Patents Examined by Simon P Kanaan
-
Patent number: 11943235Abstract: Systems and methods include a computer-implemented method for detecting anomalous user logins. User login data for users is filtered, including monitoring workstations and servers accessed by users to obtain the user login data for the users. User login records are created for a current time period based, at least in part, on the user login data. An anomaly score is determined for each user, where the anomaly score indicates a deviation by the user from historical login patterns of the user. A user machine learning (ML) model is updated based on the predicting. User period login records are maintained over time using processed user login data. The user ML model is trained using the user periodic login records. Enriched login statistics are generated using the user ML model and the user periodic login records. A report that includes the enriched login statistics is generated in a graphical user interface.Type: GrantFiled: January 4, 2021Date of Patent: March 26, 2024Assignee: Saudi Arabian Oil CompanyInventor: Faisal Talal Wahbo
-
Patent number: 11934531Abstract: An apparatus includes a memory and a processor. The memory stores descriptions of known vulnerabilities and information generated by a monitoring subsystem. Each description of a known vulnerability identifies software components that are associated with the known vulnerability. The monitoring subsystem monitors software programs that are installed within a computer system. The information includes descriptions of issues that are associated with the software programs. The processor generates a set of mappings, based on a comparison between the text describing the known software vulnerabilities and the text describing the issues. Each mapping associates a software program that is associated with an issue with a known software vulnerability. The processor also uses a machine learning algorithm to predict that a given software program is associated with a particular software vulnerability.Type: GrantFiled: February 25, 2021Date of Patent: March 19, 2024Assignee: Bank of America CorporationInventors: Benjamin John Ansell, Yuvraj Singh, Min Cao, Ra Uf Ridzuan Bin Ma Arof, Hemant Meenanath Patil, Pallavi Yerra, Kaushik Mitra Chowdhury
-
Patent number: 11934510Abstract: A person's drawing capability is used as an authentication credential. During a training phase, a user is asked to hand draw various reference shapes such as a rectangle, flower, etc. These user drawings for a given shape are input to a training discriminator (with an “authentic” label) along with drawings automatically generated from a latent sample (with a “not authentic” label), and the training discriminator computes positive discrimination vectors for this shape that are unique to this user. Thereafter, when the user wants access to a resource (such as an online account, a mobile computing device, or an electronic document), the user is presented with a drawing challenge for one of the reference shapes, and they draw a corresponding challenge image. An image vector for the challenge image is generated, and if the image vector falls within the positive discrimination vectors, access to the resource is granted.Type: GrantFiled: December 17, 2020Date of Patent: March 19, 2024Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Ankur Tagra
-
Patent number: 11914707Abstract: Systems, methods, and computer program products are provided for disparate quantum computing (QC) detection. An example system includes QC detection data generation circuitry that generates a first set of QC detection data and generates a second set of QC detection data. The system also includes cryptographic circuitry that generates a first public cryptographic key and a first private cryptographic key via a first post-quantum cryptographic (PQC) technique and generates a second public cryptographic key and a second private cryptographic key via a second PQC technique. The cryptographic circuitry further generates encrypted first QC detection, second QC detection data, and destroys the first private cryptographic key and the second private cryptographic key. The system further includes data monitoring circuitry that monitors for the first encrypted QC detection data and the second encrypted QC detection data.Type: GrantFiled: April 19, 2022Date of Patent: February 27, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Ramanathan Ramanathan, Andrew J. Garner, IV, Abhijit Rao, Pierre Arbajian, Michael Erik Meinholz, Omar B. Khan, Ramesh Yarlagadda
-
Patent number: 11909769Abstract: Technologies for privacy-safe security policy evaluation are disclosed herein. An example apparatus includes at least one memory, and at least one processor to execute instructions to at least identify one or more non-sensitive parameters of a plurality of policy parameters and one or more sensitive parameters of the plurality of the policy parameters, the plurality of the policy parameters obtained from a computing device in response to a request from a cloud analytics server for the plurality of the policy parameters, encrypt the one or more sensitive parameters to generate encrypted parameter data in response to the identification of the one or more sensitive parameters, and transmit the encrypted parameter data to the cloud analytics server, the cloud analytics server to curry a security policy function based on one or more of the plurality of the policy parameters.Type: GrantFiled: January 20, 2021Date of Patent: February 20, 2024Assignee: MUSARUBRA US LLCInventors: Sudeep Das, Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod Sharma, Arthur Zeigler, Sumant Vashisth, Simon Hunt
-
Patent number: 11909724Abstract: A network node residing in a mobile network identifies a first network slice of the mobile network for use by a first session between a first user equipment device (UE) and a first application hosted by a first hosting device. The network node obtains a first security profile based on an identity of the first application and based on the identified first network slice, and establishes, using the obtained first security profile, a first secure tunnel between the network node and the first hosting device for transporting first data units associated with the first session between the network node and the first hosting device.Type: GrantFiled: May 4, 2022Date of Patent: February 20, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Amir Saghir, Said Hanbaly, Mun Wei Low, Nimalan Kanagasabai
-
Patent number: 11902326Abstract: In an embodiment, a method for secure messaging integration with message apps includes identifying a trigger event within a default messaging channel established between a message aggregator and a messaging application executing at a client device. In response to the trigger event, the method sends to the client device over the default messaging channel, access data usable to access a secure channel established between the message aggregator and the client device. The access data is presented within the messaging application and communications over the secure channel are not visible to the default messaging channel.Type: GrantFiled: November 8, 2021Date of Patent: February 13, 2024Assignee: Medallia, Inc.Inventor: Mansu Kim
-
Patent number: 11902276Abstract: Disclosed are various approaches for providing a virtual badge credential to a user's device that is enrolled with a management service as a managed device. Upon authentication of a user's identity via an identity provider, a virtual badge credential can be provided to an application on the client device. The virtual badge credential can be presented by the client device to access control readers to gain access to physical resources, such as doors and buildings, that are secured by the access control readers.Type: GrantFiled: October 25, 2021Date of Patent: February 13, 2024Assignee: VMware, Inc.Inventors: Gerard Murphy, Anantha Kalyan Kumar Mulampaka, Divyankitha Mahesh Urs, Yijia Zhao
-
Patent number: 11899799Abstract: A system performs an application update process based on security management information that is information including meta information for each of a plurality of security services. The application update process is a process for adding one or more security services including a security service that reduces the security risk of an application having a plurality of distributed microservices having a graph structure relationship to the application.Type: GrantFiled: September 23, 2020Date of Patent: February 13, 2024Assignee: HITACHI, LTD.Inventors: Jens Doenhoff, Nodoka Mimura, Yoshiaki Isobe
-
Patent number: 11902249Abstract: A validation device in a communication network is configured to communicate control information bidirectionally via a control plane of the network and access message data via a production plane of the network. The validation device receives key data via the control plane, and accesses a message received via the production plane by a message receiving device. The message includes a signature derived from the first key data. The validation device uses the first key data to check validity of the signature.Type: GrantFiled: April 1, 2021Date of Patent: February 13, 2024Assignee: Seraph Security, Inc.Inventors: Norman Schibuk, Boris Lukashev, Steve Graham
-
Patent number: 11888877Abstract: A device receives network segment information identifying network segments associated with a network, and receives endpoint host session information identifying sessions associated with endpoint hosts communicating with the network. The device generates, based on the network segment information and the endpoint host session information, a data structure that includes information associating the network segments with the sessions associated with the endpoint hosts. The device updates the data structure based on changes in the sessions associated with the endpoint hosts and based on changes in locations of the endpoint hosts within the network segments, and identifies, based on the data structure, a particular endpoint host, of the endpoint hosts, that changed locations within the network segments. The device determines a threat policy action to enforce for the particular endpoint host, and causes the threat policy action to be enforced, by the network, for the particular endpoint host.Type: GrantFiled: November 18, 2020Date of Patent: January 30, 2024Assignee: Juniper Networks, Inc.Inventors: Prakash T. Seshadri, Binh Phu Le, Srinivas Nimmagadda, Jeffrey S. Marshall, Kartik Krishnan S. Iyyer
-
Patent number: 11880490Abstract: Systems, methods, and computer program products for controlling use of sensitive data. A heartbeat signal conveying a context identifier is transmitted into areas where access to sensitive data is granted to authorized users. In response to receiving a request to access the sensitive data, access may be granted if the context identifier in the request matches the context identifier in the heartbeat and denied otherwise. If the requestor has exceeded an access threshold, access may be granted at a reduced rate. This reduced rate may be achieved by reducing a rate at which encryption keys are provided to the requestor. An access control layer positioned between an application layer and a communication layer allows the application layer to use plaintext of the sensitive data while protecting the sensitive data as ciphertext in the communication layer.Type: GrantFiled: February 24, 2022Date of Patent: January 23, 2024Assignee: Ohio State Innovation FoundationInventors: Harihara Varma Indukuri, Can Emre Koksal
-
Patent number: 11882146Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: GrantFiled: September 5, 2023Date of Patent: January 23, 2024Assignee: BitSight Technologies, Inc.Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Patent number: 11882099Abstract: Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.Type: GrantFiled: January 29, 2021Date of Patent: January 23, 2024Assignee: SPLUNK INC.Inventors: Jesse Chor, Michael Emery
-
Patent number: 11876911Abstract: A blockchain based alias directory may be utilized. Encrypted lists of aliases may be stored on the blockchain and may be accessible to network computers and secure gateways. Embodiments are directed to secure gateways and user devices for accessing the alias directory stored in the blockchain during a financial transaction. The user device may be provided with a list of aliases from which a user may select a payment account. Upon selection the user may be redirected to an identity verification system of the associated payment network.Type: GrantFiled: July 14, 2021Date of Patent: January 16, 2024Assignee: Visa International Service AssociationInventor: Thomas Purves
-
Patent number: 11868470Abstract: A system and method for detecting embedded malware from a device including a receiver for receiving embedded binary image; a memory for encoding and storing the received embedded binary image; and one or more processors coupled to the receiver. The method includes extracting statistical features from the encoded embedded binary image; producing gridded data from the statistical features, using SV; inputting the gridded data to a machine learning (ML) trained to detect embedded malware from the gridded data; and determining whether the embedded binary image is benign or malware.Type: GrantFiled: January 12, 2021Date of Patent: January 9, 2024Assignee: RAYTHEON COMPANYInventors: Ryan Howard Thomson, Ross Mackinnon, Brandon Woolley
-
Patent number: 11855978Abstract: A system for providing an application includes an interface and a processor. The interface is configured to receive an indication to provide an application to a device. The processor is configured to provide the application to the device. The application is configured to receive a request for credentialed information associated with a user from a requesting server; determine whether a stored credential satisfies the request for the credentialed information; and in response to a determination that the stored credential satisfies the request for the credentialed information: determine a response credential for responding to the request; determine that the user approves sharing the credentialed information indicated by the response credential; and provide the response credential to the requesting server.Type: GrantFiled: April 16, 2021Date of Patent: December 26, 2023Assignee: Workday, Inc.Inventors: Bjorn Hamel, Jonathan David Ruggiero
-
Patent number: 11856089Abstract: A communication device may send a public key externally; receive a specific signal from a first external device; determine whether a radio field intensity of the received specific signal is equal to or greater than a threshold value; receive an authentication request from the first external device; in a case where it is determined that the radio field intensity is equal to or greater than the threshold value and the authentication request is received from the first external device, send an authentication response to the first external device; after the authentication response has been sent to the first external device, receive connection information from the first external device; and establish, by using the connection information, a wireless connection between the communication device and a second external device.Type: GrantFiled: June 11, 2021Date of Patent: December 26, 2023Assignee: Brother Kogyo Kabushiki KaishaInventor: Satoshi Suzuki
-
Patent number: 11848939Abstract: The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.Type: GrantFiled: June 7, 2021Date of Patent: December 19, 2023Assignee: SMARTAXIOM, INC.Inventors: Amit Biyani, Gunjan Karun
-
Patent number: 11822655Abstract: Features of sample files that are known to be normal are extracted by random projection. The random projection values of the sample files are used as training data to generate one or more anomaly detection models. Features of a target file being inspected are extracted by generating a random projection value of the target file. The random projection value of the target file is input to an anomaly detection model to determine whether or not the target file has features that are novel relative to the sample files. The target file is declared to be an outlier when an anomaly detection model generates an inference that indicates that the target file has novel features.Type: GrantFiled: December 30, 2019Date of Patent: November 21, 2023Assignee: Trend Micro IncorporatedInventors: Jayson Pryde, Bernard Bisuna