Patents Examined by Olugbenga O Idowu
  • Patent number: 11595416
    Abstract: Disclosed is an improved approach for identifying security risks and breaches in a network by applying machine learning methods that learn resource access patterns in the network. Specifically, by observing the access pattern of the network entities (e.g. accounts, services, and hosts) from authorization requests/responses, the model through unsupervised learning, organizes the entity relationships into an ensemble of hierarchical models. The ensemble of hierarchical models can then be leveraged to create a series of metrics that can be used to identify various types of abnormalities in the access of a resource on the network. For instance, by further classifying the access request for a resource using abnormality scores into detection scenarios, the model is able to detect both an abnormality and the type of abnormality and include such information in a corresponding alarm when a security breach happens.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: February 28, 2023
    Assignee: Vectra AI, Inc.
    Inventors: Hsin Chen, Nicolas Beauchesne, Himanshu Mhatre, John Steven Mancini
  • Patent number: 11595217
    Abstract: For zero-touch provisioning of devices at scale using device configuration templates by device type, a secure element, a provisioning wizard, a provisioning client, an enrollment client, an update client, an enrollment service, an update publisher service, signing and encryption certificates, a method including generating device configuration templates for enrollment and update by device type, sending device configuration templates signed with a device owner signing certificate, and a device owner encryption certificate to the device manufacturer, generating a device configuration for a device based on the device configuration templates using a secure element on the device for immutable device identity, an extended configuration for the device, signing the device configuration with a device manufacturer signing certificate and a secure element signing certificate, encrypting the doubly signed device configuration with an owner encryption certificate, configuring bootstrap metadata, and configuring the device
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: February 28, 2023
    Assignee: DigiCert, Inc.
    Inventors: Srinivas Kumar, Atul Gupta, Shreya Uchil, Ruslan Ulanov, Srikesh Amrutur Srinivas
  • Patent number: 11595429
    Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.
    Type: Grant
    Filed: March 2, 2021
    Date of Patent: February 28, 2023
    Assignee: 802 Secure, Inc.
    Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
  • Patent number: 11587272
    Abstract: Disclosed herein are methods and systems for an intelligent, interactive, and augmented reality (AR) cloud platform. The platform can be implemented in many applications, such as providing real-time intelligent and interactive control between user input data and the resulting AR data, providing real-time and effective AR-based communication, or providing real-time control of physical devices in a remote network.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: February 21, 2023
    Inventor: Eliza Y Du
  • Patent number: 11562293
    Abstract: A computer implemented method of executing a software module includes a machine learning algorithm as an executable software component configurable to approximate a function relating a domain data set to a range data set; a data store; and a message handler as an executable software component arranged to receive input data and communicate output data for the module, wherein the message handler is adapted to determine domain parameters for the algorithm based on the input data and to generate the output data based on a result generated by the algorithm, the method including generating a message as input data for the module, the message including instructions for execution by the module to effect a modification of the machine learning algorithm of the module.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: January 24, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventor: Robert Ghanea-Hercock
  • Patent number: 11558180
    Abstract: An example operation may include one or more of receiving a request associated with a key-value pair stored in a database, determining whether a state of the key-value pair has changed since a most recently received request, and in response to a determination that the state of the key-value pair has changed, generating a data block that includes a changed state of the key-value pair and adding the generated data block to a hash-linked chain of data blocks.
    Type: Grant
    Filed: January 20, 2020
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventor: Jeronimo Irazabal
  • Patent number: 11556854
    Abstract: An example method includes initializing a configuration file for a machine learning model, wherein the initializing is performed in response to receiving a request from a user, and wherein the configuration file comprises a plurality of sections that is configurable by the user, configuring at least one parameter of a feature engineering rules section of the configuration file, wherein the configuring the at least one parameter of the feature engineering rules section is based on a first value provided by the user, configuring at least one parameter of an algorithm definitions section of the configuration file, wherein the configuring the at least one parameter of the algorithm definitions section is based on a second value provided by the user, and populating the configuration file using the feature engineering rules section as configured and the algorithm definitions section as configured, to generate the machine learning model.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: January 17, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Chris Vo, Jeremy T. Fix, Robert Woods, Jr.
  • Patent number: 11558396
    Abstract: A computer-implemented method for team-sourced anomaly vetting via automatically-delegated role definition. The method may include automatically determining that an event of the computing system corresponding to activity of an end user is anomalous. Based on the anomalous event, a permission store of the computing system may automatically be edited to include an access restriction on the end user, and a notification may be automatically generated and transmitted to one or both of the end user and another end user. The notification may provide access to an executable statement including code configured to be executed to remove the access restriction. A call to the executable statement by the other end user may be automatically received. Further, the permission store may be automatically edited to remove the access restriction on the end user.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: January 17, 2023
    Assignee: Mastercard International Incorporated
    Inventors: Lidan Yin, Naresh Gorantla, Dave Rogers, Tristan Miano, Thomas Hansen
  • Patent number: 11553337
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: January 10, 2023
    Assignee: Winkk, Inc.
    Inventors: Robert O. Keith, Jr., Bradley E. Gray
  • Patent number: 11552933
    Abstract: In an industrial system, a data capture apparatus can be configured to operate as a unidirectional communication connection between a private network and a public network. The data capture apparatus can be further configured to collect raw data from the private network. The raw data can define a data distribution. The data capture apparatus can be further configured, based on the data distribution of the raw data, to generate anonymized or synthetic data that represents the raw data. The anonymized data can be transmitted over the unidirectional communication connection to a receiver machine of the data capture apparatus. In some cases, the receiver machine can send the anonymized data to an analysis system within the public network, such that the raw data can be analyzed by the analysis system, based on the anonymized data that represents the raw data, without the analysis system obtaining the raw data.
    Type: Grant
    Filed: June 5, 2020
    Date of Patent: January 10, 2023
    Assignee: Siemens Mobility GmbH
    Inventors: Safia Rahmat, Leandro Pfleger de Aguiar, Omer Metel
  • Patent number: 11531780
    Abstract: A method provides a security action based on identity profile scores. One or more processors represent an identity profile as a knowledge graph. The processor(s) associate a set of changes of the identity profile across a plurality of identity networks with a fraud score. The processor(s) then implement a security action based on the fraud score.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: December 20, 2022
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Arjun Natarajan, Kapil Kumar Singh, Joshua F. Payne
  • Patent number: 11531768
    Abstract: Provided is a data protection method which includes: receiving transaction data which includes a first hash value obtained from history information of a home; obtaining, from a data server, a second hash value computed by the data server performing computation processing on encrypted history information without decrypting the encrypted history information, the encrypted history information being history information of the home encrypted using a secure computation method which enables computation without decrypting the encrypted history information, the encrypted history information being obtained from the home; verifying the transaction data, and determining whether the first hash value and the second hash value match; and when a validity of the transaction data is verified and the first hash value and the second hash value match, recording the transaction data in a distributed ledger.
    Type: Grant
    Filed: July 26, 2019
    Date of Patent: December 20, 2022
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventor: Yuji Unagami
  • Patent number: 11528133
    Abstract: This specification discloses a quantum public-key cryptosystem. The quantum public-key cryptosystem may use two rotation operators R{circumflex over (n)}(?) and R{circumflex over (m)}(?) satisfying a cyclic evolution. The two rotation operators R{circumflex over (n)}(?) and R{circumflex over (m)}(?) do not have a commutation relation or an anti-commutation relation with each other. The commutation relation or the anti-commutation relation is established when either of the following conditions is satisfied: ?=2i?, ?=2j?, or {circumflex over (n)}·{circumflex over (m)}=1 (i, j=integer), and ?=(2k+1)?, ?=(2l+1)?, or {circumflex over (n)}·{circumflex over (m)}=0 (k, l=integer).
    Type: Grant
    Filed: January 10, 2020
    Date of Patent: December 13, 2022
    Assignee: Korea Institute of Science and Technology
    Inventors: Sang Wook Han, Sung Wook Moon, Yong Su Kim, Sang Yun Lee, Young Wook Cho, Min Sung Kang, Ji Woong Choi
  • Patent number: 11522841
    Abstract: The disclosed computer-implemented method may include receiving, from a third party, a portion of data or computer-executable logic that is part of a specified model. Each model may include various portions of independently verifiable computer-executable logic. The method may further include receiving data at a processing engine. The processing engine may be configured to apply the specified model to the received data. The method may then execute the specified model at the processing engine to modify the received data and send the modified data to an application that is configured to process the modified data. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: December 6, 2022
    Assignee: Meta Platforms Technologies, LLC
    Inventor: Andrew Lovitt
  • Patent number: 11522842
    Abstract: Apparatus and method for device and data authentication in a computer network, such as but not limited to an IoT (Internet of Things) network. In some embodiments, a trust hub device is coupled to an interconnectivity device. The trust hub device includes a controller and non-volatile memory (NVM), and may be a network capable data storage device. The interconnectivity device is configured as an Internet of Things (IoT) or Operational Technology (OT) device, and includes a controller and a sensor. Data from the sensor are transferred from the interconnectivity device to the trust hub device. The trust hub device proceeds to attest a provenance of the data from the sensor to a remote entity associated with the interconnectivity device. The trust hub device includes a firewall to the external network, establishes a root of trust for the local interconnectivity device, and performs enrollment and signing services for the interconnectivity device.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: December 6, 2022
    Inventor: Nyuk Fah Alice Lee
  • Patent number: 11523182
    Abstract: Methods and systems are described for a media guidance application that enhances the viewing experiences of users consuming a sequence of media. In particular, the media guidance application may enhance the viewing experiences of users consuming a sequence of media by removing portions of redundant media that were previously consumed by the user.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: December 6, 2022
    Assignee: ROVI GUIDES, INC.
    Inventors: Milan Patel, John Patterson, Charles Dawes, Jerry Vennerholm, Andrew Hunter, Gavin Clarke
  • Patent number: 11507677
    Abstract: The present disclosure relates to processing operations that execute image classification training for domain-specific traffic, where training operations are entirely compliant with data privacy regulations and policies. Image classification model training, as described herein, is configured to classify meaningful image categories in domain-specific scenarios where there is unknown data traffic and strict data compliance requirements that result in privacy-limited image data sets. Iterative image classification training satisfies data compliance requirements through a combination of online image classification training and offline image classification training. This results in tuned image recognition classifiers that have improved accuracy and efficiency over general image recognition classifiers when working with domain-specific data traffic. One or more image recognition classifiers are independently trained and tuned to detect an image class for image classification.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: November 22, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ji Li, Youjun Liu, Amit Srivastava
  • Patent number: 11502848
    Abstract: According to various aspects, a blockchain entity is described herein to include a receiver configured to receive a digital signature of a certification entity for a cooperation between the blockchain entity and an off-chain device, a validity checker configured to check whether the digital signature for the cooperation is valid, and a controller configured to perform the cooperation with the off-chain device if the digital signature for the cooperation is valid.
    Type: Grant
    Filed: September 18, 2019
    Date of Patent: November 15, 2022
    Assignee: INFINEON TECHNOLOGIES AG
    Inventor: Wen Xin Leong
  • Patent number: 11496306
    Abstract: Communication circuitry associates a data source with a source Identifier (ID) and a cryptographic key and associates a data target with a target ID, contact token, contact condition, and contact information. The communication circuitry receives and decrypts the encrypted source ID, the encrypted target ID, and the encrypted contact token with the cryptographic key, and in response, authenticates the source ID, authenticates the target ID, and validates the contact token. When the authentication and validation are successful, the communication circuitry selects a portion of the contact information based on the contact condition, encrypts the selected contact information, and transfers the encrypted selected contact information to the data source. The data source uses the selected contact information and the contact token to transfer data to the data target. The data target uses the contact token to validate the data source.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: November 8, 2022
    Assignee: Sprint Communications Company L.P.
    Inventor: Pierce Andrew Gorman
  • Patent number: 11494490
    Abstract: A plurality of events associated with each of a plurality of computing nodes that form part of a network topology are monitored. The network topology includes antivirus tools to detect malicious software prior to it accessing one of the computing nodes. Thereafter, it is determined that, using at least one machine learning model, at least one of the events is indicative of malicious activity that has circumvented or bypassed the antivirus tools. Data is then provided that characterizes the determination. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: November 8, 2022
    Assignee: Cylance Inc.
    Inventors: Rahul Chander Kashyap, Vadim Dmitriyevich Kotov, Samuel John Oswald, Homer Valentine Strong