Patents Examined by Sarah Su
  • Patent number: 11102202
    Abstract: Described are platforms, systems, and methods for a secure exchange of personal data with brand data. In one aspect, a method comprises receiving, from a computing device, a request for ownership of a brand, the request comprising a data grouping; persist a smart contract to a distributed ledger, the smart contract associated with the brand and generated based on the data grouping satisfying a criterion for ownership of the brand; and providing, to the computing device, by executing the smart contract, a plurality of opportunities based on the data grouping satisfying the criterion for ownership.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: August 24, 2021
    Assignee: BRAND MEDIA TECHNOLOGIES, INC.
    Inventors: Anoop Swaminath, Ed Wieczorek
  • Patent number: 11075941
    Abstract: A risk control method includes: acquiring risk information of a current user operation; calculating, for an identity verification mode corresponding to historical identity verification, a security coefficient according to the risk information and security information corresponding to the identity verification mode, and calculating an estimated operation risk according to the security coefficient and an amount corresponding to the user operation; and performing prescribed risk control processing on the user operation when the estimated operation risk satisfies a preset condition, and waiving performing prescribed risk control processing on the user operation when the estimated operation risk does not satisfy the preset condition.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: July 27, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Fanfan Ye
  • Patent number: 11075765
    Abstract: The techniques described herein facilitate scope-based certificate deployment for secure dedicated tenant access in multi-tenant, cloud-based content and collaboration environments. In some embodiments, a method is described that includes receiving an incoming authentication request from an access system, wherein the authentication request includes metadata, extracting the metadata from the authentication request, and processing the metadata to identify a tenant corresponding to the request. A tenant-specific certificate associated with the tenant is then accessed and provided to the access system for validation by a third-party certificate authority.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: July 27, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mangalam Rathinasabapathy, Patrick Simek, Xinghuo Zeng, Harpreet Miglani, Roshane Silva
  • Patent number: 11070580
    Abstract: A vulnerability scanning method includes: identifying a host service running on a target host and creating a scan task that matches the identified host service; issuing the created scan task to a task scheduling center, to allow a proxy node to acquire at least one scan task from the task scheduling center, where the proxy node executes the at least one scan task for the target host, and obtains a scan result; and receiving the scan result fed back by the proxy node, determining whether there exists a specified host service in the identified host service, where the specified host service signifies an existence of a web site resource running on the target host, and if there exists the specified host service in the identified host service, issuing again a scan subtask corresponding to the specified host service to the task scheduling center.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: July 20, 2021
    Assignee: WANGSU SCIENCE & TECHNOLOGY CO., LTD.
    Inventors: Haihan Wang, Younan Xu, Qifu Zhong, Chunyi Shi
  • Patent number: 11070582
    Abstract: A cybersecurity assessment system is provided for monitoring, assessing, and addressing the cybersecurity status of a target network. The cybersecurity assessment system may scan the target network and produce data regarding the current state and properties of devices on the target network, events occurring on the target network, vulnerabilities detected in devices on the target network, and the like. The cybersecurity assessment system can analyze the scan data and determine a degree to which the current status of the target network satisfies a particular cybersecurity readiness standard, and how the status changes over time. The cybersecurity assessment system can also transform large amounts of vulnerability scan data into efficient representations for use in providing interactive presentations of the vulnerabilities detected on the target network. The cybersecurity assessment system can also provide information regarding cybersecurity events in substantially real time.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: July 20, 2021
    Assignee: Cytellix Corporation
    Inventors: Brian Douglas Berger, Howard Chen Lin, Andrew Michael Fabrizio
  • Patent number: 11055437
    Abstract: Systems and methods for restricting a first computing device's output of information. The methods comprise: receiving, at the first computing device, information and at least one viewing restriction set for the information; collecting situational awareness information by the first computing device; using the situational awareness information to determine if the at least one viewing restriction is satisfied; and displaying the information on a screen of the first computing device if a determination is made that the at least one viewing restriction is satisfied or preventing the displaying of the information if a determination is made that the at least one viewing restriction is not satisfied.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: July 6, 2021
    Assignee: FLORIDA ATLANTIC UNIVERSITY BOARD OF TRUSTEES
    Inventors: Hari Kalva, Neha Kommireddy
  • Patent number: 11050574
    Abstract: A method and system for authenticating a device is provided. A noisy response is received from a physically unclonable function for a challenge. An error code is generated for correcting the noisy first response. An expected response is generated from the noisy first response and the error code. The expected response and corresponding first helper data is store. The helper data includes the first challenge and the error code. The helper data is provided to a device in response to an authentication request from the device, the first device including the physically unclonable function.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: June 29, 2021
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY, LTD.
    Inventors: Robert Abbott, Saman M. I. Adham, Peter Noel
  • Patent number: 11048812
    Abstract: A client system obtains an access token for accessing a protected resource stored at a resource system. A storage resource of the system stores a plurality of grant method code portions, a plurality of authentication method code portions and a configurable database. The client system comprises processing circuitry configured to receive an access request from a user device. The access request comprises an instruction for the client system to access a protected resource and a request identifier indicative of an authorization system for authorizing access to the protected resource. The client system uses the configurable database and code portions to execute the grant and authentication methods supported by the authorization system. The client system receives the access token from the authorization sever, in response to executing the grant and authentication methods.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: June 29, 2021
    Assignee: Barclays Execution Services Limited
    Inventors: Dickon Holt, Michael Forrest
  • Patent number: 11044228
    Abstract: A system and method is described for protecting applications against malicious URL links by identifying a final destination. The system and method also includes enabling a user process to directly connect to the final destination, bypassing the original URL altogether; thereby bypassing the hacker's ability to use that URL to programmatically send the application to a malicious site.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: June 22, 2021
    Inventor: Michael C. Wood
  • Patent number: 11038927
    Abstract: Disclosed embodiments relate to systems and methods for multidimensional vectors for analyzing and visually displaying identity permissions. Techniques include identifying a plurality of identities, privileges used by the identities, and data associated with the identities, developing privilege vectors based on the identified information, and generating groupings of the identities based on the privilege vectors. Further techniques include generating a group score for an identity grouping, using the group score to determine if the grouping is a least privilege grouping, and updating the privileges of the identities within the grouping.
    Type: Grant
    Filed: July 23, 2020
    Date of Patent: June 15, 2021
    Assignee: CyberArk Software Ltd.
    Inventors: Michael Balber, Asaf Hecht
  • Patent number: 11036856
    Abstract: Systems and methods for continuously scanning and/or sandboxing files to protect users from accessing infected files by natively mounting public cloud file stores are provided. According to one embodiment, a determination is made by a network security device that is protecting the enterprise network regarding whether an untrusted file stored within a first repository of a public cloud file store, which is natively mounted on the network security device, is a clean file that is free of malicious content by applying one or more security checks to the untrusted file. When a result of the determination is affirmative, the network security device makes the clean file accessible to the users by copying the clean file from the first repository to a second repository that is accessible to the users.
    Type: Grant
    Filed: September 16, 2018
    Date of Patent: June 15, 2021
    Assignee: Fortinet, Inc.
    Inventors: Jason Graun, Jesse Alverson
  • Patent number: 11025671
    Abstract: Detection of a security threat to a web browser by: Wrapping a suspect JavaScript code with a detection JavaScript code, wherein, when the wrapped suspect JavaScript code is executed in a web browser, the detection JavaScript code indirectly monitors access to a property of a non-writable, non-configurable JavaScript property, to detect an attempt by the suspect JavaScript code to perform a malicious action in the web browser. Executing the wrapped suspect JavaScript code in the web browser, to effect the monitoring and the detection.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: June 1, 2021
    Assignee: FIVE MEDIA MARKETING LIMITED
    Inventors: Amnon Sem Siev, Daniel Maman, Nili Davidor
  • Patent number: 11018872
    Abstract: A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device.
    Type: Grant
    Filed: July 17, 2018
    Date of Patent: May 25, 2021
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Lulia Ann Barakat, Jeffrey Haltom
  • Patent number: 11017070
    Abstract: There are provided systems and methods for visual data processing of mimed images for authentication. Authentication may be required for a user and/or an account of the user, for example, to verify the identity of the user or allow the user to access and use the account of the user. As an additional factor to authentication, increased authentication may be accomplished through who and what the user is, such as through facial recognition and biometrics of the user. During authentication, the user may be presented with a set of images or icons, such as digital emojis, that convey and emotion or idea. The user may be asked to mimic the emojis during authentication, where the user's facial expression is recorded. To authenticate the user, the recorded data may be compared to past data through facial recognition processing and image analysis to find similarities.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: May 25, 2021
    Assignee: PAYPAL, INC.
    Inventor: Srivathsan Narasimhan
  • Patent number: 11012476
    Abstract: Techniques are provided to automatically generate and apply policy rules for IoT devices. Historical data associated with IoT behaviors is obtained, where the historical data describes the file systems and behavior trends for multiple different IoT devices. Groups of the IoT devices are generated by grouping together devices identified as being common with one another based on similarities between their identified behaviors. Policies are then automatically generated for each group, corresponding to the detected behavior trends. Each policy determines how to subsequently monitor any device categorized as belonging to that policy's group and also how to respond when a device is operating abnormally. After a device is characterized as belonging to a group, that device is monitored to determine whether it conforms with the group's policy. Optionally, mitigation operations may be performed when the device is non-conforming.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: May 18, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Moshe Israel, Shira Itzhaki, Yotam Livny
  • Patent number: 11012450
    Abstract: A device and method to accurately detect list-based attacks without reducing the convenience for authorized users. An acquirer acquires information on accounts used for log-in trials to a plurality of websites. An analyzer calculates the degree of use of each account used in common for log-in trials to different websites in a predetermined period of time out of the accounts acquired by the acquirer and determine the log-in trials using the account to be attacks when the degree of use exceeds a predetermined threshold. A detector detects, as an attack, a log-in trial to the website using the same account as the account used for the log-in trials determined to be attacks by the analyzer.
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: May 18, 2021
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Yang Zhong, Masaki Tanikawa
  • Patent number: 11005892
    Abstract: System, method, and apparatus of securing and managing Internet-connected devices and networks. A wireless communication router is installed at a customer venue, and provides Internet access to multiple Internet-connected devices via a wireless communication network that is served by the router. A monitoring and effecting unit of the router performs analysis of traffic that passes through the router; identifies which Internet-connected devices send or receive data; and selectively enforces traffic-related rules based on policies stored in the router. Optionally, the monitoring and effecting unit is pre-installed in the router in a disabled mode; and is later activated after the router was deployed at a customer venue. Optionally, the router notifies the Internet Service Provider the number and type of Internet-connected devices that are served by the router.
    Type: Grant
    Filed: September 16, 2018
    Date of Patent: May 11, 2021
    Assignee: ALLOT LTD.
    Inventors: Yair Manor, Yaron Muzikant
  • Patent number: 11005839
    Abstract: Aspects of the disclosure provide techniques for using behavior based information for providing and restricting access to a secure website, or computer network and its assets to a user. Components of the system may include the following. Client remote computing device, network and browser unique attribute data collection and fingerprinting. Method for capturing user habits and fingerprinting with ability to detect abnormalities through AIML using mobile and wearable device applications. System for detection of normality of user behavior based on habits, and cyber transactions, device access and determining a confidence score associated with each transaction. Method for calculating individual transaction risk based on contextual factors such as user behavior, device, browser and the network traffic and request for authentication by account owner when risk greater than allowed threshold.
    Type: Grant
    Filed: March 11, 2019
    Date of Patent: May 11, 2021
    Assignee: Acceptto Corporation
    Inventors: Nahal Shahidzadeh, Shahrokh Shahidzadeh, Haitham Akkary
  • Patent number: 10997314
    Abstract: A data management system stores data related to a plurality of users. The data management system initially stores the data in an encrypted format. The data management system automatically periodically re-encrypts the data in accordance with a re-encryption policy. The re-encryption policy includes re-encryption periodicity data defining a periodicity for automatically re-encrypting the data.
    Type: Grant
    Filed: April 17, 2019
    Date of Patent: May 4, 2021
    Assignee: Intuit Inc.
    Inventors: Sean McCluskey, Elangovan Shanmugam, Narendra Dandekar, Rachit Lohani
  • Patent number: 10999070
    Abstract: Systems and methods for monitoring voice and SMS communication exchanged over a UMTS network is described wherein a technique for quickly testing different Count-C values, until the correct value is ascertained is used. The Count-C parameter consists of a HyperFrame Number (HFN) and the system iteratively attempts to decrypt the packets using a series of candidate HFNs. For each of these candidate HFNs, and for each of the packets, the system produces a candidate Count-C by appending the sequence number (SN). The system then uses the candidate Count-C to calculate a candidate keystream block. Subsequently, the system uses the candidate keystream blocks to decrypt the packets, and then tests whether the packets were correctly decrypted. If the system deems the decryption successful, the system stops iterating through the candidate HFNs, and uses the candidate HFN that correctly decrypted the packets to decrypt subsequent packets in the communication session.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: May 4, 2021
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Itai Langer, Gil Leibovich