Patents Examined by Sakinah White Taylor
-
Patent number: 11374971Abstract: A system accesses information regarding a topology of an arrangement of resources, where one of the resources is a multi-tiered resource having a plurality of layers. Based on the information regarding the topology of the arrangement of resources, the system selects one or more layers of the multi-tiered resource for deployment of a deception server that has a reduced security mechanism to act as a decoy to attract attackers of the system. The system deploys the deception server at the selected one or more layers of the multi-tiered resource.Type: GrantFiled: June 21, 2019Date of Patent: June 28, 2022Assignee: MICRO FOCUS LLCInventors: Pramod Kumar Ramachandra, Hemant Kumar Chikkappaiah Honnapura, Pramod Annachira Vitala
-
Patent number: 11368457Abstract: Techniques for intelligently deciding the optimal authenticator(s) from amongst those supported by an electronic device are described. The authentication system according to some embodiments may include a dynamic machine learner that incorporates the attributes of: (i) user behavior attributes (e.g., preferred authenticator); (ii) device attributes (e.g., hardware and software specifications, applications, etc.); and (iii) operating environment attributes (e.g., ambient light, noise, etc.), as well as the interplay between the aforementioned attributes over time to make the decision. In some embodiments, the authentication activities and patterns of other users of similar type (e.g., users exhibiting similar behavior across different operating environments) can also be learned and employed to improve the decision making process over time.Type: GrantFiled: July 30, 2018Date of Patent: June 21, 2022Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Kim R. Wagner, John F. Sheets, Lacey Best-Rowden
-
Patent number: 11366903Abstract: The disclosed computer-implemented method for mitigating stalkerware by rendering it useless is performed, at least in part, by a computing device comprising at least one processor. The method includes detecting, by the at least one processor in accordance with a security configuration of the computing device, a stalkerware application running in a foreground of the computing device. The method also includes overlaying, by the at least one processor in accordance with the security configuration, the stalkerware application with a window in response to the detecting. The method further includes performing a security action by intercepting one or more user inputs to the stalkerware application via the window, thereby preventing user configuration of the stalkerware application. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 20, 2019Date of Patent: June 21, 2022Assignee: NortonLifeLock Inc.Inventors: Anubhav Savant, Arif Mohammed Shaikh
-
Patent number: 11354404Abstract: An apparatus has processing circuitry 4 supporting a number of security domains, and within each domain supporting a number of modes including a handler mode for exception processing and a thread mode for background processing. For an exception entry transition from secure thread mode to secure handler mode, a transition disable indicator 42 is set. For at least one type of exception return transition to processing in the secure domain and the thread mode when the transition disable indicator 42 is set, a fault is signaled. This can protect against some security attacks.Type: GrantFiled: August 22, 2019Date of Patent: June 7, 2022Assignee: Arm LimitedInventor: Thomas Christopher Grocutt
-
Patent number: 11354393Abstract: Systems and methods for controlling measurement units for a medical scale. One system includes a removable head unit configured to couple to a medical scale platform. The removable head unit includes a human machine interface (HMI) and an electronic processor coupled to the human machine interface. The electronic processor is configured to receive, via the HMI, a first user input selecting a permanent lock mode. The electronic processor is configured to, in response to receiving the user input, present a first authentication request and receive a second user input including a first authentication token. The electronic processor is configured to, when the first authentication token is valid, present a measurement unit selection prompt. The electronic processor is configured to receive a second user input selecting a measurement unit and, in response to receiving the second user input, activate the permanent lock mode based on the selected measurement unit.Type: GrantFiled: January 31, 2019Date of Patent: June 7, 2022Assignee: Pelstar, LLCInventors: Mark Winkler, Ken Harris, Rosalyn Ben-Chitrit
-
Patent number: 11347830Abstract: Systems and methods for managing group encryption are described. In certain methods, a content asset may be encrypted with an asset key. An account key may be determined. Using the account key, an encrypted content asset package may be generated. The asset key may make up at least a portion of the encrypted content asset package. The encrypted content asset package is decryptable with the account key. The encrypted content asset package and an identifier associated with the account key may be transmitted, for example to a playback device.Type: GrantFiled: December 31, 2018Date of Patent: May 31, 2022Assignee: Comcast Cable Communications, LLCInventor: Kyong Park
-
Patent number: 11343266Abstract: Methods and systems for self-certifying secure operation of a cyber-physical system having a plurality of monitoring nodes. In an embodiment, an artificial intelligence (AI) watchdog computer platform obtains, using the output of a local features extraction process of time series data of a plurality of monitoring nodes of a cyber-physical system and a global features extraction process, global features extraction data. The AI watchdog computer platform then obtains reduced dimensional data, generates an updated decision boundary, compares the updated decision boundary to a certification manifold, determines based on the comparison that the updated decision boundary is certified, and determines, based on an anomaly detection process, whether the cyber-physical system is behaving normally or abnormally.Type: GrantFiled: June 10, 2019Date of Patent: May 24, 2022Assignee: General Electric CompanyInventors: Masoud Abbaszadeh, Hema K. Achanta, Mustafa Tekin Dokucu, Matthew Nielsen, Justin Varkey John
-
Patent number: 11330001Abstract: A method in one embodiment includes receiving usage data from a first operational management system, the first operational management system utilizing a plurality of assets of an information technology infrastructure. The method also includes identifying, based at least in part on the received usage data, one or more asset relationships between at least two assets of the plurality of assets, and one or more user-asset relationships between one or more users and one or more of the plurality of assets. In the method, one or more parameters of a plurality of parameters are applied to the identified asset and user-asset relationships to determine one or more designations associated with the identified asset and user-asset relationships. The one or more designations are transmitted to a second operational management system to trigger a risk management workflow based at least in part on the one or more designations.Type: GrantFiled: July 31, 2019Date of Patent: May 10, 2022Assignee: EMC IP Holding Company LLCInventor: Steven G. Schlarman
-
Patent number: 11330008Abstract: Systems and methods are described to enable a DNS service to encode information into a network address to be advertised by the DNS service. Information encoded by a DNS service may include, for example, an identifier of a content set to which the network address corresponds (e.g., a domain name) and validity information, such as a digital signature, that verifies the validity of the network address. On receiving a request to communicate with the network address, a destination device associated with the network address may decode the encoded information within the network address to assist in processing the request. In some instances, the encoded information may be used to identify malicious network transmissions, such as transmissions forming part of a network attack, potentially without reliance on other data, such as separate mappings or contents of the data transmission.Type: GrantFiled: February 24, 2020Date of Patent: May 10, 2022Assignee: Amazon Technologies, Inc.Inventors: Hardeep Singh Uppal, Jorge Vasquez, Craig Wesley Howard, Anton Stephen Radlein
-
Patent number: 11316889Abstract: Methods and systems for a two-stage attribution of application layer DDoS attack are provided. In a first table just a hash index is maintained whereas the second stage table keeps the string parameter corresponding to the application layer attribute under attack. A linked list maintains a plurality of rows if there is hash collision in the first table. The second table is aged out and reported periodically with details of large strings.Type: GrantFiled: May 8, 2018Date of Patent: April 26, 2022Assignee: Fortinet, Inc.Inventor: Hemant Kumar Jain
-
Patent number: 11316665Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.Type: GrantFiled: June 21, 2019Date of Patent: April 26, 2022Assignee: Certicom Corp.Inventor: Daniel Richard L. Brown
-
Patent number: 11310249Abstract: Mechanisms for defending a computing system from attack are presented. The mechanisms include: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.Type: GrantFiled: March 26, 2019Date of Patent: April 19, 2022Assignee: The Trustees of Columbia University in the City of New YorkInventors: Yuan Jochen Kang, Salvatore Stolfo
-
Patent number: 11301579Abstract: Methods and systems for selectively encrypting commit log entries in a distributed database system are described. One example method includes determining that a commit log for a particular server in the distributed database system is to be updated based on a data operation performed on a tablet managed by the server, the tablet including at least a portion of the data from a table in the distributed database system, and wherein the data from the table is stored in multiple tablets; determining that the tablet managed by the particular server is an encrypted tablet; in response to determining that the tablet is an encrypted tablet, generating an encrypted log entry representing the data operation performed on the tablet including an encrypted payload including information representing the data operation and an unencrypted header including information about the encrypted log entry; and updating the commit log to include the encrypted log entry.Type: GrantFiled: August 5, 2019Date of Patent: April 12, 2022Assignee: Google LLCInventors: David Wanyoike Mwaura, Dmitry N. Orlov
-
Patent number: 11295014Abstract: Embodiments of the disclosure disclose a system to prevent data of a client from leaking to untrusted parties in a multiparty computation environment. According to one embodiment, in response to a request received at a gateway (e.g., a non-bypassable gateway) of a server from a user device of a user over a network to process user data by an execution service, the system sanitizes the user data by scanning the user data for malicious code. The system selects a trusted execution environment (TEE) worker from a number of TEE workers and initiates an execution of the execution service by the selected TEE worker. The system receives execution results from the selected TEE worker. The system transmits the execution results to the user device of the user over the network.Type: GrantFiled: May 8, 2019Date of Patent: April 5, 2022Assignee: BAIDU USA LLCInventors: Yueqiang Cheng, Tongxin Li, Yulong Zhang, Tao Wei
-
Facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment
Patent number: 11290282Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment, where a database system-implemented method includes receiving, by the database system, a content file and metadata to be submitted to a data repository of the database system. The content file may include content, where the metadata may include identifying data associated with at least one of the content and a user associated with the content. The method may include verifying, by the database system, the identifying data of the metadata. The verification of the identifying data represents authentication of at least one of the user and the content. The method may include submitting, by the database system, the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data.Type: GrantFiled: November 25, 2019Date of Patent: March 29, 2022Assignee: salesforce.com, Inc.Inventors: Shiloh Cory Heurich, Frank Siebenlist, Taher Elgamal, Clayten Tyler Joseph Hamacher, Matthew Steele, Pathik Ashok Solanki, Matthew B. Schechtman -
Patent number: 11263314Abstract: The disclosure provides a processor checking method, a checking device and a checking system. The method includes acquiring a first access record of the processor to a first memory during a running process, the first access record including reading-operation information; acquiring a second access record of a checking device to a second memory during a replay process, the second access record including first reading-operation information, the first reading-operation information being reading-operation information corresponding to a case in which a first access of the checking device to a same address during the replay process is a reading operation, and determining, based on the first access record and the second access record, whether or not the processor reads during the running process a memory address that is not any one of addresses included in the second access record.Type: GrantFiled: January 11, 2019Date of Patent: March 1, 2022Assignee: TSINGHUA UNIVERSITYInventors: Leibo Liu, Ao Luo, Shouyi Yin, Shaojun Wei
-
Patent number: 11265720Abstract: A connection establishing system and method for a mesh network is provided, the mesh network includes a first transceiver and a second transceiver, the method includes performing a secure connection procedure including: transmitting, by the second transceiver, a secure connection request signal including a identifier to the first transceiver. The first transceiver encrypts the authentication message by using a public key corresponding to the identifier to generate a secure connection response signal and transmit the same to the second transceiver, the second transceiver decrypts the secure connection response signal by a private key to generate a decryption message and transmits an association request signal including the decryption message to the first transceiver.Type: GrantFiled: December 12, 2018Date of Patent: March 1, 2022Assignee: WISTRON NEWEB CORPORATIONInventors: Hao-Ming Liang, Chui-Chu Cheng, Horen Chen
-
Patent number: 11238179Abstract: A chat system transfers chat data transmitted from a user terminal to a chat bot or another user terminal via a network. When the chat data transmitted from the user terminal is detected to include a content related to personal information, the chat system performs a predetermined filtering process on the chat data.Type: GrantFiled: May 9, 2018Date of Patent: February 1, 2022Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventor: Naohiro Fukuda
-
Patent number: 11240265Abstract: A method for extracting, correlating, consolidating and presenting metadata from transmissions is provided. The method may include receiving a TCP/IP transmission. The transmission may include a header and a body. The method may include extracting an originating IP address from a location of the transmission. The location may be in the header or in the body. The IP address may be extracted in binary form. The method may include determining an accuracy and validity metric of the transmission using an artificial intelligence module. The method may include converting the extracted IP address from binary form into hexadecimal form. The method may include embedding the hexadecimal form of the IP address into one or more unused options of the header. The method may include processing the transmission. The processing may be completed upon determination that the transmission is a valid transmission.Type: GrantFiled: May 6, 2019Date of Patent: February 1, 2022Assignee: Bank of America CorporationInventors: Manu Kurian, Jayachandra Varma, Gopikrishna Nemalikanti, Jason T. Findley, Sorin Cismas
-
Patent number: 11232077Abstract: A method of sharing information on the basis of anchoring and an anchoring device supporting the same and more particularly are provided. One of the methods includes, acquiring anchoring information including first field information permitted for sharing from a target transaction record recorded in a first blockchain and recording the acquired anchoring information in a second blockchain.Type: GrantFiled: October 25, 2019Date of Patent: January 25, 2022Assignee: SAMSUNG SDS CO., LTD.Inventors: Jae Seok Lee, Hyo Jung Lee, Jung Woo Cho, Ki Woon Sung