Patents Examined by Michael D Anderson
  • Patent number: 11956634
    Abstract: The application discloses methods and corresponding systems and network devices and/or nodes for enabling user equipment belonging to a home network to access data communication services in a visited network of a wireless communication system. By way of example, there is provided a method that comprises the step of obtaining at least one cryptographic token originating from a network node of the home network of the user equipment and cryptographically signed by a private key associated with the home network, wherein the at least one cryptographic token represents means for accessing data communication services via user data transport functions of the visited network.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: April 9, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Tommy Arngren, Bernard Smeets, Tomas Thyni, Daniel Bergström
  • Patent number: 11947712
    Abstract: Embodiments are disclosed for a method. The method includes generating a correction datastore indicating shifts in magnitude representing corresponding characters that uniquely identify hardware comprising a computer processing chip. The method further includes generating security masks based on a correction file. Additionally, the method includes using a correction process for the computer processing chip. The generated security masks include corresponding overlays representing the shifts in magnitude with respect to corresponding product masks for the computer processing chip. The method also includes generating the computer processing chip using the security masks and the product masks.
    Type: Grant
    Filed: September 27, 2021
    Date of Patent: April 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Richard C. Johnson, Alex Richard Hubbard, Vinay Pai, Cody J. Murray, Fee Li Lie, Nikhil Jain
  • Patent number: 11941155
    Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.
    Type: Grant
    Filed: March 15, 2021
    Date of Patent: March 26, 2024
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 11937077
    Abstract: Systems and methods that update configuration parameters on a UE using control plane functionalities. In one embodiment, an AMF element of a mobile network receives a control plane message from a UDM element that includes a UE configuration parameter update for the UE. The UE configuration parameter update is security protected via a secured packet, integrity protection, etc. The AMF element is configured to transparently send the UE configuration parameter update to the UE. Thus, AMF element inserts the UE configuration parameter update (that is security protected) in a container of a Non-Access Stratum (NAS) message, and sends the NAS message to the UE. The UE may then update its configuration parameters based on the update when security checks are complete.
    Type: Grant
    Filed: October 4, 2019
    Date of Patent: March 19, 2024
    Assignee: NOKIA TECHNOLOGIES OY
    Inventor: Jennifer Liu
  • Patent number: 11936624
    Abstract: A method that is performed to access data nodes of a data cluster. The method includes obtaining, by a data access gateway (DAG), a first request from a host; and in response to the first request, obtaining first bidding counters from the data nodes; identifying, based on the first bidding counters, a first data node of the data nodes associated with a highest bidding counter of the first bidding counters; sending the first request to the first data node; and making a first determination that the first data node is able to service the first request.
    Type: Grant
    Filed: July 23, 2020
    Date of Patent: March 19, 2024
    Assignee: Dell Products L.P.
    Inventors: Dharmesh M. Patel, Ravikanth Chaganti
  • Patent number: 11902307
    Abstract: A system and method for assessing the identity fraud risk of an entity's (a user's, computer process's, or device's) behavior within a computer network and then to take appropriate action. The system uses real-time machine learning for its assessment. It records the entity's log-in behavior (conditions at log-in) and behavior once logged in to create an entity profile that helps identify behavior patterns. The system compares new entity behavior with the entity profile to determine a risk score and a confidence level for the behavior. If the risk score and confidence level indicate a credible identity fraud risk at log-in, the system can require more factors of authentication before log-in succeeds. If the system detects risky behavior after log-in, it can take remedial action such as ending the entity's session, curtailing the entity's privileges, or notifying a human administrator.
    Type: Grant
    Filed: December 1, 2020
    Date of Patent: February 13, 2024
    Assignee: CyberArk Software Ltd.
    Inventors: Yanlin Wang, Weizhi Li
  • Patent number: 11882098
    Abstract: A method that is performed to access data nodes of a data cluster. The method includes obtaining, by a data access gateway (DAG), a request from a host; and in response to the request, obtaining bidding counters from the data nodes; obtaining metadata mappings from the data nodes; identifying, based on the bidding counters and metadata mappings, a data node of the data nodes associated with a highest bidding counter of the bidding counters and an appropriate metadata mapping of the metadata mappings; and sending the request to the data node.
    Type: Grant
    Filed: July 23, 2020
    Date of Patent: January 23, 2024
    Assignee: Dell Products L.P.
    Inventors: Dharmesh M. Patel, Ravikanth Chaganti
  • Patent number: 11870884
    Abstract: Systems and methods for operating a cryptographic system. The methods comprise: obtaining ciphertext by the cryptographic system; performing operations by the cryptographic system to determine whether a given sequence of values exits within the ciphertext; and synchronizing the cryptographic system with another cryptographic system using the ciphertext as a bitrate portion of an initialization value for a cryptographic algorithm and zero as a capacity portion of the initialization value for the cryptographic algorithm, when a determination is made that the given sequence of values exist within the ciphertext.
    Type: Grant
    Filed: April 13, 2021
    Date of Patent: January 9, 2024
    Assignee: HARRIS GLOBAL COMMUNICATIONS, INC.
    Inventors: Steven M. Farris, Michael T. Kurdziel
  • Patent number: 11868480
    Abstract: Provided are mechanisms and processes for computational risk analysis and intermediation. Security practices information characterizing security measures in place at a first computing system may be received from the first computing system via a network. Computing services interaction information characterizing data transmitted from a second computing system to the first computing system may be received from the second computing system via the network. A processor may determine a risk profile for the first computing system based on the security practices information. Based on the risk profile and the computing services interaction information, the processor may then determine an estimate of the information security risk associated with transmitting the data from the second computing system to the first computing system. A risk assessment message including the estimate of the information security risk may be transmitted to the second computing system.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: January 9, 2024
    Assignee: VALENTE SHERMAN, INC.
    Inventors: Russell Sherman, Paul Valente
  • Patent number: 11860983
    Abstract: A data privacy protecting tool operates on behalf of a user to watermark or otherwise fingerprint selected data provided to a digital service provider (DSP) sites/apps. The watermarked data can then be used to monitor a DSP's compliance with distribution or access rules for the user data.
    Type: Grant
    Filed: December 19, 2020
    Date of Patent: January 2, 2024
    Assignee: Cambrian Designs, Inc.
    Inventors: Olaf Jonny Groth, Mark Jay Nitzberg, Manu Kalia, Tobias Christopher Straube, Daniel A Zehr
  • Patent number: 11863979
    Abstract: Device-side, translator functions may be authenticated by elements of a 5G core network before communications involving such functions are allowed to occur, or continue to occur.
    Type: Grant
    Filed: August 12, 2020
    Date of Patent: January 2, 2024
    Inventors: Devaki Chandramouli, Kari Niemela, Pilar Andrés Maldonado, Rakash Sivasiva Ganesan
  • Patent number: 11847206
    Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.
    Type: Grant
    Filed: July 2, 2021
    Date of Patent: December 19, 2023
    Assignee: INTEL CORPORATION
    Inventors: Mingwei Zhang, Mingqiu Sun, Ravi L. Sahita, Chunhui Zhang, Xiaoning Li
  • Patent number: 11838275
    Abstract: A method, system, and computer-usable medium are disclosed, comprising: initiating a web transaction between an endpoint device and a target web server; automatically switching between a first communication mode and a second communication mode in response to one or more communication performance conditions associated with conducting the web transaction, where the endpoint device communicates with the target web server using an intermediate proxy server in the first communication mode; and the endpoint device communicates with the target web server without using the intermediate proxy server in the second communication mode. Other embodiments include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.
    Type: Grant
    Filed: March 12, 2021
    Date of Patent: December 5, 2023
    Assignee: Forcepoint LLC
    Inventors: Kunal Agarwal, Aidan Power, Sergii Shkonda, Timothy O'Leary
  • Patent number: 11831678
    Abstract: Described embodiments provide systems and methods for detecting autonomous programs is provided. A device, intermediary to a plurality of clients and a plurality of servers, can receive a first request from a first client of the plurality of clients to a server of the plurality of servers via a connection between the device and the first client. The device can include, into a response from the server to the first client, a uniform resource locator (URL) comprising one or more randomly generated characters within a predetermined character space. The device can determine that the first client has an autonomous program responsive to receiving a second request from the first client using the URL. The device can terminate, responsive to the determination, the connection to the first client.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: November 28, 2023
    Assignee: Citrix Systems, Inc.
    Inventors: Rakesh Kumar Thangellapalli, Rama Rao Katta, Kasirao Velugu, Praveen Dandin, Aman Agrawal, Seth Kenneth Keith, Ratnesh Singh Thakur, Josephine Suganthi Joseph Leo
  • Patent number: 11831658
    Abstract: The present invention provides an integrated, context-aware, security system that provides an adaptive endpoint security agent architecture model for a continuously monitoring and recording activity across an enterprise, specifically monitoring activity on endpoints, and subsequently detecting and blocking any malicious processes that may otherwise invade the enterprise and cause issues. The endpoint security agent architecture exposes a well-defined, public interface to the event data generated by the endpoint security agent in the form of a custom programming language by which a user can define the logic that the endpoint security agent executes in response to event data to perform detection of and response to suspicious activity.
    Type: Grant
    Filed: January 11, 2019
    Date of Patent: November 28, 2023
    Assignee: Nuix Limited
    Inventors: John Dwyer, Benjamin McNichols, Martin Pillion, Kevin Wenchel
  • Patent number: 11811799
    Abstract: A method, system and computer-usable medium for constructing a distribution of interrelated event features. The constructing a distribution of interrelated event features includes receiving a stream of events, the stream of events comprising a plurality of events; extracting features from the plurality of events; constructing a distribution of the features from the plurality of events; and, analyzing the distribution of the features from the plurality of events.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: November 7, 2023
    Assignee: Forcepoint LLC
    Inventors: Eduardo Luiggi, Christopher Poirel, Ann Irvine
  • Patent number: 11809545
    Abstract: Data integrity logic is executable by a processor to generate a data integrity code using a hardware-based secret. A container manager, executable by the processor, creates a secured container including report generation logic that determines measurements of the secured container, generates a report according to a defined report format, and sends a quote request including the report. The defined report format includes a field to include the measurements and a field to include the data integrity code, and the report format is compatible for consumption by any one of a plurality of different quote creator types.
    Type: Grant
    Filed: July 1, 2022
    Date of Patent: November 7, 2023
    Assignee: Intel Corporation, Inc.
    Inventors: Vincent R. Scarlata, Carlos V. Rozas, Baiju Patel, Barry E. Huntley, Ravi L. Sahita, Hormuzd M. Khosravi
  • Patent number: 11799852
    Abstract: A wireless earpiece system, method, and one or more wireless earpieces for communications between one or more wireless earpieces and a wireless dongle. The one or more wireless earpieces are associated with the wireless dongle. Biometric readings of a user are performed using the wireless earpieces. Content is communicated between the one or more wireless earpieces and the wireless dongle in response to determining the user is authorized to communicate with the wireless dongle based on the biometric readings. The wireless dongle is physically connected to a report of a system.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: October 24, 2023
    Assignee: BRAGI GMBH
    Inventor: Peter Vincent Boesen
  • Patent number: 11799918
    Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.
    Type: Grant
    Filed: June 16, 2021
    Date of Patent: October 24, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Neeraj Surana, Kantha Rao Dammalapati
  • Patent number: 11778463
    Abstract: Presented herein are techniques to provide for the ability to utilize 3GPP-generated Session Keys that can be generated via a primary authentication or a secondary authentication process for a user equipment (UE) via a private wireless wide area (WWA) access network in which the keys can be leveraged to facilitate connection of the UE to a wireless local area (WLA) access network. In one example, a method may include obtaining a request to authenticate a UE for connection to a WWA access network; determining that the UE is capable of a Fast Transition (FT) capability; authenticating the UE for connection to the WWA access in which, based on the FT capability, the authenticating includes generating a root security key for the UE; and upon determining that the UE is attempting to access the WLA access network, providing the root security key for the UE to the WLA access network.
    Type: Grant
    Filed: October 13, 2020
    Date of Patent: October 3, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Srinath Gundavelli, Indermeet Singh Gandhi