Patents Examined by Samson B. Lemma
-
Patent number: 12164612Abstract: A method for biometric authentication has the steps of sending a confidential communication to an intended recipient through the system, the intended recipient providing one or more biometric identifiers to view the communication, wherein the one or more biometric identifiers are unique to the intended recipient, the system verifying the one or more biometric identifiers against one or more stored biometric identifiers, the system accepting the one or more biometric identifiers further has the steps of the system displaying the confidential communication on the mobile device, and the user continues to provide the one or more biometric identifiers, the system continuously verifying the one or more biometric identifiers while the communication is displayed wherein when the verification is uninterrupted of fails the communication is hidden.Type: GrantFiled: September 27, 2021Date of Patent: December 10, 2024Inventors: Christopher Michael Robinson, David Andrew Elston
-
Patent number: 12160433Abstract: Systems and methods for device-to-account anomaly detection are disclosed. For example, device information associated with user account data is queried from a user registry and from an external system. The device information from both sources is hashed or otherwise formatted and compared to determine whether a dissimilarity is present. A difference value may be generated and utilized to determine whether an anomaly is present for device-to-account associations as between the user registry and the external system. Utilizing the difference value and/or historical difference values associated with the external system, one or more actions for correcting the anomaly may be selected and performed.Type: GrantFiled: April 15, 2021Date of Patent: December 3, 2024Assignee: Amazon Technologies, Inc.Inventors: Venkatesh Krishnamoorthy, Delin Davis, Fred Torok, Ribhav Agarwal
-
Patent number: 12155779Abstract: A method for gesture-based multi-factor authentication includes mapping a gesture password to a first substitution string, generating a cryptographic key using the first substitution string as an input to a password authenticated key exchange protocol, encrypting a challenge response with the cryptographic key to generate an encrypted challenge response, and transmitting, to a relying party computing system, a first authentication message comprising the encrypted challenge response and a user identifier identifying a user.Type: GrantFiled: December 14, 2023Date of Patent: November 26, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 12142046Abstract: A method and system for enhancing authenticity detail of captured video is disclosed. Objects within a physical environment (and visible within a camera field of view) are captured in video, and by way of video analytics these objects and their respective metadata are employed as part of the method and system for enhancing the authenticity detail of the captured video. Also, rather than the audio/video stream(s) being modified, the actual video scene itself may be modified.Type: GrantFiled: February 28, 2022Date of Patent: November 12, 2024Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Andrzej Grzesik, Ramil Galiew
-
Patent number: 12143476Abstract: A method of data transfer from a tenant to a service provider comprises encrypting the data with a public key of a key pair generated by a secure device within the service provider system. The data thus cannot be accessed by the service provider during transmission. The data is generated with a corresponding access control list, which specifies that a valid certificate must be presented in order to grant a particular use of the data once stored. The tenant can thus retain control of the use of the data even though it has been transferred out of the tenant system. A method of controlling use of data securely stored in the service provider system comprises issuing a use certificate having an expiry time to the party requesting use of the data. The use certificate must be validated before use of the stored data is granted. This enables the tenant to grant use of the stored data for a limited time period.Type: GrantFiled: November 8, 2023Date of Patent: November 12, 2024Assignee: NCIPHER SECURITY LIMITEDInventors: Ian Bygrave, Alec Edgington, Richard Kettlewell, David O'Doherty, Nicholas Smith, Neil Walker
-
Patent number: 12135823Abstract: The subject disclosure provides systems and methods for providing access to media content from a server based on a user interface of a client device through which the access is requested. A user may access certain media content, such as a song, album, playlist, a radio station, etc., only if a request for that content is initiated via a specific user interface, and when the user is a subscriber to a reduced subscription tier to a service of the server. To restrict the access in this way, an interface-specific token is generated at a server for each media content. The interface-specific token is received by a user device and is used for further access to the media content from the server.Type: GrantFiled: January 31, 2022Date of Patent: November 5, 2024Assignee: Apple Inc.Inventors: Betim Deva, Mufaddal Y. Khumri, Ying Chen, Jason P. Ketterman, Zhiyuan Zhao, Edward T. Schmidt
-
Patent number: 12137173Abstract: A device can (i) store public keys Ss and Sn for a network and (ii) record private key sd. A network can record a corresponding private keys ss and sn. The device can (i) generate a device ephemeral PKI key pair (Ed, ed) and (ii) send public key Ed to the network. The device can receive an ephemeral public key Es from the network. The device can calculate values for A: an elliptic curve point addition over Ss, Sn, and Es, and B: (sd+ed)mod n. The device can input values for X and Y into an elliptic curve Diffie Hellman key exchange (ECDH) in order to determine a mutually derived shared secret X5, where the network can also derive shared secret X5. The device can (i) use X5 to derive a key K2 and (ii) decrypt a ciphertext from the network using key K2.Type: GrantFiled: December 12, 2023Date of Patent: November 5, 2024Assignee: IoT and M2M Technologies, LLCInventor: John A Nix
-
Patent number: 12137348Abstract: Provided is a method, performed by an electronic device, of performing secure ranging with a target device. The method of performing secure ranging may include receiving a connection message for communication with the target device using a first communication method through a first communicator, transmitting, by a first applet in a secure element of the electronic device, a ranging session key for the target device to a second applet in the secure element, the ranging session key being stored in the first applet, receiving a ranging session request from the target device, based on the ranging session request, obtaining, by a second communicator, the ranging session key for the target device from the second applet, and by using the ranging session key, performing secure ranging using a second communication method with the target device through the second communicator.Type: GrantFiled: July 5, 2021Date of Patent: November 5, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Mingyu Lee, Sooyeon Jung, Haeyoung Jun
-
Patent number: 12132746Abstract: A threat management facility receives data from a variety of sources such as compute instances within an enterprise network, cloud service providers supporting the enterprise network, and third-party data providers such as geolocation services. In order to facilitate prompt notification of potential risks, the threat management facility may incrementally update data for use in threat assessments as the data becomes available from these different sources, and create suitable alerts or notifications whenever the currently accumulated data provides an indication of threat meeting a predetermined threshold.Type: GrantFiled: May 26, 2022Date of Patent: October 29, 2024Assignee: Sophos LimitedInventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Balakrishnan Nair
-
Patent number: 12132745Abstract: A platform for threat investigation in an enterprise network receives threat data from managed endpoints, and is augmented with data from cloud computing platforms and other third-party resources. The resulting merged data set can be incrementally updated and used to automatically launch investigations at appropriate times.Type: GrantFiled: May 26, 2022Date of Patent: October 29, 2024Assignee: Sophos LimitedInventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Balakrishnan Nair
-
Patent number: 12126741Abstract: The present disclosure provides methods and systems for ensuring the security of a blockchain and associated network, and for enabling the establishment of consensus regarding the state of the blockchain. A method of the disclosure may be implemented by one or more nodes on a blockchain network, using a non-parallelisable algorithm to calculate an output based on a computational difficulty parameter, a hash of at least one blockchain transaction; and/or a hash of at least one blockchain block header. The non-parallelisable, inherently sequential algorithm comprises at least one of the following operations or a combination thereof: a recursive operation, a modular exponentiation and/or a repeated squaring operation.Type: GrantFiled: April 28, 2020Date of Patent: October 22, 2024Assignee: nChain Licensing AGInventors: Craig Steven Wright, Jack Owen Davies, Alexander Tennyson Mackay, Chloe Ceren Tartan, Wei Zhang
-
Patent number: 12120252Abstract: Devices can be configured to implement distributed ledgers capable of immutably recording ledger entries that have validated version identifiers. The devices can include network interfaces, memory and processors. Processors can be configured to obtain ledger entries including version identifiers and version authenticator values, determine software versions that correspond to version identifiers, determine that version identifiers are valid based on version authenticator values, obtain challenges using cryptographic systems, wherein challenges are based on ledger entries, and/or broadcast blocks that incorporate ledger entries to securely add blocks to distributed ledgers. Blocks can be capable of being validated by using cryptographic systems to obtain proofs based on challenges.Type: GrantFiled: August 5, 2022Date of Patent: October 15, 2024Assignee: Artema Labs, IncInventor: Bjorn Markus Jakobsson
-
Patent number: 12111649Abstract: A method for handling security alarms by a control system of a technical installation includes a) receiving diagnostic messages that have been generated by technical objects (7) of a technical installation; b) analyzing the diagnostic messages such that diagnostic messages relevant to the security of an operation of the technical installation are identified by means of comparative data records, where a machine learning network is used to analyze the diagnostic messages to assess the security relevance of the diagnostic messages, where the network is previously trained using special inputs from operators of the technical installation that have assessed past diagnostic messages with regard to their security relevance; c) if necessary, adapting the previously identified diagnostic messages to requirements of a computer-implemented security module of the technical installation and d) transmitting the previously identified and optionally adapted diagnostic messages to the computer-implemented security module of thType: GrantFiled: March 16, 2020Date of Patent: October 8, 2024Assignee: SIEMENS AKTIENGESELLSCHAFTInventors: Benjamin Lutz, Anna Palmin
-
Patent number: 12107635Abstract: Aspects of the subject disclosure may include, for example, identifying a request to facilitate communications between first and second processing nodes, determining that the communications are to be established via quantum teleportation between, and identifying a network path comprising a first path segment to obtain a quantum channel, wherein quantum entanglement is established between the first and second processing nodes based on transportation of a first quantum entangled object via the quantum channel. A classical communication channel is facilitated between the first and second processing nodes, adapted to exchange between the nodes, quantum state information of a measurement performed upon the first quantum entangled object. Information is exchanged between the first and second processing nodes via the quantum channel according to the transported first quantum entangled object and the exchanged quantum state information. Other embodiments are disclosed.Type: GrantFiled: September 21, 2022Date of Patent: October 1, 2024Assignee: AT&T Intellectual Property I, L.P.Inventor: Moshiur Rahman
-
Patent number: 12105784Abstract: A method and system of performing an authentication of a person in order to activate a smart card for access to a secured resource is disclosed. The system and method are configured to collect image data and compare the image data to facial model data stored on the smart card. The system detects whether there is a match between the image data and any facial signatures previously collected and stored in the smart card. If there is a match, the system verifies an identity of the person and can be configured to automatically activate the smart card for a limited period of time.Type: GrantFiled: September 19, 2023Date of Patent: October 1, 2024Assignee: United Services Automobile Association (USAA)Inventors: Ravi Durairaj, Gregory Brian Meyer, Oscar Roberto Tijerina, Sean Carl Mitchem, Stacy Callaway Huggar, Ruthie D. Lyle, Nathan Lee Post, Mark Anthony Lopez, Nolan Serrao
-
Patent number: 12105791Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.Type: GrantFiled: November 19, 2021Date of Patent: October 1, 2024Assignee: SAP SEInventors: Rouven Krebs, Jochen Wilhelm
-
Patent number: 12105806Abstract: A computer platform includes a security processor; at least one hardware processor; and a memory. The security processor stores data representing a private platform key. The private platform key is part of an asymmetric pair of keys, and the asymmetric pair of keys includes a public platform key. The memory stores a firmware image. The firmware image includes data representing a root certificate of a public key infrastructure that signs a second certificate that is associated with the computer platform. The second certificate includes the public platform key and binding information binding the second certificate to the computer platform. The firmware image includes instructions that, when executed by the hardware processor(s), cause the hardware processor(s) to access data representing the second certificate and determine whether the second certificate is valid based on the root certificate and the binding information.Type: GrantFiled: January 27, 2022Date of Patent: October 1, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Ludovic Emmanuel Paul Noel Jacquin, Thomas M. Laffey, Darrell Haskell
-
Patent number: 12107831Abstract: Automated fuzzy hash based signature collection is disclosed. A set of candidate fuzzy hashes corresponding to a set of false negative samples is received. A false positive reduction analysis is performed on the received set of candidate fuzzy hashes to generate a reduced set of fuzzy hashes. At least a portion of the reduced set of fuzzy hashes is clustered into a fuzzy hash cluster. A signature for a family of malware is generated based at least in part on the fuzzy hash cluster.Type: GrantFiled: September 10, 2021Date of Patent: October 1, 2024Assignee: Palo Alto Networks, Inc.Inventors: Yang Ji, Wenjun Hu, Xiao Zhang
-
Patent number: 12105862Abstract: Examples provide a multi-factor device holder (MDH) for storing multi-factor authentication devices. A housing encases a set of ports configured to connect to the set of connectors on two or more multi-factor authentication devices placed within the MDH. An external port can connect the MDH to a port on a user device. A selection device, such as a user interface, enables user selection of an authentication device from the set of authentication devices. A locking mechanism secures the housing in a closed configuration to prevent unauthorized access to the authentication devices stored within the MDH. The MDH can include a user authentication device, such as a biometric reader, to authenticate a user attempting to utilize the MDH. If authorized, the selected authentication device is unlocked and provided with power. The selected authentication device transmits a code to the user device via the external port connector.Type: GrantFiled: August 3, 2021Date of Patent: October 1, 2024Assignee: Walmart Apollo. LLCInventors: Christopher Soames Johnson, Timothy Lars Brush, Tony Marvin Mays
-
Patent number: 12101334Abstract: A threat management system stores an attack matrix characterizing tactics and techniques, and provides threat detection based on patterns of traversal of the attack matrix. Where the threat management system provides a data lake of security events and a query interface for using the data lake to investigate security issues, useful inferences may also be drawn by comparing query activity in the query interface with the patterns of traversal of the attack matrix, such as by using a malicious pattern of traversal to identify a concurrent chain of queries indicative of a threat, or by presenting separate threat scores to an analyst based on query activity and patterns of traversal.Type: GrantFiled: May 26, 2022Date of Patent: September 24, 2024Assignee: Sophos LimitedInventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment