Abstract: A system and method for executing and recording transactions for a key in a blockchain. A method includes creating a smart contract on receiving a request to order a key on lease for a first period of time. The method further includes determining an availability of the key and determining an availability of digital tokens in an account of the user. The method also includes executing the smart contract for the first period of time by executing a first transaction using the digital tokens and recording the executed first transaction and the executed smart contract in a block of a block chain to provide the key on lease.
Type:
Grant
Filed:
September 15, 2020
Date of Patent:
July 4, 2023
Assignee:
CARRIER CORPORATION
Inventors:
Ramesh Lingala, Gowthami Vuradi, Adam Kuenzi
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a computing device, which allows a device to be used in different classification levels by powering the device down and booting to a different classified level without the need to switch hard drives. The disclosed software shield and persona switcher (Shielder) module provides independent application environments (personas) for separate security domains while allowing fast transition between personas. Shielder module supports multiple security classification via a minimal system storage partitioning. Shielder module allows efficient collection and reallocation of memory and persistent storage according to need and priority. Shielder module provides secure management of communication media by directing the system communication according to the security profile of the active persona.
Type:
Grant
Filed:
November 9, 2020
Date of Patent:
June 13, 2023
Assignee:
ARCHITECTURE TECHNOLOGY CORPORATION
Inventors:
Jafar Al-Gharaibeh, Timothy Hartley, Ranga S. Ramanujan
Abstract: Plurality of users share a common key while permitting change of members sharing the common key and computational complexity required for key exchange is reduced. Ri and ci are computed based on a twisted pseudo-random function in a first key generation step. sid is generated based on a target-collision resistant hash function and (sid, R?, R?) is transmitted to communication devices Ui in a session ID generation step. T1 and T? are computed based on a pseudo-random function in a representative second key generation step. Tj is computed based on the pseudo-random function in a general second key generation step. k? is computed based on the twisted pseudo-random function and T?j is computed with respect to each j in a third key generation step. K1l and k1 are computed in a first session key generation step. A common key K2 is generated based on the pseudo-random function in a second session key generation step.
Type:
Grant
Filed:
June 17, 2021
Date of Patent:
June 13, 2023
Assignee:
NIPPON TELEGRAPH AND TELEPHONE CORPORATION
Abstract: Aspects of the disclosure relate to voice biometric authentication in a virtual assistant. In some embodiments, a computing platform may receive, from a user device, an audio file comprising a voice command to access information related to a user account. The computing platform may retrieve one or more voice biometric signatures from a voice biometric database associated with the user account, and apply a voice biometric matching algorithm to compare the voice command of the audio file to the one or more voice biometric signatures to determine if a match exists between the voice command and one of the one or more voice biometric signatures. In response to determining that a match exists, the computing platform may retrieve information associated with the user account, and then send, via the communication interface, the information associated with the user account to the user device.
Abstract: A computer system and method for managing a data request interface. The system includes a memory associated with the data request interface and coupled to a processor. The memory includes processor-executable instructions of the method for managing the data request interface. The method includes: receiving, from a first client device, a first signal including a primary authorization credential associated with a data record and a second signal including a request to generate an alternate authorization credential for use by a software module. The alternate authorization credential is associated with data retrieval constraints. The method includes generating the alternate authorization credential and configuring the data request interface to impose the data retrieval constraints for constraining data operations on the data record upon receipt of the alternate authorization credential.
Type:
Grant
Filed:
August 11, 2021
Date of Patent:
March 28, 2023
Assignee:
The Toronto-Dominion Bank
Inventors:
Milos Dunjic, David Samuel Tax, Arthur Carroll Chow, Peter Glen Nairn, Edward James Hood, Martin Albert Lozon, John Jong-Suk Lee, Arun Victor Jagga
Abstract: The present disclosure relates to a computer implemented method for verifying a computing device and preferably an operator associated with a security system, wherein the security system is specifically adapted for ensuring that the correct security operator is performing the correct task. The present disclosure also relates to a corresponding security system and a computer program product.
Abstract: Systems, methods, and related technologies for clustering are described. Network traffic is accessed from a network and the network may be associated with a plurality of entities. Behavior associated with each entity of the plurality of entities may be determined. The behavior may be determined based one or more communications associated with each entity. A processing device may be used to determine one or more clusters of entities based on entities having similar behavior. A cluster may comprise one or more entities with similar behavior. One or more anomalies may be determined based on the one or more clusters and storing data associated with at least one of the one or more clusters and the one or more anomalies may be stored.
Type:
Grant
Filed:
March 31, 2020
Date of Patent:
March 7, 2023
Assignee:
FORESCOUT TECHNOLOGIES, INC.
Inventors:
Arun Raghuramu, Aveek Kumar Das, Yang Zhang
Abstract: For zero-touch provisioning of devices at scale using device configuration templates by device type, a secure element, a provisioning wizard, a provisioning client, an enrollment client, an update client, an enrollment service, an update publisher service, signing and encryption certificates, a method including generating device configuration templates for enrollment and update by device type, sending device configuration templates signed with a device owner signing certificate, and a device owner encryption certificate to the device manufacturer, generating a device configuration for a device based on the device configuration templates using a secure element on the device for immutable device identity, an extended configuration for the device, signing the device configuration with a device manufacturer signing certificate and a secure element signing certificate, encrypting the doubly signed device configuration with an owner encryption certificate, configuring bootstrap metadata, and configuring the device
Abstract: Disclosed is an improved approach for identifying security risks and breaches in a network by applying machine learning methods that learn resource access patterns in the network. Specifically, by observing the access pattern of the network entities (e.g. accounts, services, and hosts) from authorization requests/responses, the model through unsupervised learning, organizes the entity relationships into an ensemble of hierarchical models. The ensemble of hierarchical models can then be leveraged to create a series of metrics that can be used to identify various types of abnormalities in the access of a resource on the network. For instance, by further classifying the access request for a resource using abnormality scores into detection scenarios, the model is able to detect both an abnormality and the type of abnormality and include such information in a corresponding alarm when a security breach happens.
Type:
Grant
Filed:
April 28, 2020
Date of Patent:
February 28, 2023
Assignee:
Vectra AI, Inc.
Inventors:
Hsin Chen, Nicolas Beauchesne, Himanshu Mhatre, John Steven Mancini
Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.
Type:
Grant
Filed:
March 2, 2021
Date of Patent:
February 28, 2023
Assignee:
802 Secure, Inc.
Inventors:
Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
Abstract: Disclosed herein are methods and systems for an intelligent, interactive, and augmented reality (AR) cloud platform. The platform can be implemented in many applications, such as providing real-time intelligent and interactive control between user input data and the resulting AR data, providing real-time and effective AR-based communication, or providing real-time control of physical devices in a remote network.
Abstract: A computer implemented method of executing a software module includes a machine learning algorithm as an executable software component configurable to approximate a function relating a domain data set to a range data set; a data store; and a message handler as an executable software component arranged to receive input data and communicate output data for the module, wherein the message handler is adapted to determine domain parameters for the algorithm based on the input data and to generate the output data based on a result generated by the algorithm, the method including generating a message as input data for the module, the message including instructions for execution by the module to effect a modification of the machine learning algorithm of the module.
Type:
Grant
Filed:
May 3, 2018
Date of Patent:
January 24, 2023
Assignee:
British Telecommunications Public Limited Company
Abstract: A computer-implemented method for team-sourced anomaly vetting via automatically-delegated role definition. The method may include automatically determining that an event of the computing system corresponding to activity of an end user is anomalous. Based on the anomalous event, a permission store of the computing system may automatically be edited to include an access restriction on the end user, and a notification may be automatically generated and transmitted to one or both of the end user and another end user. The notification may provide access to an executable statement including code configured to be executed to remove the access restriction. A call to the executable statement by the other end user may be automatically received. Further, the permission store may be automatically edited to remove the access restriction on the end user.
Type:
Grant
Filed:
May 29, 2020
Date of Patent:
January 17, 2023
Assignee:
Mastercard International Incorporated
Inventors:
Lidan Yin, Naresh Gorantla, Dave Rogers, Tristan Miano, Thomas Hansen
Abstract: An example operation may include one or more of receiving a request associated with a key-value pair stored in a database, determining whether a state of the key-value pair has changed since a most recently received request, and in response to a determination that the state of the key-value pair has changed, generating a data block that includes a changed state of the key-value pair and adding the generated data block to a hash-linked chain of data blocks.
Type:
Grant
Filed:
January 20, 2020
Date of Patent:
January 17, 2023
Assignee:
International Business Machines Corporation
Abstract: An example method includes initializing a configuration file for a machine learning model, wherein the initializing is performed in response to receiving a request from a user, and wherein the configuration file comprises a plurality of sections that is configurable by the user, configuring at least one parameter of a feature engineering rules section of the configuration file, wherein the configuring the at least one parameter of the feature engineering rules section is based on a first value provided by the user, configuring at least one parameter of an algorithm definitions section of the configuration file, wherein the configuring the at least one parameter of the algorithm definitions section is based on a second value provided by the user, and populating the configuration file using the feature engineering rules section as configured and the algorithm definitions section as configured, to generate the machine learning model.
Type:
Grant
Filed:
April 28, 2020
Date of Patent:
January 17, 2023
Assignee:
AT&T Intellectual Property I, L.P.
Inventors:
Chris Vo, Jeremy T. Fix, Robert Woods, Jr.
Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
Abstract: In an industrial system, a data capture apparatus can be configured to operate as a unidirectional communication connection between a private network and a public network. The data capture apparatus can be further configured to collect raw data from the private network. The raw data can define a data distribution. The data capture apparatus can be further configured, based on the data distribution of the raw data, to generate anonymized or synthetic data that represents the raw data. The anonymized data can be transmitted over the unidirectional communication connection to a receiver machine of the data capture apparatus. In some cases, the receiver machine can send the anonymized data to an analysis system within the public network, such that the raw data can be analyzed by the analysis system, based on the anonymized data that represents the raw data, without the analysis system obtaining the raw data.
Type:
Grant
Filed:
June 5, 2020
Date of Patent:
January 10, 2023
Assignee:
Siemens Mobility GmbH
Inventors:
Safia Rahmat, Leandro Pfleger de Aguiar, Omer Metel
Abstract: A method provides a security action based on identity profile scores. One or more processors represent an identity profile as a knowledge graph. The processor(s) associate a set of changes of the identity profile across a plurality of identity networks with a fraud score. The processor(s) then implement a security action based on the fraud score.
Type:
Grant
Filed:
May 15, 2019
Date of Patent:
December 20, 2022
Assignee:
International Business Machines Corporation
Abstract: Provided is a data protection method which includes: receiving transaction data which includes a first hash value obtained from history information of a home; obtaining, from a data server, a second hash value computed by the data server performing computation processing on encrypted history information without decrypting the encrypted history information, the encrypted history information being history information of the home encrypted using a secure computation method which enables computation without decrypting the encrypted history information, the encrypted history information being obtained from the home; verifying the transaction data, and determining whether the first hash value and the second hash value match; and when a validity of the transaction data is verified and the first hash value and the second hash value match, recording the transaction data in a distributed ledger.
Type:
Grant
Filed:
July 26, 2019
Date of Patent:
December 20, 2022
Assignee:
PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
Abstract: This specification discloses a quantum public-key cryptosystem. The quantum public-key cryptosystem may use two rotation operators R{circumflex over (n)}(?) and R{circumflex over (m)}(?) satisfying a cyclic evolution. The two rotation operators R{circumflex over (n)}(?) and R{circumflex over (m)}(?) do not have a commutation relation or an anti-commutation relation with each other. The commutation relation or the anti-commutation relation is established when either of the following conditions is satisfied: ?=2i?, ?=2j?, or {circumflex over (n)}·{circumflex over (m)}=1 (i, j=integer), and ?=(2k+1)?, ?=(2l+1)?, or {circumflex over (n)}·{circumflex over (m)}=0 (k, l=integer).
Type:
Grant
Filed:
January 10, 2020
Date of Patent:
December 13, 2022
Assignee:
Korea Institute of Science and Technology
Inventors:
Sang Wook Han, Sung Wook Moon, Yong Su Kim, Sang Yun Lee, Young Wook Cho, Min Sung Kang, Ji Woong Choi