Patents Examined by Simon P Kanaan
  • Patent number: 11943235
    Abstract: Systems and methods include a computer-implemented method for detecting anomalous user logins. User login data for users is filtered, including monitoring workstations and servers accessed by users to obtain the user login data for the users. User login records are created for a current time period based, at least in part, on the user login data. An anomaly score is determined for each user, where the anomaly score indicates a deviation by the user from historical login patterns of the user. A user machine learning (ML) model is updated based on the predicting. User period login records are maintained over time using processed user login data. The user ML model is trained using the user periodic login records. Enriched login statistics are generated using the user ML model and the user periodic login records. A report that includes the enriched login statistics is generated in a graphical user interface.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: March 26, 2024
    Assignee: Saudi Arabian Oil Company
    Inventor: Faisal Talal Wahbo
  • Patent number: 11934531
    Abstract: An apparatus includes a memory and a processor. The memory stores descriptions of known vulnerabilities and information generated by a monitoring subsystem. Each description of a known vulnerability identifies software components that are associated with the known vulnerability. The monitoring subsystem monitors software programs that are installed within a computer system. The information includes descriptions of issues that are associated with the software programs. The processor generates a set of mappings, based on a comparison between the text describing the known software vulnerabilities and the text describing the issues. Each mapping associates a software program that is associated with an issue with a known software vulnerability. The processor also uses a machine learning algorithm to predict that a given software program is associated with a particular software vulnerability.
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: March 19, 2024
    Assignee: Bank of America Corporation
    Inventors: Benjamin John Ansell, Yuvraj Singh, Min Cao, Ra Uf Ridzuan Bin Ma Arof, Hemant Meenanath Patil, Pallavi Yerra, Kaushik Mitra Chowdhury
  • Patent number: 11934510
    Abstract: A person's drawing capability is used as an authentication credential. During a training phase, a user is asked to hand draw various reference shapes such as a rectangle, flower, etc. These user drawings for a given shape are input to a training discriminator (with an “authentic” label) along with drawings automatically generated from a latent sample (with a “not authentic” label), and the training discriminator computes positive discrimination vectors for this shape that are unique to this user. Thereafter, when the user wants access to a resource (such as an online account, a mobile computing device, or an electronic document), the user is presented with a drawing challenge for one of the reference shapes, and they draw a corresponding challenge image. An image vector for the challenge image is generated, and if the image vector falls within the positive discrimination vectors, access to the resource is granted.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: March 19, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Ankur Tagra
  • Patent number: 11914707
    Abstract: Systems, methods, and computer program products are provided for disparate quantum computing (QC) detection. An example system includes QC detection data generation circuitry that generates a first set of QC detection data and generates a second set of QC detection data. The system also includes cryptographic circuitry that generates a first public cryptographic key and a first private cryptographic key via a first post-quantum cryptographic (PQC) technique and generates a second public cryptographic key and a second private cryptographic key via a second PQC technique. The cryptographic circuitry further generates encrypted first QC detection, second QC detection data, and destroys the first private cryptographic key and the second private cryptographic key. The system further includes data monitoring circuitry that monitors for the first encrypted QC detection data and the second encrypted QC detection data.
    Type: Grant
    Filed: April 19, 2022
    Date of Patent: February 27, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Ramanathan Ramanathan, Andrew J. Garner, IV, Abhijit Rao, Pierre Arbajian, Michael Erik Meinholz, Omar B. Khan, Ramesh Yarlagadda
  • Patent number: 11909769
    Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein. An example apparatus includes at least one memory, and at least one processor to execute instructions to at least identify one or more non-sensitive parameters of a plurality of policy parameters and one or more sensitive parameters of the plurality of the policy parameters, the plurality of the policy parameters obtained from a computing device in response to a request from a cloud analytics server for the plurality of the policy parameters, encrypt the one or more sensitive parameters to generate encrypted parameter data in response to the identification of the one or more sensitive parameters, and transmit the encrypted parameter data to the cloud analytics server, the cloud analytics server to curry a security policy function based on one or more of the plurality of the policy parameters.
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: February 20, 2024
    Assignee: MUSARUBRA US LLC
    Inventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
  • Patent number: 11909724
    Abstract: A network node residing in a mobile network identifies a first network slice of the mobile network for use by a first session between a first user equipment device (UE) and a first application hosted by a first hosting device. The network node obtains a first security profile based on an identity of the first application and based on the identified first network slice, and establishes, using the obtained first security profile, a first secure tunnel between the network node and the first hosting device for transporting first data units associated with the first session between the network node and the first hosting device.
    Type: Grant
    Filed: May 4, 2022
    Date of Patent: February 20, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Amir Saghir, Said Hanbaly, Mun Wei Low, Nimalan Kanagasabai
  • Patent number: 11902326
    Abstract: In an embodiment, a method for secure messaging integration with message apps includes identifying a trigger event within a default messaging channel established between a message aggregator and a messaging application executing at a client device. In response to the trigger event, the method sends to the client device over the default messaging channel, access data usable to access a secure channel established between the message aggregator and the client device. The access data is presented within the messaging application and communications over the secure channel are not visible to the default messaging channel.
    Type: Grant
    Filed: November 8, 2021
    Date of Patent: February 13, 2024
    Assignee: Medallia, Inc.
    Inventor: Mansu Kim
  • Patent number: 11902276
    Abstract: Disclosed are various approaches for providing a virtual badge credential to a user's device that is enrolled with a management service as a managed device. Upon authentication of a user's identity via an identity provider, a virtual badge credential can be provided to an application on the client device. The virtual badge credential can be presented by the client device to access control readers to gain access to physical resources, such as doors and buildings, that are secured by the access control readers.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: February 13, 2024
    Assignee: VMware, Inc.
    Inventors: Gerard Murphy, Anantha Kalyan Kumar Mulampaka, Divyankitha Mahesh Urs, Yijia Zhao
  • Patent number: 11899799
    Abstract: A system performs an application update process based on security management information that is information including meta information for each of a plurality of security services. The application update process is a process for adding one or more security services including a security service that reduces the security risk of an application having a plurality of distributed microservices having a graph structure relationship to the application.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: February 13, 2024
    Assignee: HITACHI, LTD.
    Inventors: Jens Doenhoff, Nodoka Mimura, Yoshiaki Isobe
  • Patent number: 11902249
    Abstract: A validation device in a communication network is configured to communicate control information bidirectionally via a control plane of the network and access message data via a production plane of the network. The validation device receives key data via the control plane, and accesses a message received via the production plane by a message receiving device. The message includes a signature derived from the first key data. The validation device uses the first key data to check validity of the signature.
    Type: Grant
    Filed: April 1, 2021
    Date of Patent: February 13, 2024
    Assignee: Seraph Security, Inc.
    Inventors: Norman Schibuk, Boris Lukashev, Steve Graham
  • Patent number: 11888877
    Abstract: A device receives network segment information identifying network segments associated with a network, and receives endpoint host session information identifying sessions associated with endpoint hosts communicating with the network. The device generates, based on the network segment information and the endpoint host session information, a data structure that includes information associating the network segments with the sessions associated with the endpoint hosts. The device updates the data structure based on changes in the sessions associated with the endpoint hosts and based on changes in locations of the endpoint hosts within the network segments, and identifies, based on the data structure, a particular endpoint host, of the endpoint hosts, that changed locations within the network segments. The device determines a threat policy action to enforce for the particular endpoint host, and causes the threat policy action to be enforced, by the network, for the particular endpoint host.
    Type: Grant
    Filed: November 18, 2020
    Date of Patent: January 30, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Prakash T. Seshadri, Binh Phu Le, Srinivas Nimmagadda, Jeffrey S. Marshall, Kartik Krishnan S. Iyyer
  • Patent number: 11880490
    Abstract: Systems, methods, and computer program products for controlling use of sensitive data. A heartbeat signal conveying a context identifier is transmitted into areas where access to sensitive data is granted to authorized users. In response to receiving a request to access the sensitive data, access may be granted if the context identifier in the request matches the context identifier in the heartbeat and denied otherwise. If the requestor has exceeded an access threshold, access may be granted at a reduced rate. This reduced rate may be achieved by reducing a rate at which encryption keys are provided to the requestor. An access control layer positioned between an application layer and a communication layer allows the application layer to use plaintext of the sensitive data while protecting the sensitive data as ciphertext in the communication layer.
    Type: Grant
    Filed: February 24, 2022
    Date of Patent: January 23, 2024
    Assignee: Ohio State Innovation Foundation
    Inventors: Harihara Varma Indukuri, Can Emre Koksal
  • Patent number: 11882146
    Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
    Type: Grant
    Filed: September 5, 2023
    Date of Patent: January 23, 2024
    Assignee: BitSight Technologies, Inc.
    Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
  • Patent number: 11882099
    Abstract: Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: January 23, 2024
    Assignee: SPLUNK INC.
    Inventors: Jesse Chor, Michael Emery
  • Patent number: 11876911
    Abstract: A blockchain based alias directory may be utilized. Encrypted lists of aliases may be stored on the blockchain and may be accessible to network computers and secure gateways. Embodiments are directed to secure gateways and user devices for accessing the alias directory stored in the blockchain during a financial transaction. The user device may be provided with a list of aliases from which a user may select a payment account. Upon selection the user may be redirected to an identity verification system of the associated payment network.
    Type: Grant
    Filed: July 14, 2021
    Date of Patent: January 16, 2024
    Assignee: Visa International Service Association
    Inventor: Thomas Purves
  • Patent number: 11868470
    Abstract: A system and method for detecting embedded malware from a device including a receiver for receiving embedded binary image; a memory for encoding and storing the received embedded binary image; and one or more processors coupled to the receiver. The method includes extracting statistical features from the encoded embedded binary image; producing gridded data from the statistical features, using SV; inputting the gridded data to a machine learning (ML) trained to detect embedded malware from the gridded data; and determining whether the embedded binary image is benign or malware.
    Type: Grant
    Filed: January 12, 2021
    Date of Patent: January 9, 2024
    Assignee: RAYTHEON COMPANY
    Inventors: Ryan Howard Thomson, Ross Mackinnon, Brandon Woolley
  • Patent number: 11855978
    Abstract: A system for providing an application includes an interface and a processor. The interface is configured to receive an indication to provide an application to a device. The processor is configured to provide the application to the device. The application is configured to receive a request for credentialed information associated with a user from a requesting server; determine whether a stored credential satisfies the request for the credentialed information; and in response to a determination that the stored credential satisfies the request for the credentialed information: determine a response credential for responding to the request; determine that the user approves sharing the credentialed information indicated by the response credential; and provide the response credential to the requesting server.
    Type: Grant
    Filed: April 16, 2021
    Date of Patent: December 26, 2023
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Patent number: 11856089
    Abstract: A communication device may send a public key externally; receive a specific signal from a first external device; determine whether a radio field intensity of the received specific signal is equal to or greater than a threshold value; receive an authentication request from the first external device; in a case where it is determined that the radio field intensity is equal to or greater than the threshold value and the authentication request is received from the first external device, send an authentication response to the first external device; after the authentication response has been sent to the first external device, receive connection information from the first external device; and establish, by using the connection information, a wireless connection between the communication device and a second external device.
    Type: Grant
    Filed: June 11, 2021
    Date of Patent: December 26, 2023
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Satoshi Suzuki
  • Patent number: 11848939
    Abstract: The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: December 19, 2023
    Assignee: SMARTAXIOM, INC.
    Inventors: Amit Biyani, Gunjan Karun
  • Patent number: 11822655
    Abstract: Features of sample files that are known to be normal are extracted by random projection. The random projection values of the sample files are used as training data to generate one or more anomaly detection models. Features of a target file being inspected are extracted by generating a random projection value of the target file. The random projection value of the target file is input to an anomaly detection model to determine whether or not the target file has features that are novel relative to the sample files. The target file is declared to be an outlier when an anomaly detection model generates an inference that indicates that the target file has novel features.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: November 21, 2023
    Assignee: Trend Micro Incorporated
    Inventors: Jayson Pryde, Bernard Bisuna