Patents Examined by Michael R Vaughan
  • Patent number: 11503065
    Abstract: Methods, systems and computer program products are provided to determine an individual's risk of being targeted by a cyberattack based on quantifying their online presence. In some embodiments, online information pertaining to an individual, accessible through the clear web (e.g., Internet) or the dark web, is identified and used to calculate a digital vulnerability (DV) score. The DV score is used to determine the susceptibility of an individual of being targeted for a cyberattack or cybercrime based upon their online presence, and may be computed based upon personally identifying information (PII) features present on clear web and deep/dark web resources.
    Type: Grant
    Filed: September 21, 2020
    Date of Patent: November 15, 2022
    Assignee: Orbis Technologies, Inc.
    Inventor: Kojo Linder
  • Patent number: 11496454
    Abstract: An information handling system for providing comprehensive remote authorized access to multiple equipment in a datacenter. A mobile device security credential is first authenticated before access information is configured in the mobile device using a short-range wireless interface. The configured access information is mapped to the equipment and the corresponding access token and encryption keys from the equipment are received by the mobile device. The mobile device uses the access token and the encryption keys to simultaneously access the equipment through a long-range wireless interface. The simultaneous access includes parallel accessing of the equipment at a next accessing instance without requiring re-authentication. With the accessed equipment, the mobile device manages the accessed equipment based on the configured access information.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: November 8, 2022
    Assignee: Dell Products L.P.
    Inventors: My Tran, Sudhir Vittal Shetty, Michael Emery Brown, Marshal F. Savage, Jeffrey M. Lairsey, Joshua M Pennell
  • Patent number: 11489674
    Abstract: A method and a network node for managing access, by a device, to a blockchain. The network node receives, a first request for creation of a first account. The first request includes information relating to a user of the device and a first hash value. The network node creates, based on the information and the first hash value, the first account on the blockchain, whereby a first address is obtained. The network node receives, a second request for recovering account information of the first account. The second request includes the first address of the first account, a source value from which the first hash value is derived and a second address of a second account. The network node generates a second hash value based on the source value. The network node initiates transfer of the account information of the first account to the second account.
    Type: Grant
    Filed: May 18, 2018
    Date of Patent: November 1, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: James Kempf, Anshu Shukla, Nanjangud Chandrasekhara Swamy Narendra, Sambit Nayak
  • Patent number: 11483163
    Abstract: The present disclosure generally relates to one or more line replacement units (“LRUs”) for an airplane including a method for provisioning a second line replacement unit (“LRU”) using a first LRU in an airplane. The method includes providing, by the first LRU, a communication to the second LRU to request a certificate signing request (“CSR”) based on a public-private key pair generated by the second LRU; obtaining the CSR from the first LRU; providing the CSR and a certificate revocation request for a replaced LRU to a certificate authority (“CA”); obtaining a composite airline modifiable information (“AMI”) comprising a public key certificate associated with a private key generated by the first LRU; and providing the composite AMI to the first LRU.
    Type: Grant
    Filed: April 10, 2020
    Date of Patent: October 25, 2022
    Assignee: THE BOEING COMPANY
    Inventors: Ian G. Angus, Travis S. Reid
  • Patent number: 11470078
    Abstract: The present disclosure provides systems and methods that perform structure-based access control. In particular, rather than relying upon a user-specific credential scheme, which can require manual sharing of user-specific credentials and/or switching between the multiple accounts to access the particular devices, applications, or services associated with such accounts, the systems and methods of the present disclosure facilitate user credentials to be inherited by or otherwise assigned to a structure identifier associated with a structure (e.g., a home in which the user resides), thereby generating a set of structure credentials. This enables other users in the structure, who may be part of a collaborative user group, to access devices, applications, and/or services using the structure credentials.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: October 11, 2022
    Assignee: GOOGLE LLC
    Inventors: Mark Spates, IV, Vincent Yanton Mo, Zhenguo Guan, David Roy Schairer
  • Patent number: 11438336
    Abstract: A method and system for controlling access to a protected entity. The method includes receiving a redirected client request to access the protected entity that the protected entity denied; granting, in response to the received redirected request, access tokens of a first type to a client; identifying a conversion transaction identifying a request to convert the first type of access tokens with access tokens of a second type, the transaction designating the protected entity; determining a conversion value for converting first-type access tokens into second-type of access tokens, the conversion value being based on at least one access parameter; converting, using the conversion value, a first sum of the first-type access tokens into a second sum of second-type access tokens; and granting the client access to the protected entity when the sum of second-type of access tokens is received as a payment from the protected entity.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: September 6, 2022
    Assignee: Radware, Ltd.
    Inventors: Alon Lelcuk, David Aviv
  • Patent number: 11416603
    Abstract: Methods, systems, articles of manufacture and apparatus to detect process hijacking are disclosed herein. An example apparatus to detect control flow anomalies includes a parsing engine to compare a target instruction pointer (TIP) address to a dynamic link library (DLL) module list, and in response to detecting a match of the TIP address to a DLL in the DLL module list, set a first portion of a normalized TIP address to a value equal to an identifier of the DLL. The example apparatus disclosed herein also includes a DLL entry point analyzer to set a second portion of the normalized TIP address based on a comparison between the TIP address and an entry point of the DLL, and a model compliance engine to generate a flow validity decision based on a comparison between (a) the first and second portion of the normalized TIP address and (b) a control flow integrity model.
    Type: Grant
    Filed: January 11, 2019
    Date of Patent: August 16, 2022
    Assignee: Intel Corporation
    Inventors: Zheng Zhang, Jason Martin, Justin Gottschlich, Abhilasha Bhargav-Spantzel, Salmin Sultana, Li Chen, Wei Li, Priyam Biswas, Paul Carlson
  • Patent number: 11418497
    Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: August 16, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Deepak Sreenivas Pemmaraju, Robert C. Turner, Ronakkumar Desai, Patrick Moulhaud
  • Patent number: 11412002
    Abstract: Enforcing different policy rules that are applicable to different types of data. A plurality of DIDs and a plurality of storages are managed by a computing system. Each of the plurality of storages is associated with at least one of the plurality of DIDs. Receive a request from an entity for operating on data stored or to be stored in one of the plurality of storages. Determine a type of the data requested to be operated on. Access one or more policy rules that are applicable to the type of the data. Based on the accessed one or more policy rules, determine whether the operation to be performed on the data will result in the data complying with the one or more policy rules. Based on the determination, allow or deny the request.
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: August 9, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel James Buchner, Brandon Murdoch, Ankur Patel
  • Patent number: 11411955
    Abstract: Enforcing different policy rules that are applicable to different types of data stored at a decentralized storage service that uses a distributed ledger to authenticate and/or authorize users. Receive a request from an entity for operating on data stored or to be stored in a storage that is associated with a DID. A type of data that is requested to be operated on is then determined. One or more policy rules that are applicable to the determined type of data are accessed. Based on the one or more policy rules, determine if the operation to be performed on the data will result in the data complying with the one or more policy rules. Based on the determination, allow the request when the operation will result in the data complying with the one or more policy rules.
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: August 9, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel James Buchner, Brandon Murdoch, Ankur Patel
  • Patent number: 11405402
    Abstract: A method for implementing a private computer network over which digital assets can be securely managed, the method comprising: implementing an autonomous network agent on each of a plurality of network devices that are communicable over a digital communications medium, the autonomous network agent being operable to execute a network program that is embodied as program code in a blockchain that is stored and synchronised by the respective network devices, the network program defining permissible network defined digital asset types and corresponding functions.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: August 2, 2022
    Assignee: BLOCKCHAIN IT SOLUTIONS PTY LTD
    Inventor: Zackery Robison
  • Patent number: 11399042
    Abstract: A system for autonomous control in power systems is disclosed. In particular, a secure overlay communication model (“SOCOM”) is disclosed, the system including a combination of hardware and software for detecting power grid states, and determining appropriate actions for addressing detected states. The SOCOM is a logic-based system deployed onto computing devices such as field programmable gate arrays installed at bus controllers, Supervisory Control and Data Acquisition Systems (“SCADAs”), Intelligent Electronic Devices (“IEDs”), or other computing devices in power grid stations and substations. The logic-based nature of the SOCOM allows for seamless integration with preexisting power system equipment. In response to detecting various power grid faults such as line failures and over-current states, the system automatically rearranges power line configurations at the power stations and/or substations.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: July 26, 2022
    Assignee: George Mason University
    Inventors: Eniye Tebekaemi, Duminda Wijesekera
  • Patent number: 11372977
    Abstract: Methods, systems, devices and apparatuses for securely providing an over-the-air firmware upgrade. The system includes an embedded device configured to receive the firmware upgrade. The system includes a server having a memory configured to store a first key encryption key, the firmware upgrade and a firmware key and having a processor coupled to the memory. The processor is configured to obtain the firmware upgrade, the firmware key and the first key encryption key. The processor is configured to encrypt the firmware upgrade using the firmware key. The processor is configured to encrypt the firmware key with the first key encryption key and transmit the encrypted firmware upgrade and the encrypted firmware key to the embedded device.
    Type: Grant
    Filed: November 12, 2018
    Date of Patent: June 28, 2022
    Assignee: THIRDWAYV, INC.
    Inventors: Michael Atef Ayoub, Nabil Wasily
  • Patent number: 11374767
    Abstract: A method and system for performing authentication for a backup service provided by a server is provided. The method receives a request for authentication from a client device, the request for authentication including a signature generated using a private key. The method sends a request to obtain a public key corresponding to the private key to the server and receives the public key from the server, the public key being retrieved by the server from a backup of a virtual machine. The method verifies the signature using the public key and generates a token encrypted using the public key, the token enabling the client device to access the server for the backup service. The method sends the token to the client device, the token to be decrypted using the private key by the client device.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: June 28, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jing Yu, Ming Zhang, Kunal Ruvala, Xiaoliang Zhu, Min Liu
  • Patent number: 11356258
    Abstract: Methods and systems for cryptographically secured data validation. The system includes a first validator. The first validator is designed and configured to receive a first instance of an immutable sequential data structure containing at least a first digitally signed textual element containing at least a first physical asset transfer field populated with a at least a first physical asset transfer datum and at least a second digitally signed textual element generated by a second validator. The first validator authenticates the first instance of the immutable sequential data structure. The first validator generates at least a second validity indicating a determination by the first validator as to the accuracy of the at least a first physical asset transfer field. The first validator detects a conflict between the at least a first validity flag and the at least a second validity flag. The first validator transmits to the at least a second validator an indication of the conflict.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: June 7, 2022
    Assignee: PITT-OHIO Express, LLC
    Inventors: Tom Serres, Bettina Warburg, Chuck Hammel, IV
  • Patent number: 11356448
    Abstract: A private network includes a plurality of network security appliances participating in authenticating end users. Each network security appliance maintains a locally stored user list. A first network security appliance receives at least a portion of a non-local user list comprising second user identifier records for a second network security appliance of the plurality of network security appliances. The first network security appliance compares the local user list with the non-local user list received from the second network security appliance to identify one or more deviations. The first network security appliance merges the portion of the second user identifier records of the non-local user list corresponding with the one or more deviations with the first user identifier records of the local user list to generate an updated local user list. The first network security appliance authenticates a request to access the network using the updated local user list.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: June 7, 2022
    Assignee: Pulse Secure, LLC
    Inventors: Kanti Varanasi, Robin Singh, Naji Abdulla
  • Patent number: 11343255
    Abstract: Techniques are provided for question delegation and security enforcement. One exemplary method comprises providing a third party with a question obtained from a user and a corresponding user security policy; providing a security policy response from the third party to the user indicating an acceptance of the corresponding user security policy or any proposed modifications to the corresponding user security policy for the question; performing the following steps once there is an agreement between the user and the third party regarding an accepted security policy for the question: monitoring responses to the question; enforcing directives within the accepted security policy for the question, wherein the directives comprise one or more triggers mapped to a security control and/or a compliance control for the question, and wherein each trigger has a corresponding predefined enforcement action; and performing the corresponding predefined enforcement action when a given trigger is detected.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: May 24, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Naveen Sunkavally, Brian C. Mullins
  • Patent number: 11336430
    Abstract: Disclosed herein are system, method, and device embodiments for an authentication workflow incorporating blockchain technology. An embodiment operates by requesting, from a distributed authentication service, transmission of a time-based one-time password to a communication endpoint associated with an end-user, receiving a time-based one-time password submission from a user device associated with the end-user, retrieving a plurality of distributed ledger entries (e.g., a plurality of blocks of a blockchain), and validating the time-based one-time password submission based on the plurality of distributed ledger entries as a part of a two factor authentication workflow.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: May 17, 2022
    Assignee: SAP SE
    Inventors: Bhomik Pande, Steven Garcia, Vaibhav Vohra, Rohit Tripathi, Fernando Nakano
  • Patent number: 11336678
    Abstract: Application security analysis including systems and methods for analyzing applications for risk is provided. In an example method, the applications reside on a mobile device configurable to access an enterprise system. The example method includes evaluating each of a plurality of applications variously for privacy, data leakage, and malicious behavior. The example method also includes calculating a risk score for each of the plurality of applications based on the evaluating; and automatically remediating (e.g., quarantining) the applications, of the plurality of applications, for which the risk score meets or exceeds a risk score threshold. The method may evaluate all of the applications residing on a mobile device. The method may include grouping application behaviors, for each of the applications, that indicate an increased risk into groups comprising two or more of privacy risk, a data leakage risk, an account takeover risk, a device takeover risk, and a malware risk.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: May 17, 2022
    Assignee: Proofpoint, Inc.
    Inventors: David Alexander Jevans, Suresh Kumar Basandra
  • Patent number: 11335214
    Abstract: Systems and methods are provided for encrypting and decrypting data using visually encoded ciphertext. The method includes selecting, using a graphical user interface coupled to an electronic device, one or more portions of a document to be encrypted, visually encoding the selected one or more portions of the document, generating a visual representation, wherein the visual representation corresponds to encrypted content, and replacing the selected one or more portions of the document with the visual representation. The method further includes displaying, to the user, the visual representation, capturing the visual representation using one or more cameras, decoding the visual representation, obtaining the encrypted content, and decrypting the encrypted content, generating decrypted content.
    Type: Grant
    Filed: February 11, 2019
    Date of Patent: May 17, 2022
    Inventors: Andrea G. Forte, Vishal K. Singh