Patents Examined by Michael Pyzocha
  • Patent number: 11405379
    Abstract: An authentication process that provides secure and verified access to content, such as content presented on websites. At a first instance, users may be validated using a first token, at a second instance, users may be validated or authorized using the first token and an email address, and at a third instance, users may be validated or authorized using the first token, the email address, and the second token. Therein users are authenticated and provided access to the websites. During the authentication process and the during separate instances (or times), if the multiple token(s) are invalid and/or the email address is associated with an unauthorized user, access to the website may be denied.
    Type: Grant
    Filed: February 26, 2020
    Date of Patent: August 2, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Bryan Clauss, Arun Donti, Brandon Lee Harvey
  • Patent number: 11386229
    Abstract: As vehicles collect more data in autonomous or semi-autonomous operation, the collected data such as video, navigation and telemetry data, can containing personally identifiable information (PII). The PII may be governed by specific handling requirements or privacy policies. In order to comply with these requirements and policies a method, system and computer readable memory are provided for determining a location of a vehicle to enable determination of an enforcement policy associated with the location of the vehicle. The enforcement policy defines one or more PII objects that are to be filtered from the vehicle data. The PII objects contained within the vehicle data can then be filtered such that the PII objects are not identifiable. The filtered data can then be stored or transmitted to a remote location.
    Type: Grant
    Filed: July 4, 2019
    Date of Patent: July 12, 2022
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Jasmin Mulaosmanovic, Robert Joseph Lombardi
  • Patent number: 11379623
    Abstract: Upon accepting a start-up request or logout request of a login application, an information processing apparatus according to this embodiment controls to display a blank screen that does not input to a display unit or ignore input via a UI screen displayed on the display unit before the login application is started up or logout processing is completed.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: July 5, 2022
    Assignee: CANON KABUSHIKI KAISHA
    Inventor: Hiroaki Koike
  • Patent number: 11372957
    Abstract: A fingerprint recognition-based application starting method and device. A sensing unit (102) is provided below a fingerprint recognition area of a display unit (101), so that when a user operates an application icon on the screen, fingerprint information of the user can be acquired, and then the acquired fingerprint information is compared with preset fingerprint information, to start an application or perform unlocking. Compared with an existing approach for a mobile apparatus to start an application by means of fingerprint recognition, the present invention improves the operability of application icons on a screen and enhances user experience, and can also effectively reduce the overall thickness of a mobile apparatus, making the mobile apparatus thinner and lighter to meet the market demands.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: June 28, 2022
    Inventor: Jinadong Huang
  • Patent number: 11374925
    Abstract: A method and system for authenticating customers on call are disclosed. The method includes providing a notification to a customer on an electronic device associated with the customer. The notification is provided in response to the customer placing a call for seeking an interaction with an agent of an enterprise. The notification is configured to trigger authentication of the customer using an application on the electronic device. A status of the authentication of the customer is received from the application on the electronic device and, if the status of the authentication of the customer is a success, the call is connected to the agent to facilitate the interaction between the customer and the agent.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: June 28, 2022
    Assignee: [24]7.ai, Inc.
    Inventor: Gautham Krishnamurthy
  • Patent number: 11366902
    Abstract: Disclosed herein are systems and methods for detecting malicious files based on file fragments. In one aspect, an exemplary method comprises, extracting data fragments from a file, for each extracted data fragment, determining a category selected from a list of categories that includes at least: trusted, malicious, and untrusted, when a number of data fragments categorized as being malicious is below a predetermined threshold, avoiding categorization of the file as malicious, and when a number of data fragments categorized as being malicious reaches or exceeds the predetermined threshold, determining whether at least one malicious file detection rule having criteria for detecting a malicious file is found, when at least one malicious file detection rule whose criteria is met is found, categorizing the file as a malicious file, and when no malicious file detection rule whose criteria is met is found, avoiding categorization of the file as a malicious file.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: June 21, 2022
    Assignee: AO Kaspersky Lab
    Inventor: Costin Raiu
  • Patent number: 11368441
    Abstract: A method for privacy control in release of protected information includes: receiving, from a first system, a decryption key, request identifier, and a payload identifier by a second system; storing, in the second system, a blockchain comprised of blockchain data values, each blockchain data value including a registration identifier and encrypted data set; identifying, by the second system, a specific blockchain data value where the registration identifier matches the payload identifier; decrypting, by the second system, the encrypted data set in the specific blockchain data value using the decryption key; and transmitting, by the second system, the decrypted data set to a third system using the request identifier.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: June 21, 2022
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Alonzo Benavides, Ian Major, Prem Chander Rajamohan, Thomas Hansen, Duygu Gün
  • Patent number: 11349827
    Abstract: An anonymous attestation cryptographic protocol is provided for enabling a target (device 4) to attest to a predetermined property of the device without needing to reveal its identity to a verifier (8). When obtaining a credential from an issuer (6) to attest to the predetermined property, the credential is validated by an intermediary device (2) which is a separate consumer electronics device to the target device (4) itself. This allows the relatively processor-intensive calculations required for validating the credential to be performed on a separate device (2) from the device (4) for which the attestation has been made, allowing anonymous attestation protocols to be used for lower powered target devices such as sensors in the internet of things.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: May 31, 2022
    Assignee: TRUSTONIC LIMITED
    Inventor: Alec Milne Edgington
  • Patent number: 11347889
    Abstract: A computer-implemented method for populating a privacy-related data model by: (1) providing a data model that comprises one or more respective populated or unpopulated fields; (2) determining that at least a particular one of the fields for a particular data asset is an unpopulated field; (3) at least partially in response to determining that the at least one particular field is unpopulated, automatically generating a privacy questionnaire comprising at least one question that, if properly answered, would result in a response that may be used to populate the at least one particular unpopulated field; (4) transmitting the privacy questionnaire to at least one individual; (5) receiving a response to the questionnaire, the response comprising a respective answer to the at least one question; and (6) in response to receiving the response, populating the at least one particular unpopulated field with information from the received response.
    Type: Grant
    Filed: October 1, 2021
    Date of Patent: May 31, 2022
    Assignee: OneTrust, LLC
    Inventors: Kabir A. Barday, Mihir S. Karanjkar, Steven W. Finch, Ken A. Browne, Nathan W. Heard, Aakash H. Patel, Jason L. Sabourin, Richard L. Daniel, Dylan D. Patton-Kuhl, Jonathan Blake Brannon
  • Patent number: 11343263
    Abstract: The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign. The method comprises receiving attack kill chain data. The attack kill chain data comprises steps for executing an attack campaign on one or more assets associated with a computing device. The method further comprises parsing the attack kill chain data to determine one or more attack execution operations for executing the attack campaign on the one or more assets associated with the computing device. The method determines based on the parsing, one or more remediation operations corresponding to the one or more attack execution operations. In addition, the method sequences the one or more remediation operations to form an asset remediation trend map. In one implementation, the asset remediation trend map indicates steps for remediating the attack campaign.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: May 24, 2022
    Assignee: Qualys, Inc.
    Inventors: Ankur S. Tyagi, Mayuresh Vishwas Dani
  • Patent number: 11334666
    Abstract: The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis. The method comprises receiving a first security event captured by a first security operation associated with a computing device, and receiving a second security event captured by a second security operation associated with the computing device. The first security event and the second security event are associated with an attack campaign. The method further comprises mapping the first security event to first security data in an attack repository, and mapping the second security event to second security data in the attack repository. The method also comprises determining based on the mapping, one or more attack execution operations for executing the attack campaign associated with the first security event and the second security event. Additionally, the method sequences the one or more attack execution operations to form an attack kill chain.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: May 17, 2022
    Assignee: Qualys Inc.
    Inventors: Ankur S. Tyagi, Mayuresh Vishwas Dani
  • Patent number: 11330005
    Abstract: Disclosed is an improved approach for detecting potentially malicious activity on a network. The present improved approach generates a multi-dimensional activity model based on captured network activity. Additional network activity is captured, and relative activity values are determined therefor. Determination of whether the additional network activity corresponds to potentially malicious activity is obtained by fitting the relative activity values of the additional network activity to the multi-dimensional relative activity model.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: May 10, 2022
    Assignee: Vectra AI, Inc.
    Inventors: Nicolas Beauchesne, Himanshu Mhatre, Daniel Carlton Hannah
  • Patent number: 11321469
    Abstract: In one embodiment, a processor of a cryptographic computing system includes data cache units storing encrypted data and circuitry coupled to the data cache units. The circuitry accesses a sequence of cryptographic-based instructions to execute based on the encrypted data, decrypts the encrypted data based on a first pointer value, executes the cryptographic-based instruction using the decrypted data, encrypts a result of the execution of the cryptographic-based instruction based on a second pointer value, and stores the encrypted result in the data cache units. In some embodiments, the circuitry generates, for each cryptographic-based instruction, at least one encryption-based microoperation and at least one non-encryption-based microoperation. The circuitry also schedules the at least one encryption-based microoperation and the at least one non-encryption-based microoperation for execution based on timings of the encryption-based microoperation.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: May 3, 2022
    Assignee: Intel Corporation
    Inventors: Michael E. Kounavis, Santosh Ghosh, Sergej Deutsch, Michael LeMay, David M. Durham, Stanislav Shwartsman
  • Patent number: 11321493
    Abstract: Described are various embodiments of a hardware security module, hardwired port interconnection matrix, and embedded communication channel resources operable on selected hardware port-specific data communicated via this matrix.
    Type: Grant
    Filed: November 27, 2019
    Date of Patent: May 3, 2022
    Assignee: CRYPTO4A TECHNOLOGIES INC.
    Inventors: Bruno Couillard, Bradley Clare Ritchie, James Ross Goodman, Jean-Pierre Fiset
  • Patent number: 11303453
    Abstract: A method for communication between at least two communicating entities, a first communicating entity generating at least one data message comprising a payload and an authentication heading, the method including generating a context parameter including at least one datum representing the material con-figuration of the first entity; generating a security profile in the authentication heading, which defines the conditions of encoding the payload of the message and of generating a signature by an algorithm applied at least to the payload of the message; including the signature in the generated message; inserting a stored identifier of the first communication entity into the authentication heading; and inserting the safety profile into the payload or into the authentication heading.
    Type: Grant
    Filed: May 17, 2018
    Date of Patent: April 12, 2022
    Assignee: AIRBUS CYBERSECURITY SAS
    Inventor: Paul-Emmanuel Brun
  • Patent number: 11283773
    Abstract: There are provided mechanisms for registering and subsequently communicating with classified subscribers in an IMS environment. The method comprises replacing an IMS Public -and Private User identity (IMPU/IMPI) with randomized temporary identifiers. Parties, in particular parties with 5 access to network entities outside the home-network cannot relate the observed IMPU/IMPI to the subscriber's original IMPU/IMPI as provisioned, and as the temporary IMPU changes frequently, there is no pattern (registration nor call) to be allocated to the subscriber's UE.
    Type: Grant
    Filed: November 16, 2016
    Date of Patent: March 22, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Rogier August Caspar Joseph Noldus
  • Patent number: 11281778
    Abstract: A method of verifying an application, according to an embodiment, includes: storing application codes; loading a part of the application codes into a memory; and verifying the application by using the codes loaded into the memory.
    Type: Grant
    Filed: November 28, 2016
    Date of Patent: March 22, 2022
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Dong-uk Kim, Ji-hoon Kim, Chang-sup Ahn
  • Patent number: 11265714
    Abstract: A system for provisioning a device is provided. The system includes a computer device. The computer device is programmed to receive, from a user equipment, a connection request via a layer two connection. The computer device is also programmed to accept the connection request. The computer device is further programmed to receive, from the user equipment, a certificate request via the layer two connection. Additionally, the computer device is programmed to determine a destination for the certificate request, and to route the certificate request to the destination.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: March 1, 2022
    Assignee: Cable Television Laboratories, Inc.
    Inventors: Tao Wan, Massimiliano Pala, Steven J. Goeringer, Darshak Thakore
  • Patent number: 11258611
    Abstract: Electronically signed data is persistently stored in data storage. After the passage of time, the data may be accessed and presented to a trusted entity for verification of the data. The trusted entity may have access to secret information used to sign the data. The trusted entity may use the secret information to verify an electronic signature of the data. One or more actions may be taken based at least in part on a response provided by the verification system.
    Type: Grant
    Filed: January 11, 2019
    Date of Patent: February 22, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Benjamin Elias Seidenberg, Gregory Branchek Roth, Benjamin Tillman Farley
  • Patent number: 11252176
    Abstract: A computer-implemented method may comprise collecting and storing a plurality of electronic messages and a corresponding plurality of phishing kits, each of which being associated with one or several malicious Uniform Resource Locator (URL) and extracting a set of features from each of the plurality of electronic messages. For each of the extracted set of features, the method may comprise determining a set of optimal scanning parameters using one or more decision trees, trained with a supervised learning algorithm based on programmatically or manually examining or reverse-engineering the source code of the phishing kits, or trained with a supervised learning algorithm based on a function that iteratively requests data from the websites pointed to by the malicious URLs and examines data and codes returned by such requests.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: February 15, 2022
    Assignee: VADE SECURE INC.
    Inventors: Sebastien Goutal, Maxime Marc Meyer