Patents Examined by Michael Pyzocha
  • Patent number: 11768970
    Abstract: A secure computing device having a storage arrangement configured to store a secret. The secure computing device includes a first interface configured to control a display, and a second interface configured to receive an input signal having information which reproduces a prompt to display the secret. The secure computing device is designed to read the secret from the storage arrangement on the basis of the input signal, and to control the display via the first interface in such a way that a display of the secret is effected.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: September 26, 2023
    Assignee: Infineon Technologies AG
    Inventors: Andrea Hoeller, Walther Pachler
  • Patent number: 11765058
    Abstract: Systems are provided for facilitating the disclosed methods for performing event storage and diagnostic processing within a hybrid cloud environment. Event records are gathered and batched at an on-premises server. The event records are also appended with correlation vector data that enables the event records to be correlated with other events. The batch of event record batches are signed with a security key associated with a cloud storage container and the on-premises server is restricted to writing the batch of event records to the container. In some instances, the size of the batch is based on a duration of time for collecting records, which can be adjusted to accommodate for missing data.
    Type: Grant
    Filed: January 11, 2022
    Date of Patent: September 19, 2023
    Assignee: Microsoft Technology Licesning, LLC
    Inventors: Bhatt Rutwick Bharatkumar, Asudani Mohit
  • Patent number: 11762991
    Abstract: The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis. The method comprises receiving a first security event captured by a first security operation associated with a computing device, and receiving a second security event captured by a second security operation associated with the computing device. The first security event and the second security event are associated with an attack campaign. The method further comprises mapping the first security event to first security data in an attack repository, and mapping the second security event to second security data in the attack repository. The method also comprises determining based on the mapping, one or more attack execution operations for executing the attack campaign associated with the first security event and the second security event. Additionally, the method sequences the one or more attack execution operations to form an attack kill chain.
    Type: Grant
    Filed: May 16, 2022
    Date of Patent: September 19, 2023
    Assignee: QUALYS, INC.
    Inventors: Ankur S. Tyagi, Mayuresh Vishwas Dani
  • Patent number: 11755717
    Abstract: A method, apparatus, system, and computer program product for configuring a computing environment. A configuration profile is identified by a computer system for the computing environment that is to be deployed in which the computing environment meets a security policy to run an application in the computing environment. A determination is made, by the computer system, as to whether the configuration profile for the computing environment meets the security policy for running the application in the computing environment. The configuration profile for the computing environment is deployed, by the computer system, to configure the computing environment for the application in response to the configuration profile meeting the security policy.
    Type: Grant
    Filed: March 18, 2021
    Date of Patent: September 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Adam Robert Geiger, Nataraj Nagaratnam, Dinakaran Joseph, Michael S. Law, Priyank Narvekar, Hillery Hunter
  • Patent number: 11750592
    Abstract: The object of the invention relates to a method in which a telecommunications operator or an e-delivery provider can send notices by email to one or a number of recipients, certifying the content of the notice and with a link to a proxy server of a CA (certification authority) who will verify the digital certificate of the recipient and their identity.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: September 5, 2023
    Assignee: LLEIDANETWORKS SERVEIS TELEMATICS, S.A.
    Inventor: Francisco Sapena Soler
  • Patent number: 11741219
    Abstract: In general, one aspect disclosed features a media asset capture and processing method, implemented via a computer-based state machine executing on a computer processor, the method comprising: implementing a first phase including media asset capture and frame processing limited to Rich Execution Environment (REE) read-only (RO) frame access; implementing a second phase including processing with REE read-write (RW) frame access; and implementing a third phase including processing with REE read-only (RO) frame access.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: August 29, 2023
    Assignee: TruePic Inc.
    Inventors: Thomas Meng-tao Zeng, Oliver Rice, Chi Shing Chan, Sherif Hanna
  • Patent number: 11741268
    Abstract: Techniques for secure public exposure of digital data include extracting first digital data comprising one or more batches, each batch comprising a plurality of no more than a number T of packets, each packet containing a plurality of a number n of bits. A random binary matrix CK consisting of T rows and n columns is generated. For a first batch, a first random n-bit temporary key is generated and positions of the nT elements of matrix CK are randomized to produce matrix CK(RP). For a packet in the first batch, a first packet vector key is generated based on non-overlapping pairs of bit positions for both the temporary key and for a first packet-corresponding row of matrix CK(RP). An encrypted packet is generated for the packet based on the packet and the first packet vector key. The encrypted packet is exposed publicly.
    Type: Grant
    Filed: June 17, 2021
    Date of Patent: August 29, 2023
    Assignee: The Regents of the University of California
    Inventor: Hamid R. Sadjadpour
  • Patent number: 11700276
    Abstract: Methods and systems for monitoring activity on a network. The systems may include a host computer executing a non-honeypot service. The host computer may also include a control module configured to enable or disable a honeypot service on the host computer in response to at least one of computational resource availability and configured tolerance for degraded service.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: July 11, 2023
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Derek Abdine
  • Patent number: 11671246
    Abstract: A data provisioning device is arranged for provisioning a data processing entity from a set of data processing entities sharing the same joint decryption key. The data provisioning device comprises: a network interface configured to receive the provisioning data for provisioning the data processing entity, a joint encryption key associated with the joint decryption key, and control information indicating a processing scheme to be deployed by the data provisioning device when provisioning the data processing entity; a processor configured to process the provisioning data according to the control information to obtain processed provisioning data, to cryptographically encrypt the processed provisioning data using the received joint encryption key to obtain encrypted processed provisioning data; and a device interface configured to transmit the encrypted processed provisioning data to the data processing entity.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: June 6, 2023
    Assignee: Secure Thingz Limited
    Inventors: Stephan Spitz, Haydn Povey
  • Patent number: 11647041
    Abstract: A system and method enabling enterprises to engage in cyber threat information sharing in a privacy-enhanced fashion. The invention reduces the enterprise's risk to sensitive information leakage by inducing a state in the information it shares such that, when an enterprise's shared data attributes are interdependent, the sensitive features (those to be kept private to the enterprise) are not deducible by another enterprise. This state is accomplished by employing rough set theory to undermine the deductive route to the data's sensitive features.
    Type: Grant
    Filed: September 19, 2019
    Date of Patent: May 9, 2023
    Assignee: United States of America as represented by the Secretary of the Air Force
    Inventors: Laurent Y Njilla, Celestin Wafo Soh
  • Patent number: 11640471
    Abstract: A method (800) for detecting an injection vulnerability of a client-side templating system includes receiving a web page (200), determining that the web page implements an interpreted programming language framework (142) with client-side templating, and extracting a version (144) of the interpreted programming language framework and an interpolation sign (146) from the web page. The method also includes generating an attack payload (152a) for at least one injection vulnerability context (210) of the web page based on the version of the interpreted programming language framework and the interpolation sign, instrumenting the web page to inject the attack payload into the at least one injection vulnerability context of the web page, and executing the instrumented web page.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: May 2, 2023
    Assignee: Google LLC
    Inventors: Sebastian Lekies, Nicolas Golubovic
  • Patent number: 11610000
    Abstract: A system configured for identifying unpermitted data in source code receives a search query comprising particular keywords related to the unpermitted data. The system labels the source code with vulnerability factors and categories of those vulnerability factors, where the vulnerability factors indicate a security vulnerability and the categories provide information about the security vulnerability of the source code. The system performs a static analysis on the source code to identify instances of the particular keyword in a data flow and control flow of the source code. The system performs a vulnerability analysis on the source code to determine a vulnerability level of the source code, in which factor weights and category weights for each code portion of the source code are determined. The system calculates a weighted sum of the factor weights and category weights for each code portion, thereby detecting instances of unpermitted data in source code.
    Type: Grant
    Filed: October 7, 2020
    Date of Patent: March 21, 2023
    Assignee: Bank of America Corporation
    Inventors: Jack Lawson Bishop, III, Jason Conrad Starin, Kevin Dean Kirkwood
  • Patent number: 11604867
    Abstract: Online user account access control includes adjustable authentication challenge levels based on a level of match between observed attributes of a present login attempt and corresponding recorded attributes for the authentic user for the entered user identifier (UID). Login candidates whose attributes sufficiently closely match the recorded attributes for the entered UID are allowed to select an authentication graphic pattern registered for the UID from a set of alternatives, with the degree of complexity of such selection based authentication increasing according to the degree of difference between the observed attributes of the present login attempt and the corresponding recorded values for the UID, while by default, login candidates may be required to produce the registered authentication graphic pattern from blank slate.
    Type: Grant
    Filed: March 30, 2020
    Date of Patent: March 14, 2023
    Assignee: ThroughPuter, Inc.
    Inventor: Mark Henrik Sandstrom
  • Patent number: 11593528
    Abstract: Techniques for secure public exposure of digital data include extracting first digital data comprising one or more batches, each batch comprising a plurality of no more than a number T of packets, each packet containing a plurality of a number n of bits. A random binary matrix A consisting of T rows and n columns is generated. For a first batch, a first random n-bit temporary key is generated. For a packet in the first batch, a first packet vector key is generated based on random non-overlapping pairs of bit positions for both the temporary key and for a first packet-corresponding row of matrix A. An encrypted packet is generated for the packet based on the packet and the first packet vector key. The encrypted packet is exposed publicly.
    Type: Grant
    Filed: April 7, 2020
    Date of Patent: February 28, 2023
    Assignee: THE REGENTS OF THE UNIVERSITY OF CALIFORNIA
    Inventor: Hamid R. Sadjadpour
  • Patent number: 11595384
    Abstract: There is a provided a digital identity network interface system that may include a communications module and a processor. The processor may be configured to receive a signal representing a digital identity request, the digital identity request defining one or more scopes associated with the request, at least one of the scopes identifying a data type associated with the request, generate a query based on the scopes by translating at least one of the scopes into a query having a query format associated with a digital identity network, the digital identity network storing data associated with a plurality of users, send a signal representing the query to the digital identity network, send a link to an authorization device, after successful authentication, obtain data associated with the digital identity request from the digital identity network, and release at least some of the data.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: February 28, 2023
    Assignee: The Toronto-Dominion Bank
    Inventors: Malcolm Clarke, Brian Andrew Lam
  • Patent number: 11588850
    Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices.
    Type: Grant
    Filed: April 13, 2020
    Date of Patent: February 21, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Deon Ogle, Yaron Koral, Cagatay Buyukkoc, Nicholas Arconati, Jitendra Patel, Bogdan Ungureanu
  • Patent number: 11582258
    Abstract: A method for DoS attacks at an NF includes maintaining, at a first NF, an NF subscription database containing rules that specify maximum numbers of allowed subscriptions and corresponding rule criteria. The method further includes receiving, at the first NF and from a second NF, a subscription request for establishing a subscription. The method further includes determining, by the first NF, that the subscription request matches criteria for at least one rule in the NF subscription database and incrementing, by the first NF, at least one count of a number of subscriptions for the at least one rule. The method further includes determining, by the first NF, that the at least one count of the number of subscriptions exceeds a maximum number of allowed subscriptions for the at least one rule.
    Type: Grant
    Filed: February 4, 2021
    Date of Patent: February 14, 2023
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Jay Rajput, Virendra Singh, Amarnath Jayaramachar
  • Patent number: 11556649
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate malware detection using compressed data. An example apparatus includes an input processor to obtain a model, the model identifying a first sequence associated with a first trace of data known to be repetitive, a sequence identifier to identify a second sequence associated with a second trace of data, a comparator to compare the first sequence with the second sequence, and an output processor to when the first sequence matches the second sequence, transmit an encoded representation of the second sequence to the central processing facility using a first channel of communication, and when the first sequence fails to match the second sequence, transmit the second sequence to the central processing facility using a second channel of communication, the second sequence to be analyzed by the central processing facility to identify whether the second sequence is indicative of malware.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: January 17, 2023
    Assignee: MCAFEE, LLC
    Inventors: German Lancioni, Pablo A. Michelis
  • Patent number: 11556650
    Abstract: Embodiments for managing the utilization of software releases are provided. Information associated with a software release and at least one early adopter of the software release is analyzed to calculate a severity score for the software release. A time to utilize the software release is determined based on the calculated severity score.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: January 17, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Keith Frost, Stephen Boxwell, Stanley Vernier, Kyle Brake
  • Patent number: 11553234
    Abstract: A multiple-identity secure device (MISD) persistently may store an identification code. The identification code may be stored in an integral memory of the device, or on an interchangeable card received in a physical interface of the MISD. The MISD may generate one or more unique identities (e.g., network addresses) from the stored identification code. The generated identities may be dynamically generated or may be securely stored in the MISD for subsequent retrieval. The generated identities may generates in accordance with an addressing scheme, a global/network setting, or as determined from a received data transmission.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: January 10, 2023
    Assignee: Comcast Cable Communications, LLC
    Inventor: Steven J. Reynolds