Patents Examined by Morshed Mehedi
  • Patent number: 11601404
    Abstract: The present disclosure provides a secure, user-transparent, and highly efficient content provider-specific identifier (“CPSID”), sometimes referred to as a “read-only cookie” (“ROC”). These content provider-specific identifiers may be generated by the client device and encrypted with a public key of the content provider, preventing third parties from indirectly identifying matches, and obviating the need for provider-side cookie matching tables and resource-intensive tracking communications. The generation of content provider-specific identifiers may be controlled by user policies, such that identifiers are only created for content providers with compliant terms of service (ToS), e.g. retrievable from a predetermined address within the domain; content providers that are on a whitelist (e.g. for which the user has explicitly provided consent); and/or content providers that are not on a blacklist (e.g. for which the user has explicitly refused consent).
    Type: Grant
    Filed: April 5, 2018
    Date of Patent: March 7, 2023
    Assignee: Google LLC
    Inventors: Yian Gao, Gang Wang
  • Patent number: 11595195
    Abstract: Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset ? from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient ai of the polynomial a to produce Boolean shares âi that encode the same secret value ai; and performing in parallel for all coefficients a shared binary search to determine which of coefficients ai are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: February 28, 2023
    Assignee: NXP B.V.
    Inventors: Tobias Schneider, Joppe Willem Bos, Björn Fay, Marc Gourjon, Joost Roland Renes, Christine van Vredendaal
  • Patent number: 11595353
    Abstract: A system comprising email processing circuitry, web server circuitry, third-party interface circuitry, and a database, wherein the database stores information about a plurality of users. The system receives, via a network, a first email message and generates a modified first email message by insertion of a link to remotely-hosted content in the received email message. The system transmits, via a network interface, the modified first email message. The system receives, via a network, a request for the remotely-hosted content, and updates the database based on information contained in the request for the remotely-hosted content. The system receives, via a network, information about activity on a third-party system, and updates the database based on the information about activity on the third-party system. The system receives a second email message, determines an action to take on the second email message based on information in the database, and takes the action.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: February 28, 2023
    Assignee: Mimecast North America, Inc.
    Inventor: Paul Everton
  • Patent number: 11593491
    Abstract: Systems and methods to identify a software vulnerability are described. The system receives a message identifying a software vulnerability. The system identifies snapshot images taken of a production machine and stored in a database. The snapshot images include a snapshot image including a virtual machine. The snapshot images are identified being based on the message. The system identifies whether the snapshot images include the software vulnerability. The system registers the software vulnerability in association with a snapshot image in the database responsive to the identification of the snapshot image of the virtual machine including the software vulnerability.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: February 28, 2023
    Assignee: Rubrik, Inc.
    Inventor: Di Wu
  • Patent number: 11588853
    Abstract: A provider of a first network-based service provides a list of user data for users of the first network-based service to a provider of a second network-based service. The users associated with the list of user data access results of the one or more identity monitoring services from the first network-based service, the second network-based service, a third-party identity monitoring service, or any suitable combination thereof. Additional services are offered to one or more users associated with the list of user data. A user accepting the offer pays a fee to the offering provider for the additional service. Based on the user being associated with the list of user data provided by the provider of the first network-based service and the user paying the fee for the additional service, a portion of the fee is transferred to the provider of the first network-based service.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: February 21, 2023
    Assignee: IDENTITY THEFT GUARD SOLUTIONS, INC.
    Inventor: Brian Cleaver
  • Patent number: 11580215
    Abstract: Methods, systems, and devices for authenticating software images are described. A system may include one or more control units that use software images for managing different functions of the system. The system may also include a secure storage device configured to validate or authenticate the software images used by the different control units of the system. A software image of a control unit may be authenticated by generating a first hash associated with a portion of its underlying source code and generating a second hash associated with a corresponding portion of the source code of the copy of the software image stored to the secure storage device. Different patterns of the source code of the software images may be used to generate the hashes. The first hash and second hash may be compared, and the software image may be authenticated based on the hashes matching.
    Type: Grant
    Filed: September 14, 2020
    Date of Patent: February 14, 2023
    Assignee: Micron Technology, Inc.
    Inventor: Olivier Duval
  • Patent number: 11580231
    Abstract: There is provided a cryptographic key determination device for determining one or more cryptographic keys in a cryptographic device, the cryptographic device being configured to execute one or more test programs, the cryptographic device comprising one or more components (11-i), each component (11-i) being configured to generate static and dynamic data, the dynamic data being generated in response to the execution of the one or more test programs, wherein the cryptographic key determination device comprises: a data extraction unit configured to extract at least one part of the static data and at least one part of the dynamic data generated by the one or more components (11-i), and a key generator configured to combine the at least one part of static data and the at least one part of dynamic data, and to determine the one or more cryptographic keys by applying a cryptographic function to the combined data.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: February 14, 2023
    Assignee: SECURE-IC SAS
    Inventors: Youssef Souissi, Florent Lozac'h, Adrien Facon, Sylvain Guilley
  • Patent number: 11570211
    Abstract: A computerized system and method to detect phishing cyber-attacks is described. The approach entails analyzing one or more displayable images of a webpage referenced by a URL to ascertain whether the one or more displayable images, and thus the webpage and potentially an email including the URL, are part of a phishing cyber-attack.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: January 31, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventor: Rundong Liu
  • Patent number: 11570626
    Abstract: Systems, methods, apparatuses, and computer program products for dynamically updating routing identifiers (IDs) are provided. One method may include deciding, at a network node, to update a routing identifier for at least one user equipment. The method may then include obtaining or generating a new routing identifier to be assigned to the at least one user equipment along with authentication vectors, and transmitting the new routing identifier to an authentication entity.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: January 31, 2023
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Devaki Chandramouli, Suresh Nair, Laurent Thiebaut
  • Patent number: 11562067
    Abstract: Disclosed herein are systems and method for inspecting archived slices for malware using empty spare files. In one exemplary aspect, the method comprises generating a backup slice and a virtual volume comprising a list of files in the backup slice and associated file information. The method comprises mounting the virtual volume to a disk. The method comprises creating, in the virtual volume, empty sparse files that are placeholders of the files reference in the list of files. The method comprises detecting a change between a respective empty sparse file and a corresponding file in a previous backup slice and accordingly storing the actual content of the file in the virtual volume in place of the respective empty sparse file. The method comprises scanning the virtual volume for malicious software and generating a cured slice that replaces the backup slice in the backup archive upon detection.
    Type: Grant
    Filed: March 15, 2021
    Date of Patent: January 24, 2023
    Assignee: Acronis International GmbH
    Inventors: Vladimir Strogov, Anatoly Stupak, Andrey Kulaga, Alexey Sergeev, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11562060
    Abstract: A method, system and apparatus are disclosed. A device includes processing circuitry that includes a processor and a memory, where the memory is configured to store a logical container including a plurality of encrypted data portions and a plurality of executable code portions. Each encrypted data portion and executable code portion is separately encrypted with a different encryption key and associated with a user. The processing circuitry receives, from a software application operating in another device, a first request associated with at least one encrypted data portion and one executable code portion of the logical container. The first request includes an encryption token associated with the software application. In response to the first request, the processing circuitry triggers a verification code portion to determine whether the first request is authorized and performs at least one operation to fulfill the first request in response to determining the request is authorized.
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: January 24, 2023
    Assignee: Conveyance Media Group LLC
    Inventors: Sean Stephens, George E. Manges, William Browning
  • Patent number: 11558424
    Abstract: Techniques and mechanisms for using passively collected network data to automatically generate a fingerprint prevalence database without the need for endpoint ground truth. The process first clusters all observations with the same fingerprint string and similar source and destination context. The process then annotates each cluster with descriptive information and uses a rule-based system to derive an informative name from that descriptive information, e.g., “winnt amp client” or “cross-platform browser”. Optionally, the learned database may be augmented by a user to clarify custom process labels. Additionally, the generated database may be used to report the inferred processes in the same way as databases generated with endpoint ground truth.
    Type: Grant
    Filed: May 4, 2021
    Date of Patent: January 17, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Blake Harrell Anderson, David Arthur McGrew
  • Patent number: 11546345
    Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device.
    Type: Grant
    Filed: November 9, 2020
    Date of Patent: January 3, 2023
    Assignee: The Toronto-Dominion Bank
    Inventors: Dino D'Agostino, Perry Aaron Jones Haldenby, Dean Tseretopoulos, Jeffrey Ecker, Adam Douglas Mcphee, Milos Dunjic, John Jong-Suk Lee, Arun Victor Jagga
  • Patent number: 11544408
    Abstract: A system for collecting and managing vehicle-generated data from multiple vehicles are provided. The vehicle-generated data is pseudonymized by pseudonymized identifiers, and the pseudonymized vehicle-generated data is collected and managed by a neutral data server operated by an operator who is independent of vehicle manufacturers. Vehicle manufacturers can reestablish the link of the pseudonymized event data with the vehicle that had generated the event data and the vehicle driver.
    Type: Grant
    Filed: December 29, 2020
    Date of Patent: January 3, 2023
    Assignees: Hyundai Motor Company, Kia Motors Corporation, Hyundai Autoever Corporation
    Inventors: Wha Pyeong Lim, Seung Wook Park, Ju Yeon Lim, Jeong Gi Gong
  • Patent number: 11539687
    Abstract: A message right management method, and a device and storage medium for implementing the method, are provided. The message right management method includes obtaining a message created by a source user, and sending a message notification to a target user in a social platform. The method further includes verifying the target user when receiving a request for logging onto a message page from the target user, and controlling logon of the target user to the message page on the basis of a verification result. The method further includes, when receiving a service request of the target user with respect to the message, determining, based on a message right control policy, whether the target user has a right corresponding to a service requested by the service request, and controlling a response to the service request according to a determining result.
    Type: Grant
    Filed: August 5, 2020
    Date of Patent: December 27, 2022
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Yao Guang Chen, Bo Dong Liu
  • Patent number: 11526928
    Abstract: A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.
    Type: Grant
    Filed: February 3, 2020
    Date of Patent: December 13, 2022
    Assignee: Dell Products L.P.
    Inventor: Chooi Peng Low
  • Patent number: 11522861
    Abstract: Methods are provided to authorize a secondary user device for a network service provided over a network. Responsive to receiving a request from a primary user device, a voucher may be transmitted over the network to the primary user device. A request for an authorization waiver may be received from the secondary user device over the network, wherein the request for the authorization waiver includes the voucher that was transmitted to the primary user device. Responsive to receiving the request from the secondary user device including the voucher, an authorization waiver may be transmitted to the secondary user device. Related methods of operating primary and secondary user devices are also discussed.
    Type: Grant
    Filed: September 17, 2020
    Date of Patent: December 6, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Samy Touati, Paolo Fiorini
  • Patent number: 11520929
    Abstract: Methods and systems for securing unstructured data are provided. One method includes generating, by a processor, a schema from unstructured data, the schema including one or more relationships between named entities of the unstructured data; identifying, by the processor, a plurality of semantic relationships between the named entities; determining, by the processor, a sensitive relationship from the plurality of semantic relationships; and anonymizing, by the processor, sensitive data associated with the sensitive relationship by replacing, a first portion of the sensitive data with generalized information.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: December 6, 2022
    Assignee: NETAPP, INC.
    Inventors: Deepti Aggarwal, Jayanta Basak
  • Patent number: 11514168
    Abstract: An active attestation apparatus verifies at runtime the integrity of untrusted machine code of an embedded system residing in a memory device while it is being run/used with while slowing the processing time less than other methods. The apparatus uses an integrated circuit chip containing a microcontroller and a reprogrammable logic device, such as a field programmable gate array (FPGA), to implement software attestation at runtime and in less time than is typically possible with comparable attestation approaches, while not requiring any halt of the processor in the microcontroller. The reprogrammable logic device includes functionality to load an encrypted version of its configuration and operating code, perform a checksum computation, and communicate with a verifier. The checksum algorithm is preferably time optimized to execute computations in the reprogrammable logic device in the minimum possible time.
    Type: Grant
    Filed: June 8, 2021
    Date of Patent: November 29, 2022
    Assignee: United States of America as represented by the Secretary of the Air Force
    Inventors: Mark M. Stephenson, Patrick Reber, Patrick J. Sweeney, Scott Graham
  • Patent number: 11514194
    Abstract: Devices, methods, and systems for secure communications on a computing device. A host operating system (OS) runs on a host processor in communication with a host memory. A secure OS runs on a coprocessor in communication with a secure memory. The coprocessor receives information from an external device over a secure peer-to-peer (P2P) connection. The secure P2P connection is managed by the secure OS and is not accessible by the host OS.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: November 29, 2022
    Assignees: Advanced Micro Devices, Inc., ATI Technologies ULC
    Inventors: Guhan Krishnan, Carl K. Wakeland, Saikishore Reddipalli, Philip Ng