Patents Examined by Paul E. Callahan
  • Patent number: 11928206
    Abstract: Examples of the present disclosure describe systems and methods for selective export address table filtering. In aspects, the relative virtual address (RVA) of exported function names may be modified to point to a protected memory location. An exception handler may be registered to process exceptions relating to access violations of the protected memory location. If an exception is detected that indicates an attempt to access the protected memory location, the instruction pointer of the exception may be compared to an allowed range of memory addresses. If the instruction pointer address is outside the boundaries, remedial action may occur.
    Type: Grant
    Filed: April 20, 2023
    Date of Patent: March 12, 2024
    Assignee: Open Text Inc.
    Inventors: Eric Klonowski, Ira Strawser
  • Patent number: 11902289
    Abstract: A computer-implemented method is disclosed. The method includes: receiving, from a web server associated with a protected resource, a first signal including a request to validate a bearer token submitted by a client device to the web server, the bearer token including a digital signature; validating the bearer token, the validating including verifying the digital signature using a public key associated with an end user of the client device; and in response to validating the bearer token, sending to the web server a second signal including a notification that the bearer token is valid.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: February 13, 2024
    Assignee: The Toronto-Dominion Bank
    Inventors: Milos Dunjic, Anthony Haituyen Nguyen, Yubing Liu, Arthur Carroll Chow, Casey Lyn Doyle, Richard John Frederick Thake, Mengfei Wang, Aaron Ashish Hudali, Gregory Albert Kliewer, Martin Albert Lozon, Yusbel Garcia Diaz, Gareth Daly, Masashi Kobayashi, Randall John Bast
  • Patent number: 11886573
    Abstract: A threat level analyzer probes for one or more threats within an application container in a container system. Each threat is a vulnerability or a non-conformance with a benchmark setting. The threat level analyzer further probes for one or more threats within a host of the container service. The threat level analyzer generates a threat level assessment score based on results from the probing of the one or more threats of the application container and the one or more threats of the host, and generates a report for presentation in a user interface including the threat level assessment score and a list of threats discovered from the probe of the application container and the host. A report is transmitted by the threat level analyzer to a client device of a user for presentation in the user interface.
    Type: Grant
    Filed: August 27, 2021
    Date of Patent: January 30, 2024
    Assignee: SUSE LLC
    Inventors: Henrik Rosendahl, Fei Huang, Gang Duan
  • Patent number: 11874947
    Abstract: A method may include storing access rights with respect to a plurality of shared data ledgers, wherein each respective shared data ledger of the plurality of shared data ledgers comprises: a plurality of data portions; and at least one data record stored within a data portion of the plurality of data portions; receiving a request, from a requesting computing device, the request including: a requesting identifier stored in a data record of a first shared data ledger; and a request for information, associated with the requesting identifier, stored in a second shared data ledger; determining that the requesting computing device is authorized to access the information stored in the second shared data ledger based on the stored access rights; and based on the determining: accessing the information associated with the requesting identifier from the second shared data ledger; and transmitting at least a portion of the accessed information.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: January 16, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventor: David Newman
  • Patent number: 11841948
    Abstract: Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.
    Type: Grant
    Filed: November 1, 2021
    Date of Patent: December 12, 2023
    Assignee: Fortinet, Inc.
    Inventor: Jeremy Allen Wildsmith
  • Patent number: 11811953
    Abstract: Disclosed is a physical unclonable function generator circuit and testing method. In one embodiment, a physical unclonable function (PUF) generator includes: a PUF cell array comprising a plurality of bit cells configured in a plurality of columns and at least one row, wherein each of the plurality of columns is coupled to at least two pre-discharge transistors, and each of the plurality of bit cells comprises at least one enable transistor, at least two access transistors, and at least two storage nodes, and a PUF control circuit coupled to the PUF cell array, wherein the PUF control circuit is configured to access the plurality of bit cells to pre-charge the at least two storage nodes with substantially the same voltages allowing each of the plurality of bit cell having a first metastable logical state; to determine a second logical state; and based on the determined second logical states of the plurality of bit cells, to generate a PUF signature.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: November 7, 2023
    Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.
    Inventors: Shih-Lien Linus Lu, Cormac Michael O'Connell
  • Patent number: 11799863
    Abstract: A collection unit (15a) collects information on IoT devices connected to IoT gateways and white lists of the IoT devices, retained by the IoT gateways. An extraction unit (15b) extracts white lists of IoT devices that satisfies a prescribed condition related to the number of the IoT devices of each model or the number of installed locations of the IoT devices of each model from the collected white lists of the IoT devices using the collected information on the IoT devices so as to create a tentative white list. A coupling unit (15c) couples the created tentative white list and the white lists retained by the respective IoT gateways together so as to create a white list applied to the respective IoT gateways.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: October 24, 2023
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Koki Nomura, Yukio Nagafuchi, Masaki Tanikawa
  • Patent number: 11799873
    Abstract: This invention relates to systems and methods for verifying reliability and validity of crowd sourcing users and/or reliability and validity of tasks, executed by crowd sourcing users. Key task implementing procedures are computerized and mapped as system events and/or user actions, which can trigger data obtaining when users navigate in the platforms and/or systems. The obtained data from the triggered data obtaining is authenticated. Stamped data chain is constructed from the obtained data. A reference data chain is used to set the expected geographic location and/or time for task implementing. The reference data chain is generated from the reference information supplied by users. Matching process is implemented by checking if the stamped data chain can match with the preset geographic and/or temporal conditions by the reference data chain. The degree of reliability and validity is determined based on the matching results.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: October 24, 2023
    Assignee: KeKeQiHuo (Shenzhen) Technologies Co., Ltd.
    Inventors: Shaode Zu, Xianwei Willam Shen
  • Patent number: 11775640
    Abstract: Systems and methods are described for detecting and preventing execution of malware on an on-demand code execution system. An on-demand code execution system may execute user-submitted code on virtual machine instances, which may be provisioned with various computing resources (memory, storage, processors, network bandwidth, etc.). These resources may be utilized in varying amounts or at varying rates during execution of the user-submitted code. The user-submitted code may also be unavailable for inspection for security or other reasons. A malware detection system may thus identify user-submitted code that corresponds to malware by monitoring resource utilization during execution of the code and generating a resource utilization signature, which enables comparison between the signature of the user-submitted code and resource utilization signatures of codes previously identified as malware.
    Type: Grant
    Filed: March 30, 2020
    Date of Patent: October 3, 2023
    Assignee: Amazon Technologies, Inc.
    Inventors: Mihir Sathe, Niall Mullen
  • Patent number: 11775638
    Abstract: A stackable filesystem that transparently tracks process file writes for forensic analysis. The filesystem comprises a base filesystem, and an overlay filesystem. Processes see the union of the upper and lower filesystems, but process writes are only reflected in the overlay. By providing per-process views of the filesystem using this stackable approach, a forensic analyzer can record a process's file-based activity—i.e., file creation, deletion, modification. These activities are then analyzed to identify indicators of compromise (IoCs). These indicators are then fed into a forensics analysis engine, which then quickly decides whether a subject (e.g., process, user) is malicious. If so, the system takes some proactive action to alert a proper authority, to quarantine the potential attack, or to provide other remediation. The approach enables forensic analysis without requiring file access mediation, or conducting system event-level collection and analysis, making it a lightweight, and non-intrusive solution.
    Type: Grant
    Filed: June 27, 2018
    Date of Patent: October 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Frederico Araujo, Anne E. Kohlbrenner, Marc Philippe Stoecklin, Teryl Paul Taylor
  • Patent number: 11755974
    Abstract: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.
    Type: Grant
    Filed: March 1, 2021
    Date of Patent: September 12, 2023
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Patent number: 11755770
    Abstract: Techniques for using contextual information to manage data that is subject to one or more data-handling requirements are described herein. In many instances, the techniques capture or depend upon the contextual information surrounding the creation and/or subsequent actions associated with the data. The contextual information may be updated as the data is handled in various manners. The contextual information may be used to identify data-handling requirements that are applicable to the data, such as regulations, standards, internal policies, business decisions, privacy obligations, security requirements, and so on. The techniques may analyze the contextual information at any time to provide responses regarding handling of the data to requests from requestors, such as administrators, applications, and others.
    Type: Grant
    Filed: July 20, 2020
    Date of Patent: September 12, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Colette Van Dyne, Jeffrey Friedberg
  • Patent number: 11734421
    Abstract: Systems and methods detect and neutralize malware infected electronic communications. Interface information is received at a client machine over a network from a server. The interface information includes a first input mechanism authorized for causing a first prompt to be presented in a user interface to receive user information and countermeasure information enabling the client machine to inspect the interface information on the client machine to detect modification of the interface information. The client device uses the countermeasure information to detect whether the interface information has been modified to include a second input mechanism not authorized for causing a second prompt to be presented in the user interface to receive user information.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: August 22, 2023
    Assignee: eBay Inc.
    Inventor: Joren Bartley McReynolds
  • Patent number: 11734464
    Abstract: A secure access kiosk includes a plurality of walls interconnected to form an interior area within the secure access kiosk, a soundproofing element fixed at each wall of the plurality of walls, an electromagnetic shielding element fixed at each wall of the plurality of walls, and an information processing system security container within the interior area of the secure access kiosk. The information processing system security container houses at least one of a thin client or an ultra-thin client, and the thin client or the ultra-thin client is configured to provide a software interface and to prevent data storage or encryption to be stored at the thin client or ultra-thin client. The thin client or the ultra-thin client can include an integrated classified network interface within the interior area of the secure access kiosk.
    Type: Grant
    Filed: September 8, 2022
    Date of Patent: August 22, 2023
    Assignee: MetaSCIF, Inc.
    Inventor: Jeremy Verbout
  • Patent number: 11709936
    Abstract: Aspects of the invention include receiving, by a processor, source code for a software program written in a first programming language. The received source code is converted into abstracted source code that is in a generic format that is different than a format of the first programming language. The abstracted source code is compared to known source code patterns. Based on determining that at least a subset of the abstracted source code matches a pattern in the known source code patterns, sending an alert to the user indicating that the received source code matches the pattern.
    Type: Grant
    Filed: July 8, 2020
    Date of Patent: July 25, 2023
    Assignee: International Business Machines Corporation
    Inventors: Andrew C. M. Hicks, Diane Marie Stamboni, Thomas William Conti, Gregg Arquero, Joshua David Steen, Michael Page Kasper
  • Patent number: 11706196
    Abstract: A network device is configured to receive an inbound packet from a first server device via a network tunnel, the first inbound packet including an outer header, a virtual private network (VPN) label, an inner header, and a data payload, the inner header including an inner source IP address of a source virtual machine. The processors are also configured to determine a first tunnel identifier, determine, based on the inner source IP address, a second tunnel identifier associated with a second server device hosting the source virtual machine, compare the second tunnel identifier with the first tunnel identifier to determine whether the tunnel on which the first inbound packet was received is the same as a tunnel used for forwarding traffic to the source virtual machine, and drop the inbound packet when the second tunnel identifier does not match the first tunnel identifier.
    Type: Grant
    Filed: August 31, 2020
    Date of Patent: July 18, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Sunanda L. Kommula, Nitin Kumar, Dmitry A. Shokarev
  • Patent number: 11671440
    Abstract: The present disclosure relates generally to improved systems and methods for ensuring continued network security in a data network. More specifically, present embodiments are directed to detecting and responding to the failure of a security detection module employed for network security in the data network. A detection failure monitoring system may detect that a security detection module has failed by executing a number of test cases simulating conditions that should be flagged by the security detection module. To that end, when the detection failure monitoring system determines that a security detection module did not flag a condition produced by an executed test case, the detection failure monitoring system may implement a response to address the failed security detection module. Accordingly, the systems and techniques provided herein may maintain network security with improved granularity and robustness.
    Type: Grant
    Filed: August 26, 2020
    Date of Patent: June 6, 2023
    Assignee: United Services Automobile Association (USAA)
    Inventors: Robert Jason Neel, Neelsen Cyrus
  • Patent number: 11663324
    Abstract: Concepts for acquiring information for identifying a security configuration for an application are proposed. In particular, the information is obtained by running the application in a development environment, detecting security requests made on behalf of the application, and then storing security information associated with the security requests in a security log. Using this concept, a security log may be obtained from which an appropriate security configuration may be determined.
    Type: Grant
    Filed: August 10, 2021
    Date of Patent: May 30, 2023
    Assignee: International Business Machines Corporation
    Inventors: Colin R. Penfold, Darren R. Beard, David Michael Key, Andrew David Clifton
  • Patent number: 11645387
    Abstract: An electronic device is disclosed. An electronic device according to various embodiments comprises: a processor; and a memory electrically connected to the processor, wherein the processor may be configured to: obtain a plurality of first parameters associated with attributes of at least one malicious code and a plurality of second parameters associated with a system in which the at least one malicious code is executed; obtain a similarity on the basis of a first comparison result according to a first comparison method between the plurality of first parameters and a second comparison result according to a second comparison method between the plurality of second parameters; and classify the at least one malicious code into at least one cluster on the basis of the similarity between the at least one malicious code. Other various embodiments may be provided.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: May 9, 2023
    Assignees: Samsung Electronics Co., Ltd., Korea University Research and Business Foundation
    Inventors: Jaewoo Seo, Suin Kang, Mincheol Kim, Hyemin Kim, Huykang Kim, Kiseok Do, Jooyeon Moon, Hyunmin Song, Sejoon Oh, Sooyeon Lee
  • Patent number: 11641584
    Abstract: Protecting from automatic reconnection with Wi-Fi access points having bad reputations. In some embodiments, a method may include determining that the mobile device is within range of a Wi-Fi access point, determining that the mobile device is configured to automatically reconnect to the Wi-Fi access point, receiving a request to indicate whether the Wi-Fi access point has a bad reputation, accessing an access point reputation database to determine whether the Wi-Fi access point has a bad reputation, sending an indication that the Wi-Fi access point has a bad reputation, and, in response to the indication that the Wi-Fi access point has a bad reputation, protecting the mobile device from the Wi-Fi access point by performing a remedial action at the mobile device.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: May 2, 2023
    Assignee: NORTONLIFELOCK INC.
    Inventors: Reese Timm, Roy Fine