Patents Examined by Paul J Skwierawski
  • Patent number: 12099618
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for intelligent verification of digital files via the analysis of metadata and other file characteristics. The system is adaptive, in that it can be adjusted based on the needs or goals of the user utilizing it, or may intelligently and proactively adapt based on the files or data received for processing. The system may be seamlessly embedded within existing applications or programs that the user may already use to interact with one or more entities.
    Type: Grant
    Filed: June 9, 2021
    Date of Patent: September 24, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Joseph Benjamin Castinado, Naoll Addisu Merdassa
  • Patent number: 12093375
    Abstract: Provided is a process that includes: obtaining a fictitious data entry associated with a field present in a plurality of records associated with an online resource; sending a query to a monitoring application, the query specifying the fictitious data entry and a request to determine whether a second repository of compromised data includes the fictitious data entry; in response to the query, receiving query results indicating that the second repository of compromised data includes the fictitious data entry; in response to the received indication that the second repository of compromised data includes the fictitious data entry, identifying at least some of the first set of one or more repositories that store the data entry; designating other data entries within the at least some of the first set of one or more repositories as potentially having been breached; and storing the designation in memory.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: September 17, 2024
    Assignee: SpyCloud, Inc.
    Inventors: David Endler, Alen Puzic, Edward Ross
  • Patent number: 12093403
    Abstract: An access validation device includes a user interface and one or more processors. The user interface includes at least one of a display and an audio output device. The one or more processors cause an identity wallet to generate a credential regarding a medical status of a user using credential data representative of the status received from a distributed ledger. The one or more processors cause the identity wallet to present an indication of the status using the user interface.
    Type: Grant
    Filed: February 26, 2021
    Date of Patent: September 17, 2024
    Assignee: TYCO FIRE & SECURITY GMBH
    Inventor: Graeme Jarvis
  • Patent number: 12010237
    Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.
    Type: Grant
    Filed: January 25, 2022
    Date of Patent: June 11, 2024
    Assignee: QPQ Ltd.
    Inventors: Emanuele Ragnoli, Roberto Ripamonti
  • Patent number: 11991285
    Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.
    Type: Grant
    Filed: January 12, 2023
    Date of Patent: May 21, 2024
    Assignee: Koninklijke Philips N.V.
    Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
  • Patent number: 11947714
    Abstract: An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to receive, using the wireless communication module, a secure unlock command from a remote server, the secure unlock command being generated when a remote service device transmits appliance identification data to the remote server, and unlock the external communication port to permit the remote service device to access operating software through the external communication port.
    Type: Grant
    Filed: November 9, 2021
    Date of Patent: April 2, 2024
    Assignee: Haier US Appliance Solutions, Inc.
    Inventors: Ryan James Scheckelhoff, Richard Dean Suel, II, John Gilman Chapman, Jr.
  • Patent number: 11900306
    Abstract: Embodiments are provided for tracking physical transfers of tokenized physical assets. A transferor request to transfer a digital token from a first address associated with the first computing device to a second address associated with a second computing device may be received by a first computing device, where the digital token corresponds to a unique identifier associated with a physical asset. The first computing device communicates the received transferor request including at least a first location parameter, determined by the first computing device based on signals received at a physical location thereof, to at least one node of a distributed ledger network. The first computing device receives a confirmation that the transfer of the digital token is approved based on a determination that a transferee request from the second computing device includes at least a second location parameter corresponding to the physical location of the first computing device.
    Type: Grant
    Filed: July 5, 2018
    Date of Patent: February 13, 2024
    Assignee: UNITED PARCEL SERVICE OF AMERICA, INC.
    Inventor: Robert J. Gillen
  • Patent number: 11880451
    Abstract: Systems, methods, and software can be used for securing injected codes of a browser plugin. One example of a method includes establishing a code package to be injected into a web page. The code package comprises at least one element, and the at least one element includes a first script to be executed before executing a code of the web page. The method further includes injecting the at least one element to the web page to execute the first script. The execution of the first script comprises generating a script element comprising one or more secrets. The method further comprises appending the script element to the web page and deleting the script element from the web page.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: January 23, 2024
    Assignee: BlackBerry Limited
    Inventor: Nick Ehli Cano
  • Patent number: 11874945
    Abstract: A method and a system for dynamically scanning, filtering, and blocking harmful database queries that would otherwise consume significant resources and adversely impact overall system performance are provided. The method includes: receiving a user request for data from a database, the first request including a query; applying database access rules to the query in order to determine whether the query is potentially harmful; when the query is determined as not potentially harmful, forwarding the request to a server configured to respond to the request; and when the first query is determined as being potentially harmful, transmitting a warning message to the user. The database access rules may include a maximum memory consumption rule and a maximum CPU consumption rule. Machine learning techniques are used for adjusting the database access rules based on historical data.
    Type: Grant
    Filed: July 15, 2020
    Date of Patent: January 16, 2024
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Robert MacAndrew, Miklos Kalman, Joel Klein
  • Patent number: 11847244
    Abstract: A private information detector for data loss prevention is described.
    Type: Grant
    Filed: August 20, 2019
    Date of Patent: December 19, 2023
    Assignee: Shoreline Labs, Inc.
    Inventors: Isaac Abhay Madan, Rohan Shrikant Sathe, Trung Hoai Nguyen, Yiang Zheng
  • Patent number: 11824884
    Abstract: Systems, computer program products, and methods are described herein for generating responsive actions based on unauthorized access events associated with imitation networks. The present invention is configured to retrieve information associated with unauthorized access attempts associated with an imitation dataset; generate penetration test scenarios based on at least the types of unauthorized access attempts; initiate the penetration test scenarios on real datasets stored in data repositories within a network environment; determine automated network security responses to the penetration test scenarios; determine the unauthorized access attempts that were not successfully blocked and/or reported; determine actions to be executed in response to the unauthorized access attempts that were not successfully blocked and/or reported; and update the network security features with the actions.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: November 21, 2023
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Brandon Sloane, Nia Mack
  • Patent number: 11757631
    Abstract: An apparatus for releasing received command data includes a processor unit with a code generator, a cryptography module, and a comparison module. The code generator generates a transaction code. The apparatus has a transmitting unit which provides the transaction code via an unsecured data connection, a receiving unit which receives an external authentication code and command data via the unsecured data connection, and a memory unit which stores data of a predefined private key. Also disclosed is a transmission apparatus for command data. The transmission apparatus has a basic receiving unit which receives the transaction code, an input unit which receives the command data, a basic memory unit which stores the data of the predefined private key, a basic processor unit which has a basic cryptography module, and a basic transmitting unit which provides the external authentication code and the command data via the unsecured data connection.
    Type: Grant
    Filed: February 19, 2019
    Date of Patent: September 12, 2023
    Assignee: Airbus Defence and Space GmbH
    Inventors: Thomas Heuer, Riqaq Woolnough
  • Patent number: 11748482
    Abstract: An information processing apparatus that successively activates a plurality of modules, comprises a first module, a second module, and a third module. The first module activates the second module which has been verified, and the second module activates the third module which has been verified. The first module includes verification information used for verifying both of the second module and the third module, verifies the second module using the verification information and verifies the third module using the verification information.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: September 5, 2023
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yoshiharu Ito
  • Patent number: 11734259
    Abstract: An example operation may include one or more of generating, by an executing client, a blockchain transaction comprising an anonymous rating, a proof, a nullifier, and a root node value, receiving, by a smart contract, the blockchain transaction, the anonymous rating related to an authorizing client, verifying the proof with the root node value and the nullifier, verifying that the root node value is a current or a previous merkle tree root node value, adding the anonymous rating to a shared ledger, marking the nullifier as used, and storing the marked nullifier to the shared ledger.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: August 22, 2023
    Assignee: International Business Machines Corporation
    Inventors: Rishi Saket, Pankaj S. Dayama, Nitin Singh
  • Patent number: 11601286
    Abstract: A signature verification platform includes: a locale classifying engine configured to decide a style of a signature by applying machine learning-based classification techniques to the signature that is input to the locale classifying engine; a parameter profile generating section configured to select a verification profile which suits the style decided by the locale classifying engine; and a verification engine configured to verify the signature using the verification profile selected by the parameter profile generating section.
    Type: Grant
    Filed: August 19, 2020
    Date of Patent: March 7, 2023
    Assignee: Wacom Co., Ltd.
    Inventor: Joss Daniel Giffard-Burley
  • Patent number: 11575692
    Abstract: To detect identity spray attacks, a machine learning model classifies account access attempts as authorized or unauthorized, based on dozens of different pieces of information (machine learning model features). Boosted tree, neural net, and other machine learning model technologies may be employed. Model training data may include user agent reputation data, IP address reputation data, device or agent or location familiarity indications, protocol identifications, aggregate values, and other data. Account credential hash sets or hash lists may serve as model inputs. Hashes may be truncated to further protect user privacy. Classifying an access attempt as unauthorized may trigger application of multifactor authentication, password change requirements, account suspension, or other security enhancements. Statistical or heuristic detections may supplement the model.
    Type: Grant
    Filed: December 4, 2020
    Date of Patent: February 7, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sergio Romero Zambrano, Andrew Numainville, Maria Puertas Calvo, Abbinayaa Subramanian, Pui Yin Winfred Wong, Dana S. Kaufman, Eliza Kuzmenko
  • Patent number: 11569993
    Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: January 31, 2023
    Assignee: Koninklijke Philips N.V.
    Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
  • Patent number: 11526608
    Abstract: Methods and systems for determining an affiliation of a given software with target software are provided. The method comprises: receiving a software source code of the given software; executing the software source code in an isolated program environment to identify at least one outgoing request of the given software, the at least one outgoing request being indicative of at least one respective function of the software source code; generating, based on the at least one outgoing request, a respective function identifier associated with the at least one respective function; applying at least one classifier to the respective function identifier to determine a likelihood parameter indicative of the given software being affiliated to a respective target software; in response to the likelihood parameter being equal to or greater than a predetermined likelihood parameter threshold: identifying the given software as being affiliated to the respective target software.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: December 13, 2022
    Assignee: GROUP IB TDS, LTD
    Inventors: Pavel Vladimirovich Slipenchuk, Ilia Sergeevich Pomerantsev