Patents Examined by Samuel Ambaye
  • Patent number: 12149928
    Abstract: A vehicle communication system, including plural control devices configured to carry out communication with one another, wherein a transmitting device and a receiving device each include a memory and a processor. The processor at the transmitting device generates first authentication information based on a message and the encryption key, and in a case in which there is an abnormality at the encryption key, transmits the predetermined authentication information and the message to the receiving device. The processor at the receiving device generates second authentication information based on the encryption key and the received message, collates the first authentication information and the second authentication information, and authenticates the message, and in a case in which, after starting-up of the receiving device, authentication has not succeeded even once, and the received first authentication information and the predetermined authentication information match, accepts the received message.
    Type: Grant
    Filed: October 13, 2023
    Date of Patent: November 19, 2024
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Masahide Banno
  • Patent number: 12147574
    Abstract: Methods and systems for anonymizing an identity of a caller using a voice print match. One system includes a surveillance system including a camera and a microphone; and a dispatch computer. The dispatch computer is configured to receive a voice call from the caller, generate a voice print from the voice call, compare the voice print to a plurality of stored voice prints, and, in response to the voice print not matching any of the plurality of stored voice prints, transmit the voice print to the surveillance system. The surveillance system is configured to receive the voice print, capture audio data via the microphone, compare the audio data to the voice print, and, in response to identifying a match between the voice print and the audio data, tag image data, captured via the camera, corresponding to the audio data for redaction.
    Type: Grant
    Filed: August 10, 2022
    Date of Patent: November 19, 2024
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: Chun Meng Tan, Anoop Sehgal Paras Ram, Daniela Stankovska
  • Patent number: 12126991
    Abstract: In accordance with one embodiment, a method of modifying data in a telecommunication system can be implemented by receiving a communication comprising voice data and non-voice data at a first processor; sending the non-voice data from the first processor to a second processor; sending the voice data from the first processor to a third processor; receiving a sensitive-data-alert-message at the second processor from a fourth processor; and, in response to the sensitive-data-alert-message from the fourth processor, producing a set of modified-non-voice data at the second processor by removing a set of sensitive data contained within the non-voice data.
    Type: Grant
    Filed: September 12, 2022
    Date of Patent: October 22, 2024
    Assignee: INTRANEXT SOFTWARE, INC.
    Inventors: Patrick Brown, James Mitch, Michael Verlare
  • Patent number: 12120516
    Abstract: Wireless communication device and methods for operating the same. One wireless communication device includes an electronic processor configured to operate the wireless communication device in a first security mode of a plurality of available security modes.
    Type: Grant
    Filed: December 16, 2021
    Date of Patent: October 15, 2024
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: Melanie A. King, Friedrich Bollmann, Clarence Coffee, Divya Ramamoorthy, David Weygandt
  • Patent number: 12107826
    Abstract: Techniques for Cobalt Strike Beacon HTTP C2 heuristic detection are disclosed. In some embodiments, a system/process/computer program product for Cobalt Strike Beacon HTTP C2 heuristic detection includes monitoring HyperText Transfer Protocol (HTTP) network traffic at a firewall; prefiltering the monitored HTTP network traffic at the firewall to select a subset of the HTTP network traffic to forward to a cloud security service; determining whether the subset of the HTTP network traffic is associated with Cobalt Strike Beacon HTTP C2 traffic activity based on a plurality of heuristics; and performing an action in response to detecting the Cobalt Strike Beacon HTTP C2 traffic activity.
    Type: Grant
    Filed: August 7, 2023
    Date of Patent: October 1, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanhui Jia, Christian Elihu Navarrete Discua, Durgesh Madhavrao Sangvikar, Ajaya Neupane, Yu Fu, Shengming Xu
  • Patent number: 12106198
    Abstract: This disclosure is directed to a generalizable machine learning model production environment and system with a defense mechanism that facilitates safe execution of machine learning models in production by effectively detecting potential known and new adversarial attacks. The disclosed exemplary systems and architectures gather data from the online execution of the machine learning models and communicate with an on-demand pipelines for further inspection and/or correction of vulnerabilities in the production machine learning model to the detected attacks. These systems and architectures provide an automatable process for continuous monitoring of model performance and correction of the production machine learning model to guard against current and future adversarial attacks.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: October 1, 2024
    Assignee: Accenture Global Solutions Limited
    Inventors: Mohamad Mehdi Nasr-Azadani, Andrew Hoonsik Nam, Matthew Kujawinski, Teresa Sheausan Tung
  • Patent number: 12099599
    Abstract: Apparatuses and methods for determining if a computer program is malware and to which malware class it belongs to. In the method, the behaviour of a computer program is traced by observing the activity of the program. Behaviour sequences comprising API-calls or similar activity of a computer program are then provided into a classifier for classifying the computer program. From the outcome of the classifier, a classification result and the portions relevant to decision can be provided to a person for further confirmation.
    Type: Grant
    Filed: November 30, 2021
    Date of Patent: September 24, 2024
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Moez Draief, Xiang Chen, Konstantin Kutzkov, Kevin Scaman, Milan Vojnovic
  • Patent number: 12101629
    Abstract: A network repository function, NRF, in a core network domain of a mobile communication network is provided, wherein the NRF is configured to register network function, NF, profiles for NF discovery, and wherein NF certificates have been issued to the NFs, each NF certificate including a public key of the respective NF and at least one signature of at least one certification authority, CA. The NRF is configured to receive, from a registering NF having an NF certificate, profile information comprising an NF identity of the registering NF, an NF type of the registering NF, and at least one CA certificate of at least one CA that signed the NF certificate issued to the registering NF. The NRF is further configured to store the received profile information in a repository.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: September 24, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Pablo Martinez De La Cruz, Francisco Javier Garcia Garcia
  • Patent number: 12093349
    Abstract: A method of distributing a amount of issuance of digital content includes: determining the amount of issuance corresponding to a certificate of right to use digital content; generating blocks corresponding to the amount of issuance in accordance with the certificate of right to use the digital content and adding the blocks to a block chain system; generating an authentication certificate including a key value of the generated blocks in connection with the certificate of right to use the digital content; receiving a purchase request for the certificate of right to use of the digital content from a first user terminal; transmitting the digital content to the first user terminal such that the digital content is stored in a content folder of the first user terminal; transmitting a first authentication certificate corresponding to a remaining amount among the amount of issuance to the first user terminal, and storing the first authentication certificate in connection with the certificate of right to use the digita
    Type: Grant
    Filed: October 8, 2021
    Date of Patent: September 17, 2024
    Assignee: VICLIP INC.
    Inventor: Hyun Chul Seo
  • Patent number: 12095928
    Abstract: A method for updating a software component. The method includes providing a first electronic device and a second electronic device that are connected in a first network, receiving update information for the second electronic device via the first electronic device, the update information being provided with a signature that is generated with the aid of a post-quantum algorithm (PQA) signature, checking the update information by validating the signature by the first electronic device, relaying the update information to the second electronic device if the update information is deemed to be valid, and updating a software component of the second electronic device using the update information.
    Type: Grant
    Filed: February 14, 2022
    Date of Patent: September 17, 2024
    Assignee: ROBERT BOSCH GMBH
    Inventors: Jan Zibuschka, Paulius Duplys, Robert Szerwinski
  • Patent number: 12096207
    Abstract: Embodiments of the prevent invention provide a network access authentication method and device. The method comprises: receiving an authentication request message sent by a first serving network, wherein the authentication request message carries a user equipment pseudonym identifier generated by a user equipment; determining whether a local user equipment pseudonym identifier is asynchronous with the user equipment pseudonym identifier generated by the user equipment; and obtaining, if the determination result is yes, an encrypted international mobile subscriber identity (IMSI) to carry out network access authentication on the user equipment. The embodiments of the present invention can solve the problem that a network access process in the related art does not provide a processing method for the case where the user equipment pseudonym identifier in the user equipment is asynchronous with the user equipment pseudonym identifier in a home network.
    Type: Grant
    Filed: October 2, 2023
    Date of Patent: September 17, 2024
    Assignee: ZTE Corporation
    Inventors: Shilin You, Hongjun Liu, Jiyan Cai, Zaifeng Zong, Jin Peng, Zhaoji Lin, Yunyin Zhang
  • Patent number: 12089051
    Abstract: This disclosure relates to improved systems and methods for providing and using wearable electronic accessories. A wearable electronic necklace accessory can include a support structure that permits the wearable electronic accessory to be worn in a user's neck region. The wearable electronic necklace accessory can include an electronic pendant coupled to the support structure, the electronic pendant can comprise a housing that includes a first wall, a second wall, and one or more side walls configured to couple the first wall to the second wall. The wearable electronic necklace accessory can include a display device and an audio device positioned within the pendant housing and configured to output electronic media and audio content. Other embodiments are disclosed.
    Type: Grant
    Filed: October 30, 2023
    Date of Patent: September 10, 2024
    Assignee: Audeo LLC
    Inventors: Carolyn Ann Bankston, Jordan Gardinal
  • Patent number: 12075520
    Abstract: A server system to onboard an endpoint having a host system connected to a host interface of a memory device for a cloud service without prior customization of the endpoint to identify an account for accessing the cloud service. For example, after receiving a request associated with the service and containing identity data generated by the memory device, the server system determines authenticity of the memory device and the endpoint based on a secret of the memory device and the identity data. In response to the request, the server system further identifies, based on the identity data, a subscriber among a plurality of subscribers based on ownership data of the endpoint. As a result of the identifying of the subscriber based on the identity data, the server system determines an account of the subscriber to provide the service to the endpoint based on the account.
    Type: Grant
    Filed: September 24, 2021
    Date of Patent: August 27, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Jeffrey Charles Shiner, Lance W. Dover, Olivier Duval
  • Patent number: 12069047
    Abstract: Training an adversarial perturbation detector comprises accessing a training set comprising an enrolled biometric sample xi and a public biometric sample x of an enrolled user, and submitted biometric samples x? of a second user, the submitted biometric samples x? comprising perturbed adversarial samples x?+?x?. A transformation function k(?) is provided having learnable a parameter ? and a classifier having a learnable parameter ?. The training set is used to learn the parameters ? and ? by inputting the training set to the transformation function k(?). The transformation function k(?) generates transformed enrolled samples k(xi), a transformed public biometric sample k(x), and a transformed adversarial sample k(x?+?x?). The classifier classifies the transformed adversarial sample k(x?+?x?) as a success or as a fail based on the transformed enrolled samples k(xi). Based on a result of the classification, the learnable parameters ? and ? are updated.
    Type: Grant
    Filed: September 23, 2022
    Date of Patent: August 20, 2024
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Yuhang Wu, Sunpreet Singh Arora, Hao Yang
  • Patent number: 12063227
    Abstract: Systems and methods for threat response in computer environments can include detecting, by one or more processors, a threat to the computer environment, and identifying a subset of assets of the plurality of assets associated with the threat. The one or more processors can determine from a predefined set of resolutions a plurality of resolutions executable to resolve the threat for the subset of assets. The one or more processors can execute, for each resolution of the plurality of resolutions, a trained model to simulate the resolution for the subset of assets. The one or more processors can select, based at least on results of execution of each resolution, a resolution among the plurality of resolutions to be implemented.
    Type: Grant
    Filed: October 1, 2021
    Date of Patent: August 13, 2024
    Assignee: Acentium Inc
    Inventor: Amine Hamdi
  • Patent number: 12063504
    Abstract: A system receives, from a user equipment, a request for access to a wireless communication network and identifies, based on the request, baseline radio frequency (RF) response information associated with the user equipment. The system obtains dynamic RF response information associated with the user equipment and authenticates, based on the dynamic RF response information and the baseline RF response information, the user equipment. The system thereby grants the user equipment access to the wireless communication network and determines context information associated with the user equipment. The system generates, based on the baseline RF response information and the context information, user equipment profile information and sends, to a base station associated with the wireless communication network, the user equipment profile information to facilitate access to the wireless communication network by the user equipment.
    Type: Grant
    Filed: December 1, 2021
    Date of Patent: August 13, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Jin Yang, Krishna K. Bellamkonda, Greg Augustus Rusu, Vijaya Paduvalli, Ahmed Moussa
  • Patent number: 12058517
    Abstract: A vehicle system, a server, and a vehicle communication security method are provided. The vehicle system includes a first controller that transmits vehicle identification information from other controllers in a vehicle and a second controller and a third controller among the other controllers that generates and stores a unique key of the vehicle using the vehicle identification information received from the first controller and a previously stored shared key. The second controller and the third controller perform communication based on the unique key.
    Type: Grant
    Filed: September 20, 2021
    Date of Patent: August 6, 2024
    Assignees: HYUNDAI MOTOR COMPANY, KIA CORPORATION
    Inventor: Ho Jin Jung
  • Patent number: 12052265
    Abstract: Methods and systems are described herein for generating and assigning resources based on timestamps. A plurality of permission messages associated with a plurality of authorization events may be received with each permission message including an authorization timestamp indicating a generation time of a corresponding permission message. In addition, a plurality of data records may be received with each data record including a corresponding plurality of parameters. Based on the permission messages and the data records, a resource multiplier is generated, and resources assigned to each data record are multiplied based on the resource multiplier.
    Type: Grant
    Filed: November 15, 2023
    Date of Patent: July 30, 2024
    Assignee: Citibank, N.A.
    Inventors: Rob Hazard, Pete D'Aleo, Jaclyn Campanella, Camilo Restrepo Montoya, Lisa Giordanella, Jim Horn, Chris Amundson
  • Patent number: 12034848
    Abstract: A device implementing a system for device-relationship based communication includes at least one processor configured to establish, by a first device associated with a first user, a secure communication channel with a second device associated with a second user via a direct wireless connection. The at least one processor is configured to transmit, over the secure communication channel, first device-identifying information to the second device, and receive, over the secure communication channel, second device-identifying information from the second device. The at least one processor is configured to establish a particular type of relationship with the second device, store the second device-identifying information in association with an indication of the particular type of relationship established with the second device, and transmit, to the second device and over the secure communication channel, the indication of the particular type of relationship established with the second device.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: July 9, 2024
    Assignee: Apple Inc.
    Inventors: Andrew J. Daley, Nicholas J. Circosta, Ryan W. Baker, Elliot T. Garner
  • Patent number: 12032715
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for an approach to securing information stored in a distributed network. The system allows for generating distributed identifiers for information entries, wherein the distributed identifiers mask the information entries using a hash function and the distributed identifiers are dispersed across distributed ledgers. The system also allows for originating nodes to access the information entries within the distributed identifiers, while permitting other nodes and domains to reference the distributed identifiers themselves instead of referencing the information entries.
    Type: Grant
    Filed: January 4, 2022
    Date of Patent: July 9, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Tirupathirao Madiya, Archana Brahadeeswaran, Yellaiah Ponnameni