Patents Examined by Samson B. Lemma
  • Patent number: 11388009
    Abstract: A token management system includes a generation unit that generates a non-fungible token associated with a product identifier in a distributed ledger, a management unit that associates the non-fungible token with a first public key, and a second public key for licensing processing in the distributed ledge, and a transfer unit that performs transaction processing of changing the first public key associated with the non-fungible token on the basis of a first private key is realized.
    Type: Grant
    Filed: December 26, 2019
    Date of Patent: July 12, 2022
    Inventor: Leona Hioki
  • Patent number: 11379611
    Abstract: Certain aspects of the present disclosure provide techniques for privacy-preserving execution of a workflow in a software application. Embodiments include generally includes receiving homomorphically encrypted inputs from a client device corresponding to user-provided data needed to calculate a result for a step of a workflow in the software application. A result is calculated for the step of the workflow using the received homomorphically encrypted inputs. The calculated result is returned to the client device. The calculated result is homomorphically encrypted as a result of calculating the result using the received homomorphically encrypted inputs.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: July 5, 2022
    Assignee: INTUIT INC.
    Inventors: Yair Horesh, Yehezkel S. Resheff, Shimon Shahar, Oren Sar Shalom
  • Patent number: 11366881
    Abstract: Systems and methods for entitlement tracking and control with blockchain technology are provided. A server node may receive usage information indicating usage of a licensed component by a remote device. The server node may generate a datablock that includes the usage information and append the datablock to a blockchain. The server node may acquire, from the blockchain, a license smart contract. The license smart contract may include control logic to control access to the license component. The server node may control access to the license component by the remote device based on the usage information and the control logic.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: June 21, 2022
    Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Kevin Matthew Mintz, Arthur R. Leinen, III, Melanie Jean Cutlan, Richard Thomas Meszaros
  • Patent number: 11354394
    Abstract: Various embodiments are generally directed to identity verification using autonomous vehicles. A security policy may be used to determine when identity verification using autonomous vehicles is required. The autonomous vehicle may be deployed to a location to verify the identity of the user based on one or more of images, audio data, biometric data, and wireless data connections.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: June 7, 2022
    Assignee: Capital One Services, LLC
    Inventors: Michael Mossoba, Abdelkader M'Hamed Benkreira, Joshua Edwards
  • Patent number: 11354402
    Abstract: Environment type validation can provide a tamper-resistant validation of the computing environment within which the environment type validation is being performed. Such information can then be utilized to perform policy management, which can include omitting verifications in order to facilitate the sharing of policy, such as application licenses, from a host computing environment into a container virtual computing environment. The environment type validation can perform multiple checks, including verification of the encryption infrastructure of the computing environment, verification of code integrity mechanisms of that computing environment, checks for the presence of functionality evidencing a hypervisor, checks for the presence or absence of predetermined system drivers, or other like operating system components or functionality, checks for the activation or deactivation of resource management stacks, and checks for the presence or absence of predetermined values in firmware.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: June 7, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tushar Suresh Sugandhi, Amber Tianqi Guo, Balaji Balasubramanyan, Abhijat Singh, Ahmed Saruhan Karademir, Benjamin M. Schultz, Hari R. Pulapaka, Gupta Shubham, Chase Thomas, Carlos Ernesto Peza Ramirez
  • Patent number: 11341447
    Abstract: Data processing systems and methods, according to various embodiments, are adapted for mapping various questions regarding a data breach from a master questionnaire to a plurality of territory-specific data breach disclosure questionnaires. The answers to the questions in the master questionnaire are used to populate the territory-specific data breach disclosure questionnaires and determine whether disclosure is required in territory. The system can automatically notify the appropriate regulatory bodies for each territory where it is determined that data breach disclosure is required.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: May 24, 2022
    Assignee: OneTrust, LLC
    Inventors: Jonathan Blake Brannon, Andrew Clearwater, Brian Philbrook, Trey Hecht, Wesley Johnson, Nicholas Ian Pavlichek
  • Patent number: 11321495
    Abstract: Embodiments for mitigating security vulnerabilities in a heterogeneous computing system are provided. Anomalous cache coherence behavior may be dynamically detected between a host and one or more accelerators using a cache controller at a shared last level cache based upon a pair-based coherence messages functioning as a proxy for indicating one or more security attack protocols.
    Type: Grant
    Filed: April 1, 2020
    Date of Patent: May 3, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alper Buyuktosunoglu, Hyojin Sung
  • Patent number: 11296865
    Abstract: Various embodiments relate to a method performed by a processor of a computing system. An example method includes determining a first cryptographic algorithm utilized in a first block of a first blockchain. The first block of the first blockchain has a first unique block identifier. A second cryptographic algorithm utilized in a second block of the first blockchain is determined. The second block of the first blockchain having a second unique block identifier. A first cryptographic algorithm status transition (“CAST”) event is defined if the second cryptographic algorithm is different than the first cryptographic algorithm. A first CAST record is defined upon occurrence of the first CAST event. The first CAST record includes the second cryptographic algorithm and the second unique block identifier. The first CAST record is digitally signed and stored on a second blockchain. The second blockchain may be referenced out-of-band of the first blockchain.
    Type: Grant
    Filed: August 16, 2019
    Date of Patent: April 5, 2022
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
  • Patent number: 11288403
    Abstract: A system and method for cryptographic verification of entity/vehicle authenticity, comprising generating a Vehicle Identification Number (VIN)—Key for an individual platform/vehicle; applying the VIN—Key to components of the platform/vehicle; receiving input for the platform/vehicle; validating the authenticity of the input and/or the platform/vehicle; performing the operation of the input if it was validated; terminating the operation if it was not validated; logging the operation; and decommissioning the platform/vehicle at the end of life.
    Type: Grant
    Filed: May 8, 2018
    Date of Patent: March 29, 2022
    Assignee: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Jonathan P. Ingraham, Rudra Chakravorty, Tate J. Keegan
  • Patent number: 11290459
    Abstract: Granting guest devices access to a network using out-of-band authorization including receiving, over an out-of-band network, a password for an in-band network from a guest device, wherein the password is generated on the guest device; storing the password received over the out-of-band network as an authorized password for the in-band network; receiving, from the guest device using an in-band protocol, a request to join the in-band network, wherein the request to join the in-band network comprises the password previously received from the guest device over the out-of-band network; and granting the guest device access to the in-band network based on a determination that the password received in the request to join the in-band network matches the password previously received from the guest device over the out-of-band network.
    Type: Grant
    Filed: May 15, 2018
    Date of Patent: March 29, 2022
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Matthew R. Alcorn, James G. McLean, Dharmesh N. Topiwala
  • Patent number: 11271751
    Abstract: Embodiment create and validate a digital record that represents an asset. Embodiments obtain a first private key and a first public key that corresponds to a creator of the digital record and generates one or more parameters for the digital record, where a first parameter of the parameters is related to transactions of the digital record. Embodiments generate one or more rules for the digital record, where a first rule of the rules corresponds to the first parameter and constrains the transactions. Using the first private key, embodiments compute a first digital signature of all of the first public key, the parameters and the rules and creates a first digital record comprising the first public key, the parameters, the rules and the first digital signature.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: March 8, 2022
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventor: Lucio D'orazio Pedro de Matos
  • Patent number: 11265163
    Abstract: In various embodiments, a method for performing a lattice-based cryptographic operation is provided. The method includes obtaining a noise polynomial, a secret polynomial and a public polynomial, disguising at least one of the noise polynomial, the secret polynomial and the public polynomial by means of multiplying it with a random blinding polynomial, calculating the sum of the noise polynomial with the product of the public polynomial and the secret polynomial based on the disguised at least one polynomial, and determining a result of the lattice-based cryptographic operation based on the calculated sum of the noise polynomial with the product of the public polynomial and the secret polynomial.
    Type: Grant
    Filed: April 8, 2019
    Date of Patent: March 1, 2022
    Assignee: Infineon Technologies AG
    Inventor: Thomas Poeppelmann
  • Patent number: 11258599
    Abstract: A system and method use a physical unclonable function in a PUF circuit on an integrated circuit to generate a security key, and stabilize the security key by storage in a set of nonvolatile memory cells. The stabilized security key is moved from the set of nonvolatile memory cells to a cache memory, and utilized as stored in the cache memory in a security protocol. Also, data transfer from the PUF circuit to the set of nonvolatile memory cells can be disabled after using the PUF circuit to produce the security key, at a safe time, such as after the security key has been moved from the set of nonvolatile memory cells to the cache memory.
    Type: Grant
    Filed: February 18, 2020
    Date of Patent: February 22, 2022
    Assignee: MACRONIX INTERNATIONAL CO., LTD.
    Inventors: Chun-Hsiung Hung, Kuen-Long Chang, Ken-Hui Chen, Shih-Chang Huang, Chin-Hung Chang, Chen-Chia Fan
  • Patent number: 11250127
    Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include filtering dependency code from a binary file to separate the dependency code from custom code in the binary file. The instructions further include evaluating the custom code in the binary file for a security risk.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: February 15, 2022
    Assignee: Blackberry Limited
    Inventor: Adam John Boulton
  • Patent number: 11252174
    Abstract: Embodiments include methods and systems for detecting security risks in network pages, comprising providing at least one secure transaction page to a secure transaction provider, the secure transaction page enabling the secure transaction provider to request secure transactions, determining a request rate for the secure transaction page associated with the secure transaction provider, determining a predetermined threshold for a change in request rate for the secure transaction page by the secure transaction provider, determining that the predetermined threshold, for the change in request rate for the secure transaction page by the secure transaction provider, has been exceeded, and providing a notification to the secure transaction provider based on the determination that the predetermined threshold, for the change in request rate for the secure transaction page by the secure transaction provider, has been exceeded.
    Type: Grant
    Filed: October 11, 2019
    Date of Patent: February 15, 2022
    Assignee: Worldpay, LLC
    Inventor: Brant Peterson
  • Patent number: 11250717
    Abstract: A method for managing engagement and presentation content of an electronic document involves providing container metadata identifying engagement containers within the electronic document, providing engagement data linked to the engagement containers, the engagement data comprising parameters of an engagement based on the segments of content in the linked engagement containers, executing a procedure to traverse engagement containers identified in the container metadata. The procedure includes accepting, based on user input, data responsive to the engagement, and assigning a score for the current engagement container based on the received data and the parameters defined in the engagement metadata.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: February 15, 2022
    Assignee: SpoonRead Inc.
    Inventors: Bart Alan Meltzer, Mayank V. Vadodaria
  • Patent number: 11252567
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: February 15, 2022
    Assignee: Intel Corporation
    Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Patent number: 11250114
    Abstract: Disclosed herein is a virtual assistant system having a biometric authentication device coupled to an electronic voice-based virtual assistant device. The biometric authentication device is configured to authenticate a user based on biometric data of the user to allow the user access to features of the electronic voice-based virtual assistant device.
    Type: Grant
    Filed: October 25, 2018
    Date of Patent: February 15, 2022
    Assignee: MASSACHUSETTS MUTUAL LIFE INSURANCE COMPANY
    Inventors: Damon Ryan Depaolo, Laura Barcome
  • Patent number: 11245667
    Abstract: It is known in the art to route client traffic to a network security gateway using the domain name system, or DNS. More specifically, a local DNS resolver on a private network may apply security intelligence to client DNS lookup requests, based on the domains that clients are seeking to resolve. If a requested domain represents a known security threat, the client can be blocked or directed to the network security gateway instead of to the desired host. This routing of the client request to the network security gateway can be accomplished by giving the client the IP address of the network security gateway instead of the actual IP address corresponding to the domain name, in response to a given DNS name query from the client. Request routing can be accomplished using other techniques, such as IP layer routing, as well.
    Type: Grant
    Filed: October 23, 2018
    Date of Patent: February 8, 2022
    Assignee: Akamai Technologies, Inc.
    Inventors: Eugene (John) Neystadt, Eyal Heiman, Elisha Ben-Zvi, Robert D. Blumofe
  • Patent number: 11244050
    Abstract: Methods, systems and computer programs are presented for classifying malware using audio signal processing. One method includes an operation for converting a non-audio data file to an audio signal. Audio features are extracted from the audio signal and are used to classify the non-audio data file.
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: February 8, 2022
    Assignee: Mayachitra, Inc.
    Inventors: Lakshmanan Nataraj, Bangalore S. Manjunath, Shivkumar Chandrasekaran