Patents Examined by Michael Simitoski
-
Patent number: 11689577Abstract: A method comprising: receiving a request from a second application to access information from a first application, said first and second applications installed on a user equipment, and in response to said request, determining whether said second application is operating in accordance with at least one rule.Type: GrantFiled: December 1, 2021Date of Patent: June 27, 2023Assignee: Nokia Technologies OyInventor: Sami Kalervo Majaniemi
-
Patent number: 11683292Abstract: A method for use with a public cloud network is disclosed. The method includes setting up at least one private cloud routing server (PCRS) and at least one smart device client on the side of the PCRS in a client server relationship. It also includes setting up at least another smart device client on the side of the PCCBS in a client server relationship with the at least one private cloud call-back server (PCCBS). The private cloud call-back server acts as a middleman to relay communication between the smart device client on the side of the PCCBS and the private cloud routing server. The PCCBS will call back the private cloud routing server on demand based on the smart device client request. The at least one private cloud call-back server includes a first message box associated therewith.Type: GrantFiled: February 12, 2021Date of Patent: June 20, 2023Assignee: KINGSTON DIGITAL, INC.Inventor: Ben Wei Chen
-
Patent number: 11683288Abstract: A method for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit or units having connection to the public Internet and one or more of the private units have a connection to one or more non-Internet-connected private networks for private network control of the configuration of the computer or microchip using active hardware configuration, including field programmable gate arrays (FPGA). The hardware-based access barriers include a single out-only bus and/or another in-only bus with a single on/off switch.Type: GrantFiled: February 26, 2021Date of Patent: June 20, 2023Inventor: Frampton E. Ellis
-
Patent number: 11675891Abstract: An image forming apparatus includes: a processor configured to: execute a linking application for a linkage with a specific service, to receive a linkage request from a user through the specific service; and perform an authenticating process that authenticates a user who uses the image forming apparatus, using user information on the user who uses the specific service linked as a result of an approval of the received linkage request.Type: GrantFiled: May 12, 2021Date of Patent: June 13, 2023Assignee: FUJIFILM Business Innovation Corp.Inventor: Takuya Togashi
-
Patent number: 11669805Abstract: Described herein is a system, method, and non-transitory computer readable medium related to a service provider using a third party identity provider to authenticate a user with improved security. An authentication token is received from the identity provider, and can be verified against internal configuration information. The internal configuration information includes data that is not included in the authentication token, and therefore, is not vulnerable to some security attacks, such as a man-in-the-middle attack. After the authentication token is verified, the internal configuration information and authentication token may be used to create a custom identifier, referred to as an identity ID. The identity ID may be used by the service provider to verify user access to resources.Type: GrantFiled: May 22, 2020Date of Patent: June 6, 2023Assignee: Capital One Services, LLCInventors: Dinesh Sundaram, Jacob Creech
-
Patent number: 11665198Abstract: A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.Type: GrantFiled: May 17, 2022Date of Patent: May 30, 2023Assignee: BLACKBERRY LIMITEDInventor: Adam John Boulton
-
Patent number: 11652822Abstract: Techniques for deperimeterized access control are described. A method of deperimeterized access control may include receiving, by a controller of a deperimeterized access control service, a single packet authorization (SPA) request for a session ticket from an agent on a electronic device, wherein the agent sends the request for the session ticket in response to intercepting traffic destined for a service associated with the deperimeterized access control service and determining that the agent does not have a session ticket for the service, authorizing the SPA request, providing a session ticket to the agent based on the request, receiving, by a gateway of the deperimeterized access control service, a request to initiate a session with a service, the request including the session ticket, validating the session ticket, and providing session parameters to the agent to be used to initiate the session between the electronic device and the service.Type: GrantFiled: December 11, 2020Date of Patent: May 16, 2023Assignee: Amazon Technologies, Inc.Inventors: Maciej Broda, Eric Jason Brandwine, Matthew Schwartz
-
Patent number: 11651088Abstract: Security system for protecting a vehicle electronic system by selectively intervening in the communications path in order to prevent the arrival of malicious messages at ECUs, in particular at the safety critical ECUs. The security system includes a filter which prevents illegal messages sent by any system or device communicating over a vehicle communications bus from reaching their destination. The filter may, at its discretion according to preconfigured rules, send messages as is, block messages, change the content of the messages, request authentication or limit the rate such messages can be delivered, by buffering the messages and sending them only in preconfigured intervals.Type: GrantFiled: June 20, 2022Date of Patent: May 16, 2023Assignee: SheeldS Cyber Ltd.Inventors: Gil Litichever, Ziv Levi
-
Patent number: 11652647Abstract: In an authentication system (120) of an organization that is another organization different from a first organization that a first user belongs to, a management device (200) accepts a registration transaction for a client certificate of the first user. Then, the management device registers the client certificate of the first user in a client certificate blockchain. When the first user accesses a service of another organization from a user terminal of the first organization, an authentication device (300) authenticates the first user using the client certificate of the first user in the client certificate blockchain.Type: GrantFiled: August 11, 2020Date of Patent: May 16, 2023Assignee: Mitsubishi Electric CorporationInventors: Masaya Honjo, Mitsuhiro Matsumoto
-
Patent number: 11641379Abstract: A cloud security method implement web security at the application level by monitoring network traffic and detecting cloud activities related to web applications, and then classifying the detected cloud activities to map certain security-related cloud activities into activity categories to enable security policy to be applied. The application-level cloud security method enables policy enforcement rules to be established for cloud activity categories. The security policies are then applied based on activity categories.Type: GrantFiled: August 9, 2021Date of Patent: May 2, 2023Assignee: Skyhigh Security LLCInventors: Sekhar Sarukkai, Prasad Raghavendra Somasamudram, Rama Taraniganty, Vikram Jaiswal, Chapman Seto, Ravi Hingarajiya, Surendrakumar Viswanathan, Kaushik Narayan, Pradeep Kumar Reddy Mangalapuri, Guruprasad Shenoy
-
Patent number: 11632399Abstract: A method of managing a local area communication network comprising at least one access equipment for accessing the network is disclosed. At least one communicating object is connected to the network. In one aspect, the method comprises upon detecting connection of a new communicating object to the network and/or upon detecting installation of new firmware on the at least one communicating object connected to the network, a learning phase involving observing interactions of the communicating object with at least one other equipment of the local area network and/or at least one equipment of a wide area communication network accessible via the access equipment. In addition, at least one security rule associated with the communicating object on the basis of the observed interactions is disclosed.Type: GrantFiled: March 5, 2019Date of Patent: April 18, 2023Inventors: Eric Bouvet, Xavier Le Guillou
-
Patent number: 11625478Abstract: Systems and methods for improving security in computer-based authentication systems by using physical unclonable functions are presented. A computing device used to provide authentication includes multiple arrays of physical unclonable function devices. Rather than storing user passwords or message digests of passwords, the computing device generates a message digest based on a user's credentials. A challenge response generated by measuring physical parameters of set of physical unclonable function devices specified by the message digest. The computing device can provide authentication without storing information which could be used by an attacker to compromise user credentials. Redundancy and robustness to varying loads are provided by the use of multiple PUF arrays which may be used as backups or to provide load balancing. Backdoor access may be provided to trusted parties without exposing user credentials.Type: GrantFiled: April 15, 2021Date of Patent: April 11, 2023Assignee: ARIZONA BOARD OF REGENTS ON BEHALF OF NORTHERN ARIZONA UNIVERSITYInventors: Bertrand F Cambou, Mohammad Mohammadinodoushan
-
Patent number: 11625467Abstract: A computerized method for voice authentication of a customer in a self-service system is provided. A request for authentication of the customer is received and the customer is enrolled in the self-service system with a text-independent voice print. A passphrase from a plurality of passphrases to transmit to the customer is determined based on comparing each of the plurality of passphrases to a text-dependent or text-independent voice biometric model. The passphrase is transmitted to the customer, and when the customer responds, an audio stream of the passphrase is received. The customer is authenticated by comparing the audio stream of the passphrase against the text-independent voice print. If the customer is authenticated, then the audio stream of the passphrase and the topic of the passphrase may be stored.Type: GrantFiled: May 25, 2021Date of Patent: April 11, 2023Assignee: Nice Ltd.Inventors: Matan Keret, Amnon Buzaglo
-
Patent number: 11606387Abstract: A system and method for reducing a time to mitigate distributed denial of service (DDoS) attacks are provided. The method includes receiving a plurality of attack feeds on at least one protected object in a secured environment; analyzing the plurality of attack feeds to determine characteristics of a DDoS attack against the secure environment; determining a set of optimal mitigation resources assigned to the secured environment; selecting, based on the set of optimal mitigation resources and the attack characteristics, at least one optimal workflow scheme; and initiating a proactive mitigation action by setting each mitigation resource in the set of optimal mitigation resources according to the selected optimal workflow scheme.Type: GrantFiled: December 20, 2018Date of Patent: March 14, 2023Assignee: RADWARE LTD.Inventors: Ehud Doron, Yotam Ben Ezra, David Aviv
-
Patent number: 11599637Abstract: Disclosed herein are systems and method for blocking malicious script execution. In one exemplary aspect, the method may comprise detecting an execution of a script that creates or modifies a file on a computing device and recording a first report comprising a list of operations involved in the execution of the script, an identifier of the script, and an identifier of the file. The method may comprise determining that the file includes malicious code using a malware scanner and recording a second report comprising an indication that the file includes malicious code and an identifier of the file. In response to determining that identifier of the file is present in both the first report and the second report, the method may comprise generating and storing a first rule that prevents complete execution of any script that shares at least one operation in the list of operations with the script.Type: GrantFiled: July 30, 2021Date of Patent: March 7, 2023Assignee: CLOUD LINUX SOFTWARE, INC.Inventors: Igor Seletskiy, Aleksei Berezhok, Evgenii Vodilov
-
Patent number: 11595196Abstract: This application provide quantum key distribution methods, devices, and storage media. In an implementation, a method comprises: determining, based on a first mapping, a first quantum key of N first quantum keys corresponding to an ith node on a target routing path; determining, based on a second mapping, a second quantum key of N second quantum keys corresponding to the ith node; and generating, by the ith node based on the first quantum key corresponding to the ith node and the second quantum key corresponding to the ith node, a third quantum key corresponding to the ith node on the target routing path.Type: GrantFiled: October 13, 2020Date of Patent: February 28, 2023Assignee: Huawei Technologies Co., Ltd.Inventors: Zhengyu Li, Changzheng Su, Su Hu, Yang Zou
-
Patent number: 11580497Abstract: A system includes a memory, a survey engine, and a reporting engine. The memory stores identifying information of a plurality of users. The survey engine determines a question to present to each user of the plurality of users and determines an interval for each user of the plurality of users. The determined interval for a first user of the plurality of users is different from the determined interval for a second user of the plurality of users. For each user, the survey engine communicates to that user, based on the stored identifying information, the determined question for that user according to the determined interval for that user and receives a response from each user of the plurality of users. The reporting engine generates a report based on the received response from the plurality of users.Type: GrantFiled: April 20, 2021Date of Patent: February 14, 2023Assignee: THE PRUDENTIAL INSURANCE COMPANY OF AMERICAInventors: Andrew M. Wisdom, David A. Casto
-
Patent number: 11582606Abstract: Disclosed are a terminal verification method, an AP device, a terminal and a system, wherein the AP device is an encrypted AP device. The method comprises: receiving a connection request sent by a first terminal, wherein the connection request comprises identification information of the first terminal; querying an authorization list according to the identification information of the first terminal, wherein the authorization list includes identification information of terminals located within a preset password-free range; and returning an authorization response to the first terminal when the authorization list includes the identification information of the first terminal, wherein the authorization response is used for instructing the first terminal to establish a network connection with the AP device.Type: GrantFiled: December 12, 2018Date of Patent: February 14, 2023Assignee: XI'AN YEP TELECOMMUNICATION TECHNOLOGY, LTD.Inventor: Wei Li
-
Patent number: 11582190Abstract: A message-hold decision maker system used with an electronic mail processing system that processes electronic messages for a protected computer network improves the electronic mail processing system's performance by increasing the throughput performance of the system. The improvements are achieved by providing an electronic mail processing gateway with additional logic that makes fast and intelligent decisions on whether to hold, block, allow, or sandbox electronic messages in view of potential threats such as viruses or URL-based threats. A message hold decision maker uses current and stored information from a plurality of specialized classification engines to quickly make the decisions. In some examples, the message hold decision maker will instruct an email gateway to hold an electronic mail message while the classification engines perform further analysis.Type: GrantFiled: March 31, 2020Date of Patent: February 14, 2023Assignee: Proofpoint, Inc.Inventors: Alina V. Khayms, Gregory Lee Wittel
-
Patent number: 11579985Abstract: Disclosed herein are systems and method for preventing malware reoccurrence when restoring a computing device using a backup image. In one exemplary aspect, a method may identify, from a plurality of backup images for a computing device, a backup image that was created most recently before the computing device was compromised. The method may mount the backup image as a disk and scanning the disk for malicious software. The method may disable all ports and services on the computing device to prevent unauthorized network connections and service launches. The method may restore data to the computing device from the mounted disk. The method may update software on the computing device and applying latest patches, and reopen the ports and restart the services on the computing device subsequent to updating the software and applying the latest patches.Type: GrantFiled: June 1, 2020Date of Patent: February 14, 2023Assignee: Acronis International GmbHInventors: Serguei Beloussov, Oleg Ishanov, Vladimir Strogov, Andrey Kulaga, Igor Kornachev, Alexey Sergeev, Anton Enakiev, Stanislav Protasov