Patents Examined by Peiliang Pan
  • Patent number: 12363158
    Abstract: Described herein are systems and methods for enhancing an interface for an information technology (IT) environment. In one implementation, an incident service causes display of a first version of a course of action and obtains input indicative of a request for a new action in the course of action. The incident service further determines suggested actions based at least one the input and causes display of the suggested actions. Once displayed, the incident service obtains input indicative of a selection of at least one action from the suggested actions, and causes display input indicative of a selection of at least one action from the suggested actions.
    Type: Grant
    Filed: December 12, 2023
    Date of Patent: July 15, 2025
    Assignee: Splunk Inc.
    Inventors: Oliver Friedrichs, Atif Mahadik, Govind Salinas, Sourabh Satish
  • Patent number: 12314351
    Abstract: Technology that permits two computing systems to communicate with each other with high confidence that a particular entity is present at the other computing system. As an example, when a first computing system communicates with a second computing system, the first computing system may regularly verify that a particular entity is present at the second computing system. The first computing system is actually in control of a proof capture component on the second computing system. The first computing system causes the second computing system to automatically generate proof of presence, the proof evidencing that the particular entity is present at the second computing system. The first computing system also causes the second computing system to include the generated presence proof when communicating from the second computing system to the first computing system.
    Type: Grant
    Filed: November 10, 2021
    Date of Patent: May 27, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ankur Patel, Brandon Murdoch, Preeti Rastogi, Pieter Retief Kasselman, William Louis Thomas
  • Patent number: 12314373
    Abstract: Computing systems of a multi-tenant trusted domain collect metadata describing data stored in data sources of a set of tenant trusted domains. The computing systems of the multi-tenant trusted domain use the metadata to process natural language questions based on data stored in data sources of a tenant trusted domain. The computing systems of the multi-tenant trusted domain identify a set of data sources of the tenant trusted domain that are relevant for processing the natural language question and generate an execution plan for answering the natural language question. The computing systems of the multi-tenant trusted domain send the execution plan to one or more computing systems of the tenant trusted domain. The computing systems of the tenant trusted domain execute the execution plan and send the result of executing the execution plan to a client device that sent the natural language question.
    Type: Grant
    Filed: June 1, 2022
    Date of Patent: May 27, 2025
    Assignee: Promethium, Inc.
    Inventors: Shuo Yang, Xicheng Chang, Himangshu Das, Azary Smotrich, Puneet Gupta, Kaycee Kuan-Cheng Lai
  • Patent number: 12316760
    Abstract: It is provided a method for providing connectivity for a plurality of Internet of Things, IoT, devices. The method is performed in a connectivity device and comprises the steps of: detecting presence of a connector unit in one of a plurality of connector interfaces; obtaining connection data from the connector unit, the connection data being associated with a specific IoT device; connecting, using a wireless communication module of the connectivity device, to the IoT device using the connection data associated with the IoT device; and wherein the method is repeated for a plurality of connector units.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: May 27, 2025
    Assignee: ASSA ABLOY AB
    Inventor: Håkan Olsson
  • Patent number: 12267325
    Abstract: In one embodiment, a method comprises: initiating, by an executable agent within a secure executable container executed by a network device, a monitoring of a network-based service between the network device and a second network device having a two-way trusted relationship with the network device within a secure peer-to-peer data network, the network-based service based on a securely-stored secure data structure or a securely-transmitted secure data structure in the secure peer-to-peer data network; executing, by the executable agent, a secure machine learning operation based on one or more user actions associated with the network-based service, wherein the secure executable container prevents any access of any unencrypted data structure, or accessing the secure peer-to-peer data network, without authorized access via a prescribed Application Programming Interface (API); and autonomically executing, by the executable agent, an improved operation for the network-based service based on the machine learning.
    Type: Grant
    Filed: July 16, 2021
    Date of Patent: April 1, 2025
    Assignee: WhiteStar Communications, Inc.
    Inventor: Billy Gayle Moon
  • Patent number: 12267673
    Abstract: A terminal device may be configured to receive support information from a communication device by using a first wireless connection which has been established between the terminal device and the communication device. The support information may indicate whether the communication device supports a predetermined scheme. The terminal device may be configured to, in a case where the support information indicates that the communication device supports the predetermined scheme, execute a first control process for executing wireless communication in conformity with the predetermined scheme between the terminal device and the communication device. The terminal device may be configured to, in a case where the support information indicates that the communication device does not support the predetermined scheme, execute a second control process for executing wireless communication in conformity with a different scheme different from the predetermined scheme between the terminal device and the communication device.
    Type: Grant
    Filed: April 27, 2022
    Date of Patent: April 1, 2025
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventors: Takeshi Shibata, Hirotaka Asakura
  • Patent number: 12256220
    Abstract: A method for setting a security level of wireless sensors communicating with a switch. The method includes in a security device linked to the switch: collecting data frames sent from the wireless sensors to the switch and creating a dataset containing the collected data frames; identifying patterns associated with the wireless sensors from the collected data frames; introducing simulated traffic anomalies in the dataset with respect to the traffic patterns; randomizing the dataset and dividing the randomized dataset into a training dataset and a testing dataset; training, using the training dataset, a machine learning model configured for detecting traffic anomalies, and validating the machine learning model; detecting a traffic anomaly for a wireless sensor by analyzing current data frames and using the validated machine learning model; triggering a security alert based on the detected traffic anomaly; and adapting a security level for the wireless sensor based on the security alert.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: March 18, 2025
    Assignee: Schneider Electric Industries SAS
    Inventors: Ashwani Singh, Loïc Caseras-Noale
  • Patent number: 12255981
    Abstract: The present disclosure provides methods and apparatuses for implementing high-speed cryptographic operations based on software-hardware collaboration, and electronic devices. In the embodiments of the present disclosure, by analyzing software and hardware computing resources in real-time, the cryptographic device driver allocates the one or more target resources for cryptographic computation to the reference data packets. When the one or more target resources include the target cryptographic device, the cryptographic device executes, according to the characteristics of the target cryptographic algorithm used to perform cryptographic computation on the reference data packet, the acceleration operation corresponding to the target cryptographic algorithm for the cryptographic computation on the reference data packets, such as grouping the reference data packets, to improve a concurrent execution rate of an algorithm and cope with situations with a large amount of service concurrency and data processing.
    Type: Grant
    Filed: June 14, 2024
    Date of Patent: March 18, 2025
    Assignee: HANGZHOU HIKVISION DIGITAL TECHNOLOGY CO., LTD.
    Inventors: Bin Wang, Da Chen, Xiaohong Guan, Jiadong Chen, Wei Wang, Xing Wang
  • Patent number: 12255985
    Abstract: A method is disclosed for authentic data transmission between control devices of a vehicle in which messages which are sent from a first control device to a receiver control device and are provided with a first cryptographic key for authentication, and messages that are sent from a second control device to the receiver control device are provided with a second cryptographic key for authentication. First status information provided with a third cryptographic key is sent from a monitoring module of the first control device to the receiver control device and second status information provided with the second cryptographic key is sent from the second control device to the receiver control device. The first status information and second status information are received by the receiver control device. The received first and second status information is evaluated to detect a manipulation of the first control device.
    Type: Grant
    Filed: August 4, 2022
    Date of Patent: March 18, 2025
    Assignee: VOLKSWAGEN AKTIENGESELLSCHAFT
    Inventors: Timo Winkelvos, Aljoscha Fernandez
  • Patent number: 12219358
    Abstract: Resistance to vulnerabilities from timing-based side-channel attacks on 5G network slices that share underlying physical infrastructure and resources may be enhanced by selectively imposing time-based constraints on service provisioning and data handling to obscure data-driven time variations that occur during workload execution in a slice that can leak secret information. By preventing timing leakage from the 5G network slices, an attacker cannot observe execution latencies to thereby infer the constituency of workload characteristics. In addition, the attacker cannot create contention for shared resources on its own slice to observe an extent to which the shared resources are utilized by a targeted slice.
    Type: Grant
    Filed: September 17, 2021
    Date of Patent: February 4, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stefan Saroiu, Paramvir Bahl
  • Patent number: 12212682
    Abstract: An AI system and a method of preventing capture of an AI module in the AI system is disclosed. The AI system includes an input interface, a signature verification module, an AI module configured to execute multiple AI models, a hash module, and a key generation module. A signature module and the key generation module provide an output to the user in response to a received input from the user. The AI module further includes an output interface configured to transmit an output response from the signature module to the user.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: January 28, 2025
    Assignees: Robert Bosch GmbH, Robert Bosch Engineering and Business Solutions Private Limited
    Inventor: Manojkumar Somabhai Parmar
  • Patent number: 12206804
    Abstract: Methods and apparatus for identifying media are described. An example apparatus includes at least one memory, instructions in the apparatus; and processor circuitry to execute the instructions to: determine application identification information for a media presentation application executing on a media device; determine a first watermark for the application identification information from a lookup table; request media identification information for media from the media presentation application; determine a second watermark for the media identification information from the lookup table; insert the first watermark in the media prior to output of the media by the media device; and insert the second watermark in the media prior to the output of the media by the media device.
    Type: Grant
    Filed: December 9, 2021
    Date of Patent: January 21, 2025
    Assignee: The Nielsen Company (US), LLC
    Inventor: Gavin McMillan
  • Patent number: 12199985
    Abstract: Method, apparatus and computer program product for multi-modal user authorization are described herein. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, receive a request to enable a first client device associated with a first user profile to access a group-based communication system; determine a first access privilege status for the first user profile; in response to determining that the first access privilege status is a general access privilege status, transmit, to the first client device, first user interface data associated with a general access user interface; and in response to determining that the first access privilege status is a limited access privilege status, transmit, to the first client device, second user interface data associated with a limited access user interface.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: January 14, 2025
    Assignee: Salesforce, Inc.
    Inventors: Leah Jones, Ilan Frank, Rosaleen Nguyen, Kevin Marshall
  • Patent number: 12170904
    Abstract: The described technology is generally directed towards an automated security hangar for private cellular networks. In response to detecting that a user equipment is departing a geographic area served by a private cellular network, the user equipment can encrypt its data and send it to a private cellular network server. The server can receive and securely store the encrypted data, and the server can provide a code to the user equipment. The user equipment can store the code, disconnect from the private cellular network, and depart the geographic area. When the user equipment returns to the geographic area and reconnects to the private cellular network, the user equipment can present the code to the server. The server can validate the code, the user equipment, and/or the operator of the user equipment, and the server can return the encrypted data to the user equipment.
    Type: Grant
    Filed: November 2, 2021
    Date of Patent: December 17, 2024
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Patent number: 12169558
    Abstract: The rule learning unit 81 performs rough sets analysis using training data that includes threat information including a plurality of explanatory variables representing a threat event and a discrimination result of discriminating the threat information, to learn a decision rule specifying the discrimination result depending on a combination of the explanatory variables. The input unit 82 inputs the threat information to be analyzed. The analysis unit 83 applies the input threat information to the decision rule to identify the discrimination result of the threat information, and the explanatory variable as a basis for the discrimination result.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: December 17, 2024
    Assignee: NEC CORPORATION
    Inventors: Takahiro Kakumaru, Naoki Sasamura, Takaaki Ohara, Yuya Yamada
  • Patent number: 12135829
    Abstract: A secure processor and a semiconductor system including the same is provided. Provided is a system on chip comprising a secure processor, wherein the secure processor includes: a random access memory (RAM) including a RAM cache area storing a page and a timestamp table storing a timestamp, an encryption/decryption engine configured to encrypt the page by using the timestamp, and a direct memory access (DMA) module configured to transmit the encrypted page to a swap area of a first memory disposed outside the system on chip, wherein the first memory includes a tag table area storing a tag generated by the encryption/decryption engine encrypting the page and a timestamp backup area backing up the timestamp, and the swap area, the tag table area, and the time stamp backup area are backed up in a second memory disposed outside the system on chip.
    Type: Grant
    Filed: January 27, 2022
    Date of Patent: November 5, 2024
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Keun Young Park, Dong Jin Park, Ji Hyun Kim
  • Patent number: 12099625
    Abstract: Embodiments of the present disclosure provide techniques for associating use case data with data listings in a structured manner, thereby allowing for data listings to be organized and/filtered based on use case information. A processing device may provide a listing creation interface that is used to assign a set of use cases to a first data listing and publish the data listing on a data exchange. The data listing is one of a plurality of data listings published on the data exchange and the processing device may provide a data listing interface for displaying the plurality of data listings and an interactable menu including a selectable indication of each of the plurality of use cases. In response to receiving a selection of one or more of the plurality of use cases via the interactable menu, the processing device may display in the data listing interface, each of the plurality of data listings that have been assigned any of the selected one or more use cases.
    Type: Grant
    Filed: February 4, 2022
    Date of Patent: September 24, 2024
    Assignee: Snowflake Inc.
    Inventors: Emily B. Dillon, Travis Kaufman, Adil Lalani, Paul O. Lanzoni, Shakhina Pulatova
  • Patent number: 12096222
    Abstract: This application provides a fake network device identification method and a communications apparatus. An uplink message sent by a terminal device is forwarded to a first network device via a second network device. After receiving the uplink message, the first network device generates a downlink message for the uplink message, performs security processing on the downlink message based on first time information, and/or sends the downlink message to the second network device. The second network device sends, to the terminal device, the downlink message on which the security processing is performed. The terminal device performs security verification on the received downlink message, and/or identifies whether the second network device is a fake network device. This helps improve communication security.
    Type: Grant
    Filed: May 7, 2021
    Date of Patent: September 17, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bin Xu, Bingzhao Li, Lei Chen, Xuelong Wang
  • Patent number: 12088737
    Abstract: An intelligent method of mutual validation between a cluster manager and a new node, also enabling automatic signing of an application certificate for the new node. A root certificate authority is embedded in a cluster manager at the factory. The certificate includes the cluster manager serial number. Similarly, a certificate is embedded in an appliance to be joined as a new node, the certificate including the appliance's serial number. When requesting to join the cluster, the node sends its certificate to the cluster manager. The cluster manager verifies that the serial number in the certificate matches a serial number in its white list and validates the certificate ownership by the node. Conversely, the cluster manager sends its certificate to the node, so that the node can verify its communicating with a valid cluster manager. The node can then ask the manager to sign its application certificate, and the manager uses its root certificate authority to sign the certificate.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: September 10, 2024
    Inventors: Anurag Sharma, Senthil Ponnuswamy, Marcelo Daniel Vinante, Elie Antoun Jreij
  • Patent number: 12081985
    Abstract: Implementations of the present disclosure relate to intrusion detection information. A method comprises detecting, by an access point (AP), at least one device in a wireless communication network to be an illegal device. The method also comprises obtaining, by the AP, intrusion detection information related to the at least one device, the intrusion detection information comprising at least one identifier of the at least one device.
    Type: Grant
    Filed: October 27, 2021
    Date of Patent: September 3, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Junpeng Wu, Tong Zhang