Patents Examined by Saleh Najjar
  • Patent number: 11936638
    Abstract: Methods, media, and systems for facilitating inter-application communications between a web platform and a remote application computing device are disclosed such that a link protocol agent associated with the web platform processes an authentication request based on which a temporary connection resource locator is provided. A connection is then established at the resource locator and maintained for a period of time. Payloads and acknowledgements are exchanged in the established connection. The connection is capable of being established across a firewall.
    Type: Grant
    Filed: June 28, 2020
    Date of Patent: March 19, 2024
    Assignee: Salesforce Inc.
    Inventors: Ankur Oberoi, Abhishek Mahanti, Helen Wei Zeng, Serguei Mourachov, Chirag Gupta, Saurabh Sahni
  • Patent number: 11921866
    Abstract: Embodiments disclosed herein are directed to a system and method configured to create a PII profile of the user and monitor data brokers for PII that matches the PII profile. For each data broker, the system can determine a threat level to the user and provide a dynamically updatable user interface configured to present the data brokers in a predetermined order, e.g. descending order of threat. The system can be configured to receive a swipe input from the user to either “Opt-Out” or “Remove” the user PII. “Opting-Out” can include preventing the data broker from selling or sharing the user PII. “Removing” can include requesting the data broker to delete all PII for the user. The system can then monitor the data broker for compliance with the request. Further, the system can provide a user interface to the data broker to petition the user for continued use of the PII.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: March 5, 2024
    Assignee: Consumer Direct, Inc.
    Inventor: David B. Coulter
  • Patent number: 11924362
    Abstract: A method implements anonymous uncensorable cryptographic chains. The method includes receiving, from a first application, verifiable data for a current record and unverified data for the current record. The unverified data for the current record was received by the first application from a second application. The method further includes verifying the verifiable data for the current record with unverified data from a previous record. The method further includes recording the verifiable data for the current record and the unverified data for the current record to the current record responsive to verifying the verifiable data for the current record. The method further includes presenting the current record to one or more of the first application and to the second application.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: March 5, 2024
    Assignee: INTUIT INC.
    Inventor: Glenn Carter Scott
  • Patent number: 11909864
    Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: February 20, 2024
    Assignee: GOOGLE LLC
    Inventors: Craig Wright, Benjamin R. Kreuter, James Robert Koehler, Evgeny Skvortsov, Arthur Asuncion, Laura Grace Book, Sheng Ma, Jiayu Peng, Xichen Huang
  • Patent number: 11893145
    Abstract: In one preferred form of the present invention, show in in FIGS. 1 to 3, there is provided a computer implemented security method (10) comprising: providing users (14) with first virtual machines (12), the first virtual machines (12) for being displayed on first electronic devices (18); and providing the users with virtual keyboards (22), the virtual keyboards (22) for providing user input to control the first virtual machines (12), the virtual keyboards (22) for being displayed on second electronic devices (24) that are different to the first electronic devices (18) to reduce the effectiveness of possible malware loggers on the first electronic devices (18).
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: February 6, 2024
    Assignee: BANKVAULT PTY LTD
    Inventors: Neil Richardson, Graeme Speak
  • Patent number: 11886876
    Abstract: A secure strong mapping computing system is a secure joining system including a plurality of secure computing apparatuses. The plurality of secure computing apparatuses include a first vector joining unit 11n, a first permutation calculation unit 12n, a first vector generation unit 13n, a second vector joining unit 14n, a first permutation application unit 15n, a second vector generation unit 16n, a first inverse permutation application unit 17n, and a first vector extraction unit 18n.
    Type: Grant
    Filed: August 8, 2019
    Date of Patent: January 30, 2024
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Koki Hamada
  • Patent number: 11888973
    Abstract: A secure joining system is a secure joining system including a plurality of secure computing apparatuses. The plurality of secure computing apparatuses include a first vector joining unit, a first permutation calculation unit, a first vector generation unit, a second vector joining unit, a first permutation application unit, a second vector generation unit, a first inverse permutation application unit, a first vector extraction unit, a second permutation application unit, a third vector generation unit, a second inverse permutation application unit, a second vector extraction unit, a modified second table generation unit, a third permutation application unit, a fourth vector generation unit, a shifting unit, a third inverse permutation application unit, a bit inversion unit, a third vector extraction unit, a modified first table generation unit, a first table joining unit, and a first table formatting unit.
    Type: Grant
    Filed: August 8, 2019
    Date of Patent: January 30, 2024
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Koki Hamada, Ryo Kikuchi, Naoto Kiribuchi
  • Patent number: 11882158
    Abstract: A device, method or executable instructions that include receiving, over a network, an authentication request from a user device for performing a function utilizing a first authentication method, obtaining network intelligence data for a mobile network over the network, and identifying a risk for each of multiple authentication methods in response to analyzing device security behavior and the network intelligence data. Further embodiments include identifying a first risk for the first authentication method and identifying a second risk for the function, determining the first risk is higher than the second risk, and identifying a second authentication method that is associated with the second risk. Additional embodiments include notifying the user device of the second risk for the function, and providing a recommendation to the user device to utilize the second authentication method to perform the function. Other embodiments are disclosed.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: January 23, 2024
    Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
    Inventors: Zhi Cui, Sangar Dowlatkhah
  • Patent number: 11880457
    Abstract: Apparatuses and methods related to detecting synchronization between multiple devices. The security of a device may be compromised if the device receives commands from unauthorized sources. A state of a device can be affected by the commands the device receives. A different device can determine whether there is synchronicity between device and the different device to determine whether the security of the device may have been compromised.
    Type: Grant
    Filed: September 27, 2019
    Date of Patent: January 23, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Aparna U. Limaye, Diana C. Majerus, Rachael R. Carlson, Shea M. Morrison, Debra M. Bell
  • Patent number: 11877153
    Abstract: In an embodiment, a communication method, using OFDM (Orthogonal Frequency Division Multiplexing), comprises transmitting and receiving packets between a first node and at least one second node, where each packet comprises a preamble and payload data. The method, performed by the first node, may comprise receiving packets from the at least one second node, and authenticating the at least one second node based on physical layer characteristics, i.e., on CSI (Channel State Information). The authenticating may be based on a plurality of preambles, which are extracted from a group of consecutively received packets.
    Type: Grant
    Filed: March 11, 2020
    Date of Patent: January 16, 2024
    Assignee: HITACHI ENERGY LTD
    Inventors: Zhibo Pang, Michele Luvisotto, Fei Pan, Ming Xiao, Roger Jansson
  • Patent number: 11868485
    Abstract: A storage circuit stores secret information. A software processing circuit obtains an operation task and generates scheduling instructions corresponding to the operation task. After receiving the scheduling instructions, a hardware processing circuit obtains the secret information from the storage circuit when the flag bit in the scheduling instruction is a valid value, determines, based on the secret information, data addresses of one or more pieces of operation data required for completing the operation corresponding to the scheduling instruction, and obtains the one or more pieces of operation data based on the data addresses to complete the operation corresponding to each scheduling instruction.
    Type: Grant
    Filed: January 5, 2022
    Date of Patent: January 9, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Qinglong Zhang, Qianying Tang, Wangchen Dai
  • Patent number: 11870898
    Abstract: A system for split keys for wallet recovery includes an interface configured to receive a request to recover a user private key, and a processor configured to provide a request to a credential issuing authority for a first encrypted recovery key share, wherein the request includes a first identification credential, receive the first encrypted recovery key share from the credential issuing authority, provide a request to a trusted organization for a second encrypted recovery key share, wherein the request includes a second identification credential, receive the second encrypted recovery key share from the trusted organization, combine the first encrypted recovery key share and the second encrypted recovery key share to determine a recovered encryption key, and determine the user private key using the recovered encryption key.
    Type: Grant
    Filed: May 21, 2020
    Date of Patent: January 9, 2024
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Prakash Sundaresan
  • Patent number: 11870893
    Abstract: According to one embodiment, a secure computing method includes setting a coefficient selected from a ring of integers Q based on first data X, generating n pieces of first fragment data from the first data X based on the coefficient, causing a learning model held in the computing device to learn the first fragment data, generating n pieces of second fragment data from second data Z based on the coefficient, performing, by each of the n computing devices, inference based on the second fragment data using the learning model, and obtaining decoded data dec by decoding k pieces of inference result data. The coefficient is set to make each of the n pieces of first fragment data less than a maximum value of the ring of integers Q.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: January 9, 2024
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mari Matsumoto, Masanori Furuta
  • Patent number: 11863583
    Abstract: Described herein are systems and methods for enhancing an interface for an information technology (IT) environment. In one implementation, an incident service causes display of a first version of a course of action and obtains input indicative of a request for a new action in the course of action. The incident service further determines suggested actions based at least one the input and causes display of the suggested actions. Once displayed, the incident service obtains input indicative of a selection of at least one action from the suggested actions, and causes display input indicative of a selection of at least one action from the suggested actions.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: January 2, 2024
    Assignee: Splunk Inc.
    Inventors: Oliver Friedrichs, Atif Mahadik, Govind Salinas, Sourabh Satish
  • Patent number: 11863657
    Abstract: Aspects of the present disclosure involves receiving an input message, generating a first random value that is used to blind the input message to prevent a side-channel analysis (SCA) attack, computing a second random value using the first random value and a factor used to compute the Montgomery form of a blinded input message without performing an explicit Montgomery conversion of the input message, and computing a signature using Montgomery multiplication, of the first random value and the second random value, wherein the signature is resistant to the SCA attack.
    Type: Grant
    Filed: December 5, 2022
    Date of Patent: January 2, 2024
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventor: Michael Tunstall
  • Patent number: 11861049
    Abstract: A system and method for defense against cache timing channel attacks using cache management hardware is provided. Sensitive information leakage is a growing security concern exacerbated by shared hardware structures in computer processors. Recent studies have shown how adversaries can exploit cache timing channel attacks to exfiltrate secret information. To effectively guard computing systems against such attacks, embodiments disclosed herein provide practical defense techniques that are readily deployable and introduce only minimal performance overhead. In this regard, a new protection framework against cache timing channel attacks is provided herein by leveraging commercial off-the-shelf (COTS) hardware support in processor caches, including last level caches (LLC), for cache monitoring and partitioning. This framework applies signal processing techniques on per-domain cache occupancy data to identify suspicious application contexts.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: January 2, 2024
    Assignee: The George Washington University
    Inventors: Guru Prasadh V. Venkataramani, Milos Doroslovacki, Fan Yao, Hongyu Fang
  • Patent number: 11861019
    Abstract: A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: January 2, 2024
    Assignee: CrowdStrike, Inc.
    Inventors: David F. Diehl, Nikita Kalashnikov
  • Patent number: 11849043
    Abstract: An electronic device generates a first key pair associated with the electronic device. A first secret key of the first key pair is generated based on device properties including identification information of the electronic device. The electronic device transmits a communication request to a verifier device. The electronic device generates zero-knowledge information which is based on the generated first secret key. A first public key of the first key pair is stored in the verifier device. The electronic device transmits the zero-knowledge information to the verifier device for a verification of the transmitted communication request. The verification of the communication request is based on the first public key. The electronic device receives verification information from the verifier device based on the transmitted zero-knowledge information and a successful verification of the verification of the transmitted communication request.
    Type: Grant
    Filed: November 13, 2020
    Date of Patent: December 19, 2023
    Assignee: SONY GROUP CORPORATION
    Inventors: Priyanka Savitkumar Vedeshwar, Vittal K Biradar
  • Patent number: 11836616
    Abstract: Disclosed is a method for constructing an auditable and privacy-preserving collaborative deep learning platform based on a blockchain-empowered incentive mechanism, which allows trainers of multiple similar models to cooperate for training deep learning models while protecting confidentiality and auditing correctness of shared parameters. The invention has the following technical effects. Firstly, the encryption method used by model trainers protects the confidentiality of sharing parameters; furthermore, the updated parameters are decrypted through the cooperation of all participants, which reduces the possible disclosure of parameters. Secondly, the encrypted parameters are stored in the blockchain, and are only available to participants and authorized miners who are responsible to update parameters.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: December 5, 2023
    Assignee: Jinan University
    Inventors: Jian Weng, Jiasi Weng, Ming Li, Yue Zhang, Jilian Zhang, Weiqi Luo
  • Patent number: 11838417
    Abstract: A device and a network can authenticate using a subscription concealed identifier (SUCI). The device can store (i) a plaintext subscription permanent identifier (SUPI) for the device, (ii) a network static public key, and (iii) a key encapsulation mechanism (KEM) for encryption using the network static public key. The network can store (i) a device database with the SUPI, (ii) a network static private key, and (iii) the KEM for decryption using the network static private key. The device can (i) combine a random number with the SUPI as input into the KEM to generate a ciphertext as the SUCI, and (ii) transmit the ciphertext/SUCI to the network. The network can (i) decrypt the ciphertext using the KEM to read the SUPI, (iii) select a key K from the device database using the SUPI, and (iv) conduct an Authentication and Key Agreement (AKA) with the selected key K.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: December 5, 2023
    Inventor: John A Nix