Patents Examined by Paul J Skwierawski
-
Patent number: 12212669Abstract: A quantum communications system may include a transmitter node, a receiver node, and a quantum communications channel coupling the transmitter node and receiver node. The transmitter node may include a pulse transmitter and pulse divider downstream therefrom. The receiver node may include a pulse recombiner and a pulse receiver downstream therefrom.Type: GrantFiled: February 19, 2021Date of Patent: January 28, 2025Assignee: EAGLE TECHNOLOGY, LLCInventors: Victor G. Bucklew, Fraser R. Dalgleish, Cypryan T. Klish, James A. Nagel
-
Patent number: 12200141Abstract: Disclosed embodiments may include a system that may receive a document associated with an entity and may generate a first hash associated with the document. The system may prompt a first user to provide a first signature of the document and may generate a second hash associated with the first signature. The system may prompt the first user to provide authentication information and may determine whether received authentication information matches stored authentication information. In response to determining the authentication information matches the stored authentication information, the system may prompt a second user to provide a second signature of the document, may generate a third hash associated with the second signature, may generate a fourth hash associated with a verified record of the first, second, and third hashes, may generate a block comprising the first, second, third, and fourth hashes, and may publish the block to a blockchain.Type: GrantFiled: October 5, 2021Date of Patent: January 14, 2025Assignee: CAPITAL ONE SERVICES, LLCInventor: Abel Fletcher
-
Patent number: 12200480Abstract: A device may include a processor configured to obtain a quantum key generated using quantum random numbers received from a quantum random number generator. The processor may be further configured to obtain a digital signature for a uniform resource locator (URL) associated with the obtained quantum key, wherein the digital signature is received from a security device configured to provide the quantum key to a user equipment (UE) device; receive a request from an application server to function as a proxy for a secure session with the UE device; authenticate the secure session with the UE device using the quantum key and the digital signature; and proxy the secure session between the UE device and the application server.Type: GrantFiled: January 20, 2022Date of Patent: January 14, 2025Assignee: Verizon Patent and Licensing Inc.Inventors: Mun Wei Low, Manuel Enrique Caceres, Lee E. Sattler, Connie P. Grigg
-
Patent number: 12184782Abstract: Data in various formats can be protected in a distributed tokenization environment. Examples of such formats include date and time data, decimal data, and floating point data. Such data can tokenized by a security device that instantiates a number of tokenization pipelines for parallel tokenization of the data. Characteristics of such data can be used to tokenize the data. For instance, token tables specific to the data format can be used to tokenized the data. Likewise, a type, order, or configuration of the operations within each tokenization pipeline can be selected based on the data format or characteristics of the data format. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The tokenization pipeline outputs are combined, producing tokenized data, which can be provided to a remote system for storage or processing.Type: GrantFiled: January 21, 2022Date of Patent: December 31, 2024Assignee: PROTEGRITY US HOLDING, LLCInventors: Ulf Mattsson, Denis Scherbakov
-
Patent number: 12174967Abstract: An assistance device (1) includes: a first storage unit (14) storing therein characteristic words related to risks; a second storage unit (16) storing therein pieces of risk countermeasure information related to risk countermeasures; an extraction unit (13) that extracts a word from an input character string, searches in the first storage unit for a characteristic word that is same as or similar to the word, and extracts one of the pieces of risk countermeasure information corresponding to the characteristic word from the second storage unit; and a presentation unit (18) that presents the extracted piece of risk countermeasure information.Type: GrantFiled: June 24, 2019Date of Patent: December 24, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hideaki Yamamoto, Kaku Takeuchi, Takahiko Yoshida, Fumihiko Magata
-
Patent number: 12164645Abstract: In some aspects, a system may receive security vulnerability indicators associated with one or more cloud-based applications and/or properties associated with one or more cloud-based images used to create cloud instances. The system may determine, for each indicator and/or property, a corresponding remediation recommendation. The system may generate a graphical user interface that provides the indicators and/or properties with the corresponding remediation recommendations. The system may transmit, based on a user setting, a corresponding message for each indicator and/or property. The system may trigger, based on at least one of the indicators and/or properties, an automated remediation script that instructs a cloud environment to perform an action for a cloud-based application and/or image associated with the at least one indicator and/or property. The system may transmit one or more status indicators associated with the automated remediation script. Numerous other aspects are described.Type: GrantFiled: January 8, 2021Date of Patent: December 10, 2024Assignee: Capital One Services, LLCInventors: Krystan R. Franzen, Mohamed Seck
-
Patent number: 12141290Abstract: A computer implemented method includes determining a first level of risk based on a context of source code as stored. A second level of risk is determined based on a change history of the source code. A third level of risk is determined by assessing a nature of changes to the source code. The first, second, and third levels of risk are combined to generate an indication of trust in the source code.Type: GrantFiled: May 26, 2021Date of Patent: November 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Daniel Carlyn Griffin, Anson Michael Horton, Ruben Josue Rios-Lopez
-
Patent number: 12143825Abstract: One example method includes an optimized approach to real-time utilization, data transfer, data storage, and transience in a T Hz-enabled zone that may be implemented in edge networks, data management, and machine learning. Multiple policies can be enforced based on new sets of attributes such as data type, location, and device movement within a zone or between zones.Type: GrantFiled: October 27, 2020Date of Patent: November 12, 2024Assignee: EMC IP Holding Company LLCInventors: Nicole Reineke, Robert A. Lincourt
-
Patent number: 12142073Abstract: Methods, systems, and apparatuses for device fingerprint-based authentication are provided herein. A computing device may receive, from a user device, authentication credentials and a first device fingerprint. The device fingerprint may be encrypted using a public/private key pair and may identify one or more aspects of the user device, such as operating parameters of the user device. Based on the authentication credentials, the computing device may authenticate the user device, store the first device fingerprint, and send a token to the user device. The computing device may receive a request for access to content. The request may comprise the token and a second device fingerprint. The second device fingerprint may be different from the first device fingerprint. Based on the token and comparing the first device fingerprint to the second device fingerprint, the computing device may determine whether to authenticate the device that sent the request.Type: GrantFiled: April 27, 2021Date of Patent: November 12, 2024Assignee: Capital One Services, LLCInventors: Parvez Naqvi, Bhagyashree Prabhakar, Anantha Swarma Kavi, Harsha Bilwani, Haranath Santosh, Suman Emudaboina Rajeshwar, Adane Gebremeskel
-
Patent number: 12099618Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for intelligent verification of digital files via the analysis of metadata and other file characteristics. The system is adaptive, in that it can be adjusted based on the needs or goals of the user utilizing it, or may intelligently and proactively adapt based on the files or data received for processing. The system may be seamlessly embedded within existing applications or programs that the user may already use to interact with one or more entities.Type: GrantFiled: June 9, 2021Date of Patent: September 24, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Naoll Addisu Merdassa
-
Patent number: 12093403Abstract: An access validation device includes a user interface and one or more processors. The user interface includes at least one of a display and an audio output device. The one or more processors cause an identity wallet to generate a credential regarding a medical status of a user using credential data representative of the status received from a distributed ledger. The one or more processors cause the identity wallet to present an indication of the status using the user interface.Type: GrantFiled: February 26, 2021Date of Patent: September 17, 2024Assignee: TYCO FIRE & SECURITY GMBHInventor: Graeme Jarvis
-
Patent number: 12093375Abstract: Provided is a process that includes: obtaining a fictitious data entry associated with a field present in a plurality of records associated with an online resource; sending a query to a monitoring application, the query specifying the fictitious data entry and a request to determine whether a second repository of compromised data includes the fictitious data entry; in response to the query, receiving query results indicating that the second repository of compromised data includes the fictitious data entry; in response to the received indication that the second repository of compromised data includes the fictitious data entry, identifying at least some of the first set of one or more repositories that store the data entry; designating other data entries within the at least some of the first set of one or more repositories as potentially having been breached; and storing the designation in memory.Type: GrantFiled: January 30, 2020Date of Patent: September 17, 2024Assignee: SpyCloud, Inc.Inventors: David Endler, Alen Puzic, Edward Ross
-
Patent number: 12010237Abstract: A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.Type: GrantFiled: January 25, 2022Date of Patent: June 11, 2024Assignee: QPQ Ltd.Inventors: Emanuele Ragnoli, Roberto Ripamonti
-
Patent number: 11991285Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: January 12, 2023Date of Patent: May 21, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Patent number: 11947714Abstract: An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to receive, using the wireless communication module, a secure unlock command from a remote server, the secure unlock command being generated when a remote service device transmits appliance identification data to the remote server, and unlock the external communication port to permit the remote service device to access operating software through the external communication port.Type: GrantFiled: November 9, 2021Date of Patent: April 2, 2024Assignee: Haier US Appliance Solutions, Inc.Inventors: Ryan James Scheckelhoff, Richard Dean Suel, II, John Gilman Chapman, Jr.
-
Patent number: 11900306Abstract: Embodiments are provided for tracking physical transfers of tokenized physical assets. A transferor request to transfer a digital token from a first address associated with the first computing device to a second address associated with a second computing device may be received by a first computing device, where the digital token corresponds to a unique identifier associated with a physical asset. The first computing device communicates the received transferor request including at least a first location parameter, determined by the first computing device based on signals received at a physical location thereof, to at least one node of a distributed ledger network. The first computing device receives a confirmation that the transfer of the digital token is approved based on a determination that a transferee request from the second computing device includes at least a second location parameter corresponding to the physical location of the first computing device.Type: GrantFiled: July 5, 2018Date of Patent: February 13, 2024Assignee: UNITED PARCEL SERVICE OF AMERICA, INC.Inventor: Robert J. Gillen
-
Patent number: 11880451Abstract: Systems, methods, and software can be used for securing injected codes of a browser plugin. One example of a method includes establishing a code package to be injected into a web page. The code package comprises at least one element, and the at least one element includes a first script to be executed before executing a code of the web page. The method further includes injecting the at least one element to the web page to execute the first script. The execution of the first script comprises generating a script element comprising one or more secrets. The method further comprises appending the script element to the web page and deleting the script element from the web page.Type: GrantFiled: January 29, 2021Date of Patent: January 23, 2024Assignee: BlackBerry LimitedInventor: Nick Ehli Cano
-
Patent number: 11874945Abstract: A method and a system for dynamically scanning, filtering, and blocking harmful database queries that would otherwise consume significant resources and adversely impact overall system performance are provided. The method includes: receiving a user request for data from a database, the first request including a query; applying database access rules to the query in order to determine whether the query is potentially harmful; when the query is determined as not potentially harmful, forwarding the request to a server configured to respond to the request; and when the first query is determined as being potentially harmful, transmitting a warning message to the user. The database access rules may include a maximum memory consumption rule and a maximum CPU consumption rule. Machine learning techniques are used for adjusting the database access rules based on historical data.Type: GrantFiled: July 15, 2020Date of Patent: January 16, 2024Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Robert MacAndrew, Miklos Kalman, Joel Klein
-
Patent number: 11847244Abstract: A private information detector for data loss prevention is described.Type: GrantFiled: August 20, 2019Date of Patent: December 19, 2023Assignee: Shoreline Labs, Inc.Inventors: Isaac Abhay Madan, Rohan Shrikant Sathe, Trung Hoai Nguyen, Yiang Zheng
-
Patent number: 11824884Abstract: Systems, computer program products, and methods are described herein for generating responsive actions based on unauthorized access events associated with imitation networks. The present invention is configured to retrieve information associated with unauthorized access attempts associated with an imitation dataset; generate penetration test scenarios based on at least the types of unauthorized access attempts; initiate the penetration test scenarios on real datasets stored in data repositories within a network environment; determine automated network security responses to the penetration test scenarios; determine the unauthorized access attempts that were not successfully blocked and/or reported; determine actions to be executed in response to the unauthorized access attempts that were not successfully blocked and/or reported; and update the network security features with the actions.Type: GrantFiled: October 5, 2020Date of Patent: November 21, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Nia Mack