Patents Examined by Saleh Najjar
-
Patent number: 12244692Abstract: A method for licensing a sensor at a central body, a method for licensing a receiver at a central body, a method for providing a list of sensor keys by using a central body, a method for registering a licensed sensor on a licensed receiver and a system for transmitting data from a licensed sensor to a licensed receiver, allow sensors and receivers to be licensed while also simultaneously ensuring secure delivery of the transmission key for communication purposes or for data exchange between the sensors and the receivers. The transmission key can be transmitted in an encrypted matter and there is no need to transmit the transmission key in an unencrypted manner. It is also possible to establish a licensing model for sensors and receivers by virtue of the secure delivery of the transmission key.Type: GrantFiled: April 25, 2022Date of Patent: March 4, 2025Assignee: Diehl Metering Systems GmbHInventors: Charles Fendt, Achim Schmidt
-
Patent number: 12229259Abstract: A method and a system for detecting malicious files in non-isolated environment are provided. The method comprises, during a training phase: acquiring a plurality of executable files, analyzing a given executable file to obtain: (i) data associated with the given executable file; (ii) a control-flow graph associated with the given executable file, and (iii) a data-flow graph associated with the given executable file; determining, based on the data, parameters of the given executable file; generating, by the processor, based on the parameters, at least a first feature vector and a second feature vector; generating, by the processor, based on the control-flow graph, a third feature vector; generating, by the processor, based on the data-flow graph, a fourth feature vector; and training the each one of ensemble of classifiers based on a respective feature vector to determine if a given in-use executable file is one of malicious and non-malicious.Type: GrantFiled: January 27, 2022Date of Patent: February 18, 2025Assignee: F.A.C.C.T. NETWORK SECURITY LLCInventor: Nikolay Sergeevich Prudkovskij
-
Patent number: 12231562Abstract: Aspects of the present disclosure involve a method, a system and a computer readable memory to optimize performance of cryptographic operations by avoiding computations of inverse values during decryption of encrypted messages.Type: GrantFiled: September 8, 2021Date of Patent: February 18, 2025Assignee: Cryptography Research, Inc.Inventors: Michael Alexander Hamburg, Michael Tunstall, Denis Alexandrovich Pochuev
-
Patent number: 12212678Abstract: An electronic device is provided. A computing system includes a host and a storage device. The host generates a host authentication code. The storage device receives a first request among a series of first to third requests regarding security write and write data from the host, generates a device authentication code based on the write data, receives the second request and the host authentication code from the host, and performs a program operation on the write data based on a result of comparing the host authentication code with the device authentication code.Type: GrantFiled: July 30, 2020Date of Patent: January 28, 2025Assignee: SK hynix Inc.Inventor: Gun Wook Lee
-
Patent number: 12206774Abstract: SEPP 1 forms a first TLS protected N32-c connection between with SEPP 2 so that SEPP 1 and SEPP 2 are respectively a TLS client and server. A TLS protected second N32-c connection between with SEPP 2 so that SEPP 1 and SEPP 2 are respectively a TLS server and client. On forming the first and second TLS protected N32-c connections, respective first and second shared secrets are formed. First and second master keys are obtained from the first and second shared secrets, respectively. N32-f context IDs are created by each SEPP on setup of the first and second N32-c connections. Based on the first master key and the first N32-f context ID, a first session key is produced for encryption of a first N32-f request to the second security edge proxy and correspondingly a second session key is produced for decryption of a second N32-f request from SEPP 2.Type: GrantFiled: September 9, 2019Date of Patent: January 21, 2025Assignee: Nokia Technologies OyInventor: Nagendra S Bykampadi
-
Patent number: 12204639Abstract: In some examples, a system executes a monitor separate from an operating system (OS) that uses mapping information in accessing data in a physical memory. The monitor identifies, using the mapping information, invariant information, that comprises program code, of the OS without suspending execution of the OS, the identifying comprising the monitor accessing the physical memory independently of the OS. The monitor determines, based on monitoring the invariant information of the OS, whether a security issue is present.Type: GrantFiled: July 26, 2019Date of Patent: January 21, 2025Assignee: Hewlett Packard Enterprise Development LPInventors: Geoffrey Ndu, Nigel Edwards
-
Patent number: 12197628Abstract: A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode, the method comprising, detecting a biometric input event from a biometric sensor module at normal mode, creating biometric data based on sensed data from the biometric sensor module at the secure mode, performing biometric registration or biometric authentication based on the created biometric data at the secure mode, and providing result information of biometric registration or biometric authentication at the normal mode.Type: GrantFiled: June 2, 2023Date of Patent: January 14, 2025Assignee: Samsung Electronics Co., Ltd.Inventors: Teain An, Taeho Kim, Hyungjoon Kim, Seulhan Park, Jonghoon Park, Heejun You, Yangsoo Lee, Moonsu Chang, Jinho Hyeon
-
Patent number: 12192367Abstract: A first installation stores a secret key of a user and a second installation provides encrypted data for the user. In order that a user apparatus can decrypt the encrypted data, the apparatus creates a one-time password, encrypts the one-time password by means of a public key of the first installation and causes the second installation to retrieve the secret key of the user from the first installation by means of the encrypted one-time password and a key identification allocated to the user in the second installation. The first installation decrypts the one-time password, searches for the secret key based on the key identification, encrypts it with the one-time password and transmits the encrypted secret key to the apparatus via the second installation. There, the secret key of the user is decrypted by means of the one-time password and is used for decrypting the encrypted data.Type: GrantFiled: October 30, 2015Date of Patent: January 7, 2025Assignee: Deutsche Post AGInventors: Mike Bobinski, Jürgen Pabel
-
Patent number: 12184777Abstract: Embodiments of this disclosure provide an authentication information transmission method and system, a key management client, and a computer device. Performed by a device hosting a key management client and comprising a hardware abstract layer, the method includes receiving, through a path via a preset hardware abstract layer interface of the hardware abstract layer, authentication information from an application client associated with an application server; transmitting the authentication information to a key management server, so that the key management server transmits the authentication information to a trusted application in the device; obtaining authentication information signed by the trusted application and forwarded by the key management server; and transmitting, through the preset hardware abstract layer interface, the signed authentication information to the application server, so that the application server performs a validity check on the authentication information.Type: GrantFiled: September 11, 2020Date of Patent: December 31, 2024Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Qi Cui
-
Patent number: 12174955Abstract: An apparatus to facilitate mitigation of side-channel attacks in a computer system platform is disclosed. The apparatus comprises a cryptographic circuitry, including a plurality of crypto functional units (CFUs) to perform cryptographic algorithms; and jammer circuitry to generate noise to protect the plurality of CFUs from side-channel attacks.Type: GrantFiled: June 22, 2021Date of Patent: December 24, 2024Assignee: Intel CorporationInventors: Anatoli Bolotov, Mikhail Grinchuk, Oleg Rodionov
-
Patent number: 12177328Abstract: Embodiments protect against memory-based side-channel attacks by efficiently shuffling data. In an example implementation, in response to a data access request by an encryption methodology regarding a first data element from amongst a plurality of data elements stored in memory, a storage address of a second data element of the plurality is determined. This storage address is determined using (i) an address of the first data element in the memory, (ii) a permutation function, and (iii) a random number. In turn, the first data element is stored at the determined storage address of the second data element and the second data element is stored at the address of the first data element. In this way, embodiments protect encryption methodologies from memory-based side-channel attacks.Type: GrantFiled: April 19, 2022Date of Patent: December 24, 2024Assignee: NORTHEASTERN UNIVERSITYInventors: Yunsi Fei, Zhen Jiang
-
Patent number: 12170724Abstract: A system and method for determining a secret crypto-graphic key shared between a sending unit and a receiving unit for secure communication includes obtaining, by the sending unit, a random bit sequence, and transmitting, at the sending unit, a first sequence of electromagnetic pulses to the receiving unit via a communication channel, wherein each electro-magnetic pulse of the first sequence of electromagnetic pulses corresponds to a bit of the random bit sequence according to a ciphering protocol, the signal loss is determined in the communication channel caused by an eavesdropper, and an information advantage is estimated over the eavesdropper based on the determined signal loss. Privacy amplification is performed based on the estimated information advantage in order to establish a shared secret crypto-graphic key.Type: GrantFiled: September 29, 2021Date of Patent: December 17, 2024Assignee: Terra Quantum AGInventors: Gordey Lesovik, Nikita Kirsanov, Nurbolat Kenbayev
-
Patent number: 12166791Abstract: A computer system and process for mitigating a Distributed Denial of Service (DDoS) attack by analyzing and correlating inbound and outbound packet information relative to the one or more protected computer networks for detecting novel DDoS Reflection/Amplification attack vectors. Created are separate data repositories that respectively store information relating to captured inbound and outbound packets flowing to and from the protected computer networks. Stored in each respective inbound and outbound data repository are identified inbound destination ports respectively associated with the captured inbound and outbound packets such that each identified inbound destination port number is associated with 1) a packet count relating to the inbound and outbound packets; and 2) a packet byte length count relating to each of the inbound and outbound packets.Type: GrantFiled: June 1, 2022Date of Patent: December 10, 2024Assignee: ARBOR NETWORKS, INC.Inventors: Brian St. Pierre, Steinthor Bjarnason
-
Patent number: 12164633Abstract: Systems and methods include causing a scan by Cloud Access Security Broker (CASB) system of a plurality of users associated with a tenant in a Software-as-a-Service (SaaS) application where the scan includes any of identifying malware in content in the SaaS application and identifying confidential data in the content in the SaaS application; during the scan which is covering historical data in the SaaS application, receiving notifications of the content being actively modified by any of the plurality of users; and including the content being actively modified in the scan with the historical data. The systems and methods can further include maintaining geolocation of the any of the plurality of users; and causing the content being actively modified in the scan to be processed by the CASB system based on the geolocation.Type: GrantFiled: July 22, 2020Date of Patent: December 10, 2024Assignee: Zscaler, Inc.Inventors: Shankar Vivekanandan, Narinder Paul, Arun Bhallamudi, Sakshi Agrawal, Sonal Choudhary, Parth Shah, Huan Chen
-
Patent number: 12141280Abstract: Embodiments of the present disclosure provide systems, methods, and non-transitory computer storage media for identifying malicious behavior using a trained deep learning model. At a high level, embodiments of the present disclosure utilize a trained deep learning model that takes a sequence of ordered signals as input to generate a score that indicates whether the sequence is malicious or benign. Initially, process data is collected from a client. After the data is collected, a virtual process tree is generated based on parent and child relationships associated with the process data. Subsequently, embodiments of the present disclosure aggregate signal data with the process data such that each signal is associated with a corresponding process in a chronologically ordered sequence of events. The ordered sequence of events is vectorized and fed into the trained deep learning model to generate a score indicating the level of maliciousness of the sequence of events.Type: GrantFiled: June 30, 2020Date of Patent: November 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Arie Agranonik, Shay Kels, Ofer Raz
-
Patent number: 12137175Abstract: Described are automated systems and methods for employing certificate authority meta-resources to facilitate automatic renewal and/or rotation of certificates and/or certificate authorities in a PKI hierarchy. For example, embodiments of the present disclosure can provide creating a certificate authority meta-resource, which can maintain and monitor certain information to facilitate automatic renewal and rotation of certificates and/or certificate authorities in a PKI hierarchy. The certificate authority meta-resource can also keep track of the active certificate authorities and certificates to ensure that trust is maintained without manual configuration of the PKI hierarchy.Type: GrantFiled: June 30, 2021Date of Patent: November 5, 2024Assignee: Amazon Technologies, Inc.Inventors: Param Sharma, Todd Cignetti, Josh Rosenthol, Jonathan Kozolchyk
-
Patent number: 12135795Abstract: Systems and methods are provided that may be implemented by services executing on one or more remote servers and on an endpoint information handling system to remotely erase (i.e., clear or remove) biometric fingerprint credential data that is previously stored on non-volatile memory of a discrete “match-on chip” fingerprint reader (MOFR) of the endpoint information handling system, as well as to erase separate non-biometric OS user identifier (ID) fingerprint enrollment information stored on separate system non-volatile memory of the endpoint information handling system.Type: GrantFiled: January 21, 2022Date of Patent: November 5, 2024Assignee: Dell Products L.P.Inventors: Charles D. Robison, Girish S. Dhoble, Daniel L. Hamlin
-
Patent number: 12135784Abstract: Disclosed are a privacy-protection-based data processing model acquisition method and apparatus, a terminal device and a storage medium. The method includes: acquiring sensor data of a plurality of sensors of a preset Internet of Things device; training an initial data model corresponding to each of the sensors through the sensor data corresponding to the sensor to obtain an intermediate data model corresponding to each of the sensors, and integrating the intermediate data models corresponding to the sensors to form an integrated data model; processing new data through the integrated data model and random noise to acquire a label category corresponding to the new data; and training the integrated data model according to the new data and the label category of the new data to acquire a data model. The method solved the technical problem of poor privacy protection of Internet of Things data.Type: GrantFiled: April 1, 2022Date of Patent: November 5, 2024Assignee: ENNEW DIGITAL TECHNOLOGY CO., LTDInventor: Xin Huang
-
Patent number: 12124562Abstract: A method includes configuring one or more permissions for a first page of memory including a first section of a plurality of sections of an executable program code to enable execution of the first section. The method also includes configuring one or more permissions for a second page of the memory including a second section of the executable program code to disable execution of the second section. The method also includes identifying one or more annotations in the executable program code, wherein the one or more annotations indicate one or more allowed transitions and one or more disallowed transitions between the plurality of sections. The method also includes changing, in view of the one or more annotations, the one or more permissions of the second page to enable execution of the second section of the executable program code.Type: GrantFiled: February 14, 2022Date of Patent: October 22, 2024Assignee: Red Hat, Inc.Inventors: Peter Jones, Adam Jackson
-
Patent number: 12126714Abstract: A cryptography system comprises a noising engine and a de-noising engine. The noising engine is configured to receive a key pattern, determine a final membership value based on one or more input parameters and a first knowledge base, and generate a noised key pattern based on the key pattern and the final membership value. The de-noising engine is configured to receive the noised key pattern and the final membership value, and generate a de-noised key pattern based on the noised key pattern, the final membership value, and a second knowledge base.Type: GrantFiled: May 24, 2021Date of Patent: October 22, 2024Assignee: Synopsys, Inc.Inventor: Ladvine D. Almeida