Patents Examined by Stephen T Gundry
  • Patent number: 10762226
    Abstract: A data processing system 2 operates at a plurality of exception levels ELx and supports the use of protected execution environments. A register bank 16 contains registers having associated ownership variables indicating an owning exception level. Register access control circuitry 30 is responsive to the ownership values for respective registers to control access to those registers by processing circuitry 14 in dependence upon the ownership values. Target-constrained data transfer operations and associated program instructions may be provided which are able to access data values in registers not owned by the exception level associated with the execution of those program instructions, but are limited to perform data transfers to or from memory locations within a memory 6 indicated by an architected storage pointer for the owning exception level. Target-unconstrained transfer instructions at a given exception level are not able to access register data value marked as owned by a different exception level.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: September 1, 2020
    Assignee: ARM Limited
    Inventor: Jason Parker
  • Patent number: 10764029
    Abstract: A method of asymmetrical encryption and transferring encrypted data is provided that incorporates the Lucente Stabile Atkins Cryptosystem (“LSA” algorithm). This algorithm uses certain properties of mathematical objects called “groups”. Groups are sets of elements that are equipped with an operator and have the closure, associativity, identity, and invertibility properties. The LSA algorithm uses groups to encrypt and decrypt (secret sharing) any kind of symbolic information between two or more parties.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: September 1, 2020
    Inventors: Carey Patrick Atkins, Francesco Lucente Stabile
  • Patent number: 10749882
    Abstract: Aspects are generally directed to network security systems and methods of monitoring network activity. In one example, a network security system includes and interface to receive a Hypertext Transfer Protocol (HTTP) network log that includes a matrix of data, a feature extraction component configured to extract a connectivity matrix from the HTTP network log based on a recurring pattern within the matrix of data, and a training module configured to provide deep learning architecture training data based on the connectivity matrix. The system may include a deep learning architecture configured to receive and propagate the training data through one or more layers thereof to train the one or more layers, and being configured to generate a general data representation of the HTTP network log. The system may include a behavior analytics component to detect a discordant network activity within the HTTP network log based on the general data representation.
    Type: Grant
    Filed: April 19, 2018
    Date of Patent: August 18, 2020
    Assignee: Raytheon BBN Technologies Corp.
    Inventors: John Grothendieck, Ilana Heintz
  • Patent number: 10749880
    Abstract: The present invention involves with a cloud tenant oriented method and system for protecting privacy data. The method comprises at least the following steps: analyzing event handler information and/or behavioral signature information of request information and determining an execution mode, selecting at least one node without a behavioral signature plot to execute the tenant request and recording an execution result, generating a behavioral signature plot based on the execution result, and dynamically detecting security-sensitive behavior based on the behavioral signature plot. The present invention ensures data security during processing of security-sensitive data for cloud services by adopting a technology based on behavioral signatures, and prevents attackers from exploiting vulnerabilities and bypassing security control to conduct malicious operations.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: August 18, 2020
    Assignee: Huazhong University of Science and Technology
    Inventors: Hai Jin, Weiqi Dai, Yan Xia, Deqing Zou
  • Patent number: 10733290
    Abstract: Methods and equipment for determining whether a ransomware attack is suspected include a data storage device including a controller; non-volatile memory; a data path between the controller and the non-volatile memory; and an anti-ransomware module configured to monitor the data path. Methods and equipment also include monitoring a data path between a controller and a non-volatile memory on a data storage device; calculating an entropy of a data set to be written to the non-volatile memory; analyzing the calculated entropy; and determining whether a malware attack is suspected. Methods and equipment also include monitoring a data path between a controller and a non-volatile memory on a data storage device; identifying activity indicative of ransomware; once activity indicative of ransomware has been identified, calculating an entropy of a data set to be written to the non-volatile memory; analyzing the calculation; and determining whether a ransomware attack is suspected.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: August 4, 2020
    Assignee: WESTERN DIGITAL TECHNOLOGIES, INC.
    Inventors: Danny Berler, Judah Gamliel Hahn
  • Patent number: 10735446
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Grant
    Filed: May 13, 2018
    Date of Patent: August 4, 2020
    Assignee: Intellective Ai, Inc.
    Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
  • Patent number: 10721271
    Abstract: A method for detecting a phishing web page. The method, executable at a sever, comprises detecting at least one unique web page attribute that allows to identify a known phishing web page as a phishing web page; analyzing, by the server, the known phishing web page to determine at least one additional unique attribute indicative of the known phishing web page targeting a phishing target web resource; generating, by the server, at least one phishing detection rule that is based on the at least one unique attribute and the at least one additional attribute; storing the at least one phishing detection rule; receiving a new web page to be checked for phishing; applying the at least one phishing detection rule for analyzing the new web page; in response to the analyzing rendering a positive outcome, identifying the new web page as a phishing web page.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: July 21, 2020
    Assignee: TRUST LTD.
    Inventor: Dmitry Aleksandrovich Volkov
  • Patent number: 10721262
    Abstract: A computer system may generate alerts related to a potential cyber attack an resource of an organization. The computer system may receive activity information associated with activity on a computer network of the organization, access contextual information about the resource, determine, based on the contextual information, select, based at least in part on the contextual information, one or more indicators that are indicative of a cyber attack against the resource to form a second plurality of indicators, and generate, based at least in part on the second plurality of indicators and the contextual information, a risk score, wherein the risk score indicates a probability that the resource is at risk of a cyber attack. In response to the risk score satisfying a threshold value, the computer system may generate an alert. Alerts may be presented using a graphical user interface. Analysts' actions may be tracked for review.
    Type: Grant
    Filed: October 13, 2017
    Date of Patent: July 21, 2020
    Assignee: Palantir Technologies Inc.
    Inventors: Cem Zorlular, Barrett Brown, Xiao (Raymoond) Tang, Alexandra Serenhov, Chuo Hao Yeo, Ihar Zalutski, Matthew Walsh
  • Patent number: 10706179
    Abstract: The example embodiments are directed to a system and method for secure provisioning of secrets into MPSoC devices using untrusted third-party systems. In one example, the method includes generating a random number sequence from a true random number generator to produce secret information, storing the secret information in an on-chip secure storage, encrypting, in a device and using public key encryption, the secret information to generate an encrypted message, and transmitting the encrypted message to a third-party system.
    Type: Grant
    Filed: January 10, 2018
    Date of Patent: July 7, 2020
    Assignee: General Electric Company
    Inventors: Krzysztof Michal Kepa, Willard Monten Wiseman, David Safford, Wesley Michael Skeffington, William David Smith, II
  • Patent number: 10693849
    Abstract: A computer-implemented data transmission method and system are provided. A first transformed password (PWD) is acquired from the first node, wherein the first transformed PWD is derived from an original PWD. An encrypted message is acquired from the first node, the encrypted message being encrypted with a public key of the first node. A private key of the first node is recovered according to the first transformed PWD, the private key having been encrypted with the first transformed PWD and stored in the second node in advance. The encrypted message is decrypted with the recovered private key to obtain a decrypted message for processing.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Miao He, Chang Rui Ren, Bing Shao, Yue Tong
  • Patent number: 10673885
    Abstract: A user state tracking and anomaly detector for multi-tenant SaaS applications operates in association with a log management solution, such as a SIEM. A given SaaS application has many user STATES, and the applications often have dependencies on one another that arise, for example, when a particular application makes a request (typically on behalf of a user) to take some action with respect to another application. The detector includes a mapper that maps the large number of user STATES to a reduced number of mapped states (e.g., “red” and “green”), and a dependency module that generates user-resource dependency graphs. Using a dependency graph, a SaaS modeler in the detector checks whether a particular dependency-based request associated with a SaaS application is valid. State and dependency information generated by the mapper and dependency module are reported back to the log management solution to facilitate improved logging and anomaly detection.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ravi Krishnan Muthukrishnan, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Nataraj Nagaratnam
  • Patent number: 10666681
    Abstract: Methods and systems for detecting a malicious actor on a network. In some embodiments the system may gather data regarding one or more authentic hostnames on a network, and generate a pseudo hostname based on the gathered data. The system may then issue a network discovery request for the pseudo hostname. Based on a response to the network discovery request, the system may execute one or more remedial actions.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: May 26, 2020
    Assignee: Rapid7, Inc.
    Inventors: Samuel Adams, Nicholas Davis, Andrew Keely, Jeffrey D. Myers, Colin O'Brien
  • Patent number: 10666672
    Abstract: Examples relate to collecting domain name system traffic. In one example, a computing device may: receive, from a first intermediary network device, a DNS query packet that was sent by a client computing device operating on a private network, the DNS query packet specifying i) a query domain name, and ii) a source address that specifies the client computing device; store, in a data storage device, a query record specifying the query domain name and the source address specified by the DNS query packet; receive, from a second intermediary network device, a DNS response packet; determine that the DNS response packet specifies a response domain name that matches the query domain name; in response to the determination, extract, from the DNS response packet, a resolved address that corresponds to the response domain name; and store, in the query record, the resolved address specified by the DNS response packet.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: May 26, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Simon Ian Arnell, Marco Casassa Mont, Yolanta Beresna
  • Patent number: 10666446
    Abstract: In an embodiment, a computer-implemented method comprises, receiving, at a first server, a plurality of certificates and an inventory list and storing the plurality of certificates and the inventory list in a blockchain; receiving, at a second server associated with the blockchain, a validation request from a device and validating the device; in response to validating the device, receiving, at the second server, a certificate request from the device and verifying the certificate request against the inventory list stored in the blockchain; and in response to verifying the certificate request, enrolling the device by sending a certificate from the plurality of certificates stored in the blockchain to the device.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: May 26, 2020
    Assignee: Xage Security, Inc.
    Inventors: Susanto Junaidi Irwan, Ganesh B. Jampani, Andy Sugiarto, Jeffrey Charles Venable, Sr., Roman Arutyunov
  • Patent number: 10659450
    Abstract: The technology disclosed relates to non-intrusively enforcing security during federated single sign-on (SSO) authentication without modifying a trust relationship between a service provider (SP) and an identity provider (IDP). In particular, it relates to configuring the IDP to use a proxy-URL for forwarding an assertion generated when a user logs into the SP, in place of an assertion consumer service (ACS)-URL of the SP. It also relates to configuring an assertion proxy, at the proxy-URL, to use the SP's ACS-URL for forwarding the assertion to the SP. It further relates to inserting the assertion proxy in between the user's client and an ACS of the SP by forwarding the assertion to the SP's ACS-URL to establish a federated SSO authenticated session through the inserted assertion proxy.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: May 19, 2020
    Assignee: Netskope, Inc.
    Inventors: Kartik Kumar Chatnalli Deshpande Sridhar, Lebin Cheng, Krishna Narayanaswamy
  • Patent number: 10652216
    Abstract: The present invention provides methods for executing a private computer program on untrusted computers. The present invention also provides for products produced by the methods of the present invention and for apparatuses used to perform the methods of the present invention.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: May 12, 2020
    Assignee: Baffle, Inc.
    Inventors: Ashmeet Sidana, Priyadarshan Kolte, Calvin Lin
  • Patent number: 10642965
    Abstract: Provided are a method and system for identifying an open-source software package from a binary file for which an open-source license is to be checked. The method includes: accessing a database generated to include a plurality of open-source software packages having a plurality of open-source files and open-source software package version information, based on a plurality of first identifiers included in each of the plurality of open-source files; receiving the binary file; extracting at least one second identifier included in the binary file by performing a string search on the binary file; and extracting at least one first identifier that matches the at least one second identifier from the database, and outputting an open-source software package and open-source software package version information corresponding to the at least one first identifier.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: May 5, 2020
    Assignee: INSIGNARY INC.
    Inventors: Younggon Kim, Tae-Jin Kang, Si Haeng Cho
  • Patent number: 10645086
    Abstract: A system and method detects and handles replay attacks using counters maintained for each of several different periods for various values of IP addresses and browser description attributes encountered.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: May 5, 2020
    Assignee: Charles Schwab & Co., Inc.
    Inventor: Steven Hadler
  • Patent number: 10638523
    Abstract: A method and an apparatus for Wi-Fi connection based on Wi-Fi Protected Setup (WPS) in a portable terminal are provided. The method includes entering a group owner mode of Wi-Fi Direct when enabling of WPS is requested, after entering the group owner mode, entering a WPS session mode where the portable terminal is operable in a WPS registrar mode, determining whether an Access Point (AP) whose WPS session of the WPS registrar mode is enabled or a device whose group owner mode is enabled, exists nearby, and when an AP whose WPS registrar mode is enabled is discovered, disabling the WPS registrar mode and the group owner mode, enabling a WPS session where the portable terminal is to operate in a WPS enrollee mode, and accessing the discovered AP.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: April 28, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Bu-Seop Jung, Jung-Hun Lee
  • Patent number: 10628315
    Abstract: Secure memory repartitioning technologies are described. Embodiments of the disclosure may include a processing device including a processing core and a memory controller coupled between the processor core and a memory device. The memory device includes a memory range including a section of convertible pages that are convertible to secure pages or non-secure pages. The processor core is to receive a non-secure access request to a page in the memory device, responsive to a determination, based on one or more secure state bits in one or more secure state bit arrays, that the page is a secure page, insert an abort page address into a translation lookaside buffer, and responsive to a determination, based on the one or more secure state bits in the one or more secure state bit arrays, that the page is a non-secure page, insert the page into the translation lookaside buffer.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: April 21, 2020
    Assignee: Intel Corporation
    Inventors: Vedvyas Shanbhogue, Krystof C. Zmudzinski, Carlos V. Rozas, Francis X. McKeen, Raghunandan Makaram, Ilya Alexandrovich, Ittai Anati, Meltem Ozsoy