Patents Examined by Sanchit K Sarker
-
Patent number: 11956213Abstract: Some embodiments of the invention provide a method for transmitting data messages via secure tunnels in a network. The method is performed at a gateway device. The method determines that a data message received at the gateway device should be sent via a secure interface of the gateway device. The method matches the data message to a firewall rule that maps to a particular secure tunnel used by the secure interface, with multiple different firewall rules mapping to multiple different secure tunnels used by the secure interface. The method encapsulates the data message with a header that comprises an indicator value specifying the particular secure tunnel and forwards the encapsulated data message to a destination interface.Type: GrantFiled: May 18, 2022Date of Patent: April 9, 2024Assignee: VMware LLCInventors: Deepika Kunal Solanki, Yong Wang
-
Patent number: 11943205Abstract: Systems and methods for providing access to historical data over a real-time tunnel are disclosed. The method provides a mechanism for secure communication between one or more historians. In an example, attack surfaces on historians in an industrial control system operational technology (OT) network and in an information technology (IT) networks are reduced and possibly entirely eliminated by tunneling through a DMZ (de-militarized zone) or “secured network”.Type: GrantFiled: March 13, 2023Date of Patent: March 26, 2024Assignee: Real Innovations International LLCInventor: Andrew S. Thomas
-
Patent number: 11934518Abstract: A verification apparatus acquires a source code for multiparty computation, while changing a combination of options settable to a multiparty computation compiler, compiles the source code for each combination of options to generate a plurality of multiparty computation executable codes, selects at least one multiparty computation executable code from the plurality of multiparty computation executable codes as a verification code and provides the at least one verification code to a verification environment of multiparty computation, generates an evaluation index with respect to an execution result of at least one verification code in the verification environment, and selects at least one recommended code from the plurality of multiparty computation executable codes, based on the evaluation index corresponding to at least one verification code and outputs the selected recommended code.Type: GrantFiled: January 9, 2019Date of Patent: March 19, 2024Assignee: NEC CORPORATIONInventors: Hikaru Tsuchida, Takao Takenouchi, Toshinori Araki, Kazuma Ohara, Takuma Amada
-
Patent number: 11934322Abstract: A system comprises a storage system comprising one or more storage devices and a storage controller operatively coupled to the storage system, the storage controller comprising a processing device, the processing device to receive first raw data from a first tenant of the storage system to a first non-volatile memory express (NVMe) input/output (I/O) queue of the storage system. The processing device further to determine that the first NVMe I/O queue corresponds to a first key, wherein the first key corresponds to the first tenant. The processing device further to encrypt the first raw data using the first key to generate first encrypted data. The processing device further to store the first encrypted data on the storage system.Type: GrantFiled: January 16, 2019Date of Patent: March 19, 2024Assignee: PURE STORAGE, INC.Inventors: Ethan L. Miller, Andrew R. Bernat, Ronald Karr, Christopher Golden, Nicholas George Psaki, David Whitlock
-
Patent number: 11936620Abstract: A method and computer readable software for providing randomized Security Parameter Index (SPI) for distributed Internet Protocol security (IPsec) are disclosed. In one embodiment a method includes designating each IPsec node with a unique node identifier, the IPsec node; performing a hash function on a random SPI to provide a randomized SPI; and assigning the randomized SPI to an IPsec tunnel associated with an IPsec node.Type: GrantFiled: October 26, 2020Date of Patent: March 19, 2024Assignee: Parallel Wireless, Inc.Inventors: Ayan Chattopadhyay, Vikram Menon
-
Patent number: 11928225Abstract: Systems, computer program products, and methods are described herein for implementing real-time redaction in a workflow configurable environment. The present invention is configured to electronically receive, from a user input device, a request to load at least one user interface associated with an application; initiate a real-time content redaction engine on contents of the one or more fields associated with the at least one user interface in response to receiving the request, wherein initiating further comprises: parsing one or more embedded structures associated with the one or more fields; identifying private information in the one or more fields based on at least parsing the one or more embedded structures; and masking the private information in the one or more fields; and load the at least one user interface associated with the application in response to masking the private information in the one or more fields.Type: GrantFiled: June 1, 2023Date of Patent: March 12, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Nagaraju Buddhiraju, Deepali Dadhich, Lekshan Bhathiya Jayasinghe
-
Patent number: 11921871Abstract: Systems, apparatuses and methods may provide for detecting an identifier communication from a writing implement and transitioning a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers. Moreover, a plurality of additional interior pages of the electronic notepad may be maintained in the locked state while the previously modified interior page is in the unlocked state.Type: GrantFiled: July 29, 2022Date of Patent: March 5, 2024Assignee: Intel CorporationInventors: Arvind Kumar, James M. Okuley
-
Patent number: 11921895Abstract: Systems and methods of procuring real data items based on user affinity gauged via synthetic data items are disclosed. In one embodiment, an exemplary computer-implemented method may comprise: utilizing a trained machine learning model to generate a synthetic data item based on real user data; presenting the synthetic data item to those users; obtaining indications identifying user responses to the synthetic data item; obtaining user-defined control parameters from the users; configuring a user-defined control mechanism to share a portion of the real user data based thereon; obtaining a subset of the real user data based the user-defined control parameters; providing to a particular third-party data source at least one of: data regarding the synthetic data item, the at least one portion of the real user data, and the indications of the users; and then receiving a second real data item from the particular third-party data source.Type: GrantFiled: October 7, 2021Date of Patent: March 5, 2024Assignee: Capital One Services, LLCInventors: Galen Rafferty, Anh Truong, Jeremy Goodsitt, Austin Walters
-
Patent number: 11924218Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.Type: GrantFiled: May 11, 2023Date of Patent: March 5, 2024Assignee: Avast Software s.r.o.Inventors: Sadia Afroz, Juyong Do, John Poothokaran
-
Patent number: 11924340Abstract: Techniques are disclosed for cryptographically secure shuffling processes for generating and utilizing secrets in an infrastructure-as-a-service (IaaS) environment. In an embodiment, a method comprises generating a source list and a destination list, the source list and destination list association with a sequential format and the source list comprising a plurality of elements in the sequential format; generating a first random number and a second random number; determining a first element in the source list, the first element corresponding to a position in the sequential format of the source list based on the first random number; determining a first destination position in the destination list, the first destination position corresponding to a position in the sequential format of the destination list based on the second random number; and updating the destination list to include the first element in the source list at the first destination position.Type: GrantFiled: March 17, 2022Date of Patent: March 5, 2024Assignee: Oracle International CorporationInventor: Suren Duhan
-
Patent number: 11924206Abstract: A network adapter within an industrial input/output (I/O) system includes one or more processers. The one or more processors are configured to: receive a first combination; determine whether the first combination matches a predefined lock combination; upon determining that the first combination matches the predefined lock combination, start a lock process; receive a second combination; determine whether the second combination matches a predefined lock key; and upon determining that the second combination matches the predefined lock key, lock the adapter.Type: GrantFiled: August 23, 2021Date of Patent: March 5, 2024Inventors: Wen Chinn Yew, Yongjie Daniel Wong
-
Patent number: 11917061Abstract: A decentralized and/or hybrid decentralized method for secure cryptography key storage referred to as Mutual Dependency Architecture (MDA) includes the steps of encrypting the cryptographic key using an unlock key; encrypting the unlock key using an encryption tool to create an encrypted seed; and storing the encrypted seed; wherein a user must have access to a first storage area in the device and to a second storage area external to the device in order to access the cryptographic key. In one embodiment, the encryption tool is a store key that is stored in unencrypted form in the first storage area, while the encrypted seed is stored in the second storage area. In another embodiment, the encryption tool is a Hardware Security Module (HSM) having an authentication key that is encrypted using a store key and stored in the second storage area, while the encrypted seed and the store key are stored in unencrypted form in the first storage area.Type: GrantFiled: April 26, 2019Date of Patent: February 27, 2024Inventor: Barbara Jean Wilk
-
Patent number: 11907383Abstract: Systems, computer program products, and methods are described herein for implementing real-time redaction in a workflow configurable environment. The present invention is configured to electronically receive, from a user input device, a request to load at least one user interface associated with an application; initiate a real-time content redaction engine on contents of the one or more fields associated with the at least one user interface in response to receiving the request, wherein initiating further comprises: parsing one or more embedded structures associated with the one or more fields; identifying private information in the one or more fields based on at least parsing the one or more embedded structures; and masking the private information in the one or more fields; and load the at least one user interface associated with the application in response to masking the private information in the one or more fields.Type: GrantFiled: June 1, 2023Date of Patent: February 20, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Nagaraju Buddhiraju, Deepali Dadhich, Lekshan Bhathiya Jayasinghe
-
Patent number: 11909861Abstract: A method includes obtaining, from a server, a filter including a set of encrypted identifiers each encrypted with a server key controlled by the server. The method includes obtaining a request that requests determination of whether a query identifier is a member of a set of identifiers corresponding to the set of encrypted identifiers. The method also includes transmitting an encryption request to the server that requests the server to encrypt the query identifier. The method includes receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key and determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers. When the encrypted query identifier is not a member of the set of encrypted identifiers, the method includes reporting that the query identifier is not a member of the set of identifiers.Type: GrantFiled: March 23, 2023Date of Patent: February 20, 2024Assignee: Google LLCInventors: Kevin Yeo, Joon Young Seo, Sarvar Patel
-
Patent number: 11868500Abstract: A method of accessing objects with fine-grained access control (FGAC) in a relational database management system (RDBMS) storing a segmented column-major database. For each object with access restrictions, an artificial neural network (ANN), is trained by generating an equally distributed segment map of segmented data entries, so that the map reproduces the row disposition in the unsegmented object. When a user access request is received, these ANNs are referred to determine if any of the objects to be accessed are subject to access restrictions. If that is the case, then the ANN creates a pseudo-view construct of its associated object which is limited to data entries that the user has permission to access. The pseudo-views are then injected into the user access request to embed the fine-grained access controls for subsequent processing of the request, which can then proceed without further regard to user-specific access restrictions.Type: GrantFiled: March 24, 2021Date of Patent: January 9, 2024Assignee: International Business Machines CorporationInventors: Pedro Miguel Barbas, Enzo Cialini, David Kelly, Qinlong Luo, Clara Liu
-
Patent number: 11870762Abstract: The present disclosure is directed to systems and methods for transparent Provider Backbone Bridge forwarding of MACsec key exchanges over public Ethernet provider backbones. The method includes the steps of receiving, at a first PBB device, an Ethernet frame from a first edge router for transmission to a second edge router via a MACsec connection, the Ethernet frame comprising a plurality of fields; performing a lookup of one or more fields of the plurality of fields to determine a match with one or more pre-defined values; determining that the one or more fields of the Ethernet frame match the one or more pre-defined values; rewriting the one or more fields of the Ethernet frame to one or more open values operable to allow the Ethernet frame to be transmitted to a next hop device; and transmitting the Ethernet frame to the next hop device.Type: GrantFiled: July 7, 2021Date of Patent: January 9, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Craig Thomas Hill, Aaron Christopher Warner, Michael William Bessette, Chennakesava Reddy Gaddam
-
Patent number: 11870757Abstract: Techniques are described that include detecting customer personal information within any appropriate set of data, such as customer communications produced by customer-facing services offered by an organization. Once detected, the customer personal information may be tokenized within the customer communications, making the data appropriate for external systems, such as cloud-hosted applications. The disclosed techniques include a masking service that may be plugged into an on-premises pipeline of any customer-facing service that makes requests to an off-premises, cloud-hosted application. The masking service may apply rule-based detection and/or machine learning-based detection to detect both structured and unstructured customer personal information included in customer communications. The masking service may further tokenize or otherwise obfuscate or replace the detected customer personal information.Type: GrantFiled: December 2, 2021Date of Patent: January 9, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Chintan Mehta, Michelle Moore, Ramakrishna Swarup Pogalur, Kunal Jha, Kapil Soni, Venkatesan Chinnaraju, Upul D. Hanwella, Ranganathan Kanchi
-
Patent number: 11863675Abstract: Datacenters or other large-scale distributed computing systems can provide computing resources such as processing power and data storage as computing services accessible to tenants via a computer network. A tenant, such as a corporation, school, or organization, can have multiple users or groups of users with corresponding websites. To facilitate ready access, data relevant to a user, group, or website of a tenant can be stored in a dedicated network location sometimes referred to as a shard. A shard can be a physical and/or logical storage location that contains emails, chats, instant messages, documents, photos, videos, or other types of content items with which the user, group, or website can interact.Type: GrantFiled: April 6, 2022Date of Patent: January 2, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ariane Belle Tsai, Aigerim Shintemirova, Nicole Isis Cranon, Annalilia Horstmann Cavazos, Serguei Vasilyevich Martchenko, Yuva Priya Arunkumar, Andrew Kovalenko
-
Patent number: 11853452Abstract: Embodiments relate to keeping databases compliant with data protection regulations by sensing the presence of sensitive data and transferring the data to compliant geographies. A request including information is received, the request being intended for processing on a local database. A model is used to process the information of the request. Responsive to the model determining that information relates to sensitive data, the request is transferred to a remote database associated with a geography meeting a requirement for the sensitive data in order to execute the request.Type: GrantFiled: November 5, 2021Date of Patent: December 26, 2023Assignee: International Business Machines CorporationInventors: Lucas Correia Villa Real, Rogerio Cesar Barbosa dos Santos da Silva Silva, Claudio Bandeira Dutra, Raphael Guedes Amorim
-
Patent number: 11853439Abstract: The present specification describes computer-implemented methods and systems for secure storage and transmission of data in a distributed network environment. In embodiments, each piece of data is transformed in to multiple pieces of metadata. Each piece of metadata is transmitted and stored on a different server, which is selected from separate pools of servers.Type: GrantFiled: December 28, 2021Date of Patent: December 26, 2023Assignee: Activision Publishing, Inc.Inventor: Philippe Louis Yves Paquet