Patents Examined by Peter C Shaw
  • Patent number: 11405179
    Abstract: This disclosure describes techniques that include performing cryptographic operations (encryption, decryption, generation of a message authentication code). Such techniques may involve the data processing unit performing any of multiple modes of encryption, decryption, and/or other cryptographic operation procedures or standards, including, Advanced Encryption Standard (AES) cryptographic operations. In some examples, the security block is implemented as a unified, multi-threaded, high-throughput encryption and decryption system for performing multiple modes of AES operations.
    Type: Grant
    Filed: March 15, 2021
    Date of Patent: August 2, 2022
    Assignee: Fungible, Inc.
    Inventors: Philip A. Thomas, Rajan Goyal, Eric Scot Swartzendruber
  • Patent number: 11403427
    Abstract: Various embodiments of methods, systems and computer program products described herein are directed to a Security Engine. The Security Engine provides for post-attack security upgrades of an application by selecting specific security hardening passes to be applied to a pre-attack state of the application. According to various embodiments, the Security Engine receives a pre-attack state of a first instance of an application in response to an action by an attack source. The Security Engine selects one or more security hardening passes to be applied to the pre-attack state. The Security Engine sends an identification of the selected security hardening passes to be applied to a second instance of the application running at the pre-attack state.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: August 2, 2022
    Assignee: Arms Cyber Defense, Inc.
    Inventors: Timothy Potteiger, Bradley Potteiger, Michael Bryant
  • Patent number: 11399036
    Abstract: Disclosed herein are systems and method for correlating events to detect an information security incident, a correlation module may receive a plurality of network events indicating potential security violations, wherein each network event of the plurality of network events has a respective timestamp. The correlation module may identify, from the plurality of network events, a subset of network events that have occurred within a period of time, based on each respective timestamp. The correlation module may determine a plurality of potential orders of occurrence for the subset of network events. The correlation module may apply at least one correlation rule to each respective potential order of the plurality of potential orders. In response to determining that the at least one correlation rule is fulfilled, the correlation module may detect the information security incident.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: July 26, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Ivan S. Lyukshin, Andrey A. Kiryukhin, Dmitry S. Lukiyan, Pavel V. Filonov
  • Patent number: 11386232
    Abstract: In response to a request by a data furnisher system to add data to that organized by a system, a data coordinating system resolves the identity of counterparties to whom the data is relevant. For each identified counterparty, the coordinating system identifies a corresponding counterparty system, and via communications between smart contracts comprised in the coordinating system, communicates the data provided by the data furnisher system. The counterparty reviews the data and either verifies that it is accurate or disputes the data. The counterparty's response is communicated through the data coordinating system via the relevant smart contracts to the data furnisher system. If the counterparty verified the data, the data coordinating system updates its database to reflect the data has been verified. If the counterparty disputed the data, the data furnisher and counterparty communicate to resolve the dispute. The data is marked as being disputed.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: July 12, 2022
    Assignee: The Guppy Group Inc.
    Inventors: Sanjib Kalita, Sujay Parekh
  • Patent number: 11379573
    Abstract: Embodiments of the present invention relate to a trusted application access control method and a terminal. The method includes: receiving, by a terminal in a TEE, a request for accessing a target trusted application (TA) that is sent by a client application (CA); determining, by the terminal, a service level of the CA in a trusted execution environment (TEE) based on the request for accessing the target TA; and providing, by the terminal in the TEE by using the target TA, a service corresponding to the service level for the CA. In this way, the target TA provides different levels of services for the CA, and determines, in the TEE, the service level corresponding to the CA, thereby enhancing constraint and limitation of accessing the target TA by the CA, and improving security of accessing the target TA by the CA.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: July 5, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Guoqing Li, Xinmiao Chang
  • Patent number: 11375374
    Abstract: Systems and method are provided for a temporary network slice usage barring service within a core network. A network device in the core network receives a slice barring information message for an application function (AF). The slice barring information message includes a unique subscriber identifier associated with a user equipment (UE) device to be barred from a network slice and indicates a barring expiration time. The network device stores barring parameters based on the slice barring information message. The barring parameters include a slice identifier associated with the AF, the unique subscriber identifier, and the barring expiration time. The network device sends a barring instruction message to another network device associated with the network slice. The barring instruction message includes the unique subscriber identifier and the barring expiration time. The other network device enforces temporary barring of the UE device from the network slice based on the barring instruction message.
    Type: Grant
    Filed: March 24, 2021
    Date of Patent: June 28, 2022
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Suzann Hua, Ye Huang, Chien-Yuan Huang, Parry Cornell Booker
  • Patent number: 11356446
    Abstract: The medical record data card is a smart card. The medical record data card is an electric circuit that is used as a dongle. The medical record data card electrically connects with a logical device. The medical record data card physically authenticates the identity of the cardholder. The medical record data card authorizes access to medical records contained in a medical records database. The medical record data card comprises an authentication device, a medical facility data device, the medical records database, and a communication link. The medical facility communicates with the medical records database using the communication link. The authentication device is the smart card. The authentication device electrically connects to a logical device that enables the access of the medical facility data device to the medical records contained in the medical records database.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: June 7, 2022
    Inventor: Paul Nacinovich
  • Patent number: 11354444
    Abstract: Access control for an ordered event stream (OES) storage system is disclosed. Access to a portion of an OES can be controlled at a key-level in relation to a key space of the OES. An application instance can be identified to enable determining a correspondence to one or more keys. The correspondence can be embodied in stored data, for example, via an advanced access control list (AACL) that can be in the form of a list, a table, etc. Application instance access to the portion of the OES can be controlled by determining if an access rule is satisfied, e.g., determining if the key space the application instance wants to access comports with the one or more keys corresponding to the application instance identity. In an aspect, screening data corresponding to the AACL can enable preliminary access screening external to the OES storage system.
    Type: Grant
    Filed: September 30, 2020
    Date of Patent: June 7, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Mikhail Danilov, Yohannes Altaye
  • Patent number: 11323489
    Abstract: Secure auditability of monitoring processing using public ledgers that are particularly useful for monitoring surveillance orders, whereby an overseeing enforcer (“E”) checks if law enforcement agencies and companies are respectively over-requesting or over-sharing user data beyond what is permitted by the surveillance order, in a privacy-preserving way, such that E does not know the real identities of the users being surveilled, nor does E get to read the users' unencrypted data. Embodiments of the present invention also have inbuilt checks and balances to require unsealing of surveillance orders at the appropriate times, thus enabling accounting of the surveillance operation to verify that lawful procedures were followed, protecting users from government overreach, and helping law enforcement agencies and companies demonstrate that they followed the rule of law.
    Type: Grant
    Filed: September 9, 2020
    Date of Patent: May 3, 2022
    Assignee: Arrowhead Center, Inc.
    Inventors: Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
  • Patent number: 11310250
    Abstract: A system for machine learning-based real-time electronic data quality checks in online machine learning and AI systems is provided. In particular, the system may comprise a machine learning module which receives input data from a data quality learning module which serves to perform filtering or alteration functions on incoming data during the training and/or live phases of the machine learning module. Over time, the data quality module may increasingly become efficient and accurate at assessing incoming data to determine the data quality. In turn, improving data quality of input data may ensure that the various neural networks within the system produce adaptively accurate output values to drive the decisioning processes of the system.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: April 19, 2022
    Assignee: BANK OF AMERICA CORPORATION
    Inventor: Eren Kursun
  • Patent number: 11308243
    Abstract: A storage port receives a login request. The storage port configures an audit mode indicator as enabled in a login response to a host port to enter a security enabled mode to indicate to the host port that Input/Output (I/O) operations are to be transmitted from the host port to the storage port even if authentication or security association negotiation with the storage port cannot be completed successfully.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: April 19, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Roger G. Hathorn, Patricia G. Driever, John Flanagan, Christopher J. Colonna, Evan Rivera
  • Patent number: 11303605
    Abstract: An enforcement module receives a DNS-based rule of a segmentation policy that controls access of a managed workload to workloads in a DNS domain in which the IP addresses of the workloads associated with a domain name are resolved by a DNS server. When the managed workload makes a connection request to the workload associated with the domain name, the enforcement module snoops on a DNS response from the DNS server to learn the IP address of the workload associated with the domain name. If a domain name of the DNS domain is in a whitelist of domain names permitted by the DNS-based rule, the enforcement module adds the learned IP address to a whitelist of IP addresses and configures a firewall associated with the managed workload to permit connections to the IP addresses in the whitelist.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: April 12, 2022
    Assignee: Illumio, Inc.
    Inventors: Jaehong Park, Mukesh Gupta, Paul James Kirner, Anish Vinodkumar Desai, Daniel Richard Cook
  • Patent number: 11290468
    Abstract: A method of detecting bots, preferably in an operating environment supported by a content delivery network (CDN) that comprises a shared infrastructure of distributed edge servers from which CDN customer content is delivered to requesting end users (clients). The method begins as clients interact with the edge servers. As such interactions occur, transaction data is collected. The transaction data is mined against a set of “primitive” or “compound” features sets to generate a database of information. In particular, preferably the database comprises one or more data structures, wherein a given data structure associates a feature value with its relative percentage occurrence across the collected transaction data. Thereafter, and upon receipt of a new transaction request, primitive or compound feature set data derived from the new transaction request are compared against the database. Based on the comparison, an end user client associated with the new transaction request is then characterized, e.g.
    Type: Grant
    Filed: July 7, 2020
    Date of Patent: March 29, 2022
    Assignee: Akamai Technologies, Inc.
    Inventors: Venkata Sai Kishore Modalavalasa, Sreenath Kurupati, Tu Vuong
  • Patent number: 11288362
    Abstract: Disclosed are systems and methods for creating antivirus records for antivirus applications. An exemplary method includes: analyzing a log of records of API function calls of a file for presence of malicious behavior using one or more behavioral rules; determining that the file is malicious when a behavioral rule corresponding to one or more records of API function calls from the log is identified; extracting from the log the one or more API function calls associated with the identified behavioral rule; determining whether the one or more extracted records of API function calls are supported by an antivirus application of a user device; and when the one or more extracted records of API function calls are not supported by the antivirus application, adding to the antivirus application, a support for registering the unsupported records of API function calls.
    Type: Grant
    Filed: September 24, 2020
    Date of Patent: March 29, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Sergey V. Gordeychik, Sergey V. Soldatov, Konstantin V. Sapronov
  • Patent number: 11256785
    Abstract: Memory is partitioned and isolated in container-based memory enclaves. The container-based memory enclaves have attestable security guarantees. During provisioning of the container-based memory enclaves from a container image, a purported link in the container to a memory address of the enclave is modified to verifiably link to an actual memory address of the host, such as partitioned memory enclave. In some instances, enclave attestation reports can be validated without transmitting corresponding attestation requests to remote attestation services, based on previous attestation of one or more previous container attestation reports from a similar container and without requiring end-to-end attestation between the container and remote attestation service for each new attestation request.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: February 22, 2022
    Assignee: MICROSOFT TECHNOLOGLY LICENSING, LLC
    Inventors: Maxwell Christopher Renke, Taylor James Stark, Benjamin M. Schultz, Giridhar Viswanathan, Frederick Justus Smith, Deepu Chandy Thomas, Hari R. Pulapaka, Amber Tianqi Guo
  • Patent number: 11256433
    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: February 22, 2022
    Assignee: NetApp, Inc.
    Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
  • Patent number: 11240267
    Abstract: A system may generate all possible character mistakes in a first uniform resource locator associated with a first website, which may produce a set of unique and similar uniform resource locators associated with a set of similar websites. The system may execute machine vision algorithms to compare visual images of the first website and the set of similar websites, and identify a subset of similar websites, which may be undistinguishable from the first website. The system may block the subset of websites, and thereby prevent any user from accessing these fraudulent and malicious websites.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: February 1, 2022
    Assignee: MASSACHUSETTS MUTUAL LIFE INSURANCE COMPANY
    Inventors: Damon Ryan Depaolo, Payton A. Shubrick
  • Patent number: 11228432
    Abstract: A logic circuit for quantum-resistant cryptoprocessing. The logic circuit includes a first plurality of multiplexers, a second plurality of multiplexers, a plurality of AND gates, a third plurality of multiplexers, a plurality of shift registers, a plurality of inverters, a fourth plurality of multiplexers, a plurality of adders, a plurality of XOR gates, a fifth plurality of multiplexers, and a plurality of parallel outputs.
    Type: Grant
    Filed: March 3, 2020
    Date of Patent: January 18, 2022
    Inventors: Siavash Bayat-Sarmadi, Shahriar Ebrahimi, Hatameh Mosanaei Boorani
  • Patent number: 11212673
    Abstract: Techniques for secure team-based communication on existing wireless mesh networks are disclosed. In an example, a first network node receives a network encryption key from a headend system. The first network node receives a sub-group encryption key that is unique to a sub-group of nodes, a sub-group identifier, and a sub-group node list that lists the sub-group of nodes associated with the sub-group identifier. The first network node generates an application layer message for a second node of the sub-group of nodes at an application layer. The first network node encrypts the application layer message using the sub-group encryption key. The first network node generates a team packet that is addressed to a selected node and includes the encrypted application layer message and the sub-group identifier. The first network node encrypts the team packet using the network encryption key and transmits the encrypted team packet to the selected node.
    Type: Grant
    Filed: April 1, 2020
    Date of Patent: December 28, 2021
    Assignee: Landis+Gyr Innovations, Inc.
    Inventors: Pushpesh Kumar Deshmukh, Ashok Mahadevan, Timothy James Rutten, Michael Gerard Demeter, John Bettendorff
  • Patent number: 11212314
    Abstract: The invention proposes a method for an object (1) to communicate with a server (2) of a connected objects network to report that a clone may be impersonating the object in the network, which method comprises the following steps implemented by the object (1): transmitting (106) to the server (2) a request from the object (1) to join the connected objects network; after transmitting the join-request, detecting (110) whether a reference message (uplink) transmitted by the object (1) to the server (2) was rejected or ignored; in response to the detection, transmitting (114) to the server (2) an alert message indicating the rejection or ignoring.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: December 28, 2021
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Yoann Fages-Tafanelli, Aurélien Cuzzolin, Fabien Blanco, Maël Berthier