Fan, Xiuyi Ye
  • Patent number: 12028378
    Abstract: A method for resuming a Transport Layer Security (TLS) session in a Service Function Chain comprising a plurality of Service Function nodes coupled to a Service Function Forwarder. A request is received at a first Service Function node to establish a TLS session, and a Pre-Shared Key (PSK) and a PSK identifier that uniquely correspond to the first Service Function node and the TLS session are generated. The PSK identifier is forwarded to one or more of the Service Function Forwarder and the plurality of Service Function nodes. A request to resume the TLS session is received from a client device that previously disconnected. It is determined that the connection request contains the PSK identifier, a second Service Function node is selected, and the TLS session is re-established between the client device and the second Service Function node using the same PSK as the prior TLS session.
    Type: Grant
    Filed: December 19, 2022
    Date of Patent: July 2, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: K Tirumaleswar Reddy, Prashanth Patil, Carlos M. Pignataro
  • Patent number: 12022281
    Abstract: Methods and systems are disclosed herein for secure communication between computing devices. A mobile device may communicate with an untrusted device to cause the untrusted device to send information (e.g., encrypted information that the untrusted device is unable to decrypt) to a server using an Internet connection of the untrusted device. The mobile device may have limited or no access to the Internet. To prevent potential security risks associated with using a public or untrusted device, the mobile device may encrypt information stored on the mobile device (e.g., stored in a mobile application associated with the server), send it to the untrusted device (e.g., by displaying a QR code to a camera of the untrusted device), and the untrusted device may send the information to the server via a network connection of the untrusted device.
    Type: Grant
    Filed: June 23, 2021
    Date of Patent: June 25, 2024
    Assignee: Capital One Services, LLC
    Inventors: Rajko Ilincic, Lin Ni Lisa Cheng, Phoebe Atkins, Deny Daniel, Cruz Vargas
  • Patent number: 12015692
    Abstract: A method includes obtaining a plurality of representative vectors associated with face-related data. The method includes determining an encryption key based on a parameter stored in a record, generating an encrypted vector set by, for each respective vector of the plurality of representative vectors, encrypting the respective vector with a homomorphic encryption operation based on the encryption key, where the encrypted vector set includes a first encrypted vector that is linked to a subset of the face-related data associated with the first plurality of face vectors. The method further includes obtaining an encrypted face search vector using the encryption key to perform homomorphic encryption. The method further includes selecting a first encrypted vector based on the encrypted face search vector and retrieving the subset of the face-related data based on the first encrypted vector.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: June 18, 2024
    Assignee: Verkada Inc.
    Inventors: Kiumars Soltani, Yuewei Wang, Kabir Chhabra, Jose M. Giron Nanne, Yunchao Gong
  • Patent number: 12010230
    Abstract: The reliability of a second public key which is part of a second key pair generated in association with a first key pair is certified. A generating apparatus 210 provides certification data to a receiving apparatus 220 (S301). The receiving apparatus 220 transmits a certification request requesting a certification that the second public key PK2 is in a parent-child relationship with the first public key PKI to a certifying apparatus 230 (S302). In this example, the certification request includes the certification data, but if the certification data is provided directly from the generating apparatus 210 to the certifying apparatus 230, the certification request does not need to include the certification data. The certifying apparatus 230 verifies the certification data by calculating a verification formula for the certification data in response to the certification request (S303).
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: June 11, 2024
    Inventor: Takafumi Komiyama
  • Patent number: 12003958
    Abstract: An electronic device and an electronic device operating method according to various embodiments comprises: a processor operationally connected to the first communication module, the second communication module, and the security module, wherein the processor can be configured to control the second communication module such that the second communication module activates the accessory in response to the reception, through the first communication scheme, of a discovery signal broadcasted by the external electronic device, control the second communication module such that the second communication module transmits, to the accessory through the third communication scheme, the data to be used for authentication with the external electronic device, and control the accessory such that the accessory transmits, to the external electronic device through the second communication scheme, the data to be used for authentication with the external electronic device.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: June 4, 2024
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Yi Yang, Jonghwan Kim, Jaehyung Seo, Jiho Shin, Jonghoon Jang
  • Patent number: 11995192
    Abstract: A computer-implemented static analysis system for binary executables and source code configured to detect vulnerabilities, undocumented features and other input program errors. The system uses a fuzzy logic engine to reduce a number of false positives and false negatives results. The system has a decompiler configured to receive a source code of an input program and represent the input program in a target low-level language code (LLC) intermediate representation (IR) and a frontend configured to receive a binary code representation of the input program and represent the input program in the target LLC IR. The system further has an analyzer configured to receive the target LLC IR and analyze the target LLC IR to detect vulnerabilities, undocumented features and input program errors using predetermined rules stored in a rule module and provided to the analyzer. The analyzer uses the fuzzy logic engine to receive substantially more accurate results.
    Type: Grant
    Filed: December 15, 2021
    Date of Patent: May 28, 2024
    Inventor: Daniil Vladimirovich Chernov
  • Patent number: 11997748
    Abstract: Methods and systems for MT (mobile terminated) call recovery in an IP multimedia system (IMS) network are discussed herein. A method according to an implementation comprises receiving, via a network, a request to establish a call session with a user equipment (UE); sending, to a first serving call session control function (S-CSCF), a first invite associated with the request; determining that no response is received from the first S-CSCF after a pre-set time period; sending, to a second S-CSCF, a second invite associated with the request, causing the second S-CSCF to perform actions including: obtaining an authentication to establish the call session; and sending, to a proxy call session control function (P-CSCF) of the UE, a third invite associated with the request; and receiving, via the network, a confirmation that the call session with the UE is established.
    Type: Grant
    Filed: August 24, 2021
    Date of Patent: May 28, 2024
    Assignee: T-Mobile USA, Inc.
    Inventors: Venkata Satya Sureshkumar Kondeti, Karthik Adepalli Sri Lakshmi
  • Patent number: 11991266
    Abstract: Some embodiments are directed to a fully homomorphic encryption (FHE) cryptography, wherein some encrypted data items are clipped, thereby reducing a bit-size of the encrypted data item and increasing an associated noise level of the encrypted data item. An FHE operation or a decrypt operation that operates on the clipped encrypted data item as input, has noise tolerance above a noise level associated with the clipped encrypted data item.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: May 21, 2024
    Assignee: ZAMA SAS
    Inventor: Marc Joye
  • Patent number: 11991213
    Abstract: The technology disclosed includes a system to group security alerts generated in a computer network and prioritize grouped security alerts for analysis, through graph-based clustering. The graph used to form clusters includes entities in the computer network represented as scored nodes, and relationships of entities as weighted edges. The technology disclosed includes traversing the graph starting at starting nodes and propagating native scores through and to neighboring nodes connected by the weighted edges. The propagated scores at visited nodes are normalized by attenuation based on contributing neighboring nodes of a respective visited node. An aggregate score for a visited node is calculated by accumulating propagated scores at visited nodes with their respective native scores. The technology disclosed forms clusters of connected nodes in the graph that have a respective aggregate score above a selected threshold. The clusters are ranked and prioritized for analysis, pursuant to the aggregate scores.
    Type: Grant
    Filed: December 20, 2022
    Date of Patent: May 21, 2024
    Assignee: Netskope, Inc.
    Inventors: Joshua David Batson, Raymond Joseph Canzanese, Jr.
  • Patent number: 11977657
    Abstract: Provided is a system and method for confidential repository searching. The method executed on a first computing device and includes: receiving an encrypted query term from the second computing device; searching the encrypted data repository by determining one or more matches of the encrypted query term to data in the encrypted data repository; communicating the one or more matches to the second computing device; receiving associative data from the second computing device, the associative data associated with data in the encrypted data repository that is to be retrieved and associated with one of the one or more matches; retrieving the encrypted data in the encrypted data repository associated with the received associative data; and communicating the retrieved encrypted data to the second computing device.
    Type: Grant
    Filed: February 22, 2023
    Date of Patent: May 7, 2024
    Inventors: Joshua Calafato, Shariq Khalil Ahmed, Yousef Sadrossadat, Yeqi Shi, Alhassan Khedr, Glenn Gulak
  • Patent number: 11966473
    Abstract: Methods, apparatus, systems and articles of manufacture to identify a side-channel attack are disclosed. Example instructions cause one or more processors to generate an event vector based on one or more counts corresponding to tasks performed by a central processing unit; determine distances between the event vector and weight vectors of neurons in a self-organizing map; select a neuron of the neurons that results based on a determined distance; identify neurons that neighbor the selected neuron; and update at least one of a weight vector of the selected neuron or weight vectors of the neighboring neurons based on the determined distance of the selected neuron.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: April 23, 2024
    Inventors: Mohammad Mejbah Ul Alam, Justin Gottschlich, Shengtian Zhou
  • Patent number: 11956353
    Abstract: Provided with a technology of a machine learning using a convolutional neural network depending on practical calculation cost and security level desired by a user.
    Type: Grant
    Filed: September 15, 2023
    Date of Patent: April 9, 2024
    Assignee: EAGLYS Inc.
    Inventor: Kentaro Mihara
  • Patent number: 11956268
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for AI based privacy amplification. A data security system allows for data transmitted between devices to be secured using varying levels of data security that are adjusted dynamically based on the determined sensitivity level of the data. The data security system uses AI (e.g., machine learning models) to predict the sensitivity level of data being transmitted between the devices in real-time and applies an appropriate level of data security based on the predicted sensitivity level. Dynamically adjusting the level of data security that is used based on the sensitivity level of the data provides for heightened levels of data security to protect highly sensitive data, and lower levels of data security to conserve computing resources when protecting less sensitive data.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: April 9, 2024
    Assignee: Davidson Technologies, Inc.
    Inventor: Lisa C. Hammitt
  • Patent number: 11956215
    Abstract: Systems and methods for blurring connection information in virtual private networks are provided herein. In some embodiments, a method of blurring VPN connection metadata may comprise: receiving, by a VPN service provider infrastructure, a request from a user device to establish a VPN connection with one or more VPN servers, wherein the VPN service provider infrastructure includes a logic engine configured to perform statistical blurring of VPN connection metadata; establishing a connection between the user device and one or more target sites during a VPN session; receiving, from the one or more VPN servers, VPN connection metadata associated with the user's VPN connections and a user identifier associated with the user; performing statistical blurring of VPN connection metadata by modifying the VPN connection metadata using an unknown random value to create blurred connection metadata; and storing the blurred connection metadata in association with the user identifier received.
    Type: Grant
    Filed: November 8, 2021
    Date of Patent: April 9, 2024
    Assignee: UAB 360 IT
    Inventor: Laimutis Nedzinskas
  • Patent number: 11947697
    Abstract: In general, the invention relates to providing computer implemented services using information handling systems. One or more embodiments of the invention includes receiving a request to decompose a composed information handling system, wherein the composed information handling system comprises a hardware resource, obtaining a cleaning requirement for the hardware resource, initiating, based on the cleaning requirement, a cleaning operation on the hardware resource, receive a confirmation that the cleaning operation is complete, and after receiving the confirmation, set a state of the hardware resource to allocatable.
    Type: Grant
    Filed: July 22, 2021
    Date of Patent: April 2, 2024
    Assignee: Dell Products L.P.
    Inventors: William Price Dawkins, Valerie Diane Padilla, Jon Robert Hass, Sudhir Vittal Shetty