Patents Examined by Michael D Anderson
-
Patent number: 11956634Abstract: The application discloses methods and corresponding systems and network devices and/or nodes for enabling user equipment belonging to a home network to access data communication services in a visited network of a wireless communication system. By way of example, there is provided a method that comprises the step of obtaining at least one cryptographic token originating from a network node of the home network of the user equipment and cryptographically signed by a private key associated with the home network, wherein the at least one cryptographic token represents means for accessing data communication services via user data transport functions of the visited network.Type: GrantFiled: April 25, 2019Date of Patent: April 9, 2024Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Tommy Arngren, Bernard Smeets, Tomas Thyni, Daniel Bergström
-
Patent number: 11947712Abstract: Embodiments are disclosed for a method. The method includes generating a correction datastore indicating shifts in magnitude representing corresponding characters that uniquely identify hardware comprising a computer processing chip. The method further includes generating security masks based on a correction file. Additionally, the method includes using a correction process for the computer processing chip. The generated security masks include corresponding overlays representing the shifts in magnitude with respect to corresponding product masks for the computer processing chip. The method also includes generating the computer processing chip using the security masks and the product masks.Type: GrantFiled: September 27, 2021Date of Patent: April 2, 2024Assignee: International Business Machines CorporationInventors: Richard C. Johnson, Alex Richard Hubbard, Vinay Pai, Cody J. Murray, Fee Li Lie, Nikhil Jain
-
Patent number: 11941155Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.Type: GrantFiled: March 15, 2021Date of Patent: March 26, 2024Assignee: EMC IP Holding Company LLCInventors: Mohamed Sohail, Said Tabet
-
Patent number: 11937077Abstract: Systems and methods that update configuration parameters on a UE using control plane functionalities. In one embodiment, an AMF element of a mobile network receives a control plane message from a UDM element that includes a UE configuration parameter update for the UE. The UE configuration parameter update is security protected via a secured packet, integrity protection, etc. The AMF element is configured to transparently send the UE configuration parameter update to the UE. Thus, AMF element inserts the UE configuration parameter update (that is security protected) in a container of a Non-Access Stratum (NAS) message, and sends the NAS message to the UE. The UE may then update its configuration parameters based on the update when security checks are complete.Type: GrantFiled: October 4, 2019Date of Patent: March 19, 2024Assignee: NOKIA TECHNOLOGIES OYInventor: Jennifer Liu
-
Patent number: 11936624Abstract: A method that is performed to access data nodes of a data cluster. The method includes obtaining, by a data access gateway (DAG), a first request from a host; and in response to the first request, obtaining first bidding counters from the data nodes; identifying, based on the first bidding counters, a first data node of the data nodes associated with a highest bidding counter of the first bidding counters; sending the first request to the first data node; and making a first determination that the first data node is able to service the first request.Type: GrantFiled: July 23, 2020Date of Patent: March 19, 2024Assignee: Dell Products L.P.Inventors: Dharmesh M. Patel, Ravikanth Chaganti
-
Patent number: 11902307Abstract: A system and method for assessing the identity fraud risk of an entity's (a user's, computer process's, or device's) behavior within a computer network and then to take appropriate action. The system uses real-time machine learning for its assessment. It records the entity's log-in behavior (conditions at log-in) and behavior once logged in to create an entity profile that helps identify behavior patterns. The system compares new entity behavior with the entity profile to determine a risk score and a confidence level for the behavior. If the risk score and confidence level indicate a credible identity fraud risk at log-in, the system can require more factors of authentication before log-in succeeds. If the system detects risky behavior after log-in, it can take remedial action such as ending the entity's session, curtailing the entity's privileges, or notifying a human administrator.Type: GrantFiled: December 1, 2020Date of Patent: February 13, 2024Assignee: CyberArk Software Ltd.Inventors: Yanlin Wang, Weizhi Li
-
Patent number: 11882098Abstract: A method that is performed to access data nodes of a data cluster. The method includes obtaining, by a data access gateway (DAG), a request from a host; and in response to the request, obtaining bidding counters from the data nodes; obtaining metadata mappings from the data nodes; identifying, based on the bidding counters and metadata mappings, a data node of the data nodes associated with a highest bidding counter of the bidding counters and an appropriate metadata mapping of the metadata mappings; and sending the request to the data node.Type: GrantFiled: July 23, 2020Date of Patent: January 23, 2024Assignee: Dell Products L.P.Inventors: Dharmesh M. Patel, Ravikanth Chaganti
-
Patent number: 11870884Abstract: Systems and methods for operating a cryptographic system. The methods comprise: obtaining ciphertext by the cryptographic system; performing operations by the cryptographic system to determine whether a given sequence of values exits within the ciphertext; and synchronizing the cryptographic system with another cryptographic system using the ciphertext as a bitrate portion of an initialization value for a cryptographic algorithm and zero as a capacity portion of the initialization value for the cryptographic algorithm, when a determination is made that the given sequence of values exist within the ciphertext.Type: GrantFiled: April 13, 2021Date of Patent: January 9, 2024Assignee: HARRIS GLOBAL COMMUNICATIONS, INC.Inventors: Steven M. Farris, Michael T. Kurdziel
-
Patent number: 11868480Abstract: Provided are mechanisms and processes for computational risk analysis and intermediation. Security practices information characterizing security measures in place at a first computing system may be received from the first computing system via a network. Computing services interaction information characterizing data transmitted from a second computing system to the first computing system may be received from the second computing system via the network. A processor may determine a risk profile for the first computing system based on the security practices information. Based on the risk profile and the computing services interaction information, the processor may then determine an estimate of the information security risk associated with transmitting the data from the second computing system to the first computing system. A risk assessment message including the estimate of the information security risk may be transmitted to the second computing system.Type: GrantFiled: June 3, 2021Date of Patent: January 9, 2024Assignee: VALENTE SHERMAN, INC.Inventors: Russell Sherman, Paul Valente
-
Patent number: 11860983Abstract: A data privacy protecting tool operates on behalf of a user to watermark or otherwise fingerprint selected data provided to a digital service provider (DSP) sites/apps. The watermarked data can then be used to monitor a DSP's compliance with distribution or access rules for the user data.Type: GrantFiled: December 19, 2020Date of Patent: January 2, 2024Assignee: Cambrian Designs, Inc.Inventors: Olaf Jonny Groth, Mark Jay Nitzberg, Manu Kalia, Tobias Christopher Straube, Daniel A Zehr
-
Patent number: 11863979Abstract: Device-side, translator functions may be authenticated by elements of a 5G core network before communications involving such functions are allowed to occur, or continue to occur.Type: GrantFiled: August 12, 2020Date of Patent: January 2, 2024Inventors: Devaki Chandramouli, Kari Niemela, Pilar Andrés Maldonado, Rakash Sivasiva Ganesan
-
Patent number: 11847206Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.Type: GrantFiled: July 2, 2021Date of Patent: December 19, 2023Assignee: INTEL CORPORATIONInventors: Mingwei Zhang, Mingqiu Sun, Ravi L. Sahita, Chunhui Zhang, Xiaoning Li
-
Patent number: 11838275Abstract: A method, system, and computer-usable medium are disclosed, comprising: initiating a web transaction between an endpoint device and a target web server; automatically switching between a first communication mode and a second communication mode in response to one or more communication performance conditions associated with conducting the web transaction, where the endpoint device communicates with the target web server using an intermediate proxy server in the first communication mode; and the endpoint device communicates with the target web server without using the intermediate proxy server in the second communication mode. Other embodiments include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.Type: GrantFiled: March 12, 2021Date of Patent: December 5, 2023Assignee: Forcepoint LLCInventors: Kunal Agarwal, Aidan Power, Sergii Shkonda, Timothy O'Leary
-
Patent number: 11831678Abstract: Described embodiments provide systems and methods for detecting autonomous programs is provided. A device, intermediary to a plurality of clients and a plurality of servers, can receive a first request from a first client of the plurality of clients to a server of the plurality of servers via a connection between the device and the first client. The device can include, into a response from the server to the first client, a uniform resource locator (URL) comprising one or more randomly generated characters within a predetermined character space. The device can determine that the first client has an autonomous program responsive to receiving a second request from the first client using the URL. The device can terminate, responsive to the determination, the connection to the first client.Type: GrantFiled: March 4, 2020Date of Patent: November 28, 2023Assignee: Citrix Systems, Inc.Inventors: Rakesh Kumar Thangellapalli, Rama Rao Katta, Kasirao Velugu, Praveen Dandin, Aman Agrawal, Seth Kenneth Keith, Ratnesh Singh Thakur, Josephine Suganthi Joseph Leo
-
Patent number: 11831658Abstract: The present invention provides an integrated, context-aware, security system that provides an adaptive endpoint security agent architecture model for a continuously monitoring and recording activity across an enterprise, specifically monitoring activity on endpoints, and subsequently detecting and blocking any malicious processes that may otherwise invade the enterprise and cause issues. The endpoint security agent architecture exposes a well-defined, public interface to the event data generated by the endpoint security agent in the form of a custom programming language by which a user can define the logic that the endpoint security agent executes in response to event data to perform detection of and response to suspicious activity.Type: GrantFiled: January 11, 2019Date of Patent: November 28, 2023Assignee: Nuix LimitedInventors: John Dwyer, Benjamin McNichols, Martin Pillion, Kevin Wenchel
-
Patent number: 11811799Abstract: A method, system and computer-usable medium for constructing a distribution of interrelated event features. The constructing a distribution of interrelated event features includes receiving a stream of events, the stream of events comprising a plurality of events; extracting features from the plurality of events; constructing a distribution of the features from the plurality of events; and, analyzing the distribution of the features from the plurality of events.Type: GrantFiled: August 31, 2018Date of Patent: November 7, 2023Assignee: Forcepoint LLCInventors: Eduardo Luiggi, Christopher Poirel, Ann Irvine
-
Patent number: 11809545Abstract: Data integrity logic is executable by a processor to generate a data integrity code using a hardware-based secret. A container manager, executable by the processor, creates a secured container including report generation logic that determines measurements of the secured container, generates a report according to a defined report format, and sends a quote request including the report. The defined report format includes a field to include the measurements and a field to include the data integrity code, and the report format is compatible for consumption by any one of a plurality of different quote creator types.Type: GrantFiled: July 1, 2022Date of Patent: November 7, 2023Assignee: Intel Corporation, Inc.Inventors: Vincent R. Scarlata, Carlos V. Rozas, Baiju Patel, Barry E. Huntley, Ravi L. Sahita, Hormuzd M. Khosravi
-
Patent number: 11799852Abstract: A wireless earpiece system, method, and one or more wireless earpieces for communications between one or more wireless earpieces and a wireless dongle. The one or more wireless earpieces are associated with the wireless dongle. Biometric readings of a user are performed using the wireless earpieces. Content is communicated between the one or more wireless earpieces and the wireless dongle in response to determining the user is authorized to communicate with the wireless dongle based on the biometric readings. The wireless dongle is physically connected to a report of a system.Type: GrantFiled: March 28, 2017Date of Patent: October 24, 2023Assignee: BRAGI GMBHInventor: Peter Vincent Boesen
-
Patent number: 11799918Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.Type: GrantFiled: June 16, 2021Date of Patent: October 24, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Neeraj Surana, Kantha Rao Dammalapati
-
Patent number: 11778463Abstract: Presented herein are techniques to provide for the ability to utilize 3GPP-generated Session Keys that can be generated via a primary authentication or a secondary authentication process for a user equipment (UE) via a private wireless wide area (WWA) access network in which the keys can be leveraged to facilitate connection of the UE to a wireless local area (WLA) access network. In one example, a method may include obtaining a request to authenticate a UE for connection to a WWA access network; determining that the UE is capable of a Fast Transition (FT) capability; authenticating the UE for connection to the WWA access in which, based on the FT capability, the authenticating includes generating a root security key for the UE; and upon determining that the UE is attempting to access the WLA access network, providing the root security key for the UE to the WLA access network.Type: GrantFiled: October 13, 2020Date of Patent: October 3, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Srinath Gundavelli, Indermeet Singh Gandhi