Patents Examined by Sarah Su
-
Patent number: 12388865Abstract: Techniques for performing cyber-security alert analysis and prioritization according to machine learning employing a predictive model to implement a self-learning feedback loop. The system implements a method generating the predictive model associated with alert classifications and/or actions which automatically generated, or manually selected by cyber-security analysts. The predictive model is used to determine a priority for display to the cyber-security analyst and to obtain the input of the cyber-security analyst to improve the predictive model. Thereby the method implements a self-learning feedback loop to receive cyber-security alerts and mitigate the cyberthreats represented in the cybersecurity alerts.Type: GrantFiled: April 24, 2023Date of Patent: August 12, 2025Assignee: GOOGLE LLCInventor: Awalin Nabila Sopan
-
Patent number: 12381903Abstract: A method, system, and computer-readable media for modeling cyberspace operations and the effects thereof. Network and connectivity data for an operational environment model may be retrieved from a network scan. Likelihood data that a network element takes a plurality of possible configurations may be mapped. Determination of a probability of effect of a capability acting on the network element may be based on the likelihood data and uncertainties associated with the capability. Multiple attacks within the operational environment model may be modeled to determine an attack path therethrough. Functional modeling techniques to model functional impacts of attacks on an operational environment model are also disclosed.Type: GrantFiled: March 3, 2023Date of Patent: August 5, 2025Assignee: Applied Research Associates, Inc.Inventors: Charles Edward Fisher, III, Steven J. Lorenc
-
Patent number: 12381747Abstract: A method and system for authenticating a device is provided. A noisy response is received from a physically unclonable function for a challenge. An error code is generated for correcting the noisy first response. An expected response is generated from the noisy first response and the error code. The expected response and corresponding first helper data is store. The helper data includes the first challenge and the error code. The helper data is provided to a device in response to an authentication request from the device, the first device including the physically unclonable function.Type: GrantFiled: August 10, 2023Date of Patent: August 5, 2025Assignee: Taiwan Semiconductor Manufacturing Company, Ltd.Inventors: Robert Abbott, Saman M. I. Adham, Peter Noel
-
Patent number: 12381888Abstract: Described embodiments provide systems and methods for generating a network space to perform mitigation actions on a plurality of users. At least one server may determine a plurality of users of one or more levels of riskiness in a network environment, and network locations of the users. Using a plurality of clustering features, the at least one server may generate a network space comprising a cluster of network locations corresponding to a subset of the users of at least a defined level of riskiness. The at least one server may perform a mitigation action on the subset of users corresponding to the generated network space.Type: GrantFiled: December 3, 2021Date of Patent: August 5, 2025Inventors: Saifulla Shaik, Aikaterini Kalou, Stuart Kennedy
-
Patent number: 12373525Abstract: Machine-learning based user authentication using a mobile device (e.g., using a computerized tool) is enabled. For example, a non-transitory machine-readable medium can comprise executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining an input received via a mobile device, determining, based on the input and using an authentication model, whether the input threshold matches an input pattern associated with an authorized user profile authorized to access a feature of the mobile device, wherein the input pattern has been determined based on machine learning applied to past inputs at the mobile device other than the input, and wherein the authentication model has been generated based on the machine learning applied to the input pattern, and based on a determination that the input at the mobile device is associated with an authorized user profile, granting access to the feature of the mobile device.Type: GrantFiled: November 1, 2021Date of Patent: July 29, 2025Assignee: AT&T Intellectual Property I, L.P.Inventor: Joseph Soryal
-
Patent number: 12363097Abstract: Systems and methods for cryptographic authentication are provided. A transport service may establish a connection with a login device, where a user is attempting to log in via a web browser. The login device may display a graphical code that encodes a unique URL provided by the transport service. A user may use an authenticator device to image the graphical code. A browser within the authenticator device may be opened and access the URL. The transport service may utilize the authenticator device to perform a proximity-based authentication.Type: GrantFiled: October 4, 2022Date of Patent: July 15, 2025Assignee: Trusona, Inc.Inventor: David Michael Kopack
-
Patent number: 12355804Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.Type: GrantFiled: January 5, 2023Date of Patent: July 8, 2025Assignee: Arizona Board of Regents on Behalf of Arizona State UniversityInventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
-
Patent number: 12355777Abstract: Systems and methods for conference security based on user groups are disclosed. In examples, a set of attendees (e.g., in a collaboration group) may be allowed access to a meeting by a host user with a specified access permission. The collaboration group may be in the network hosting the meeting or outside of the network. An attendee requesting access to the meeting may be verified based on the attendee's identity and membership status of the collaboration group. If an attendee's identity is not identified or if the attendee is not a member of the collaboration group, the requesting attendee may be denied access to the meeting. If the requesting attendee's identity is verified and the attendee is a member of the collaboration group, the attendee is allowed access to the meeting with their specified access permission.Type: GrantFiled: June 13, 2024Date of Patent: July 8, 2025Assignee: Level 3 Communications, LLCInventor: Andrew J. Broadworth
-
Patent number: 12341803Abstract: A technique and method for detection and display of the cybersecurity risk context of a cloud environment initiates an inspection of cybersecurity objects within a cloud environment utilizing an inspection environment and stores information pertaining to discovered cybersecurity objects within the inspected cloud environment in a storage environment. The technique and method further generate a cybersecurity risk context for the inspected cloud environment based on the observations made concerning the cybersecurity objects contained within it. The technique and method further configure a web browser running on a client device to automatically display the generated cybersecurity risk context to a user, either through a web page overlay or through a toolbar plugin which has been installed in the web browser and configured to enable inspections of a cloud environment, once the user has navigated to a web page containing cybersecurity object identifiers.Type: GrantFiled: September 18, 2024Date of Patent: June 24, 2025Assignee: Wiz, Inc.Inventors: Tomer Gil Levi, Yinon Costica, Ben Grynhaus, Itai Yosephi, Oron Noah, Eyal Wiener
-
Patent number: 12341809Abstract: Systems and methods for defending against volumetric attacks, implemented in a cloud-based system. Embodiments include steps of, monitoring flows and a rate of requests to a Data Center (DC); receiving a request from an address to the DC, the request being for a service in a cloud-based system; determining if the address has been successfully authenticated within a past predetermined time period; responsive to the address not having been successfully authenticated within the past time period, and one of (i) the rate of requests being above a threshold or (ii) the number of flows being above a threshold, placing the address in a penalty box for a predetermined amount of time; and blocking requests from the address in the penalty box for the predetermined amount of time.Type: GrantFiled: November 16, 2022Date of Patent: June 24, 2025Assignee: Zscaler, Inc.Inventors: Clifford Kahn, Jian Liu, Victor Pavlov, Srinivas Kavuri, John A. Chanak
-
Patent number: 12335289Abstract: An entity that creates an adaptive trust model, by a trust model adaptor of the apparatus, configured to establish a trust relationship with an other apparatus according to a composition of trust of the other apparatus derived from a trust evaluator of the other apparatus and a composition of trust of the apparatus derived from a trust evaluator of the apparatus. The entity authenticates the other apparatus based on the adaptive trust model and policies defined in the adaptive trust model; defines access control rules for the other apparatus based on the adaptive trust model and the policies defined in the adaptive trust model; builds a secure channel with the other apparatus based on the adaptive trust model and policies defined in the adaptive trust model; and records behaviors of the other apparatus on the apparatus.Type: GrantFiled: October 7, 2019Date of Patent: June 17, 2025Assignee: NOKIA TECHNOLOGIES OYInventors: Jing Ping, Anatoly Andrianov
-
Patent number: 12321440Abstract: Provided are a control device and a program verification method capable of suppressing an operation load in a case where different keys are used for respective devices. The control device 1 stores a program to be verified, a plurality of verification expected values related to verification of the program to be verified, and registered verification expected value information 183 that identifies one of the verification expected values. The control device verifies whether the program to be verified is correct using the registered verification expected value information 183.Type: GrantFiled: February 25, 2021Date of Patent: June 3, 2025Assignee: Hitachi Astemo, Ltd.Inventors: Nobuyoshi Morita, Yasuhiro Fujii, Mikio Kataoka, Masashi Yano
-
Patent number: 12323462Abstract: Aspects of the disclosure relate to identifying legitimate websites and removing false positives from domain discovery analysis. Based on a list of known legitimate domains, a computing platform may generate a baseline dataset of feature vectors corresponding to the known legitimate domains. Subsequently, the computing platform may receive information identifying a first domain for analysis and may execute one or more machine learning algorithms to compare the first domain to the baseline dataset. Based on execution of the one or more machine learning algorithms, the computing platform may generate first domain classification information indicating that the first domain is a legitimate domain. In response to determining that the first domain is a legitimate domain, the computing platform may send one or more commands directing a domain identification system to remove the first domain from a list of indeterminate domains maintained by the domain identification system.Type: GrantFiled: March 5, 2024Date of Patent: June 3, 2025Assignee: Proofpoint, Inc.Inventors: Hung-Jen Chang, Gaurav Mitesh Dalal, Ali Mesdaq
-
Patent number: 12316667Abstract: Techniques for calculating risk scores of entity assignments are discussed herein. The system generates a probability matrix using a collaborative filtering technique such as singular value decomposition. The probability matrix is populated with probability values for each entity representing a probability that, based on the various relationships or associations of that entity with other entities, the entity has been granted an assignment. Risk values are used to provide a weighting value to assignments, separating relatively higher risk assignments from relatively lower risk assignments. The system thereafter calculates a risk score for one or more of the entities using the information in the assignment matrix, the probability matrix, and the risk values. The system can flag or identity one or more entities whose risk scores do not meet various criteria.Type: GrantFiled: October 1, 2024Date of Patent: May 27, 2025Assignee: CrowdStrike, Inc.Inventors: Robert Molony, Michael Brautbar, Manu Nandan, Ciaran O'Brien
-
Patent number: 12316613Abstract: Methods and systems are provided for use in selectable data transmission. In a portable mobile computing device, a request to initiate an instant video communication with a remote portable multi-function computing device may be received, and in response to receiving the request to initiate the instant video communication, it may be determined, based on a stored authorization list, that the instant video communication connection to the remote portable multi-function computing device is authorized, and In response to such determining, stored connection information for the remote portable multi-function computing device may be accessed, and captured video communication data for the requested instant video communication may be transmitted according to the stored instant connection information such that the captured video communication data may be displayed at the remote portable multi-function computing device as it is received.Type: GrantFiled: October 12, 2023Date of Patent: May 27, 2025Assignee: InterDigital CE Patent Holdings, SASInventors: Marc Danzeisen, Jan Linder, Simon Winiker, Florian Baumgartner
-
Patent number: 12299120Abstract: System and method for detecting and curing a hollowing attack is disclosed herein. The method comprises monitoring real-time process memory parameters of a target process; retrieving real-time process memory parameters of the target process; comparing the real-time process memory parameters of the target process with reference process parameters of the target process stored in a system storage of the computing system and parameters of the process creation call-back notification; detecting a hollowing attack based on the comparison in previous step; in response to detecting the hollowing attack, determining a threat source file of malicious code; determining address space of the hollowed process on the computing system based on system log data; and curing the computing system by blocking execution of the threat source file and deleting threat resources associated therewith from the computing system.Type: GrantFiled: September 29, 2022Date of Patent: May 13, 2025Assignee: Acronis International GmbHInventors: Vladimir Strogov, Aliaksei Dodz, Serg Bell, Stanislav Protasov
-
Patent number: 12301555Abstract: Techniques are disclosed relating to automating authentication decisions for a multi-factor authentication scheme based on computer learning. In disclosed embodiments, a mobile device receives a first request corresponding to a factor in a first multi-factor authentication procedure. Based on user input approving or denying the first request, the mobile device sends a response to the first request and stores values of multiple parameters associated with the first request. The mobile device receives a second request corresponding to a factor in a second multi-factor authentication procedure where the second request is for authentication for a different account than the first request. The mobile device automatically generates an approval response to the second request based on performing a computer learning process on inputs that include values of multiple parameters for the second request and the stored values of the multiple parameters associated with the first request.Type: GrantFiled: August 30, 2021Date of Patent: May 13, 2025Assignee: Salesforce, Inc.Inventors: Joshua David Alexander, Seth Holloway, Alexa Staudt, Ian Michael Glazer, William C. Mortimore, Jr.
-
Patent number: 12294648Abstract: Systems and methods for validating transfers between cryptographic addresses is disclosed. The systems and methods can include receiving instructions to transfer a first plurality of tokens from a first cryptographic address to a second cryptographic address. The transfer can be validated with a portion of the distributed validation processors. The method can include transferring a first plurality of tokens to the second cryptographic address. The method can include transferring a second plurality of tokens to a first distributed validation processor of the plurality of distributed validation processors. After a predetermined period of time and/or subsequent validations by the first distributed validation processors, the method can include transferring an amount greater than the second plurality of tokens to the first cryptographic address.Type: GrantFiled: March 3, 2022Date of Patent: May 6, 2025Assignee: CAPITAL ONE SERVICES, LLCInventors: Samuel Rapowitz, Kevin Osborn, Xiaoguang Zhu
-
Patent number: 12278822Abstract: Malicious homoglyphic domain name (MHDN) generation and associated cyber security applications are described. MHDN generation may be performed by, for example, generating, based on training data, a set of operations for use in generating the one or more potential MHDNs, wherein each operation of the set of operations may be configured to modify a base domain name according to a respective homoglyphic characteristic. The set of operations may be used to generate one or more candidate MHDN mutators. The candidate MHDN mutators may be tested for fitness values corresponding to respective likelihoods of generating an MHDN and the candidate MHDN mutators may be applied to one or more base domain names to generate potential MHDNs.Type: GrantFiled: October 31, 2023Date of Patent: April 15, 2025Assignee: Centripetal Networks, LLCInventors: Vincent Mutolo, Alexander Chinchilli, Sean Moore, Matthew Sparrow, Connor Tess
-
Patent number: 12273383Abstract: Systems and methods are described for contextualizing a simulated phishing communication based at least on one of language and locale. Initially, a template for a simulated phishing communication is created with content in a source language. Then one or more contextual parameters for a user are identified. The one or more contextual parameters identify at least one of a target language and a target locale. The content of the simulated phishing communication is modified according to at least one of the target language and the target locale and the simulated phishing communication is communicated to one or more devices of the user with the content modified for at least one of the target language and the target locale.Type: GrantFiled: May 18, 2022Date of Patent: April 8, 2025Assignee: KnowBe4, Inc.Inventors: Greg Kras, Katie Brennan