Patents Examined by Paul J Skwierawski
-
Patent number: 12099618Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for intelligent verification of digital files via the analysis of metadata and other file characteristics. The system is adaptive, in that it can be adjusted based on the needs or goals of the user utilizing it, or may intelligently and proactively adapt based on the files or data received for processing. The system may be seamlessly embedded within existing applications or programs that the user may already use to interact with one or more entities.Type: GrantFiled: June 9, 2021Date of Patent: September 24, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Naoll Addisu Merdassa
-
Patent number: 12093375Abstract: Provided is a process that includes: obtaining a fictitious data entry associated with a field present in a plurality of records associated with an online resource; sending a query to a monitoring application, the query specifying the fictitious data entry and a request to determine whether a second repository of compromised data includes the fictitious data entry; in response to the query, receiving query results indicating that the second repository of compromised data includes the fictitious data entry; in response to the received indication that the second repository of compromised data includes the fictitious data entry, identifying at least some of the first set of one or more repositories that store the data entry; designating other data entries within the at least some of the first set of one or more repositories as potentially having been breached; and storing the designation in memory.Type: GrantFiled: January 30, 2020Date of Patent: September 17, 2024Assignee: SpyCloud, Inc.Inventors: David Endler, Alen Puzic, Edward Ross
-
Patent number: 12093403Abstract: An access validation device includes a user interface and one or more processors. The user interface includes at least one of a display and an audio output device. The one or more processors cause an identity wallet to generate a credential regarding a medical status of a user using credential data representative of the status received from a distributed ledger. The one or more processors cause the identity wallet to present an indication of the status using the user interface.Type: GrantFiled: February 26, 2021Date of Patent: September 17, 2024Assignee: TYCO FIRE & SECURITY GMBHInventor: Graeme Jarvis
-
Patent number: 12010237Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.Type: GrantFiled: January 25, 2022Date of Patent: June 11, 2024Assignee: QPQ Ltd.Inventors: Emanuele Ragnoli, Roberto Ripamonti
-
Patent number: 11991285Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: January 12, 2023Date of Patent: May 21, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Patent number: 11947714Abstract: An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to receive, using the wireless communication module, a secure unlock command from a remote server, the secure unlock command being generated when a remote service device transmits appliance identification data to the remote server, and unlock the external communication port to permit the remote service device to access operating software through the external communication port.Type: GrantFiled: November 9, 2021Date of Patent: April 2, 2024Assignee: Haier US Appliance Solutions, Inc.Inventors: Ryan James Scheckelhoff, Richard Dean Suel, II, John Gilman Chapman, Jr.
-
Patent number: 11900306Abstract: Embodiments are provided for tracking physical transfers of tokenized physical assets. A transferor request to transfer a digital token from a first address associated with the first computing device to a second address associated with a second computing device may be received by a first computing device, where the digital token corresponds to a unique identifier associated with a physical asset. The first computing device communicates the received transferor request including at least a first location parameter, determined by the first computing device based on signals received at a physical location thereof, to at least one node of a distributed ledger network. The first computing device receives a confirmation that the transfer of the digital token is approved based on a determination that a transferee request from the second computing device includes at least a second location parameter corresponding to the physical location of the first computing device.Type: GrantFiled: July 5, 2018Date of Patent: February 13, 2024Assignee: UNITED PARCEL SERVICE OF AMERICA, INC.Inventor: Robert J. Gillen
-
Patent number: 11880451Abstract: Systems, methods, and software can be used for securing injected codes of a browser plugin. One example of a method includes establishing a code package to be injected into a web page. The code package comprises at least one element, and the at least one element includes a first script to be executed before executing a code of the web page. The method further includes injecting the at least one element to the web page to execute the first script. The execution of the first script comprises generating a script element comprising one or more secrets. The method further comprises appending the script element to the web page and deleting the script element from the web page.Type: GrantFiled: January 29, 2021Date of Patent: January 23, 2024Assignee: BlackBerry LimitedInventor: Nick Ehli Cano
-
Patent number: 11874945Abstract: A method and a system for dynamically scanning, filtering, and blocking harmful database queries that would otherwise consume significant resources and adversely impact overall system performance are provided. The method includes: receiving a user request for data from a database, the first request including a query; applying database access rules to the query in order to determine whether the query is potentially harmful; when the query is determined as not potentially harmful, forwarding the request to a server configured to respond to the request; and when the first query is determined as being potentially harmful, transmitting a warning message to the user. The database access rules may include a maximum memory consumption rule and a maximum CPU consumption rule. Machine learning techniques are used for adjusting the database access rules based on historical data.Type: GrantFiled: July 15, 2020Date of Patent: January 16, 2024Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Robert MacAndrew, Miklos Kalman, Joel Klein
-
Patent number: 11847244Abstract: A private information detector for data loss prevention is described.Type: GrantFiled: August 20, 2019Date of Patent: December 19, 2023Assignee: Shoreline Labs, Inc.Inventors: Isaac Abhay Madan, Rohan Shrikant Sathe, Trung Hoai Nguyen, Yiang Zheng
-
Patent number: 11824884Abstract: Systems, computer program products, and methods are described herein for generating responsive actions based on unauthorized access events associated with imitation networks. The present invention is configured to retrieve information associated with unauthorized access attempts associated with an imitation dataset; generate penetration test scenarios based on at least the types of unauthorized access attempts; initiate the penetration test scenarios on real datasets stored in data repositories within a network environment; determine automated network security responses to the penetration test scenarios; determine the unauthorized access attempts that were not successfully blocked and/or reported; determine actions to be executed in response to the unauthorized access attempts that were not successfully blocked and/or reported; and update the network security features with the actions.Type: GrantFiled: October 5, 2020Date of Patent: November 21, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Nia Mack
-
Patent number: 11757631Abstract: An apparatus for releasing received command data includes a processor unit with a code generator, a cryptography module, and a comparison module. The code generator generates a transaction code. The apparatus has a transmitting unit which provides the transaction code via an unsecured data connection, a receiving unit which receives an external authentication code and command data via the unsecured data connection, and a memory unit which stores data of a predefined private key. Also disclosed is a transmission apparatus for command data. The transmission apparatus has a basic receiving unit which receives the transaction code, an input unit which receives the command data, a basic memory unit which stores the data of the predefined private key, a basic processor unit which has a basic cryptography module, and a basic transmitting unit which provides the external authentication code and the command data via the unsecured data connection.Type: GrantFiled: February 19, 2019Date of Patent: September 12, 2023Assignee: Airbus Defence and Space GmbHInventors: Thomas Heuer, Riqaq Woolnough
-
Patent number: 11748482Abstract: An information processing apparatus that successively activates a plurality of modules, comprises a first module, a second module, and a third module. The first module activates the second module which has been verified, and the second module activates the third module which has been verified. The first module includes verification information used for verifying both of the second module and the third module, verifies the second module using the verification information and verifies the third module using the verification information.Type: GrantFiled: March 21, 2019Date of Patent: September 5, 2023Assignee: Canon Kabushiki KaishaInventor: Yoshiharu Ito
-
Patent number: 11734259Abstract: An example operation may include one or more of generating, by an executing client, a blockchain transaction comprising an anonymous rating, a proof, a nullifier, and a root node value, receiving, by a smart contract, the blockchain transaction, the anonymous rating related to an authorizing client, verifying the proof with the root node value and the nullifier, verifying that the root node value is a current or a previous merkle tree root node value, adding the anonymous rating to a shared ledger, marking the nullifier as used, and storing the marked nullifier to the shared ledger.Type: GrantFiled: May 31, 2019Date of Patent: August 22, 2023Assignee: International Business Machines CorporationInventors: Rishi Saket, Pankaj S. Dayama, Nitin Singh
-
Patent number: 11601286Abstract: A signature verification platform includes: a locale classifying engine configured to decide a style of a signature by applying machine learning-based classification techniques to the signature that is input to the locale classifying engine; a parameter profile generating section configured to select a verification profile which suits the style decided by the locale classifying engine; and a verification engine configured to verify the signature using the verification profile selected by the parameter profile generating section.Type: GrantFiled: August 19, 2020Date of Patent: March 7, 2023Assignee: Wacom Co., Ltd.Inventor: Joss Daniel Giffard-Burley
-
Patent number: 11575692Abstract: To detect identity spray attacks, a machine learning model classifies account access attempts as authorized or unauthorized, based on dozens of different pieces of information (machine learning model features). Boosted tree, neural net, and other machine learning model technologies may be employed. Model training data may include user agent reputation data, IP address reputation data, device or agent or location familiarity indications, protocol identifications, aggregate values, and other data. Account credential hash sets or hash lists may serve as model inputs. Hashes may be truncated to further protect user privacy. Classifying an access attempt as unauthorized may trigger application of multifactor authentication, password change requirements, account suspension, or other security enhancements. Statistical or heuristic detections may supplement the model.Type: GrantFiled: December 4, 2020Date of Patent: February 7, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Sergio Romero Zambrano, Andrew Numainville, Maria Puertas Calvo, Abbinayaa Subramanian, Pui Yin Winfred Wong, Dana S. Kaufman, Eliza Kuzmenko
-
Patent number: 11569993Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: October 10, 2018Date of Patent: January 31, 2023Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Patent number: 11526608Abstract: Methods and systems for determining an affiliation of a given software with target software are provided. The method comprises: receiving a software source code of the given software; executing the software source code in an isolated program environment to identify at least one outgoing request of the given software, the at least one outgoing request being indicative of at least one respective function of the software source code; generating, based on the at least one outgoing request, a respective function identifier associated with the at least one respective function; applying at least one classifier to the respective function identifier to determine a likelihood parameter indicative of the given software being affiliated to a respective target software; in response to the likelihood parameter being equal to or greater than a predetermined likelihood parameter threshold: identifying the given software as being affiliated to the respective target software.Type: GrantFiled: October 22, 2020Date of Patent: December 13, 2022Assignee: GROUP IB TDS, LTDInventors: Pavel Vladimirovich Slipenchuk, Ilia Sergeevich Pomerantsev