Patents Examined by Peiliang Pan
  • Patent number: 11316860
    Abstract: According to various embodiments, a consolidated identity system and method are implemented to provide improved identity management and resource access management, particularly in the context of an enterprise system that requires a tight trust model. In at least one embodiment, the described system and method provide mechanisms for mapping identities among resources. The system and method are able to extract information relevant to a particular entity, such as an employee or user, and to consolidate and/or personalize such information as needed.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: April 26, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Peter Yared, Tomas Kmec, Jan Surovec, Michal Gajdos, Omar ElNaggar
  • Patent number: 11297077
    Abstract: A system may select a list of servers in a computer network to perform behavioural profiling, wherein each server is associated with a domain name, the list of servers includes domain name entries, and the list of servers is prioritized according to a popularity value for each server. The system may update the list of servers based on a popularity threshold, partition the computer network into one of: subnetworks or subdomains, and establish a hierarchy along one of: the subnetworks or the subdomains based on the domain name entries in the list of servers. The system may update the popularity value for a server associated with a resolved network address, and may update the hierarchy along one of: the subnetworks or the subdomains based on the popularity value.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: April 5, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ramsundar Janakiraman, Ronald Calvo Rojas
  • Patent number: 11263332
    Abstract: A computer system, processor, and method for processing information is disclosed that includes watching logical operations to detect unauthorized attempts to access a register, and taking evasive action in response to detecting unauthorized attempts to access the register. In an embodiment, the register is a hidden, secret, restricted, or undocumented register, and the method further includes, in response to unauthorized attempts to access the secret register, locking the contents of the secret register. The evasive action may include one or more of interrupting the operations of the processor; causing the processor to shut-down, malfunction, lock, self-destruct; no longer providing read or write permission or access to the register; releasing data disguised to look like the real register data while not releasing the real data; and combinations thereof.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark Fredrickson, Chad Albertson, Scott D. Frei, David G. Wheeler
  • Patent number: 11250171
    Abstract: A tamper sensor assembly includes a lid having a surface and a sensor substrate on the surface of the lid. The sensor substrate has conductive lines that extend across at least a major portion of the surface of the lid and conform to three dimensional characteristics of the surface of the lid. The security processor is electrically connected to the conductive lines of the sensor substrate and is configured to identify occurrence of tampering with the lid based on an electrical characteristic of signals conducted through the conductive lines, and to perform an anti-tampering operation responsive to identifying occurrence of tampering.
    Type: Grant
    Filed: January 21, 2020
    Date of Patent: February 15, 2022
    Assignee: Thales eSecurity, INC.
    Inventors: Timothy E. Cook, Gerald Thomas Wardrop, Jr.
  • Patent number: 11252138
    Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: February 15, 2022
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Shinose Abdul Rahiman, Sushma Basavarajaiah, Mukund P. Khatri, Elie Antoun Jreij, Rama Rao Bisa, Kala Sampathkumar
  • Patent number: 11245679
    Abstract: Disclosed herein are methods, systems, and processes to secure external access to runtime systems in appliances. A request to register a security token configured to permit access to a computing system is received at the computing system. An authorization response authenticating the security token is sent. Another request to access the computing system based on the authenticated security token is received, and access is permitted to the computing system.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: February 8, 2022
    Assignee: Veritas Technologies LLC
    Inventors: Zhi Su, Li Zhen You, Xiaohong Liu
  • Patent number: 11233664
    Abstract: Methods and apparatus for identifying media are described. Example methods disclosed herein include presenting a graphical enable button via a display of a media presentation device, the graphical enable button, when selected, is to enable monitoring functionality implemented by the media presentation device, the monitoring functionality to monitor media presented by the media presentation device, the monitoring functionality to be disabled by default. Disclosed example methods also include detecting a first user input corresponding to selection of the graphical enable button and, in response to detection of the first user input: (i) enabling the monitoring functionality implemented by the media presentation device, and (ii) transmitting, via a network interface, information to a remote monitoring entity.
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: January 25, 2022
    Assignee: The Nielsen Company (US), LLC
    Inventor: Gavin McMillan
  • Patent number: 11210430
    Abstract: A system includes a storage device having a first encryption protocol, and a controller having a second encryption protocol. A processor implements the first encryption protocol or the second encryption protocol based on a strength of each encryption protocol, a topology of the system, a federal information processing standard certification status, a virtualization support, a multi-key support, a multi-band support, and an enterprise key management server support. Storage transactions may be encrypted using the implemented encryption protocol.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: December 28, 2021
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Rama R. Bisa, Manjunath Vishwanath, Chandrashekar Nelogal
  • Patent number: 11212321
    Abstract: Systems, methods, apparatuses, and computer program products for securing user plane (e.g., MB2-U) interface between a group communication service application server (GCS AS) and Broadcast Multicast Service Center (BM-SC) are provided. One method may include transmitting a message via a control plane, to an application server, indicating whether to establish a security association on a user plane in an interface between the GCS AS and the BM-SC. The method may also include providing, to the GCS AS, a target internet protocol (IP) address and possible port as a target for the security association.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: December 28, 2021
    Assignee: NOKIA SOLUTIONS AND NETWORK OY
    Inventors: Anja Jerichow, Thomas Belling, Guenther Horn
  • Patent number: 11194892
    Abstract: The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.
    Type: Grant
    Filed: January 29, 2020
    Date of Patent: December 7, 2021
    Assignees: Licentia Group Limited, MyPinPad Limited
    Inventor: Justin Pike
  • Patent number: 11196756
    Abstract: Systems and methods are provided for identifying network addresses and/or IDs of a deduplicated list among network data, machine data, and/or events derived from network data and/or machine data, and for identifying notable events by searching for the presence of network addresses and/or network IDs that are deduplicated across lists received from multiple external sources. One method includes receiving a plurality of lists of network locations, wherein each list is received from over a network, wherein each of the network locations includes a domain name or an IP address, and wherein at least two of the plurality of lists each include a same network location; aggregating the plurality of lists of network locations into a deduplicated list of unique network locations; and searching network data or machine data for a network location included in the deduplicated list of unique network locations.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: December 7, 2021
    Assignee: Splunk Inc.
    Inventors: Mark Seward, John Robert Coates
  • Patent number: 11194922
    Abstract: Embodiments of the invention include systems and methods for protecting study participant data for aggregate analysis. Aspects include sending a broker encryption key to a plurality of subjects. Aspects also include receiving double-encrypted subject data from the plurality of subjects. Aspects also include decrypting the double-encrypted subject data with a broker decryption key to generate single-encrypted subject data for the plurality of subjects. Aspects also include aggregating the single-encrypted subject data for the plurality of subjects to generate an aggregated single-homomorphically encrypted data set. Aspects also include including a plurality of random factors in the aggregated single-encrypted data set. Aspects also include sending the aggregated single-homomorphically encrypted data set to a researcher.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: December 7, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Laxmi P. Parida, Daniel Enoch Platt
  • Patent number: 11170075
    Abstract: Provided is an information terminal connected to a communication terminal which is connectable to one or more other information terminals, wherein the information terminal comprises a communication unit which receives, from the communication terminal, a connection history with the other information terminals which were previously connected to the communication terminal, and a license transfer management unit which extracts an information terminal among the other information terminals that satisfies a license transfer condition based on the received connection history.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: November 9, 2021
    Assignee: CLARION CO., LTD.
    Inventors: Takashi Yamaguchi, Hiroyuki Tanaka, Haruhiko Sawajiri
  • Patent number: 11151242
    Abstract: A server includes a controller performs determining whether a first local area network and a second local area network match; determining, in a case where the first login request is received and in a case where the first registration request is received, whether the first function execution device satisfies the first registration condition; and registering by: controlling, in a case where the first local area network and the second local area network match and the first function execution device satisfies the first registration condition, to register the first identification information; wherein, in a case where the first local area network and the second local area network do not match, the first identification information is not registered; and wherein, in a case where the first function execution device does not satisfy the first registration condition, the first identification information is not registered.
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: October 19, 2021
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Satoshi Watanabe
  • Patent number: 11128667
    Abstract: Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: September 21, 2021
    Assignee: Rapid7, Inc.
    Inventors: Vasudha Shivamoggi, Roy Hodgman, Wah-Kwan Lin
  • Patent number: 11108547
    Abstract: Methods and apparatuses for retrieving blockchain data are disclosed. One method comprises: receiving a data retrieving request that comprises a target transaction identifier; identifying a transaction storage location that corresponds to the target transaction identifier as a target transaction storage location based on a pre-stored correspondence between transaction identifiers of transactions recorded on a blockchain associated with the blockchain network and transaction storage locations of the transactions; and retrieving data from the target transaction storage location in the blockchain.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: August 31, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Xinying Yang
  • Patent number: 11093601
    Abstract: Embodiments described herein enable the interoperability between processes configured for pointer authentication and processes that are not configured for pointer authentication. Enabling the interoperability between such processes enables essential libraries, such as system libraries, to be compiled with pointer authentication, while enabling those libraries to still be used by processes that have not yet been compiled or configured to use pointer authentication.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: August 17, 2021
    Assignee: Apple Inc.
    Inventors: Bernard J. Semeria, Devon S. Andrade, Jeremy C. Andrus, Ahmed Bougacha, Peter Cooper, Jacques Fortier, Louis G. Gerbarg, James H. Grosbach, Robert J. McCall, Daniel A. Steffen, Justin R. Unger
  • Patent number: 11093617
    Abstract: Systems and methods for automatically grouping vulnerabilities into vulnerability groups are provided. Vulnerabilities are received in the vulnerability response system and are automatically grouped into one or more vulnerability groups based upon grouping fields defined in a vulnerability group rule.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: August 17, 2021
    Assignee: ServiceNow, Inc.
    Inventors: Kurt Joseph Zettel, II, Lisa Henderson, Phillip DiCorpo, Volodymyr Osypov, Karan Shah, Xuchang Chen, Jerome Liu
  • Patent number: 11082414
    Abstract: Mechanisms are provided for facilitating recertification of a user access entitlement. These mechanisms collect, from a system resource of the data processing system, access information representative of accesses of the system resource by a user access entitlement. These mechanisms determine that recertification of the user access entitlement, with regard to the system resource, is to be performed and a pattern of access is determined based on the access information for the user access entitlement. A recertification request graphical user interface is output to a user based on the pattern of access. The graphical user interface includes the pattern of access and one or more graphical user interface elements for receiving a user input specifying acceptance or denial of the recertification of the user access entitlement.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventors: Manjeri R. Dharmarajan, Kaushal K. Kapadia, Vigneshwarnath Miriyala, Nataraj Nagaratnam, Darshini G. Swamy, Suyesh R. Tiwari
  • Patent number: 11074342
    Abstract: A computer-implemented method for scanning data including accessing a reference table including a grid of data cells arranged in columns and rows and containing reference data elements. Each of the rows may relate to one of a plurality of data subjects. The method may also include generating a list of reference subcombinations. The list of reference subcombinations may be generated by designating a primary column for uniquely identifying the data subjects and generating a plurality of first preliminary reference subcombinations. Each of the first preliminary reference subcombinations may include reference data elements gathered from the primary column and a second column of a single row of the reference table. The method may also include accessing a subject file having a plurality of data entries. Each of the data entries may include a plurality of logically-related and delimited subject data elements.
    Type: Grant
    Filed: August 14, 2017
    Date of Patent: July 27, 2021
    Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
    Inventors: William Boquist, Can Van Ha, Steve Schierholz, Richard James Bush, Andrew Baumann