Patents Examined by Shanto Abedin
  • Patent number: 11627460
    Abstract: An improved method in a computing environment for establishing access for individuals in at least one enterprise with one or more services provided by a plurality of service providers through the use of a Common Authorization Management (CAM) service is described herein. Through the CAM service, an enterprise administrator can group together one or more individuals at one enterprise, identify access rights to one or more services in the plurality of service providers for each group of individuals based on security data defined by a service provider administrator, and associate individuals from the subset of the plurality of groups at each enterprise with access rights to one or more services provided by the plurality of service providers.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: April 11, 2023
    Assignee: THE BOEING COMPANY
    Inventors: Martin Schleiff, Anthony Andrew Kloba, III
  • Patent number: 11611579
    Abstract: In one embodiment, a device in a network captures domain name system (DNS) response data from a DNS response sent by a DNS service to a client in the network. The device captures session data for an encrypted session of the client. The device makes a determination that the encrypted session is malicious by using the captured DNS response data and the captured session data as input to a machine learning-based or rule-based classifier. The device performs a mediation action in response to the determination that the encrypted session is malicious.
    Type: Grant
    Filed: April 7, 2022
    Date of Patent: March 21, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: David Mcgrew, Blake Harrell Anderson, Daniel G. Wing, Flemming Andreasen
  • Patent number: 11606426
    Abstract: A plurality of distributed network nodes may provide a decentralized access gateway to multiple, diverse types of databases. The plurality of distributed network nodes may host a private party blockchain. Each node may execute a peer-to-peer (P2P) client to perform operations associated with the private party blockchain. A subset of the nodes may be configured as validator nodes that may implement gossip protocols to cooperatively validate one or more database operations and generate a new block for the private party blockchain. Another subset of nodes may be configured as host nodes that may receive the new block and update a corresponding local copy of the private party blockchain appending the new block. Utilizing the co-operative validation of database operations and the updates appending the new blocks, the private party blockchain may maintain an immutable digital record of access and updates to the multiple and diverse types of databases.
    Type: Grant
    Filed: October 23, 2019
    Date of Patent: March 14, 2023
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Joseph Cascioli, Judson Powers
  • Patent number: 11601289
    Abstract: The present disclosure relates to systems, methods, and computer-readable media for enhancing security of communications between instances of clients and servers while enabling rotation of server certificates (e.g., X.509 certificates). The systems described herein involve updating a client list of server certificates (e.g., a certificate thumbprint) without reconfiguring or re-installing a client and/or server application, starting a new session (e.g., a hypertext transfer protocol secure (HTTPS) session), or deploying new code. The systems described herein may passively or actively update a client list of certificates to enable a client to security verify an identity of a server instance in a non-invasive way that boosts security from man-in-the-middle types of attacks.
    Type: Grant
    Filed: January 7, 2020
    Date of Patent: March 7, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jeromy Scott Statia, Chunsheng Yang, Priyanka Vilas Deo, Elizabeth Anne Phippen, Bradley Scott Turner
  • Patent number: 11593902
    Abstract: A digital platform enables 3D printing where the designs are protected from piracy/redistribution. A single board computer (SBC) communicates with a first server and a second server. The SBC requests a unique hardware ID from the first server, which assigns and sends the ID to the SBC. The SBC submits the ID and a secret key to the second server to request registration of a user and a printer, and the second server sends private certs, a client ID, and a unique public identifier to the SBC. The second server also receives and stores 3D print designs through a designer portal, and on-demand displays the designs in a GUI screen. The SBC user may purchase a 3D print design, and the second server, in response, sends an access token to the SBC.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: February 28, 2023
    Assignee: KaBooDL, LLC
    Inventors: Francesco L. Posillico, Timothy Allan Page, Mason William Rowbottom
  • Patent number: 11588802
    Abstract: Systems and techniques are provided for a resource transfer setup and verification. A request for transfer conditions for a transfer of resources may be received from a first computing device. A set of transfer conditions may be generated in response to the request for transfer conditions and sent to the first computing device. The set of transfer conditions and an indication of an acceptance of the set of transfer conditions by a second computing device may be received from the first computing device. A transfer identifier for the set of transfer conditions may be generated from data from the set of transfer conditions which may specify a first sub-transfer. Transfer instructions may be sent to a third computing device, including instructions for a sub-transfer specified in the set of transfer conditions. The set of transfer conditions may be stored with the transfer identifier as a transfer record in non-volatile storage.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: February 21, 2023
    Assignee: RIPPLE LUXEMBOURG S.A.
    Inventor: Robert Way
  • Patent number: 11588641
    Abstract: An electronic apparatus includes a communication interface, a memory; and a processor. The memory is configured to store a hypervisor. The processor is configured to obtain an authentication key for performing authentication of an external device. The processor is also configured to encrypt the authentication key based on a key pre-stored in the memory using the hypervisor and store the encrypted authentication key in the memory. Based on a request for information that is stored in the memory being received from the external device, the processor is configured to perform authentication of the external device using the hypervisor. Based on the authentication of the external device being completed, the processor is configured to control the communication interface to transmit the stored information to the external device.
    Type: Grant
    Filed: March 2, 2021
    Date of Patent: February 21, 2023
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Dongsun Lee, Changhan Kim
  • Patent number: 11574036
    Abstract: Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person.
    Type: Grant
    Filed: May 28, 2020
    Date of Patent: February 7, 2023
    Assignee: FaceTec, Inc.
    Inventor: Kevin Alan Tussy
  • Patent number: 11570001
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for establishing a proof of storage over a specified period of time.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: January 31, 2023
    Assignee: Protocol Labs, Inc.
    Inventors: Nicola Greco, Juan Batiz-Benet
  • Patent number: 11570187
    Abstract: There may be provided a method for detecting a cyberattack or an operational issue, the method may include generating, by an IOT device or by an intermediate device located upstream to the IOT device and downstream to a computerized system, a first core-set, wherein the core-set comprises weighted records that are an approximation of a first data set related to a behavior of the IOT device; sending to the computerized system the first core-set; and finding, by the computerized system, outliers in the first core-set, and labeling the outliers as cyber attacks or operational events by the relations between the outliers and a second dataset of cluster centroid indicative of cyber attacks or operational events.
    Type: Grant
    Filed: July 7, 2020
    Date of Patent: January 31, 2023
    Assignee: SHIELDIOT LTD.
    Inventors: Ohad Levin, Dan Feldman
  • Patent number: 11562055
    Abstract: A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: January 24, 2023
    Assignee: FaceTec, Inc.
    Inventor: Kevin Alan Tussy
  • Patent number: 11563763
    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a computing device, which allows in-network and network-border protection for Internet of things (IoT) devices by securely partitioning network space and defining service-based access to IoT devices. The disclosed segmented attack prevention system for IoT networks (SAPSIN) segments the IoT network into two virtual networks: a service network and a control network; and define access control rules for each virtual network. In the service network, SAPSIN utilizes a service-based approach to control device access, allowing only configured protocol, applications, network ports, or address groups to enter or exit the network. In control network, the SAPSIN provides the access control rules by defining a threshold for the number of configuration requests within a predetermined time. As a result, SAPSIN protects IoT devices against intrusion and misuse, without the need for device-specific software or device-specific security hardening.
    Type: Grant
    Filed: August 10, 2020
    Date of Patent: January 24, 2023
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Ian McLinden, Timothy Hartley
  • Patent number: 11556632
    Abstract: In an information processing apparatus, a second central processing unit (CICU) uses an alteration detection program stored in a second memory to perform alteration detection on a program to be executed at a time of activation of a first CPU stored in a first memory. In a case where no alteration is detected in the program to be executed at the time of activation, the second CPU activates the first CPU using the program to be executed at the time of activation, and uses the activated first CPU to switch a program to be executed by the second CPU from the alteration detection program stored in the second memory to another processing program stored in the first memory.
    Type: Grant
    Filed: November 6, 2019
    Date of Patent: January 17, 2023
    Assignee: Canon Kabushiki Kaisha
    Inventor: Tsuyoshi Mima
  • Patent number: 11558376
    Abstract: There may be provided a method that includes receiving or generating a first plurality (N) points within a first multi-dimensional space that has M dimensions; M being a positive integer that is smaller than N; wherein the N points represent one or more behaviors of the one or more IOT devices; wherein a clustering of the N points within the first multi-dimensional space results in at least some clusters that are inseparable from each other; generating a representation of the N points within a second multi-dimensional space that has at least N dimensions; wherein a clustering of the N points within the second multi-dimensional space results in clusters that are separable from each other; calculating projections of the N points on a sub-space that has a second plurality (Q) of dimensions; wherein Q is a function of a relationship between a number (K) of clusters and an allowed error (?); computing a core-set that comprises a weighted subset of the projections; clustering the projections of the weighted subset
    Type: Grant
    Filed: October 1, 2020
    Date of Patent: January 17, 2023
    Assignee: SHIELDIOT LTD
    Inventors: Ohad Levin, Dan Feldman
  • Patent number: 11538037
    Abstract: A device receives first transaction information associated with a first transaction, and a first transaction account utilized for the first transaction and associated with a first financial institution. The device determines, based on a fraud model, that the first transaction is to be denied due to potential fraud associated with the first transaction account and receives second transaction information associated with a second transaction, and a second transaction account utilized for the second transaction and associated with a second financial institution. The device processes the first transaction information and the second transaction information, with a matching model, to determine whether the first transaction information matches the second transaction information and determines that the first transaction was incorrectly denied when the first transaction information matches the second transaction information within a predetermined threshold.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: December 27, 2022
    Assignee: Capital One Services, LLC
    Inventors: Colin Hart, Joshua Edwards, Francisco Perezleon, Molly Johnson, Kaitlin Newman, Angelina Wu, Jason Ji
  • Patent number: 11522875
    Abstract: There may be provided a method for detecting a cyberattack, the method may include receiving, by a computerized system, a first data set receiving or generating, by the computerized system, a second data set that comprises one or more cluster centroids associated with one or more internet of things cyberattacks; and related to behavior of multiple internet of things devices; determining relationships between outliers that belong to the first data set and the one or more cluster centroids; and determining whether the first data set is indicative of the one or more cyberattacks based on the relationships.
    Type: Grant
    Filed: September 29, 2019
    Date of Patent: December 6, 2022
    Assignee: ShieldIOT Ltd.
    Inventors: Ohad Levin, Dan Feldman
  • Patent number: 11520708
    Abstract: A memory system, comprising: i) a first electronic device comprising a processor, ii) a second electronic device being external to the first electronic device and comprising a memory, wherein the memory stores a memory image over at least a part of a data set stored on the memory, and iii) a hash value related to the memory image. The first electronic device and the second electronic device are coupled such that the processor has at least partial control over the second electronic device. The processor is configured to, when updating the data set stored on the memory of the second electronic device, also update the hash value related to the memory image using an incremental hashing operation so that only those parts of the memory image are processed that have changed.
    Type: Grant
    Filed: December 9, 2019
    Date of Patent: December 6, 2022
    Assignee: NXP B.V.
    Inventors: Marcel Rene van Loon, Bruce Murray
  • Patent number: 11520709
    Abstract: Embodiments herein describe a memory controller that has an encryption path and a bypass path. Using an indicator (e.g., a dedicated address range), an outside entity can inform the memory controller whether to use the encryption path or the bypass path. For example, using the encryption path when performing a write request means the memory controller encrypts the data before it was stored, while using the bypass path means the data is written into memory without be encrypted. Similarly, using the encryption path when performing a read request means the controller decrypts the data before it is delivered to the requesting entity, while using the bypass path means the data is delivered without being decrypted.
    Type: Grant
    Filed: January 15, 2020
    Date of Patent: December 6, 2022
    Assignee: International Business Machines Corporation
    Inventors: Tony Sawan, Adam Samuel Hale
  • Patent number: 11507702
    Abstract: Embodiments relate to switching a neural processor circuit between non-secure and secure modes. A security controller of the neural processor circuit indicates that a transition from the non-secure mode to the secure mode is to occur. The security controller waits for a neural task manager of the neural processor circuit to clear out any existing non-secure tasks in queues. After the existing non-secure mode tasks are cleared, the security controller switches the neural processor circuit to the secure mode. While in the secure mode, secure tasks are added to one or more queues and executed, and data for processing in the neural processor circuit is received from a secure source. The neural processor circuit may to transition back to the non-secure mode when all secure mode tasks are completed.
    Type: Grant
    Filed: November 5, 2019
    Date of Patent: November 22, 2022
    Assignee: Apple Inc.
    Inventors: Liran Fishel, Zhimin Chen
  • Patent number: 11489660
    Abstract: Techniques are disclosed for managing encrypted data stored in one or more blocks of a first data structure. One embodiment presented herein includes a computer-implemented method, which includes retrieving the encrypted data from the one or more blocks. The method further includes placing the encrypted data in a container object. The method further includes applying an encryption technique to the container object to generate an encrypted container object and a key. The method further includes generating a second data structure. A first block of the second data structure may include either the encrypted container object or information related to the encrypted container object.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: November 1, 2022
    Assignee: INTUIT, INC.
    Inventors: Ian R. Pentland, Glenn Scott, Roger Meike, Michael R. Gabriel