Patents Examined by Richard A McCoy
  • Patent number: 11533622
    Abstract: Systems and methods include, in a cloud node executing a security service, causing a mobile device to perform a validation check to determine if the mobile device is any of fake, counterfeit, jailbroken, and rooted; responsive to successful validation, allowing traffic to and from the mobile device through the security service; and responsive to unsuccessful validation, preventing traffic to and from the mobile device through the security service. The systems and methods can further include, prior to the causing, requiring the mobile device to install and launch an application, wherein registration with the security service requires the application; and performing the validation check via the application and a fake check service.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: December 20, 2022
    Assignee: Zscaler, Inc.
    Inventors: Sreedhar Pampati, David Creedy, Brijesh Singh
  • Patent number: 11501010
    Abstract: In an embodiment, an application-provisioning framework of a database platform receives a provisioning request from a requesting entity, requesting provisioning of an application for a customer account of the database platform. In response to receiving the provisioning request, the application-provisioning framework retrieves, from data storage, an application-provisioning blueprint document that lists one or more database objects. The application-provisioning framework provisions, according to the retrieved application-provisioning blueprint document, the one or more listed database objects in a database associated in the database platform with the customer account.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: November 15, 2022
    Assignee: Snowflake Inc.
    Inventors: Suraj Prakasha Acharya, Damien Carru
  • Patent number: 11496896
    Abstract: Apparatuses, methods, and systems are disclosed for user equipment authentication. One method includes transmitting, from a user equipment, a request message to one or more network devices. The method includes, in response to transmitting the request message, attempting authentication with the one or more network devices. The method includes, in response to successfully authenticating with the one or more network devices, transmitting a message comprising first location information corresponding to the user equipment to the one or more network devices.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: November 8, 2022
    Assignee: Lenovo (Singapore) PTE. LTD.
    Inventors: Andreas Kunz, Genadi Velev, Joachim Loehr
  • Patent number: 11489847
    Abstract: A method for detecting, in a real-time manner, a presence or an absence of a an anomaly in or a cyber attack onto a medical apparatus comprises the steps of capturing, with an antenna, one or more emissions of electromagnetic energy from the processing devices within medical apparatus; converting, with a receiver coupled to the antenna, the one or more emissions from an analog to a digital form; generating, with a controller, a digital signal in a time domain; converting, the digital signal from the time domain to a frequency domain, the digital signal containing a signature of cross modulation products from the non-linear attachments; processing, in the frequency domain, the signature of cross modulation products to determine mixing characteristics of the cross modulation products; and detecting, based on the mixing characteristics, the absence or the presence of the anomaly or the cyber attack.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: November 1, 2022
    Inventors: James Robert Uplinger, II, Walter J. Keller, III, Adam Brant
  • Patent number: 11468158
    Abstract: A machine-learning algorithm receives code indicative of a software unit and parses the code to extract an authenticating parameter. The machine-learning algorithm constructs an authentication template based on the authenticating parameter and providing the authentication template to a user. The algorithm receives user input from the user responsive to the authentication template and creates an authentication microservice based on the authentication template (and optionally the input). The algorithm links the authentication microservice to the software unit to deploy the authentication microservice within the software unit. The machine-learning algorithm is then modified based on the input.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: October 11, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Patent number: 11468180
    Abstract: According to an aspect of an embodiment, operations may include receiving a first input corresponding to a selection of a combinatorial optimization problem and receiving a set of datapoints as input. The operations may further include generating a first quadratic unconstrained binary optimization (QUBO) formulation based on an objective function for the combinatorial optimization problem and the received set of datapoints. The operations may further include selecting a first privacy setting and encoding the first QUBO formulation based on the selected privacy setting to generate a second QUBO formulation. The operations may further include submitting the generated second QUBO formulation to an optimization solver machine and receiving a first solution of the second QUBO formulation. The operations may further include decoding the first solution to produce a second solution and publishing an output of the combinatorial optimization problem on a user device based on the second solution.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: October 11, 2022
    Assignee: FUJITSU LIMITED
    Inventors: Wei-Peng Chen, Mehdi Bahrami, Junhee Park
  • Patent number: 11455411
    Abstract: Content visibility on a computing device is controlled based at least in part on the current location of the computing device. When the current location is a safe location for making user-selectable content visible on a display screen of the computing device and the computing device is unlocked, the computing device operates in a full content visibility mode. In the full content visibility mode all user-selectable content on the computing device is accessible to a user of the computing device. When the current location is not a safe location for making user-selectable content visible on the display screen, the computing device operates in a reduced content visibility mode. In the reduced content visibility mode content visibility on the display screen is reduced, such as by limiting which applications (e.g., application icons or widgets) are displayed or otherwise accessible to the user.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: September 27, 2022
    Assignee: Motorola Mobility LLC
    Inventors: Rachid M. Alameh, Jarrett K. Simerson, John J. Gorsica, IV, Zhengping Ji
  • Patent number: 11444952
    Abstract: A control circuit receives personally identifiable information that corresponds to a particular entity. The control circuit uses that personally identifiable information to access a block chain ledger that serves as an identity block chain ledger. The control circuit then receives a synthetic identifier from the block chain ledger. This synthetic identifier correlates to the aforementioned personally identifiable information and also correlates to other data that corresponds to the particular entity and which other data is stored in a data storage element other than the block chain ledger.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: September 13, 2022
    Assignee: SPRINGCOIN, INC.
    Inventors: John Sun, Robert Krzyzanowski, Kirill Sevastyanenko
  • Patent number: 11444969
    Abstract: A method and system for scoring performance of a security product are provided. The method includes receiving security product performance data of the security product configured to handle a specific cyber threat; classifying the performance data into a product profile associated with the security product; computing at least one security product performance score for the product profile based on the classified product security performance data; and associating the at least one security performance score with the product profile. In an embodiment, the method also includes selecting the at least one security product from a plurality of security products based on their respective performance scores for the respective cyber threat.
    Type: Grant
    Filed: June 23, 2020
    Date of Patent: September 13, 2022
    Assignee: Cybereason Inc.
    Inventor: Avi Chesla
  • Patent number: 11409892
    Abstract: Systems and methods for enhancing security during access and retrieval of data with multi-cloud storage are disclosed. A method includes: receiving, by a computing device, data to be stored in a distributed computing environment; compressing, by the computing device, the received data; shredding, by the computing device, the compressed data into a plurality of data chunks; storing, by the computing device, the plurality of data chunks in a plurality of locations in the distributed computing environment; generating, by the computing device, a metadata file including a mapping of each of the plurality of data chunks and a corresponding location of the plurality of locations in the distributed computing environment in which the data chunk is stored; shredding, by the computing device, the metadata file into a plurality of file chunks; and storing, by the computing device, the plurality of file chunks in the distributed computing environment.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: August 9, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shruthi Rs Rao, Juilee A. Joshi, Sahana H. Anantharajaiah
  • Patent number: 11409868
    Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: August 9, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Dylan Reid, Joseph Soryal
  • Patent number: 11411942
    Abstract: Systems, methods, and computer-readable media are provided for an efficient roaming management method using a single association identifier token for associating with different access points. In one aspect of the present disclosure, a network controller includes memory having computer-readable instructions stored therein and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive a request from an endpoint to connect to a first access point; generate association identification token (e.g., PMK and PMKID) for the endpoint to connect to the first access point; and distribute the association identification token to a second access point prior to the endpoint attempting to connect to the second access point, the association identification token being used by the second access point to validate a subsequent request by the endpoint to connect to the second access point.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: August 9, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Abhishek Dhammawat, Mansi Jain, Sudhir Kumar Jain
  • Patent number: 11405405
    Abstract: Systems and methods include aggregating network access to tenant spaces distributed among multi-tenant structures with each multi-tenant structure having a network access configuration to access a network architecture. Embodiments of the present disclosure relate to identifying the network access configuration for the multi-tenant structure. The network access configuration provides the multi-tenant structure access to the network architecture so that each tenant space has access to the network architecture. Network access parameters are determined in real-time that each tenant space network device is to have access to execute as provided by a central network aggregation control system that determines the network access for each tenant space network device. The network access parameters regulate access that each tenant space network device has to the network architecture.
    Type: Grant
    Filed: March 23, 2020
    Date of Patent: August 2, 2022
    Assignee: Xiber, LLC
    Inventor: Stephen Hon
  • Patent number: 11403418
    Abstract: The technology disclosed includes a system to efficiently classify sensitivity of document generated by and downloaded from cloud-based provider services. The system monitor's a user's network traffic at an endpoint that initiates generation of the document and receives a web page identifying the document generated. The system parses the user's network traffic that selects the document for download and intercepts a critical metadata in an API parameter string used to download the document. The system interprets the critical metadata to analyze sensitivity of the document to assign a sensitive classification to the document. Data exfiltration prevention measures are triggered upon detection of attempted exfiltration of the document based on the sensitivity classification.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: August 2, 2022
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Arjun Sambamoorthy
  • Patent number: 11405404
    Abstract: In an embodiment, a method for allocating privileges on a computer network includes calculating a permission level based at least in part on a login context associated with a login request for connection to a network from a user via a client device, adjusting the calculated permission level such that a resulting first adjusted permission level does not exceed a previous permission level assigned to the client device, assigning the first adjusted permission level to the client device, collecting activity data representative of network activity by the user while logged in to the network, and classifying, using a classifier model, at least a portion of the activity data to generate a second adjusted permission level for the client device.
    Type: Grant
    Filed: September 6, 2019
    Date of Patent: August 2, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Su Liu, Xinya Wang
  • Patent number: 11397813
    Abstract: Disclosed is a method and system for verifying a regex group. The method comprises verifying of a regex group by creating a flow id through a processor for the regex group when source reaches the sink. The flow id is used for tracking the flow of the regex group. The processor checks in case the flow id is a previously tested flow id. When the flow id is not the previously tested flow id, the processor passes one or more run tasks through a processor forming a queue. The processor tests for one or more vulnerabilities to be associated with the regex group based on the passing, wherein the testing is used to qualify the regex group as a valid regex group.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: July 26, 2022
    Assignee: HCL TECHNOLOGIES LIMITED
    Inventors: Jonathan Afek, Gal Ben-Yair
  • Patent number: 11395148
    Abstract: Embodiments of this application relate to a method and a device for protecting privacy. The method includes: sending, by a remote terminal, a first message to a mobility management entity by using a relay terminal, where the first message includes first identity information of the remote terminal, and the first message is used by the mobility management entity to obtain an international mobile subscriber identity IMSI of the remote terminal based on the first identity information of the remote terminal, where the first identity information is a proximity service relay user key identity PRUK ID. Because the first identity information is used to replace the IMSI, interception of the IMSI by the relay terminal is avoided, and user privacy is protected.
    Type: Grant
    Filed: July 30, 2017
    Date of Patent: July 19, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Qiang Yi, Shuiping Long, He Li
  • Patent number: 11374946
    Abstract: Detection of malicious files is disclosed. A set comprising one or more sample classification models is stored on a networked device. N-gram analysis is performed on a sequence of received packets associated with a received file. Performing the n-gram analysis includes using at least one stored sample classification model. A determination is made that the received file is malicious based at least in part on the n-gram analysis of the sequence of received packets. In response to determining that the file is malicious, propagation of the received file is prevented.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: June 28, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: William Redington Hewlett, II, Suiqiang Deng, Sheng Yang, Ho Yu Lam
  • Patent number: 11336664
    Abstract: Detection of malicious files is disclosed. A set comprising one or more sample classification models is stored on a networked device. N-gram analysis is performed on a sequence of received packets associated with a received file. Performing the n-gram analysis includes using at least one stored sample classification model. A determination is made that the received file is malicious based at least in part on the n-gram analysis of the sequence of received packets. In response to determining that the file is malicious, propagation of the received file is prevented.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: May 17, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: William Redington Hewlett, II, Suiqiang Deng, Sheng Yang, Ho Yu Lam
  • Patent number: 11314881
    Abstract: Methods and systems are provided to efficiently update account profiles based on a predicted likelihood of use, including by ranking the account profiles according to the likelihood of use. The disclosed system can considerably improve the processing time to update account profiles with the most recent information available, including new access requests. An authentication platform receives a plurality of new access requests, including request data and account identifiers associated with account profiles. The request data is transmitted to a prediction engine that determines a ranking of the account identifiers based on a predicted likelihood of use during a next time interval. A profile batch scheduler retrieves a first set of access requests based on the ranking. The system updates a first set of account profiles based on the ranking, and stores the updated account profiles for use by the authentication platform.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: April 26, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hongqin Song, Yu Gu